by Dinesh Thakur Category: Communication Networks

Like repeaters, bridges are used to connect similar LANs together, for example, Ethernet-to-Ethernet and operate at the bottom two layers of the OSI model, i.e. physical layer and data link layer. As it operates on second layer of the OSI model,' it relays only necessary data to other signals. MAC addresses (physical addresses) are used to determine whether data is necessary or not.

It passes information from one LAN segment to another based on the destination address of the packet. In other words, when a bridge receives data through one of its ports, it checks the data for a MAC address. If this address matches that of the node connected to other port, the bridge sends this data through this port. This action is called forwarding. If the address does not match with any node connected to other port, the bridge discards it. This action is called filtering. Unlike repeaters, bridges have buffers to store and forward packets in the event that the destination link is congested with traffic.

The main advantage of bridge over repeater is that it has filtering action. If any noise on Ethernet occurs because of collision or disturbance in electrical signal, the bridge will consider it as an incorrectly formed frame and win not forward to the segment connected to other port of the bridge. Note that bridge can relay broadcast packets and packets with unknown destination.

                           Bridge and OSI Reference Model Correspondence

So far, we have seen that at the maximum four repeaters can be used to connect multiple Ethernet segments. However, if a bridge is provided between repeaters, this limit of four is increased. The maximum number of bridges is not specifically limited.

                            Bridged LAN Network

From architecture point of view bridges are protocol independent devices and are very simple. They do not perform complex processes on the data packets traveling through them such as the evaluation of the network as a whole in order to make end-to-end routing decisions. They simply read the destination address of the incoming data packet and forward it along its way to the next link. Therefore, bridges are Inexpensive and fast. There are bridges called cascading bridges, and are used to support multiple LANs connected by multiple media.

Dissimilar LANs such as Ethernet-to-token ring can also be connected with the help of bridge known as encapsulating bridge. The function of encapsulating bridge is also very simple. It encapsulates the originating LAN data along with control information of the end user LAN. Bridges with routing function between LANs are also available.

                     Filtering and Forwarding in Bridged Network

Computer 1 wishes to talk to computer 3 on the same network. The packet sent by computer 1 will contain the physical address of computer 3 that will also be received by the bridge device connecting the two LAN segments. The bridge will read the physical address contained in the packet and observe that this address belongs to the computer on the same LAN segment. Hence, bridge will filter this packet and will not allow it to be transmitted on other side of the network. In case computer 1 wishes to talk with computer C on other segment, the bridge will know from its table of addresses that this address belongs to the computer attached to other segment of the network. In this case this will be forwarded to the other segment of the LAN. The bridge learns location of computers attached the network by watching frames. This will be explained liter on in the subsequent discussion. Note that case of broadcast and multicast packets, bridge forwards these packets to all computers attached to the segment on both sides.

Media Access Control (MAC) Bridge

This is used to connect dissimilar LANs such as Ethernet -to-token ring using encapsulation or translation. This bridge translates the original' packet format from the requesting LAN segment by encapsulating or enveloping with control data specific to the protocol of the destination LAN segment.

Address Table

As explained above, each bridge should have an address table that indicates the location of different computers or nodes on the segments of LAN. More specifically, it indicates the connection between nodes and ports. When a bridge is booted first time, this table is found to be blank. Now, this question arises how this table is filled with appropriate addresses of different nodes attached to ports. Most of the bridges are called adaptive or self-leaning bridges because they learn the location of the node and associated port themselves and make a list of nodes attached to each segment.

When a bridge receives a data packet from a computer, it first copies the physical address of that computer contained in the packet into its list. Afterward, bridge determines whether this packet should be forwarded or not. In other words, the bridge learns the location of the computer on the network as soon as the computer on the network sends some packet.

If a computer does not send a packet, the bridge will never be able to determine its position and unnecessarily forward the packet on network. Fortunately, this cannot happen because a computer with network software attached to a network transmits at least one frame when the system first boots. Furthermore, computer communication being bidirectional, there is always an acknowledgement for each received packets,

Bridge Protocols

Bridge protocols include spanning tree, source routing protocol, and source routing transparent.

Spanning Tree Protocol (STP) Bridge

This is also known as adaptive or self-learning bridges and is defined in IEEE 802.1 standards. It has already been explained in the above section. Ideally, in bridged network, the network tree of the bridge provides only one span (link) for each LAN-to-LAN connection and therefore, no network with bridges can form a loop. Sometimes, looping can occur.

                         Loop in a Bridged Network

A broadcast data packet sent by the computer attached on segment 1can reach to all computers attached on segment 2 and 3 without a connection between segment 1 and 3 .Sometimes, the bridge connection between segment 1and 3 or like is provided to give the network more redundancy. Now, in this case the same broadcast packet sent by the segment 1 will reach to segment 3 by two routes i.e. from segment 1 to 2 to 3 and another by segment 1 to 3. In this manner the computers on segment 3 will receive duplicate packets. In case of large networks some segments may receive many packets and thus cause looping.

A loop, therefore, can cause a broadcast packet or a packet with an unknown destination to circulate through it, thus rendering the network inoperable. This condition is avoided by making some bridges not to forward frames. An algorithm known as distributed spanning tree (DST) accomplishes this task. This algorithm decides which bridge should forward the packets in the network. Under this scheme bridges exchange a control message known as a hello message to select a single transmission route. Remaining bridges maintain a standby position and provide alternate path in case of the same bridge fails in the selected transmission path. Bridge connecting segment 1 and 3 will be active only if the bridge connecting segment 2 and 3 fails otherwise it acts as a standby bridge for network. In other words, bridges that support the spanning tree algorithm have the ability to automatically reconfigure themselves for alternate paths if a network segment fails, thereby improving overall reliability.

IBM Source Routing Protocol (SRP) Bridge

These are programmed with specific routes for each packet based on considerations such as the physical location of the nodes, and the number of bridges involved.

Source Routing Transparent (SRT)

It is defined in theIEEE802.1 standard. It is effectively a combination of STP and SRP. The SRT router can connect LANs by either method, as programmed.

Classification of Bridges

These are classified into local and remote bridges:

 

  • 1. Local bridges are ordinary bridges
  • 2. Remote bridges are used to connect networks that are far from each other. A WAN is generally provided between two bridges.
    • Figure shows the local and remote bridge connection.
    •  Local and Remote Bridge
If you liked this article, you can also catch us on facebook and Google+

Related Articles (You May Also Like)





About Dinesh Thakur

Dinesh ThakurDinesh Thakur holds an B.SC (Computer Science), MCSE, MCDBA, CCNA, CCNP, A+, SCJP certifications. Dinesh authors the hugely popular blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps. For any type of query or something that you think is missing, please feel free to Contact us.



Related Articles