Frame filtering, Computer Networking

FRAME FILTERING:

 The very important task a bridge operates is frame filtering. If both the destination and source are on the same segment, it does not repeat the frame to the other code segment. A frame is forwarded to the other code segment, if it id destined to that part. Multicast and broadcast frames are also forwarded.

 A bridge has a list for every segment that consists of physical addresses of the machine attached to that part. In this way a bridge finds on which code segment a destination device is attached.

 As soon as a frame reachs to a bridge, it finds a source address from its header and automatically includes it in the list for that code segment. In this way a bridge creates up address lists. This is given in the figure below:

81_FRAME FILTERING.png

Figure 

 

Posted Date: 10/27/2012 9:12:36 AM | Location : United States







Related Discussions:- Frame filtering, Assignment Help, Ask Question on Frame filtering, Get Answer, Expert's Help, Frame filtering Discussions

Write discussion on Frame filtering
Your posts are moderated
Related Questions
Ring: It is a simple linear array where end nodes are associated.  It is equal to a mesh with wrap around connections.  The data transfer in a ring is generally one direction. So,

Error Detecting Code - Parity bit: The general idea for achieving error detection and correction is to add some redundancy (i.e., some extra data) to a message, which receiver

There is no commonly accepted meaning for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

Q. What is Manchester? - Utilizes an inversion at the middle of each bit interval for both synchronization and bit representation - Negative-to-positive represents binary 1

State the types of performance of computer hardware The hardware, i.e., the server or computer has a direct relationship on performance in the following areas: Reliabili


Gigabit Ethernet Data rate of 1000 Mbps or else 1 Gbps Typically implemented as full-duplex with no CSMA/CD 1000Base-X utilizes long-wave optical fiber (1000Base-

DNS spoofing This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the s

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

Write discussion on Associative mapping - computer architecture.