How It Works Bridge In The Network

Computer hardware is a bridge to connect the two networks that work with the same protocol. Unlike the repeater that works on a physical level, bridge works at the logical level (in layer 2 on the OSI model), which means that it can filter frame so that only allows data past the destination address in accordance with the engine located in the the other side of the bridge.

This bridge was used to segment the network, hold frames intended for local area network while the transmission is intended for the other network. This will reduce traffic (and especially the collision) on all the networks, and increasing the level of privacy, information intended for one network cannot hear on the other end. The filtering is done by the bridge can cause a slight delay when going from one network to another, jarinan and this is the reason why the bridge should be carefully placed in the network.

The normal role of A bridge is to send packets between two networks of the same type. A bridge has two connections to two different networks. When a bridge receives a frame on one interface, it analyzes the MAC address of the sender and the recipient. If the bridge does not recognize the sender, he stores the addresses in a table to remember which side the sender chain. In this way, the bridge can see whether the sender and recipient are found on the same side or opposite sides of the bridge. If it's a first disregard the message, bridge; If it's the latter, the bridge sends a frame to another network.

A bridge works at the data link layer of the OSI model, which means that it operates using the physical address of the machine. In fact, the bridge is linked with several local area network, called segments. Bridge creates a table function with the address of the machine ' and the segment they belong to, and the "listening" data runs through the segments. This bridge was used to segment the network, which means that in the diagram shown above, communication between the above three computers will not obstruct the path runs between the three computers at the bottom. Information will only be passed when the computer is on one side of the bridge sends data to your computer.

Popular posts from this blog

Secure Data Transfer with FTP Alternative MFT

The Difference in Access Point and Wireless Router

The Characteristics of Cloud Computing