Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write notes on Frame Filtering Techniques.
Frame filtering:
The most valuable function performed through bridges is frame filtering. A bridge doesn't forward a frame unless essential. In particular, if a computer attached to individual segment sends a frame to a computer on similar segment, the bridge doesn't require forwarding a copy of the frame to the other segment.
To find out whether to forward a frame, a bridge utilizes the physical address found into the frame headers. While a frame arrives upon a segment, the bridge extracts and checks the destination address. If the bridge determines that the destination computer is attached to a segment over that the frame arrived, the destination will also have obtained a copy of the frame; therefore the bridge can discard a frame without forwarding a copy.
Most bridges are termed as adaptive or learning bridges since they learn the location of a computer automatically. The bridge utilizes the source address to automatically find out the location of the computer which sent a frame, and uses the destination address to find out whether to forward a frame.
The following branch prediction algorithms are suggested: 1) Guess that the branch will be taken if the previous one was taken; predict not taken otherwise. 2) Guess that the
what is jsf
Erlang is used to (A) Measure busy period (B) Give total busy period in minutes (C) Measure average call rate (D) Indicate total call period Ans
Multiple providers of libraries may use common global identifiers causing a name collision when an application tries to link with two or more such libraries. The namespace feature
diagrams of picket fence problem
Can matchcode object contain Ids with different update types? Yes.
Define interrupt and ISR? An interrupt is a request from an I/O device for service by the processor. The processor gives the requested service by implementing the interrupt ser
Performance Equation of computer system: Following equation is frequently used for expressing a computer's performance ability: The CISC approach tries to minimize the
#what is the history of computer science
Illustrated three stages of data mining process? Stage 1: Exploration: This stage generally starts along with data preparation that may involve cleaning data, selecting subse
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd