Fact-checked by Grok 2 weeks ago

Network bridge

A network bridge is a Layer 2 device in computer networking that interconnects multiple local area networks (), each supporting the MAC service, to form a single logical network by forwarding frames based on media access control () addresses while filtering traffic to reduce congestion and collisions. Bridges operate at the of the , enabling transparent communication between end stations on separate physical segments without requiring changes to higher-layer protocols. This functionality extends the effective size of a LAN beyond the limitations of a single , improving overall network performance. Bridges function through a three-step : learning, filtering, and forwarding. Upon receiving a , a bridge examines the source and records it in a dynamic forwarding table associated with the incoming , building knowledge of locations over time. It then filters the frame if the destination MAC is on the same port (to prevent unnecessary broadcasts) or forwards it only to the appropriate outgoing port based on the table, rather than flooding all ports as a basic would. If the destination is unknown, the frame is flooded to all ports except the source, ensuring delivery while minimizing waste. To prevent loops in redundant topologies, bridges implement the , standardized in , which dynamically selects a loop-free subset of the network by electing a root bridge and blocking redundant links via Bridge Protocol Data Units (BPDUs). Invented by in 1985 at , STP ensures reliable frame delivery by recomputing paths if failures occur, though convergence can take up to 30-50 seconds in traditional implementations. Enhanced variants like Rapid STP (IEEE 802.1w) reduce this to seconds for faster recovery. Network bridges come in several types, including transparent bridges, which operate invisibly to endpoints by learning addresses and complying with for Ethernet and similar media, and source-route bridges, used for networks to route frames via route information fields (). The standard extends bridging to support virtual LANs (s), allowing logical segmentation of a physical network for improved security and management. In modern networks, multi-port bridges evolved into Ethernet switches, which provide dedicated bandwidth per port and integrate advanced features like VLAN tagging and .

Fundamentals

Definition and Purpose

A network bridge is a networking device that operates at the (Layer 2 of the ), interconnecting multiple (LAN) segments below the Media Access Control (MAC) service boundary to form a single while filtering traffic based on MAC addresses. This architecture enables transparent communication between end stations on distinct LANs, as if they were connected to the same physical medium, ensuring compatibility with (LLC) and higher-layer protocols. The primary purpose of a network bridge is to extend LANs by linking separate segments, such as Ethernet networks, to improve through selective frame forwarding and reduce collisions by segmenting without requiring Layer 3 . In early Ethernet deployments, bridges connected multiple coaxial or twisted-pair segments to expand network coverage beyond single-segment limitations, allowing devices to share resources efficiently while maintaining a unified logical . By filtering unnecessary broadcasts and unicasts, bridges enhance throughput in shared-medium environments like CSMA/CD networks. Fundamentally, a network bridge features two or more network interfaces for segment attachment, a table (forwarding database) that dynamically maps addresses to ports, and filtering/forwarding logic to inspect and direct frames based on destination addresses. Key benefits include higher bandwidth utilization via reduced unnecessary traffic across segments, easier management than repeaters or hubs—which indiscriminately propagate all signals—and the division of networks into separate collision domains to minimize contention and retransmissions. Modern switches evolved from as multi-port variants, offering scaled connectivity for denser LANs.

Historical Development

Network bridges emerged in the mid-1980s as a solution to the limitations of early Ethernet local area networks (LANs), particularly the constraints on network diameter and collision domains imposed by the (CSMA/CD) protocol. Developed primarily by engineers at (DEC), the technology addressed the need to interconnect multiple Ethernet segments without the performance penalties of repeaters or the complexity of routers. The first prototype bridge was created around 1980 by Mark Kempf at DEC's Advanced Development Group, using a processor and Lance Ethernet chips to enable store-and-forward packet filtering based on 48-bit MAC addresses. Commercial deployment followed shortly, with DEC introducing the LAN Bridge 100 in 1986 as the world's first Ethernet bridge, capable of extending LANs beyond the 2.5 km limit while reducing collisions. Companies like , through its 1987 acquisition of Bridge Communications, also contributed to early Ethernet bridging innovations, focusing on hardware for interconnecting PC networks. A pivotal milestone in 1985 was the invention of the by at DEC, which prevented loops in bridged networks by dynamically selecting a loop-free using a distributed . This , detailed in Perlman's seminal paper, allowed bridges to exchange bridge protocol data units (BPDUs) to elect a root bridge and block redundant paths, enabling reliable expansion of Ethernet LANs. STP was first implemented in DEC's two-port Ethernet bridge, transforming bridging from a simple interconnect into a robust protocol for larger . By the late , bridges evolved from basic two-port devices to multiport configurations, supporting greater scalability as LANs grew in enterprise environments. Standardization efforts began in the late 1980s under the working group, culminating in IEEE 802.1D-1990, which defined the MAC Bridge standard incorporating for interoperability across vendors. This standard formalized address learning, forwarding, and prevention, influencing bridge designs globally. In the , the distinction between bridges and switches blurred as multiport bridges with ASIC-based forwarding became prevalent, rebranded as "Ethernet switches" to emphasize higher port densities and performance; by the mid-1990s, switches had largely supplanted traditional bridges in commercial use. Subsequent updates enhanced STP's efficiency, with IEEE 802.1w-2001 introducing Rapid Spanning Tree Protocol (RSTP) to reduce convergence times from 30-50 seconds to under 10 seconds through faster BPDU handling and role-based port states. In the and , bridging concepts extended to virtual environments via (SDN) and , where virtual bridges like enable overlay networks in hypervisors and data centers, supporting scalable, programmable LANs in multi-tenant clouds. This evolution maintains bridges' core role in segmenting traffic and preventing loops amid the shift to virtualized infrastructures.

Types of Bridges

Transparent Bridges

Transparent bridges, also known as learning bridges, are network devices that interconnect (LAN) segments by forwarding frames based on dynamically learned media access control () addresses, operating without requiring explicit configuration or awareness from end hosts or routers. This transparency ensures that the bridge appears invisible to the network, as defined in the standard for MAC bridges. They function at the (Layer 2 of the ), filtering traffic to reduce unnecessary broadcasts while maintaining a single across connected segments. The primary mechanism of transparent bridges relies on self-learning, where the device examines the source of each incoming and records it in a forwarding (also called a filtering database) along with the receiving . If the destination matches an entry in the , the is forwarded only to the associated ; otherwise, for unknown destinations or broadcasts, the is flooded to all other ports except the source to ensure delivery. To handle network changes such as device mobility, entries in the forwarding age out and are removed after a period of inactivity, typically 300 seconds by default. Transparent bridges come in simple and multiport variants to suit different scales. Simple bridges link exactly two network segments, using basic logic to forward or filter frames between them, which was common in early implementations to extend limited-distance Ethernet cabling. Multiport variants, supporting more than two ports, employ an internal switching fabric to manage traffic across multiple segments simultaneously, enabling efficient connectivity in larger topologies without altering the transparent operation. A key advantage of transparent bridges is their plug-and-play simplicity, allowing seamless integration into existing networks to segment traffic, reduce collisions, and improve performance without reconfiguration. However, this ease comes with the disadvantage of vulnerability to loops in redundant topologies, potentially causing broadcast storms that propagate indefinitely and degrade network stability unless mitigated by protocols like . Developed by in the early 1980s, transparent bridges were essential for expanding early Ethernet networks beyond single collision domains. They continue to find use in small-scale, low-complexity environments or legacy systems where advanced routing is unnecessary.

Source-Route Bridges

Source-route bridges are designed for networks, as specified in IEEE 802.5, where the sending station determines and includes the route through the network in the frame's Routing Information Field (). Unlike transparent bridges, which learn addresses dynamically without host involvement, source-route bridges rely on the source device to discover paths via test (e.g., explorer frames) that bridges append route descriptors to during propagation. The source then selects and embeds the route in subsequent data ' RIF, guiding bridges to forward along the specified path across multiple interconnected rings. This mechanism supports up to 14 hops (rings) and handles loop prevention inherently through route specification, though it requires more overhead from the (up to 18 bytes) and source computation. Developed by in the 1980s for expanding LANs, source-route bridging was widely used in enterprise environments until Ethernet's dominance in the . Variants like source-route transparent (SRT) bridges combine elements of source-routing for with transparent learning for other media. With 's obsolescence, source-route bridges are now legacy technology.

Translation Bridges

Translation bridges are specialized network devices designed to interconnect dissimilar local area networks (LANs) that employ different protocols or media access methods, such as Ethernet and or (FDDI). Unlike standard bridges that operate within homogeneous environments, translation bridges perform protocol and frame translations to enable communication between incompatible network architectures. This allows devices on one network type to exchange data with those on another, effectively extending the reach of legacy or diverse systems. The primary functions of translation bridges include frame format conversion, encapsulation and decapsulation of data packets, and handling discrepancies in addressing schemes. For instance, when bridging Ethernet to , the device converts Ethernet frames (using or Ethernet II formats) into Token Ring frames by reordering the 48-bit addresses—Ethernet transmits bits in little-endian order (low-order bit first), while Token Ring uses big-endian order (high-order bit first)—and adjusting header fields like information fields (), which have no direct Ethernet equivalent and are thus stripped or cached for return traffic. Encapsulation involves wrapping non-routable protocol data (e.g., or LAT) into compatible formats, such as converting Ethernet Type II frames to Token Ring SNAP encapsulation, while decapsulation reverses the process on inbound traffic. These operations ensure seamless data flow but require careful management of (MTU) sizes, often limited to 1,500 bytes to match Ethernet constraints. Translation bridges gained prominence in the amid heterogeneous enterprise environments where multiple technologies coexisted, particularly in IBM-dominated networks. Vendors like developed solutions such as Ethernet-to-Token Ring bridges and FDDI translational bridges to support migrations and integrations; for example, 's FDDI interface update enabled translational transparent bridging for VAX environments, allowing routable protocols to traverse while converting non-routable ones. These devices were essential for connecting Token Ring-based mainframes to emerging Ethernet segments, facilitating protocols like over mixed media. However, their complexity arose from reconciling divergent media access controls—Ethernet's with (CSMA/CD) versus Token Ring's token-passing mechanism—often restricting support to non-routable protocols to avoid routing indicator conflicts. A key limitation of translation bridges is the added from frame reformatting and address manipulations, which can degrade in high-throughput scenarios compared to native bridging. This processing overhead, combined with the rise of cost-effective in the late 1990s and early 2000s, contributed to their obsolescence as Ethernet achieved dominance, rendering and FDDI largely extinct by the mid-2000s. Translation bridges are now primarily of historical interest, though similar translation functions appear in modern media converters for legacy network integrations.

Operational Principles

Address Learning and Forwarding

Network bridges employ a dynamic learning process to build their filtering database, also known as the (CAM) table, by examining the source in each incoming . Upon receipt of a frame on an ingress , the bridge checks if the source MAC address is an individual address and the port is in the learning or forwarding state; if so, it creates or updates a dynamic entry associating that MAC address with the ingress port, provided no conflicting static entry exists and the database has sufficient capacity. This process excludes group addresses and source-routed frames, as their paths may not align with the network topology. The filtering database size varies by implementation but typically supports 1,000 to 64,000 entries to accommodate medium-sized networks. Forwarding decisions in bridges are based on the destination in the frame header, using the filtering database to determine the appropriate egress . For a known destination, the frame is forwarded only to the specific associated with that in the database. If the destination is unknown (not present in the database), or if the frame is a broadcast or , the bridge floods the frame to all other ports except the ingress to ensure delivery. Additionally, if the destination matches the ingress —indicating the frame is destined for a host on the same segment—the bridge filters (drops) the frame to prevent unnecessary and reduce . The core decision logic for frame handling can be represented in the following pseudocode, derived from standard bridge operations:
Upon receiving a frame with source MAC S, destination MAC D, on ingress port P:

1. Learning:
   if S is individual address and P is in learning/forwarding state:
       if no static entry for S and database not full:
           update dynamic entry: FDB[S] = P
           (or overwrite if existing dynamic entry)

2. Forwarding and Filtering:
   if frame is source-routed or invalid: drop
   else if D is known in FDB:
       Q = FDB[D]
       if Q != P:  // Not same segment
           forward frame to Q
       else:
           filter (drop) frame
   else if D is broadcast or multicast (group address):
       for each port R != P in forwarding state:
           forward frame to R
   else:  // Unknown unicast
       for each port R != P in forwarding state:
           forward frame to R
This logic ensures efficient traffic management while preserving frame order within traffic classes. To maintain accuracy in dynamic environments, bridges implement aging and update mechanisms for filtering database entries. Dynamic entries are removed after an aging timer expires without renewal—typically 300 seconds by default, configurable from 10 seconds to over 1 million seconds—triggered by the absence of frames from that source on the associated . When a frame arrives with a source already in the database but on a different (indicating a host mobility or MAC move), the entry is updated to the new ingress , overwriting the previous association. Topology changes, such as those from reconfiguration, may prompt shorter aging timers to flush potentially mislearned entries quickly. Bridge performance is characterized by wire-speed throughput, meaning the device can forward frames at the full line rate of its ports without under normal conditions, limited only by the physical interface speeds (e.g., 10/100/1000 Mbps). By segmenting the network, bridges reduce the size of collision domains per port, minimizing contention and improving overall efficiency in shared media environments like Ethernet. The maximum recommended transit delay through a is 1 second to ensure timely delivery.

Loop Prevention Mechanisms

In bridged networks, redundant paths between segments can create loops, allowing broadcast and unknown frames to circulate indefinitely among bridges. This results in broadcast storms, where frame duplication exponentially increases traffic, quickly saturating link bandwidth and rendering the network unusable. Loops also induce table instability, as the same source addresses are repeatedly learned from multiple ports, causing entries to overwrite each other and leading to inconsistent forwarding decisions. Early loop prevention relied on manual intervention and simple heuristics rather than automated protocols. Network administrators manually configured bridges by disabling or blocking specific ports on redundant links to enforce a tree topology, avoiding cycles through careful design. Source address filtering, part of the basic learning process, helped mitigate some effects by building forwarding tables from observed source MACs, but it could not inherently detect or break loops. Additionally, pre-STP techniques limited address caching table sizes—typically to 8,000 entries initially—to prevent memory overflow during storms, with timeouts (e.g., after 5 minutes of inactivity) to refresh tables and handle mobility, though these measures only reduced symptoms without eliminating the root cause. Basic automated mechanisms introduced bridge identification and port role assignment to systematically prevent loops while building on address learning for forwarding. Each bridge generates a unique Bridge ID, combining a configurable priority (default 32,768) with its base ; the bridge with the lowest ID is elected via distributed comparison of Bridge Protocol Data Units (BPDUs). Ports then receive s: the provides the optimal path to the (selected by lowest path cost), designated ports forward traffic to non-root segments, and blocking ports on redundant paths discard data to break loops without isolating segments. This election process ensures a single active path per segment, referencing learned MAC locations for stable forwarding. However, these mechanisms suffer from slow convergence after topology changes, such as link failures, taking 30 to 50 seconds to recompute the —comprising listening (15 seconds), learning (15 seconds), and max age (20 seconds) timers—during which temporary loops or traffic blackholing can occur. In legacy setups, this delay has caused outages exceeding 45 seconds, disrupting real-time applications like VoIP or financial trading, with broadcast storms amplifying downtime until stabilization.

Implementations

Hardware-Based Bridges

Hardware-based network bridges utilize dedicated physical components to perform bridging functions at high speeds, distinguishing them from software implementations by leveraging specialized chips for efficient packet processing. These devices typically employ to handle learning and forwarding, enabling rapid table lookups and decision-making without relying on general-purpose processors. Multiple Ethernet ports, ranging from 4 to 48 depending on the model, connect network segments, while buffer memory—often shared across ports in the ASIC—manages frame queuing to prevent during bursts of traffic. This architecture supports wire-speed forwarding, where packets are processed at the full line rate of the interface, such as 1 Gbps per port, ensuring no performance degradation under load. Performance characteristics of hardware bridges emphasize low latency and efficient resource use, critical for environments. Forwarding latency is typically under 10 μs, with some implementations achieving as low as 1-5 μs, allowing near-instantaneous traversal between s. consumption varies by scale but generally ranges from 5-50 for compact devices with 8-24 s, rising with port count and PoE support, yet optimized keep idle draw minimal at around 5 . Early examples include Digital Equipment Corporation's (DEC) LANBridge 100, introduced in 1986 as a standalone two-port device operating at 10 Mbps, using for Ethernet interfacing and an 8K-entry address table with binary search for filtering packets every 32 μs. In modern contexts, bridging functions are integrated into multilayer switches like the series, where UADP enable scalable L2/L3 operations across dozens of s. These bridges offer advantages in reliability and , providing consistent high-throughput operation suitable for networks handling heavy traffic, with redundancy reducing failure points compared to software alternatives. However, they incur higher upfront costs due to custom silicon fabrication and lack flexibility for protocol updates, often requiring full device replacement for feature enhancements. By the , advancements in System-on-Chip () designs have extended bridging to embedded devices, with multi-protocol SoCs like those from Espressif integrating Ethernet or bridging for low-power edge connectivity in smart home gateways.

Software-Based Bridges

Software-based bridges are implemented primarily through kernel modules and user-space utilities within operating systems, enabling flexible without dedicated hardware. In , the bridge module, part of the networking stack, acts as a Layer 2 switch by forwarding Ethernet frames between interfaces based on MAC addresses. This module can be configured using tools from the bridge-utils package, such as brctl, which allows creation, management, and monitoring of bridge devices. For filtering, user-space tools like ebtables provide Ethernet-level firewalling capabilities, inspecting and manipulating frames traversing the bridge in a protocol-independent manner. Virtual bridging extends these concepts into hypervisor environments, where software bridges connect virtual machine (VM) networks to physical or overlay infrastructures. (OVS), an open-source multilayer virtual switch, supports advanced features like flow-based forwarding and integration with (SDN) overlays, making it suitable for dynamic virtualized setups. Similarly, VMware's vSphere Distributed Switch (vDS) provides centralized management across ESXi hosts, aggregating VM traffic into logical switches for policy enforcement and monitoring. These implementations often leverage kernel datapaths for efficiency while allowing user-space control for customization. Performance characteristics of software-based bridges include higher compared to solutions, typically in the range of 35 to 100 microseconds or more for virtual switches like OVS, due to processing overhead in the host CPU. Throughput is CPU-bound, limited by core utilization and packet processing rates, though multi-threading and optimizations like DPDK can scale it to near line-rate for 10 Gbps links under moderate loads. In contrast to bridges, which offer sub-microsecond latencies via , software variants prioritize programmability over raw speed. Common use cases for software-based bridges encompass home networking, where firmware like enables bridging to extend segments without additional , supporting both wired and clients in configurations. In cloud virtual private clouds (VPCs), such as those using OVS, they facilitate isolated tenant networks with overlay encapsulation for scalability across distributed hosts. A key advantage is customization, allowing dynamic rule updates, tagging, and integration with higher-layer services without reconfiguration. Specific examples include the Windows Network Bridge feature, which combines multiple network adapters into a single logical interface for transparent forwarding, useful for sharing connections in small setups. In , the if_bridge driver creates software Ethernet bridges, supporting and packet filtering to interconnect networks efficiently.

