Define bridges, Computer Network Security

 

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the traffic for every segment separate and thus are repeaters that transfer a frame only the side of the segment having the control congestion and intended recipient.

 

447_bridge.png

Posted Date: 8/20/2012 2:51:07 AM | Location : United States







Related Discussions:- Define bridges, Assignment Help, Ask Question on Define bridges, Get Answer, Expert's Help, Define bridges Discussions

Write discussion on Define bridges
Your posts are moderated
Related Questions
Question : (a) What is an IDS and what is the basic problem it faces which can be solved by Artificial Intelligence. (b) Identify and describe briefly an Artificial Intell

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

Normal 0 false false false EN-US X-NONE X-NONE

TRAP AND TRACE SYSTEMS Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The dr

Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite