Explain about bridges, Computer Networking


The bridge function is to attach separate homogeneous networks. Bridges map the Ethernet address of the nodes residing on each network segment and allow only essential traffic to pass by the bridge. When a packet is received by the bridge, the bridge verifies the destination and source segments. If the segments are dissimilar, then the packet is "forwarded" to the correct segment. Bridges are also known as "store-and-forward" device because they look at the whole Ethernet packet before making filtering or forwarding decisions.


Posted Date: 8/26/2013 3:37:46 AM | Location : United States

Related Discussions:- Explain about bridges, Assignment Help, Ask Question on Explain about bridges, Get Answer, Expert's Help, Explain about bridges Discussions

Write discussion on Explain about bridges
Your posts are moderated
Related Questions
In this question, we study Nested ESP in AH, that is, we combine ESP with AH. Let's look at the site-to-site VPN scenario shown again in Figure 1. Let's assume that Alice's desktop

What is SAP? Series of interface points that permit other computers to interact with the other layers of network protocol stack is known as SAP.

What are the Communication tools ? Voice mail ? Email ? Fax ? Video conferencing applications

Network Protocols In computer  networks  communication  occurs between  the entities in different  systems an entity  is anything  that is  capable  of sending  or receiving

Question: (a) Show by means of a diagram the Ethernet frame structure and describe the six fields of the Ethernet frame structure. (b) Explain the operation of the Carrier S

Identify the purpose of the TCP three step handshakes Ans) The three step handshake establishes the parameters needed for a TCP connection. During the handshake process series n

QUESTION a) How is an Intranet different from an Internet? b) State the main differences between a router and a switch c) Explain the function of a modem d) Calculate

Full Duplex - Capability for simultaneous data transmission among a sending station and a receiving station. It needs a workstation be attached to a switch, the NIC must support it

Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o