Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Related links
- What Is Hacking Tools
- Pentest Tools Linux
- Hacker Tools Free Download
- Hacking Tools
- Github Hacking Tools
- Hack Tools For Games
- Pentest Tools Subdomain
- Hacking Tools For Kali Linux
- Hack Tools Pc
- How To Make Hacking Tools
- Pentest Automation Tools
- Pentest Tools Port Scanner
- Hacking Tools For Windows 7
- Pentest Tools List
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Windows
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Usb
- Best Hacking Tools 2020
- Hacker Tools Linux
- Hacking Tools Online
- Pentest Tools Find Subdomains
- Hack Tools Download
- Hacker Tools Free Download
- Tools Used For Hacking
- Nsa Hack Tools Download
- Pentest Tools Framework
- Pentest Tools Website
- Pentest Tools Open Source
- Hacker Tool Kit
- Hack Tools Online
- Hacking Tools Software
- Hacking Tools And Software
- Hacking App
- Hacking Tools Online
- Hacks And Tools
- Hack Tools For Mac
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Ubuntu
- Hacks And Tools
- Hacker Tools
- Hack Tools For Mac
- Hacking Tools Online
- Physical Pentest Tools
- Free Pentest Tools For Windows
- Best Hacking Tools 2019
- Hack Tools For Ubuntu
- Hacker Search Tools
- Hacking Tools 2020
- Hacking Tools Mac
- Hacking Tools Online
- Pentest Recon Tools
- Usb Pentest Tools
- Hack Tools
- Underground Hacker Sites
- Pentest Tools Android
- Hacking Tools For Kali Linux
- Black Hat Hacker Tools
- Hacking Tools 2020
- Hacking Tools Kit
- Hacking Tools For Beginners
- Hacking Tools For Beginners
- Pentest Tools Alternative
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Tcp Port Scanner
- Hacker Tools For Pc
- World No 1 Hacker Software
- How To Hack
- Hack Tools Online
- Top Pentest Tools
- Hacking Tools Usb
- Pentest Automation Tools
No comments:
Post a Comment