Search

Layer 2 Switching and Bridging

0 views

Understanding Bridges and Collision Domains

In any network design conversation, bridging inevitably appears, whether you’re looking at old‑school Ethernet or modern LANs. At its core, a bridge acts as a traffic filter that partitions a single collision domain into several smaller ones. A collision domain is simply the set of devices that share the same physical medium and therefore can interfere with each other’s transmissions. When devices are connected to a hub, the hub forwards every frame out all ports. Because the hub has no awareness of where a frame is headed, every device that is connected to the hub is in the same collision domain. As a result, any transmission can collide with another, forcing the devices to detect the collision, stop, back off, and then retransmit. These collisions degrade throughput and limit the overall bandwidth that each device can receive.

Bridges were introduced to cut that collision domain into smaller pieces. By attaching multiple ports, a bridge can forward frames only when necessary. Think of a bridge as a smart intersection: it knows which direction traffic needs to go and only opens the appropriate gates. The logic that decides whether a frame should be forwarded is based on the source and destination MAC addresses contained in the Ethernet frame. Because this logic operates at the data link layer (Layer 2), the device is classified as a bridge.

The first bridges ran the forwarding logic in software on a general‑purpose processor. Those devices were limited in the number of ports they could expose, usually no more than 16, and they processed frames at a speed that matched the 10 Mbps or 100 Mbps Ethernet links of the era. When a bridge receives a frame, it records the source MAC address along with the port the frame entered. Over time, this learning process builds a forwarding table that maps each known MAC address to a specific port. Once the table is populated, the bridge can decide, for each incoming frame, whether the destination address is in the same port, a different port, or unknown.

When a frame’s destination address is on the same port that the frame entered, the bridge discards it because the two devices are already sharing a collision domain and the frame would just cause a needless loop. If the destination is on a different port, the bridge forwards the frame only out that port. When the destination address is unknown – for example, a new device that has just powered on – the bridge floods the frame out every port except the one it arrived on. This ensures the frame reaches the intended host while keeping the forwarding table current. Broadcast frames, addressed to FF‑FF‑FF‑FF‑FF‑FF, are always flooded to every port except the source port because all devices on the LAN need to see the broadcast.

Bridges also preserve the broadcast domain. All ports on a bridge still share the same broadcast domain, meaning that a broadcast packet sent from any port will reach all other ports. The key difference is that bridges reduce the collision domain: each pair of devices that are connected to the same bridge port share a collision domain, while devices on different ports do not. By limiting the scope of collisions, bridges improve the overall reliability of the network, especially in environments where many devices need to communicate over a shared medium.

In practice, you might see a bridge deployed to isolate a departmental network, to segment a large office into logical units, or to separate legacy systems that still rely on hubs. Although bridges are largely supplanted by switches in most modern deployments, understanding their operation is essential for grasping how Layer 2 switching works today.

Hub Example – Single Collision Domain' /></p><h2>How Bridges Build Forwarding Tables and Manage Traffic</h2>
<p>Bridges learn which devices live on which ports by inspecting the source MAC address of every incoming frame. This learning process populates a dynamic forwarding table, a simple data structure that looks roughly like a lookup table of MAC addresses to ports. For example, after observing traffic from Computer 1 and Computer 2 on interface A, the bridge notes that both addresses belong to that port. Similarly, traffic from Computer 3 and Computer 4 on interface B tells the bridge that those addresses are reachable through interface B, and so forth. The learning process is continuous; as new devices appear, the bridge updates its table. If a device moves to a different port, the bridge eventually replaces the old entry with the new one once it sees traffic from that device on the new interface.</p>
<p>When a bridge receives a frame destined for a known address, it consults the forwarding table. If the table shows that the destination is on the same port as the source, the bridge drops the frame. This avoids unnecessary traffic within the same collision domain. If the destination is on a different port, the bridge forwards the frame only out that port, preventing other ports from processing traffic that isn’t meant for them. This selective forwarding reduces congestion on the shared medium and limits the number of collisions.</p>
<p>In contrast, when the bridge receives a frame for an unknown destination, it cannot decide where to send it. The bridge therefore floods the frame out all ports except the one it arrived on. This “unknown unicast” behavior ensures that the destination eventually receives the frame if it is present on the network. Once the destination replies, the bridge learns its MAC address and port, and subsequent frames to that address are forwarded only out the correct port. This mechanism allows bridges to discover new devices automatically without manual configuration.</p>
<p>Broadcast frames are treated differently. Because broadcasts are intended for every host, the bridge forwards them out all ports except the source port. This keeps all devices in the broadcast domain consistent. The combination of flooding for broadcasts and unknown unicasts, along with selective forwarding for known unicasts, gives bridges a robust traffic filtering capability that balances efficiency with universality.</p>
<p>Bridges also maintain aging timers on table entries. If the bridge does not see traffic from a particular MAC address for a configurable period (often 300 seconds), it removes that entry. This ensures the forwarding table remains up to date and prevents stale entries from causing misdirected traffic. Bridges can also be configured with static entries that never age out, useful for critical devices that should always be reachable on a specific port.</p>
<p>Because bridge logic is software‑based, the number of ports and the speed at which frames can be processed are limited. In practice, early bridges supported only a handful of ports, and their frame processing speeds were constrained by the CPU’s capabilities. These limitations made bridges less attractive for large, high‑traffic networks. The next evolutionary step - switches - addressed these constraints by moving the forwarding logic into specialized hardware.</p><img src=

Tags

Suggest a Correction

Found an error or have a suggestion? Let us know and we'll review it.

Share this article

Comments (0)

Please sign in to leave a comment.

No comments yet. Be the first to comment!

Related Articles