Thursday, June 1, 2023

Networking | Routing And Switching | Tutorial 4 | 2018


Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.

What is Switch? 

A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast.  Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.

What is Media Access Control (MAC) address?

A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.

What is STP?


STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table,  duplicate frames generation and so on. Let's move to the video for further detail.


More articles


  1. Pentest Tools For Ubuntu
  2. Game Hacking
  3. What Is Hacking Tools
  4. Termux Hacking Tools 2019
  5. Pentest Tools Apk
  6. Hacker Tools Linux
  7. Hacking Tools For Windows 7
  8. Pentest Tools Nmap
  9. Best Pentesting Tools 2018
  10. Hack Tools
  11. Pentest Tools List
  12. Hack Tools For Pc
  13. Pentest Tools Nmap
  14. Hack Tools For Pc
  15. Hacker
  16. Pentest Automation Tools
  17. Hack Apps
  18. What Are Hacking Tools
  19. Hackrf Tools
  20. Pentest Box Tools Download
  21. Hackrf Tools
  22. Pentest Tools For Ubuntu
  23. Hack Tools Download
  24. Hack Tools For Ubuntu
  25. Pentest Tools Linux
  26. Hack Tools Mac
  27. Hacker Tools Apk
  28. Growth Hacker Tools
  29. Hacker
  30. Hacker Tools Linux
  31. Hacker Tools For Windows
  32. Hack Apps
  33. Pentest Tools Bluekeep
  34. Kik Hack Tools
  35. Pentest Tools For Android
  36. Ethical Hacker Tools
  37. Blackhat Hacker Tools
  38. Pentest Tools Find Subdomains
  39. Hacking Tools Pc
  40. Hacker Tools Apk
  41. Underground Hacker Sites
  42. Hackrf Tools
  43. Pentest Reporting Tools
  44. Hacks And Tools
  45. Hacking Tools Kit
  46. Black Hat Hacker Tools
  47. Hacking Tools Kit
  48. Pentest Tools For Windows
  49. What Is Hacking Tools
  50. Hacker Tools For Windows
  51. Hacking Apps

No comments:

Post a Comment