0% found this document useful (1 vote)
216 views25 pages

Networking Topologies Guide

The document discusses various computer network topologies including bus, star, ring, tree, mesh, and hybrid topologies. It also describes the usage of basic tools used in establishing a local area network (LAN) such as crimping tools, which are used to connect wires to connectors, and testers, which are used to verify electrical connections in cables. The document provides information on network topologies and basic networking tools for a computer networks practical file.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
216 views25 pages

Networking Topologies Guide

The document discusses various computer network topologies including bus, star, ring, tree, mesh, and hybrid topologies. It also describes the usage of basic tools used in establishing a local area network (LAN) such as crimping tools, which are used to connect wires to connectors, and testers, which are used to verify electrical connections in cables. The document provides information on network topologies and basic networking tools for a computer networks practical file.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Computer Networks-I BTCS-407

DAV INSTITUTE OF ENGINEERING


AND TECHNOLOGY

COMPUTER NETWORKS PRACTICAL FILE

Guided By - Dr. Dinesh Kumar Prepared By- Anuj Bhalla


Roll No. – 406/17
IT (4th) Sem

DAVIET/IT/1604624 1
Computer Networks-I BTCS-407

1.To Study Various Topologies for Establishing Computer Networks


TOPOLOGY
Network topology is the arrangement of the various elements of a computer network. Essentially,
it is the topological structure of a network and may be depicted physically or logically. Physical
topology is the placement of the various components of a network, including device location and
cable installation, while logical topology illustrates how data flows within a network, regardless
of its physical design. Distances between nodes, physical interconnections, transmission rates, or
signal types may differ between two networks, yet their topologies may be identical.
An example is a local area network (LAN). Any given node in the LAN has one or more
physical links to other devices in the network; graphically mapping these links results in a
geometric shape that can be used to describe the physical topology of the network. Conversely,
mapping the data flow between the components determines the logical topology of the network.

TYPES OF TOPOLOGY

BUS TOPOLOGY
 It is defined by the use of a single main cable which has terminators on both ends. All the other
nodes like workstations, peripherals, etc. are connected to this main cable. This type of topology
is widely implemented in LANs as it is easy to install and does not cost much. It also does not
require much cabling as in the case of some other topologies like star and mesh. The main
disadvantage of this topology is that the entire network is dependent on the main cable. In case
some problem occurs in the main cable, the whole system gets affected.

Fig 1.1 Bus Topology

DAVIET/IT/1604624 2
Computer Networks-I BTCS-407

Working: The sender end will send token on the bus and the receiver end will accept it only
then the communication will start. The sender will send token to ensure that only the receiver
that holds the token will get the data and other nodes connected in the network cannot penetrate
the data transfer.
STAR TOPOLOGY
It is named as star topology as it looks similar to a star whereas all the elements of the network
are primarily connected to a central device. This central device is known as hub and can be either
of a hub, router or a switch. This central hub also works as a repeater for data flow. A point-to-
point connection is laid between the devices and the central hub. Thus, all nodes are connected to
each other only by the assistance of this central hub. Installation and wiring is easy of star
topology. The functioning of the entire system depends on the central hub.

Fig 1.2 Star Topology


Working: The sender first send packet to server i.e. switch or hub or router then the server will
send data to the receiving end .Hub sends data to all the nodes connected in the network and it is
essential for the required node to accept it but the switch sends data to that particular node only.

RING TOPOLOGY
It is in a shape similar to a ring, in which every node is connected to only two neighbours. The
messages move in only one and the same direction in this arrangement. In case any cable or
device breaks away from the loop, then it can be a fatal problem for the entire network. Token
ring technology is used to implement this type of topology. It can be used for handling high
volume of data. All devices are given the same importance in this topology. In case the capacity
is increased beyond its comfortable limit then the network starts to compromise on speed.

Fig 1.3 Ring Topology


DAVIET/IT/1604624 3
Computer Networks-I BTCS-407

Working: The messages move in only one and the same direction in this arrangement. In case
any cable or device breaks away from the loop, then it can be a fatal problem for the entire
network. Token Ring uses a ring topology whereby the data is sent from one machine to the next
and so on around the ring until it ends up back where it started. It also uses a token passing
protocol which means that a machine can only use the network when it has control of the Token,
this ensures that there are no collisions because only one machine can use the network at any
given time.
TREE TOPOLOGY
It is also known as the hierarchical topology. It can be considered as the combination of linear
bus and star topologies as it contains systems with star topology connected to a linear bus main
cable. There is dependency on the main linear bus line, and therefore any fault in this line can
bring the entire segment down. However, this type of arrangement is supported by many
hardware and software tenders. This topology is also known as expanded star topology. The
configuration and wiring is difficult in comparison to other topologies. However, its point to
point wiring for individual sections is a desirable feature of this topology.

Fig1.4 Tree Topology


Working: Tree topology is the combination of star topology and bus topology. In this the
routers or switches are connected in a bus and the devices are connected in star topology or it is a
hybrid topology in which star networks are interconnected in bus network.

MESH TOPOLOGY
In this type of arrangement every node participating in the network is connected to every other
node. However, this tends to be very expensive and difficult to implement. Multiple paths are
can be used for transmitting a message. Due to the presence of dedicated links, it does not
provide any traffic problem. The management of this arrangement is tricky due to heavy wiring.
The system is configured in such a way that data takes the shortest path for reaching to its
destination. Fault identification is also easy in this type of topology.

DAVIET/IT/1604624 4
Computer Networks-I BTCS-407

Fig 1.5 Mesh Topology


Working: In this topology, each and every node (PC) is directly connected to every other
node. This makes this topology reliable but very expensive .Multiple paths are enabled to send
data.
HYBRID TOPOLOGY
It refers to the arrangement which is basically a combination of any two or more different types
of network topologies. This arrangement is known for its flexibility and reliability. It tends to be
little expensive. It depends upon the requirements of the organization, according to which the
topologies are selected for creating a hybrid one. Star-bus and star-ring are two popular hybrid
combinations. Corporate offices usually use this topology to link internal LANs while
connecting external networks via WANs.

Fig 1.6 Hybrid Topology


Working: Combination of any two or more topologies is considered in the category of hybrid
topology. This arrangement is known for its flexibility and reliability. The combination of
topologies depends upon the requirements of the organization.

DAVIET/IT/1604624 5
Computer Networks-I BTCS-407

2 .To Learn The Usage of Various Basic Tools Used in Establishing a LAN
Crimping Tool
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of
them in a way that causes them to hold each other. The result of the tool's work is called a crimp.
A good example of crimping is the process of affixing a connector to the end of a cable. For
instance, network cables and phone cables are created using a crimping tool (shown below) to
join the RJ-45 and RJ-11 connectors to the both ends of either phone or CAT5 cable.

Fig.2.1 Crimping Tool

Working: To use this crimping tool, each wire is first placed into the connector. Once all the
wires are in the jack, the connector with wires are placed into the crimping tool, and the handles
are squeezed together. Crimping punctures the plastic connector and holds each of the wires,
allowing for data to be transmitted through the connector.

Tester
A cable tester is an electronic device used to verify the electrical connections in a signal cable or
other wired assembly. Basic cable testers are continuity testers that verify the existence of a
conductive path between ends of the cable, and verify the correct wiring of connectors on the
cable. More advanced cable testers can measure the signal transmission properties of the cable
such as its resistance, signal attenuation, noise and interference.

Fig 2.2 Tester

DAVIET/IT/1604624 6
Computer Networks-I BTCS-407

Working: The top RJ45 connector sends signals to each of its eight legs. The lower RJ45
connector receives signals from the top RJ45 connector created by the wire.When the red LED
above the orange light LED bar shows the pins in the top RJ45 connector sends a test signal, and
when the bottom of the red LED illuminates orange LED bar indicates which of the eight
dioceses of the bottom RJ45 connector signal receives in this state where the wire is broken or
not connected, none of LEDs in the LED bar will light up orange.If a short circuit between two
or more wires, more than an orange LED lights up when the bottom red LED lights. Each time
the button is the active output pin.

Krone Tool
A krone tool, also called a punch down tool, is a hand tool used to connect telecommunications
and network wires to a patch panel, punch down block, keystone module, or surface mount box.
The "punch down" part of the name comes from punching a wire into place using an impact
action. It consists of a handle, a spring mechanism, and a removable slotted blade. When the
punch down tool connects a wire, the blade cuts off the excess wire.

Fig 2.3 Krone Tool

Working: Stand in front of the connection block and hold the krone tool in your dominant
hand. Pick up the network or telecom cable with your other hand and feed it into the connection
block. Hold the wire firmly in place, and place the blade of the krone tool onto the terminal of
the connection block. Push down on the tool, applying firm pressure to drive the blade through
the cable. This action secures the wire into the connection block and cuts off any excess. Gently
pull on the wire to make sure it is firmly secured in the connection block. If the cable slips out of
the connection block, use a flat head screwdriver to slightly increase the pressure applied by the
krone tool. Then, put the screwdriver into the slot of the pressure adjustment screw on the tool
and turn it slightly clockwise to increase the pressure. Try punching down the cables again, using
the higher pressure setting this time.

DAVIET/IT/1604624 7
Computer Networks-I BTCS-407

3)TO FAMILIARIZE WITH SWITCH AND HUB USED IN NETWORKS


Physical overview of Hub:-

Figure:-3.1

Physical overview of Switch:-

Figure:-3.2

DAVIET/IT/1604624 8
Computer Networks-I BTCS-407

HUB
Hub is one of the basic icons of networking devices which works at physical layer and hence
connect networking devices physically together. Hubs are fundamentally used in networks that
use twisted pair cabling to connect devices. They are designed to transmit the packets to the
other appended devices without altering any of the transmitted packets received. They act as
pathways to direct electrical signals to travel along. They transmit the information regardless of
the fact if data packet is destined for the device connected or not.

Hub falls in two categories:


Active Hub: They are smarter than the passive hubs. They not only provide the path for the
data signals infact they regenerate, concentrate and strengthen the signals before sending them to
their destinations. Active hubs are also termed as ‘repeaters’.

Passive Hub: They are more like point contact for the wires to built in the physical network.
They have nothing to do with modifying the signals.

Ethernet Hubs
It is a device connecting multiple Ethernet devices together and makes them perform the
functions as a single unit.  They vary in speed in terms of data transfer rate. Ether utilizes Carrier
Sense Multiple Access with Collision Detect (CSMA/CD) to control Media access. Ethernet hub
communicates in half-duplex mode where the chances of data collision are inevitable at most of
the times.

 
Figure:-3.3

SWITCHES
Switches are the linkage points of an Ethernet network. Just as in hub, devices in switches are
connected to them through twisted pair cabling. But the difference shows up in the manner both
the devices; hub and a switch treat the data they receive. Hubworks by sending the data to all the

DAVIET/IT/1604624 9
Computer Networks-I BTCS-407

ports on the device whereas a switch transfers it only to that port which is connected to the
destination device.  A switch does so by having an in-built learning of the MAC address of the
devices connected to it. Since the transmission of data signals are well defined in a switch hence
the network performance is consequently enhanced. Switches operate in full-duplex mode where
devices can send and receive data from the switch at the simultaneously unlike in half-duplex
mode. The transmission speed in switches is double than in Ethernet hub transferring a 20Mbps
connection into 30Mbps and a 200Mbps connection to become 300Mbps. Performance
improvements are observed in networking with the extensive usage of switches in the modern
days.

Figure:-3.4

The following method will elucidate further how data transmission takes place via switches:

 Cut-through transmission: It allows the packets to be forwarded as soon as


they are received. The method is prompt and quick but the possibility of error checking gets
overlooked in such kind of packet data transmission.
 Store and forward: In this switching environment the entire packet are received
and ‘checked’ before being forwarded ahead. The errors are thus eliminated before being
propagated further. The downside of this process is that error checking takes relatively longer
time consequently making it a bit slower in processing and delivering.
 Fragment Free: In a fragment free switching environment, a greater part of the
packet is examined so that the switch can determine whether the packet has been caught up in
a collision. After the collision status is determined, the packet is forwarded. 

HUB VS SWITCH

Layer Physical layer. Hubs are Data Link Layer. Network switches operate at
classified as Layer 1 devices Layer 2 of the OSI model.
per the OSI model.

DAVIET/IT/1604624 10
Computer Networks-I BTCS-407

Function To connect a network of Allow to connect multiple device and port can be
personal computers together, manage, Vlan can create security also can apply
they can be joined through a
central hub.

Data Transmission form Electrical signal or bits Frame (L2 Switch) Frame & Packet (L3 switch)

Ports 4/12 ports Switch is multi port Bridge. 24/48 ports

Transmission Type Hubs always perform frame First broadcast; then unicast & multicast as
flooding; may be unicast, needed.
multicast or broadcast

Device Type Passive Device (Without Active Device (With Software) & Networking
Software) device

Used in (LAN, MAN, LAN LAN


WAN)

Table A network hub cannot learn or Switches use content accessible memory CAM
store MAC address. table which is typically accessed by ASIC
(Application Specific integrated chips).

Transmission Mode Half duplex Half/Full duplex

Broadcast Domain Hub has one Broadcast Switch has one broadcast domain [unless VLAN
Domain. implemented]

Definition An electronic device that A network switch is a computer networking device


connects many network device that is used to connect many devices together on a
together so that devices can computer network. A switch is considered more
exchange data advanced than a hub because a switch will on send
msg to device that needs or request it

Speed 10Mbps 10/100 Mbps, 1 Gbps

Collisions Collisions occur commonly in No collisions occur in a full-duplex switch.


setups using hubs.

Spanning-Tree No Spanning-Tree Many Spanning-tree Possible

DAVIET/IT/1604624 11
Computer Networks-I BTCS-407

Manufacturers Sun Systems, Oracle and Cisco and D-link Juniper


Cisco

4) INTRODUCTION TO CISCO PACKET TRACER

CISCO PACKET TRACER

Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that
allows users to create network topologies and imitate modern computer networks. The
software allows users to simulate the configuration of Cisco routers and switches using a
simulated command line interface. Packet Tracer makes use of a drag and drop user interface,
allowing users to add and remove simulated network devices as they see fit. The software is
mainly focused towards Certified Cisco Network Associate Academy students as an
educational tool for helping them learn fundamental CCNA concepts. Students enrolled in a
CCNA Academy program can freely download and use the tool free of charge for
educational use.

Features of Cisco Packet Tracer

Packet Tracer workspace: Cisco packet tracer has two workspaces-Logical and
Physical. The logical workspace allow user to build logical network topologies by placing,
connecting and clustering virtual network devices. The physical workspace provides a
graphical physical dimensions of logical network, giving a sense of scale and placement in
how network devices such as router, switches and host would look in real environment.Cisco
Packet tracer is one of the best tools for students to experiment with how the networks
behave. It’s a network simulation program which can be used to design certain lab topologies
and configure Routers, switches, PC, etc. and test a network and its functioning.

Packet Tracer Modes: Cisco packet tracer provide two operating mode to visualize the
behaviour of a network- real time mode and simulation mode. In real mode the network
behave as real device do, with immediate real time response for all network activities. The
real time mode give student a visible alternative to real equipment. In simulation mode the
user can and control time intervals and inner working of data transfer, the propagation of data
across a network. Tis helps the students to understand the fundamental concepts behind
network operations. A solid understanding of network fundamental can help accelerate
leering about related concepts.

Help: A help feature is available to familiarize user with the cisco packet tracer interface,
function and features. The help area includes important notes and tips and provide annotated
screenshot to aid understanding.

DAVIET/IT/1604624 12
Computer Networks-I BTCS-407

Tools Of Cisco Packet Tracer:

FIG:4.1

This is the main menu like any other application; this has Menu options
like File, Edit, Option, View, Tools, and Help. Basic commands like
1 Menu Saving, Print etc. can be managed from here.

