The 2-Minute Rule for hub
The 2-Minute Rule for hub
Blog Article
Hubs function within a fifty percent-duplex design. The fifty percent-duplex model raises security and privateness fears mainly because it are not able to safeguard or quarantine targeted visitors. It also offers a simple challenge with regard to targeted traffic management: Gadgets on a hub function as a network segment and share a collision domain.
It can't shop the MAC address of your ports along with the location address with the frame that arrived.
Transparent Bridges: These are typically the bridge by which the stations are absolutely unaware of 파라곤 the bridges existence i.