Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
More info
- Hacking Tools For Games
- Beginner Hacker Tools
- Hacking Tools Software
- Hacker Tools
- Hack Tools For Windows
- Hacker Tool Kit
- Game Hacking
- Pentest Tools Website Vulnerability
- Hacking Tools Usb
- Tools For Hacker
- Tools Used For Hacking
- Hack Tools For Pc
- Pentest Tools Alternative
- Pentest Tools For Windows
- Hack App
- Hacker Tools Free Download
- Hacker Tool Kit
- Hack App
- Ethical Hacker Tools
- How To Make Hacking Tools
- How To Make Hacking Tools
- Tools For Hacker
- Pentest Box Tools Download
- Pentest Tools List
- Free Pentest Tools For Windows
- Hacker Tools Free
- Hacker Tools 2019
- Nsa Hack Tools Download
- Pentest Tools For Mac
- Hackrf Tools
- Hacker Tools Github
- Best Hacking Tools 2019
- Termux Hacking Tools 2019
- Hacking Tools Kit
- Android Hack Tools Github
- Hack Tools Pc
- Pentest Tools Url Fuzzer
- Hacking Tools Hardware
- Ethical Hacker Tools
- Hacking Tools 2019
- Wifi Hacker Tools For Windows
- Hacking Tools Mac
- Hacking App
- How To Install Pentest Tools In Ubuntu
- Nsa Hacker Tools
- Hacker Tools List
- Pentest Tools Website Vulnerability
- Pentest Tools Free
- Hack And Tools
- Hak5 Tools
- Pentest Tools Website Vulnerability
- Pentest Tools Subdomain
- Computer Hacker
- Black Hat Hacker Tools
- Best Hacking Tools 2019
- Hacker Tools Free Download
- Tools Used For Hacking
- Hacking Tools Online
- Hacking Tools For Games
- Tools For Hacker
- Pentest Tools Subdomain
- Growth Hacker Tools
- Nsa Hacker Tools
- Hacker Tools Linux
- Hacking Tools Name
- Hacks And Tools
- Pentest Automation Tools
- Hacking Tools Usb
- Hacker Tools For Ios
- Hacker Tools Windows
- Tools For Hacker
- Hacker Search Tools
- Hackrf Tools
- Hacking Tools Software
- Hacking Tools Online
- Hacker Tools Linux
- Hack Tools For Mac
- Hack Tools For Games
- Hacking Tools For Windows Free Download
- Hacker Tools
- Underground Hacker Sites
- Blackhat Hacker Tools
- Hacker Tools For Ios
- Tools For Hacker
- Game Hacking
- Hacking Tools For Games
- Pentest Tools Open Source
- Hacker Tools Linux
- Hacking Tools For Kali Linux
- Hacker Tools Linux
- Hack Tools For Pc
- New Hack Tools
- Hack Tools For Games
- Termux Hacking Tools 2019
- Hacking Tools For Mac
- Hack Tools For Windows
- Best Pentesting Tools 2018
- Pentest Tools Website
- Hack Tools For Games
- Hacking Tools Mac
- Hack Tools For Windows
- Underground Hacker Sites
Sem comentários:
Enviar um comentário