SlideShare a Scribd company logo
1 of 15
BRIDGING
WHAT IS BRIDGING???
 Bridge is used to connect two or more different LAN networks.
 It is a device used to connect LAN cable segment together.
 Bridge operates at Data-Link Layer.
 It can connect on different architecture like Ethernet and Token-ring.
WHY DO WE USE BRIDGING???
 It provide Packet Filtering, meaning it only passes the packet that are allow on
destination Network
HOW IT WORKS???
 Bridge examine each packet as it enters through one of the port, it first check
MAC address of the sender and create a mapping between the port and the
sender MAC address. Then it looks the MAC address of Destination and
compare the list of all learned MAC addresses. If the address is in the list then
bridge look up the port number and forward the packet to the port where the
destination is connected. If the destination’s MAC address is not in the list, the
bridge blocks the data from passing.
CHARACTERISTICS OF BRIDGES
Routing Tables
 It contain one entry per station of network
to which bridge is connected.
 It is used to determine the network of
destination station of a received packet.
Filtering
 It is used by bridge to allow only those
packet destined to the remote network.
 Packets are filtered with respect to their
destination and multicast addresses.
Forwarding
The process of passing the Ticket from one
network to another.
Learning Algorithm
The process by which the bridge learns how
to reach stations on the internetwork.
TYPES OF BRIDGING
 Transparent Bridging
 Translational Bridging
 Source-route Bridging
 Local Bridging
 Remote Bridging
TRANSPARENT BRIDGING
 Also called learning bridges.
 Build a table of MAC addresses as frames arrive.
 Ethernet networks use transparent bridge.
Duties of transparent bridge
 Filtering Frames
 Forwarding
 Blocking
TRANSLATIONAL BRIDGING
 Useful to connect segments running at different speeds or using different
protocols such as token Ring and Ethernet networks.
 Translational Bridge can add or remove information and fields from frame as
needed.
SOURCE-ROUTE BRIDGING
 Used in Token Ring networks.
 Each station should determine the route to the destination when it wants to
send a frame and therefore include the route information in the header of
frame.
 Addresses of these bridges are included in the frame.
 Frame contains not only the source and destination address but also the
bridge addresses.
LOCAL BRIDGING
 MAC-layer Bridge
 Provides packet filtering and repeating services for the network segments of
the same type.
 Simplest type of Bridge because it has no need for packet filtering or
buffering.
 This Bridge simply propagates the incoming packets to the appropriate ports
or discard them.
REMOTE BRIDGING
 Connects network segments at different locations, using WAN link such as
MODEM or Leased line. The difference in speed between Local and wide area
links.
 Remote Bridge uses internal buffer to store the data received from LAN while
it is waiting for transmission to the remote site.
ADVANTAGES OF BRIDGING
 It is simple and significant.
 It prevents unnecessary traffic from crossing onto network.
 It helps to isolate the busy network to not-so-busy network.
DISADVANTAGES OF BRIDGING
 It is slower than HUB & repeater because they examine each frame’s source
and destination addresses.
 Bridge provide no protection against Broadcasting.
 Bridge cant make decision about routes through the Network.
 Expensive
WIRELESS AND WIRED BRIDGING
Wired Bridging
 Work on Layer 2 in OSI Model
 Only know about MAC Address
Wireless Bridging (Wireless Access
Point)
 Work on Layer 3 in OSI Model
 Know about IP address, Subnet
Mask, Routing etc.
THANK YOU…

More Related Content

What's hot

switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 

What's hot (20)

switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Vlan
Vlan Vlan
Vlan
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Routing
RoutingRouting
Routing
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Data link layer
Data link layer Data link layer
Data link layer
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Gateway Networking
Gateway NetworkingGateway Networking
Gateway Networking
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 

Similar to Bridging in Networking

Configuration of bridges
Configuration of bridgesConfiguration of bridges
Configuration of bridgesSwasti Arya
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986sherifmeetme
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answersAmit Tiwari
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their securitylovizabasharat
 
