Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Related links
- Hacking Tools Download
- Pentest Tools Open Source
- Tools Used For Hacking
- Termux Hacking Tools 2019
- Hacking Tools Pc
- Hacker Tools Windows
- Hack Apps
- Pentest Tools Bluekeep
- Hack Tools For Windows
- Hacking Tools For Windows Free Download
- Pentest Tools List
- Hacker Tools
- Hacking Tools For Games
- Best Hacking Tools 2020
- Hacker Tools Software
- Hacking Tools Software
- Hacker Tools Apk
- Hacker Hardware Tools
- Hak5 Tools
- Kik Hack Tools
- Hacking Tools Windows
- New Hack Tools
- Ethical Hacker Tools
- Hacker Search Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools Name
- What Is Hacking Tools
- Hacker Tools Software
- Pentest Tools
- Hack Tools
- Hack And Tools
- Hacker Tools For Windows
- What Is Hacking Tools
- Pentest Tools Alternative
- Hacking Tools Windows 10
- Hacking Tools Github
- Hack Tool Apk No Root
- Hacker
- New Hacker Tools
- Beginner Hacker Tools
- Hacking Tools Download
- Pentest Tools For Ubuntu
- Hack Tools Mac
- Hacker Tools Hardware
- Computer Hacker
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Online
- New Hacker Tools
- Hacker Tools Apk Download
- Best Hacking Tools 2019
- Hacking Tools Pc
- Hacking Tools For Beginners
- Tools Used For Hacking
- Pentest Tools Online
- Android Hack Tools Github
- How To Make Hacking Tools
- What Is Hacking Tools
- Hacking Tools Download
- Pentest Automation Tools
- Nsa Hack Tools Download
- Nsa Hacker Tools
- Hacker Tools Linux
- Tools 4 Hack
- What Are Hacking Tools
- Pentest Tools Alternative
- Hack Tools 2019
- How To Hack
- Hackrf Tools
- Termux Hacking Tools 2019
- Hacking Tools For Kali Linux
- Hacker Hardware Tools
- Hacks And Tools
- Hacking Tools For Beginners
- Hack Tools Pc
- Tools 4 Hack
- Hacker Tools Windows
- Pentest Automation Tools
- How To Install Pentest Tools In Ubuntu
- Hack Apps
- Top Pentest Tools
- How To Make Hacking Tools
- Pentest Tools Online
- Physical Pentest Tools
- Hack Tool Apk No Root
- Hacking Apps
- Pentest Tools Framework
- Hacker Tools Github
- Best Hacking Tools 2020
- Hacking Tools Free Download
- Hacker Tools Github
- Hacking Tools Online
- Pentest Tools Review
- Beginner Hacker Tools
- Hack App
- Pentest Tools Apk
- Usb Pentest Tools
- Physical Pentest Tools
- Pentest Recon Tools
- Hacker Tools Github
No comments:
Post a Comment