What is Bridge in Computer Network?

What is Bridge in Computer Network?

6 mins read27.1K Views 1 Comment
Jaya
Jaya Sharma
Assistant Manager - Content
Updated on Jun 25, 2024 19:10 IST

Bridge in computer network is a smart device that is used for creating one bigger network by connecting smaller subnetworks. It can work as a repeater for extending the network

2022_09_MicrosoftTeams-image-42-1-1.jpg

In this article on what is Bridge in computer network; we will discuss the definition of a bridge, how it works, its functionality, models, advantages and disadvantages.  

Table of Contents

What is Bridge in computer network?

A bridge is a network device that connects multiple subnetworks to create a single network. It provides interconnection with other computer networks that use the same protocol. Through a bridge, multiple LANs can be connected to form a larger and extended LAN. This function of creating a single aggregate network from multiple network segments is called network bridging. It works in the data link layer, which is the second network layer in the OSI model.

Functions of Bridges

Now, let us take a look at the functions of bridges:

  1. Store MAC address in PC that is used in the network for reducing network traffic. 
  2. Divide local area networks into multiple segments. 
  3. Connects multiple networks to ensure communication between them.
  4. Connects LAN segments into a single network. 
  5. Recognizes areas where data is to be sent and on which device it will be sent. 
  6. Maintains MAC address table to discover new segments.
  7. Used in load filtering of network traffic by separating it into segments or packets.

Explore free networking courses

How does a bridge work?

A bridge in computer network either blocks or forwards the data depending on the destination MAC address. The address is written into each data frame. Bridge accepts every packet and amplifies them to another side. However, they allow only selected packets to pass through them that are addressed from one node in a network to a node in other networks. It receives all packets from LAN segments. The bridge builds a table of addresses from which it can identify which packets are sent from which LAN to which LAN.

Types of Bridges in Computer Networks

Following are the different types of bridges that are used:

1. Transparent Bridges

Transparent bridges are used to connect multiple network segments with other bridges to make routing decisions. This bridge fetches MAC addresses of all nodes and associated ports. The transparent bridge, then filters incoming frames with destination MAC addresses on the same port. It then forwards incoming frames to destination MAC through associates port@. These bridges are very popular and operate in a transparent manner to all networks that are connected to hosts. 

2. Source Routing Bridges

Source Routing Bridges decide the route between two hosts. They use the destination MAC address of a frame to direct it through the source routing algorithm. Every station on extended LAN knows about the route over which frame is sent. These are used in IBM token ring networks. They learn their bridging information from the information that is included in the structure of a packet. Through this method, two similar network segments get connected to the data link layer. This is done in a distributed manner wherever end stations join within the bridging algorithm. 

3. Translational Bridges

Translational bridges are used for changing one type of networking system to another. They can connect different types of networks such as Ethernet and Token ring networks. Translation bridges reorder the source and destination address bits while translating between these frame formats. These bridges can add and remove data based on the direction of transmission. They forward the frame of data link layer among LANs using different types of network protocols. 

Modem vs Router: Understanding Their Roles And Differences
Modem vs Router: Understanding Their Roles And Differences
One of the fundamental difference between modem and router is that a modem is a device that connects your computer or other devices to the internet through your internet service...read more
Difference Between Hub and Switch
Difference Between Hub and Switch
Hubs and switches are two commonly used networking terms. However, many people are perplexed whether these words are related in any way. In this article, we will look at the...read more
Types Of Computer Networks
Types Of Computer Networks
Ever wondered how devices communicate? Computer networks are like digital highways, connecting computers and devices. The types vary, from the global internet to local home or office networks, each serving...read more

Models of Bridge in Computer Networks

There are two main models of bridging: Local bridging and remote bridging. Let us learn more about them.

1. Local bridging

It is created by connecting LAN switches with local cables. This enables free communication between computers that are connected to virtual hubs and physical LAN to the same ethernet segment. Local bridging is used when LANs in the same geographical location have to communicate at link layer.

2. Remote bridging 

It is a model where two bridges are connected through WAN. It is used for bridging LANs when they are in different geographical location and they have to communicate with each other at the link layer. 

Advantages of Bridges

Bridges are smart network devices that have the following advantages: 

  1. Improve the performance of bridges by segmenting large busy networks into multiple smaller and interconnected networks.
  2. Cost-effective as they are simple and inexpensive. 
  3. Increases available bandwidth to individual nodes as lesser network nodes share collision domain.
  4. Reduces network congestion by dividing LAN into multiple smaller segments.

Disadvantages of Bridges

Like every device, bridges in computer networks also have their limitations.

  1. Cannot read specific IP addresses.
  2. Unable to provide communication network among networks of different protocols.
  3. Cannot limit the capacity of broadcast messages as they transfer all the messages.
  4. Unable to handle complicated variable data load.

Conclusion 

Bridges are smart networking devices that can be used as repeaters to extend a network. They have many benefits as well as disadvantages. Based on the requirement of your system and network, you should choose a network device that can fulfill them. 

FAQs

How does a bridge differ from repeaters and hubs?

Repeaters amplify signals and connect two different network segments, passing data between them. Bridges incorporate the functionality of repeaters but additionally look at the packets to determine whether they should be allowed to pass through. Hubs also connect network segments but are essentially repeaters that can connect more than two segments.

What is the spanning tree protocol (STP)?

Bridges leverage the spanning tree protocol (STP) to decide whether to forward a packet through the bridge and onto a different network segment. STP serves two functions: to determine a main bridge, called a root, which will make all the bridging decisions and deal with all bridging problems, and to prevent bridging loops.

How does a bridge work in a Linux environment?

In Linux, a bridge can be set up using the kernel patches and the brctl utility. The bridging code in Linux decides whether to bridge data or drop it by looking at the MAC address unique to each Network Interface Card (NIC), not by the protocol type. What are the advantages of using bridges? Bridges can dramatically reduce the amount of network traffic on a segment by preventing unnecessary traffic from crossing onto other network segments. They isolate the busy network from lesser busy one, thereby preventing pollution from busy nodes.

What are bridging loops and how can they be avoided?

Bridging loops can occur whenever multiple bridges become confused about the location of devices on the network. The looping problem can be worked around by using the Spanning Tree Algorithm (STA). STA assigns a value to each interface on a bridge, and as the bridge forwards data, the value gets attached to packet. Whenever another bridge detects the data, in case the STA value for the interface is higher than assigned to its interfaces, bridge will not forward the data. It then, eliminates the possibility of a bridging loop.

About the Author
author-image
Jaya Sharma
Assistant Manager - Content

Jaya is a writer with an experience of over 5 years in content creation and marketing. Her writing style is versatile since she likes to write as per the requirement of the domain. She has worked on Technology, Fina... Read Full Bio