Blogger templates

Backstreet Boys - Show Me the Meaning.mp3
Found at bee mp3 search engine

Friday, January 26, 2024

Networking | Routing And Switching | Tutorial 4 | 2018


Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.

What is Switch? 

A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast.  Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.

What is Media Access Control (MAC) address?

A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.

What is STP?


STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table,  duplicate frames generation and so on. Let's move to the video for further detail.


Related word

  1. Hacker Tools List
  2. Pentest Tools Website Vulnerability
  3. Hacker Tools Apk
  4. Easy Hack Tools
  5. Usb Pentest Tools
  6. Hacking Tools 2020
  7. Hacker Security Tools
  8. Android Hack Tools Github
  9. Hacker Tools
  10. Black Hat Hacker Tools
  11. Hacker Tools For Ios
  12. Hacking Tools
  13. World No 1 Hacker Software
  14. Hack Tools
  15. Hack Tools Github
  16. Growth Hacker Tools
  17. Hacking Tools For Windows Free Download
  18. Hacking Tools For Games
  19. Hack Tools For Games
  20. Pentest Tools For Mac
  21. Hack Tools Download
  22. Hacking Tools For Mac
  23. Hacker Tools Mac
  24. Hacks And Tools
  25. Hacking Tools For Windows
  26. What Is Hacking Tools
  27. Blackhat Hacker Tools
  28. Physical Pentest Tools
  29. Hacking Tools Download
  30. Pentest Tools Port Scanner
  31. Hacking Tools
  32. Pentest Tools Github
  33. Hack Tools Pc
  34. Pentest Tools For Windows
  35. World No 1 Hacker Software
  36. Hacker Techniques Tools And Incident Handling
  37. Best Hacking Tools 2019
  38. Hack Tools Github
  39. Underground Hacker Sites
  40. Pentest Recon Tools
  41. Pentest Reporting Tools
  42. Hack And Tools
  43. Kik Hack Tools
  44. Hacker Techniques Tools And Incident Handling
  45. Hack Tools For Mac
  46. Hacker Search Tools
  47. Hack App
  48. Hack And Tools
  49. New Hacker Tools
  50. Easy Hack Tools
  51. Hacking Tools Mac
  52. Hack Tools
  53. Free Pentest Tools For Windows
  54. Hacker Tools Free
  55. Pentest Tools Download
  56. Pentest Tools Free
  57. Growth Hacker Tools
  58. Ethical Hacker Tools
  59. Hacking Tools Hardware
  60. Pentest Tools Nmap
  61. Hacking Tools For Mac
  62. Hack And Tools
  63. Hacker Security Tools

0 comments:

Post a Comment