All language subtitles for 13. Ideal Network

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese Download
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,760 --> 00:00:05,900 In the section we're on talk about how to create an ideal network. 2 00:00:05,930 --> 00:00:12,560 We're going to talk about some best practices about creating an ideal network. 3 00:00:12,750 --> 00:00:17,750 The first we need to keep our network physically safe. 4 00:00:17,980 --> 00:00:24,790 In an ideal network firstly we should keep our network physically safe for this purpose. 5 00:00:24,790 --> 00:00:32,980 We should keep our devices in a secure data center which includes fire suppression professional cooling 6 00:00:32,980 --> 00:00:44,000 subsystems and etc. and we need to monitor our data center using cameras to prevent unauthorized access. 7 00:00:44,010 --> 00:00:52,220 Another important thing we need to focus for physical security should be using separate cable and pads 8 00:00:52,240 --> 00:00:59,300 for electric and data to prevent electromagnetic interference. 9 00:00:59,350 --> 00:01:06,640 And let's take a look to keeping our networks safe on the from this software point of view. 10 00:01:06,700 --> 00:01:14,980 There are lots of network security threats that we can face on the Internet or local area networks. 11 00:01:14,980 --> 00:01:24,990 Come on software treats are virus worm through our Jim malware and at Celera and to mitigate these threats 12 00:01:25,000 --> 00:01:32,700 we need to use software or hardware firewalls and onto viruses and something like that. 13 00:01:34,910 --> 00:01:41,250 So from the password point of free let's say a look how we can keep our networks safe. 14 00:01:41,280 --> 00:01:48,980 Another important thing is to keep our network safe is using strong passwords. 15 00:01:49,010 --> 00:01:56,330 We need to use strong passwords for our enterprises and network devices as well. 16 00:01:56,450 --> 00:02:06,620 And we must anchor up to our passports on network devices by using service password encryption command 17 00:02:07,740 --> 00:02:08,960 and lessons. 18 00:02:08,970 --> 00:02:15,900 Take a look from the access point of few since the SS age anchor drifts through a remote connection 19 00:02:15,900 --> 00:02:16,950 session. 20 00:02:16,950 --> 00:02:29,300 We should use SSA age instead of that we should also used to repel a authentication authorization and 21 00:02:29,420 --> 00:02:34,840 accounting to protect the access to our network devices. 22 00:02:34,910 --> 00:02:43,280 Authentication means users must use username and password before accessing devices. 23 00:02:43,430 --> 00:02:51,410 Authorization means we should authorize users with different levels for example and operator level and 24 00:02:51,530 --> 00:02:55,120 or an admin level or something like that. 25 00:02:55,670 --> 00:03:04,070 And accounting means we need to record you have troops or X accesses for device configuration chains 26 00:03:04,880 --> 00:03:12,500 and and in an ideal network monitoring is a really really important part. 27 00:03:12,500 --> 00:03:21,500 Today we need to monitor the words configuration change the US interruptions and network traffic with 28 00:03:21,800 --> 00:03:23,200 monitoring tools. 29 00:03:23,210 --> 00:03:30,200 And we need to receive emails from network monitoring softwares to be informed quickly 30 00:03:33,800 --> 00:03:41,000 and let's say collude to privatizing critical traffic All traffics in our networks. 31 00:03:41,000 --> 00:03:45,290 Guys don't have the same importance. 32 00:03:45,290 --> 00:03:54,920 We should prioritize critical traffic and if there is a congestion in our traffic our privatized traffic 33 00:03:54,920 --> 00:03:58,920 should use our bandwidth first. 34 00:04:02,310 --> 00:04:11,700 We should also use redundant devices and parts to mitigate the device hardware and the cabling problems. 35 00:04:11,700 --> 00:04:18,570 For example let's say that if this device fails the communication can go ahead. 36 00:04:18,600 --> 00:04:28,800 By using this device or for example if this cable fails no problem again we can go ahead our communication 37 00:04:28,800 --> 00:04:35,400 from this path or by using this path or something like that. 38 00:04:35,740 --> 00:04:41,430 4 is a management to end troubleshooting and efficient use of resources. 39 00:04:41,490 --> 00:04:45,990 We should use hierarchical design on our network. 40 00:04:45,990 --> 00:04:58,020 This design consists of three levels and their access layer distribution layer and the car layer in 41 00:04:58,110 --> 00:04:59,720 access layer. 42 00:04:59,730 --> 00:05:10,440 This is the network of the end the way such as pieces IP phones printers and some layer two suites and 43 00:05:10,440 --> 00:05:11,960 something like that. 44 00:05:12,250 --> 00:05:20,310 Is this the operation is the layer which mandates individual branch of his wider network connections 45 00:05:20,730 --> 00:05:29,280 and the core layer is the layer which provides high speed forwarding services to move packets between 46 00:05:29,550 --> 00:05:34,020 distribution layer devices in different regions of network. 5266

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.