Computer Network (3150710) 240673107004
Practical : 3
Aim : Implementation of topologies using switch and Hub in Packet
Tracer.
❖ What Is Topologies?
• Topology in networking refers to the structure or layout of how computers, cables,
devices, and connections are arranged in a network. It defines how different nodes
(computers, printers, routers, etc.) in a network are physically connected (physical
topology) or logically communicate (logical topology).
❖ Types Of Topologies:
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Hybrid Topology
6. Tree Topology
1. Bus Topology:
• A Bus Topology is one of them. All of the devices in a bus topology network are linked
together by a single cable, which is referred to as a "bus" and the cable is known as
backbone cable.
• All of the network's devices can simultaneously receive the same signal due to the
shared communication medium provided by this connection.
• Bus topology carries transmitted data through the cable because data reaches each node,
the node checks the destination address (MAC/IP address) to determine if it matches
their address.
• If the address does not match with the node, the node does nothing more.
1
Computer Network (3150710) 240673107004
• But if the addresses of nodes match to addresses contained within the data then they
process knowledge.
• In the bus, communication between nodes is done through a foremost network cable.
Advantages of Bus Topology :
• It is the easiest network topology for linearly connecting peripherals or computers.
• It works very efficiently well when there is a small network.
• The length of cable required is less than a star topology.
Disadvantages of Bus Topology:
• Bus topology is not good for large networks.
• Identification of problems becomes difficult if the whole network goes down.
• Troubleshooting individual device issues is very hard.
Applications of Bus Topology:
1. Local Area Networks (LANs): Bus topology was traditionally utilized in Ethernet
LANs , mainly in older implementations wherein Coaxial cable have been daisy-
chained to connect computer systems.
2. Industrial Control Systems: In industrial control system, bus topology is frequently
used for connecting sensors, actuators, and different devices in distributed manipulate
systems.
3. Instrumentation Networks: Bus topology is appropriate for connecting devices,
meters, and records acquisition gadgets in laboratory or commercial environments.
2. Star Topology:
• Star Topology is a network setup in which each device is connected to a central node
called a hub.
• The hub manages the data flow between the devices.
• If one device wants to send data to another device, it has to first send the information
to the hub, and then the hub transmits that data to the required device.
2
Computer Network (3150710) 240673107004
• A star may be a Local Area Network (LAN) topology where all nodes are individually
connected to a central connection point (hub).
• The number of links required to connect nodes in the star topology is N where N is the
number of nodes.
• The hub or switch manages and controls all functions of the network.
Advantages of Star Topology:
• It is very reliable as if one cable or device fails then all the others will still work.
• It is high performing as no data collisions can occur.
• It is less expensive because each device only needs one I/O port and wishes to be
connected to the hub with one link.
Disadvantages of Star Topology:
• Requires more cable than bus topology.
• If the connecting network device (network switch) fails, the nodes attached are disabled
and can't participate in network communication.
• More expensive than linear bus topology due to the value of the connecting devices
(network switches).
Applications of Star Topology:
• Home Networks: Many home networks utilize star topology for its simplicity and
effectiveness. With various devices like computers, smartphones, and printers
connecting to a central router, families can easily share resources and connect to the
internet.
• Wireless Networks: Businesses prefer star networks for their scalability and reliability.
As companies grow, they can easily expand their networks by adding new devices
without major disruptions. Moreover, centralized management allows IT departments
to monitor network performance and security more effectively.
• Telecommunication Networks: In telecommunications, star topology is used to
connect multiple nodes to a central system. This structure ensures robust
communication links and easy integration of additional services, enhancing the overall
efficiency of the telecommunications infrastructure.
• Educational Institutions: Many schools and universities implement star networks in
computer labs and administrative offices. The ease of maintenance and reliability
makes it ideal for environments with high user activity.
3. Ring Topology:
• Ring Topology may be a network configuration where device connections create a
circular data path.
3
Computer Network (3150710) 240673107004
• In this each device is connected to with its exactly two neighboring devices, like points
on a circle which forms like a ring structure.
• A number of repeaters are used for Ring topology with a large number of nodes to send
data and to prevent data loss repeaters are used in this network.
• Together, devices during a ring topology are mentioned as a hoop network.
• In this Packets travels from one device to another until they reach the desired
destination.
• In this data travels in unidirectional forms means in only one direction but it can also
do bidirectional by having 2 connections between each Network Node, it is called Dual
Ring Topology.
• It is used in LANs and WANs depending on the card of network in the computer.
Advantages of Ring topology:
• In this data flows in one direction which reduces the chance of packet collisions.
• In this topology additional workstations can be added after without impacting
performance of the network.
• Equal access to the resources.
• There is no need of server to control the connectivity among the nodes in the topology.
Disadvantages of Ring topology:
• Due to the Uni-directional Ring, a data packet (token) must have to pass through all the
nodes.
• If one workstation shuts down, it affects whole network or if a node goes down entire
network goes down.
• It is slower in performance as compared to the bus topology
• It is Expensive.
4
Computer Network (3150710) 240673107004
Application Ring Topology:
• This topology is used in the local area network and wide area networks.
• This type of topology is frequently used in the telecommunication industry and is
commonly used in SONET fiber networks.
• It is used as a backup system in various companies for their existing network.
• Once the connection is misplaced through a node, and then it uses the bidirectional
capacity to route traffic in one more way.
• It is applicable in educational institutions.
4. Mesh Topology:
• Mesh Topology is a network configuration where every device is interconnected with
every other device, providing multiple route for data to travel.
• The nodes are connected to each other completely via a dedicated link during which
information travels from nodes to nodes.
• If a mesh network has N nodes, then there are N(N-1)/2 links. Each computer not only
sends its signals but also transfer data from other computers.
• The connections within the mesh are often wired or wireless. In this article, we will
discuss the Mesh Topology in detail.
Advantages of Mesh Topology:
• In case of failure of a single device, the entire network didn't break.
• There is no traffic problem as there is a dedicated point to point links for every device.
• Mesh Topology provides high privacy and security.
• Data transmission is more consistent because failure doesn’t disrupt its processes.
Disadvantages of Mesh Topology:
5
Computer Network (3150710) 240673107004
• Mesh Topology is costly as compared to the other network topologies i.e. star, bus,
point to point topology.
• Installation of nodes are difficult in mesh topology.
• Power requirement is higher as all the nodes will need to remain active all the time and
share the load.
Applications of Mesh Topology:
• Below mentioned are some of the applications of Mesh Topology:
• Wireless Networks: Many homes and small office spaces uses Mesh Wi-fi System for
better internet coverage and connectivity.
• Industrial and Manufacturing Networks: Many industries uses mesh topology to control
machinery, ensuring better productivity.
• Smart Homes: Some advanced homes also use mesh topology for connecting home
appliances like smart lights, security systems, etc.
• Military Communication: Mesh Topology are used in Military Purposes as if one
connection fails, then there is always a chance of another connection.
5. Hybrid Topology:
• A hybrid topology is defined as a network topology that combines two or more different
network topologies.
• A hybrid topology can be a combination of bus topology, ring topology and mesh
topology.
• The selection of different types of network topologies combined together depends upon
the number of computers, their location, and the required performance.
• In the hybrid topology network sections consist of a configuration of different types of
network topologies.
6
Computer Network (3150710) 240673107004
• The structure of hybrid topology is more complex but offers various advantages such
as flexibility and fault tolerance.
Advantages of Hybrid Topology:
• Adding a new node or deleting the existing node is easy in hybrid topologies.
• Hybrid topology is more secure, reliable, and scalable as compared to individual star,
ring and mesh topology.
• Error detection and troubleshooting is easier in hybrid topology.
Disadvantages of Hybrid Topology:
• The design and implementation of hybrid network topology is difficult.
• More number of cables and other physical devices are required for hybrid topology.
• The process of installation of hybrid topology is difficult.
• The overall implementation, setup and process of hybrid topology is much more
costlier.
Application of Hybrid Topology:
• This topology is used in many fields of automated industries, the financial sector, the
banking sector, research organizations, multinational companies, educational
institutions, and many more.
• This topology is very helpful when you need to fulfill diversity within the computer
network.
6. Tree Topology:
• Network topology is the systematic arrangement of the elements (such as links and
nodes) within a communication network.
• A tree topology, or star-bus topology, is a hybrid network topology in which star
networks are interconnected via bus networks.
• Tree networks are organized hierarchically, allowing each node to have child nodes.
7
Computer Network (3150710) 240673107004
• It merges the features of both star and bus topologies.
• It includes a node known as the root that connects to one or more star networks called
branches.
• The primary purpose of tree topology is to create large and complex networks that
can span long distances and support multiple devices.
• It enables better management and control of the network structure.
Advantages of tree Topology :
• Scalability: It is highly scalable as one can expand the devices and subnetworks by
adding branches and levels to the network.
• Flexibility: It can accommodate diverse sub-network types and sizes using different
hubs and cables.
• Reliability: One can easily isolate errors with in the network without impacting the
root node. Hence, it is highly reliable as compared to other topologies.
• Security: Security is everyone’s concern. It enhances security as well as privacy
through channels or links.
Disadvantages of tree Topology:
• Complexity: The installation, configuration, and maintenance of this topology can be
complex for multi-level networks.
• Cost: The cost associated with setting this topology up is relatively high as we require
cables, hubs, and various other network devices for its proper functioning. Hence, the
overall cost increases.
• Dependency: In this topology, if the root node and backbone stop working by any
chance, then the overall network will be affected by it.
Application of tree Topology:
• Tree topology has several practical applications, the most common of which is its
usage in computer networks.
• It facilitates the connection of networks, enabling communication and data exchange
among devices.
Implementation:
Step 1: First, open the cisco packet tracer desktop and select the devices given below:
8
Computer Network (3150710) 240673107004
S.NO Device Model-Name
1. PC PC
2. Switch PT-Switch
IP Addressing Table
S.NO Device IPv4 Address Subnet Mask
pc0 192.168.0.1 255.255.255.0
pc1 192.168.0.2 255.255.255.0
pc2 192.168.0.3 255.255.255.0
pc3 192.168.0.4 255.255.255.0
• Then, create a network topology as shown below image:
• Use an Automatic connecting cable to connect the devices with others.
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP
addressing table given above.
9
Computer Network (3150710) 240673107004
• To assign an IP address in PC0, click on PC0.
• Then, go to desktop and then IP configuration and there you will IPv4 configuration.
• Fill IPv4 address and subnet mask.
• Assigning an IP address using the ipconfig command, or we can also assign an IP address
with the help of a command.
• Go to the command terminal of the PC.
• Then, type ipconfig <IPv4 address><subnet mask><default gateway>(if needed)
Example: ipconfig 192.168.0.1 255.255.255.0
10
Computer Network (3150710) 240673107004
• Repeat the same procedure with other PCs to configure them thoroughly.
Step 3: Verify the connection by pinging the IP address of any host in PC0.
• Use the ping command to verify the connection.
• As we can see we are getting replies from a targeted node on both PCs.
• Hence the connection is verified.
11
Computer Network (3150710) 240673107004
Steps Implementing Star Topology using Cisco Packet Tracer:
Step 1: We have taken a switch and linked it to six end devices.
Step 2: Link every device with the switch.
Step 3: Provide the IP address to each device.
12
Computer Network (3150710) 240673107004
Step 4: Transfer message from one device to another and check the Table for Validation.
Now to check whether the connections are correct or not try to ping any device and the image
below is doing the same.
