University of Khartoum

Network Documentation

Network Documentation

 

Recent Submissions

  • خوجلى, محمد حماد; Hamad, Mohammed (University of Khartoum, 2016)
    When a device has multiple paths to reach a destination, it always selects one path by preferring it over others. This selection process is termed as Routing. Routing is done by special network devices called routers, a ...
  • ali, Ali Jbraldar mohamed (University of Khartoum, 2016)
    National Security Telecommunications and Information Systems Security Committee (NSTISSC) Network security is the protection of information and systems and hardware that use, store, and transmit that information. Network ...
  • Abdul Rahim, Tasneem Omer (University of Khartoum, 2016)
    1- an access control list refers to rules that are applied to port numbers or IP addresses that are available on a host or other layer 3 devices. On some types of proprietary computer hardware (in particular routers and ...