Part 05 – Layer 2 Data Link Part II Switches

FacebookTwitterGoogle+LinkedInEmail
Description
In this section we revisit hubs and examine their limitations in the context of layers one through three. This discussion will set things up for the higher-level functions that occur at layer 3. Hubs are layer 1 devices that are pretty much obsolete these days with the widespread availability of inexpensive layer 2 switches. The primary limitation of hubs is that they send data out of all ports. This results in multiple collision domains on a single device, which is highly inefficient, not to mention very insecure. Layer 2 switches have the ability to direct traffic based upon layer 2 MAC addresses. This provides immediate relief in terms of data collisions by providing a single collision domain and isolation at the port level. However, broadcast isolation is not possible with layer 2 switches and network congestion is still present. Routers are the solution to this issue and we'll have a look at them in the next section covering Layer 3 of the OSI reference model.
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel