SlideShare a Scribd company logo
Port configuration and security
 Allows the user to control the speed of each
individual port between 100mbps, 10mbps,
auto and disable.
 Disable allows the user to disconnect the device,
connected to that port, from that network.
 It also allows the user to control the priority of the
ports.
 Half duplex – is where two devices can send
and receive data but only one at a time.
 Full duplex – is where both devices can
transmit and receive data at the same time
and any time.
 Auto negotiation - is where both devices will
communicated to each other and then decide
which settings are best for them.
 (DVLAN) doubleVLAN allows traffic to pass though
one domain to another though the metro core, this
allows users to connect toWANs like the Internet.
 PrivateVLAN – this allows layer two isolation for ports
with same domain.
 DHCP snooping is a feature that acts between hosts
and DHCP servers checking if the data being received
is harmful to the server and then creating a database
where it contains the IP address from harmful data.
 Bridge protocol data unit (BPDU) – is a
message sent across the network containing
information like address and port
configuration. Also while be sent they detect if
there are any loops in the networks.
 Spanning tree root guard (STRG) – prevents
new on unauthorised devices on a network to
become a main/root device for a VLAN

More Related Content

What's hot

Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
Network switching
Network switchingNetwork switching
Network switching
Aung Thu Rha Hein
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
2b switching in networks
2b switching in networks2b switching in networks
2b switching in networks
kavish dani
 
Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses
myrajendra
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Dcn concepts
Dcn conceptsDcn concepts
Dcn concepts
Prof. Dr. K. Adisesha
 
Packet switching
Packet switchingPacket switching
Packet switching
asimnawaz54
 
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2
HemalathaR31
 
Ethernet
EthernetEthernet
Ethernet
Mihika Shah
 
FDDI
FDDIFDDI
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
Amit Kumar
 
Switching Techniques Lecture12,wireless
Switching Techniques Lecture12,wirelessSwitching Techniques Lecture12,wireless
Switching Techniques Lecture12,wireless
NavaizImtiaz1
 
Router bridge
Router bridgeRouter bridge
Router bridge
Mir Majid
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
Raja Waseem Akhtar
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
Dr Rajiv Srivastava
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networks
sangusajjan
 
Report on Router
Report on RouterReport on Router
Report on Router
Iqra university islamabad
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
nitesh malviya
 
Switching
Switching Switching
Switching
Abid Ali
 

What's hot (20)

Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Network switching
Network switchingNetwork switching
Network switching
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
2b switching in networks
2b switching in networks2b switching in networks
2b switching in networks
 
Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Dcn concepts
Dcn conceptsDcn concepts
Dcn concepts
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2
 
Ethernet
EthernetEthernet
Ethernet
 
FDDI
FDDIFDDI
FDDI
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
Switching Techniques Lecture12,wireless
Switching Techniques Lecture12,wirelessSwitching Techniques Lecture12,wireless
Switching Techniques Lecture12,wireless
 
Router bridge
Router bridgeRouter bridge
Router bridge
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networks
 
Report on Router
Report on RouterReport on Router
Report on Router
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Switching
Switching Switching
Switching
 

Viewers also liked

Brochure snapmedia 2.0
Brochure snapmedia 2.0Brochure snapmedia 2.0
Brochure snapmedia 2.0
Snap Media B.V.
 
Ser y no ser
Ser y no serSer y no ser
Ser y no ser
Ricky_mos21
 
Robotica
RoboticaRobotica
Robotica
verdeyrojo
 
Diapos informe
Diapos informeDiapos informe
Diapos informe
maribelsichez
 
Don't Be Like Barry
Don't Be Like BarryDon't Be Like Barry
Don't Be Like Barry
Qwizdom UK
 
Kundens forpliktelser software2011 03
Kundens forpliktelser software2011 03Kundens forpliktelser software2011 03
Kundens forpliktelser software2011 03
Anne Kristine Næss
 
[1]
[1][1]
2009 RoomWare server basics
2009 RoomWare server basics2009 RoomWare server basics
2009 RoomWare server basics
Peter Kaptein
 

Viewers also liked (10)

Brochure snapmedia 2.0
Brochure snapmedia 2.0Brochure snapmedia 2.0
Brochure snapmedia 2.0
 
Ser y no ser
Ser y no serSer y no ser
Ser y no ser
 
Robotica
RoboticaRobotica
Robotica
 
Diapos informe
Diapos informeDiapos informe
Diapos informe
 
Out 3
Out 3Out 3
Out 3
 
Don't Be Like Barry
Don't Be Like BarryDon't Be Like Barry
Don't Be Like Barry
 
Internship Kyoto
Internship KyotoInternship Kyoto
Internship Kyoto
 
Kundens forpliktelser software2011 03
Kundens forpliktelser software2011 03Kundens forpliktelser software2011 03
Kundens forpliktelser software2011 03
 
[1]
[1][1]
[1]
 
2009 RoomWare server basics
2009 RoomWare server basics2009 RoomWare server basics
2009 RoomWare server basics
 

Similar to Managed s.

Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detail
muneebalisyed
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
Zakaria Zubi
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
Zakaria Zubi
 
PT.pptx
PT.pptxPT.pptx
Computer software part 3
Computer software part 3Computer software part 3
Computer software part 3
Dr Pardeep Poriya
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
evelyn
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
evelyn
 
Networks
Networks   Networks
Networks
pavishkumarsingh
 
IT Lexicon
IT LexiconIT Lexicon
IT Lexicon
anku2266
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
AbDul ThaYyal
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
umardanjumamaiwada
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switches
Bhavik Vashi
 
Tech Blast: Networks
Tech Blast: NetworksTech Blast: Networks
Tech Blast: Networks
Nebraska Library Commission
 
Tech Blast: Networks
Tech Blast: NetworksTech Blast: Networks
Tech Blast: Networks
Michael Sauers
 
Presentasi cisco
Presentasi ciscoPresentasi cisco
Presentasi cisco
Ozmar Azhari
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docx
UsamaAliLone3
 
Common network devices
Common network devicesCommon network devices
Common network devices
Raza Muhammad Jamali
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
TapanManik
 
Class 2
Class 2Class 2
Class 2
AsmaulCSE
 
Routers vs-switch
Routers vs-switchRouters vs-switch
Routers vs-switch
Nitesh Singh
 

Similar to Managed s. (20)

Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detail
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
PT.pptx
PT.pptxPT.pptx
PT.pptx
 
Computer software part 3
Computer software part 3Computer software part 3
Computer software part 3
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
 
Networks
Networks   Networks
Networks
 
IT Lexicon
IT LexiconIT Lexicon
IT Lexicon
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switches
 
Tech Blast: Networks
Tech Blast: NetworksTech Blast: Networks
Tech Blast: Networks
 
Tech Blast: Networks
Tech Blast: NetworksTech Blast: Networks
Tech Blast: Networks
 
Presentasi cisco
Presentasi ciscoPresentasi cisco
Presentasi cisco
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docx
 
Common network devices
Common network devicesCommon network devices
Common network devices
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
Class 2
Class 2Class 2
Class 2
 
Routers vs-switch
Routers vs-switchRouters vs-switch
Routers vs-switch
 

More from har139

M1
M1M1
M1
har139
 
Communication devices
Communication devicesCommunication devices
Communication devices
har139
 
Interconnecting devices
Interconnecting devices Interconnecting devices
Interconnecting devices
har139
 
OSI Draft
OSI DraftOSI Draft
OSI Draft
har139
 
P5 ram instillation
P5 ram instillationP5 ram instillation
P5 ram instillation
har139
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systems
har139
 
P1 computer components
P1 computer componentsP1 computer components
P1 computer components
har139
 
Ipod presentation
Ipod presentationIpod presentation
Ipod presentation
har139
 

More from har139 (8)

M1
M1M1
M1
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Interconnecting devices
Interconnecting devices Interconnecting devices
Interconnecting devices
 
OSI Draft
OSI DraftOSI Draft
OSI Draft
 
P5 ram instillation
P5 ram instillationP5 ram instillation
P5 ram instillation
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systems
 
P1 computer components
P1 computer componentsP1 computer components
P1 computer components
 
Ipod presentation
Ipod presentationIpod presentation
Ipod presentation
 

Recently uploaded

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Managed s.

  • 2.  Allows the user to control the speed of each individual port between 100mbps, 10mbps, auto and disable.  Disable allows the user to disconnect the device, connected to that port, from that network.  It also allows the user to control the priority of the ports.
  • 3.
  • 4.  Half duplex – is where two devices can send and receive data but only one at a time.  Full duplex – is where both devices can transmit and receive data at the same time and any time.  Auto negotiation - is where both devices will communicated to each other and then decide which settings are best for them.
  • 5.  (DVLAN) doubleVLAN allows traffic to pass though one domain to another though the metro core, this allows users to connect toWANs like the Internet.  PrivateVLAN – this allows layer two isolation for ports with same domain.  DHCP snooping is a feature that acts between hosts and DHCP servers checking if the data being received is harmful to the server and then creating a database where it contains the IP address from harmful data.
  • 6.  Bridge protocol data unit (BPDU) – is a message sent across the network containing information like address and port configuration. Also while be sent they detect if there are any loops in the networks.  Spanning tree root guard (STRG) – prevents new on unauthorised devices on a network to become a main/root device for a VLAN