What is b-router, Computer Network Security

Assignment Help:


B-Router

Hybrid devices that has the features of both routers and bridges. A bridge router or brouter is a network machine that acts as a router and as a bridge. The brouter transfers packets for known protocols and simply gives all other packets as a bridge could. Brouters acts at both the network layer for transferable protocols and at the data link layer for non- transferable protocols. As networks have to become more complex, a mix of non-routable and routable protocols has goes to the need for the combined features of routers and bridges. Brouters access both routable and non-routable features by performing as routers for routable protocols and bridges for non-routable protocols. Bridged protocols may propagate throughout the network, but methods such as learning and filtering might be used to replace potential congestion. Brouters are needed as connecting devices in the networking system machine, so it performs as a bridge in a network and as a router in an internetwork.

 

395_B-router.png


Related Discussions:- What is b-router

Object tracking using wireless sensor networks, This project involves the d...

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Ethernet network, QUESTION : a) A datagram of 3000 bytes has to travel...

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Draw the waveform for an asynchronous transmission, (a) Draw the waveform ...

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Address masks, ADDRESS MASKS To identify receiver, network apply addre...

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

Compare and contrast the trust models-pgp, a. PKI and PGP are two methods f...

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

Internet protocol(ip), Internet Protocol IP Gives computer-to-comp...

Internet Protocol IP Gives computer-to-computer communication. Host and receiver addresses are computers. This is also known machine-to-machine communication.

Media, what is guided media or unguided media

what is guided media or unguided media

Ethical hacking penetration testing, Get a copy of Metasploitable at Make...

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po

Intrusion detection and classification, i want to detec and classify networ...

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

The Security Systems Development Life Cycle (SecSDLCtle.., #Under what circ...

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd