What is b-router, Computer Network Security


B-Router

Hybrid devices that has the features of both routers and bridges. A bridge router or brouter is a network machine that acts as a router and as a bridge. The brouter transfers packets for known protocols and simply gives all other packets as a bridge could. Brouters acts at both the network layer for transferable protocols and at the data link layer for non- transferable protocols. As networks have to become more complex, a mix of non-routable and routable protocols has goes to the need for the combined features of routers and bridges. Brouters access both routable and non-routable features by performing as routers for routable protocols and bridges for non-routable protocols. Bridged protocols may propagate throughout the network, but methods such as learning and filtering might be used to replace potential congestion. Brouters are needed as connecting devices in the networking system machine, so it performs as a bridge in a network and as a router in an internetwork.

 

395_B-router.png

Posted Date: 8/20/2012 2:39:44 AM | Location : United States







Related Discussions:- What is b-router, Assignment Help, Ask Question on What is b-router, Get Answer, Expert's Help, What is b-router Discussions

Write discussion on What is b-router
Your posts are moderated
Related Questions
ROUTING TABLES AND ADDRESS MASKS Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address m

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati

Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the

Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct