Recent from talks
Nothing was collected or created yet.
Network bridge
View on Wikipedia

A network bridge is a computer networking device that creates a single, aggregate network from multiple communication networks or network segments. This function is called network bridging.[1] Bridging is distinct from routing. Routing allows multiple networks to communicate independently and yet remain separate, whereas bridging connects two separate networks as if they were a single network.[2] In the OSI model, bridging is performed in the data link layer (layer 2).[3] If one or more segments of the bridged network are wireless, the device is known as a wireless bridge.
The main types of network bridging technologies are simple bridging, multiport bridging, and learning or transparent bridging.[4][5]
Transparent bridging
[edit]Transparent bridging uses a table called the forwarding information base to control the forwarding of frames between network segments. The table starts empty and entries are added as the bridge receives frames. If a destination address entry is not found in the table, the frame is forwarded to all other ports of the bridge, flooding the frame to all segments except the one from which it was received. By means of these flooded frames, a host on the destination network will respond and a forwarding database entry will be created. Both source and destination addresses are used in this process: source addresses are recorded in entries in the table, while destination addresses are looked up in the table and matched to the proper segment to send the frame to.[6] Digital Equipment Corporation (DEC) originally developed the technology in 1983[7] and introduced the LANBridge 100 that implemented it in 1986. [8]
In the context of a two-port bridge, the forwarding information base can be seen as a filtering database. A bridge reads a frame's destination address and decides to either forward or filter. If the bridge determines that the destination host is on another segment on the network, it forwards the frame to that segment. If the destination address belongs to the same segment as the source address, the bridge filters the frame, preventing it from reaching the other network where it is not needed.
Transparent bridging can also operate over devices with more than two ports. As an example, consider a bridge connected to three hosts, A, B, and C. The bridge has three ports. A is connected to bridge port 1, B is connected to bridge port 2, C is connected to bridge port 3. A sends a frame addressed to B to the bridge. The bridge examines the source address of the frame and creates an address and port number entry for host A in its forwarding table. The bridge examines the destination address of the frame and does not find it in its forwarding table so it floods (broadcasts) it to all other ports: 2 and 3. The frame is received by hosts B and C. Host C examines the destination address and ignores the frame as it does not match with its address. Host B recognizes a destination address match and generates a response to A. On the return path, the bridge adds an address and port number entry for B to its forwarding table. The bridge already has A's address in its forwarding table so it forwards the response only to port 1. Host C or any other hosts on port 3 are not burdened with the response. Two-way communication is now possible between A and B without any further flooding to the network. Now, if A sends a frame addressed to C, the same procedure will be used, but this time the bridge will not create a new forwarding-table entry for A's address/port because it has already done so.
Bridging is called transparent when the frame format and its addressing aren't changed substantially. Non-transparent bridging is required especially when the frame addressing schemes on both sides of a bridge are not compatible with each other, e.g. between ARCNET with local addressing and Ethernet using IEEE MAC addresses, requiring translation. However, most often such incompatible networks are routed in between, not bridged.
Simple bridging
[edit]A simple bridge connects two network segments, typically by operating transparently and deciding on a frame-by-frame basis whether or not to forward from one network to the other. A store and forward technique is typically used so, as part of forwarding, the frame integrity is verified on the source network and CSMA/CD delays are accommodated on the destination network. In contrast to repeaters which simply extend the maximum span of a segment, bridges only forward frames that are required to cross the bridge. Additionally, bridges reduce collisions by creating a separate collision domain on either side of the bridge.
Multiport bridging
[edit]A multiport bridge connects multiple networks and operates transparently to decide on a frame-by-frame basis whether to forward traffic. Additionally, a multiport bridge must decide where to forward traffic. Like the simple bridge, a multiport bridge typically uses store and forward operation. The multiport bridge function serves as the basis for network switches.
Implementation
[edit]The forwarding information base stored in content-addressable memory (CAM) is initially empty. For each received Ethernet frame the switch learns from the frame's source MAC address and adds this together with an interface identifier to the forwarding information base. The switch then forwards the frame to the interface found in the CAM based on the frame's destination MAC address. If the destination address is unknown the switch sends the frame out on all interfaces (except the ingress interface). This behavior is called unicast flooding.
Forwarding
[edit]Once a bridge learns the addresses of its connected nodes, it forwards data link layer frames using a layer-2 forwarding method. There are four forwarding methods a bridge can use, of which the second through fourth methods were performance-increasing methods when used on switch products with the same input and output port bandwidths:
- Store and forward: the switch buffers and verifies each frame before forwarding it; a frame is received in its entirety before it is forwarded.
- Cut through: the switch starts forwarding after the frame's destination address is received. There is no error checking with this method. When the outgoing port is busy at the time, the switch falls back to store-and-forward operation. Also, when the egress port is running at a faster data rate than the ingress port, store-and-forward is usually used.
- Fragment free: a method that attempts to retain the benefits of both store and forward and cut through. Fragment free checks the first 64 bytes of the frame, where addressing information is stored. According to Ethernet specifications, collisions should be detected during the first 64 bytes of the frame, so frame transmissions that are aborted because of a collision will not be forwarded. Error checking of the actual data in the packet is left for the end device.
- Adaptive switching: a method of automatically selecting between the other three modes.[9][10]
Bridge loops
[edit]If network bridges are connected in a way that forms redundant paths or mesh loops, broadcast frames loop through the network indefinitely, bringing it to a halt. This situation must be mitigated using a spanning tree protocol or a more intelligent forwarding algorithm like Shortest Path Bridging or TRILL.
Spanning tree protocol
[edit]A spanning tree protocol is a distributed algorithm that organizes active ports in way to form a spanning tree, where there is only one usable path between any two nodes.
Shortest Path Bridging
[edit]Shortest Path Bridging (SPB), specified in the IEEE 802.1aq standard and based on Dijkstra's algorithm, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing.[11][12][13] It is a proposed replacement for Spanning Tree Protocol which blocks any redundant paths that could result in a switching loop. SPB allows all paths to be active with multiple equal-cost paths. SPB also increases the number of VLANs allowed on a layer-2 network.[14]
TRILL (Transparent Interconnection of Lots of Links) is the successor to Spanning Tree Protocol, both having been created by the same person, Radia Perlman. The catalyst for TRILL was an event at Beth Israel Deaconess Medical Center which began on 13 November 2002.[15][16] The concept of Rbridges[17] [sic] was first proposed to the Institute of Electrical and Electronics Engineers in the year 2004,[18] who in 2005[19] rejected what came to be known as TRILL, and in the years 2006 through 2012[20] devised an incompatible variation known as Shortest Path Bridging.
See also
[edit]- Audio Video Bridging – Specifications for synchronized, low-latency streaming
- IEEE 802.1D – Standard which includes bridging, Spanning Tree Protocol and others
- IEEE 802.1Q – IEEE networking standard supporting VLANs
- IEEE 802.1ah-2008 – Standard for bridging over a provider's network
- Promiscuous mode – Network interface controller mode that eavesdrops on messages intended for others
References
[edit]- ^ "Traffic regulators: Network interfaces, hubs, switches, bridges, routers, and firewalls" (PDF). Cisco Systems. September 14, 1999. Archived from the original (PDF) on May 31, 2013. Retrieved July 27, 2012.
- ^ "What is a Network Switch vs. a Router?". Cisco Systems. Retrieved July 27, 2012.
- ^ Decker, Eric B.; Langille, Paul; McCloghrie, Keith; Rijsinghani, Anil (July 14, 1989). "RFC 1286 - Definitions of Managed Objects for Bridges". Tools.ietf.org. Retrieved October 19, 2013.
- ^ "Local Area Networks: Internetworking". manipalitdubai.com. Archived from the original (PowerPoint) on May 13, 2014. Retrieved December 2, 2012.
- ^ "Bridging Protocols Overview" (PowerPoint). iol.unh.edu. Retrieved December 2, 2012.
- ^ "Transparent Bridging". Cisco Systems, Inc. Archived from the original on November 21, 2015. Retrieved June 20, 2010.
- ^ US 4597078, "Bridge circuit for interconnecting networks"
- ^ "How Engineers at Digital Equipment Corp. Saved Ethernet". IEEE Spectrum. April 7, 2024. Retrieved April 10, 2024.
- ^ Dong, Jielin (2007). Network Dictionary. Javvin Technologies Inc. p. 23. ISBN 9781602670006. Retrieved June 25, 2016.
- ^ "Cray makes its Ethernet switches responsive to net conditions". IDG Network World Inc. July 1, 1996. Retrieved June 25, 2016.
- ^ "Alcatel-Lucent, Avaya, Huawei, Solana and Spirent Showcase Shortest Path Bridging Interoperability". Huawei. September 7, 2011. Retrieved September 11, 2011.
- ^ Luo, Zhen; Suh, Changjin (March 3, 2011). "An improved shortest path bridging protocol for Ethernet backbone network". The International Conference on Information Networking 2011 (ICOIN2011). IEEE Xplore. pp. 148–153. doi:10.1109/ICOIN.2011.5723169. ISBN 978-1-61284-661-3. ISSN 1976-7684. S2CID 11193141.
- ^ "Lab Testing Summary Report; Data Center Configuration with SPB" (PDF). Miercom. September 2011. Retrieved December 25, 2011.
- ^
Shuang Yu. "IEEE approves new IEEE 802.1aq™ Shortest path bridging". IEEE Standards Association. Archived from the original on May 14, 2013. Retrieved June 19, 2012.
Using the IEEE's next-generation VLAN, called a Service Interface Identifier (I-SID), it is capable of supporting 16 million unique services compared to the VLAN limit of four thousand.
- ^ "All Systems Down" (PDF). cio.com. IDG Communications, Inc. Archived from the original (PDF) on September 23, 2020. Retrieved January 9, 2022.
- ^ "All Systems Down". cio.com. IDG Communications, Inc. Archived from the original on January 9, 2022. Retrieved January 9, 2022.
- ^ "Rbridges: Transparent Routing" (PDF). courses.cs.washington.edu. Radia Perlman, Sun Microsystems Laboratories. Archived from the original (PDF) on January 9, 2022. Retrieved January 9, 2022.
- ^ "Rbridges: Transparent Routing". researchgate.net. Radia Perlman, Sun Microsystems; Donald Eastlake 3rd, Motorola.
- ^ "TRILL Tutorial" (PDF). postel.org. Donald E. Eastlake 3rd, Huawei. Archived from the original (PDF) on March 29, 2023. Retrieved January 10, 2022.
- ^ "IEEE 802.1: 802.1aq - Shortest Path Bridging". ieee802.org. Institute of Electrical and Electronics Engineers.
Network bridge
View on GrokipediaFundamentals
Definition and Purpose
A network bridge is a networking device that operates at the data link layer (Layer 2 of the OSI model), interconnecting multiple local area network (LAN) segments below the Media Access Control (MAC) service boundary to form a single broadcast domain while filtering traffic based on MAC addresses.[7][8] This architecture enables transparent communication between end stations on distinct LANs, as if they were connected to the same physical medium, ensuring compatibility with logical link control (LLC) and higher-layer protocols.[7] The primary purpose of a network bridge is to extend LANs by linking separate segments, such as Ethernet networks, to improve performance through selective frame forwarding and reduce collisions by segmenting traffic without requiring Layer 3 routing.[9][10] In early Ethernet deployments, bridges connected multiple coaxial or twisted-pair segments to expand network coverage beyond single-segment limitations, allowing devices to share resources efficiently while maintaining a unified logical topology.[11] By filtering unnecessary broadcasts and unicasts, bridges enhance throughput in shared-medium environments like CSMA/CD networks.[9] Fundamentally, a network bridge features two or more network interfaces for segment attachment, a MAC address table (forwarding database) that dynamically maps addresses to ports, and filtering/forwarding logic to inspect and direct frames based on destination addresses.[10][12] Key benefits include higher bandwidth utilization via reduced unnecessary traffic across segments, easier management than repeaters or hubs—which indiscriminately propagate all signals—and the division of networks into separate collision domains to minimize contention and retransmissions.[13][9] Modern switches evolved from bridges as multi-port variants, offering scaled connectivity for denser LANs.[8]Historical Development
Network bridges emerged in the mid-1980s as a solution to the limitations of early Ethernet local area networks (LANs), particularly the constraints on network diameter and collision domains imposed by the carrier-sense multiple access with collision detection (CSMA/CD) protocol. Developed primarily by engineers at Digital Equipment Corporation (DEC), the technology addressed the need to interconnect multiple Ethernet segments without the performance penalties of repeaters or the complexity of routers. The first prototype bridge was created around 1980 by Mark Kempf at DEC's Advanced Development Group, using a Motorola 68000 processor and AMD Lance Ethernet chips to enable store-and-forward packet filtering based on 48-bit MAC addresses.[6] Commercial deployment followed shortly, with DEC introducing the LAN Bridge 100 in 1986 as the world's first Ethernet bridge, capable of extending LANs beyond the 2.5 km limit while reducing collisions.[14][3] Companies like 3Com, through its 1987 acquisition of Bridge Communications, also contributed to early Ethernet bridging innovations, focusing on hardware for interconnecting PC networks.[15] A pivotal milestone in 1985 was the invention of the Spanning Tree Protocol (STP) by Radia Perlman at DEC, which prevented loops in bridged networks by dynamically selecting a loop-free topology using a distributed algorithm. This algorithm, detailed in Perlman's seminal paper, allowed bridges to exchange bridge protocol data units (BPDUs) to elect a root bridge and block redundant paths, enabling reliable expansion of Ethernet LANs. STP was first implemented in DEC's two-port Ethernet bridge, transforming bridging from a simple interconnect into a robust protocol for larger topologies. By the late 1980s, bridges evolved from basic two-port devices to multiport configurations, supporting greater scalability as LANs grew in enterprise environments.[16] Standardization efforts began in the late 1980s under the IEEE 802.1 working group, culminating in IEEE 802.1D-1990, which defined the MAC Bridge standard incorporating STP for interoperability across vendors. This standard formalized address learning, forwarding, and loop prevention, influencing bridge designs globally. In the 1990s, the distinction between bridges and switches blurred as multiport bridges with ASIC-based forwarding became prevalent, rebranded as "Ethernet switches" to emphasize higher port densities and performance; by the mid-1990s, switches had largely supplanted traditional bridges in commercial use.[17] Subsequent updates enhanced STP's efficiency, with IEEE 802.1w-2001 introducing Rapid Spanning Tree Protocol (RSTP) to reduce convergence times from 30-50 seconds to under 10 seconds through faster BPDU handling and role-based port states. In the 2010s and 2020s, bridging concepts extended to virtual environments via software-defined networking (SDN) and cloud computing, where virtual bridges like Open vSwitch enable overlay networks in hypervisors and data centers, supporting scalable, programmable LANs in multi-tenant clouds. This evolution maintains bridges' core role in segmenting traffic and preventing loops amid the shift to virtualized infrastructures.Types of Bridges
Transparent Bridges
Transparent bridges, also known as learning bridges, are network devices that interconnect local area network (LAN) segments by forwarding frames based on dynamically learned media access control (MAC) addresses, operating without requiring explicit configuration or awareness from end hosts or routers.[18] This transparency ensures that the bridge appears invisible to the network, as defined in the IEEE 802.1D standard for MAC bridges.[19] They function at the data link layer (Layer 2 of the OSI model), filtering traffic to reduce unnecessary broadcasts while maintaining a single broadcast domain across connected segments.[18] The primary mechanism of transparent bridges relies on self-learning, where the device examines the source MAC address of each incoming frame and records it in a forwarding table (also called a filtering database) along with the receiving port.[18] If the destination MAC address matches an entry in the table, the frame is forwarded only to the associated port; otherwise, for unknown unicast destinations or broadcasts, the frame is flooded to all other ports except the source to ensure delivery.[18] To handle network changes such as device mobility, entries in the forwarding table age out and are removed after a period of inactivity, typically 300 seconds by default.[18] Transparent bridges come in simple and multiport variants to suit different scales. Simple bridges link exactly two network segments, using basic logic to forward or filter frames between them, which was common in early implementations to extend limited-distance Ethernet cabling.[18] Multiport variants, supporting more than two ports, employ an internal switching fabric to manage traffic across multiple segments simultaneously, enabling efficient connectivity in larger topologies without altering the transparent operation.[18] A key advantage of transparent bridges is their plug-and-play simplicity, allowing seamless integration into existing networks to segment traffic, reduce collisions, and improve performance without reconfiguration.[18] However, this ease comes with the disadvantage of vulnerability to loops in redundant topologies, potentially causing broadcast storms that propagate indefinitely and degrade network stability unless mitigated by protocols like Spanning Tree.[18] Developed by Digital Equipment Corporation in the early 1980s, transparent bridges were essential for expanding early Ethernet networks beyond single collision domains.[20] They continue to find use in small-scale, low-complexity environments or legacy systems where advanced routing is unnecessary.[18]Source-Route Bridges
Source-route bridges are designed for Token Ring networks, as specified in IEEE 802.5, where the sending station determines and includes the route through the network in the frame's Routing Information Field (RIF).[21] Unlike transparent bridges, which learn addresses dynamically without host involvement, source-route bridges rely on the source device to discover paths via test frames (e.g., explorer frames) that bridges append route descriptors to during propagation. The source then selects and embeds the route in subsequent data frames' RIF, guiding bridges to forward frames along the specified path across multiple interconnected rings.[21] This mechanism supports up to 14 hops (rings) and handles loop prevention inherently through route specification, though it requires more overhead from the RIF (up to 18 bytes) and source computation. Developed by IBM in the 1980s for expanding Token Ring LANs, source-route bridging was widely used in enterprise environments until Ethernet's dominance in the 1990s. Variants like source-route transparent (SRT) bridges combine elements of source-routing for Token Ring with transparent learning for other media. With Token Ring's obsolescence, source-route bridges are now legacy technology.[21]Translation Bridges
Translation bridges are specialized network devices designed to interconnect dissimilar local area networks (LANs) that employ different protocols or media access methods, such as Ethernet and Token Ring or Fiber Distributed Data Interface (FDDI). Unlike standard bridges that operate within homogeneous environments, translation bridges perform protocol and frame translations to enable communication between incompatible network architectures. This allows devices on one network type to exchange data with those on another, effectively extending the reach of legacy or diverse systems.[22] The primary functions of translation bridges include frame format conversion, encapsulation and decapsulation of data packets, and handling discrepancies in addressing schemes. For instance, when bridging Ethernet to Token Ring, the device converts Ethernet frames (using IEEE 802.3 or Ethernet II formats) into Token Ring frames by reordering the 48-bit MAC addresses—Ethernet transmits bits in little-endian order (low-order bit first), while Token Ring uses big-endian order (high-order bit first)—and adjusting header fields like source routing information fields (RIF), which have no direct Ethernet equivalent and are thus stripped or cached for return traffic. Encapsulation involves wrapping non-routable protocol data (e.g., NetBIOS or LAT) into compatible formats, such as converting Ethernet Type II frames to Token Ring SNAP encapsulation, while decapsulation reverses the process on inbound traffic. These operations ensure seamless data flow but require careful management of maximum transmission unit (MTU) sizes, often limited to 1,500 bytes to match Ethernet constraints.[23][22] Translation bridges gained prominence in the 1990s amid heterogeneous enterprise environments where multiple LAN technologies coexisted, particularly in IBM-dominated networks. Vendors like Cisco developed solutions such as Ethernet-to-Token Ring bridges and FDDI translational bridges to support migrations and integrations; for example, Cisco's 1992 FDDI interface update enabled translational transparent bridging for VAX environments, allowing routable protocols to traverse while converting non-routable ones. These devices were essential for connecting Token Ring-based mainframes to emerging Ethernet segments, facilitating protocols like SNA over mixed media. However, their complexity arose from reconciling divergent media access controls—Ethernet's carrier-sense multiple access with collision detection (CSMA/CD) versus Token Ring's token-passing mechanism—often restricting support to non-routable protocols to avoid routing indicator conflicts.[24][22] A key limitation of translation bridges is the added latency from frame reformatting and address manipulations, which can degrade performance in high-throughput scenarios compared to native bridging. This processing overhead, combined with the rise of cost-effective Gigabit Ethernet in the late 1990s and early 2000s, contributed to their obsolescence as Ethernet achieved dominance, rendering Token Ring and FDDI largely extinct by the mid-2000s.[22][25] Translation bridges are now primarily of historical interest, though similar translation functions appear in modern media converters for legacy network integrations.Wireless Bridges
Wireless bridges, particularly WiFi-to-Ethernet bridges, are network devices that connect wireless local area networks (WLANs) based on the IEEE 802.11 standards to wired Ethernet segments. They operate as a type of transparent bridge at the data link layer (Layer 2 of the OSI model), dynamically learning and forwarding frames between the wireless and wired media to extend LAN connectivity while appearing invisible to end hosts. These bridges do not require additional drivers on connected wired devices, enabling plug-and-play integration for providing wired access to wireless networks or vice versa.[26][27] Point-to-point Wi-Fi bridges, a subtype of wireless bridges, provide distinct advantages over traditional Wi-Fi repeaters, particularly in terms of performance and reliability. They deliver more stable and faster connections by avoiding the speed degradation inherent in repeaters, which retransmit signals on the same channel, effectively halving throughput with each hop. In contrast, point-to-point bridges use directional antennas to focus the signal into a concentrated beam, enabling reliable links over distances of 50 meters or more without midway performance loss, even in the presence of light obstacles. This line-of-sight approach ensures high reliability, often exceeding 99.99%, and supports speeds over 300 Mbps at extended ranges.[28][29][30]Operational Principles
Address Learning and Forwarding
Network bridges employ a dynamic learning process to build their filtering database, also known as the content-addressable memory (CAM) table, by examining the source media access control (MAC) address in each incoming frame. Upon receipt of a frame on an ingress port, the bridge checks if the source MAC address is an individual address and the port is in the learning or forwarding state; if so, it creates or updates a dynamic entry associating that MAC address with the ingress port, provided no conflicting static entry exists and the database has sufficient capacity.[31] This process excludes group addresses and source-routed frames, as their paths may not align with the network topology.[31] The filtering database size varies by implementation but typically supports 1,000 to 64,000 entries to accommodate medium-sized networks. Forwarding decisions in bridges are based on the destination MAC address in the frame header, using the filtering database to determine the appropriate egress port. For a known unicast destination, the frame is forwarded only to the specific port associated with that MAC address in the database.[32] If the destination MAC address is unknown (not present in the database), or if the frame is a broadcast or multicast, the bridge floods the frame to all other ports except the ingress port to ensure delivery.[31] Additionally, if the destination port matches the ingress port—indicating the frame is destined for a host on the same segment—the bridge filters (drops) the frame to prevent unnecessary transmission and reduce traffic.[32] The core decision logic for frame handling can be represented in the following pseudocode, derived from standard bridge operations:Upon receiving a frame with source MAC S, destination MAC D, on ingress port P:
1. Learning:
if S is individual address and P is in learning/forwarding state:
if no static entry for S and database not full:
update dynamic entry: FDB[S] = P
(or overwrite if existing dynamic entry)
2. Forwarding and Filtering:
if frame is source-routed or invalid: drop
else if D is known in FDB:
Q = FDB[D]
if Q != P: // Not same segment
forward frame to Q
else:
filter (drop) frame
else if D is broadcast or multicast (group address):
for each port R != P in forwarding state:
forward frame to R
else: // Unknown unicast
for each port R != P in forwarding state:
forward frame to R
Upon receiving a frame with source MAC S, destination MAC D, on ingress port P:
1. Learning:
if S is individual address and P is in learning/forwarding state:
if no static entry for S and database not full:
update dynamic entry: FDB[S] = P
(or overwrite if existing dynamic entry)
2. Forwarding and Filtering:
if frame is source-routed or invalid: drop
else if D is known in FDB:
Q = FDB[D]
if Q != P: // Not same segment
forward frame to Q
else:
filter (drop) frame
else if D is broadcast or multicast (group address):
for each port R != P in forwarding state:
forward frame to R
else: // Unknown unicast
for each port R != P in forwarding state:
forward frame to R
