THE 2-MINUTE RULE FOR HUB

The 2-Minute Rule for hub

The 2-Minute Rule for hub

Blog Article

Hubs function within a fifty percent-duplex design. The fifty percent-duplex model raises security and privateness fears mainly because it are not able to safeguard or quarantine targeted visitors. It also offers a simple challenge with regard to targeted traffic management: Gadgets on a hub function as a network segment and share a collision domain.

It can't shop the MAC address of your ports along with the location address with the frame that arrived. 

Transparent Bridges: These are typically the bridge by which the stations are absolutely unaware of 파라곤 the bridges existence i.

Report this page