Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Switching

Posted on by

A switch in a Local Area Network (LAN) is a hardware device that connects multiple devices through a process known as Switching which happens at the Data Link Layer (Layer 2) of the OSI layer. Data Link layer is where a system starts placing data in the transmission medium (wired or wireless) by adding a Source and Destination Hardware address. Using this hardware address a switch forwards the frame to the target system. The actual transmission happens in the physical layers where the frame is converted into bits.

The switch does switching of the frames using Application Specific Integrated CircuitĀ (ASIC) between the systems like desktops, servers etc that is connected to it. A switch has collision domain and broadcast domain. Every switchport is a collision domain. A switch itself is a broadcast domain and using Virtual LAN (VLAN), switch can have multiple broadcast domain.

The switch has a CAM (Content Addressable Memory) table which is used for switching the layer 2 frames. The CAM table has mapping of switch ports and connected node’s MAC address and thus when the switch receives a frame, it checks for the destination MAC address in the frame and lookups for a match in the CAM table. If it finds a match, it forward the frame into that port and the frame reaches the destination target node.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme