The 2-Minute Rule for services
Software layer: This layer defines how substantial-level applications can obtain the network to initiate knowledge transfer.Switches understand what MAC addresses are guiding what ports, and can use this expertise to avoid repeating visitors to Just about every port (referred to as "flooding") if possible. If It really is impossible, it goes forwar