Open In App

Implementation of Ring Topology in Cisco

Last Updated : 24 Jun, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

Ring topology is a kind of arrangement of the network in which every device is linked with two other devices. This makes a circular ring of interconnected devices which gives it its name. Data is usually transmitted in one direction along the ring, known as a unidirectional ring. The data is delivered from one device to the next until it reaches the decided destination. In a bidirectional ring, data can travel in either direction.

To learn about Ring Topology refer to the Advantages and Disadvantages of ring topology article.

Steps to Configure and Setup Ring Topology in Cisco Packet Tracer :

Step 1: First, open the cisco packet tracer desktop and select the devices given below:

S.NO Device Model Name
1. PC PC
2. Switch PT-Switch

IP Addressing Table

S.NO Device IPv4 Address Subnet Mask
1. pc0 192.168.0.1 255.255.255.0
2. pc1 192.168.0.2 255.255.255.0
3. pc2 192.168.0.3 255.255.255.0
4. pc3 192.168.0.4 255.255.255.0
  • Then, create a network topology as shown below the image.
  • Use an Automatic connecting cable to connect the devices with others.

 

Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP addressing table given above.

  • To assign an IP address in PC0, click on PC0.
  • Then, go to desktop and then IP configuration and there you will IPv4 configuration.
  • Fill IPv4 address and subnet mask.

 

  •  Assigning IP address using the ipconfig command, or we can also assign an IP address with the help of a command.
  • Go to the command terminal of the PC.
  • Then, type ipconfig <IPv4 address><subnet mask><default gateway>(if needed)
Example: ipconfig 192.168.0.1 255.255.255.0

 

  • Repeat the same procedure with other PCs to configure them thoroughly.

Step 3: Verify the connection by pinging the IP address of any host in PC0.

  • Use the ping command to verify the connection.
  • As we can see we are getting replies from a targeted node on both PCs.
  • Hence the connection is verified.

 

  • A simulation of the experiment is given below we have sent two PDU packets one targeted from PC0 to PC2 and another targeted from PC1 to PC3.

 


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads