The field of Computer Networking is the base by which we are connected with each other and able to communicate.
If we talk about academics, then this field is for those students who find difficulty in creating logic in coding or feel like programming is going over their head.
Different Network Security Tools Following are the major tools employed in network security: OSI stands for open system interconnection.
It offers a networking framework to implement protocols in layers.
Types of network attacks Active Attack – In this type of attack, a hacker tries to alter the data while it is being sent from one node to another.
Passive Attack – In this type of attack, an outsider monitors system of the organization consistently to find vulnerable ports in the network to enter into the network.Whenever a user tries to access the network, his authenticity is checked by means of ids and passwords.This is done to prevent any malicious user entering the network with the motive to hack the network.MANET was originally designed to be used as military project in defense.MANET has certain challenges such as weak signal strength, reliability, power consumption along with some other problems.There are seven layers of OSI Model which are defined as follows: Physical Layer – This layer is responsible for transferring digital data from source to the destination.Data Link Layer – This layer checks error in data along with the MAC address. Network Layer – This layer checks whether the data has reached the destination or not by examining the source and the destination address.The main characteristics of WSN are: TCP(Transmission Control Protocol) is a set of pre-defined rules to access the internet with interconnection of various internet-based devices.It is a communication protocol in which there is a host who has access to the internet.Clients can be the mobile phones, laptops, desktops connected to this network.Modes of Operation of WLAN There are two modes of operation of WLAN - infrastructure, Ad hoc: Infrastructure – In the infrastructure mode, base station act as the access point and all the nodes communicate with each other through this point.