Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write notes on Frame Filtering Techniques.
Frame filtering:
The most valuable function performed through bridges is frame filtering. A bridge doesn't forward a frame unless essential. In particular, if a computer attached to individual segment sends a frame to a computer on similar segment, the bridge doesn't require forwarding a copy of the frame to the other segment.
To find out whether to forward a frame, a bridge utilizes the physical address found into the frame headers. While a frame arrives upon a segment, the bridge extracts and checks the destination address. If the bridge determines that the destination computer is attached to a segment over that the frame arrived, the destination will also have obtained a copy of the frame; therefore the bridge can discard a frame without forwarding a copy.
Most bridges are termed as adaptive or learning bridges since they learn the location of a computer automatically. The bridge utilizes the source address to automatically find out the location of the computer which sent a frame, and uses the destination address to find out whether to forward a frame.
Case x, z difference, which is preferable, why? CASEZ : Special version of case statement that uses a Z logic value to signify don't-care bits. CASEX : Special
Define a register. Ans: Register: A register contain a group of flip-flops and gates which effect their transition. The flip flops hold the binary information and the g
What are escape sequences characters? List any six of them. The characters which when used with output functions like printf( ),putc(),put() etc. helps in formatting the outpu
Q. Show MPI functions? MPI comprises hundreds of functions which are a small subset of which is enough for most practical purposes. We will discuss some of them here. Int M
Explain any two methods of implementing interacting processes. Two methods of implementing interacting process are given below: (i) Shared memory solution: In this scheme
Many physicists believe that the universe is governed by a single system. A system which is capable of describing the behaviour of the very large (stars and planets) and the very s
LoadRunner works by making virtual users who take the place of real users operating client software, such as sending requests using the HTTP protocol to IIS or Apache web servers.
Write a program to convert the given Decimal number into its equivalent Binary number.
In a particular exchange during busy hour 1200 calls were offered to a group of trunks, during this time 6 calls were lost. The average call duration being 3 minutes Calculate Traf
Elaborate protected mode memory addressing in brief. Protected mode interrupt: In protected mode, interrupts have exactly the same assignments as in real mode though int
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd