Bridges, Computer Networking

BRIDGES:

 A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all traffic and knows frame format. It also transfers only correct complete frames and removed the collided and error frames.

 A typical bridge has two NICs, a CPU a storage and a ROM. It only executes the code stored in its ROM.

STARTUP AND STEADY STATE:

 When a bridge first lodes the address lists are empty. The bridge forwards frames to the other code segment if it may not know its destination address in its lists.

 After period of time when the bridge has accepted at least one frame from each computer, it has the lists created it forwards frames as far it is useful.

PLANNING A BRIDGE NETWORK:

 In a steady state, a bridge gives simultaneous use of every segment. When designing a LAN, bridges may be installed to convert the LAN into segments to enhance performance.

For example: Frequently contacting devices may be attached to the similar segment. The frame traffic on one segment does not affect the other code segments.

 

Posted Date: 10/27/2012 9:15:04 AM | Location : United States







Related Discussions:- Bridges, Assignment Help, Ask Question on Bridges, Get Answer, Expert's Help, Bridges Discussions

Write discussion on Bridges
Your posts are moderated
Related Questions
Q. What is Domain Names ? - Full domain name is a sequence of labels separated by dots (.) - Fully competent domain name (FQDN) contains the full name of a host cis.usouthal


Authoritative DNS Servers Every  organization with publicly  accessible hosts  ( such  as web  server and mail  several  on the  internet  must  provide  publicly accessible D

Define the terms Unicasting, Multiccasting and Broadcasting? If the message is sent from a source to a one destination node, it is called Unicasting. If the message is sent

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers

Q. Show the Use of flow control? Flow control denotes to a set of procedures used to restrict the amount of data that the sender can send before waiting for Error Control

Describe what is meant by Asymmetric Multiprocessing (AMP)? Ans) It imposses hierarchy and a division of labour between processors. Only one designated processor, the master, co

A. Current setting A new bank has its headquarters located in City A. Recently, the bank has opened its first branch in City B, and its data centre in City C. The three cities a

A generic algorithm is mostly analyzed on the basis of the following parameters: the time complexity (implementation time) and the space complexity (amount of space necessary). Usu