What is b-router, Computer Network Security

Assignment Help:


B-Router

Hybrid devices that has the features of both routers and bridges. A bridge router or brouter is a network machine that acts as a router and as a bridge. The brouter transfers packets for known protocols and simply gives all other packets as a bridge could. Brouters acts at both the network layer for transferable protocols and at the data link layer for non- transferable protocols. As networks have to become more complex, a mix of non-routable and routable protocols has goes to the need for the combined features of routers and bridges. Brouters access both routable and non-routable features by performing as routers for routable protocols and bridges for non-routable protocols. Bridged protocols may propagate throughout the network, but methods such as learning and filtering might be used to replace potential congestion. Brouters are needed as connecting devices in the networking system machine, so it performs as a bridge in a network and as a router in an internetwork.

 

395_B-router.png


Related Discussions:- What is b-router

Ip datagrams, on LAN,where are IP datagrams transported?

on LAN,where are IP datagrams transported?

Explain about security aware protocols, Q. Explain about Security aware pro...

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

Local talk, LOCAL TALK Apple discovered the LAN technology that uses b...

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch

Important network security services, Question: (a) Consider that you en...

Question: (a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1. i. What can be t

Pseudonymous remailers and cypherpunk remailers, Problem (a) As a fore...

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

Classification of networks, Computer networks are defined by four factors w...

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

Vigenere Cipher, What key which if used to encrypt the ciphertext again wou...

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Explain briefly the role of the physical layer, a) Calculate the CRC for th...

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any

Arp responses, ARP RESPONSES Let's search out how does a computer know...

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP

Securing the components-information security, SECURING THE COMPONENTS Co...

SECURING THE COMPONENTS Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd