Bridges, Computer Networking

Assignment Help:

BRIDGES:

 A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all traffic and knows frame format. It also transfers only correct complete frames and removed the collided and error frames.

 A typical bridge has two NICs, a CPU a storage and a ROM. It only executes the code stored in its ROM.

STARTUP AND STEADY STATE:

 When a bridge first lodes the address lists are empty. The bridge forwards frames to the other code segment if it may not know its destination address in its lists.

 After period of time when the bridge has accepted at least one frame from each computer, it has the lists created it forwards frames as far it is useful.

PLANNING A BRIDGE NETWORK:

 In a steady state, a bridge gives simultaneous use of every segment. When designing a LAN, bridges may be installed to convert the LAN into segments to enhance performance.

For example: Frequently contacting devices may be attached to the similar segment. The frame traffic on one segment does not affect the other code segments.

 


Related Discussions:- Bridges

Define what is a software agent, QUESTION (a) Define what is a software...

QUESTION (a) Define what is a software agent? (b) An intelligent agent is known to exhibit several characteristics or properties that distinguish it from another piece of so

Use of a distance vector routing algorithm, Question: (a) The diagram ...

Question: (a) The diagram below shows a configuration of Internet routers (A-F) which achieve dynamic routing through the use of a Distance Vector routing algorithm. The metr

Modify the tcp server and udp server in client server, Let's imagine that w...

Let's imagine that we have 2 TCP clients. A simple one (modTCPClient.c) like the one you wrote in the first part of project 2 and another one (modTCPClient1.c) that after it connec

Determine the objectives of computer security, Determine the Objectives of ...

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one

Determine the subnet with subnet prefix, Consider a subnet with subnet pref...

Consider a subnet with subnet prefix 101.101.101/24  a)  If you subdivide the subnet into four equal size subnets, what are their prefixes? Give all four prefixes in the form a.

Overview of the various network topologies, QUESTION Write a report to ...

QUESTION Write a report to explain the concept of LAN and WAN including the various components of the telecommunication infrastructure required by UTM Ltd. You are required to

Which layer is responsible for coordinating communication , Which layer is ...

Which layer is responsible for coordinating communication between systems Ans) The Session layer performs the following: Responsible for establishing and maintaining connections

Verify network connectivity- ccna, Verify Network Connectivity Step 1: ...

Verify Network Connectivity Step 1: Use the ping command to determine network connectivity. You can determine network connectivity using the ping command.  Note: If pings

Explain the term - carrier sense multiple access, What is use of Carrier se...

What is use of Carrier sense multiple access Carrier sense multiple access with collision detection (CSMA/CD) is a form of medium access control in which a station listens to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd