Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
FRAME FILTERING:
The very important task a bridge operates is frame filtering. If both the destination and source are on the same segment, it does not repeat the frame to the other code segment. A frame is forwarded to the other code segment, if it id destined to that part. Multicast and broadcast frames are also forwarded.
A bridge has a list for every segment that consists of physical addresses of the machine attached to that part. In this way a bridge finds on which code segment a destination device is attached.
As soon as a frame reachs to a bridge, it finds a source address from its header and automatically includes it in the list for that code segment. In this way a bridge creates up address lists. This is given in the figure below:
Figure
Define Character Stuffing? In byte stuffing (or character stuffing), a particular byte is added to the data section of the frame when there is a character with the same pattern
When a P is returned when a Trace is run, it means the Protocol is unreachable.
Network Laye The network layer provides communication between the multiple networks. Whereas the data link layer provides the communication between two systems on the s
Interconnection Network An interconnection network is designed for transferring data between two processors in a Multi-stage network. Memory bottleneck is a fundamental limitat
Multicast Routing Protocols Multicast group addresses are assigned by IANA [Internet Assigned Numbers Authority for well known services and protocols. Information is exchang
A UDP header does not have Sequence number and Acknowledgement number fields. Is it an advantage or a disadvantage? Explain your answer in detail. User Datagram Protocol Th
Measure the performance (both latency and throughput) of TCP and UDP protocol stack running on a pair of PCs or Workstations in the Lab, and compare the results of your software
Question: (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, r
Explain the term - primary memory and hard disk A peculiar situation arises when the existing server arrives at a stage when it cannot handle the requests quickly and most of i
Receive Window This field defines the size of the window in bytes that the other party must maintain. Note that the length of this field 16 bits which means
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd