Sunday, January 28, 2024

Networking | Routing And Switching | Tutorial 4 | 2018


Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.

What is Switch? 

A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast.  Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.

What is Media Access Control (MAC) address?

A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.

What is STP?


STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table,  duplicate frames generation and so on. Let's move to the video for further detail.


Related articles
  1. Hacking Tools Software
  2. Hacker Tool Kit
  3. Hacker Tools For Ios
  4. Hacking Tools For Windows
  5. Hacking Tools
  6. Hacker Tools
  7. Hacker Tools 2020
  8. Hacker Techniques Tools And Incident Handling
  9. New Hack Tools
  10. Pentest Tools Open Source
  11. Hacking Tools And Software
  12. Pentest Box Tools Download
  13. Hacking Tools For Windows
  14. Hacker Tools Free
  15. Hacking Tools For Mac
  16. Hacker Tools Apk
  17. Physical Pentest Tools
  18. Hacking Tools And Software
  19. Best Pentesting Tools 2018
  20. Hak5 Tools
  21. Hacking Tools Online
  22. Hacker Tools For Ios
  23. Pentest Tools Nmap
  24. Pentest Tools Alternative
  25. Pentest Tools Url Fuzzer
  26. Hack And Tools
  27. Hacking Tools 2019
  28. Hacking Tools For Windows 7
  29. Pentest Tools Port Scanner
  30. Hacking Tools Online
  31. Hacking Tools Windows 10
  32. Black Hat Hacker Tools
  33. Pentest Tools List
  34. Tools For Hacker
  35. Hack Tools Pc
  36. Hack App
  37. Pentest Tools Windows
  38. Hacking Tools For Pc
  39. Hacking Tools Software
  40. Beginner Hacker Tools
  41. Tools For Hacker
  42. Pentest Reporting Tools
  43. Hacking Tools Pc
  44. Bluetooth Hacking Tools Kali
  45. Hack Website Online Tool
  46. Pentest Tools Review
  47. Hack And Tools
  48. Best Hacking Tools 2019
  49. Hacker Tools Hardware
  50. Hack Tools For Windows
  51. Hack Rom Tools
  52. Hack Tools Online
  53. Hack Tools Pc
  54. Hacking Tools For Kali Linux
  55. Pentest Tools Free
  56. Hacker Tools For Windows
  57. Pentest Tools Open Source
  58. Hacking Tools
  59. Best Hacking Tools 2019
  60. Hack Tools For Windows
  61. Hacker Tools 2019
  62. Hacking Tools For Beginners

No comments:

Post a Comment