Assume you are supporting a big datacenter where multiple Access Switches are connected to the core switches or routers and then tracing a device like a PC or a server for troubleshooting or security purposes is one of those tasks that you often end up doing. This is not a difficult task but can certainly a time consuming.
Many technologies are leveraged to achieve business objectives and values to customer, but it comes with a price of security risk associated with them. Managing those risk would be an superficial act wasting time and money unless we understand how they are configured, maintained and operated, and then understanding the terms, definitions and concept associated with those technologies becomes paramount, Then you know how to control these risk effectively and efficiently