Wednesday, January 17, 2024

Networking | Routing And Switching | Tutorial 4 | 2018


Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.

What is Switch? 

A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast.  Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.

What is Media Access Control (MAC) address?

A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.

What is STP?


STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table,  duplicate frames generation and so on. Let's move to the video for further detail.


Related news

  1. New Hack Tools
  2. Tools 4 Hack
  3. Hacking Tools Download
  4. Hackrf Tools
  5. Pentest Automation Tools
  6. Hack Tools Download
  7. Tools For Hacker
  8. Pentest Tools
  9. Nsa Hack Tools Download
  10. How To Install Pentest Tools In Ubuntu
  11. Game Hacking
  12. Pentest Tools Github
  13. Hacker Tools
  14. Pentest Tools Android
  15. Hack Tools
  16. Github Hacking Tools
  17. Hacking Tools And Software
  18. Hackers Toolbox
  19. Tools For Hacker
  20. Hack Tools For Mac
  21. What Is Hacking Tools
  22. Underground Hacker Sites
  23. Nsa Hack Tools Download
  24. Hacking Tools
  25. Hack Tools For Ubuntu
  26. Hack Apps
  27. Hack Tools For Mac
  28. Hacking Tools Windows 10
  29. Hacking Tools Hardware
  30. Pentest Tools
  31. Game Hacking
  32. Easy Hack Tools
  33. Computer Hacker
  34. Hacking Tools Free Download
  35. Nsa Hacker Tools
  36. World No 1 Hacker Software
  37. Hack Tools For Windows
  38. Hack Tool Apk
  39. Hacker Techniques Tools And Incident Handling
  40. Pentest Tools Website Vulnerability
  41. Hack Tool Apk No Root
  42. Hack Tools For Mac
  43. Hacker Tools For Windows
  44. Pentest Tools Framework
  45. Pentest Tools Github
  46. Top Pentest Tools
  47. Hack Tools Online
  48. Hacking Tools Windows 10
  49. Easy Hack Tools
  50. Best Hacking Tools 2020
  51. How To Install Pentest Tools In Ubuntu
  52. Hack Tools Online
  53. Hack Tools
  54. Hacker Tools For Pc
  55. Pentest Tools Tcp Port Scanner
  56. Hacking App
  57. Hack Tools For Mac
  58. Hack Tools For Pc
  59. Hack Tools For Mac

No comments:

Post a Comment