Nobody downloaded yet

Computer Network: Comparison of the Components Functioning of the Repeater, Bridge, Network routers, and Gateway - Assignment Example

Comments (0) Cite this document
Summary
The author of the paper compares and contrasts the functioning of the components of the repeater, bridge, network routers, and gateway. Then the author of the paper examines the sharing and transmitting of the data files to some other attached LAN network…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Computer Network: Comparison of the Components Functioning of the Repeater, Bridge, Network routers, and Gateway
Read TextPreview

Extract of sample "Computer Network: Comparison of the Components Functioning of the Repeater, Bridge, Network routers, and Gateway"

Download file to see previous pages In this way, a repeater can expand the area of a LAN (Forouzan & Fegan, 2003, p.446). In a network, a repeater is used to join two segments. It regenerates and retimes the signals to appropriate amplitudes as well as transmits them to the further segments. However, in case of Ethernet topology, we are almost using a repeater. Since, repeaters need a small amount of time to renew the signal (Tech Interviews, 2004).
A bridge can perform a function in both data link layer as well as a physical layer. As a physical layer device, it creates the signals it receives on the other hand in data link layer; it verifies MAC addresses contained in the frame (Forouzan & Fegan, 2003, p.449). A bridge examines the outermost part of data in the data packet, to inform where the message is reaching. It minimizes the traffic on other segments of the network, as it does not transmit the entire of the data packets. Bridges is able to program to refuse packets from specific networks. The bridge is able to read the Ethernet data that offers the hardware address of the target address, not the network IP address. Bridges promote the entire broadcast messages. Simply a particular bridge is known as Translation Bridge that permits two networks of dissimilar architectures to be linked. Bridges do not generally permit link of networks through dissimilar architectures. The hardware address is as well known as the media access control (or MAC) address. To verify the network segment a media access control address fits in, bridges employs one of (Tutorials Web, n.d) & (YBET IT, 2007):
Transparent Bridging - They construct a bridging table (also known as the table of addresses) as they take delivery of packets. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Network: Comparison of the Components Functioning of the Assignment”, n.d.)
Retrieved de https://studentshare.org/information-technology/1564872-computer-network
(Computer Network: Comparison of the Components Functioning of the Assignment)
https://studentshare.org/information-technology/1564872-computer-network.
“Computer Network: Comparison of the Components Functioning of the Assignment”, n.d. https://studentshare.org/information-technology/1564872-computer-network.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Network: Comparison of the Components Functioning of the Repeater, Bridge, Network routers, and Gateway

Computer Network Security

...or hardware device that filters the information coming through the Internet connection into a private network or a computer system. A firewall enforces an access control policy between two or more networks with two key functions: to block unwanted traffic, and to permit wanted traffic” (Firewall.2007). Similarly, as per network dictionary, Intrusion detection system is defined as “Intrusion detection system (IDS) is a type of security management system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to identify possible...
5 Pages(1250 words)Case Study

Computer Network Security

...are stored in a signature repository. The prime object of a ‘signature based IDS’ is to search signatures in order to detect a threat or vulnerability that is similar to antivirus software that also detects viruses. The functionality includes the detection of attacks that are initiated directly towards the computer network. Conclusion The mission critical systems stores sensitive information, for this reason, not evens a smallest of risk can be left out. Initially, we discussed about the ‘net-centric’ approach to demonstrate an end to end intranet application. Likewise, propagation threats were discussed that can be addressed by System Wide Information Management (SWIM) certification....
4 Pages(1000 words)Essay

Computer system Network Security

...Network Security Network security is essential component as now-a-days information is computers are connected worldwide. Information is wealth for organisations. The computer systems are linked both internally and externally. The computers receive and send unlimited information2. Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network The issue of computer security first arose in the 1970s as individuals began to break... can also...
5 Pages(1250 words)Essay

Computer Network Principles

.... The network design with centralized administration is called a client / server architecture. This architecture is best suited for centralized administration. The same network architecture is deployed in the school premises. 2 Requirements of LAN Design The initial stride will is to classify the requirements. This will include the network devices and functionality for fulfilling the requirements for the school staff. The justification of the selected computing devices and the network equipments is required. The second stride includes the network design. The design will clearly identify, floor connections, office...
10 Pages(2500 words)Essay

Computer and Network Hardware

...Computer and Network Hardware •What are the purpose and functions of each of these? A computer system is a set of components which enable performing the activities. While computer has become ubiquitous, modern internal and external devices are being introduced that have changed the dynamics of the methods through which modern computers are operated. The system is a combination of internal devices, external devices and peripheral devices (Anita,2010). What are the major internal system components?  The internal components constitute the secondary drives, the processing unit, and the mother...
1 Pages(250 words)Assignment

Computer and Network Hardware

...a single computer, you can either configure one PC as an ICS (Internet Connection Sharing) or Proxy server. All the other computers are then configured using Default gateway settings of TCP/IP to access the internet via the Proxy or ICS Computer. References Mail server (MTA, Mail router) (2012). Mail server definition, [online] Retrieved from http://searchsoa.techtarget.com/definition/mail-server [Accessed 25 Jun 2012]. Networking and Integrations Hardware Address (2012). Mini FAQ, [online] Retrieved from http://network.uhmc.sunysb.edu/hdw_addr/brief.html [Accessed 25 Jun 2012]. NRPC name-to-address resolution over TCP/IP (2012). ...
1 Pages(250 words)Assignment

Computer Network

...is peer-to-peer design. But the rapid growth of the company calls for the preparation of the company for further expansion by allowing flexibility. In this regard, the best network design will be a hybrid network. With this setup, account and permission will be required to access file on the server, while at the same time, access to other computers on the network will be shared equally. This will minimize the cost of setting up the network while at the same time bringing in efficiency. The hardware and software explain below are recommended to ensure maximum functioning of the company activities. Client’s Requirements All software and...
5 Pages(1250 words)Essay

Computer Network

... A wireless protocol transmits over a channel 20 MHz wide over a noiseless channel. How many bits/sec can be sent if 64 level digital signals are used? Channel bandwidth = 20 MHz = 20 * 106 Using the Nyquist theorem; C = 2Blog2M C = 2 * 20 *106 * log 264 =240Mbps 2) If a binary signal is sent over a 20 3KHz MHz channel whose signal-to-noise ratio is 40 20 dB, what is the maximum achievable data rate? We know that 10log10S/N = 40dB It follows that S/N = 100 Now from the Shannon theorem; The maximum number of bits per second = H* log2 (1 + S/N) = 20KHz * log2(1+100) Log2(101)= 6,658 = 20 * 6658 =133160 Now from the Nyquist theorem; The maximum number of bits per second = 2 * H * log2V = 2 * 20 * log22 =40 The Nyquist theorem gives...
1 Pages(250 words)Essay

Computer Network

...and solutions. Vehicular Communications, 1(1), 13–21. http://doi.org/10.1016/j.vehcom.2013.11.002 Figueiredo, J. De. (2006). E-Rulemaking: Bringing Data to Theory at the Federal Communications Commission. Duke Law Journal, 55, 969–993. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=918621 Lee, J., Yi, Y., Chong, S., & Jin, Y. (2014). Economics of WiFi offloading: Trading delay for cellular capacity. IEEE Transactions on Wireless Communications, 13(3), 1540–1554. http://doi.org/10.1109/TWC.2014.010214.130949 Niyato, D., & Hossain, E. (2007). Wireless broadband access: WiMax and beyond - Integration of WiMAX and WiFi: Optimal pricing for bandwidth sharing. IEEE Communications Magazine, 45(5), 140–146....
3 Pages(750 words)Essay

Computer network

...Computer Networks Computer Networks Introduction The term computer network is used to refer to a network that is based on the systemof telecommunications and it enables more than one computer to share and transfer data with other computers and this is why it is even recognized as data network. The data is communicated between two or more computers takes place through links of networks which are even recognized as data connections. Computer networks have evolved over the past 65 years and have several...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Computer Network: Comparison of the Components Functioning of the Repeater, Bridge, Network routers, and Gateway for FREE!

Contact Us