Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Related posts
- Hack Website Online Tool
- Hacks And Tools
- Hacker Tools
- Pentest Automation Tools
- Hack Tool Apk No Root
- Hacker Tools 2019
- Pentest Tools Windows
- Hacker Tools Linux
- Pentest Tools Tcp Port Scanner
- Growth Hacker Tools
- Hacker Tools
- Pentest Tools Subdomain
- Free Pentest Tools For Windows
- What Is Hacking Tools
- Tools 4 Hack
- Hacker Tools Online
- Ethical Hacker Tools
- Pentest Tools Website
- Nsa Hacker Tools
- Hacker Tools For Windows
- Pentest Tools Website Vulnerability
- Pentest Tools Review
- Pentest Tools Open Source
- Pentest Tools Website Vulnerability
- Pentest Box Tools Download
- Hacking Tools Name
- Hacking Tools Software
- Hacker Tools Mac
- Pentest Box Tools Download
- Tools Used For Hacking
- Wifi Hacker Tools For Windows
- Pentest Tools Android
- Pentest Tools For Windows
- Hack Tool Apk No Root
- Pentest Tools Windows
- Hacker Tools Apk
- Tools For Hacker
- Hacking Tools Name
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Windows
- Hack Tool Apk
- Free Pentest Tools For Windows
- Kik Hack Tools
- Hacking Tools 2019
- How To Make Hacking Tools
- Pentest Tools List
- Pentest Automation Tools
- Hacking Tools Free Download
- Kik Hack Tools
- Hacking Tools For Pc
- Hack Tools Mac
- Hack Tools Download
- Pentest Tools Kali Linux
- Best Hacking Tools 2020
- New Hacker Tools
- Wifi Hacker Tools For Windows
- Pentest Tools Android
- Hacker Hardware Tools
- What Are Hacking Tools
- Pentest Tools Free
- Hacker Tool Kit
- Hacking Tools Github
- Best Hacking Tools 2020
- Hack App
- Pentest Tools Framework
- Pentest Tools Find Subdomains
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Usb
- Pentest Tools Windows
- Hacker Tool Kit
- Pentest Tools Android
- Hacker Tools Linux
- Install Pentest Tools Ubuntu
- Hacking Tools Windows
- Hack Website Online Tool
- Computer Hacker
- Hack Tools For Games
- Hacking Tools Usb
- Hacking Tools For Mac
- Hacker Tools Linux
- Computer Hacker
- Underground Hacker Sites
- Hacker Tools Software
- Hacker Tools Windows
- Pentest Tools Framework
- Pentest Tools For Ubuntu
No comments:
Post a Comment