Advanced Protocols

Spanning Tree Protocol

The (STP), standardized as in 1990, is a foundational link-layer protocol designed to prevent loops in bridged Ethernet networks by constructing a loop-free logical topology. operates by exchanging Bridge Protocol Data Units (BPDUs), special multicast frames sent between bridges to discover the network topology, elect a root bridge, and determine the active paths. These BPDUs contain information such as bridge identifiers, path costs, and timer values, enabling bridges to collectively compute a that activates only a subset of links while blocking redundant ones to eliminate cycles. The STP algorithm proceeds in distinct steps to build and maintain the spanning tree. First, bridges elect a root bridge using the lowest Bridge ID, which combines a configurable priority (default 32768) and the bridge's MAC address as a tiebreaker. Each non-root bridge then selects its root port as the one with the lowest cumulative path cost to the root, where path cost is calculated based on link bandwidth— for example, a 100 Mbps link has a cost of 19. Designated ports are chosen for each LAN segment (lowest cost to root from the sending bridge), and remaining ports transition to a blocking state. Port states evolve through blocking (no traffic, but BPDUs received), listening (BPDU processing, no learning or forwarding), learning (MAC address learning, no forwarding), and forwarding (full operation) to ensure stable topology changes without temporary loops. STP relies on three key timers to manage topology updates and stability: the Hello timer (default 2 seconds), which sets the BPDU transmission interval; the Max Age timer (20 seconds), which defines how long a bridge stores a BPDU before aging it out; and the Forward Delay timer (15 seconds), applied during listening and learning phases. These timers contribute to convergence time, calculated approximately as $2 \times (\text{Forward Delay} + \text{Max Age}) + \text{Hello}, yielding about 52 seconds under defaults for a full topology recalculation after a . To address STP's slow convergence (often 30–50 seconds or more), the Rapid Spanning Tree Protocol (RSTP) was introduced in IEEE 802.1w in 2001, reducing times to seconds or even hundreds of milliseconds through explicit handshaking in BPDUs and role-based port transitions (e.g., alternate ports for quick ). RSTP maintains backward compatibility with STP while proposing immediate forwarding on point-to-point links and faster aging of information. Despite its reliability, STP has limitations, including support for only a single instance per in basic implementations, which can lead to suboptimal load balancing across VLANs. Additionally, it is vulnerable to attacks such as BPDU storms, where malicious or misconfigured devices flood BPDUs, potentially causing topology instability or broadcast storms if loops form before blocking; features like BPDU Guard mitigate this by disabling ports upon unexpected BPDU receipt.

Shortest Path Bridging

Shortest Path Bridging (SPB) is defined in the standard, ratified in 2012, which amends the virtual bridged standard to enable shortest path forwarding within bridged domains. This protocol introduces a link-state approach to Ethernet bridging, allowing bridges to compute and utilize optimal paths for and traffic across mesh topologies. The core mechanism of SPB relies on the Intermediate System to Intermediate System () protocol, extended per 6329, to advertise information among s. Each bridge maintains a synchronized link-state database and uses shortest-path algorithms to calculate forwarding tables, encapsulating frames with an Encapsulation Tag (ECT) that identifies specific equal-cost trees for multipath load balancing. This enables traffic distribution across multiple paths without loops, supporting up to 16 distinct ECT algorithms per instance for fine-grained control. Compared to the , SPB offers faster convergence times under 1 second, often in the range of hundreds of milliseconds, due to its proactive link-state updates rather than STP's reactive flooding. It supports multiple equal-cost paths for load balancing, avoiding STP's single spanning tree that blocks redundant links and leads to suboptimal routing, thereby improving scalability in large environments like data centers. SPB has been implemented in enterprise switches from vendors such as (formerly ), where it forms the basis of solutions like Fabric Connect for automated . It integrates conceptually with related standards like (Transparent Interconnection of Lots of Links), both leveraging for shortest-path Ethernet but differing in encapsulation—SPB uses MAC-in-MAC or VLAN-based tagging. In practice, SPB is applied in provider backbone networks for carrier-grade Ethernet services and in campus LANs to enhance resilience and throughput beyond STP's limitations.

