Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Related news
- Hack And Tools
- Hacker Tools For Windows
- Best Hacking Tools 2020
- Hacking Tools For Windows Free Download
- Free Pentest Tools For Windows
- Hack Tools
- Game Hacking
- Github Hacking Tools
- Hacking Tools Name
- Hacking Tools For Windows Free Download
- Pentest Tools Find Subdomains
- Hack Rom Tools
- Hacking Tools Name
- Usb Pentest Tools
- Hacker Tools List
- Hacker Tools Hardware
- Hack Rom Tools
- Hack App
- New Hack Tools
- Hack Tools Pc
- Hacker Tools Windows
- Pentest Tools For Ubuntu
- Hacking Tools Online
- Pentest Reporting Tools
- Easy Hack Tools
- Hacking Tools Kit
- Hacking Tools For Windows
- Hacker Search Tools
- Hacker Security Tools
- Hacking Tools Kit
- Pentest Tools Subdomain
- Hack App
- Pentest Tools Find Subdomains
- Android Hack Tools Github
- Free Pentest Tools For Windows
- Hacking Tools Usb
- Pentest Tools Online
- Hacking Tools And Software
- Pentest Tools List
- Free Pentest Tools For Windows
- Hacking Tools
- Hack Tools
- Pentest Tools Alternative
- Growth Hacker Tools
- Install Pentest Tools Ubuntu
- Pentest Tools Port Scanner
- Hacker Security Tools
- Hacking App
- Free Pentest Tools For Windows
- Hacking Tools For Mac
- Hacker Tools Linux
- Ethical Hacker Tools
- Hack Rom Tools
- Hacker Hardware Tools
- Pentest Tools Github
- Pentest Tools Windows
- Hack Tools Mac
- Hack Website Online Tool
- New Hack Tools
- Hacker Tools
- Hacker Tools Linux
- Hacking Tools Software
- Hack Tools For Ubuntu
- Hacking Tools For Kali Linux
- Pentest Tools For Ubuntu
- Pentest Tools Bluekeep
- Hacker Tools 2019
- Hack Tools
- Physical Pentest Tools
- Hacking Tools For Beginners
- Hacking Tools 2020
- Hacker Security Tools
- Hacker Tools
- Best Hacking Tools 2019
- Nsa Hacker Tools
- Hack Rom Tools
- What Are Hacking Tools
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.