Frame filtering, Computer Networking

FRAME FILTERING:

 The very important task a bridge operates is frame filtering. If both the destination and source are on the same segment, it does not repeat the frame to the other code segment. A frame is forwarded to the other code segment, if it id destined to that part. Multicast and broadcast frames are also forwarded.

 A bridge has a list for every segment that consists of physical addresses of the machine attached to that part. In this way a bridge finds on which code segment a destination device is attached.

 As soon as a frame reachs to a bridge, it finds a source address from its header and automatically includes it in the list for that code segment. In this way a bridge creates up address lists. This is given in the figure below:

81_FRAME FILTERING.png

Figure 

 

Posted Date: 10/27/2012 9:12:36 AM | Location : United States







Related Discussions:- Frame filtering, Assignment Help, Ask Question on Frame filtering, Get Answer, Expert's Help, Frame filtering Discussions

Write discussion on Frame filtering
Your posts are moderated
Related Questions
Question : a) Describe the following core components of a cellular based network: i) Cell ii) MSC iii) HLR & VLR iv) PSTN b) Explain why frequency reuse is consi

Describe what is meant by Asymmetric Multiprocessing (AMP)? Ans) It imposses hierarchy and a division of labour between processors. Only one designated processor, the master, co

how to install xp via network

State the difference between Byte streams and message Byte streams and message are different. In a message stream, network keeps track of the message boundaries. In a byte stre

State about the communications network 1) The communications network may only accept blocks of data up to a specific size.   (2) Error control might be more effective with a

DNS spoofing This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the s

Consider figure.  Assume a new flow E is added that takes a path from R1 to R2 to R6. How does the max-min bandwidth allocation change for the 5 flows?

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Networks are more frequently being prepared to allow specification of the quality of service needed by users. For example: - a typical voice telephone call may give a QoS para

Control Flow: Once the client has established a network connection with a server, the server must instantiate a new, empty, BasicEnrollmentManager implementation for this client,