GRUPO 40121

Networking | Routing And Switching | Tutorial 4 | 2018


Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.

What is Switch? 

A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast.  Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.

What is Media Access Control (MAC) address?

A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.

What is STP?


STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table,  duplicate frames generation and so on. Let's move to the video for further detail.


Related posts


  1. Hacking Tools For Kali Linux
  2. Hacker
  3. Pentest Tools Nmap
  4. Pentest Tools Download
  5. Hacking App
  6. Easy Hack Tools
  7. Hacker Tools List
  8. Game Hacking
  9. Pentest Tools Windows
  10. What Are Hacking Tools
  11. Hack Apps
  12. How To Hack
  13. How To Install Pentest Tools In Ubuntu
  14. Pentest Box Tools Download
  15. Hacker Tools Windows
  16. Pentest Tools Open Source
  17. Hacking Tools For Beginners
  18. Pentest Tools Subdomain
  19. Pentest Tools Kali Linux
  20. Pentest Tools Open Source
  21. Pentest Tools Port Scanner
  22. Pentest Tools For Ubuntu
  23. Hacker
  24. Tools For Hacker
  25. Top Pentest Tools
  26. Hack Website Online Tool
  27. How To Hack
  28. Hack And Tools
  29. Hacker Tools Software
  30. Hacking Tools For Windows Free Download
  31. Github Hacking Tools
  32. Hack Tools Online
  33. Hacker Techniques Tools And Incident Handling
  34. Hacker Tools Software
  35. Free Pentest Tools For Windows
  36. Nsa Hack Tools Download
  37. Black Hat Hacker Tools
  38. Free Pentest Tools For Windows
  39. Hack Tools Download
  40. Pentest Automation Tools
  41. Pentest Tools Bluekeep
  42. Hacking Tools For Mac
  43. Hacking Tools Download
  44. Pentest Tools For Windows
  45. Hacker Tools For Ios
  46. Hacking Tools Kit
  47. Hack Tools For Games
  48. Hacking Tools Kit
  49. New Hacker Tools
  50. Hacker Tools 2019
  51. Pentest Tools Tcp Port Scanner
  52. Hacker Tools Hardware
  53. Pentest Tools Find Subdomains
  54. Hacking Tools 2019
  55. Pentest Tools Alternative
  56. Pentest Tools Open Source
  57. Pentest Tools Nmap
  58. Pentest Tools Framework
  59. Hak5 Tools
  60. How To Hack
  61. Hacker Tools 2019
  62. Hacking Tools
  63. How To Make Hacking Tools
  64. Hacker Tools Apk
  65. Hacking Tools For Windows
  66. Pentest Tools List
  67. Github Hacking Tools
  68. Hacker Tools For Windows
  69. Hack Tools
  70. Pentest Tools For Ubuntu
  71. Hack Tools Mac
  72. Pentest Tools For Android
  73. Hacking Tools 2019
  74. Hackers Toolbox
  75. Hacking Tools Windows 10
  76. Hacker Tools Apk
  77. Hacker Search Tools
  78. Pentest Reporting Tools
  79. Hacker Tool Kit
  80. Hacking Tools For Kali Linux
  81. Hack Tools For Mac
  82. Hacking Tools For Games
  83. Hacking Tools Mac
  84. Best Hacking Tools 2020
  85. Hacking Tools For Windows 7
  86. How To Hack
  87. Hack App
  88. Hacking Tools For Games
  89. What Is Hacking Tools
  90. Hacker Tools For Mac
  91. Hacking Tools And Software
  92. What Are Hacking Tools
  93. Pentest Tools For Android
  94. Pentest Tools For Ubuntu
  95. Pentest Tools Bluekeep
  96. Hack Tool Apk
  97. Hack Tools 2019
  98. Hacker Tools Apk
  99. Physical Pentest Tools
  100. Pentest Box Tools Download
  101. Pentest Tools Android
  102. Underground Hacker Sites
  103. Hacking Tools And Software
  104. Hacking Tools For Pc
  105. Best Hacking Tools 2020
  106. Hack Tools For Games
  107. Nsa Hack Tools Download
  108. Hacking Tools For Windows
  109. Pentest Tools Download
  110. Hack Tools For Ubuntu
  111. What Are Hacking Tools
  112. Github Hacking Tools
  113. Hack Tools 2019
  114. Hacker Techniques Tools And Incident Handling
  115. Termux Hacking Tools 2019
  116. Hacker Search Tools
  117. Kik Hack Tools
  118. Android Hack Tools Github
  119. Hacker Tools Mac
  120. Hacking Tools Software
  121. Best Hacking Tools 2020
  122. Hacking Tools Software
  123. Hacking Tools
  124. Hack App
  125. Hacker
  126. Hacker Tools For Ios
  127. Best Hacking Tools 2020
  128. Hacker Tools For Ios
  129. Hacking Tools Download
  130. Hacks And Tools
  131. Pentest Tools Website Vulnerability
  132. Growth Hacker Tools
  133. Nsa Hacker Tools
  134. Best Hacking Tools 2019
  135. Pentest Tools Nmap

No hay comentarios:

Publicar un comentario

Nota: solo los miembros de este blog pueden publicar comentarios.