1 00:00:02,120 --> 00:00:02,840 Hello again. 2 00:00:04,110 --> 00:00:11,880 Well, as we knew, the difference between local area network and wireless area network and are going 3 00:00:11,880 --> 00:00:15,840 to address them as LAN or Wan lent when. 4 00:00:18,150 --> 00:00:25,280 And now we are going to see the hard work composed of a network, what is what, what can we touch the 5 00:00:25,470 --> 00:00:26,810 stuff that we can touch? 6 00:00:27,240 --> 00:00:32,220 Now we have and devices and also hosts what are our hosts? 7 00:00:32,670 --> 00:00:39,300 They are a form of interface between the human network and the underlying communication network is through 8 00:00:39,300 --> 00:00:40,610 a computer network printer. 9 00:00:40,770 --> 00:00:45,240 Epiphone and Surveyor surveys a surveillance camera. 10 00:00:45,600 --> 00:00:54,550 By the way, my small little, not me, my end of the year project when I was in school, it was about 11 00:00:54,630 --> 00:00:58,680 the device before it was both connected to. 12 00:00:59,660 --> 00:01:01,460 Two different machines. 13 00:01:02,750 --> 00:01:06,620 One used Linux and the other is Windows seven. 14 00:01:06,800 --> 00:01:07,520 Back in the day. 15 00:01:09,410 --> 00:01:20,150 And I had to install the secured network and also a VIP thorn in the Linux was going to be the the main, 16 00:01:20,150 --> 00:01:25,790 uh, the main person to go all the client, which was the windows. 17 00:01:26,000 --> 00:01:32,630 And you can you can see I have the detailed information about how to make a VIP phone between Linux 18 00:01:32,630 --> 00:01:37,330 and and a Windows in my neck that date. 19 00:01:37,520 --> 00:01:44,360 I'm going to put it on description and now we have the intermediate devices. 20 00:01:46,170 --> 00:01:53,670 What are the intermediate devices such as hops, switches, wireless access points, wireless routers, 21 00:01:53,670 --> 00:01:55,380 browsers, firewalls? 22 00:01:56,370 --> 00:01:58,740 These are the devices. 23 00:01:59,900 --> 00:02:00,800 That conduct. 24 00:02:02,220 --> 00:02:03,540 The network with each other. 25 00:02:04,620 --> 00:02:12,810 That connect the main thing to the user and the main thing or the mean machine is basically the server, 26 00:02:13,470 --> 00:02:23,430 so very is is everything and you, the user, is the whether it is the client or the, I don't know, 27 00:02:23,430 --> 00:02:31,350 the agent, the person with the computer and between the server and the computer we call them, we call 28 00:02:31,470 --> 00:02:38,100 all the things that in between the intermediate intermediate devices. 29 00:02:39,930 --> 00:02:45,540 And then we have the network supports it as the metal wires, optical fibers, wireless transmissions, 30 00:02:46,650 --> 00:02:51,590 the distance over which media can probably properly carry the signal. 31 00:02:51,610 --> 00:02:55,770 The hero are going to use a protocol, which is which is called the. 32 00:02:57,530 --> 00:03:04,080 You are going to use a protocol which is called a. 33 00:03:07,510 --> 00:03:09,280 Eli, are big. 34 00:03:09,970 --> 00:03:10,690 And here. 35 00:03:12,580 --> 00:03:22,390 The amount of data transmissions are going to use a protocol that is called the Oh, let's b is I'm 36 00:03:22,420 --> 00:03:23,260 giving you this. 37 00:03:24,530 --> 00:03:34,100 Do stuff so you can know about because it is in the invented and advanced part of learning, networking 38 00:03:34,140 --> 00:03:34,970 and physical package. 39 00:03:35,030 --> 00:03:36,220 Is it because it is? 40 00:03:36,230 --> 00:03:42,690 It is something very little to your own such and such such stuff because of the media installation. 41 00:03:42,710 --> 00:03:44,600 Yes, we are going to always be here. 42 00:03:47,200 --> 00:03:52,220 I know you are going to learn divisive symbols and network supports. 43 00:03:52,240 --> 00:03:56,740 Basically, the we have them here, we have them here. 44 00:03:57,890 --> 00:04:01,460 And each I mean, the voice. 45 00:04:02,060 --> 00:04:09,560 And when you click on, I come in, give us the multiple the voices in the same. 46 00:04:10,790 --> 00:04:12,200 Type of device. 47 00:04:14,560 --> 00:04:20,350 I'm going to give you an example, such as you have the rotors, a rotor overalls. 48 00:04:20,790 --> 00:04:24,300 We are going to use very, very much in our cars. 49 00:04:24,300 --> 00:04:25,700 We have this simple Wrangler. 50 00:04:27,540 --> 00:04:29,310 I'm so sorry about this. 51 00:04:31,460 --> 00:04:35,930 And then we are going to use the wireless router. 52 00:04:37,790 --> 00:04:39,920 And we are going to use the. 53 00:04:43,150 --> 00:04:45,430 Basically, this this is everything. 54 00:04:45,530 --> 00:04:47,850 I'll go into the water and the water shelter. 55 00:04:48,520 --> 00:04:49,260 I am going. 56 00:04:49,270 --> 00:04:52,210 I am going to put the project where the ground terminal. 57 00:04:54,110 --> 00:04:57,530 Maybe in the end, because it is very high experience level. 58 00:04:58,550 --> 00:05:01,550 And we are going to see the other side of it. 59 00:05:02,090 --> 00:05:05,210 We have heard the hubbub this is we're having to switch. 60 00:05:05,360 --> 00:05:06,940 This is the icon of the switch. 61 00:05:07,680 --> 00:05:15,340 We've talked before then we have here at the hub, this stupid device, as we we mentioned before, 62 00:05:15,340 --> 00:05:18,500 we call it stupid or less work than we have here. 63 00:05:18,520 --> 00:05:24,530 The server IP phone, the firewall, the laptop, the computer basics. 64 00:05:24,830 --> 00:05:27,950 You have the access point, the wireless access point. 65 00:05:28,310 --> 00:05:30,530 We we have the wireless router. 66 00:05:32,000 --> 00:05:37,490 The wireless router is very interesting to learn about in Cisco Pocket router that it experienced. 67 00:05:37,700 --> 00:05:37,940 If. 68 00:05:39,410 --> 00:05:45,290 Then we have that wireless connection. 69 00:05:45,290 --> 00:05:52,070 This this is the thinking of the wireless connection between two networks and this is the the the local 70 00:05:52,220 --> 00:05:57,650 connection or the local area network connection and Cisco Bucket. 71 00:05:58,100 --> 00:06:02,240 Here we have the wireless connection. 72 00:06:04,440 --> 00:06:10,290 The difference between these two, this is for a one wireless area network, and this is going to it 73 00:06:10,290 --> 00:06:17,970 can be outside a one area network because we're going to have cases when we have network and just one 74 00:06:17,970 --> 00:06:24,570 computer with a with a with Iran, and we called it a we were not going to with anything. 75 00:06:24,570 --> 00:06:29,790 It's going to be just a computer that is, it's going to be a client by by the internet or something. 76 00:06:29,790 --> 00:06:33,480 We use this type of of connection so we can. 77 00:06:35,950 --> 00:06:38,290 We can mention it's in our pocket raised. 78 00:06:40,100 --> 00:06:44,390 Here we are going to see the Composantes, the software composantes. 79 00:06:46,090 --> 00:06:53,140 And the layered model already talked about, and there are the protocols and they are the layers. 80 00:06:54,940 --> 00:06:59,650 So what we are going to see next is the message, I'm sorry. 81 00:07:00,250 --> 00:07:04,870 Here we have the network addressing, as I told you, the thing that we call the message and we called 82 00:07:04,870 --> 00:07:07,870 specifically in networking and elections. 83 00:07:09,100 --> 00:07:16,330 Here we have it, here we have the physics part, the physical part and then the datalink, then the 84 00:07:16,330 --> 00:07:21,550 network, then the transport, then the top players, the other three layers that we talked about. 85 00:07:21,940 --> 00:07:31,390 And in every and in every part, you are going to have between eight or 16 zeros and ones and every 86 00:07:31,900 --> 00:07:36,920 eight and 16 zeros and the ones means iMessage, and we are going to see that later.