Bridge - network layer and routing , Computer Networking

Assignment Help:

Bridge

A bridge  operation sin both  physical  and data link  layer of OSI model. At physical  layer  it works  like  repeater as it regenerates the  signal  and performs  inter connection of different  physical  media  types  such as  coaxial cable, twisted  pair work  etc. Bridges technology supports  two data link  layer  protocols called LIC ( Logical Link Control)  MAC ( Media  Access Control). Bridges when work in data  link layer it can check the physical  (MAC) address  fro source and destination contain in a frame  and hence deciding  whether to forward  or discard the frame. For  example  it source  and destination are on the same  network  segment the bridge filters the frame. If  destination  is on a different  network  segment  the bridge  forwards the frame. Bridges  are made  to divide  a big network  into  smaller sub network  known  as  segments.

Bridges  are different  to repeaters as they  have filtering  capacity  which  is not  available with repeaters. Bridges sends  the data  frames  only to the  concerned segment thus preventing excess traffic. For e, g,  if a network  is divided in four  segments. Segments  i1 send  a frame destined  for  another  host on  segment  3 the bridge  forwards  the frame  only to segment  3 and not the  segment  2 and  4 thus blocking  unwanted traffic.


Related Discussions:- Bridge - network layer and routing

Network topology, identify different network topologies.

identify different network topologies.

What is meant by 3-tier architecture, In 3-tier Client/Server systems, the ...

In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is removed from the data and the user interface. In theory, the 3-tier Client/Se

Explain the two modes of ip security, Question 1 Describe the architecture...

Question 1 Describe the architecture and usage of ISDN Question 2 Write about different network structures in use Question 3 Explain the concept of framing in Data Li

Explain the public-key cryptography, Q. Explain the Public-Key Cryptography...

Q. Explain the Public-Key Cryptography? Public-Key Cryptography - Each user has the same encryption algorithm and key - Decryption algorithm also key are kept secret

Why you require connecting two computers for file sharing, You require conn...

You require connecting two computers for file sharing. Is it possible to do this without using a hub or router? Yes, you can connect two computers together using only one cable

Electronic cheques, Electronic Cheques   Another mechanism for Internet p...

Electronic Cheques   Another mechanism for Internet payment is electronic cheques. With electronic cheques, the payer (either an individual consumer or a business) instructs his

State the list of protocols supported by the intranet, State the list of pr...

State the list of protocols supported by the Intranet The following is the list of protocols supported by the Intranet: ARP: Address resolution Protocol is used to resol

Assigment, what the domain name of 128.252.160.2000

what the domain name of 128.252.160.2000

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd