Advantages of bridges - network layer and routing, Computer Networking

Advantages of Bridges

By forwarding  frames  only to  the segment  where  host  resides  a bridge server the  following  purpose.

a.Unwanted  traffic  as well  as network  congestion  is minimized  to the  maximum  possible  extent.

b.Busy  and erroneous  links  can be identified  and deleted.

c.Security  features  can be implemented.

Posted Date: 3/16/2013 2:30:55 AM | Location : United States







Related Discussions:- Advantages of bridges - network layer and routing, Assignment Help, Ask Question on Advantages of bridges - network layer and routing, Get Answer, Expert's Help, Advantages of bridges - network layer and routing Discussions

Write discussion on Advantages of bridges - network layer and routing
Your posts are moderated
Related Questions
Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

The transport Layer Communication  between  computers is handled by the transport layer which  is comprised of transmission control  protocol (TCP) and the users  datagram pro

Question: (a) What is a script kiddie? Is it a significant security threat, and why? (b) Assume that UNIX uses the user login name in lieu of the traditional salt, what is

Uneven Load Distribution In the parallel computer, the problem is dividing into sub-problems and is assigned for computation to various processors. But sometimes the sub-probl

Q. Permutation representation through Matrix? Figure: Clos Network The functioning of this above permutation is displayed in Figure. This permutation is able to

Question 1 Videoconferencing is used to conduct meetings with the people who are located in far distance. Videoconferencing is an example of which type of computer networks? Expla

FORMAT OF HARDWARE ADDRESS:    It have of a numeric value and its size is chosen for specific network technology. The length of the message format is one to six bytes.

The Five steps to data encapsulation (IN ORDER): 1) User information is changed into data. 2) Data is changed into segments. 3) Segments are changed into datagram and pack


Illustrate about the working of Socks protocol SOCKS is an open, industry-standard protocol advanced by the Authenticated Firewall Traversal working group of the IETF (Internet