This is the toolbar for the File and Edit menu where we have icons of the
2 Main Tool Bar menu options. Buttons for Copy, Paste, Zoom etc.

DAVIET/IT/1604624 13
Computer Networks-I BTCS-407

You can switch between the Logical and Physical workspace. In the logical
Logical/Physical workspace we create new Cluster, Move Object, set the tiled background.
Workspace and See screenshot below. In the Physical Workspace New City, New Closet,
3 Navigation Bar Set Background can be created.

Common Tools Commonly used tools are place in this tool bar, e.g. Select, Delete, Move
4 Bar Layout , Resize etc.

This is a toggle bar where you can move between Real-time and
Real-time Simulation mode. You can capture, forward, play packets using the
5 /Simulation Bar simulation Mode.

In this space you see all the devices and connections (Cables types) You
Network can select the Device type i.e. router, switch etc and in the nearby box,
6 Component Box select the specific version of router or switch e.g. 1841, 2620XM.
User Created
7 Packet Window* The packets put in the network simulations are managed using this section.
This is the main area where the devices are placed, designed and different
8 Workspace information like router Name, interface names etc are seen.

DAVIET/IT/1604624 14
Computer Networks-I BTCS-407

FIG:4.2

Ip configuration of PC0

FIG:4.3: Ip configuration of PC0

DAVIET/IT/1604624 15
Computer Networks-I BTCS-407

Ip Configuration of Pc1

FIG:4.4 Ip configuration of PC1


Ip Configuration of Pc2

FIG:4.4 Ip configuration of PC2

DAVIET/IT/1604624 16
Computer Networks-I BTCS-407

5) TO ESTABLISH A COMMUNICATION CONNECTION BETWEEN 2


ROUTERS
Serial Connection Between 2 Routers

FIG. 5.1:Serial connection between 2 routers


Command Line Interface

FIG 5.2:command line interface


Configuration of Router0 (Serial 0/1/0)

DAVIET/IT/1604624 17
Computer Networks-I BTCS-407

FIG .5.3:Router0 Serial0/1/0

Configuration of Router1 (Serial 0/1/0)

FIG 5.4:Router0 Serial0/1/0

Ip configuration of PC0
DAVIET/IT/1604624 18
Computer Networks-I BTCS-407

FIG 5.5 Ip configuration of PC0

Ip Configuration of Pc1

FIG 5.6 Ip configuration of PC1


Ip configuration of PC2

DAVIET/IT/1604624 19
Computer Networks-I BTCS-407

FIG 5.7: Ip configuration of PC2


Ping command

FIG 5.8:ping command

DAVIET/IT/1604624 20
Computer Networks-I BTCS-407

6) TO ESTABLISH A WIRELESS CONNECTION BETWEEN


DIFFERENT DEVICES

Wireless connection between the access point and different nodes like Smartphones, Pc, Laptop,
Tablet.

FIG 6.1(Wireless Connection Between Nodes)

DAVIET/IT/1604624 21
Computer Networks-I BTCS-407

Access Point Configuration

FIG 6.2:Configuring Access Point

FIG 6.3:Authentication Problem

DAVIET/IT/1604624 22
Computer Networks-I BTCS-407

FOR TABLET PC 0
When connection is lost then we have to go configuration then to wireless 0 and change authentication to
wpa-psk and enter a password

FIG 6.4(Tablet)

FOR PC 0
When connection is lost then we have to go configuration then to wireless 0 and change authentication to
wpa-psk and enter a password

FIG 6.5(PC)

DAVIET/IT/1604624 23
Computer Networks-I BTCS-407

For Laptop 0
When connection is lost then we have to go config then to wireless 0 and change authentication to wpa-
psk and enter a password

FIG 6.6(Laptop)

For SmartPhone0
When connection is lost then we have to go config then to wireless 0 and change authentication to wpa-
psk and enter a password

FIG 6.7(SmartPhone)

DAVIET/IT/1604624 24
Computer Networks-I BTCS-407

DAVIET/IT/1604624 25

You might also like