Bridge - network layer and routing , Computer Networking

Assignment Help:

Bridge

A bridge  operation sin both  physical  and data link  layer of OSI model. At physical  layer  it works  like  repeater as it regenerates the  signal  and performs  inter connection of different  physical  media  types  such as  coaxial cable, twisted  pair work  etc. Bridges technology supports  two data link  layer  protocols called LIC ( Logical Link Control)  MAC ( Media  Access Control). Bridges when work in data  link layer it can check the physical  (MAC) address  fro source and destination contain in a frame  and hence deciding  whether to forward  or discard the frame. For  example  it source  and destination are on the same  network  segment the bridge filters the frame. If  destination  is on a different  network  segment  the bridge  forwards the frame. Bridges  are made  to divide  a big network  into  smaller sub network  known  as  segments.

Bridges  are different  to repeaters as they  have filtering  capacity  which  is not  available with repeaters. Bridges sends  the data  frames  only to the  concerned segment thus preventing excess traffic. For e, g,  if a network  is divided in four  segments. Segments  i1 send  a frame destined  for  another  host on  segment  3 the bridge  forwards  the frame  only to segment  3 and not the  segment  2 and  4 thus blocking  unwanted traffic.


Related Discussions:- Bridge - network layer and routing

Transport layer protocols , TCP (Transmission Control Protocol) and UDP are...

TCP (Transmission Control Protocol) and UDP are used by TCP/IP. SPX (Sequenced Packet Exchange) is used with IPX. NBP (Name Binding Protocol) is used with Appletalk.

Multithread web server, CSE4344 Computer Network Organization Project 1 Sim...

CSE4344 Computer Network Organization Project 1 Simple Web Server & Client Instructor: Sajib Datta Spring 2017 "What I cannot create, I do not understand." Richard P Feynman Object

How big can an intranet be, How big can an Intranet be? An Intranet ca...

How big can an Intranet be? An Intranet can be as big as a community of interest. Scale is an important factor in web implementation, but it has no bearing on the logical asso

Subtle point, It is possible for a datagram to generate ICMP errors after i...

It is possible for a datagram to generate ICMP errors after it has been fragmented. For example, suppose that each of two fragments cannot be delivered. Seemingly, this would mean

Thread libraries, The most difficult representatives of shared memory progr...

The most difficult representatives of shared memory programming models are thread libraries present in mainly of the modern operating systems. Some examples for thread libraries ar

What is round trip time, What is Round Trip Time? The duration of time ...

What is Round Trip Time? The duration of time it takes to send a message from one end of a network to the other and back, is known as RTT.

What is an interrupt request, Question: a) Briefly describe the purpos...

Question: a) Briefly describe the purpose of Windows Powershell? b) Name three ways software can be installed on Linux? c) What is an interrupt request? d) As the

Introduction to performance evaluations, INTRODUCTION In this part, th...

INTRODUCTION In this part, the topic of performance evaluation shows those parameters that are devised to calculate the performances of various parallel systems. Achieving the

Error detecting code - parity bit, Error Detecting Code - Parity bit: ...

Error Detecting Code - Parity bit: The general idea for achieving error detection and correction is to add some redundancy (i.e., some extra data) to a message, which receiver

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd