blog




  • Essay / What is the advantage of a switch over a bridge in a network

    1. Bridges and switches operate on the data link layer of the OSI model. However, the switches are more advanced. Discuss the advantage of a switch over a bridge in a network and then further elaborate on the technology implemented in switches to control broadcast domains (500 words). [25 points] There are many reasons why mixers are used instead of bridges. Switches today are more efficient than a bridge when used in a network. Bridges, also called transparent bridges, operate in layer number 2 of the OSI model. This means that bridges have the ability to forward data based on the destination address found in the packet. The destination address of the data packet is also called the MAC address. This physical address is hard-coded into the network card, which means that the MAC address is unique for each computer. Usually, bridges are only used on small networks or in case a repeater must be used. Switches are often used instead of bridges because they offer a higher performance solution that creates fewer problems. Switches are similar to bridges, but typically contain multiple ports. The packet passing through a switch is read to decide which node the data was sent to. In this way, the efficiency lies in the fact that the packets are sent only to the computers that need them. En-route collisions are significantly reduced by using switches instead of bridges in networks. Switches have the ability to create VLANS (Virtual LAN). According to (Pintello, 2013), a VLAN refers to a group of hosts that share a common set of communication requirements and are grouped together through layer 2 of the OSI model. VLANs are also used to secure networks. The switches form one-to-one connections between a...... middle of paper ...... This way it is easy to change the algorithm without having to change the protocol. In conclusion, selecting the right VPN solution for different environments can be a big challenge. It can be difficult to decide which VPN solution fits into a specific network. The most important thing is to know the limits and differences of each protocol used for this purpose. References Forouzan, BA (2013). Data communications and networking. Connect, learn, succeed. Hallberg, B.A. (2013). Networking A Beginner's Guide. McGraw Hill. Lonvick, Y. &. (2006, 01). SSH protocol architecture. Retrieved from IETF: http://www.ietf.org/rfc/rfc4251.txtNieminen, M. (2006, 07). ResearchSecurity. Retrieved from Techtarget: http://searchsecurity.techtarget.com/definition/Transport-Layer-Security-TLSPintello, T. (2013). Introduction to networking with Network+. Wiley.