What is b-router, Computer Network Security


B-Router

Hybrid devices that has the features of both routers and bridges. A bridge router or brouter is a network machine that acts as a router and as a bridge. The brouter transfers packets for known protocols and simply gives all other packets as a bridge could. Brouters acts at both the network layer for transferable protocols and at the data link layer for non- transferable protocols. As networks have to become more complex, a mix of non-routable and routable protocols has goes to the need for the combined features of routers and bridges. Brouters access both routable and non-routable features by performing as routers for routable protocols and bridges for non-routable protocols. Bridged protocols may propagate throughout the network, but methods such as learning and filtering might be used to replace potential congestion. Brouters are needed as connecting devices in the networking system machine, so it performs as a bridge in a network and as a router in an internetwork.

 

395_B-router.png

Posted Date: 8/20/2012 2:39:44 AM | Location : United States







Related Discussions:- What is b-router, Assignment Help, Ask Question on What is b-router, Get Answer, Expert's Help, What is b-router Discussions

Write discussion on What is b-router
Your posts are moderated
Related Questions
UDP ENCAPSULATION As given in the figure below, UDP packet is included in IP datagram and the IP datagram is then attached in the Frame.

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

There are various benefits related with providing the security. They are given below,  (i)  Confidentiality/ Privacy (ii)  Integrity  (iii) Availability (iv)Authenticatio

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

which is best algorithm

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to