1 00:00:00,760 --> 00:00:01,750 Data transmission. 2 00:00:02,730 --> 00:00:10,560 Let's briefly look at how data is transferred from one node to another using the IP is data Graham IP 3 00:00:10,560 --> 00:00:12,150 stating encapsulation. 4 00:00:12,450 --> 00:00:21,470 So now I want to create another illustration live here for a better understanding, so let's compare. 5 00:00:22,900 --> 00:00:23,380 Here. 6 00:00:24,770 --> 00:00:26,270 Actually, it's OK. 7 00:00:27,960 --> 00:00:28,920 There's an uncomfortable. 8 00:00:29,940 --> 00:00:30,230 Yeah. 9 00:00:31,730 --> 00:00:34,000 This is our first personal computers. 10 00:00:34,430 --> 00:00:36,500 We have this switch here. 11 00:00:37,400 --> 00:00:38,480 Uh, your name. 12 00:00:45,570 --> 00:00:46,410 Which is. 13 00:00:48,180 --> 00:00:52,950 And actually not Sue, it's and let's make it more realistic. 14 00:00:54,010 --> 00:00:57,430 OK, let's put it here, uh, rather. 15 00:00:59,030 --> 00:01:00,620 Consider this as a switch. 16 00:01:01,340 --> 00:01:05,570 And let's hear another comforter, let's copy it. 17 00:01:07,890 --> 00:01:08,400 OK. 18 00:01:09,930 --> 00:01:10,320 Here. 19 00:01:12,560 --> 00:01:15,290 And let's actually. 20 00:01:20,980 --> 00:01:24,210 And it's another example that I'd love to hear. 21 00:01:30,150 --> 00:01:30,400 It. 22 00:01:31,710 --> 00:01:33,100 And this is our laptop. 23 00:01:33,300 --> 00:01:40,170 So let's give an IP address and the Mac address to these machines here. 24 00:01:40,740 --> 00:01:43,830 So for example, let's make it here. 25 00:01:49,010 --> 00:01:50,990 This is, uh, let's make it. 26 00:01:54,500 --> 00:01:57,260 One hundred ninety two point. 27 00:01:59,250 --> 00:02:07,600 One hundred one hundred ninety two point one x sixty eight point, uh, for example, one point one 28 00:02:07,600 --> 00:02:14,740 hundred here make it with a bolt here and let's make this here. 29 00:02:15,340 --> 00:02:15,860 Um. 30 00:02:17,210 --> 00:02:21,440 Well, not 100, because they are the same network. 31 00:02:22,010 --> 00:02:26,030 We will make it, uh, 101. 32 00:02:27,150 --> 00:02:31,380 Here, and let's give an address to it here of. 33 00:02:32,830 --> 00:02:33,910 Mac address. 34 00:02:35,770 --> 00:02:43,300 Mac here, my brother's will be, uh, one one zero zero two two. 35 00:02:44,180 --> 00:02:49,880 A two, an example, b three and five, five, five five. 36 00:02:50,300 --> 00:02:54,500 And this is the IP IP version four address. 37 00:02:54,830 --> 00:03:01,150 Yes, it's in fact it's an IP version four address and it's assigned. 38 00:03:01,160 --> 00:03:02,720 And so we will not assign this. 39 00:03:02,870 --> 00:03:07,130 Um, my brother is yet and. 40 00:03:08,980 --> 00:03:10,860 Let's add another here. 41 00:03:12,140 --> 00:03:12,400 Right. 42 00:03:12,560 --> 00:03:14,540 She voted for. 43 00:03:16,460 --> 00:03:24,620 Get rid of her here and change these to, for example, 50. 44 00:03:25,700 --> 00:03:26,060 Yes. 45 00:03:27,360 --> 00:03:34,170 50 analysts gave a Mac address to it, just different Mac address here, because many countries are 46 00:03:34,170 --> 00:03:34,930 unique. 47 00:03:34,980 --> 00:03:40,290 But you can change Mac addresses, uh, not only your hardware, but software away. 48 00:03:40,800 --> 00:03:50,940 So for example, six six seven seven eight eight a b, a b, um c d three three here, for example, 49 00:03:50,940 --> 00:03:55,230 this is the Mac address, and this is the IPv4 address of our computers. 50 00:03:55,950 --> 00:03:59,850 So, uh, what is real here? 51 00:04:14,360 --> 00:04:20,180 So now we will create actually connections on it. 52 00:04:20,780 --> 00:04:21,180 Yes. 53 00:04:21,200 --> 00:04:21,530 Oops. 54 00:04:22,760 --> 00:04:24,860 It's cocaine and drug here. 55 00:04:25,670 --> 00:04:35,300 So, um, actually that's connected to is this and linked with this power? 56 00:04:36,140 --> 00:04:41,510 Connect this computer to this and this to this. 57 00:04:42,900 --> 00:04:47,100 So in this example, they're not here. 58 00:04:47,250 --> 00:04:55,440 This is not here to IP address, one hundred ninety two point one hundred eighty six point one point 59 00:04:55,440 --> 00:05:02,870 one hundred one wants to send data using the IP protocol to the node at this computer. 60 00:05:03,330 --> 00:05:09,930 Um, which i with the IPO, there's four hundred ninety two point one hundred eighty six point one point 61 00:05:09,930 --> 00:05:10,350 fifty. 62 00:05:11,160 --> 00:05:19,230 So the switch device, these four words Ethernet frames between all nodes on the network. 63 00:05:19,410 --> 00:05:24,570 So the Switch doesn't need an IP address because it operates only at the link there. 64 00:05:24,720 --> 00:05:25,410 In this case. 65 00:05:25,650 --> 00:05:30,410 Actually, this is not a switch or really switch is switch switch here. 66 00:05:31,210 --> 00:05:32,820 So which is this? 67 00:05:33,330 --> 00:05:34,290 It's not a router. 68 00:05:34,290 --> 00:05:35,550 It's routers switch. 69 00:05:36,120 --> 00:05:36,720 This is a switch. 70 00:05:51,190 --> 00:05:51,550 So. 71 00:05:53,050 --> 00:06:01,670 Here's what takes place to send data between the two knots, so the operating system network gets a 72 00:06:01,740 --> 00:06:09,700 stack mode here, encapsulates the application and transports layers, data and pulls an IP packet with 73 00:06:09,700 --> 00:06:15,880 the source address of 100 actually 100. 74 00:06:17,930 --> 00:06:25,910 One hundred source address of 192.168.1.1 hundred to one. 75 00:06:26,630 --> 00:06:33,830 And how did this nation address of one hundred twenty two point one hundred eighty six eight one hundred 76 00:06:33,830 --> 00:06:36,410 sixty eight point one point fifty. 77 00:06:37,400 --> 00:06:43,970 So the operation, then the operating system can at this point encapsulate the IP data as an eternal 78 00:06:43,980 --> 00:06:44,450 frame. 79 00:06:45,260 --> 00:06:52,730 So but it might not know the Mac address of the target to not so it can request a Mac address for a 80 00:06:52,730 --> 00:07:00,290 particular IP address using the address resolution protocol e r p here. 81 00:07:00,290 --> 00:07:09,860 Let's mention it here a r p is address resolution protocol here. 82 00:07:12,260 --> 00:07:22,040 So, which sends a request to all nodes on the network to find Mac address, uh, all for the destination 83 00:07:22,040 --> 00:07:31,610 IP address and then, uh, once not at uh, this receives are actually not these amounts. 84 00:07:31,970 --> 00:07:32,240 Yes. 85 00:07:32,390 --> 00:07:38,660 Once this computer receives a r p response, it can build the frame. 86 00:07:39,320 --> 00:07:41,000 So there's a real sense. 87 00:07:41,000 --> 00:07:49,730 And the source other is to the local Mac address of these eleven point and zero zero two to A to B three 88 00:07:49,730 --> 00:07:50,210 and fifty. 89 00:07:50,360 --> 00:07:53,930 So this is a this is to this source address. 90 00:07:54,350 --> 00:07:57,390 So this will assign it to the destination address. 91 00:07:57,390 --> 00:08:05,420 So six six seven seven eight eight a b, c d three three and then the frame is transmitted on the network 92 00:08:05,420 --> 00:08:08,000 and is received by Switch. 93 00:08:09,840 --> 00:08:10,380 So. 94 00:08:12,040 --> 00:08:19,030 And finally, the switch forwards, the frame to this nation load, which unpacks the IP packet and 95 00:08:19,030 --> 00:08:21,940 verifies that the destination IP address matches. 96 00:08:22,150 --> 00:08:29,830 So then the IP pilot data is extracted and passes up the stack to be received by the waiting application.