Bridges, Computer Networking

Assignment Help:

BRIDGES:

 A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all traffic and knows frame format. It also transfers only correct complete frames and removed the collided and error frames.

 A typical bridge has two NICs, a CPU a storage and a ROM. It only executes the code stored in its ROM.

STARTUP AND STEADY STATE:

 When a bridge first lodes the address lists are empty. The bridge forwards frames to the other code segment if it may not know its destination address in its lists.

 After period of time when the bridge has accepted at least one frame from each computer, it has the lists created it forwards frames as far it is useful.

PLANNING A BRIDGE NETWORK:

 In a steady state, a bridge gives simultaneous use of every segment. When designing a LAN, bridges may be installed to convert the LAN into segments to enhance performance.

For example: Frequently contacting devices may be attached to the similar segment. The frame traffic on one segment does not affect the other code segments.

 


Related Discussions:- Bridges

What is sliding window protocols, Q. What is Sliding Window protocols? ...

Q. What is Sliding Window protocols? Alternatives: Sliding Window protocols - One task begins prior to the other one ends                                     (concept of

Building distributed systems, Unfortunately, building real-life distributed...

Unfortunately, building real-life distributed systems is not easy. It is hard, for instance, to implement instructions such as "send this data structure to be processed on that com

State about the single sign-on intranet, State about the Single Sign-On Int...

State about the Single Sign-On Intranet This Intranet, if managed efficiently, allows maximum security by firewalling anyone from inappropriate sites automatically. For exam

Shortest path tree and minimum-spanning tree, We studied Dijkstra's link-st...

We studied Dijkstra's link-state routing algorithm for computing the unicast paths that are individually the shortest paths from the source to all destinations. The union of these

Security impact of not having a public key infrastructure, (a) You are pro...

(a) You are provided with the following: A. An RSA facility complete with public/private key pair B. A CBC (cipher block chaining) facility incorporating the IDEA block ciph

The network interface layer - fundamentals of networks, The Network Interfa...

The Network Interface Layer The functions  of the data  link layer and the physical  layer of   the OSI model  have been  combined into a  single  layer called  the network in

Bandwidth allocation , Consider figure.  Assume a new flow E is added that ...

Consider figure.  Assume a new flow E is added that takes a path from R1 to R2 to R6. How does the max-min bandwidth allocation change for the 5 flows?

What is the purpose of configuration files for servers, Question 1: a) ...

Question 1: a) Give three examples of Shells in Linux. b) Differentiate between the Join command and the Paste command in Linux, use an example to support your answer.

When a switch is said to be congested, When a switch is said to be congeste...

When a switch is said to be congested? It is possible that a switch receives packets faster than the shared link can accommodate and keeps in its memory, for an extended period

Data bandwidth requirements, Calculate data bandwidth requirements from and...

Calculate data bandwidth requirements from and to each site.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd