1 00:00:00,210 --> 00:00:02,190 Hello and welcome to this lecture. 2 00:00:02,610 --> 00:00:07,950 In this lecture, we are going to talk about some basics of networking, basically learning. 3 00:00:07,950 --> 00:00:14,580 Networking is very important because we all are connected with Internet or we can see in other terms 4 00:00:14,580 --> 00:00:15,270 networking. 5 00:00:16,360 --> 00:00:23,650 Swack Network is a group of two or more devices that are connected to each other to sell the data or 6 00:00:23,650 --> 00:00:30,130 share the resources, so a network contains a number of different computer systems that is connected 7 00:00:30,130 --> 00:00:33,880 by a physical or wireless connection like server or router. 8 00:00:35,190 --> 00:00:42,270 So here, the router has direct access to the Internet, as you can see here, we are having. 9 00:00:43,330 --> 00:00:46,880 OK, we're having these many clients, these are the users. 10 00:00:47,710 --> 00:00:50,890 This is the router, and here we are having Internet. 11 00:00:51,810 --> 00:00:56,720 So as you can see, that ROPA is in direct connection with the Internet. 12 00:00:57,830 --> 00:01:05,060 OK, so that is why it is saying that the Routon has direct access to the Internet so their devices 13 00:01:05,060 --> 00:01:09,180 can only connect to the Internet, to the router, or we can see access point. 14 00:01:09,740 --> 00:01:16,310 Suppose, for example, the client or device connected to the network to Wi-Fi or Ethernet. 15 00:01:17,330 --> 00:01:23,270 So if the client opens up the browser and typed Google dot com, then your computer will send a request 16 00:01:23,270 --> 00:01:24,770 to the router. 17 00:01:26,900 --> 00:01:34,730 OK, asking for Google dot com, then the router will go to the Internet and request Google dot com 18 00:01:34,730 --> 00:01:35,000 here. 19 00:01:35,960 --> 00:01:39,500 So will receive the Google dot com from Internet. 20 00:01:40,600 --> 00:01:43,000 And then forward that particular request. 21 00:01:44,670 --> 00:01:50,100 That particular request of you can see response to the computer, so now Glenn can see Google dot com 22 00:01:50,100 --> 00:01:51,570 on the browser as a result. 23 00:01:51,900 --> 00:01:55,580 OK, so this is all basically Internet works in a very basic manner. 24 00:01:56,400 --> 00:02:04,450 So networking devices on the same computer or we can see network communicate with each other using packets. 25 00:02:05,250 --> 00:02:13,260 So if you send a video log in a website, sending jet messages, sending e-mails, all the data is sent 26 00:02:13,260 --> 00:02:14,010 as packet. 27 00:02:14,760 --> 00:02:21,930 So networking devices ensured that these packets go in the right direction using the market just so 28 00:02:21,930 --> 00:02:25,050 each packet has the same Mac address and destination entries. 29 00:02:25,440 --> 00:02:32,190 And it flew from Source Mac address to the nation market as it is, because suppose you're having this 30 00:02:32,190 --> 00:02:32,700 packet. 31 00:02:33,650 --> 00:02:36,890 You are chatting with a friend, you are having two packets. 32 00:02:37,990 --> 00:02:45,010 This is you and this is your friend, you are talking to each other now, you send the message to your 33 00:02:45,010 --> 00:02:45,390 friend. 34 00:02:45,730 --> 00:02:49,810 So how are your computer will know that this message should be sent to this person. 35 00:02:50,790 --> 00:02:59,490 By simply giving the source, address, source, mark address and destination Mac address to this particular 36 00:02:59,640 --> 00:03:05,610 packet, what it will do, it will contain the source market, which is your Mac address, and it will 37 00:03:05,610 --> 00:03:09,960 contain Beom, which is destination Magruder's, which is your friend Mac. 38 00:03:10,230 --> 00:03:17,060 So this that this particular packet to the French device of you can see French address. 39 00:03:17,360 --> 00:03:20,790 So this is how basically networking works in computer. 40 00:03:20,790 --> 00:03:27,600 And it is very important to understand if you're talking about hacking when it comes to network penetration 41 00:03:27,600 --> 00:03:29,730 testing or network hacking, it is must. 42 00:03:30,030 --> 00:03:34,320 And if you're talking about ethical hacking, like website hacking, computer hacking, system hacking, 43 00:03:34,320 --> 00:03:37,490 so hacking and also networking. 44 00:03:37,490 --> 00:03:43,350 And then it is also very important to understand networking because we all are connected to Internet 45 00:03:43,350 --> 00:03:46,380 and Internet is nothing but the networking all we can say network. 46 00:03:46,740 --> 00:03:48,060 So this is how it works. 47 00:03:48,090 --> 00:03:49,710 And thank you for watching this lecture.