Comments
you can also visit
books.google.com.pk
Posted by waqasahmad
it is used for to distinguish both.
Posted by waqqas1
The methodology generally used by hackers consists in scanning the network (by randomly sending out data packets) in search of a connected computer.And means that control traffic will not be lost if an application stops reading data traffic.
Posted by sagitraz
1) Keeping the ports separate means that control traffic will not be lost if an application stops reading data traffic
2) Congestion would happen
3) Control traffic will not be lost if an application stops reading data traffic.
Posted by mariuspaul