Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Related word
- Hacker Tools Github
- Hacker Tools Apk
- Hack Tools Pc
- Pentest Tools Apk
- Best Pentesting Tools 2018
- Hack Website Online Tool
- Hacker Techniques Tools And Incident Handling
- Blackhat Hacker Tools
- Physical Pentest Tools
- Pentest Tools For Ubuntu
- Hacker Tools Linux
- Hacking Tools Usb
- Tools Used For Hacking
- Hackers Toolbox
- Best Pentesting Tools 2018
- Hackers Toolbox
- Pentest Tools For Windows
- Android Hack Tools Github
- Hacker Tools Mac
- Underground Hacker Sites
- Pentest Box Tools Download
- Hacking Tools Kit
- Pentest Tools Alternative
- Hacking Tools Software
- Hacking Tools Hardware
- Ethical Hacker Tools
- Pentest Tools Review
- Hacking Tools
- New Hack Tools
- Pentest Tools Website
- Hackrf Tools
- Hacking Tools Usb
- Pentest Tools
- Hacker Tools Apk Download
- Hacks And Tools
- Pentest Tools Review
- Hack Tools Github
- Pentest Tools Windows
- Hacking App
- Github Hacking Tools
- Kik Hack Tools
- Physical Pentest Tools
- Hacks And Tools
- Nsa Hacker Tools
- Hacking Tools For Mac
- Pentest Tools Review
- Pentest Recon Tools
- Hack Tools For Ubuntu
- Pentest Tools Port Scanner
- How To Hack
- Pentest Box Tools Download
- Usb Pentest Tools
- Pentest Recon Tools
- Pentest Tools List
- Hack Tools
- Pentest Tools Windows
- Hacking Tools
- Hackers Toolbox
- Pentest Tools Online
- How To Hack
- Hacker Tools Hardware
- Pentest Tools Url Fuzzer
- New Hack Tools
- Hack App
- What Are Hacking Tools
- Easy Hack Tools
- Pentest Tools Find Subdomains
- Nsa Hack Tools
- Game Hacking
- Hack Website Online Tool
- Pentest Tools Github
- Hack Tools For Ubuntu
- Github Hacking Tools
- Usb Pentest Tools
- Hack Tool Apk
- Tools Used For Hacking
- Hack Tools Pc
- Pentest Tools Open Source
- Hack Tools Pc
- Pentest Reporting Tools
- Physical Pentest Tools
- Hacking Tools Windows
- Hacking Tools For Games
- Hacker Hardware Tools
- Hack Tools Github
- Nsa Hacker Tools
- Pentest Tools Website Vulnerability
- Pentest Tools Kali Linux
- Tools 4 Hack
- Pentest Tools Apk
- Hacker Techniques Tools And Incident Handling
- Hacker Tools
- Install Pentest Tools Ubuntu
- Hacking Tools For Games
- Pentest Tools Url Fuzzer
- Blackhat Hacker Tools
- Hack Tools Pc
- Hacking Tools For Kali Linux
- Hack And Tools
- Hacker Tools For Pc
- Hack Tools Download
- Hack Tools For Mac
- Hacking Tools And Software
- Hack Rom Tools
No comments:
Post a Comment