Basic Networking
Basic NetworkingBasic Networking
Basic NetworkingCEC Landran
 
network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptEliasPetros
 

Similar to Bridging in Networking (20)

Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Interconnecting devies
Interconnecting deviesInterconnecting devies
Interconnecting devies
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Configuration of bridges
Configuration of bridgesConfiguration of bridges
Configuration of bridges
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
 
Bridge
BridgeBridge
Bridge
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Bridging.ppt
Bridging.pptBridging.ppt
Bridging.ppt
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
network hardware
network hardwarenetwork hardware
network hardware
 
Networkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukarNetworkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukar
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Computer networking
Computer networkingComputer networking
Computer networking
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Bridging in Networking

  • 2. WHAT IS BRIDGING???  Bridge is used to connect two or more different LAN networks.  It is a device used to connect LAN cable segment together.  Bridge operates at Data-Link Layer.  It can connect on different architecture like Ethernet and Token-ring.
  • 3. WHY DO WE USE BRIDGING???  It provide Packet Filtering, meaning it only passes the packet that are allow on destination Network
  • 4. HOW IT WORKS???  Bridge examine each packet as it enters through one of the port, it first check MAC address of the sender and create a mapping between the port and the sender MAC address. Then it looks the MAC address of Destination and compare the list of all learned MAC addresses. If the address is in the list then bridge look up the port number and forward the packet to the port where the destination is connected. If the destination’s MAC address is not in the list, the bridge blocks the data from passing.
  • 5. CHARACTERISTICS OF BRIDGES Routing Tables  It contain one entry per station of network to which bridge is connected.  It is used to determine the network of destination station of a received packet. Filtering  It is used by bridge to allow only those packet destined to the remote network.  Packets are filtered with respect to their destination and multicast addresses. Forwarding The process of passing the Ticket from one network to another. Learning Algorithm The process by which the bridge learns how to reach stations on the internetwork.
  • 6. TYPES OF BRIDGING  Transparent Bridging  Translational Bridging  Source-route Bridging  Local Bridging  Remote Bridging
  • 7. TRANSPARENT BRIDGING  Also called learning bridges.  Build a table of MAC addresses as frames arrive.  Ethernet networks use transparent bridge. Duties of transparent bridge  Filtering Frames  Forwarding  Blocking
  • 8. TRANSLATIONAL BRIDGING  Useful to connect segments running at different speeds or using different protocols such as token Ring and Ethernet networks.  Translational Bridge can add or remove information and fields from frame as needed.
  • 9. SOURCE-ROUTE BRIDGING  Used in Token Ring networks.  Each station should determine the route to the destination when it wants to send a frame and therefore include the route information in the header of frame.  Addresses of these bridges are included in the frame.  Frame contains not only the source and destination address but also the bridge addresses.
  • 10. LOCAL BRIDGING  MAC-layer Bridge  Provides packet filtering and repeating services for the network segments of the same type.  Simplest type of Bridge because it has no need for packet filtering or buffering.  This Bridge simply propagates the incoming packets to the appropriate ports or discard them.
  • 11. REMOTE BRIDGING  Connects network segments at different locations, using WAN link such as MODEM or Leased line. The difference in speed between Local and wide area links.  Remote Bridge uses internal buffer to store the data received from LAN while it is waiting for transmission to the remote site.
  • 12. ADVANTAGES OF BRIDGING  It is simple and significant.  It prevents unnecessary traffic from crossing onto network.  It helps to isolate the busy network to not-so-busy network.
  • 13. DISADVANTAGES OF BRIDGING  It is slower than HUB & repeater because they examine each frame’s source and destination addresses.  Bridge provide no protection against Broadcasting.  Bridge cant make decision about routes through the Network.  Expensive
  • 14. WIRELESS AND WIRED BRIDGING Wired Bridging  Work on Layer 2 in OSI Model  Only know about MAC Address Wireless Bridging (Wireless Access Point)  Work on Layer 3 in OSI Model  Know about IP address, Subnet Mask, Routing etc.