Cycle of bridges, Computer Networking

CYCLE OF BRIDGES:

 A bridges network can join several segments. One bridge is useded to connect every segment to the rest of the bridge network. This is given in the figure below:

 

1125_CYCLE OF BRIDGES.png

DISTRIBUTED SPANNING TREE:

 If a bridge network creates a cycle, then not all bridges on the network have be allowed to forward broadcast packets.

 The bridges configure themselves automatically to select which bridge will forward broadcast frames and which bridge will not forward packets.  The bridges interact with each other on the network and use Distributed Spanning Tree (DST) algorithm to select which bridge will not forward frames if a cycle happens.

Posted Date: 10/27/2012 9:21:56 AM | Location : United States







Related Discussions:- Cycle of bridges, Assignment Help, Ask Question on Cycle of bridges, Get Answer, Expert's Help, Cycle of bridges Discussions

Write discussion on Cycle of bridges
Your posts are moderated
Related Questions
Physical layers defines with synchronizing the 1s and 0s on the wire.

A mobile host (MH) is connected to a WLAN access network that uses MIP for mobility support. Consider that the RTTs between MH and HA are 0.3s while RTTs within a L2 subnet are 80

Q. Explain about Bandwidth – delay product? Bandwidth - delay product - A measure of competence of ARQ system = bandwidth (bits per second) * round-trip delay (in seco

802.11g OFDM a) Uses OFDM with same 2.4 GHz band b) Achieves a 54-Mbps data rate c) Works with same 802.11b equipment

Tools for Digital Sound Sound is the oscillation of pressure that propagates in the form of a wave. Sound waves are transmitted through some medium (solid, liquid, or gas); th


Question 1 Explain GSM digital cellular System model Question 2 Explain cellular Digital Packet Data(CDPD) system with the help of CDPD network reference model Question 3

1.  A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss pena


Process of Securing an Intranet Securing an Intranet is not a simple task. Mere installation of firewall hardware and software would not help the Intranet to protect itself. P