Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Related articles
- Hack Apps
- Pentest Tools
- Hacker
- Hacker Tools Github
- Hack Tools
- Pentest Tools Website Vulnerability
- Github Hacking Tools
- Usb Pentest Tools
- Hack Apps
- Pentest Tools Nmap
- Hacker Hardware Tools
- Hacking Tools For Windows Free Download
- Pentest Tools Open Source
- Hacking Tools Free Download
- Tools For Hacker
- Hacker Search Tools
- Pentest Tools For Mac
- Hacking Tools For Games
- Pentest Tools Download
- Pentest Tools List
- Nsa Hack Tools Download
- Pentest Tools For Windows
- Hacker Tools List
- Pentest Tools Kali Linux
- Pentest Tools List
- Pentest Tools Free
- Hacker Tools
- Hacker Tools For Mac
- Hacking Tools Windows 10
- Hacking Tools Github
- Hacking Tools And Software
- Pentest Tools List
- Hack Tools For Pc
- Hackrf Tools
- Pentest Tools Online
- Hacking Tools Mac
- Pentest Tools For Mac
- Hack Rom Tools
- Black Hat Hacker Tools
- Hacking Tools For Kali Linux
- Hacking Tools Pc
- Usb Pentest Tools
- New Hack Tools
- Pentest Tools Free
- What Is Hacking Tools
- Hackers Toolbox
- Hacking App
- Pentest Tools List
- Pentest Tools For Windows
- Hacking Tools 2020
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Ubuntu
- New Hacker Tools
- Pentest Tools Linux
- Bluetooth Hacking Tools Kali
- What Is Hacking Tools
- Underground Hacker Sites
- Pentest Tools Nmap
- Hacker Tools Hardware
- Hacking Tools 2019
- Hacker Tools Github
- Hack Tools 2019
- Hacking Tools Pc
- Hacking Tools For Games
- Hacking Tools 2020
- Hacking Tools For Pc
- Hacking Tools Mac
- What Are Hacking Tools
- Hacker Tools Apk
- Computer Hacker
- World No 1 Hacker Software
- How To Install Pentest Tools In Ubuntu
- Hacks And Tools
- Hack Website Online Tool
- Hacker Tools List
- Kik Hack Tools
- Hacking Tools Windows 10
- Hacker Tools Apk
- Pentest Reporting Tools
- Hacker Techniques Tools And Incident Handling
- Hack Tools Online
- Hacker Tools 2019
- How To Make Hacking Tools
- Hack Tools For Mac
- Hacking Tools Name
- Hacking Tools Online
- Hacking Apps
- Pentest Tools Url Fuzzer
- Pentest Tools Android
- Hacking Tools For Mac
No comments:
Post a Comment