Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.
What is Switch?
A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast. Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.What is Media Access Control (MAC) address?
A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.What is STP?
STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table, duplicate frames generation and so on. Let's move to the video for further detail.
Related word
- Hacker Tools Free Download
- Pentest Tools Kali Linux
- Pentest Tools Windows
- Hacking App
- Hacking Tools Online
- Pentest Tools Port Scanner
- Hack Tools
- Nsa Hack Tools Download
- Hacking Tools Free Download
- Hacking Tools Windows
- Pentest Box Tools Download
- Hacks And Tools
- Hack Website Online Tool
- Hacker Tools List
- Hacker Tools Linux
- Hacker Tools Free
- Underground Hacker Sites
- Hacker Tools For Windows
- Nsa Hack Tools Download
- Hacks And Tools
- Best Hacking Tools 2020
- Pentest Tools Subdomain
- Hack Tools Github
- Hack Tools Mac
- Pentest Tools Bluekeep
- Hacking Tools For Windows Free Download
- Termux Hacking Tools 2019
- Hack Tools Mac
- Hacking Tools Usb
- Hacking Tools Windows
- Hack Apps
- Pentest Tools Online
- Hacking App
- Pentest Tools Windows
- Pentest Tools For Windows
- Hack Tools For Ubuntu
- Hack Tool Apk No Root
- Beginner Hacker Tools
- Hacker Hardware Tools
- Hacking Tools Free Download
- Android Hack Tools Github
- Hacker Security Tools
- Hacking Tools For Windows Free Download
- Android Hack Tools Github
- World No 1 Hacker Software
- Easy Hack Tools
- Blackhat Hacker Tools
- Install Pentest Tools Ubuntu
- Usb Pentest Tools
- Hack Tools For Mac
- Hacking Tools Usb
- Hacking Apps
- Tools For Hacker
- Hack Apps
- Pentest Tools Linux
- Hack Tools For Windows
- Hacking Tools Pc
- World No 1 Hacker Software
- Ethical Hacker Tools
- Hacking Tools And Software
- Hack Tools
- What Are Hacking Tools
- Hack Tools
- Pentest Tools Linux
- Pentest Tools Android
- Hacker Tools For Ios
- Hack Tools Download
- Physical Pentest Tools
- Hacking Tools For Games
- Hacker Tools Apk
- Wifi Hacker Tools For Windows
- Computer Hacker
- Hacker Tools Apk Download
- Hacker Tools Online
- Pentest Tools Tcp Port Scanner
- Easy Hack Tools
- Hacking Tools For Beginners
- Pentest Tools Windows
- Pentest Tools Website Vulnerability
- Pentest Tools For Ubuntu
- Hacker Tools Github
- Easy Hack Tools
No hay comentarios.:
Publicar un comentario