various network topologies

Most Relevant Content

  • Computer Network Topology Outline

    The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types of topology. Physical topology Logical topology Physical Topologies The physical topology is the physical shape or layout of the wires that can be visible in a network. The Physical topology defines how devices are interconnected with or without wires. Physical topology is further divided into two sections. Point-to-point connections Multipoint connections  Point-to-point connections In a point-to-point connection, a communication link is established between two devices with one wire or air (in the case of wireless). A simple example of point-to- point connection is talking over telephone between two persons where anyone else is not allowed to use the phone on either side. Multipoint Connection Multiple devices or machines are involved in a multipoint connection. These devices mainly share cabling but [...]

    READ MORE »

  • More Similar Content

  • »

    Unlocking Digital Opportunities: A Beginner’s Guide to Computer Networking |   October 14, 2025

    Summary Computer networking has created the digital world, enabling communication networks that unite various regions of the world and connect any device in some way or another. Networking provides new opportunities to secure employment, act as freelance workers, or even pursue volunteer work, which is why it is worth investing in for career development. Being practical should be valued even more than theory. Even after setting up a home lab, reviewing real projects, and consulting trusted sources, you will learn [...]

    READ MORE »

  • You May Also Like

  • »

    How to Block Free Proxy Access with MikroTik Router |   May 21, 2019

    Proxy Server is an alternative to VPN that breaks blocking firewall of a network. If any user uses free web proxy server with web browser, the web request is processed by the proxy server. So, blocking firewall rule is not applied on the proxy enabled PC. For this, system administrators should be careful enough to block free proxy servers along with blocking VPN access. In my previous article, I discussed how to block VPN access with MikroTik Firewall. In this [...]

    READ MORE »

  • »

    OpenDNS Family Shield Configuration in MikroTik RouterOS 7 |   August 30, 2024

    OpenDNS is a DNS based free web content filtering software. It helps to keep our home or office network free from malware, virus and adult content. Configuring OpenDNS in our Home of Office routers, we can easily keep safe our internet content. OpenDNS provided OpenDNS Family Sheild solution that keeps our kids safe online. OpenDNS Family Shield filters all adult content websites as well as virus and trojan. OpenDNS Family Shield is preconfigured to block adult content. So, our children [...]

    READ MORE »

  • »

    How to Mount USB Device in CentOS 7 (NTFS and Linux FS) |   February 18, 2019

    USB Hard Disk Drive or USB Flash Drive (Pen drive) is a popular external device that can be used to backup data or transfer data from one device to other device. In GUI (Graphical User Interface) Operating System such as Window or GNOME Desktop in Linux can automatically mount USB device and can show data in it if the File System of that device is supported. But all users do not like or always do not have GUI mode of [...]

    READ MORE »

  • »

    Restrict Internet Access Based on MAC Address in MikroTik |   February 4, 2017

    MikroTik router has a lot of features by which a network administrator can design his network as he likes. As a network administrator, sometimes you may need to allow internet access some specific devices. If other devices try to access internet, they will be rejected by your router. For example, say, you have configured a simple network like below diagram. In this network, you have configured WAN, LAN, Gateway, DNS and NAT. Also you have created queue rules for limiting [...]

    READ MORE »

  • »

    MikroTik RADIUS Server (User Manager) Installation |   October 28, 2017

    RADIUS Server is a centralized user authentication, authorization and accounting application. RADIUS authentication gives the ISP or network administrator ability to manage PPP users, login users and Hotspot users from one server throughout a large network. MikroTik RouterOS has a RADIUS client that is able to authenticate login users, Hotspot users and PPP users through a RADIUS server. MikroTik team also developed a totally separate RADIUS server package named User Manager that can be used to authenticate MikroTik users smoothly. [...]

    READ MORE »

  • »

    Things to Consider When Developing a Mobile App |   February 27, 2022

    Building a mobile app is one of the best ways to engage your target market and build an audience. If you want to develop a mobile application that will be truly successful, you need to consider every aspect of the development process. At the same time, there are many things to think about when developing a mobile app. Apps are designed to solve problems for people; if you are thinking about creating an app, you need to think about why [...]

    READ MORE »

  • »

    MikroTik OpenVPN Configuration on TCP Port 443 with Windows OS |   April 6, 2020

    MikroTik OpenVPN is an amazing VPN solution. IT provides a secure and encrypted VPN tunnel across public network. Unlike PPTP and L2TP VPN Services which are poorly designed and can easily be blocked, OpenVPN can highly be customized and even can be run on so popular TCP Port 443. So, OpenVPN cannot easily be blocked. OpenVPN uses SSL/TLS Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across public network. OpenVPN is a site to site [...]

    READ MORE »

  • »

    MikroTik Site to Site EoIP Tunnel with IPsec |   March 21, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) tunnel that is used to create a site to site VPN. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]

    READ MORE »