Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
More articles
- Hack Rom Tools
- Pentest Tools Port Scanner
- Hacker Techniques Tools And Incident Handling
- Best Hacking Tools 2020
- Github Hacking Tools
- Hacker Tools For Windows
- Github Hacking Tools
- Github Hacking Tools
- Hacker Hardware Tools
- Hack And Tools
- Pentest Tools Github
- Hacker Tools For Windows
- Hack Tools For Ubuntu
- Bluetooth Hacking Tools Kali
- Termux Hacking Tools 2019
- Hacking Tools Usb
- Best Hacking Tools 2019
- Pentest Tools Website Vulnerability
- Hack Tools For Ubuntu
- Best Pentesting Tools 2018
- Pentest Tools List
- Hacks And Tools
- Install Pentest Tools Ubuntu
- Best Pentesting Tools 2018
- Pentest Tools Download
- Game Hacking
- Wifi Hacker Tools For Windows
- Hacker Tools Apk
- Hack Tools For Ubuntu
- Pentest Tools Review
- Hack Tools For Games
- Nsa Hack Tools Download
- Hack Tool Apk
- Ethical Hacker Tools
- Best Hacking Tools 2019
- Easy Hack Tools
- Pentest Tools Subdomain
- Hacker Search Tools
- Hacker Tool Kit
- Hack Tools Mac
- How To Make Hacking Tools
- Pentest Tools List
- Hacking Tools Name
- Wifi Hacker Tools For Windows
- Underground Hacker Sites
- Hackrf Tools
- Hak5 Tools
- Hack Tools Online
- Hacker Tools For Windows
- Pentest Automation Tools
- Physical Pentest Tools
- Hack Tools For Ubuntu
- Hacking Tools For Mac
- Pentest Automation Tools
- Nsa Hack Tools Download
- Pentest Tools Alternative
- Pentest Tools Free
- Hak5 Tools
- Hacking Tools
- New Hack Tools
- Ethical Hacker Tools
- Hack Tools Pc
- Hacking Tools Windows
- Hacker Tools Free Download
- Best Hacking Tools 2020
- Github Hacking Tools
- Hacking Apps
- Wifi Hacker Tools For Windows
- Pentest Tools Tcp Port Scanner
- Tools For Hacker
- Termux Hacking Tools 2019
- Top Pentest Tools
- Pentest Tools Kali Linux
- Nsa Hack Tools
- Easy Hack Tools
- Hacker Hardware Tools
- Hacking Tools Name
- Hacker Techniques Tools And Incident Handling
- Hack Tools
- Kik Hack Tools
- Pentest Tools Apk
- Hacker Tools Linux
- Hacking Tools For Beginners
- Hacker Tools Free
- Hacker Tools Mac
- Hack And Tools
- Pentest Tools Framework
- Hacker Tools For Pc
- Hacker Tools For Windows
- Pentest Tools Nmap
- Hacking Tools 2019
- Hack Tools For Mac
- Pentest Automation Tools
- Hacker
- Pentest Tools Free
No comments:
Post a Comment