physical network topology

Most Relevant Content

  • Computer Network Topology Outline

    The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types of topology. Physical topology Logical topology Physical Topologies The physical topology is the physical shape or layout of the wires that can be visible in a network. The Physical topology defines how devices are interconnected with or without wires. Physical topology is further divided into two sections. Point-to-point connections Multipoint connections  Point-to-point connections In a point-to-point connection, a communication link is established between two devices with one wire or air (in the case of wireless). A simple example of point-to- point connection is talking over telephone between two persons where anyone else is not allowed to use the phone on either side. Multipoint Connection Multiple devices or machines are involved in a multipoint connection. These devices mainly share cabling but [...]

    READ MORE »

  • More Similar Content

  • »

    VLAN Routing Configuration between MikroTik RouterOS |   September 27, 2018

    VLAN (Virtual Local Area Network) is a logical topology that divides a single broadcast domain into multiple broadcast domains. It increases network security and performance as well as improves network efficiency. MikroTik VLAN routing configuration with manageable switch was discussed in previous article. Today we will learn how to configure VLAN between MikroTik RouterOS. This Router to router VLAN (layer3 VLAN) is useful when any ISP provide connection to one or more local ISPs who use MikroTik Router to maintain [...]

    READ MORE »

  • »

    MikroTik VLAN Routing Configuration with Manageable Switch |   July 11, 2018

    A VLAN (Virtual LAN) is a group of computers, servers, network printers and other network devices that behave as if they were connected to a single network. VLAN is a logical topology that divides a single broadcast domain into multiple broadcast domains. VLAN is a layer 2 method. So, a manageable switch is required to manage VLAN in your network and a router is required to route and control your inter-VLAN. VLAN increases network security and performance as well as [...]

    READ MORE »

  • You May Also Like

  • »

    How to Prevent Simultaneous User Login in MikroTik Hotspot |   November 10, 2020

    MikroTik Hotspot is a user based internet access system. Most of the user authentication and authorization can be controlled with MikroTik Hotspot. But sometimes some users misuse user based authentication system. Misusing simultaneous login is one of them. Usually we provide one username and password for a user and we expect he/she will use this username and password from only one device at a time. But it is also possible to use same username and password in multiple devices at [...]

    READ MORE »

  • »

    How to Block Tor Browser with MikroTik Router |   June 12, 2019

    Tor Browser is an alternative to VPN and Web Proxy that breaks blocking firewall rule. If any user installs and uses Tor Browser, he/she can hide the public IP address of router and can unblock blocked websites applied on a network. So, administrators should block Tor Nodes along with other blocking firewall rule. In my previous article, I discussed how to block VPN and Proxy access with MikroTik Router and in this article I will discuss how to block Tor [...]

    READ MORE »

  • »

    Latest Google Chrome Free Download and Install |   August 23, 2015

    Google Chrome is one of the most popular web browsers to any online user. Google Chrome is a free application by Google. So, you can download and install Google Chrome in your operating system at any time. Google Chrome is too easy to use and bug is so less. Google Chrome has an awesome look and a lot of functionalities which help to use Google Chrome so easily. It is said that any online user cannot go a single day without Google [...]

    READ MORE »

  • »

    System Restore in Windows 10 |   August 30, 2015

    Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]

    READ MORE »

  • »

    MikroTik VRRP Configuration with DHCP Server |   October 22, 2018

    MikroTik VRRP (Virtual Router Redundancy Protocol) ensures high available internet network. If any organization requires uninterrupted internet connection, MikroTik VRRP implementation will be a vital solution for them. MikroTik VRRP creates a virtual router accumulating two or more physical routers and ensures uninterrupted internet connection keeping activate one physical router always. That means, if any physical router fails to operate due to any hardware failure, MikroTik VRRP uses another backup router for internet gateway until the running router comes back [...]

    READ MORE »

  • »

    MikroTik OpenVPN Setup with Windows Client |   April 2, 2018

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. MikroTik OpenVPN Server provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. OpenVPN uses SSL Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across [...]

    READ MORE »

  • »

    User Management in Linux (Red Hat/CentOS) |   September 28, 2017

    User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]

    READ MORE »