Solved

Fragmentation on a bridge

Posted on 1997-08-31
2
256 Views
Last Modified: 2013-12-23
Dear network gurus,

I got a question related to fragementation (just a bit lazy to find from books):

A -- token ring (4K) -- Bridge -- ethernet (1.5K) --- B
Where A and B sits on the same subnet (I am not interested to replace it with a router). I think a bridge can connect different members of IEEE 802 LAN at the LLC layer. The bridge can be a very smart one, but it should not perfrom a routing job.

1. Is it a valid setup? If no why?
2. If yes, what happens if A sends B a 4K (or close to it) packet when it passes through the bridge? Does it (any well known brand) can perfrom any sort of fragementaion? If yes, how does B can understand and reassemble the fragementation?

Cheers,

Jacky
0
Comment
Question by:jliong
2 Comments
 

Accepted Solution

by:
Doyo earned 50 total points
ID: 1582388
What you've depicted in your question is exactly what a bridge does.  A bridge must know (obviously) what network types it is attached to and, therefore, knows the maximum packet size that the medium allows.  The bridge receives a packet from one interface, determines if it it too big to ship out the other interface and, if so, splits the packet into allowable sizes.  

The bridge does not attempt to put smaller packets back to gether.  It leaves this to the receiving devices.  Since it is part of the MAC layer specifications, any device that connects to the network must know how to re-assemble the split packets before forwarding them "up the stack".

So your proposed setup should run prefectly fine.

Good luck.
0
 

Author Comment

by:jliong
ID: 1582389
Sounds good because I saw similar setup before, but I was not aware of *MAC layer* can be fragmented. Thanks to Doyo.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
2 Gateways (bandwidth) - One domain 7 75
md5 password 3 62
Use of vpn-filter value  in S2S VPN 2 35
Guest Wireless in a Business Environment 6 42
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question