Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Related word
- Hacker Tools List
- Pentest Tools Website Vulnerability
- Hacker Tools Apk
- Easy Hack Tools
- Usb Pentest Tools
- Hacking Tools 2020
- Hacker Security Tools
- Android Hack Tools Github
- Hacker Tools
- Black Hat Hacker Tools
- Hacker Tools For Ios
- Hacking Tools
- World No 1 Hacker Software
- Hack Tools
- Hack Tools Github
- Growth Hacker Tools
- Hacking Tools For Windows Free Download
- Hacking Tools For Games
- Hack Tools For Games
- Pentest Tools For Mac
- Hack Tools Download
- Hacking Tools For Mac
- Hacker Tools Mac
- Hacks And Tools
- Hacking Tools For Windows
- What Is Hacking Tools
- Blackhat Hacker Tools
- Physical Pentest Tools
- Hacking Tools Download
- Pentest Tools Port Scanner
- Hacking Tools
- Pentest Tools Github
- Hack Tools Pc
- Pentest Tools For Windows
- World No 1 Hacker Software
- Hacker Techniques Tools And Incident Handling
- Best Hacking Tools 2019
- Hack Tools Github
- Underground Hacker Sites
- Pentest Recon Tools
- Pentest Reporting Tools
- Hack And Tools
- Kik Hack Tools
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Mac
- Hacker Search Tools
- Hack App
- Hack And Tools
- New Hacker Tools
- Easy Hack Tools
- Hacking Tools Mac
- Hack Tools
- Free Pentest Tools For Windows
- Hacker Tools Free
- Pentest Tools Download
- Pentest Tools Free
- Growth Hacker Tools
- Ethical Hacker Tools
- Hacking Tools Hardware
- Pentest Tools Nmap
- Hacking Tools For Mac
- Hack And Tools
- Hacker Security Tools
0 comments:
Post a Comment