preview

How Does a Switch Have an Advantage over a Bridge on a Network

Better Essays
Both Bridges and Switches work on the data link layer of the OSI Model. However, switches are more advanced. Discuss how a switch has an advantage over a bridge in a network then elaborate more on the technology implemented in switches to control broadcast domains.

A network switch is a networking device that connects devices together on a network enacting a form of packet switching. It operates in the Data Link layer of the OSI model. It essentially acts like a multi-port network bridge that processes and forwards data. Other types of switches have additional features such as the ability to route packets. Those switches are commonly known as layer-3 or multilayer switches.

The simplest and most common type of switch is the basic switch. It can be called a multiport bridge because it separates a network into multiple collision domains.

Switch in a network

A network Bridge is a device that connects two separate Ethernet networks into one extended network. It works at a logical level which means that it can filter frames so that it only lets data whose destination address corresponds to a machine located on the other connected side of the bridge pass.

It is used to segment a network and hold back frames that are intended for the local area network while transmitting those that are needed to be sent to the other networks. This improves level of privacy since the information intended for one network cannot be listened on the other connected network. It also reduces traffic and collisions on all networks.

A bridge connecting two networks

The difference between a switch and a bridge is that each port on a switch is its own collision domain. A collision domain is formed between any two connected devices via a sw...

... middle of paper ...

...so a trusted method of securing data and used as an internet standard.

 It supports the use of nested tunnels which means that multiple gateways and the tunnels can be encrypted over again.

IPSec is limited by:

 It is very difficult to implement and requires special support in routers.

 There are some problems with different IPSec implementations that do not follow the standard and communicate properly between each other

 TLS/SSL

Secure

References:

Charles M. Kozierok. (2005). DNS Components and General Functions .Available: http://www.tcpipguide.com/free/t_DNSComponentsandGeneralFunctions.htm. Last accessed 1st April 2014.

Kurose, James F. (2012.). Computer networking. 6th ed. Harlow: Pearson Education. 482.

Timothy Pintello (2013). Introduction to Networking with Network1. USA: John Wiley & Sons, Inc. 175-199.
Get Access