Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Related word
- Best Pentesting Tools 2018
- Pentest Tools Find Subdomains
- Pentest Tools Nmap
- Pentest Tools Alternative
- Growth Hacker Tools
- How To Hack
- Pentest Tools Tcp Port Scanner
- Hacker Search Tools
- Hacking Tools Github
- Hacking Tools 2019
- Hacker Tools Github
- Hacking Tools Software
- Pentest Tools Open Source
- Pentest Tools Website
- Hack Tool Apk No Root
- Hacker Search Tools
- Pentest Tools
- Black Hat Hacker Tools
- Hacker Tools For Ios
- Pentest Tools Nmap
- New Hacker Tools
- Pentest Tools For Ubuntu
- Physical Pentest Tools
- Hack Apps
- Hacker Search Tools
- Hacking Tools Free Download
- Pentest Tools Online
- Hacker Hardware Tools
- Pentest Tools Bluekeep
- Nsa Hack Tools
- Android Hack Tools Github
- Pentest Tools Website
- Hack Tools Pc
- Hacking Tools For Kali Linux
- New Hacker Tools
- Pentest Tools Android
- Hack Tools
- Hak5 Tools
- Hack Tools For Ubuntu
- New Hacker Tools
- Pentest Tools Bluekeep
- Physical Pentest Tools
- Tools For Hacker
- Hacker Tools
- Hacker Tools Github
- Hacker Tools
- Hacking Tools Name
- Hack Tools Github
- Hacking Tools 2019
- Pentest Recon Tools
- Hack Tools For Pc
- Pentest Tools Find Subdomains
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Pc
- Pentest Tools Android
- Best Hacking Tools 2020
- Hacker Tools Mac
- Hacking Tools Software
- Pentest Tools Download
- Hacking Tools For Windows
- Hacker Tools Hardware
- Pentest Tools Framework
- Pentest Tools Android
- Hacker Tools Github
- Pentest Tools Github
- Pentest Tools Windows
- Nsa Hack Tools
- Hacking Tools Download
- Hack Apps
- Hack Tool Apk No Root
- Pentest Tools For Mac
- Hacking Tools Pc
- Hacking Tools Github
- Tools For Hacker
- How To Install Pentest Tools In Ubuntu
- Hack Tools Online
- Hack Tools Online
- Hack Tools Github
- Top Pentest Tools
- Top Pentest Tools
- Computer Hacker
- Hacker Tools List
- Pentest Recon Tools
- Hacker Tool Kit
- Hacking Tools Download
- Hacking Tools Pc
- Usb Pentest Tools
- Nsa Hack Tools
- Hacking Tools Mac
- Computer Hacker
- Hacking Tools Github
- Hacker Tools For Ios
- Hacker Tools For Mac
- Usb Pentest Tools
- Hacker Tools Linux
- Github Hacking Tools
- Hacking Tools For Windows
- Pentest Tools For Ubuntu
- Pentest Tools Download
- Hacker Tools List
- Hacker Tools Hardware
- Underground Hacker Sites
0 件のコメント:
コメントを投稿