Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Read more
- Hack Apps
- Hacking Tools For Windows Free Download
- Hacking Tools For Windows Free Download
- How To Install Pentest Tools In Ubuntu
- Hacking Tools 2020
- Hacking Tools Hardware
- Nsa Hack Tools Download
- Hak5 Tools
- Hacker Tools For Pc
- Hacker Tools For Pc
- Hacking Tools For Windows
- Hacking Tools For Beginners
- Hack Tools Online
- Pentest Tools For Mac
- Hack Apps
- Hacking Tools Software
- Hack Tool Apk
- Best Hacking Tools 2019
- Hack Tools Pc
- Nsa Hack Tools
- Hack Apps
- Android Hack Tools Github
- Hacker Tools List
- Hacking Tools For Kali Linux
- Hackers Toolbox
- How To Hack
- Pentest Tools Download
- Hacking Tools Hardware
- Hacking Tools Github
- Pentest Tools Windows
- Pentest Recon Tools
- Hak5 Tools
- Hacker Tools Free Download
- Github Hacking Tools
- Hack Rom Tools
- Ethical Hacker Tools
- Pentest Tools Subdomain
- Hack Apps
- Hacker Tool Kit
- Hacker Tools Free
- Hack Tool Apk No Root
- Hacking Tools Name
- Pentest Tools For Mac
- Hacker Tools Free
- Hacker Tools Free Download
- Hacker Tools Windows
- Hacker Tools For Pc
- World No 1 Hacker Software
- Best Hacking Tools 2019
- Hack App
- Hacking Tools For Windows 7
- Hacker Tools Windows
- Hacking Tools Windows
- Termux Hacking Tools 2019
- Pentest Tools Website Vulnerability
- Growth Hacker Tools
- Underground Hacker Sites
- Hacker Tools For Ios
- What Is Hacking Tools
- Pentest Tools Windows
- Bluetooth Hacking Tools Kali
- Hacker Tools For Pc
- Hack Tools 2019
- Pentest Tools Website Vulnerability
- Hacker Tools For Ios
- Hak5 Tools
- Pentest Tools Download
- Hacker Tools Windows
- Pentest Tools For Ubuntu
- Hacking Tools Free Download
- Hack Apps
- Hacking Tools Download
- What Are Hacking Tools
- Hacking Tools Kit
- Hacker Tools Linux
- Hack Tools For Mac
- Hack Tools Github
- Hacker Security Tools
- Hacker Tools For Mac
- Hacking Tools Name
- Hack Tools Download
- Pentest Tools For Windows
- Hacking Tools For Kali Linux
- Termux Hacking Tools 2019
- Hacking Tools 2019
- Hacker Hardware Tools
- Hacker Tools Linux
- Best Pentesting Tools 2018
- Pentest Tools Kali Linux
- Hacker Search Tools
- Pentest Tools For Ubuntu
0 件のコメント:
コメントを投稿