To do ping one terminal of one device and run the following command:
Command:
"ping ip_address_of _any_device"
13
Computer Network (3150710) 240673107004
Example:
ping 192.168.1.4
➢ Steps to Configure and Setup Ring Topology in Cisco Packet Tracer :
Step 1: First, open the cisco packet tracer desktop and select the devices given below:
S.NO Device Model Name
1. PC PC
2. Switch PT-Switch
• IP Addressing Table
S.NO Device IPv4 Address Subnet Mask
1. pc0 192.168.0.1 255.255.255.0
2. pc1 192.168.0.2 255.255.255.0
3. pc2 192.168.0.3 255.255.255.0
14
Computer Network (3150710) 240673107004
S.NO Device IPv4 Address Subnet Mask
4. pc3 192.168.0.4 255.255.255.0
• Then, create a network topology as shown below the image.
• Use an Automatic connecting cable to connect the devices with others.
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP
addressing table given above.
• To assign an IP address in PC0, click on PC0.
• Then, go to desktop and then IP configuration and there you will IPv4 configuration.
• Fill IPv4 address and subnet mask.
15
Computer Network (3150710) 240673107004
• Assigning IP address using the ipconfig command, or we can also assign an IP address
with the help of a command.
• Go to the command terminal of the PC.
• Then, type ipconfig <IPv4 address><subnet mask><default gateway>(if needed)
Example: ipconfig 192.168.0.1 255.255.255.0
• Repeat the same procedure with other PCs to configure them thoroughly.
16
Computer Network (3150710) 240673107004
Step 3: Verify the connection by pinging the IP address of any host in PC0.
• Use the ping command to verify the connection.
• As we can see we are getting replies from a targeted node on both PCs.
• Hence the connection is verified.
• A simulation of the experiment is given below we have sent two PDU packets one
targeted from PC0 to PC2 and another targeted from PC1 to PC3.
Step 1: First, open the Cisco packet tracer desktop and select the devices given below:
Model name
S.NO Device
PC PC
1.
17
Computer Network (3150710) 240673107004
Model name
S.NO Device
Switch PT-switch
2.
IP Addressing Table:
Subnet Mask
S.NO Device IPv4 Address
pc0 192.168.0.1 255.255.255.0
1.
pc1 192.168.0.2 255.255.255.0
2.
pc2 192.168.0.3 255.255.255.0
3.
pc3 192.168.0.4 255.255.255.0
4.
• Then, create a network topology as shown below the image.
• Use an Automatic connecting cable to connect the devices with others.
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP
addressing table given above.
• To assign an IP address in PC0, click on PC0.
18
Computer Network (3150710) 240673107004
• Then, go to desktop and then IP configuration and there you will IPv4 configuration.
• Fill IPv4 address and subnet mask.
• Assigning IP address using the ipconfig command.
• Also, we can also assign an IP address with the help of a command.
• Go to the command terminal of the PC.
• Then, type ipconfig <IPv4 address><subnet mask><default gateway>(if needed)
Example: ipconfig 192.168.0.1 255.255.255.0
19
Computer Network (3150710) 240673107004
• Repeat the same procedure with other PCs to configure them thoroughly.
Step 3: Verify the connection by pinging the IP address of any host in PC0.
• Use the ping command to verify the connection.
• We will check if we are getting any replies or not.
• Here we get replies from a targeted node on both PCs.
20
Computer Network (3150710) 240673107004
• Hence the connection is verified.
• A simulation of the experiment is given below we have sent two PDU packets one
targeted from PC0 to PC3 and another targeted from PC1 to PC2.
EXERCISE:
1. Create and draw the LAN of 10 computers using Class C Address.
2. Connect and draw two LAN (Each of having 6 Computers) with each other using class B
Address.
3. List out different types of transmission media with all its subcategories and explain each
in brief.
EVALUATION:
Problem Analysis Understanding Timely Completion Mock Total
& Solution Level
(3) (3) (2) (2) (10)
Signature with date:____________
21