Sunday, 4 June 2023

Networking | Routing And Switching | Tutorial 4 | 2018


Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.

What is Switch? 

A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast.  Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.

What is Media Access Control (MAC) address?

A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.

What is STP?


STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table,  duplicate frames generation and so on. Let's move to the video for further detail.


Related word


  1. Hacker Tools Github
  2. Hacker Tools Apk
  3. Hack Tools Pc
  4. Pentest Tools Apk
  5. Best Pentesting Tools 2018
  6. Hack Website Online Tool
  7. Hacker Techniques Tools And Incident Handling
  8. Blackhat Hacker Tools
  9. Physical Pentest Tools
  10. Pentest Tools For Ubuntu
  11. Hacker Tools Linux
  12. Hacking Tools Usb
  13. Tools Used For Hacking
  14. Hackers Toolbox
  15. Best Pentesting Tools 2018
  16. Hackers Toolbox
  17. Pentest Tools For Windows
  18. Android Hack Tools Github
  19. Hacker Tools Mac
  20. Underground Hacker Sites
  21. Pentest Box Tools Download
  22. Hacking Tools Kit
  23. Pentest Tools Alternative
  24. Hacking Tools Software
  25. Hacking Tools Hardware
  26. Ethical Hacker Tools
  27. Pentest Tools Review
  28. Hacking Tools
  29. New Hack Tools
  30. Pentest Tools Website
  31. Hackrf Tools
  32. Hacking Tools Usb
  33. Pentest Tools
  34. Hacker Tools Apk Download
  35. Hacks And Tools
  36. Pentest Tools Review
  37. Hack Tools Github
  38. Pentest Tools Windows
  39. Hacking App
  40. Github Hacking Tools
  41. Kik Hack Tools
  42. Physical Pentest Tools
  43. Hacks And Tools
  44. Nsa Hacker Tools
  45. Hacking Tools For Mac
  46. Pentest Tools Review
  47. Pentest Recon Tools
  48. Hack Tools For Ubuntu
  49. Pentest Tools Port Scanner
  50. How To Hack
  51. Pentest Box Tools Download
  52. Usb Pentest Tools
  53. Pentest Recon Tools
  54. Pentest Tools List
  55. Hack Tools
  56. Pentest Tools Windows
  57. Hacking Tools
  58. Hackers Toolbox
  59. Pentest Tools Online
  60. How To Hack
  61. Hacker Tools Hardware
  62. Pentest Tools Url Fuzzer
  63. New Hack Tools
  64. Hack App
  65. What Are Hacking Tools
  66. Easy Hack Tools
  67. Pentest Tools Find Subdomains
  68. Nsa Hack Tools
  69. Game Hacking
  70. Hack Website Online Tool
  71. Pentest Tools Github
  72. Hack Tools For Ubuntu
  73. Github Hacking Tools
  74. Usb Pentest Tools
  75. Hack Tool Apk
  76. Tools Used For Hacking
  77. Hack Tools Pc
  78. Pentest Tools Open Source
  79. Hack Tools Pc
  80. Pentest Reporting Tools
  81. Physical Pentest Tools
  82. Hacking Tools Windows
  83. Hacking Tools For Games
  84. Hacker Hardware Tools
  85. Hack Tools Github
  86. Nsa Hacker Tools
  87. Pentest Tools Website Vulnerability
  88. Pentest Tools Kali Linux
  89. Tools 4 Hack
  90. Pentest Tools Apk
  91. Hacker Techniques Tools And Incident Handling
  92. Hacker Tools
  93. Install Pentest Tools Ubuntu
  94. Hacking Tools For Games
  95. Pentest Tools Url Fuzzer
  96. Blackhat Hacker Tools
  97. Hack Tools Pc
  98. Hacking Tools For Kali Linux
  99. Hack And Tools
  100. Hacker Tools For Pc
  101. Hack Tools Download
  102. Hack Tools For Mac
  103. Hacking Tools And Software
  104. Hack Rom Tools

No comments:

Post a Comment