Bridging occurs at the data link layer, which controls data flow,
handles transmission errors, provides physical addressing, and manages access to the
physical medium. Bridges provide these functions by using various link layer protocols
that dictate specific flow control, error handling, addressing, and media access
algorithms. Examples of popular data link layer protocols include Ethernet, Token Ring,
and FDDI.
Upper-layer protocol transparency is a primary advantage of
bridging. Bridges are not required to examine upper-layer information
because they operate at the data link layer or Layer 2 of the OSI model. Bridges filter
network traffic by only looking at the MAC address, not protocols. It is not uncommon for
a bridge to move protocols and other traffic between two or more network segments. Because
bridges only look at MAC addresses, they can rapidly forward traffic representing any
network-layer protocol. To filter or selectively deliver network traffic, a bridge
builds tables of all MAC addresses located on their directly connected network segments. 
If data comes along the network media, a bridge compares
the destination MAC address carried by the data to MAC addresses contained in its tables.
If the bridge determines that the destination MAC address of the data is from the same
network segment as the source, it does not forward the data to other segments of the
network. -
If the
bridge determines that the destination MAC address of the data is not from the same
network segment as the source, it forwards the data to the
appropriate segment.
-
By doing this, bridges can
significantly reduce the amount of traffic between network segments by eliminating
unnecessary traffic. View the Figures
- to see how bridges handle local network traffic.
In contrast, view Figures
- to see how bridges handle non-local network traffic.
Bridges are internetworking devices that can be used to
reduce large collision domains. Collision domains are areas where packets are likely to
interfere with each other. They do this by dividing the network into smaller segments and
reducing the amount of traffic that must be passed between the segments. Bridges operate
at Layer 2 or the data link layer of the OSI model, because they are only concerned with
MAC addresses. As data is passed along the network on its way to a destination, it is
picked up and examined by every device on the network including bridges.
Bridges work best where traffic is low from one segment of
a network to other segments. When traffic between network segments becomes heavy, bridges
can become a bottleneck and slow down communication.
There is another potential problem with using a bridge.
Bridges always spread and multiply a special kind of data packet. These data packets occur
when a device on a network wants to reach another device on the network, but does not know
the destination address of the device. When this occurs, frequently the source sends out a
broadcast to all devices on a network. Since
every device on the network has to pay attention to such broadcasts,
bridges always forward them. If too many broadcasts are sent out over the network a broadcast storm
can result. A broadcast storm can cause network time-outs, traffic slowdowns, and the
network to operate at less than acceptable performance.
|