pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Bridges

Bridges became commercially available in the early 1980s. At the time of their introduction their function was to connect separate homogeneous networks. Subsequently, bridging between different networks – for example, Ethernet and Token Ring – has also been defined and standardised. Bridges are data communications devices that operate principally at Layer 2 of the OSI reference model. As such, they are widely referred to as data link layer devices.

Bridges map the Ethernet addresses of the nodes residing on each network segment and allow only necessary traffic to pass through the bridge. When a packet is received by the bridge, the bridge determines the destination and source segments. If the segments are the same, the packet is dropped (filtered); if the segments are different, then the packet is forwarded to the correct segment. Additionally, bridges do not forward bad or misaligned packets.

Bridges are also called store-and-forward devices because they look at the whole Ethernet packet before making filtering or forwarding decisions. Filtering packets, and regenerating forwarded packets enables bridging technology to split a network into separate collision domains. This allows for greater distances and more repeaters to be used in the total network design.

Most bridges are self-learning task bridges; they determine the user Ethernet addresses on the segment by building a table as packets are passed through the network. This self-learning capability, however, dramatically raises the potential of network loops in networks that have many bridges. A loop presents conflicting information on which segment a specific address is located and forces the device to forward all traffic.

By the mid-1990s, switching technology had emerged as the evolutionary heir to bridging based internetworking solutions. Superior throughput performance, higher port density, lower per-port cost, and greater flexibility have contributed to the emergence of switches as a replacement technology for bridges and as a complementary technology to routing.

Filed Under: Networking

Latest Articles

Grill Aperture Monitors

In the 1960s, Sony developed an alternative tube technology known as Trinitron. It combined the three separate electron guns into one device: Sony refers to this as a Pan Focus gun. Most interesting of all, Trinitron … [Read More...]

Meeting the Agricultural Challenges of The Future with IoT

The Internet of Things is changing the future of many industries. One of the industries that will be most affected by the IoT is agriculture. It is well known that the world’s growing population will need more food in the future. But when you combine this trend with the effects that rising … [Read More...]

Win98 Installation Tuning

The final task is to fine-tune your Windows installation, especially if you elected to Install the most common components during the course of the installation. You can do this by clicking Start > Settings > Control Panel > Add/Remove Programs and then selecting the Windows Setup tab. … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

WHAT IS CLOUD COMPUTING AND WHAT ARE ITS MAIN BENEFITS?

Users are Increasingly using cloud computing to store their information, which is replacing local storage. The business digitization process goes … [Read More...]

AI-Driven Software Improves Trading Strategies for Investors

Artificial intelligence technology is changing the state of modern finance. A growing number of investors are utilizing AI to improve the … [Read More...]

What You Need to Know When Choosing the Best VPN for an iPhones

Today millions of people have smartphones; most use them to access the Internet. Research shows that more than 50% of Internet users access it with … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

How to Remove Live Security Platinum

Live Security Platinum is a fake antivirus program.  It's the exact same as several other malware viruses.  We already have a guide on Smart Fortress … [Read More...]

Squeeze All You Can from Your Laptop Battery

you can never seem to find an electrical outlet. It seems everywhere you turn there are electrical plugs except when you need them most. And, getting … [Read More...]

Kong Games Ads Removal

Kong Games Ads is another type of adware that will display ads on your computer. They will show up in the web pages you visit and can become very … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors