Question

In: Computer Science

A number of security devices can be placed at appropriate places in the network architecture to...

A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.

Solutions

Expert Solution

Answer:

Switches resemble bridges, actually they have different ports with a similar kind of connection (generally bridges have just two ports) and have been portrayed as simply quick bridges. Switches are utilized on vigorously loaded networks to detach information stream and improve the organization execution. Much of the time, most clients get nearly nothing, assuming any, advantage from utilizing a switch instead of hub.

That is not to distort and propose that a switch doesn't have numerous advantages. Switches can be utilized to interface the two centers and individual gadgets. These methodologies are known as segment switching and port switching, individually.

Segment switching means that each port on the switch capacities as its own section. This cycle will in general build the accessible transmission capacity, while diminishing the quantity of gadgets sharing each portion's transfer speed, and yet keeping up the Layer 2 availability. Each common center and the gadgets that are associated with it make up their own media access area, while all gadgets in the two areas remain part of a similar MAC broadcast space.

Figure1 shows how a segment switched LAN can be separated to better performance.

Port switching implies that each port on the switching hub is legitimately connected with an individual devices. This makes the port and the device their own independent media access domain. The entirety of the gadgets in the organization actually remain part of a similar MAC broadcast area.

figure 2 shows how the media access and MAC broadcast areas are designed in a port-switcheded LAN.


Related Solutions

A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports. Above lines are question for 5 marks, they haven't given any other info. Thats the whole info please if you guys can solve help me.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
The devices designed for the purpose of addressing security in the network generate a number of...
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
The devices designed for the purpose of addressing security in the network generate a number of...
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT