Submitted Successfully!
To reward your contribution, here is a gift for you: A free trial for our video production service.
Thank you for your contribution! You can also upload a video entry or images related to this topic.
Version Summary Created by Modification Content Size Created at Operation
1 handwiki -- 1196 2022-09-29 01:43:09

Video Upload Options

We provide professional Video Production Services to translate complex research into visually appealing presentations. Would you like to try it?

Confirm

Are you sure to Delete?
Cite
If you have any further questions, please contact Encyclopedia Editorial Office.
HandWiki. Bridging (Networking). Encyclopedia. Available online: https://encyclopedia.pub/entry/28004 (accessed on 16 November 2024).
HandWiki. Bridging (Networking). Encyclopedia. Available at: https://encyclopedia.pub/entry/28004. Accessed November 16, 2024.
HandWiki. "Bridging (Networking)" Encyclopedia, https://encyclopedia.pub/entry/28004 (accessed November 16, 2024).
HandWiki. (2022, September 29). Bridging (Networking). In Encyclopedia. https://encyclopedia.pub/entry/28004
HandWiki. "Bridging (Networking)." Encyclopedia. Web. 29 September, 2022.
Bridging (Networking)
Edit

A network bridge is a computer networking device that creates a single, aggregate network from multiple communication networks or network segments. This function is called network bridging. Bridging is distinct from routing. Routing allows multiple networks to communicate independently and yet remain separate, whereas bridging connects two separate networks as if they were a single network. In the OSI model, bridging is performed in the data link layer (layer 2). If one or more segments of the bridged network are wireless, the device is known as a wireless bridge. The main types of network bridging technologies are simple bridging, multiport bridging, and learning or transparent bridging.

multiple networks data link layer computer networking

1. Transparent Bridging

Transparent bridging uses a table called the forwarding information base to control the forwarding of frames between network segments. The table starts empty and entries are added as the bridge receives frames. If a destination address entry is not found in the table, the frame is flooded to all other ports of the bridge, flooding the frame to all segments except the one from which it was received. By means of these flooded frames, a host on the destination network will respond and a forwarding database entry will be created. Both source and destination addresses are used in this process: source addresses are recorded in entries in the table, while destination addresses are looked up in the table and matched to the proper segment to send the frame to. Digital Equipment Corporation (DEC) originally developed the technology in the 1980s.[1]

In the context of a two-port bridge, the forwarding information base can be seen as a filtering database. A bridge reads a frame's destination address and decides to either forward or filter. If the bridge determines that the destination host is on another segment on the network, it forwards the frame to that segment. If the destination address belongs to the same segment as the source address, the bridge filters the frame, preventing it from reaching the other network where it is not needed.

Transparent bridging can also operate over devices with more than two ports. As an example, consider a bridge connected to three hosts, A, B, and C. The bridge has three ports. A is connected to bridge port 1, B is connected to bridge port 2, C is connected to bridge port 3. A sends a frame addressed to B to the bridge. The bridge examines the source address of the frame and creates an address and port number entry for host A in its forwarding table. The bridge examines the destination address of the frame and does not find it in its forwarding table so it floods (broadcasts) it to all other ports: 2 and 3. The frame is received by hosts B and C. Host C examines the destination address and ignores the frame as it does not match with its address. Host B recognizes a destination address match and generates a response to A. On the return path, the bridge adds an address and port number entry for B to its forwarding table. The bridge already has A's address in its forwarding table so it forwards the response only to port 1. Host C or any other hosts on port 3 are not burdened with the response. Two-way communication is now possible between A and B without any further flooding to the network. Now, if A sends a frame addressed to C, the same procedure will be used, but this time the bridge will not create a new forwarding-table entry for A's address/port because it has already done so.

Bridging is called transparent when the frame format and its addressing aren't changed substantially. Non-transparent bridging is required especially when the frame addressing schemes on both sides of a bridge are not compatible with each other, e.g. between ARCNET with local addressing and Ethernet using IEEE MAC addresses, requiring translation. However, most often such incompatible networks are routed in between, not bridged.

2. Simple Bridging

A simple bridge connects two network segments, typically by operating transparently and deciding on a frame-by-frame basis whether or not to forward from one network to the other. A store and forward technique is typically used so, as part of forwarding, the frame integrity is verified on the source network and CSMA/CD delays are accommodated on the destination network. In contrast to repeaters which simply extend the maximum span of a segment, bridges only forward frames that are required to cross the bridge. Additionally, bridges reduce collisions by creating a separate collision domain on either side of the bridge.

3. Multiport Bridging

A multiport bridge connects multiple networks and operates transparently to decide on a frame-by-frame basis whether to forward traffic. Additionally, a multiport bridge must decide where to forward traffic. Like the simple bridge, a multiport bridge typically uses store and forward operation. The multiport bridge function serves as the basis for network switches.

4. Implementation

The forwarding information base stored in content-addressable memory (CAM) is initially empty. For each received Ethernet frame the switch learns from the frame's source MAC address and adds this together with an interface identifier to the forwarding information base. The switch then forwards the frame to the interface found in the CAM based on the frame's destination MAC address. If the destination address is unknown the switch sends the frame out on all interfaces (except the ingress interface). This behavior is called unicast flooding.

5. Forwarding

Once a bridge learns the addresses of its connected nodes, it forwards data link layer frames using a layer-2 forwarding method. There are four forwarding methods a bridge can use, of which the second through fourth methods were performance-increasing methods when used on "switch" products with the same input and output port bandwidths:

  1. Store and forward: the switch buffers and verifies each frame before forwarding it; a frame is received in its entirety before it is forwarded.
  2. Cut through: the switch starts forwarding after the frame's destination address is received. There is no error checking with this method. When the outgoing port is busy at the time, the switch falls back to store-and-forward operation. Also, when the egress port is running at a faster data rate than the ingress port, store-and-forward is usually used.
  3. Fragment free: a method that attempts to retain the benefits of both store and forward and cut through. Fragment free checks the first 64 bytes of the frame, where addressing information is stored. According to Ethernet specifications, collisions should be detected during the first 64 bytes of the frame, so frame transmissions that are aborted because of a collision will not be forwarded. Error checking of the actual data in the packet is left for the end device.
  4. Adaptive switching: a method of automatically selecting between the other three modes.[2][3]

6. Shortest Path Bridging

Shortest Path Bridging (SPB), specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing.[4][5][6] It is a proposed replacement for Spanning Tree Protocol which blocks any redundant paths that could result in a layer 2 loop. SPB allows all paths to be active with multiple equal-cost paths. SPB also increases the number of VLANs allowed on a layer-2 network.[7]

References

  1. "Transparent Bridging". Cisco Systems, Inc.. http://docwiki.cisco.com/wiki/Transparent_Bridging. 
  2. Dong, Jielin (2007) (in en). Network Dictionary. Javvin Technologies Inc.. p. 23. ISBN 9781602670006. https://books.google.com/books?id=On_Hh23IXDUC&q=adaptive+switching+network&pg=PA23. Retrieved 25 June 2016. 
  3. "Cray makes its Ethernet switches responsive to net conditions" (in en). IDG Network World Inc. 1 July 1996. https://books.google.com/books?id=6xcEAAAAMBAJ&q=adaptive+switching+network&pg=PA8. 
  4. "Alcatel-Lucent, Avaya, Huawei, Solana and Spirent Showcase Shortest Path Bridging Interoperability". Huawei. 7 September 2011. http://www.marketwire.com/press-release/alcatel-lucent-avaya-huawei-solana-spirent-showcase-shortest-path-bridging-interoperability-paris-alu-1557944.htm. 
  5. Luo, Zhen; Suh, Changjin (3 March 2011). "An improved shortest path bridging protocol for Ethernet backbone network". The International Conference on Information Networking 2011 (ICOIN2011). IEEE Xplore. 148–153. doi:10.1109/ICOIN.2011.5723169. ISBN 978-1-61284-661-3.  https://dx.doi.org/10.1109%2FICOIN.2011.5723169
  6. "Lab Testing Summary Report; Data Center Configuration with SPB". Miercom. September 2011. http://docs.media.bitpipe.com/io_10x/io_101870/item_458574/Miercom%20Report%20Avaya%20Ethernet%20Fabric%20SR111013%2015Oct11%20%282%29.pdf. 
  7. Shuang Yu. "IEEE approves new IEEE 802.1aq™ Shortest path bridging". IEEE Standards Association. http://standards.ieee.org/news/2012/802.1aq.html. "Using the IEEE’s next-generation VLAN, called a Service Interface Identifier (I-SID), it is capable of supporting 16 million unique services compared to the VLAN limit of four thousand." 
More
Information
Contributor MDPI registered users' name will be linked to their SciProfiles pages. To register with us, please refer to https://encyclopedia.pub/register :
View Times: 1.7K
Entry Collection: HandWiki
Revision: 1 time (View History)
Update Date: 29 Sep 2022
1000/1000
ScholarVision Creations