Sunday, May 28, 2023

Networking | Routing And Switching | Tutorial 4 | 2018


Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.

What is Switch? 

A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast.  Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.

What is Media Access Control (MAC) address?

A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.

What is STP?


STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table,  duplicate frames generation and so on. Let's move to the video for further detail.


Related news

  1. Hack And Tools
  2. Hacker Tools For Windows
  3. Best Hacking Tools 2020
  4. Hacking Tools For Windows Free Download
  5. Free Pentest Tools For Windows
  6. Hack Tools
  7. Game Hacking
  8. Github Hacking Tools
  9. Hacking Tools Name
  10. Hacking Tools For Windows Free Download
  11. Pentest Tools Find Subdomains
  12. Hack Rom Tools
  13. Hacking Tools Name
  14. Usb Pentest Tools
  15. Hacker Tools List
  16. Hacker Tools Hardware
  17. Hack Rom Tools
  18. Hack App
  19. New Hack Tools
  20. Hack Tools Pc
  21. Hacker Tools Windows
  22. Pentest Tools For Ubuntu
  23. Hacking Tools Online
  24. Pentest Reporting Tools
  25. Easy Hack Tools
  26. Hacking Tools Kit
  27. Hacking Tools For Windows
  28. Hacker Search Tools
  29. Hacker Security Tools
  30. Hacking Tools Kit
  31. Pentest Tools Subdomain
  32. Hack App
  33. Pentest Tools Find Subdomains
  34. Android Hack Tools Github
  35. Free Pentest Tools For Windows
  36. Hacking Tools Usb
  37. Pentest Tools Online
  38. Hacking Tools And Software
  39. Pentest Tools List
  40. Free Pentest Tools For Windows
  41. Hacking Tools
  42. Hack Tools
  43. Pentest Tools Alternative
  44. Growth Hacker Tools
  45. Install Pentest Tools Ubuntu
  46. Pentest Tools Port Scanner
  47. Hacker Security Tools
  48. Hacking App
  49. Free Pentest Tools For Windows
  50. Hacking Tools For Mac
  51. Hacker Tools Linux
  52. Ethical Hacker Tools
  53. Hack Rom Tools
  54. Hacker Hardware Tools
  55. Pentest Tools Github
  56. Pentest Tools Windows
  57. Hack Tools Mac
  58. Hack Website Online Tool
  59. New Hack Tools
  60. Hacker Tools
  61. Hacker Tools Linux
  62. Hacking Tools Software
  63. Hack Tools For Ubuntu
  64. Hacking Tools For Kali Linux
  65. Pentest Tools For Ubuntu
  66. Pentest Tools Bluekeep
  67. Hacker Tools 2019
  68. Hack Tools
  69. Physical Pentest Tools
  70. Hacking Tools For Beginners
  71. Hacking Tools 2020
  72. Hacker Security Tools
  73. Hacker Tools
  74. Best Hacking Tools 2019
  75. Nsa Hacker Tools
  76. Hack Rom Tools
  77. What Are Hacking Tools

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.