B48 Exp5 CN
B48 Exp5 CN
B48 Exp5 CN
PART A
Experiment No. 05
A.1 Objective:
Implementa on of a LAN Network with the following topologies by using CISCO Packet Tracer.
1. Ring Topology.
2. Star Topology
3. Mesh Topology
4. Tree Topology
A.2 Prerequisite:
● Knowledge about PAN, LAN and NW Elements.
● HW and IP Address concepts.
● Network Topology.
● Concept of Analysis, Design, Simulation and Modelling ● Cisco Packet tracer as
simulation tool
PART B
(PART B : TO BE COMPLETED BY STUDENTS)
Roll No.: 48 Name: Nikhil Aher
Class : TE-B Batch : B3
Date of Experiment: 31/07/23 Date of Submission: 07/08/23
Grade :
3. Mesh Topology:
4. Tree Topology:
B.3 Observations and learning:
B.4 Conclusion:
In this experiment we learn how to use the different types of topologies in networks.
And with the help of Cisco Packet Tracer we create the different topologies. And with this we
executed the experiment successfully.
3. What are the different types of end to end devices supported by CISCO
packet tracer? Answer: Cisco Packet Tracer offers a wide range of end devices
including:
● PC (Personal Computer)
● Server
● Laptop
● Tablet
● Smartphone
● VoIP Phone
● IP Camera
● IoT Devices
● Printer
● Switch
● Router
● Wireless Access Point (AP)
● Hub
● DSL Modem
● Cable Modem ● Serial Cable
4. What are all the NW elements you will use in the CISCO Packet Tracer?
Answer: Packet Tracer offers a wide range of network devices:
● End Devices:
1. PC (Personal Computer)
2. Server
3. Laptop
4. Tablet
5. Smartphone
6. VoIP Phone
7. IP Camera
8. IoT Devices (Sensors, Smart Appliances)
● Networking Infrastructure:
1. Switch (Ethernet Switch)
2. Router (with various routing protocols)
3. Wireless Access Point (Wi-Fi AP)
4. Hub (Less common in modern networks)
5. DSL Modem (Digital Subscriber Line)
6. Cable Modem
7. Serial Cable (for console connections)
● Network Services:
1. DHCP Server
2. DNS Server
3. HTTP Server
4. FTP Server
5. Email Server
6. Telnet Server
● Network Security:
1. Firewall (ASA)
2. Intrusion Detection System (IDS)
3. Intrusion Prevention System (IPS) 4. VPN Tunnel (Virtual Private Network)
● Network Accessories:
1. Clock (Used for time-based activities)
2. Cloud (Represents external networks or the internet)
3. Packet Tracer's own Web Server
5. What are the different types of cables supported by CISCO packet tracer?
Answer: Cisco Packet Tracer provides different types of cables to connect devices. The cable
available in Packet tracer include:
● Ethernet Cable (Straight-through)
● Ethernet Cable (Crossover)
● Serial Cable
● Console Cable
● Fiber Optic Cable
● Coaxial Cable
● Copper Cross- Over Cable
● Straight-through Copper Serial Cable
● Console Roll-over
7. Can we create Ring topology just using end nodes, ie. Without using a switch/hub/router?
If Yes then how? If No then why?
Answer: Yes, you can create a Ring topology using just end nodes (computers or devices)
without using a switch, hub, or router. This type of topology is known as a "peer-to-peer" or
"ad-hoc" network. In a Ring topology, each device is connected directly to two other devices,
forming a closed loop. Here's how you can set up a Ring topology using only end nodes: 1.
Physical Connection: Each device is physically connected to the two neighboring devices. For
example, Device A is connected to Device B and Device C. Device B is connected to Device A
and Device C, and so on.
2. Data Transmission : When data needs to be sent from one device to another, it travels
around the ring in a sequential manner. Each device receives the data and processes it if it's the
intended recipient; otherwise, it forwards the data to the next device in the ring until it reaches
the destination.
Most modern networks use a combination of star or bus topologies with central devices (like
switches or routers) to manage traffic, ensure fault tolerance, and provide scalability. However,
for small-scale, temporary, or specific use cases, a peer-to-peer Ring topology can still be set up
using just end nodes.
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: