enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Network switch - Wikipedia

    en.wikipedia.org/wiki/Network_switch

    A network switch is a multiport network bridge that uses MAC addresses to forward data at the data link layer (layer 2) of the OSI model. Some switches can also forward data at the network layer (layer 3) by additionally incorporating routing functionality. Such switches are commonly known as layer-3 switches or multilayer switches.

  3. MAC address - Wikipedia

    en.wikipedia.org/wiki/MAC_address

    A MAC address (short for medium access control address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. This use is common in most IEEE 802 networking technologies, including Ethernet, Wi-Fi, and Bluetooth. Within the Open Systems Interconnection ...

  4. Forwarding information base - Wikipedia

    en.wikipedia.org/wiki/Forwarding_information_base

    Forwarding information base. A forwarding information base (FIB), also known as a forwarding table or MAC table, is most commonly used in network bridging, routing, and similar functions to find the proper output network interface controller to which the input interface should forward a packet. It is a dynamic table that maps MAC addresses to ...

  5. Port Aggregation Protocol - Wikipedia

    en.wikipedia.org/wiki/Port_Aggregation_Protocol

    Most Cisco switches use src/dst MAC address hash as distribution method, meaning that a single session will use the bandwidth of a single interface. Other Cisco switches uses a proprietary distribution method which enable true frame round-robin, enabling maximum link speed to be the same as the sum of the interfaces composing the aggregation group.

  6. Cisco Catalyst - Wikipedia

    en.wikipedia.org/wiki/Cisco_Catalyst

    The Cisco Catalyst 4500 Series is a mid-range modular chassis network switch. The system comprises a chassis, power supplies, one or two supervisors, line cards and service modules. The Series includes the E-Series chassis and the Classic chassis which is manufactured in four sizes: ten-, seven-, six-, and three-slot.

  7. MAC flooding - Wikipedia

    en.wikipedia.org/wiki/MAC_flooding

    For the American football player, see Mac Jones. In computer networking, a media access control attack or MAC flooding is a technique employed to compromise the security of network switches. The attack works by forcing legitimate MAC table contents out of the switch and forcing a unicast flooding behavior potentially sending sensitive ...

  8. MAC filtering - Wikipedia

    en.wikipedia.org/wiki/MAC_filtering

    Many devices that support MAC filtering do so on a device basis. Whitelisted MAC addresses are allowed through any port on the device and blacklisted MAC addresses are blocked on all ports. Other devices, such as Cisco Catalyst switches, support MAC filtering on a port-by-port basis. This is referred to as port security. Port security may be ...

  9. Multiple Spanning Tree Protocol - Wikipedia

    en.wikipedia.org/wiki/Multiple_Spanning_Tree...

    The Multiple Spanning Tree Protocol (MSTP) and algorithm, provides both simple and full connectivity assigned to any given virtual LAN (VLAN) throughout a bridged local area network. MSTP uses bridge protocol data unit (BPDUs) to exchange information between spanning-tree compatible devices, to prevent loops in each Multiple Spanning Tree ...