In: Computer Science
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
Answer:
Switches resemble bridges, actually they have different ports with a similar kind of connection (generally bridges have just two ports) and have been portrayed as simply quick bridges. Switches are utilized on vigorously loaded networks to detach information stream and improve the organization execution. Much of the time, most clients get nearly nothing, assuming any, advantage from utilizing a switch instead of hub.
That is not to distort and propose that a switch doesn't have numerous advantages. Switches can be utilized to interface the two centers and individual gadgets. These methodologies are known as segment switching and port switching, individually.
Segment switching means that each port on the switch capacities as its own section. This cycle will in general build the accessible transmission capacity, while diminishing the quantity of gadgets sharing each portion's transfer speed, and yet keeping up the Layer 2 availability. Each common center and the gadgets that are associated with it make up their own media access area, while all gadgets in the two areas remain part of a similar MAC broadcast space.
Figure1 shows how a segment switched LAN can be separated to better performance.
Port switching implies that each port on the switching hub is legitimately connected with an individual devices. This makes the port and the device their own independent media access domain. The entirety of the gadgets in the organization actually remain part of a similar MAC broadcast area.
figure 2 shows how the media access and MAC broadcast areas are designed in a port-switcheded LAN.