You are on page 1of 6

EC-332 Computer Communication Networks

BS (CE)-2k19
LAB REPORT #05

Submitted By:
Reg. No. 19-CE-042
Name: Waqar Ahmed khan
Department of Computer Engineering
HITEC University Taxila
Presentation
(Format(0.5)+ Total
Title (0.5)+ Calculation Observation/
Conclusion(1) /Coding Program Results
+Theory(2)+
Objective(1))
Total 5 5 5 15
Obtained

___________________________
Lab Instructor.

Kaynat Rana
Experiment #05
Title: Implementation of Bridges and Spanning Tree Protocol
Objective
The objective of this lab is to implement the Bridges and Spanning Tree Protocol by using Cisco
Packet Tracer.

Software Used
 Cisco Packet Tracer

Theory
1. Bridge in Networking

A bridge in a computer network is one kind of network device, used to separate a network into
sections. Every section in the network represents a collision domain that has separate bandwidth.
So that network performance can be improved using a bridge. In the OSI model, a bridge works
at layer-2 namely the data link layer. The main function of this is to examine the incoming traffic
and examine whether to filter it or forward it.

 Working Principle

The working principle of a bridge is, it blocks or forwards the data depending on the destination
MAC address and this address is written into every data frame.In a computer network, a bridge
separates a LAN into different segments like segment1 & segment2, etc. and the MAC address
of all the PCs can be stored into the table. For instance, PC1 transmits the data to PC2, where the
data will transmit to the bridge first. So the bridge reads the MAC address & decides whether to
transmit the data to segment1 or segment2. Therefore, the PC2 is accessible in segment1, which
means the bridge transmits the data in segment1 only & eliminates all the connected PCs in
segment2. In this way, the bridge reduces traffic in a computer network.

 Use of Bridge in Computer Network

A bridge in a computer network connects with other bridge networks that utilize a similar
protocol. These network devices work at the data link layer in an OSI model to connect two
different networks and provide communication between them. Like hubs and repeaters, bridges
broadcast data to each node. But maintains the MAC (media access control) address table to find
out new segments. So, following transmissions are transmitted to the preferred receiver only.A
bridge utilizes a database to determine where to transmit otherwise remove the data frame.
2. Spanning Tree Protocol (STP)

STP is a link management protocol designed to support redundant links that stops switching
loops in the STP network. It is a Layer 2 protocol that runs on bridges and switches, which
should be enabled on the switch interfaces. IEEE standardized STP protocols as IEE 802.1D.

 How STP works?

Spanning trees use an algorithm to search for the redundant links in the LAN and select the best
paths. It is mainly used to put all links in either forwarding or blocking.

After this process, all the links without a redundant link is likely to be in the forwarding state.
The redundant links that were not as good as the selected links would be blocking. Spanning
Tree never uses multiple links to the same destination. There is no load-sharing feature with
Spanning Tree.

 Criteria for Spanning Tree

The three criteria for Spanning Tree loop helps to decide that interface are of the forwarding state
are:

 All interfaces on the root bridge should be put in a forwarding state.


 For other bridges that are not the root bridge, the port which is closest to the root bridge is
put in a forwarding state.
 The bridge with the lowest admin distance to the root bridge is known as the designated
bridge.

Lab Tasks
Simulate a configuration of the network topology which contains two clients and ten switches
find out which one is root among all switches, make one of them as a root, shut one link, and
change priority of one switch. Design the given network.
Conclusion
In this lab we learned about the Bridges and STP by using Cisco Packet Tracer.

You might also like