SlideShare una empresa de Scribd logo
1 de 15
BRIDGING
WHAT IS BRIDGING???
 Bridge is used to connect two or more different LAN networks.
 It is a device used to connect LAN cable segment together.
 Bridge operates at Data-Link Layer.
 It can connect on different architecture like Ethernet and Token-ring.
WHY DO WE USE BRIDGING???
 It provide Packet Filtering, meaning it only passes the packet that are allow on
destination Network
HOW IT WORKS???
 Bridge examine each packet as it enters through one of the port, it first check
MAC address of the sender and create a mapping between the port and the
sender MAC address. Then it looks the MAC address of Destination and
compare the list of all learned MAC addresses. If the address is in the list then
bridge look up the port number and forward the packet to the port where the
destination is connected. If the destination’s MAC address is not in the list, the
bridge blocks the data from passing.
CHARACTERISTICS OF BRIDGES
Routing Tables
 It contain one entry per station of network
to which bridge is connected.
 It is used to determine the network of
destination station of a received packet.
Filtering
 It is used by bridge to allow only those
packet destined to the remote network.
 Packets are filtered with respect to their
destination and multicast addresses.
Forwarding
The process of passing the Ticket from one
network to another.
Learning Algorithm
The process by which the bridge learns how
to reach stations on the internetwork.
TYPES OF BRIDGING
 Transparent Bridging
 Translational Bridging
 Source-route Bridging
 Local Bridging
 Remote Bridging
TRANSPARENT BRIDGING
 Also called learning bridges.
 Build a table of MAC addresses as frames arrive.
 Ethernet networks use transparent bridge.
Duties of transparent bridge
 Filtering Frames
 Forwarding
 Blocking
TRANSLATIONAL BRIDGING
 Useful to connect segments running at different speeds or using different
protocols such as token Ring and Ethernet networks.
 Translational Bridge can add or remove information and fields from frame as
needed.
SOURCE-ROUTE BRIDGING
 Used in Token Ring networks.
 Each station should determine the route to the destination when it wants to
send a frame and therefore include the route information in the header of
frame.
 Addresses of these bridges are included in the frame.
 Frame contains not only the source and destination address but also the
bridge addresses.
LOCAL BRIDGING
 MAC-layer Bridge
 Provides packet filtering and repeating services for the network segments of
the same type.
 Simplest type of Bridge because it has no need for packet filtering or
buffering.
 This Bridge simply propagates the incoming packets to the appropriate ports
or discard them.
REMOTE BRIDGING
 Connects network segments at different locations, using WAN link such as
MODEM or Leased line. The difference in speed between Local and wide area
links.
 Remote Bridge uses internal buffer to store the data received from LAN while
it is waiting for transmission to the remote site.
ADVANTAGES OF BRIDGING
 It is simple and significant.
 It prevents unnecessary traffic from crossing onto network.
 It helps to isolate the busy network to not-so-busy network.
DISADVANTAGES OF BRIDGING
 It is slower than HUB & repeater because they examine each frame’s source
and destination addresses.
 Bridge provide no protection against Broadcasting.
 Bridge cant make decision about routes through the Network.
 Expensive
WIRELESS AND WIRED BRIDGING
Wired Bridging
 Work on Layer 2 in OSI Model
 Only know about MAC Address
Wireless Bridging (Wireless Access
Point)
 Work on Layer 3 in OSI Model
 Know about IP address, Subnet
Mask, Routing etc.
THANK YOU…

Más contenido relacionado

La actualidad más candente

Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer ProtocolsMeenakshi Paul
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterMaksudujjaman
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithmBasit Hussain
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentationViet Nguyen
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1Hossam El-Deen Osama
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Osi model
Osi modelOsi model
Osi modelOnline
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 

La actualidad más candente (20)

Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
Routing
RoutingRouting
Routing
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Ethernet
EthernetEthernet
Ethernet
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Osi model
Osi modelOsi model
Osi model
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 

Similar a Bridging in Networking

Configuration of bridges
Configuration of bridgesConfiguration of bridges
Configuration of bridgesSwasti Arya
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986sherifmeetme
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answersAmit Tiwari
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their securitylovizabasharat
 
Basic Networking
Basic NetworkingBasic Networking
Basic NetworkingCEC Landran
 
network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptEliasPetros
 

Similar a Bridging in Networking (20)

Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Interconnecting devies
Interconnecting deviesInterconnecting devies
Interconnecting devies
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Configuration of bridges
Configuration of bridgesConfiguration of bridges
Configuration of bridges
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
 
Bridge
BridgeBridge
Bridge
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Bridging.ppt
Bridging.pptBridging.ppt
Bridging.ppt
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
network hardware
network hardwarenetwork hardware
network hardware
 
Networkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukarNetworkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukar
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Computer networking
Computer networkingComputer networking
Computer networking
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Bridging in Networking

  • 2. WHAT IS BRIDGING???  Bridge is used to connect two or more different LAN networks.  It is a device used to connect LAN cable segment together.  Bridge operates at Data-Link Layer.  It can connect on different architecture like Ethernet and Token-ring.
  • 3. WHY DO WE USE BRIDGING???  It provide Packet Filtering, meaning it only passes the packet that are allow on destination Network
  • 4. HOW IT WORKS???  Bridge examine each packet as it enters through one of the port, it first check MAC address of the sender and create a mapping between the port and the sender MAC address. Then it looks the MAC address of Destination and compare the list of all learned MAC addresses. If the address is in the list then bridge look up the port number and forward the packet to the port where the destination is connected. If the destination’s MAC address is not in the list, the bridge blocks the data from passing.
  • 5. CHARACTERISTICS OF BRIDGES Routing Tables  It contain one entry per station of network to which bridge is connected.  It is used to determine the network of destination station of a received packet. Filtering  It is used by bridge to allow only those packet destined to the remote network.  Packets are filtered with respect to their destination and multicast addresses. Forwarding The process of passing the Ticket from one network to another. Learning Algorithm The process by which the bridge learns how to reach stations on the internetwork.
  • 6. TYPES OF BRIDGING  Transparent Bridging  Translational Bridging  Source-route Bridging  Local Bridging  Remote Bridging
  • 7. TRANSPARENT BRIDGING  Also called learning bridges.  Build a table of MAC addresses as frames arrive.  Ethernet networks use transparent bridge. Duties of transparent bridge  Filtering Frames  Forwarding  Blocking
  • 8. TRANSLATIONAL BRIDGING  Useful to connect segments running at different speeds or using different protocols such as token Ring and Ethernet networks.  Translational Bridge can add or remove information and fields from frame as needed.
  • 9. SOURCE-ROUTE BRIDGING  Used in Token Ring networks.  Each station should determine the route to the destination when it wants to send a frame and therefore include the route information in the header of frame.  Addresses of these bridges are included in the frame.  Frame contains not only the source and destination address but also the bridge addresses.
  • 10. LOCAL BRIDGING  MAC-layer Bridge  Provides packet filtering and repeating services for the network segments of the same type.  Simplest type of Bridge because it has no need for packet filtering or buffering.  This Bridge simply propagates the incoming packets to the appropriate ports or discard them.
  • 11. REMOTE BRIDGING  Connects network segments at different locations, using WAN link such as MODEM or Leased line. The difference in speed between Local and wide area links.  Remote Bridge uses internal buffer to store the data received from LAN while it is waiting for transmission to the remote site.
  • 12. ADVANTAGES OF BRIDGING  It is simple and significant.  It prevents unnecessary traffic from crossing onto network.  It helps to isolate the busy network to not-so-busy network.
  • 13. DISADVANTAGES OF BRIDGING  It is slower than HUB & repeater because they examine each frame’s source and destination addresses.  Bridge provide no protection against Broadcasting.  Bridge cant make decision about routes through the Network.  Expensive
  • 14. WIRELESS AND WIRED BRIDGING Wired Bridging  Work on Layer 2 in OSI Model  Only know about MAC Address Wireless Bridging (Wireless Access Point)  Work on Layer 3 in OSI Model  Know about IP address, Subnet Mask, Routing etc.