Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
BRIDGES:
A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all traffic and knows frame format. It also transfers only correct complete frames and removed the collided and error frames.
A typical bridge has two NICs, a CPU a storage and a ROM. It only executes the code stored in its ROM.
STARTUP AND STEADY STATE:
When a bridge first lodes the address lists are empty. The bridge forwards frames to the other code segment if it may not know its destination address in its lists.
After period of time when the bridge has accepted at least one frame from each computer, it has the lists created it forwards frames as far it is useful.
PLANNING A BRIDGE NETWORK:
In a steady state, a bridge gives simultaneous use of every segment. When designing a LAN, bridges may be installed to convert the LAN into segments to enhance performance.
For example: Frequently contacting devices may be attached to the similar segment. The frame traffic on one segment does not affect the other code segments.
Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN
State in brief about the Local Area Network (LAN) LAN is an interconnection of computers and associated peripherals as well as to the communications system as shown in Figure
hi
What is Synchronous TDM? In STDM, the multiplexer allocates exactly the same time slot to every device at all times, whether or not a device has anything to transmit.
Discuss about the JPEG and LDAP JPEG: Stands for Joint Photographic Experts Group. A standard format of storing digitized, colour, or black-and-white photographs. JPEG fi
Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4
You must write the 6 programs described below. All of these are command-line tools that follow the Unix style of passing switches and arguments on the command line. As such, your p
Fully connected : It is the most powerful interconnection topology. In this every node is directly associated to all other nodes. The limitation of this network is that it needs t
Illustrate the downside of groupware The downside of groupware is that they are very costly and with the increase in complexity or additional features, the cost increases propo
Which form of PPP error detection on Cisco routers monitors data dropped on a link? Ans) The Quality protocol monitors data dropped on a link. Magic Number avoids frame looping
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd