1 00:00:00,270 --> 00:00:05,510 Once again, coming in network security, fundamental course, not in the model number two. 2 00:00:05,670 --> 00:00:07,710 We understand the border was a mortar. 3 00:00:07,830 --> 00:00:12,880 That hole was a model water, and that hope was a more lonelier work. 4 00:00:13,250 --> 00:00:20,520 Now, when we start dipping into computer network science, the first thing we learn it usually ECPA, 5 00:00:21,010 --> 00:00:25,680 BCB, IP protocols, water for down network connections. 6 00:00:26,190 --> 00:00:29,590 Then internationally Stender organizations should die. 7 00:00:29,670 --> 00:00:35,930 The protocol currently known as the open system interconnection or a protocol in. 8 00:00:36,390 --> 00:00:41,210 That means all the data will be transferred according to the WHO is a modem. 9 00:00:41,760 --> 00:00:48,060 There was a modem igy difference and basic concept of the tutee of how their protocol works. 10 00:00:48,920 --> 00:00:53,340 Now let's say becomes a connection, a standard for the computer. 11 00:00:53,670 --> 00:00:55,320 In addition, it was created. 12 00:00:55,380 --> 00:00:57,870 Also Boothville fixed certain objectives. 13 00:00:58,260 --> 00:01:00,590 Now let's say you had Silverleaf. 14 00:01:00,900 --> 00:01:06,870 Each now had your functions and had their respective doors mean that you would only had a different 15 00:01:06,870 --> 00:01:09,930 different functions and different different tasks. 16 00:01:10,290 --> 00:01:15,440 Now, part we learned about which layer will be in the same order. 17 00:01:15,720 --> 00:01:17,410 Now, first is not clear here. 18 00:01:17,730 --> 00:01:24,470 Secondly, that datalink clear part is done at drug port is their transport pitted the Sesson Section 19 00:01:24,660 --> 00:01:28,550 60, the project station and last seven is that application. 20 00:01:29,040 --> 00:01:33,990 These seven layers are come in the same order with Fiji clear. 21 00:01:34,340 --> 00:01:41,800 It used for the bill's transmissions and it's used the Internet, fiber and wireless protocol. 22 00:01:42,240 --> 00:01:49,860 And in the hybrid part, it work on the husband, the repeaters, the hub and the printers are connected 23 00:01:49,860 --> 00:01:50,280 with that. 24 00:01:50,660 --> 00:01:53,210 Always say Pidgey can live now. 25 00:01:53,550 --> 00:01:58,020 Secondly, that datalink clear data Letelier is responsible for. 26 00:01:58,020 --> 00:02:05,550 The freeze means that if every bita, each not successful rassman then again, that the data will be 27 00:02:05,550 --> 00:02:06,170 transferred. 28 00:02:06,660 --> 00:02:08,870 And this is dependent on the datalink. 29 00:02:09,600 --> 00:02:12,720 And depending clear it can with that it cannot. 30 00:02:13,020 --> 00:02:18,460 And a.D.A these two type of protocol not connected with the datalink. 31 00:02:18,480 --> 00:02:18,800 Clear. 32 00:02:19,110 --> 00:02:25,570 And when we talk about the hardware part, then switch and bridges are connected with the data nuclear 33 00:02:26,200 --> 00:02:26,490 powered. 34 00:02:26,520 --> 00:02:33,210 And most importantly, it is that networking is network layer are responsible for interconnections of 35 00:02:33,210 --> 00:02:36,040 the different different types of computers here. 36 00:02:36,390 --> 00:02:42,880 IP, ICMP, IP X and the IP protocol log used in that Natera clear. 37 00:02:43,500 --> 00:02:48,160 And the hardware part that the rotor is connected with the network. 38 00:02:48,750 --> 00:02:55,170 When we talk about the data, then the whole kit will be saying that it's dependent. 39 00:02:55,470 --> 00:02:56,310 Datalink, clear. 40 00:02:56,640 --> 00:03:00,180 Next is dark transport layer in the transport layer. 41 00:03:00,620 --> 00:03:08,640 We'll work on the BCB, UDP and SBX protocols and the segmentation parts of that data. 42 00:03:09,060 --> 00:03:11,760 Each responsible doing the transport layer. 43 00:03:12,240 --> 00:03:18,300 Next is the sets and lived since the late Zippel responsible for the internal host communications. 44 00:03:18,660 --> 00:03:25,880 And it used a Bulldog and Winshaw protocols and the details depend on that sensor. 45 00:03:26,460 --> 00:03:28,020 Next up, agenda should live. 46 00:03:28,260 --> 00:03:30,980 That whole group agenda under Dindo to see what side. 47 00:03:31,700 --> 00:03:36,120 So they had be Jebb Big J put MBG protocols out. 48 00:03:36,230 --> 00:03:44,450 You did the presentation live and how we did Dedee Project Daejeon and encryption will be an independent 49 00:03:44,790 --> 00:03:45,440 presentation. 50 00:03:45,790 --> 00:03:49,330 Last is the application layer in the application. 51 00:03:49,340 --> 00:03:52,530 Live it you toward the netbook process to applications. 52 00:03:52,800 --> 00:03:58,050 And here we used that as TDP FPP or as empty B protocols. 53 00:03:58,290 --> 00:04:02,670 So these are the same months earlier, which comes that same order. 54 00:04:02,970 --> 00:04:05,790 No, we discussed the A one by one. 55 00:04:06,120 --> 00:04:13,160 Now first is that physically nothing you can do is not first lab in the West Year near property first 56 00:04:13,160 --> 00:04:13,530 model. 57 00:04:13,890 --> 00:04:17,370 The responsibility is to transmit the WS. 58 00:04:17,730 --> 00:04:22,050 It is done from the sender Fiji can live and a disk to that except Fiji. 59 00:04:22,050 --> 00:04:27,040 Khalia mean that in the hardware side nuts and different lere sender. 60 00:04:27,150 --> 00:04:32,850 And to see what our connection with that Fiji Callea next is that they don't include clear that they've 61 00:04:32,850 --> 00:04:33,510 done LeClaire. 62 00:04:33,850 --> 00:04:35,880 That's clear from the boten in. 63 00:04:35,880 --> 00:04:44,370 That was a model which can garden white night films that contain data that detect atah and transmit 64 00:04:44,400 --> 00:04:50,040 failer frames megadeath are also implemented in this layer. 65 00:04:50,430 --> 00:04:55,920 Some devices such as done network interface card, layer to suite and network. 66 00:04:55,950 --> 00:04:59,400 But it is also obreht here means that the. 67 00:05:00,300 --> 00:05:02,150 Let is work on the frames. 68 00:05:02,560 --> 00:05:08,800 Mean that if any data it failed to transmit, then it's again cosmic by that data link. 69 00:05:09,420 --> 00:05:10,940 Next is that network. 70 00:05:11,570 --> 00:05:15,990 Network Live has that Dosso defining IP address that. 71 00:05:16,260 --> 00:05:20,380 How are we defined the IP based that is depends on the network layer. 72 00:05:20,640 --> 00:05:24,000 Means that in every computer we have IP address. 73 00:05:24,240 --> 00:05:26,700 And that is defined by that night directly. 74 00:05:27,150 --> 00:05:31,560 These make each computer can be connected to one network network. 75 00:05:31,680 --> 00:05:38,240 It also functions to give the old dog routine process and makes her less on existing day topic. 76 00:05:38,490 --> 00:05:42,720 Is that how we make the pictures, how we transmit the speakers? 77 00:05:43,380 --> 00:05:45,570 All I depend do not know directly. 78 00:05:45,570 --> 00:05:48,420 Up next is that transport layer. 79 00:05:48,930 --> 00:05:56,310 This man will break the daytime to break it and give the serial number to the data, pick it so that 80 00:05:56,640 --> 00:06:01,560 they can be rearrange when they is that destinations means they're done. 81 00:06:02,190 --> 00:06:09,870 That's how we bring that data is depend that transport layer and the receiver silverside how we collect 82 00:06:09,870 --> 00:06:14,130 the data, how we collect up beakers in defending the transport layer. 83 00:06:14,550 --> 00:06:19,440 In this layer we needed reminder protocol that we will use to transmit data. 84 00:06:19,670 --> 00:06:21,600 Put a jumper DCP Protocol. 85 00:06:21,930 --> 00:06:29,550 This protocol will send data, pictures, white also shooting there that big indigency successfully 86 00:06:30,600 --> 00:06:38,020 and retransmitted big gauge that I load would be made in the middle of the road means that if any big 87 00:06:38,020 --> 00:06:42,750 it will be lost in the transmitter or receiver side on the inside. 88 00:06:42,960 --> 00:06:50,190 Then it again, it's transmitted by the transporter nasties that says and it says it literally define 89 00:06:50,190 --> 00:06:54,620 how and connections can be made, maintain or destroy. 90 00:06:55,070 --> 00:07:02,850 And these live there are name recombinations and Nafez or SMB crypto could mean that the three parts 91 00:07:03,070 --> 00:07:09,630 that how we make the connections, how we maintain the connections on how we disconnect the connections. 92 00:07:09,920 --> 00:07:14,370 D.R depend on the Sicilian and naturally dock project isn't there. 93 00:07:14,700 --> 00:07:21,540 The budget is embedded responsible for Duckhorn meeting and delivery of information as to the application 94 00:07:21,540 --> 00:07:23,670 layer for for the processing or display. 95 00:07:24,020 --> 00:07:28,080 But then how will we display that data is depend on the agenda. 96 00:07:28,080 --> 00:07:35,190 Chevallier 50 little application network consent regarding syntactical difference in detailed communications 97 00:07:35,400 --> 00:07:40,740 between that and UJA system and at GIAMPAOLO up vegetation. 98 00:07:40,790 --> 00:07:43,050 So this will be the convergence of that. 99 00:07:43,060 --> 00:07:47,570 You BCB coded text computer file doing ASCII code. 100 00:07:47,600 --> 00:07:56,490 It is not clear is the application layer, the application layer an obstacle layer that specify does 101 00:07:56,490 --> 00:07:58,310 sered communication look good? 102 00:07:58,780 --> 00:08:03,140 And Andrew Fierce method used by Kristiina Communications Network. 103 00:08:03,600 --> 00:08:10,210 That application layer abstraction is huge in both the standard model of the computing networking that 104 00:08:10,220 --> 00:08:19,520 internet protocol suit VCP AP and was a modern I'll do both more than use the same Thom's for data spec 105 00:08:19,520 --> 00:08:25,110 to high used to live in layer that deal definitions and perfect are defense. 106 00:08:25,350 --> 00:08:26,490 So friends. 107 00:08:26,700 --> 00:08:31,620 This is thus seeking module of that network security fundamentals. 108 00:08:32,130 --> 00:08:37,740 If you have any crealy then you can ask me now regarding the modular but tucked.