Wednesday, May 31, 2023

Networking | Routing And Switching | Tutorial 4 | 2018


Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.

What is Switch? 

A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast.  Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.

What is Media Access Control (MAC) address?

A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.

What is STP?


STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table,  duplicate frames generation and so on. Let's move to the video for further detail.


More info


  1. Hacking Tools 2020
  2. Hacker Security Tools
  3. Hacking Tools For Windows Free Download
  4. Hacking Tools Hardware
  5. Hacker Tools For Pc
  6. Hacker Tools Software
  7. Hacker Tool Kit
  8. Nsa Hacker Tools
  9. Hacks And Tools
  10. Tools Used For Hacking
  11. Tools For Hacker
  12. Pentest Tools Find Subdomains
  13. Pentest Box Tools Download
  14. Hacker Tools Free Download
  15. Hacker Tools Free Download
  16. Hack Rom Tools
  17. Hacking Tools
  18. Hack Tools 2019
  19. Pentest Tools Port Scanner
  20. Best Hacking Tools 2020
  21. Pentest Tools List
  22. Hack App
  23. Pentest Tools Find Subdomains
  24. Hacking Tools For Mac
  25. Hacker Tools Github
  26. Hacker Tools Free Download
  27. Hacking Tools For Kali Linux
  28. Nsa Hack Tools
  29. Best Hacking Tools 2020
  30. Hacker Tools For Ios
  31. Hacking Tools Windows 10
  32. Hack Tools Mac
  33. Hacking Tools Windows 10
  34. Computer Hacker
  35. How To Install Pentest Tools In Ubuntu
  36. Pentest Tools
  37. Best Hacking Tools 2019
  38. Hacking Tools For Windows
  39. Hacking Tools
  40. Hack Apps
  41. What Is Hacking Tools
  42. Hacker Tools Mac
  43. Hacking Tools For Mac
  44. Pentest Tools Nmap
  45. Hacking Tools And Software
  46. Wifi Hacker Tools For Windows
  47. Hack Tools
  48. Growth Hacker Tools
  49. Hackrf Tools
  50. Pentest Tools Bluekeep
  51. Growth Hacker Tools
  52. What Are Hacking Tools
  53. Hacker Tools Software
  54. Hackers Toolbox
  55. Pentest Tools Port Scanner
  56. Pentest Tools Open Source
  57. Best Pentesting Tools 2018
  58. What Is Hacking Tools
  59. Hacking Tools Kit
  60. Hacking Tools For Beginners
  61. Hacking Tools Windows
  62. Hacker Tools Free Download
  63. Hack Tools
  64. Pentest Tools Windows
  65. Pentest Recon Tools
  66. Hacking Tools For Mac
  67. Hack Rom Tools
  68. Free Pentest Tools For Windows
  69. Pentest Tools For Mac
  70. Hacking Tools Pc
  71. Pentest Tools Github
  72. Black Hat Hacker Tools
  73. Pentest Tools Download
  74. Underground Hacker Sites

No comments:

Post a Comment