Bridge - network layer and routing , Computer Networking

Assignment Help:

Bridge

A bridge  operation sin both  physical  and data link  layer of OSI model. At physical  layer  it works  like  repeater as it regenerates the  signal  and performs  inter connection of different  physical  media  types  such as  coaxial cable, twisted  pair work  etc. Bridges technology supports  two data link  layer  protocols called LIC ( Logical Link Control)  MAC ( Media  Access Control). Bridges when work in data  link layer it can check the physical  (MAC) address  fro source and destination contain in a frame  and hence deciding  whether to forward  or discard the frame. For  example  it source  and destination are on the same  network  segment the bridge filters the frame. If  destination  is on a different  network  segment  the bridge  forwards the frame. Bridges  are made  to divide  a big network  into  smaller sub network  known  as  segments.

Bridges  are different  to repeaters as they  have filtering  capacity  which  is not  available with repeaters. Bridges sends  the data  frames  only to the  concerned segment thus preventing excess traffic. For e, g,  if a network  is divided in four  segments. Segments  i1 send  a frame destined  for  another  host on  segment  3 the bridge  forwards  the frame  only to segment  3 and not the  segment  2 and  4 thus blocking  unwanted traffic.


Related Discussions:- Bridge - network layer and routing

What is the network time protocol, What is the Network Time Protocol? ...

What is the Network Time Protocol? A protocol that makes sures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is c

What are mac addresses, What are MAC addresses? MAC, or Media Access Co...

What are MAC addresses? MAC, or Media Access Control, uniquely identifies a device on the network. It is also called as physical address or Ethernet address. A MAC address is m

Password authentication protocols (pap), Password Authentication Protocols ...

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

LTE, What is LTE ?

What is LTE ?

What is a management information base, What is a Management Information Bas...

What is a Management Information Base (MIB)? A Management Information Base is part of each SNMP-managed device. Every SNMP agent has the MIB database that having information ab

Sate 802.11 architecture, 802.11 Architecture ESS (Extended service set...

802.11 Architecture ESS (Extended service set) two or more BSSs with APs connected through a distribution system (wired LAN) in an infrastructure network

Hardware component used to store buffers, Recognize the hardware component ...

Recognize the hardware component used to store buffers, tables, running-configuration etc? Ans) RAM is the dynamic memory area. ROM have the boot strap code, NVRAM have the star

TCP, TCP creates a reliable data transfer service, in addition to IP''s unr...

TCP creates a reliable data transfer service, in addition to IP''s unreliable best-effort service. Study the related sections of the text, and in your own words, summarize how TCP

Prompt ''router'', Recognize the mode reflected by the following prompt 'Ro...

Recognize the mode reflected by the following prompt 'Router '? Ans) RXBoot

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd