Different type of networking and internetworking device, Computer Networking

Assignment Help:

What is the different type of networking / internetworking devices?

Repeater:

Also called a regenerator, it is an electronic device that operates only at physical layer. It takes the signal in the network before it becomes weak, regenerates the original bit pattern and gets the refreshed copy back in to the link.

Bridges:

These operate both in the physical and data link layers of LANs of similar type. They separate a larger network in to smaller segments. They have logic that permit them to keep the traffic for each segment separate and therefore are repeaters that relay a frame only the side of the segment having the intended recipient and control congestion.

Routers:

They relay packets between multiple interconnected networks (i.e. LANs of dissimilar type). They operate in the physical, data link and network layers. They had software that enables them to determine which of the various possible paths is the best for a particular transmission. Gateways: They relay packets among networks that have different protocols (e.g. among a LAN and a WAN). They accept a packet formatted for one protocol and change it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.

 


Related Discussions:- Different type of networking and internetworking device

Types of wires, TYPES OF WIRES:  Cable used for wiring would match the...

TYPES OF WIRES:  Cable used for wiring would match the following: The intended speed The distance between computers The amount of noise Anticipated future r

What are the five major network services, What are the five major network s...

What are the five major network services? Major Network Services are: a. File Services b. Message Services c.  Print Services  d.  Application Services e.  Datab

State the example of security audit as case study, State the Example of sec...

State the Example of security audit as case study Linda narrates one of her experience about a security audit. She was performing a spot audit where she was checking certain

Combine subtitution and transposition, how to own cipher to encrypt and dec...

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

CCNA, I WOULD LIKE TO MAKE MY SELF CLEAR WHETHER THIS TYPE OF PROGRAMS ARE ...

I WOULD LIKE TO MAKE MY SELF CLEAR WHETHER THIS TYPE OF PROGRAMS ARE BASED ON COMPLETE SEVER RELATED AND MAINTENANCE OF AN ENTIRE SMALL ENTERPRISE NETWORK.

Enumerate about the star topology, Enumerate about the Star networks C...

Enumerate about the Star networks Comments: 1 - If one connection/station fails the other devices aren't affected 2 - If central hub breaks down, the whole network fail

Division of the address space, The IP class procedure does not split the 32...

The IP class procedure does not split the 32-bit address space into same size class and the classes do not have the same value of networks. A prefix of n bits gives 2n unique ne

Explain the get and set snmp operations, Question 1 Explain the basic comm...

Question 1 Explain the basic communication model with its block diagram Question 2 List and explain the functions of network monitoring Question 3 Explain the get and se

One basic component is the network device, QUESTION 1. A system analyst...

QUESTION 1. A system analyst has to install a particular type of topology in a textile industry. (a) Describe using diagrams the three most common topologies in terms of nod

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd