Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Continue reading
- Hack Rom Tools
- Pentest Tools Framework
- Hack Tools For Mac
- Hacker Tools Apk Download
- Hackrf Tools
- Hack Tools Download
- Hacker Tools Windows
- Hack Tools Download
- How To Install Pentest Tools In Ubuntu
- Hacker Techniques Tools And Incident Handling
- Hacking Tools 2019
- Hacker Tools Linux
- Pentest Tools List
- Pentest Tools For Android
- Hacking Tools Mac
- New Hacker Tools
- Hack Tools For Ubuntu
- Hacker Tools Mac
- Hacker Search Tools
- Free Pentest Tools For Windows
- Hacker Tools Apk Download
- Hack Tools For Ubuntu
- Pentest Tools Website
- Hack App
- Hacker Tools Mac
- Nsa Hack Tools
- Hack Website Online Tool
- What Are Hacking Tools
- Hack Tools 2019
- Tools Used For Hacking
- Pentest Reporting Tools
- Hackrf Tools
- Hack And Tools
- Hacking Tools For Windows Free Download
- Pentest Tools Nmap
- Hacking Tools Windows 10
- Pentest Tools Nmap
- Pentest Tools Subdomain
- Hacker Tools Windows
- Pentest Recon Tools
- Pentest Tools Alternative
- Hack Tools 2019
- Install Pentest Tools Ubuntu
- Nsa Hack Tools
- Termux Hacking Tools 2019
- Pentest Tools Android
- Pentest Reporting Tools
- Hack Tools For Ubuntu
- Android Hack Tools Github
- Underground Hacker Sites
- Pentest Tools For Ubuntu
- Hacker Tools List
- Nsa Hack Tools Download
- Hack And Tools
- Hacking Tools For Mac
- Hacking Tools For Pc
- Best Pentesting Tools 2018
- Nsa Hack Tools
- Pentest Tools Url Fuzzer
- Pentest Tools Android
- Top Pentest Tools
- Pentest Box Tools Download
- New Hack Tools
- Hacker Tools Apk Download
- Hacker Tools Mac
- Hack Tools
- Hacker Tools For Windows
- Pentest Tools Download
- Hacking Tools For Mac
- Pentest Tools Online
- Nsa Hacker Tools
- Pentest Tools Download
- Hack And Tools
- Hack Tools For Windows
- Hacker Tools For Windows
- Hacker Tools 2020
- Hacker Tools List
- Hack Apps
- Pentest Tools For Android
- Top Pentest Tools
- Hack Tools For Mac
- Pentest Tools Windows
- Hack Tools For Ubuntu
- Hacker Tools Free
- Hack Tools Download
- Hacking Tools Windows 10
- Pentest Recon Tools
- Pentest Tools Website
- Hacking Tools For Kali Linux
- Hack Tools Mac
- Hack Tool Apk
No hay comentarios:
Publicar un comentario