Bridge - network layer and routing , Computer Networking

Assignment Help:

Bridge

A bridge  operation sin both  physical  and data link  layer of OSI model. At physical  layer  it works  like  repeater as it regenerates the  signal  and performs  inter connection of different  physical  media  types  such as  coaxial cable, twisted  pair work  etc. Bridges technology supports  two data link  layer  protocols called LIC ( Logical Link Control)  MAC ( Media  Access Control). Bridges when work in data  link layer it can check the physical  (MAC) address  fro source and destination contain in a frame  and hence deciding  whether to forward  or discard the frame. For  example  it source  and destination are on the same  network  segment the bridge filters the frame. If  destination  is on a different  network  segment  the bridge  forwards the frame. Bridges  are made  to divide  a big network  into  smaller sub network  known  as  segments.

Bridges  are different  to repeaters as they  have filtering  capacity  which  is not  available with repeaters. Bridges sends  the data  frames  only to the  concerned segment thus preventing excess traffic. For e, g,  if a network  is divided in four  segments. Segments  i1 send  a frame destined  for  another  host on  segment  3 the bridge  forwards  the frame  only to segment  3 and not the  segment  2 and  4 thus blocking  unwanted traffic.


Related Discussions:- Bridge - network layer and routing

Show the network layer responsibilities, Q. Show the Network Layer Responsi...

Q. Show the Network Layer Responsibilities? - Source-to-destination delivery it is possibly across multiple networks - Logical addressing - Routing

Well known internet applications that uses tcp connection, a)  Which of the...

a)  Which of the well-known Internet applications uses a separate TCP connection for control?   b)  The separate control connection as in (a) above is an example of control (sig

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Compute the number of lost packets of the down-stream, A mobile host (MH) i...

A mobile host (MH) is connected to a WLAN access network that uses MIP for mobility support. Consider that the RTTs between MH and HA are 0.3s while RTTs within a L2 subnet are 80

State the term - netbios and imap, State the term - NetBIOS and IMAP Ne...

State the term - NetBIOS and IMAP NetBIOS: Network Basic Input Output System is an API (applications programming interface) used with other programs to transmit messages betwee

Explain about the browser, Explain about the Browser A program that ...

Explain about the Browser A program that allows the user to access and read information on the World Wide Web. Netscape® Navigator and Microsoft Explorer® are the best known

Describe peer-to-peer networking, You are requested to design a secure home...

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availabi

Lan- wan network module expansion slot, WAN interface card(WIC) slots T...

WAN interface card(WIC) slots Two fixed WIC slots are present in  2600 series router except 2691. It has contained 3 WIC slots. Network Module Expansion Slot( NM) slot

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd