Bridging occurs at the data link layer, which controls data flow,
        handles transmission errors, provides physical addressing, and manages access to the
        physical medium. Bridges provide these functions by using various link layer protocols
        that dictate specific flow control, error handling, addressing, and media access
        algorithms. Examples of popular data link layer protocols include Ethernet, Token Ring,
        and FDDI. 
        Upper-layer protocol transparency is a primary advantage of
        bridging. Bridges are not required to examine upper-layer information
        because they operate at the data link layer or Layer 2 of the OSI model. Bridges filter
        network traffic by only looking at the MAC address, not protocols. It is not uncommon for
        a bridge to move protocols and other traffic between two or more network segments. Because
        bridges only look at MAC addresses, they can rapidly forward traffic representing any
        network-layer protocol. To filter or selectively deliver network traffic, a bridge
        builds tables of all MAC addresses located on their directly connected network segments.   
          If data comes along the network media, a bridge compares
        the destination MAC address carried by the data to MAC addresses contained in its tables.
        If the bridge determines that the destination MAC address of the data is from the same
        network segment as the source, it does not forward the data to other segments of the
        network.   -  
          If the
        bridge determines that the destination MAC address of the data is not from the same
        network segment as the source, it forwards the data to the
          appropriate  segment.
            
          -  
          By doing this, bridges can
        significantly reduce the amount of traffic between network segments by eliminating
        unnecessary traffic. View the Figures  
          -   to see how bridges handle local network traffic.
          In contrast, view Figures  
          -   to see how bridges handle non-local network traffic. 
          Bridges are internetworking devices that can be used to
        reduce large collision domains. Collision domains are areas where packets are likely to
        interfere with each other. They do this by dividing the network into smaller segments and
        reducing the amount of traffic that must be passed between the segments. Bridges operate
        at Layer 2 or the data link layer of the OSI model, because they are only concerned with
        MAC addresses. As data is passed along the network on its way to a destination, it is
        picked up and examined by every device on the network including bridges.
          Bridges work best where traffic is low from one segment of
        a network to other segments. When traffic between network segments becomes heavy, bridges
        can become a bottleneck and slow down communication.  
        There is another potential problem with using a bridge.
        Bridges always spread and multiply a special kind of data packet. These data packets occur
        when a device on a network wants to reach another device on the network, but does not know
        the destination address of the device. When this occurs, frequently the source sends out a
        broadcast to all devices on a network. Since
        every device on the network has to pay attention to such broadcasts,
        bridges always forward them. If too many broadcasts are sent out over the network a broadcast storm
        can result. A broadcast storm can cause network time-outs, traffic slowdowns, and the
        network to operate at less than acceptable performance. 
           |