Menu
Computer Networking Topologies and Media

Transparent Bridging and MAC Address Filtering
A bridge uses a database to send frames across network segments. The database is a list of nodes MAC addresses and their locations on the network. To send a frame between two segments a bridge reads a frame's destination MAC address and decides to either forward or filter. More ...

What is FTTP, FTTH, FTTB, and FTTD?
Some FTTx such as FTTN (fiber to the node), FTTC (fiber to the curb) depend on copper wires for final connection to the customers premises which contrasts with FTTP. FTTP can be further categorized into FTTH (fiber to the home), FTTB (fiber to the building), etc. More ...

Wireless or Wired Network?
Do you want the freedom of a wireless network, or do you want the security and reliability of a wired network? Both networks can provide you with great service and expandability, but each one varies in size, reliability, cost and speed. More ...

How Do Fiber Optic Couplers Work and How are They Made?
Fiber optic couplers are needed for tapping (monitoring the signal quality) or more complex telecommunication systems which require more than simple point-to-point connections, such as ring architectures, bus architectures and star architectures. More ...

Here's a Quick Way to Build Your Fiber Optic Network
What is the most time consuming work in building a fiber network? Two works are usually thelargest line items in an fiber optic network installation budget: pulling the fiber optic cables and terminating or splicing the cables. More ...

Computer Network Routers, Hubs, and Switches
The most common components on a computer network, not counting cables, are "routers", "hubs", and "switches". Many of these modules can be appear similar and there can be significant overlap in roles. This article explains the difference between these important network components. More ...

Wireless Networks
A wireless LAN (WLAN or WiFi) provides network connectivity by using radio waves rather than cable. Wireless devices can communicate with each other or they can communicate through a wireless access point (WAP) to a wired network. More ...

LAN Network Protocols - Ethernet, STP, Fiber
Spanning Tree is an algorithm that runs on Layer 2 campus switches for preventing Layer 2 loops and broadcast storms on a network with at least 2 switches or bridges. The algorithm determines what ports at each switch or bridge must be blocked to create a loop free topology. More ...

Network Broadcast Storms
When a switch receives a broadcast frame the switch floods the frame out all switch ports other than the port on which the frame was received. Because a layer 2 frame does not have a TTL (Time to live) field, a broadcast frame endlessly circulates through the Layer 2 topology. More ...

The IEEE 802.3 Ethernet Standards
The Institute of Electrical and Electronics Engineers (IEEE). The IEEE sets up committees to define industry standards. The IEEE 802 committee sets the standards for networking. The IEEE subcommittee 802.3 sets the standard for Ethernet. More ...

Bluetooth Basics
Bluetooth wireless technology is a specification for a wireless connection that provides links between mobile computers, mobile phones, other portable handheld devices, and connectivity to the Internet. More ...

Computer Networking Devices
Computer networking devices, also known as networking hardware or network equipment are components connected to the network by network media. This article describes the function of the hub, bridge, switch, router, gateway, multilayer switch, and brouter. More ...

What Are Pseudo-Wires?
Pseudo-wire is a mechanism used in networking and telecommunications to emulate various services using packet switched networks with technologies such as Ethernet, MPLS (Multi Protocol Labelled Switching) and IP (Internet Protocol). More ...


Learn more at amazon.com

Custom Search