Bridging versus routing
Introduction
“Routing control protocol is essential in order to dynamically determine the topology of the network and to detect failing links. Bridging control protocols may be used similarly in smaller networks or may be used in combination with routing.” Higginson & Shand (1997). Bridge and routers are applied in computer networking as they both connect two or more interrelated Local Area Networks (LAN) therefore creating an extension of the Local Area Network or a Wide Area Network. Bridges operates on MAC layer addresses and at the data link layer of the Open System Interconnection (OSI) model whereas routers operate on the network control layer - third layer of the OSI model. Since routers do not have the
…show more content…
On occasions where a protocol appears as unrecognizable by the router, the packet is just dropped. Non-routable protocols don’t define any recognized network information in the data packet. Routers are usually included as part of a network switch and can be located on any gateway which includes any point of presence on the internet. Being connected on two or more networks, it sends information packet between terminals based on the current status of the network in which it is connected to.
Bridges connect network of similar protocols thus allowing communication between them. They operate on the second (data link) layer of the open system interconnection (OSI) model. The data link layer frames messages for transmission, establishes and error free communication path, ensures sequence of transmitted data, manages access on channel use and check integrity of received messages.
While routers transmit only the relevant and required data packet to the end destination as required in the LAN, each bridge builds an internal list of addresses of all the terminals attached to the network so as to allow for communication. Every packet is checked against the internal list of the bridge and the information is forwarded if the opposite segment has the destination address or if the bridge doesn’t have the address logged.
Routers have the ability to allow hosts that aren’t practically on the same logical network, to be
3: Network Layer: The use of network layer is switching and routing technologies. It demonstrates logical path and virtual circuits for transferring data from one node to
The OSI (Open System Interconnection) model is a set of specifications that allow computers around the world to openly communicate. It is pivotal to understanding and developing computer to computer communications in a network. Each layer plays a role in the process of sending and receiving data. The application layer is the top layer (layer seven) it promotes communication between programs and lower-layer network services. The services at this layer allow the network to decipher a program's request and the program to decipher data sent from the network. The Application layer protocols, programs handles formatting, procedure, security, synchronization, and any other requirements with the network. The Presentation Layer (layer 6) acts as a translator. For instance these protocols decode the jpg/jpeg files sent within the Web server’s HTTP response. So, in the last step (the Application layer) we enter the Web address and it took us to the Web site. This step allows us to see the images and content of the site. The Session Layer (layer 5) regulates and controls the communication between two nodes on the network. It is an ongoing exchange of data between the two and keeps the connection between them for the duration. It keeps the communication secure, detects whether or not the communication has been cut off and if it has it determines where to restart the
Bridge is a simple device that aids in interconnecting similar LAN's between local area networks that use identical protocols for the physical and data link layers in accordance with the IEEE 802.3 standards. As the devices connected to the bridge use the same protocols, the amount of processing required is minimal. Nowadays, routers are used more commonly to interconnect LAN’s as bridges are Layer 2 devices and pose almost no security while the router is a Layer 3 device and offers better Data Security.
Routers will have firewalls on them checking whether or not the information coming onto the network is allowed.
Router is a device for networking that sends packets of data between the networks of a computer. The packet of data is forwarded to routers of the networks that contain the internetwork until the packet is at the destination node. A router can be linked to several data lines from various systems. The router reads the address information in the packet to establish the ultimate destination when the data packet is in any data lines (Liu, 2012).
the routing protocol is simply flooding, S will broadest the data packets and then these data packets are rebroadcasted by every neighbor of S, and
The OSI Model is a model is used to define how data is theoretically passed on a network. Each layer is responsible and has its own duties for a network. The name of layer 3 in the OSI is the Network Layer. This layer is responsible for creating the paths for the transmission of data across the network. This layer provides routing and switching capabilities, as well as, internetworking, congestion control, and packet sequencing (Beal, 1999).
As we all know, the growth of computer networks continues to rapidly grow. The digital revolution has changed the way we work and communicate almost beyond recognition. Provided that, foreseeing the changes and potential compatibility problems, in the mid nineteen eighties, the international standard organization (ISO) developed a networking reference model to standardize how network systems communicate with each other. It is a logical model for how network systems are supposed to communicate with each other. It breaks down the different components of the network communication and puts them into layers which reduce complexity. This reference model consists of seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, and the Physical Layer. Each layer provides a service to the layer above it in the protocol specification and then communicates with the same layer’s software or hardware on other computers. It's important to realize, that these layers are separated into 2 sets: Transportation Set (Laters 1- 4) and Application Set (Layers 5 – 7). More importantly, the OSI model is 7 logical
To reduce the risk of these types of attacks, routers should be hardened, packet filtering controls should be used and routing information should be controlled.
Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart ports with the ability to locate the address on the network.
6. Why is Ethernet technology more appealing to users than the rest of the LAN technologies?
Router segments the network. The Router will not allow broadcasting of data to another network, particularly if the IP address is not from the outside network where the source node belongs. If the destination is not part of the same network where the source node is located then the router directly connected to it will analyze the packet
The purpose of this paper is to provide a better understanding of switching and routing used in a network environment and familiarize the reader with various hardware and software associated with there functions. This paper will look at some switching concepts that will include store and forward switching, cut through switching, fragment free switching, and V-Lan. This paper will also cover routing concepts, along with some comparisons including routed vs. routing protocols, Classful vs. classless protocols, and distance vector vs. link state protocols.
The two TCP/IP transport layer protocols (TCP and UDP), are very crucial for the smooth operation of network services for both the computer applications and application layer protocols such as HTTP, FTP, SMTP and Telnet. These two transport layer protocols TCP and UDP execute these services via the employment of IP. They use IP in the efficient routing of packets to their respective destination networks (Steinke,2001).The TCP is further noted by Steinke (2001) to be responsible for the provision of a reliable and yet connection-oriented byte-stream packet delivery while its counterpart UDP is noted to be responsible for the provision of a connectionless but rather unreliable packet delivery. In this paper we explain the work of the two TCP/IP transport layer protocols (TCP and UDP). In addition, describe how TCP and UDP manage key functions such as reliability, port addressing, and segmentation.
All the computers, in the logically and physically networks have to follow the same rules known as Protocols such as TCP/IP, IPX/SPX and NETBEUI etc. Today, there are many computer networking technologies such as LAN, MAN, WAN, WLAN, ISDN, ATM, Frame Relay, X.25, Bluetooth,