References

  1. [1]
    IEEE 802.1Q-2022 - IEEE SA
    Dec 22, 2022 · This standard specifies how the Media Access Control (MAC) Service is supported by Bridged Networks, the principles of operation of those networks, and the ...
  2. [2]
    Bridging and IBM Networking Configuration Guide, Cisco IOS ...
    Sep 9, 2007 · The Cisco IOS bridging software includes SRB capability. A source-route bridge connects multiple physical Token Rings into one logical network ...
  3. [3]
    3 Advanced Ethernet - An Introduction to Computer Networks
    Virtual LANs, or VLANs, are a mechanism by which disjoint subsets of the hosts on a large Ethernet can be sequestered from one another, with packet exchanges ...
  4. [4]
    Using Bridges to Interconnect Homogeneous Networks
    A network bridge is a network device that connects multiple network segments. According to this definition, a translating bridge is also a bridge.Missing: computer | Show results with:computer
  5. [5]
    [PDF] LAN switching and Bridges
    A bridge or LAN switch is a device that interconnects two or more Local. Area Networks (LANs) and forwards packets between these networks. • Bridges/LAN ...
  6. [6]
    [PDF] The Story Of Bridging - Computer Science
    In response, Radia Perlman, then the DEC routing architect, invented her celebrated spanning tree algorithm. The algorithm ensures that bridges compute a loop- ...
  7. [7]
    IEEE 802.1D-2004 - IEEE SA
    This standard specifies Cut-Through Forwarding (CTF) bridges based on the IEEE 802.1Q bridge architecture, including protocols, procedures, and managed objects.
  8. [8]
    What is bridge? | Definition from TechTarget
    Jul 7, 2023 · A bridge is a class of network device designed to connect networks at Open Systems Interconnection (OSI) Level 2, which is the data link layer of a local area ...<|separator|>
  9. [9]
    Ethernet Bridge - an overview | ScienceDirect Topics
    Bridges are used to extend LANs, providing increased length, number of stations, performance and reliability. An Ethernet bridge connects two or more Ethernet ...
  10. [10]
    Ethernet Bridging - The Linux Kernel documentation
    The IEEE 802.1Q-2022 (Bridges and Bridged Networks) standard defines the operation of bridges in computer networks. A bridge, in the context of this standard, ...
  11. [11]
  12. [12]
    Forwarding Database - an overview | ScienceDirect Topics
    Forwarding databases are used by network bridges and switches to send frames across network segments, with entries built dynamically as frames are received ...Introduction to Forwarding... · Forwarding Database...
  13. [13]
    Collision Domains - Cisco Learning Network
    Adding one bridge in the middle effectively splits the collision domain in two, thus reducing collisions and having more effective bandwidth. In switches you ...
  14. [14]
    DEC's LAN Bridge 100: The Invention Of The Network Bridge
    Aug 27, 2024 · DEC's LAN Bridge 100 was a major milestone in the history of Ethernet which made it a viable option for the ever-growing LANs of yesteryear and today.
  15. [15]
    Bridge Communications & Early Ethernet - BusinessCom Networks
    Dec 17, 2019 · Bridge Communications eventually merged with 3Com Corporation, one of the early pioneers of personal computer networks and thinnet Ethernet. ...
  16. [16]
    The Evolution of the Internet: The spanning tree protocol, a major ...
    Feb 4, 2016 · The algorithm for implementing spanning tree protocol was invented by Perlman in 1985 and introduced in DEC's two-port Ethernet bridge, which ...
  17. [17]
    The history of network switching - Silvano Gai's Blog
    May 1, 2022 · 1990s: Layer 2 Switches​​ Network switches (switches for short) are the evolution of network bridges whose behavior was defined by the Institute ...
  18. [18]
    Troubleshooting Transparent Bridging Environments - Cisco
    When transparent bridges are powered on, they learn the topology of the network by analysis of the source address of inbound frames from all attached networks.Missing: mechanism | Show results with:mechanism
  19. [19]
    Transparent Bridging - an overview | ScienceDirect Topics
    Transparent bridging is defined as a method that enables efficient routing and management of network traffic without requiring end systems to be aware of ...Missing: self- | Show results with:self-
  20. [20]
    Transparent Bridging
    Transparent bridges exchange configuration messages and topology change messages. Configuration messages are sent between bridges to establish a network ...Technology Basics · Bridging Loops · Spanning-Tree Algorithm...Missing: definition self-
  21. [21]
    Configuring Transparent Bridging - Cisco
    Mar 15, 2005 · Translational bridging - used to bridge data between different media ... Translational bridging without routing indicators between ...
  22. [22]
    Mixed-Media Bridging
    Translational bridges reorder source and destination address bits when translating between Ethernet and Token Ring frame formats.
  23. [23]
    New Version of FDDI Interface for Cisco Systems Routers Adds ...
    Dec 15, 1992 · All routable protocols still can be routed normally between multiple FDDI networks while the Cisco device performs translational bridging.
  24. [24]
    What is token ring and how does it work? - TechTarget
    Jul 8, 2021 · The use of token rings and 802.5 started declining in the 1990s. Today, they are considered inactive and obsolete. Enterprise organizations ...
  25. [25]
    Bridge Network | Hilscher
    For example, a translation bridge could connect an Ethernet network with a Token Ring network, translating the data frames between the two formats. This ...
  26. [26]
    [PDF] IEEE Std 802.1D-2004, IEEE Standard for Local and Metropolitan ...
    Jun 9, 2004 · Abstract: An architecture for the interconnection of IEEE 802® Local Area Networks (LANs) below the MAC Service boundary is defined.<|separator|>
  27. [27]
    Bridging and IBM Networking Configuration Guide, Cisco IOS ...
    Sep 9, 2007 · The IEEE 802.1D Spanning Tree Protocol is the preferred way of running the bridge. Use the DEC Spanning Tree Protocol only for backward ...
  28. [28]
    [PDF] An algorithm for distributed computation of a spanningtree in ...
    A protocol and algorithm are given in which bridges in an extended Local Area Network of arbitrary topology compute, in a distributed fashion, an acyclic ...
  29. [29]
    Understand and Tune Spanning Tree Protocol Timers - Cisco
    Feb 2, 2023 · This time is 20 seconds by default, but you can tune the time to be between 6 and 40 seconds. Each configuration BPDU contains these three ...Requirements · Spanning Tree Protocol Timers · Other Parameters of the...
  30. [30]
    [PDF] Cisco IOS XE and ASIC Architecture - Cisco Live
    Apr 22, 2023 · Application-Specific Integrated Circuits (ASICs) are purpose-built processors, capable of delivering Tbps of hardware-based network forwarding ...
  31. [31]
    Data Center Switching ASICs Tradeoffs - ipSpace.net blog
    Jun 2, 2022 · Buffer space. An ASIC with megabytes of internal buffer storage is using very high speed on-chip static RAM. · Forwarding table size. Small ...
  32. [32]
    Software bridge vs Hardware Switch. Is switch that much more ...
    Aug 28, 2014 · Hardware tends to use ASICS which are separate of the CPU, dedicted processing chips to do a specific job. So the ones in a switch will be ...Line Rate Asics vs Large Buffers : r/networking - RedditCan anyone please explain the finer points of port buffers? - RedditMore results from www.reddit.com
  33. [33]
    Does bridging add delay? - Network Engineering Stack Exchange
    Jan 8, 2019 · Yes, a bridge / switch adds some delay to a frame - in the order of 1 to 20 µs. For switches you usually speak of latency - the delay between ...Serialization and serialization times in 40G/10G and 100G/25G ...Is daisy chaining switches increasing latency?More results from networkengineering.stackexchange.comMissing: hardware | Show results with:hardware
  34. [34]
    Energy Usage Research on Network Hardware - DigitalJoshua
    Jul 18, 2021 · An average may be used if the energy consumption was not consistent. Model, Fortinet FortiSwitch 248E-FPOE. Type, 48 Port PoE Managed Switch.
  35. [35]
    [PDF] LAN Bridge 1 00 - Bitsavers.org
    An algorithm examines the hardware switch and software parameters to determine whether the bridge down-line loads. If the bridge is configured to down-line ...Missing: early Cisco Catalyst<|separator|>
  36. [36]
    Cisco Catalyst 9500 Series Switches Data Sheet
    The Cisco Catalyst 9500X switches, based on the Cisco Silicon One ™ Q200 ASIC, are purpose built for the next-generation core, with a programmable pipeline (P4) ...
  37. [37]
    What is Bridge in Computer Network - Types, Uses, Functions ...
    Jul 23, 2025 · A bridge in a computer network is a device used to connect multiple LANs together with a larger Local Area Network (LAN).Bridge In Computer Network · Types Of Bridges · Working Of Bridges
  38. [38]
    IoT edge network interoperability - ScienceDirect.com
    Apr 15, 2025 · This paper addresses network interoperability at the IoT edge level, focusing on resource-efficient communication by integrating Wi-Fi and Bluetooth.Missing: 2020s | Show results with:2020s
  39. [39]
    bridge-utils-1.7.1 - Linux From Scratch!
    The bridge-utils package contains a utility needed to create and manage bridge devices. This is useful in setting up networks for a hosted virtual machine (VM).
  40. [40]
    ebtables(8) - Linux man page
    ebtables is an application program used to set up and maintain the tables of rules (inside the Linux kernel) that inspect Ethernet frames.Missing: software | Show results with:software
  41. [41]
    [PDF] The Design and Implementation of Open vSwitch - USENIX
    May 4, 2015 · We describe the design and implementation of Open. vSwitch, a multi-layer, open source virtual switch for all major hypervisor platforms.
  42. [42]
    vSphere Distributed Switch Architecture - TechDocs
    A vSphere Distributed Switch provides centralized management and monitoring of the networking configuration of all hosts that are associated with the switch.
  43. [43]
    [PDF] Throughput and Latency of Virtual Switching with Open vSwitch
    The Linux bridge is slightly faster than IP forwarding when it is used as a virtual switch with vNICs. IP for- warding is faster when used between pNICs. This ...
  44. [44]
    Wireless Bridge - DD-WRT Wiki
    Aug 23, 2013 · Wireless Bridging is used to connect two LAN segments via a wireless link. The two segments will be in the same subnet and look like two Ethernet switches ...Instruction for dd-wrt v24 sp1 · Example · Setup · Limitations
  45. [45]
    Why Open vSwitch? — Open vSwitch 3.6.90 documentation
    The answer is that Open vSwitch is targeted at multi-server virtualization deployments, a landscape for which the previous stack is not well suited.The Mobility Of State¶ · Responding To Network... · Hardware Integration¶
  46. [46]
    Microsoft-Windows-NetworkBridge
    Nov 5, 2020 · The Microsoft-Windows-NetworkBridge component connects network segments and can also create connections between different types of network media.
  47. [47]
    if_bridge - FreeBSD Manual Pages
    The if_bridge driver creates a logical link between two or more IEEE 802 networks that use the same (or "similar enough") framing format.
  48. [48]
    IEEE 802.1D-1990 - IEEE SA
    802.1D-1998; Amendments: 802.1i-1992 · 802.1j-1996 · 802.6k-1992; Board Approval: 1990-05-31; History. ANSI Approved: 1990-10-18; Published: 1991-03-08. Working ...Missing: publication | Show results with:publication
  49. [49]
    Understand Rapid Spanning Tree Protocol (802.1w) - Cisco
    Feb 9, 2023 · 802.1D bridges link together different segments, such as Ethernet segments, to create a bridged domain. On a given segment, there can only be ...
  50. [50]
    Understand the Spanning Tree PortFast BPDU Guard Enhancement
    This document describes the PortFast Bridge Protocol Data Unit (BPDU) guard enhancement feature of the Spanning Tree Protocol (STP).
  51. [51]
    IEEE 802.1aq-2012
    IEEE 802.1aq-2012 is a standard for shortest path bridging of unicast and multicast frames, and supports VLANs with multiple VIDs.
  52. [52]
    802.1aq – Shortest Path Bridging |
    This standard specifies shortest path bridging of unicast and multicast frames, including protocols to calculate multiple active topologies.
  53. [53]
    RFC 6329 - IS-IS Extensions Supporting IEEE 802.1aq Shortest ...
    802.1aq allows for true shortest path forwarding in a mesh Ethernet network context utilizing multiple equal cost paths.
  54. [54]
    [PDF] Shortest Path Bridging IEEE 802.1aq Tutorial and Demo - nanog
    802.1aq Shortest Path Bridging is an IEEE standard for true shortest path routing, multiple equal cost paths, and a new control plane for Q-in-Q and M-in-M.
  55. [55]
    [PDF] Shortest Path Bridging Architecture guide - Alcatel-Lucent Enterprise
    1.1 Purpose. The purpose of this architecture guide is to present SPB (802.1aq) networking concepts along with design and deployment guidelines.
  56. [56]
    [PDF] Shortest Path Bridging IEEE 802.1aq Overview - APRICOT
    Feb 24, 2011 · 802.1aq allows for true shortest path routing, multiple equal cost paths, much larger layer 2 topologies, faster convergence, vastly improved ...
  57. [57]
    Shortest Path Bridging (SPB) - Alcatel-Lucent Enterprise
    802.1aq SPB is an IEEE networking standard with a primary focus on addressing STP challenges. However, SPB is more than just an STP evolution and unlike MPLS, ...
  58. [58]
    [PDF] Shortest Path Bridging (802.1aq) Technical Configuration Guide
    The evolution of Ethernet technologies continues with the IEEE 802.1aq standard of Shortest Path Bridging. ... standard or Shortest Path Bridging (SPB).
  59. [59]
    RFC 5556 - Transparent Interconnection of Lots of Links (TRILL)
    Oct 14, 2015 · The IEEE, in response, approved a project called Shortest Path Bridging (IEEE Project P802.1aq), taking a different approach than that presented ...
  60. [60]
    [PDF] Shortest Path Bridging: Versatile, simple and reliable
    In the Campus LAN, SPB is a perfect replacement for STP as it offers multiple load-balancing paths with optimal throughput, latency and built-in network ...