Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
More information
- Hacking Tools And Software
- Pentest Tools For Ubuntu
- Hacking Tools For Kali Linux
- How To Make Hacking Tools
- Hack Tools For Ubuntu
- Hacker Tools For Ios
- Hacking Apps
- Hacking Tools For Kali Linux
- Pentest Tools Bluekeep
- Beginner Hacker Tools
- Bluetooth Hacking Tools Kali
- Hacking App
- Hacking Tools For Mac
- Hak5 Tools
- Hacker Tools 2020
- World No 1 Hacker Software
- Wifi Hacker Tools For Windows
- Hacker Security Tools
- Hacker Tools Hardware
- Hacking Tools Kit
- Hack Tools For Pc
- Hack Tools Download
- Hack Tools Pc
- Hacker Tools Free Download
- Hacking Tools For Mac
- Hacker Tools Linux
- Hacking Tools Github
- How To Hack
- Hack Tools For Games
- Nsa Hack Tools
- Hacking Tools For Games
- Top Pentest Tools
- Hacking Tools Name
- Free Pentest Tools For Windows
- Hacking Tools Windows 10
- Hacking Tools Usb
- Hacker Hardware Tools
- Hack App
- Hackers Toolbox
- Ethical Hacker Tools
- Hacker Tools For Pc
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Tcp Port Scanner
- Hacker Tools Free Download
- Hacker Tools Windows
- Best Hacking Tools 2020
- Hackers Toolbox
- Hack Tools Mac
- Hackrf Tools
- Usb Pentest Tools
- Best Hacking Tools 2020
- Github Hacking Tools
- Pentest Tools Nmap
- Pentest Tools Bluekeep
- Hacking Tools For Mac
- New Hacker Tools
- Pentest Tools For Android
- Hacking Tools For Windows 7
- Hack Tools Pc
- Hack Tools For Ubuntu
- Growth Hacker Tools
- Hacking Tools For Kali Linux
- Pentest Tools Alternative
- Hacker Tools Software
- Install Pentest Tools Ubuntu
- Pentest Tools Subdomain
- Hacking Tools Name
- Pentest Tools For Mac
- Hacking Tools For Windows 7
- Hacking Tools Windows
- Hacker Tools Apk Download
- Nsa Hacker Tools
- Hacker Tools Linux
- Hacking Tools Download
- World No 1 Hacker Software
- Hack Tool Apk No Root
- New Hacker Tools
- Pentest Tools Framework
- Pentest Tools For Ubuntu
- Hacking Tools Kit
- Pentest Tools Find Subdomains
- Hacker Hardware Tools
- New Hack Tools
- Pentest Box Tools Download
- Pentest Tools Find Subdomains
- Hacking Tools Kit
- Hacker Tools Windows
- Hackers Toolbox
- Hacker
- Top Pentest Tools
- Easy Hack Tools
- Hack Tools For Pc
- Hacker Tools Windows
No comments:
Post a Comment