Bridge - network layer and routing , Computer Networking

Assignment Help:

Bridge

A bridge  operation sin both  physical  and data link  layer of OSI model. At physical  layer  it works  like  repeater as it regenerates the  signal  and performs  inter connection of different  physical  media  types  such as  coaxial cable, twisted  pair work  etc. Bridges technology supports  two data link  layer  protocols called LIC ( Logical Link Control)  MAC ( Media  Access Control). Bridges when work in data  link layer it can check the physical  (MAC) address  fro source and destination contain in a frame  and hence deciding  whether to forward  or discard the frame. For  example  it source  and destination are on the same  network  segment the bridge filters the frame. If  destination  is on a different  network  segment  the bridge  forwards the frame. Bridges  are made  to divide  a big network  into  smaller sub network  known  as  segments.

Bridges  are different  to repeaters as they  have filtering  capacity  which  is not  available with repeaters. Bridges sends  the data  frames  only to the  concerned segment thus preventing excess traffic. For e, g,  if a network  is divided in four  segments. Segments  i1 send  a frame destined  for  another  host on  segment  3 the bridge  forwards  the frame  only to segment  3 and not the  segment  2 and  4 thus blocking  unwanted traffic.


Related Discussions:- Bridge - network layer and routing

Show the routing table, Q. Show the Routing Table? Routing Table ...

Q. Show the Routing Table? Routing Table Every router remains a routing table that has one entry for every destination network of which the router is aware Proces

#title. Wireless broadband, Hi, i am a college student doing a report on wi...

Hi, i am a college student doing a report on wireless broadband. I needed to know user requirements of user groups ie: Home user Small Medium Large Businesses Things like w

Explain types of networking and internetworking device, What is the differe...

What is the different type of networking / internetworking devices? 1. Repeater: Also known as a regenerator, it is an electronic device that operates only at physical layer.

Encryption authentication - point to point , Encryption Authentication ...

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Distributed Algorithms, can we solve the problem using bounded buffer space...

can we solve the problem using bounded buffer space if the propagation delay is arbitrarily large ?

What is the difference between arp and rarp, ARP - Address Resolution Proto...

ARP - Address Resolution Protocol It is the protocol that traces IP addresses to MAC addresses. RARP - Reverse Address Resolution Protocol It is the protocol within the TC

Network devices - network layer and routing , Network Devices a.Hub ...

Network Devices a.Hub b.Repeater c.Bridge d.Gateway e.Switch f.Router Connecting devices can  classified  into networking and internetworking  devices when

Create and simulate a network - netml system, Create and simulate a network...

Create and simulate a network similar to the one shown here, using the NetML system. The network is a little more complex, as depicted at the right. There is an extra node

Show the security policy as well integrated security, Q. Show the Security ...

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd