When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Spanning Tree Protocol - Wikipedia

    en.wikipedia.org/wiki/Spanning_Tree_Protocol

    The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include backup links providing fault tolerance if an active link fails.

  3. Network topology - Wikipedia

    en.wikipedia.org/wiki/Network_topology

    Network topology is the topological [4] structure of a network and may be depicted physically or logically. It is an application of graph theory [3] wherein communicating devices are modeled as nodes and the connections between the devices are modeled as links or lines between the nodes. Physical topology is the placement of the various ...

  4. Topology of the World Wide Web - Wikipedia

    en.wikipedia.org/wiki/Topology_of_the_World_Wide_Web

    The Jellyfish model of the World Wide Web topology represents the web as a core of highly connected nodes (web pages) surrounded by layers of less connected nodes. The Bow Tie model, on the other hand, divides the web into distinct zones: a strongly connected core, an 'IN' group leading into the core, an 'OUT' group leading out, and ...

  5. Ethernet - Wikipedia

    en.wikipedia.org/wiki/Ethernet

    Despite the physical star topology and the presence of separate transmit and receive channels in the twisted pair and fiber media, repeater-based Ethernet networks still use half-duplex and CSMA/CD, with only minimal activity by the repeater, primarily generation of the jam signal in dealing with packet collisions. Every packet is sent to every ...

  6. Computer network - Wikipedia

    en.wikipedia.org/wiki/Computer_network

    Nodes in the overlay network are connected by virtual or logical links. Each link corresponds to a path, perhaps through many physical links, in the underlying network. The topology of the overlay network may (and often does) differ from that of the underlying one. For example, many peer-to-peer networks are overlay networks.

  7. Communication protocol - Wikipedia

    en.wikipedia.org/wiki/Communication_protocol

    Loss of information - timeouts and retries Packets may be lost on the network or be delayed in transit. To cope with this, under some protocols, a sender may expect an acknowledgment of correct reception from the receiver within a certain amount of time. Thus, on timeouts, the sender may need to retransmit the information.

  8. Network architecture - Wikipedia

    en.wikipedia.org/wiki/Network_architecture

    Network architecture. Network architecture is the design of a computer network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as communication protocols used. In telecommunications, the specification of a network ...

  9. Medium access control - Wikipedia

    en.wikipedia.org/wiki/Medium_access_control

    t. e. In IEEE 802 LAN/MAN standards, the medium access control (MAC), also called media access control, is the layer that controls the hardware responsible for interaction with the wired (electrical or optical) or wireless transmission medium. The MAC sublayer and the logical link control (LLC) sublayer together make up the data link layer.