Cycle of bridges, Computer Networking

CYCLE OF BRIDGES:

 A bridges network can join several segments. One bridge is useded to connect every segment to the rest of the bridge network. This is given in the figure below:

 

1125_CYCLE OF BRIDGES.png

DISTRIBUTED SPANNING TREE:

 If a bridge network creates a cycle, then not all bridges on the network have be allowed to forward broadcast packets.

 The bridges configure themselves automatically to select which bridge will forward broadcast frames and which bridge will not forward packets.  The bridges interact with each other on the network and use Distributed Spanning Tree (DST) algorithm to select which bridge will not forward frames if a cycle happens.

Posted Date: 10/27/2012 9:21:56 AM | Location : United States







Related Discussions:- Cycle of bridges, Assignment Help, Ask Question on Cycle of bridges, Get Answer, Expert's Help, Cycle of bridges Discussions

Write discussion on Cycle of bridges
Your posts are moderated
Related Questions
Q. Example on audio transmission? admission policy - QoS mechanism; switches (routers) first check resource requirements of a flow before admitting it to the netwo

The Address Resolution Protocol (ARP) sends out a broadcast to verify the MAC address from the IP address.

Ajax is a relatively new set of techniques that, in a sense, implement some of the functionalities originally provided by RPC. Ajax is primarily used to build web applications with

Q. Explain about Traditional Modems? - Subsequent to modulation by the modem an analog signal reaches the telephone company switching station where it sampled and digitized to

Discuss about the similarity of Intranets to the Internet The ease of use of the end user would be the most noticeable because of the similarity of Intranets to the Internet. S

Explain in brief -Ring Topolgy Comments 1 - A faulty connection amid two stations can cause network failure 2 - It's difficult to add a new station/device as it has to come betwe

QUESTION Write a report to explain the concept of LAN and WAN including the various components of the telecommunication infrastructure required by UTM Ltd. You are required to

Perfect Shuffle Permutation This was advised by Harold Stone (1971). Consider N objects each characterized by n bit number say  X n-1, X n-2, X 0    (N is chosen such that N

List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It depends excellent throughput under high-load conditions. b. Token Ring

NETWORK MANAGEMENT & SECURITY 1. Describe a basic communication model. 2. State the following terms: a. Configuration Management b. Fault Management c. Security Management