What is Bridge in Computer Network?
A network bridge is an electronic device designed to intelligently connect and filter network traffic between multiple network segments. Unlike simple repeaters that blindly forward all traffic, bridges make intelligent decisions about data transmission based on advanced MAC address learning and filtering techniques.
In this article on what is Bridge in computer network; we will discuss the definition of a bridge, how it works, its functionality, models, advantages and disadvantages.
Table of Contents
- What is Bridge in computer network?
- Functions of bridge
- How does a bridge work?
- Types of bridges
- Model of bridges in computer networks
- Advantages of bridge
- Disadvantages of bridge
What is Bridge in computer network?
A bridge is a network device that connects multiple subnetworks to create a single network. It provides interconnection with other computer networks that use the same protocol. Through a bridge, multiple LANs can be connected to form a larger and extended LAN. This function of creating a single aggregate network from multiple network segments is called network bridging. It works in the data link layer, which is the second network layer in the OSI model.
Functions of Bridges
Now, let us take a look at the functions of bridges:
- Store MAC address in the PC that is used in the network for reducing network traffic.
- Divide local area networks into multiple segments.
- Connects multiple networks to ensure communication between them.
- It connects LAN segments into a single network.
- Recognizes areas where data is to be sent and on which device it will be sent.
- Maintains MAC address table to discover new segments.
- Used in load filtering of network traffic by separating it into segments or packets.
Explore networking courses
How does a bridge work?
The bridge works in the following way:
Best-suited Networking courses for you
Learn Networking with these high-rated online courses
- Physical Configuration and Initialization: The bridge is connected to multiple network segments via physical network interfaces. Each interface operates in promiscuous mode, capturing all incoming network traffic. Interfaces can support different network types (Ethernet, Wi-Fi, etc.). Bridge hardware contains dedicated memory and processing components for packet handling
- MAC Address Learning Mechanism: Bridge maintains a dynamic MAC address table (also called forwarding table or CAM table). Initially, the table is empty. As network traffic flows, the bridge learns source MAC addresses from incoming frames. Each MAC address is mapped to its corresponding network interface. The table has limited memory and it can store upto 8-16k MAC addresses. Entries have a time-to-live (TTL) period which is usually 300 seconds.
- Packet Filtering Process: Each incoming frame is examined at Layer 2 i.e. Data Link Layer. Bridge extracts source and destination MAC addresses. It compares the destination address against MAC address table amd determines appropriate forwarding strategy based on address mapping. It also implements intelligent forwarding to minimize unnecessary network traffic.
- Forwarding Decision Logic: In case, the destination MAC is unknown, the bridge floods the packet to all interfaces. If the destination MAC is on the same interface as source, the packet is filtered. In case, the destination MAC is on a different interface, the packet is selectively forwarded. It maintains low-latency transmission with minimal processing overhead.
- Frame Transmission: It encapsulates the original frame for transmission and adds necessary Layer 2 headers. It calculates and verifies frame checksum as well as manages transmission timing and collision avoidance. It supports full-duplex and half-duplex transmission modes
Types of Bridges in Computer Networks
Following are the different types of bridges that are used:
1. Transparent Bridges
Transparent bridges are used to connect multiple network segments with other bridges to make routing decisions. This bridge fetches the MAC addresses of all nodes and associated ports. The transparent bridge then filters incoming frames with destination MAC addresses on the same port. It then forwards incoming frames to the destination MAC through associates port@. These bridges are very popular and operate in a transparent manner to all networks that are connected to hosts.
2. Source Routing Bridges
Source Routing Bridges decide the route between two hosts. They use the destination MAC address of a frame to direct it through the source routing algorithm. Every station on extended LAN knows about the route over which the frame is sent. These are used in IBM token ring networks. They learn their bridging information from the information that is included in the structure of a packet. Through this method, two similar network segments get connected to the data link layer. This is done in a distributed manner wherever end stations join within the bridging algorithm.
3. Translational Bridges
Translational bridges are used for changing one type of networking system to another. They can connect different types of networks such as Ethernet and Token ring networks. Translation bridges reorder the source and destination address bits while translating between these frame formats. These bridges can add and remove data based on the direction of transmission. They forward the frame of data link layer among LANs using different types of network protocols.
Models of Bridge in Computer Networks
There are two main models of bridging: Local bridging and remote bridging. Let us learn more about them.
1. Local bridging
It is created by connecting LAN switches with local cables. This enables free communication between computers that are connected to virtual hubs and physical LAN to the same ethernet segment. Local bridging is used when LANs in the same geographical location have to communicate at link layer.
2. Remote bridging
It is a model where two bridges are connected through WAN. It is used for bridging LANs when they are in different geographical location and they have to communicate with each other at the link layer.
Advantages of Bridges
Bridges are smart network devices that have the following advantages:
- Improve the performance of bridges by segmenting large busy networks into multiple smaller and interconnected networks.
- Cost-effective as they are simple and inexpensive.
- Increases available bandwidth to individual nodes as lesser network nodes share collision domain.
- Reduces network congestion by dividing LAN into multiple smaller segments.
Disadvantages of Bridges
Like every device, bridges in computer networks also have their limitations.
- Cannot read specific IP addresses.
- Unable to provide a communication network among networks of different protocols.
- Cannot limit the capacity of broadcast messages as they transfer all the messages.
- Unable to handle complicated variable data load.
Conclusion
Bridges are smart networking devices that can be used as repeaters to extend a network. They have many benefits as well as disadvantages. Based on the requirement of your system and network, you should choose a network device that can fulfill them.
FAQs
How does a bridge differ from repeaters and hubs?
Repeaters amplify signals and connect two different network segments, passing data between them. Bridges incorporate the functionality of repeaters but additionally look at the packets to determine whether they should be allowed to pass through. Hubs also connect network segments but are essentially repeaters that can connect more than two segments.
What is the spanning tree protocol (STP)?
Bridges leverage the spanning tree protocol (STP) to decide whether to forward a packet through the bridge and onto a different network segment. STP serves two functions: to determine a main bridge, called a root, which will make all the bridging decisions and deal with all bridging problems, and to prevent bridging loops.
How does a bridge work in a Linux environment?
In Linux, a bridge can be set up using the kernel patches and the brctl utility. The bridging code in Linux decides whether to bridge data or drop it by looking at the MAC address unique to each Network Interface Card (NIC), not by the protocol type. What are the advantages of using bridges? Bridges can dramatically reduce the amount of network traffic on a segment by preventing unnecessary traffic from crossing onto other network segments. They isolate the busy network from lesser busy one, thereby preventing pollution from busy nodes.
What are bridging loops and how can they be avoided?
Bridging loops can occur whenever multiple bridges become confused about the location of devices on the network. The looping problem can be worked around by using the Spanning Tree Algorithm (STA). STA assigns a value to each interface on a bridge, and as the bridge forwards data, the value gets attached to packet. Whenever another bridge detects the data, in case the STA value for the interface is higher than assigned to its interfaces, bridge will not forward the data. It then, eliminates the possibility of a bridging loop.
How does a bridge handle broadcast messages?
Bridges forward broadcast messages to all segments of the network, except the one from which the broadcast originated.
What is the spanning tree protocol, and how does it relate to bridges?
The spanning tree protocol prevents loops in networks with redundant paths. It is crucial for bridges to ensure they don't create network loops.
Can bridges improve network performance?
Yes, bridges can improve network performance by segmenting networks and reducing unnecessary traffic between segments.
Jaya is a writer with an experience of over 5 years in content creation and marketing. Her writing style is versatile since she likes to write as per the requirement of the domain. She has worked on Technology, Fina... Read Full Bio