different network topologies

Most Relevant Content

  • Computer Network Topology Outline

    The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types of topology. Physical topology Logical topology Physical Topologies The physical topology is the physical shape or layout of the wires that can be visible in a network. The Physical topology defines how devices are interconnected with or without wires. Physical topology is further divided into two sections. Point-to-point connections Multipoint connections  Point-to-point connections In a point-to-point connection, a communication link is established between two devices with one wire or air (in the case of wireless). A simple example of point-to- point connection is talking over telephone between two persons where anyone else is not allowed to use the phone on either side. Multipoint Connection Multiple devices or machines are involved in a multipoint connection. These devices mainly share cabling but [...]

    READ MORE »

  • You May Also Like

  • »

    How to Block VPN Access with MikroTik Router |   May 14, 2019

    Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]

    READ MORE »

  • »

    PPPoE Server Configuration in MikroTik RouterOS 7 |   December 2, 2023

    MikroTik PPPoE is a client-server protocol and mostly used at the end ISP configuration where MikroTik RouterOS acts as a PPPoE Server and user’s WiFi Router acts as PPPoE client. MikroTik PPPoE Server can be used with MikroTik simple queue management. So, it helps to manage user’s bandwidth easily. People who are trying to do internet business should learn MikroTik PPPoE Server. Configuring PPPoE Server in MikroTik RouterOS 7 is so easy. If you have knowledge on basic RouterOS 7 [...]

    READ MORE »

  • »

    phpMyAdmin with NGINX – Installation and Configuration |   October 14, 2024

    In modern web development, server management is a vital part. Two popular tools that assist in this process are Nginx and phpMyAdmin. Nginx is a high-performance web server, while phpMyAdmin is a widely-used web-based interface for managing MySQL or MariaDB databases. When combined, these tools provide a strong platform for serving dynamic web applications and managing their databases efficiently. What is Nginx? NGINX (pronounced “engine-x”) is an open-source web server that also functions as a reverse proxy, load balancer, and [...]

    READ MORE »

  • »

    Ubuntu Web Server Configuration with phpMyAdmin (LAMP Stack) |   July 12, 2021

    Ubuntu Server is one of the most popular open source operating systems that can be used in production without any hassle. In my previous article, I discussed how to install Ubuntu Server with LVM partition. I also discussed how to assign static IP address on Ubuntu Server interface with Netplan network management tool. Ubuntu web server is a popular service because web developers usually use Ubuntu Server for their development project. Besides development project, Ubuntu web server can also be [...]

    READ MORE »

  • »

    How to Create Free SSL/TLS Certificate with OpenSSL |   July 23, 2021

    SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]

    READ MORE »

  • »

    Restrict Internet Access Based on MAC Address in MikroTik |   February 4, 2017

    MikroTik router has a lot of features by which a network administrator can design his network as he likes. As a network administrator, sometimes you may need to allow internet access some specific devices. If other devices try to access internet, they will be rejected by your router. For example, say, you have configured a simple network like below diagram. In this network, you have configured WAN, LAN, Gateway, DNS and NAT. Also you have created queue rules for limiting [...]

    READ MORE »

  • »

    5 Factors That Affect the VPN Speed |   July 6, 2021

    So you have finally decided to use VPN services. While it’s a great option you must have your concerns. One of these must be the VPN slowing down at times. If that’s the case then it’s better to know the reasons and to explore the issue prior buying or using a free VPN service. Whether you own a fashion brand or a company that teaches coding to beginner kids, many companies use VPN to provide its employees with a closer [...]

    READ MORE »

  • »

    Create System Restore Point in Windows OS |   August 27, 2015

    System Restore utility in windows operating system helps a windows user to take one or more snapshots of his/her windows system when windows operating system is working well. If any system crash occurs in future due to virus attack or critical system update or any unwanted program, the system can be reverted to its previous snapshot when windows OS was working well. So, System Restore utility in windows operating system is a very helpful service for windows users to protect [...]

    READ MORE »

  • »

    MikroTik Hotspot Customized Login Template |   April 14, 2022

    MikroTik Hotspot is a popular service which is used to manage ISP, Hotel, Restaurant, Airport, and Public WiFi. Using billing application like GalaxyRAD with MikroTik Hotspot, a WiFi network can manage professionally. MikroTik Hotspot loads a login page for new user authentication. So, this login page is a vital source for promoting your brands. The default login template provided by MikroTik Hotspot is a simple template which cannot fulfill branding requirements. But it is possible to customize the login template [...]

    READ MORE »