Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Bridge
A bridge operation sin both physical and data link layer of OSI model. At physical layer it works like repeater as it regenerates the signal and performs inter connection of different physical media types such as coaxial cable, twisted pair work etc. Bridges technology supports two data link layer protocols called LIC ( Logical Link Control) MAC ( Media Access Control). Bridges when work in data link layer it can check the physical (MAC) address fro source and destination contain in a frame and hence deciding whether to forward or discard the frame. For example it source and destination are on the same network segment the bridge filters the frame. If destination is on a different network segment the bridge forwards the frame. Bridges are made to divide a big network into smaller sub network known as segments.
Bridges are different to repeaters as they have filtering capacity which is not available with repeaters. Bridges sends the data frames only to the concerned segment thus preventing excess traffic. For e, g, if a network is divided in four segments. Segments i1 send a frame destined for another host on segment 3 the bridge forwards the frame only to segment 3 and not the segment 2 and 4 thus blocking unwanted traffic.
You are the Senior Project Manager in a software company and have, as part of your team, a student on a three month internship. The student has proudly told you that they have stu
Telephone companies (Telco's) stated ATM to meet various goals. It gives universal service for all support and subscribers for all users for video, voice and data. It has a single
What is the disadvantage of a star topology? One major drawbacks of star topology is that once the central hub or switch get damaged, the whole network becomes unusable.
Token Ring Implementation Sequence of 150-ohm shielded twisted-pairs sections Output port on every station connected to input port on the next Frame is passed to
Configure the Physical Topology Step 1: Cable the network. Refer to the figure and table below for the essential cables. Step 2: Physically connect lab devices. C
What is the difference between routable and non- routable protocols? Ans) Routable protocols can work with a router and can be used to build huge networks. Non-Routable protocol
DNS - Server Attacks It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response
What does a Standard IP Access-list use as test criteria Ans) Standard IP access list use only source address.
In distributed data processing, explain two scenarios where vertical partitioning and horizontal partitioning are used. Distributed Data Processing The distributed data pro
Describe different router types in OSPF?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd