Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
More info
- Hacking Tools 2020
- Hacker Security Tools
- Hacking Tools For Windows Free Download
- Hacking Tools Hardware
- Hacker Tools For Pc
- Hacker Tools Software
- Hacker Tool Kit
- Nsa Hacker Tools
- Hacks And Tools
- Tools Used For Hacking
- Tools For Hacker
- Pentest Tools Find Subdomains
- Pentest Box Tools Download
- Hacker Tools Free Download
- Hacker Tools Free Download
- Hack Rom Tools
- Hacking Tools
- Hack Tools 2019
- Pentest Tools Port Scanner
- Best Hacking Tools 2020
- Pentest Tools List
- Hack App
- Pentest Tools Find Subdomains
- Hacking Tools For Mac
- Hacker Tools Github
- Hacker Tools Free Download
- Hacking Tools For Kali Linux
- Nsa Hack Tools
- Best Hacking Tools 2020
- Hacker Tools For Ios
- Hacking Tools Windows 10
- Hack Tools Mac
- Hacking Tools Windows 10
- Computer Hacker
- How To Install Pentest Tools In Ubuntu
- Pentest Tools
- Best Hacking Tools 2019
- Hacking Tools For Windows
- Hacking Tools
- Hack Apps
- What Is Hacking Tools
- Hacker Tools Mac
- Hacking Tools For Mac
- Pentest Tools Nmap
- Hacking Tools And Software
- Wifi Hacker Tools For Windows
- Hack Tools
- Growth Hacker Tools
- Hackrf Tools
- Pentest Tools Bluekeep
- Growth Hacker Tools
- What Are Hacking Tools
- Hacker Tools Software
- Hackers Toolbox
- Pentest Tools Port Scanner
- Pentest Tools Open Source
- Best Pentesting Tools 2018
- What Is Hacking Tools
- Hacking Tools Kit
- Hacking Tools For Beginners
- Hacking Tools Windows
- Hacker Tools Free Download
- Hack Tools
- Pentest Tools Windows
- Pentest Recon Tools
- Hacking Tools For Mac
- Hack Rom Tools
- Free Pentest Tools For Windows
- Pentest Tools For Mac
- Hacking Tools Pc
- Pentest Tools Github
- Black Hat Hacker Tools
- Pentest Tools Download
- Underground Hacker Sites
No comments:
Post a Comment