1 00:00:00,180 --> 00:00:06,210 All right, let's talk about some network devices, first one we are going to see you have. 2 00:00:08,360 --> 00:00:14,550 So this connects computers and allows these computers for data transfer and for communication. 3 00:00:15,470 --> 00:00:18,730 And already there is one property for the hub. 4 00:00:18,770 --> 00:00:26,240 That is, if this computer wants to send one to send data to this computer, then it will transfer the 5 00:00:26,240 --> 00:00:27,160 data to this hub. 6 00:00:27,890 --> 00:00:35,410 And what this does is it will broadcast that message to every other computers. 7 00:00:36,260 --> 00:00:41,900 So it will send them that same, which is the message sent by this computer to this computer, to this 8 00:00:41,900 --> 00:00:50,180 computer and to this and to this, because it's the hub's property that that is the Hoppes job. 9 00:00:51,320 --> 00:00:58,310 And how we transfer since we can take these computers through a capabilities, but I like you can just 10 00:00:58,310 --> 00:01:04,160 support help contain some pots and you need to plug in the Ethernet cable to these ports. 11 00:01:04,460 --> 00:01:13,040 And if this computer one sends data to this computer, the hub transmits that message to every other 12 00:01:13,040 --> 00:01:16,250 computer, which is connected to the to the port. 13 00:01:17,360 --> 00:01:19,430 So this is very security issue, right. 14 00:01:19,820 --> 00:01:25,700 The because the message is being transmitted by password to every other computer to do so. 15 00:01:26,000 --> 00:01:34,340 So in general, organizations, these hubs are very rarely used and it's better not to use at all because 16 00:01:34,340 --> 00:01:41,840 if any other hacker with a laptop can connect the cable to the spot and can eavesdrop on the messages 17 00:01:41,840 --> 00:01:44,990 going on to this, going over these computers. 18 00:01:47,980 --> 00:01:55,810 So the improvement to the happy switch, it also allows the data transfer between our computers, but 19 00:01:56,350 --> 00:01:57,480 it is somewhat covert. 20 00:01:57,540 --> 00:02:06,340 And so we have learned about this computer and this computer have its own marketers and say these are 21 00:02:06,340 --> 00:02:08,910 devices, content, they're all Mercado's. 22 00:02:10,150 --> 00:02:19,160 Then if this computer wants to send a message to this computer first, it sends data to the switch. 23 00:02:20,020 --> 00:02:23,080 And this data contains the Mercado's. 24 00:02:23,080 --> 00:02:26,940 How this computer, then the switch does not know where to send. 25 00:02:27,280 --> 00:02:34,390 And this computer also don't know where to send this just since to this switch. 26 00:02:34,720 --> 00:02:41,740 And what switch does is at first time the switch transfers, transmits the message to all other devices 27 00:02:42,190 --> 00:02:49,900 and after transmitting to all of the devices, these devices respond to the switch, saying that this 28 00:02:49,900 --> 00:02:56,530 is not my Mac address and this my Macintosh is this one after sending. 29 00:02:58,350 --> 00:03:04,680 After getting response from all the devices, the switched notes, each and every device Mac address, 30 00:03:04,680 --> 00:03:07,080 and it was to be comfortable. 31 00:03:07,740 --> 00:03:11,210 I will be looking at this in the iReport video. 32 00:03:12,360 --> 00:03:19,740 So this which eventually learns Mac addresses of all devices connect to to the port. 33 00:03:20,610 --> 00:03:28,480 And then after getting all the Mac addresses from all the devices, then it will check the data for 34 00:03:28,500 --> 00:03:29,800 the Destination Mac address. 35 00:03:29,820 --> 00:03:39,600 And since this computer wants to send data to this computer and just it should send this data to this 36 00:03:39,600 --> 00:03:45,540 computer because their destination is this one right for you to access your help. 37 00:03:46,020 --> 00:03:52,830 And later on it learns the ah, the Mac addresses of the devices connect to it. 38 00:03:54,410 --> 00:03:58,220 So by this way, which is somewhat clever, then how? 39 00:04:00,250 --> 00:04:06,490 And the next one we need to see is Rotar, Rueter or Rotaru can as you wish. 40 00:04:07,420 --> 00:04:10,150 So what the what does this rotaries Rotar. 41 00:04:10,480 --> 00:04:12,760 And it was the wireless network. 42 00:04:13,660 --> 00:04:15,200 We are using the Wi-Fi in the phones. 43 00:04:15,220 --> 00:04:19,510 And one of the properties simulating that wireless network. 44 00:04:22,350 --> 00:04:31,830 And the most important job of a router is it connects different networks, so whenever we are sending 45 00:04:31,930 --> 00:04:41,250 a data to any other outside of our home network, then these router implement some routing items to 46 00:04:41,250 --> 00:04:45,420 find the best efficient path to reach the destination. 47 00:04:46,350 --> 00:04:49,690 So here is my daughter and my modem connected to the Internet. 48 00:04:49,920 --> 00:04:51,620 So this is another network. 49 00:04:51,960 --> 00:04:59,880 And if I want to send this data to another network, these rotors are compulsory and we have seen the 50 00:04:59,880 --> 00:05:00,390 switches. 51 00:05:00,750 --> 00:05:03,450 This we just were calling it Mercado's. 52 00:05:04,290 --> 00:05:13,070 And we cannot send the data only based on the backorders because there are so many factors out there. 53 00:05:13,110 --> 00:05:21,450 That's why this router improvements since that data to other devices based on IP addresses. 54 00:05:22,920 --> 00:05:28,950 And this Koetter also contains some BHB service, and it will assign the IP address to a particular 55 00:05:28,950 --> 00:05:29,390 device. 56 00:05:30,990 --> 00:05:41,310 So only two important things you need to know for first router include some wireless network and also 57 00:05:41,310 --> 00:05:47,970 it performs the routing algorithms and find the best and efficient, but further from further source 58 00:05:47,970 --> 00:05:48,720 to destination. 59 00:05:52,090 --> 00:05:59,510 And the next one is going to be the bridge, so bridge just connects two separate networks. 60 00:05:59,530 --> 00:06:04,420 So as you can see, there is a horse to be and have one and how to. 61 00:06:04,780 --> 00:06:07,870 And this bridge connects these two networks. 62 00:06:08,320 --> 00:06:17,190 So these bridges are used when there is some say Anakonda first building or an office. 63 00:06:17,500 --> 00:06:25,300 And if you want to connect to like seven different network to the network or to the telephone network, 64 00:06:25,660 --> 00:06:29,800 then you can just cannot simply run the cables over the roads. 65 00:06:29,830 --> 00:06:32,960 Right then in that case, bridges are very useful. 66 00:06:33,730 --> 00:06:42,340 So if you want to connect, if a member of 74 want to contact with the tenth floor, then you can just 67 00:06:42,340 --> 00:06:44,140 send a message through this bridge. 68 00:06:44,740 --> 00:06:53,980 These bridges are very helpful in connecting some different networks where the street and the last one 69 00:06:53,980 --> 00:06:55,570 were going to see is the repeater. 70 00:06:55,930 --> 00:07:00,680 So the reporter's job is to strengthen the signal. 71 00:07:01,420 --> 00:07:08,080 So I had the Wi-Fi and the way rain you saw was a few meters. 72 00:07:08,080 --> 00:07:13,150 And after that, fumigators, my signal gets lost or it weakens. 73 00:07:13,150 --> 00:07:13,410 Right. 74 00:07:13,840 --> 00:07:17,740 Then if I use distributer, this repeater strengthens that signal. 75 00:07:18,070 --> 00:07:23,230 And with this repeater, I can get away for some more distance. 76 00:07:24,040 --> 00:07:32,500 So this is use it when you want to access the network at speed and also at a long distance.