topologies of computer network
Most Relevant Content
Computer Network Topology Outline
The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types of topology. Physical topology Logical topology Physical Topologies The physical topology is the physical shape or layout of the wires that can be visible in a network. The Physical topology defines how devices are interconnected with or without wires. Physical topology is further divided into two sections. Point-to-point connections Multipoint connections Point-to-point connections In a point-to-point connection, a communication link is established between two devices with one wire or air (in the case of wireless). A simple example of point-to- point connection is talking over telephone between two persons where anyone else is not allowed to use the phone on either side. Multipoint Connection Multiple devices or machines are involved in a multipoint connection. These devices mainly share cabling but [...]
- »
Unlocking Digital Opportunities: A Beginner’s Guide to Computer Networking | October 14, 2025
Summary Computer networking has created the digital world, enabling communication networks that unite various regions of the world and connect any device in some way or another. Networking provides new opportunities to secure employment, act as freelance workers, or even pursue volunteer work, which is why it is worth investing in for career development. Being practical should be valued even more than theory. Even after setting up a home lab, reviewing real projects, and consulting trusted sources, you will learn [...]
- »
MikroTik Hotspot Login by MAC Cookie Configuration | July 10, 2020
MAC Cookie is a newly introduced Hotspot feature in MikroTik Router. MAC Cookie is specially designed to improve accessibility for smartphones, laptop and other mobile devices. MAC Cookie is not a basic login method rather it is an extension of basic Hotspot login method such as HTTP CHAP, HTTP PAP and HTTPS. So, when MAC Cookie is used with these basic Hotspot login methods, it improves the Hotspot user accessibility. In my previous article, I discussed MikroTik Hotspot basic configuration [...]
- »
How to Create Free SSL/TLS Certificate with OpenSSL | July 23, 2021
SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]
- »
MikroTik VRRP Configuration with DHCP Server | October 22, 2018
MikroTik VRRP (Virtual Router Redundancy Protocol) ensures high available internet network. If any organization requires uninterrupted internet connection, MikroTik VRRP implementation will be a vital solution for them. MikroTik VRRP creates a virtual router accumulating two or more physical routers and ensures uninterrupted internet connection keeping activate one physical router always. That means, if any physical router fails to operate due to any hardware failure, MikroTik VRRP uses another backup router for internet gateway until the running router comes back [...]
- »
How to Import SSL Certificate in MikroTik RouterOS | January 16, 2022
SSL/TLS Certificate is used to make secure communication between server and clients. MikroTik RouterOS has a lot of services such OVPN, SSTP VPN, HTTPS, Hotspot and so on those use SSL/TLS certificate. It is possible to create self-signed certificate in MikroTik RouterOS but self-signed certificate faces untrusted CA warning. So, it is always better to use trusted CA either freemium or premium. In my previous article, I discussed how to get a free SSL/TLS certificate from Zero SSL but Zero [...]
- »
MikroTik Hotspot Login Page with Random MAC Detection | October 5, 2025
Hotspot businesses such as cafés, restaurants, co-working spaces, schools, and ISPs often rely on MikroTik Hotspot solutions to provide Wi-Fi access. One common challenge is that many modern devices (Android, iOS, Windows, macOS) use randomized (private) MAC addresses, which can cause repeated logins, loss of session persistence, and difficulties with usage tracking. To solve this problem, we have designed a professional Hotspot Login Page Template that not only looks modern and mobile-friendly but also detects randomized MAC addresses and notifies [...]
- »
MikroTik Site to Site GRE Tunnel Configuration with IPsec | March 26, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides GRE (Generic Routing Encapsulation) tunnel that is used to create a site to site VPN tunnel. GRE tunneling protocol which can encapsulate a wide variety of protocols creating a virtual point-to-point link was [...]
- »
How to Block VPN Access with MikroTik Router | May 14, 2019
Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]
- »
5 Factors That Affect the VPN Speed | July 6, 2021
So you have finally decided to use VPN services. While it’s a great option you must have your concerns. One of these must be the VPN slowing down at times. If that’s the case then it’s better to know the reasons and to explore the issue prior buying or using a free VPN service. Whether you own a fashion brand or a company that teaches coding to beginner kids, many companies use VPN to provide its employees with a closer [...]
More Similar Content
You May Also Like