Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Continue reading
- Kik Hack Tools
- Beginner Hacker Tools
- Nsa Hack Tools
- New Hacker Tools
- Hacker Tools Github
- Pentest Tools Website
- Free Pentest Tools For Windows
- Hacking Tools Usb
- Hackers Toolbox
- New Hacker Tools
- Hacking Tools Usb
- Physical Pentest Tools
- How To Make Hacking Tools
- Pentest Tools Bluekeep
- Free Pentest Tools For Windows
- Hacker Tools Linux
- Hacker Tools For Mac
- Pentest Tools Apk
- Pentest Reporting Tools
- Pentest Reporting Tools
- Pentest Tools For Ubuntu
- Pentest Tools Review
- World No 1 Hacker Software
- Pentest Tools Nmap
- Pentest Box Tools Download
- Hacking Tools And Software
- Hacks And Tools
- Hacker Tool Kit
- Hacker Tools Hardware
- Tools 4 Hack
- New Hack Tools
- Pentest Tools List
- Hack Tool Apk No Root
- Pentest Box Tools Download
- Install Pentest Tools Ubuntu
- Computer Hacker
- Underground Hacker Sites
- Pentest Recon Tools
- Hack Tools
- Hack Tools Pc
- Hacking Tools For Beginners
- Pentest Tools Port Scanner
- Pentest Tools Windows
- Hacker Tool Kit
- Hacking Tools Download
- Tools For Hacker
- Game Hacking
- Wifi Hacker Tools For Windows
- Hacker Tools Apk
- Hack Tools Mac
- How To Hack
- Hack Tools Online
- Hack Tools Mac
- Hacker Techniques Tools And Incident Handling
- Hacker Tools For Windows
- Hacker Tools Linux
- Hacks And Tools
- Hacking Tools Pc
- Hacking Tools For Beginners
- Hacking Tools For Windows 7
- Pentest Tools List
- Hacking Tools Name
- Nsa Hack Tools
- Hacker Tools Hardware
- Pentest Tools For Ubuntu
- Hacking Tools Name
- Pentest Tools For Mac
- Hacking Tools For Games
- Hacker Tools Free
- Hacking Tools Windows
- Hacker Tools For Pc
- Hackrf Tools
- Usb Pentest Tools
- Hacking Tools Free Download
- Hacker Tools Apk
- Hacking Tools Windows
- Tools 4 Hack
- Pentest Tools Tcp Port Scanner
- Hacker Search Tools
- Hacking Tools Name
- How To Install Pentest Tools In Ubuntu
- Hack Tools Download
- Pentest Tools Tcp Port Scanner
- How To Install Pentest Tools In Ubuntu
- Hackrf Tools
- Hacking Tools 2019
- Hacking Tools Download
- Hacker Tools Apk Download
- Hacker
- Nsa Hacker Tools
- Hacking Tools For Windows Free Download
- Best Pentesting Tools 2018
- Hack Apps
- Hacking Tools Free Download
- Hacker Search Tools
- Usb Pentest Tools
- Pentest Tools Android
- Growth Hacker Tools
- Pentest Tools For Mac
- Hack Website Online Tool
- How To Make Hacking Tools
No comments:
Post a Comment