expand for answer

Bridge Mode

A form of wireless access point deployment that is used to link two wired networks together over a wireless bridged connection.


Similar items:
A wireless network configuration where the wireless access point acts as a connection point to link the wireless clients to the wired network.
[view]
A wireless network that uses a wireless access point to connect wireless clients together, but does not offer any access to a wired network.
[view]
A device that connects two or more physical networks and forwards packets between them. Bridges can usually be made to filter packets, that is, to forward only certain traffic. A network device used to connect networks with different speeds, cable types, or topologies that still use the same protocol. A bridge is a layer 2 device.
[view]
The emerging layer 3 switching technology integrates routing with switching to yield very high routing throughput rates in the millionsofpacketspersecond range. The movement to layer 3 switching is designed to address the downsides of the current generation of layer 2 switches, which are functionally equivalent to bridges. These downsides for a large, flat network include being subject to broadcast storms, spanning tree loops, and address limitations that drove the injection of routers into bridged networks in the late 1980s. Currently, layer 3 switching is represented by a number of approaches in the industry.
[view]
Extent to which protective measures, techniques, and procedures must be applied to information systems and networks based on risk, threat, vulnerability, system interconnectivity considerations, and information assurance needs. Levels of protection are: 1. Basic: information system and networks requiring implementation of standard minimum security countermeasures. 2. Medium: information system and networks requiring layering of additional safeguards above the standard minimum security countermeasures. 3. High: information system and networks requiring the most stringent protection and rigorous security countermeasures.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in