Already have an account? Get multiple benefits of using own account!
Login in your account..!
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
A bridge operation sin both physical and data link layer of OSI model. At physical layer it works like repeater as it regenerates the signal and performs inter connection of different physical media types such as coaxial cable, twisted pair work etc. Bridges technology supports two data link layer protocols called LIC ( Logical Link Control) MAC ( Media Access Control). Bridges when work in data link layer it can check the physical (MAC) address fro source and destination contain in a frame and hence deciding whether to forward or discard the frame. For example it source and destination are on the same network segment the bridge filters the frame. If destination is on a different network segment the bridge forwards the frame. Bridges are made to divide a big network into smaller sub network known as segments.
Bridges are different to repeaters as they have filtering capacity which is not available with repeaters. Bridges sends the data frames only to the concerned segment thus preventing excess traffic. For e, g, if a network is divided in four segments. Segments i1 send a frame destined for another host on segment 3 the bridge forwards the frame only to segment 3 and not the segment 2 and 4 thus blocking unwanted traffic.
Role of Software in Intranet For an Intranet to be successful, it must have strong software support. In this section, a brief description of the operating system, groupware an
#question.what can we do with a spider when it red?.
Radio Waves - Frequency ranges: 3 KHz to 1 GHz - Omni directional - Susceptible to interference by other antennas utilizing same frequency or band - Ideal for long-di
Define Bandwidth and Latency? Network performance is calculated in Bandwidth (throughput) and Latency (Delay). Bandwidth of a network is given by the number of bits that can be
What is difference among Path and Classpath? Path and Classpath are operating system level environment variales. Path is used explain where the system can find the executabl
Give me a wide idea about simple pendulum and its types with equation and tables as usual assignment?
Monitor Stations Lost tokens - timer is issued each time a frame or token is generated If no frame is received in time period new token is generated by a monitor stat
Use Packet Tracer software to model the network that you have designed, and configure the network to make sure it is running properly. The following requirements should be met:
What are the Data link protocols? Data link protocols are sets of specifications used to implement the data link layer. The categories of Data Link protocols are 1. Asynchro
Two neighbouring nodes (A and B) use a Go-Back-N protocol with a 3-bit sequence number and a window size of 4. Acknowledgments are cumulative. Assuming A is transmitting and B is r
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd