What is b-router, Computer Network Security


B-Router

Hybrid devices that has the features of both routers and bridges. A bridge router or brouter is a network machine that acts as a router and as a bridge. The brouter transfers packets for known protocols and simply gives all other packets as a bridge could. Brouters acts at both the network layer for transferable protocols and at the data link layer for non- transferable protocols. As networks have to become more complex, a mix of non-routable and routable protocols has goes to the need for the combined features of routers and bridges. Brouters access both routable and non-routable features by performing as routers for routable protocols and bridges for non-routable protocols. Bridged protocols may propagate throughout the network, but methods such as learning and filtering might be used to replace potential congestion. Brouters are needed as connecting devices in the networking system machine, so it performs as a bridge in a network and as a router in an internetwork.

 

395_B-router.png

Posted Date: 8/20/2012 2:39:44 AM | Location : United States







Related Discussions:- What is b-router, Assignment Help, Ask Question on What is b-router, Get Answer, Expert's Help, What is b-router Discussions

Write discussion on What is b-router
Your posts are moderated
Related Questions

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

SECURITY ANALYSIS Overview •    Know yourself: examine, identify, and understand the information and systems which are currently in place •    Know the enemy: examine, identify,

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the


Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th


Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

what are the participant of marketing channal?

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w