Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Related posts
- Hacking Tools For Kali Linux
- Hacking Tools Online
- Pentest Tools Kali Linux
- Termux Hacking Tools 2019
- Hacker Tools Online
- Hacker Tools Apk Download
- Hack Website Online Tool
- Nsa Hack Tools
- Hacker Hardware Tools
- Hacking Tools For Windows
- Hacking Tools Pc
- Hacking Tools 2019
- Hacking Tools Windows
- Hacker Tools Hardware
- Pentest Tools Open Source
- Growth Hacker Tools
- New Hack Tools
- Pentest Tools For Ubuntu
- Best Hacking Tools 2019
- Nsa Hack Tools
- Hacking Tools Usb
- Hacking Tools For Windows
- Hack Tools For Pc
- Pentest Tools List
- Pentest Automation Tools
- Hacking Tools And Software
- Best Hacking Tools 2020
- Hacker Tools Windows
- Pentest Tools
- Hacking Tools For Windows 7
- Pentest Tools Url Fuzzer
- Hack Rom Tools
- Tools For Hacker
- Hacking Tools For Beginners
- Pentest Tools
- Hack Tools For Ubuntu
- Pentest Tools List
- Pentest Tools For Android
- Hacker Tools List
- Pentest Tools Android
- Pentest Reporting Tools
- Pentest Tools Website
- Pentest Tools Find Subdomains
- Android Hack Tools Github
- Hack Tools Pc
- Hack Tools For Pc
- Pentest Tools
- Pentest Tools Website
- Hacker Tools Windows
- Underground Hacker Sites
- Hacking Tools For Windows
- Bluetooth Hacking Tools Kali
- Hacking App
- Underground Hacker Sites
- Hack Tools 2019
- Hacker Tools Github
- Hacking Tools Github
- Android Hack Tools Github
- Hacking Tools Github
- Nsa Hack Tools
- Hacker Tools For Ios
- Hacker Tools Software
- Hacker Tools Linux
- Hack Website Online Tool
- Hacker Tool Kit
- Pentest Tools List
- Pentest Recon Tools
- Pentest Tools Website
- Pentest Tools
تعليقات
إرسال تعليق