topology in computer

Most Relevant Content

  • Computer Network Topology Outline

    The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types of topology. Physical topology Logical topology Physical Topologies The physical topology is the physical shape or layout of the wires that can be visible in a network. The Physical topology defines how devices are interconnected with or without wires. Physical topology is further divided into two sections. Point-to-point connections Multipoint connections  Point-to-point connections In a point-to-point connection, a communication link is established between two devices with one wire or air (in the case of wireless). A simple example of point-to- point connection is talking over telephone between two persons where anyone else is not allowed to use the phone on either side. Multipoint Connection Multiple devices or machines are involved in a multipoint connection. These devices mainly share cabling but [...]

    READ MORE »

  • More Similar Content

  • »

    Unlocking Digital Opportunities: A Beginner’s Guide to Computer Networking |   October 14, 2025

    Summary Computer networking has created the digital world, enabling communication networks that unite various regions of the world and connect any device in some way or another. Networking provides new opportunities to secure employment, act as freelance workers, or even pursue volunteer work, which is why it is worth investing in for career development. Being practical should be valued even more than theory. Even after setting up a home lab, reviewing real projects, and consulting trusted sources, you will learn [...]

    READ MORE »

  • »

    MikroTik VLAN Routing Configuration with Manageable Switch |   July 11, 2018

    A VLAN (Virtual LAN) is a group of computers, servers, network printers and other network devices that behave as if they were connected to a single network. VLAN is a logical topology that divides a single broadcast domain into multiple broadcast domains. VLAN is a layer 2 method. So, a manageable switch is required to manage VLAN in your network and a router is required to route and control your inter-VLAN. VLAN increases network security and performance as well as [...]

    READ MORE »

  • You May Also Like

  • »

    Red Hat/CentOS 7 Linux Installation (Minimal Packages) |   April 18, 2017

    Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally [...]

    READ MORE »

  • »

    MikroTik DHCP Server Configuration with Radius Server |   January 24, 2018

    The Dynamic Host Configuration Protocol (DHCP) is a client-server protocol that is used to assign an IP address and other network configuration parameters dynamically to each device on a network so that they can communicate with other IP networks. DHCP Server is popularly used in an Enterprise Office Network because in an office network various types of IP devices such as Laptop, Desktop, Tablet, Smartphone, IP Phone and so on are maintained and almost all IP devices support DHCP. An ISP Network can also be [...]

    READ MORE »

  • »

    MikroTik User Manager Installation and Basic Configuration |   December 15, 2019

    MikroTik User Manager is a RADIUS application developed by MikroTik team and can be used without charge. User Manager is used for authentication, authorization and accounting of MikroTik RouterOS, PPPoE, Hotspot, DHCP and Wireless users. Although User Manager Package is developed by MikroTik it will not be found in RouterOS by default. So, we have to install User Manager Package manually if we wish to use this RADIUS application. User Manager can be installed on MikroTik RouterBOARD, MikroTik CHR or [...]

    READ MORE »

  • »

    MikroTik User Management (RouterOS User) |   October 22, 2017

    MikroTik User Management plays an important role in MikroTik system administration as well as MikroTik security. Don’t be confused the title User Management with the MikroTik UserManager. UserManager is an optional and totally separate package distributed by MikroTik. UserManager is an implementation of Radius server that is used to maintain not only RouterOS users but also PPPoE, PPTP, Hotspot, Wireless and DHCP users. In my few future articles, I will discuss how to maintain these users with MikroTik UserManager Radius [...]

    READ MORE »

  • »

    Web Server Configuration in Linux with Apache, MariaDB and PHP |   January 2, 2018

    Web Server is one of the most important and most used servers today. Without web server internet cannot imagine. Even, the article you are reading is also served by a web server. So, having web server configuration knowledge is beneficial for you, I think. A web server is responsible to serve HTTP (Hypertext Transfer Protocol) contents such as text, image, audio, video etc. to its clients. A lot of web servers are present today such as Apache, IIS, Nginx and [...]

    READ MORE »

  • »

    How to Create Free SSL/TLS Certificate with OpenSSL |   July 23, 2021

    SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]

    READ MORE »

  • »

    MikroTik SSTP VPN Server Configuration with Windows 10 |   April 27, 2020

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. Secure Socket Tunneling Protocol (SSTP) transports PPP tunnel over TLS channel. SSTP uses TLS channel over TCP port 443. So, SSTP VPN can virtually pass through all firewalls and proxy servers. Because of using TLS [...]

    READ MORE »