Networking | Routing And Switching | Tutorial 4 | 2018


Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.

What is Switch? 

A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast.  Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.

What is Media Access Control (MAC) address?

A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.

What is STP?


STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table,  duplicate frames generation and so on. Let's move to the video for further detail.


Related posts


  1. Hacking Tools For Kali Linux
  2. Hacking Tools Online
  3. Pentest Tools Kali Linux
  4. Termux Hacking Tools 2019
  5. Hacker Tools Online
  6. Hacker Tools Apk Download
  7. Hack Website Online Tool
  8. Nsa Hack Tools
  9. Hacker Hardware Tools
  10. Hacking Tools For Windows
  11. Hacking Tools Pc
  12. Hacking Tools 2019
  13. Hacking Tools Windows
  14. Hacker Tools Hardware
  15. Pentest Tools Open Source
  16. Growth Hacker Tools
  17. New Hack Tools
  18. Pentest Tools For Ubuntu
  19. Best Hacking Tools 2019
  20. Nsa Hack Tools
  21. Hacking Tools Usb
  22. Hacking Tools For Windows
  23. Hack Tools For Pc
  24. Pentest Tools List
  25. Pentest Automation Tools
  26. Hacking Tools And Software
  27. Best Hacking Tools 2020
  28. Hacker Tools Windows
  29. Pentest Tools
  30. Hacking Tools For Windows 7
  31. Pentest Tools Url Fuzzer
  32. Hack Rom Tools
  33. Tools For Hacker
  34. Hacking Tools For Beginners
  35. Pentest Tools
  36. Hack Tools For Ubuntu
  37. Pentest Tools List
  38. Pentest Tools For Android
  39. Hacker Tools List
  40. Pentest Tools Android
  41. Pentest Reporting Tools
  42. Pentest Tools Website
  43. Pentest Tools Find Subdomains
  44. Android Hack Tools Github
  45. Hack Tools Pc
  46. Hack Tools For Pc
  47. Pentest Tools
  48. Pentest Tools Website
  49. Hacker Tools Windows
  50. Underground Hacker Sites
  51. Hacking Tools For Windows
  52. Bluetooth Hacking Tools Kali
  53. Hacking App
  54. Underground Hacker Sites
  55. Hack Tools 2019
  56. Hacker Tools Github
  57. Hacking Tools Github
  58. Android Hack Tools Github
  59. Hacking Tools Github
  60. Nsa Hack Tools
  61. Hacker Tools For Ios
  62. Hacker Tools Software
  63. Hacker Tools Linux
  64. Hack Website Online Tool
  65. Hacker Tool Kit
  66. Pentest Tools List
  67. Pentest Recon Tools
  68. Pentest Tools Website
  69. Pentest Tools

تعليقات