- Wireshark 2 Quick Start Guide
- Charit Mishra
- 150字
- 2021-06-25 20:45:49
Hub-based networks
It is relatively easy to sniff in a hub-based network topology, because you've got the freedom to place the sniffer at any place you want, as hubs are designed to broadcast each and every packet to all connected devices.
However, due to such design deficiencies, hub-based network topologies face issues in terms of overall performance. Network hubs do not have much capability in terms of prioritizing or forwarding traffic to specific ports only. They often become victims of collision-related problems. For instance, if more than one device connected to a hub start sending data at the same time, there is a high a probability that the packets will collide and fail to reach their destination. The sending side will be informed of dropped packets, which will then be re-sent, but it will cost the network and its administrator in time, improper bandwidth utilization, and performance issues.
- 網(wǎng)絡(luò)安全與管理
- 黑客大曝光:無(wú)線(xiàn)網(wǎng)絡(luò)安全(原書(shū)第3版)
- SASE原理、架構(gòu)與實(shí)踐
- Learning Python for Forensics
- 網(wǎng)絡(luò)空間安全實(shí)驗(yàn)
- 從實(shí)踐中學(xué)習(xí)Kali Linux滲透測(cè)試
- 無(wú)線(xiàn)傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Web安全攻防從入門(mén)到精通
- 網(wǎng)絡(luò)攻防實(shí)戰(zhàn)研究:MySQL數(shù)據(jù)庫(kù)安全
- 安全網(wǎng)絡(luò)構(gòu)建
- 黑客攻防入門(mén)
- 網(wǎng)絡(luò)空間安全體系
- Hands-On Bug Hunting for Penetration Testers
- ATT&CK框架實(shí)踐指南(第2版)