All language subtitles for 10. Well-known Network Architectures Part-2

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,020 --> 00:00:02,850 All right, hey, guys, hey, thanks for coming back. 2 00:00:04,260 --> 00:00:05,580 I promise you that. 3 00:00:06,690 --> 00:00:09,090 Yes, I'll be as excited as I was before. 4 00:00:10,870 --> 00:00:18,160 Now, if you happen to notice, I've often mentioned network topologies, so I want to talk a little 5 00:00:18,160 --> 00:00:22,450 bit more about the details that we mentioned in network topologies. 6 00:00:23,500 --> 00:00:29,790 So basically, topology is like a well, I'll tell you what, it literally means a layout plan. 7 00:00:30,240 --> 00:00:30,610 Right? 8 00:00:31,150 --> 00:00:35,650 So a topology describes how computers connect and communicate with each other. 9 00:00:36,310 --> 00:00:41,140 The topology creates the physical and logical structure of devices that make up a network. 10 00:00:41,920 --> 00:00:47,620 Topology is the starting point for understanding the structure and the operation of different network 11 00:00:47,620 --> 00:00:48,460 technologies. 12 00:00:50,890 --> 00:00:57,220 So you could even examine topologies in two main parts, because, like I say, you've got the physical 13 00:00:57,220 --> 00:01:01,720 topology and that's the connection types of the network devices. 14 00:01:02,640 --> 00:01:08,910 So the cables used and their standards and the layout of the cables, the locations of the network devices 15 00:01:08,910 --> 00:01:09,630 on the network. 16 00:01:09,780 --> 00:01:12,480 These are all part of the physical topology. 17 00:01:13,710 --> 00:01:20,160 So secondly, we've got the logical topology, the communication types and the communication protocols 18 00:01:20,160 --> 00:01:21,630 of the devices on the network. 19 00:01:21,930 --> 00:01:24,450 Well, form the logical topology. 20 00:01:26,600 --> 00:01:32,030 So topology alone does not actually clarify many network related issues. 21 00:01:32,060 --> 00:01:32,360 Right? 22 00:01:33,140 --> 00:01:38,420 For example, the type of cable used its maximum length and how many computers will detect whether or 23 00:01:38,420 --> 00:01:44,390 not a cable is in use are not explained just by topology alone. 24 00:01:45,420 --> 00:01:51,210 However, over time, standards have been formed with the effect of market conditions. 25 00:01:52,080 --> 00:01:55,810 So there are different network systems using different technologies. 26 00:01:56,610 --> 00:02:03,450 These technologies even have names such as Ethernet, which you may have heard of token ring or FDI. 27 00:02:04,350 --> 00:02:10,740 So each network technology clarifies issues such as a type of the cable to be used, the maximum length 28 00:02:10,740 --> 00:02:15,120 in the bandwidth, along with the type of topology it uses. 29 00:02:16,840 --> 00:02:22,120 So topologies are generally divided into these two, right, physical and logical. 30 00:02:23,260 --> 00:02:25,640 But who said that in the back, yeah, OK, good. 31 00:02:25,660 --> 00:02:26,540 That's a good question. 32 00:02:26,560 --> 00:02:33,310 So let's actually dig into some of the greater details of this physical topology. 33 00:02:34,590 --> 00:02:40,800 So the physical layout of the devices that make up the network and the cable types used form the physical 34 00:02:40,800 --> 00:02:41,520 topology. 35 00:02:41,580 --> 00:02:41,810 Right. 36 00:02:42,760 --> 00:02:45,550 They're basically six types of physical topologies. 37 00:02:45,970 --> 00:02:52,870 There's common path ring star, extended star mesh and tree. 38 00:02:54,410 --> 00:02:57,620 So take a look at this first one bus topology. 39 00:02:58,870 --> 00:03:05,830 Now in bus topology, communication is carried out on a single cable, and network devices are connected 40 00:03:05,830 --> 00:03:06,640 to this cable. 41 00:03:07,420 --> 00:03:12,250 A single cable, can we call this segment a backbone or even a trunk? 42 00:03:13,230 --> 00:03:18,690 The data sent in the network continues on the line until it reaches the destination or arrives at the 43 00:03:18,690 --> 00:03:22,650 Terminator and passes by all devices on the network. 44 00:03:23,460 --> 00:03:26,820 The bandwidth of the network is shared by the devices on the network. 45 00:03:27,890 --> 00:03:34,280 So basically, coaxial cable is used in this topology, and it's one of the topologies with a lowest 46 00:03:34,280 --> 00:03:36,260 network performance, by the way. 47 00:03:37,280 --> 00:03:45,740 And the maximum distance is 185 meters when using thin coax cable and 500 meters when using thick coax 48 00:03:45,740 --> 00:03:46,130 cable. 49 00:03:48,420 --> 00:03:52,590 Up to 30 network devices can be found on one of these network. 50 00:03:53,970 --> 00:04:00,600 So in this topology, every device connected to the network listens to every transaction and data transmission 51 00:04:00,600 --> 00:04:01,290 on the network. 52 00:04:01,740 --> 00:04:05,940 And if its its own transmission, it gives and receives. 53 00:04:07,460 --> 00:04:10,410 Before any device on the network sends a data packet. 54 00:04:10,700 --> 00:04:14,180 It's got to make sure that the line is not used by anyone else. 55 00:04:15,020 --> 00:04:18,920 If two different devices send data packets to the network at the same time. 56 00:04:19,340 --> 00:04:25,190 Well, you've got a conflict occurring in the priority order will be decided between the two devices. 57 00:04:25,730 --> 00:04:33,350 It's like a boxing ring or something, but it definitely reminds some of maybe the parents and grandparents 58 00:04:33,860 --> 00:04:36,560 of what they used to have for telephone lines. 59 00:04:36,590 --> 00:04:36,970 Right? 60 00:04:36,980 --> 00:04:38,420 The Common Party line. 61 00:04:39,440 --> 00:04:41,600 Anyway, there are some advantages. 62 00:04:42,320 --> 00:04:48,530 It's a very easy day to set up the network and connect your computer to the network to expand the network. 63 00:04:48,770 --> 00:04:50,720 In fact, it might even just take a morning. 64 00:04:51,620 --> 00:04:55,550 It can be set up very quickly for networks that don't require high speed. 65 00:04:55,820 --> 00:04:56,780 Not everything does. 66 00:04:57,940 --> 00:05:00,900 And it certainly requires less length of cable. 67 00:05:01,910 --> 00:05:06,170 Doesn't even need an external device, therefore they don't keep costs down. 68 00:05:08,160 --> 00:05:12,720 But then you got to weigh it against the disadvantages, the cable length that can be used for the main 69 00:05:12,720 --> 00:05:17,100 line and the number of network devices that can be connected to it. 70 00:05:17,640 --> 00:05:18,570 Very limited. 71 00:05:20,950 --> 00:05:26,260 Any damage to the backbone cable affects the entire network and then network becomes inoperable. 72 00:05:27,870 --> 00:05:30,270 A Terminator must be at the end of the cable. 73 00:05:31,700 --> 00:05:36,920 When there is a network problem, it can be difficult and time-consuming to detect and fix the problem. 74 00:05:38,400 --> 00:05:42,420 It is not usually used for a stand alone building network solution. 75 00:05:43,910 --> 00:05:46,070 And it's way slower than other topologies. 76 00:05:47,900 --> 00:05:53,750 Networking, adding a new device increases data density and decreases performance for everyone. 77 00:05:57,210 --> 00:05:59,770 Now, number two, we've got ring topology. 78 00:06:00,510 --> 00:06:06,120 So this ring topology is very interesting, it was developed first by IBM and the layout of the network 79 00:06:06,120 --> 00:06:07,380 is in the form of a ring. 80 00:06:08,320 --> 00:06:14,290 Data transmitted over the network passes through every device on the network until it reaches its destination 81 00:06:14,830 --> 00:06:18,610 because there is only one path between the devices on the network. 82 00:06:19,030 --> 00:06:25,720 So in this topology, the attenuation of the signal on the network is at the lowest level because the 83 00:06:25,740 --> 00:06:32,590 signal is strengthened at each device it encounters and transferred to the next device. 84 00:06:33,540 --> 00:06:38,130 So data transmission over the network is done with the help of a signal called a token. 85 00:06:38,850 --> 00:06:40,250 It's a three byte signal. 86 00:06:41,280 --> 00:06:47,190 The token is constantly circulating on the network, and the device that will send the data uploads 87 00:06:47,190 --> 00:06:48,230 the data to the token. 88 00:06:48,240 --> 00:06:53,250 If the token is empty, it leaves the network again with the destination address. 89 00:06:54,030 --> 00:06:59,580 But the failure of a network device on the ring will cause the entire network to crash. 90 00:07:01,770 --> 00:07:05,010 But as it turns out, ring topology is also divided into two. 91 00:07:06,120 --> 00:07:08,190 There's the classic ring model. 92 00:07:09,030 --> 00:07:12,720 OK, it's logically created by connecting all nodes together in a circle. 93 00:07:13,470 --> 00:07:20,700 If a computer in the ring fails, all network communication is cut off, but collision probability is 94 00:07:20,700 --> 00:07:21,150 low. 95 00:07:23,270 --> 00:07:30,500 Now, coaxial cable was used in the first ring topologies, but currently UTP and STP cables are used 96 00:07:30,500 --> 00:07:32,000 in ring topologies. 97 00:07:33,320 --> 00:07:34,700 First ring topologies. 98 00:07:34,730 --> 00:07:40,400 It works at four megabits per second, then 16 megabits per second. 99 00:07:41,990 --> 00:07:47,720 And there are some Ethernet cards now that are suitable for ring topology and those who work at four 100 00:07:47,990 --> 00:07:50,420 or 16 megabits per second, so. 101 00:07:51,310 --> 00:07:54,250 There you go, a bit more flexibility with either not. 102 00:07:56,240 --> 00:08:02,780 All right, so the next apology on our apology tour is the star wired ring model. 103 00:08:03,410 --> 00:08:08,030 So in Mao or Multi Station Access Unit, data goes in a circle. 104 00:08:08,480 --> 00:08:08,840 Right? 105 00:08:09,560 --> 00:08:17,240 But while hubs transmit all incoming signals to all nodes, mouths transmit incoming signals in a ring 106 00:08:17,240 --> 00:08:19,250 form in only one direction. 107 00:08:19,910 --> 00:08:22,820 That way, all nodes in the network receive the token. 108 00:08:23,860 --> 00:08:26,080 So naturally, there are some advantages. 109 00:08:26,530 --> 00:08:30,700 It's thanks to these tokens at each device is equal in data transmission. 110 00:08:32,090 --> 00:08:34,820 No servers needed for connections between devices. 111 00:08:35,750 --> 00:08:39,230 And growing the network has little impact on performance. 112 00:08:40,570 --> 00:08:46,300 But weigh that against these disadvantages, you've got problems with any of the network devices will 113 00:08:46,300 --> 00:08:48,160 affect the entire network. 114 00:08:49,140 --> 00:08:54,450 Network interface cards and mouse are more expensive than an Ethernet and a switch. 115 00:08:56,790 --> 00:09:01,440 Adding changing or removing devices to the network will affect the entire network. 116 00:09:04,720 --> 00:09:07,510 Next stop, number three, the star topology. 117 00:09:08,400 --> 00:09:12,960 Now, this I mentioned before is the most widely used physical network topology today. 118 00:09:14,290 --> 00:09:18,730 Every device on the network is connected to the switch or hub in the center. 119 00:09:20,210 --> 00:09:25,850 So roaming of data on the network will depend on the central connection device. 120 00:09:26,480 --> 00:09:33,830 So information sent from a network device will first be processed in the central connection device and 121 00:09:33,830 --> 00:09:36,410 then gets routed to the destination from their. 122 00:09:37,340 --> 00:09:40,610 So it offers higher performance compared to the bus topology. 123 00:09:41,870 --> 00:09:44,360 Now, a problem in the hub where this which. 124 00:09:45,950 --> 00:09:51,740 Will affect the entire network, but a problem in a network device will only affect that network device. 125 00:09:52,980 --> 00:09:55,800 The rest of the network is not affected by this issue. 126 00:09:58,700 --> 00:10:01,280 Twisted pair cables are used in star topologies. 127 00:10:02,180 --> 00:10:08,000 The distance of the network devices to the central connection devices at most 100 meters. 128 00:10:08,900 --> 00:10:14,510 Now the problem of any device in the network can be easily identified by just looking at the lights 129 00:10:14,510 --> 00:10:15,950 on the central connection device. 130 00:10:16,940 --> 00:10:22,370 So when a device is added to the network, the corresponding port light on the harbor switch should 131 00:10:22,370 --> 00:10:22,790 be lit. 132 00:10:24,830 --> 00:10:26,840 And of course, it comes with many advantages. 133 00:10:26,870 --> 00:10:32,420 A few of them are adding new devices to set up an expanding network is really easy. 134 00:10:34,730 --> 00:10:39,080 Any problem with one of the network devices will only affect that device. 135 00:10:40,520 --> 00:10:44,180 Network management and troubleshooting are easier to. 136 00:10:46,050 --> 00:10:51,810 Some of the disadvantages include requiring longer cable lengths compared to a linear topology. 137 00:10:53,000 --> 00:10:57,010 When a harbor switch fails, the entire network becomes inoperable. 138 00:10:58,790 --> 00:11:05,030 They are more expensive to install than linear cousins due to devices such as hubs and switches. 139 00:11:07,370 --> 00:11:11,210 So now we come to number four, the extended star topology. 140 00:11:12,020 --> 00:11:17,600 This is fairly larger and basically enlarged version of the star topology. 141 00:11:17,960 --> 00:11:25,730 The network is expanded by adding new or additional hubs and switches to the hub or switch in the center. 142 00:11:28,290 --> 00:11:34,620 Five, we've got a topology very popular these days and mesh topology, every device in the network 143 00:11:34,620 --> 00:11:36,720 is connected with other devices. 144 00:11:36,840 --> 00:11:43,200 It's mostly used in windows or wide area networks when used in LANs, the local area network. 145 00:11:43,230 --> 00:11:47,220 Each device in the network does not need to be connected with the others. 146 00:11:48,120 --> 00:11:52,920 So in this topology, all computers are connected to other computers by a separate cable. 147 00:11:53,980 --> 00:12:01,120 Now, theoretically, it's the ideal connection time, however, since the number of cables in-between 148 00:12:01,120 --> 00:12:04,240 increases exponentially is the number of terminals increases. 149 00:12:04,720 --> 00:12:10,870 Well, it's only used in very special situations in between a small number of computers in real life. 150 00:12:13,170 --> 00:12:18,630 There are some advantages since there is a connection to other devices over each device. 151 00:12:19,050 --> 00:12:25,710 Communication takes place over other connections, even if there's a problem with any one line. 152 00:12:27,280 --> 00:12:31,660 Now, since the devices are directly connected to each other, data transmission speed is pretty high. 153 00:12:33,520 --> 00:12:36,810 Expansion of the network can be done without affecting other nodes. 154 00:12:38,110 --> 00:12:44,830 But of course, he got to weigh it against the disadvantages, since each device has x minus one connections. 155 00:12:45,220 --> 00:12:49,180 There must be so many ports on the devices which increase the cost. 156 00:12:51,770 --> 00:12:56,390 Cost and complexity are high because way too many cables get used. 157 00:12:58,640 --> 00:13:02,780 Now, here's something interesting number six, the hierarchical tree topology. 158 00:13:04,120 --> 00:13:09,220 This is used to connect different networks, usually networks in star topologies. 159 00:13:09,820 --> 00:13:11,950 Thus, networks can be enlarged. 160 00:13:12,580 --> 00:13:17,530 But unlike the extended star topology, it does not need a central device to connect the networks. 161 00:13:18,130 --> 00:13:21,460 It has the characteristics of common path and star topology. 162 00:13:22,580 --> 00:13:27,590 There is a hierarchical order among the devices on the network in the tree topology, of course. 163 00:13:28,520 --> 00:13:35,720 And at the very beginning of the network is a device that acts as a route, which we will remember from, 164 00:13:35,930 --> 00:13:37,760 well, the way trees grow. 165 00:13:37,790 --> 00:13:39,050 Right, they start at the roots. 166 00:13:40,350 --> 00:13:44,370 Now, connections from other networks are not made on the route. 167 00:13:45,120 --> 00:13:46,110 The branches. 168 00:13:46,230 --> 00:13:52,680 See, here's the metaphor again of the tree represent networks of different topologies and are connected 169 00:13:52,680 --> 00:13:54,690 by the trunk of the tree. 170 00:13:56,100 --> 00:14:00,390 Now, this topology is often used to create backbones of very large networks. 171 00:14:01,600 --> 00:14:07,000 And some advantages will be easy to manage and maintain as a network is segmented. 172 00:14:07,690 --> 00:14:11,080 If you're well trained in it, that is you don't have to worry about it. 173 00:14:11,080 --> 00:14:13,060 Perhaps not yet, anyway. 174 00:14:14,220 --> 00:14:18,900 Hardware and software from different manufacturers will definitely work harmoniously. 175 00:14:20,700 --> 00:14:24,480 It's easy to expand the network, easy to detect and fix errors. 176 00:14:25,930 --> 00:14:29,560 And a problem in one of the segments will not affect the other segment. 177 00:14:31,060 --> 00:14:32,830 Of course, there are some disadvantages. 178 00:14:33,490 --> 00:14:39,340 The length of each segment is limited by the cable used cabling is often difficult compared to other 179 00:14:39,340 --> 00:14:40,060 technologies. 180 00:14:41,200 --> 00:14:46,600 And the problem that will occur in the backbone affects the network traffic in all sections. 181 00:14:48,300 --> 00:14:51,990 It is difficult to install to regulate and maintain. 182 00:14:55,890 --> 00:15:00,090 So now let's talk a little bit about the types of logical topology. 183 00:15:01,620 --> 00:15:07,440 So the communication types and communication protocols of the devices on the network will form this 184 00:15:07,440 --> 00:15:08,790 logical topology. 185 00:15:10,710 --> 00:15:13,680 Two types of logical topology are commonly used. 186 00:15:14,490 --> 00:15:17,220 One is a broadcast topology. 187 00:15:17,820 --> 00:15:23,190 So each computer on a network can release information to the network environment to send information 188 00:15:23,190 --> 00:15:29,400 to one, to several or to all computers on the network without giving any particular priority. 189 00:15:30,840 --> 00:15:33,510 It all works with a principle of first come, first served. 190 00:15:35,070 --> 00:15:42,290 There are three different working modes, so according to this method of delivery, a it's a unique 191 00:15:42,290 --> 00:15:43,590 cast communication. 192 00:15:44,070 --> 00:15:48,390 So communication from one computer to only one other computer. 193 00:15:49,830 --> 00:15:57,030 B is multicast communication, so this is a form of communication between one computer and then more 194 00:15:57,030 --> 00:15:57,840 than one computer. 195 00:15:59,260 --> 00:16:01,690 See, broadcast communication. 196 00:16:02,470 --> 00:16:09,600 It's a type of logical topology where communication takes place from one computer to all the other computers, 197 00:16:09,620 --> 00:16:09,870 right? 198 00:16:10,690 --> 00:16:14,860 So we also have to talk about this number two token ring topology. 199 00:16:14,870 --> 00:16:16,420 So token, right? 200 00:16:16,510 --> 00:16:19,270 These are deposited on the network by a server. 201 00:16:19,720 --> 00:16:24,160 This token governs access to the Network Environment Data Center. 202 00:16:24,160 --> 00:16:26,510 The network is transmitted with his token. 203 00:16:26,530 --> 00:16:30,250 Therefore, collisions in the network are prevented. 204 00:16:31,550 --> 00:16:37,520 As the token travels over the network, it stops by every device and checks to see whether there's data 205 00:16:37,520 --> 00:16:42,650 to be sent and delivered almost like your your Postal Service or not. 206 00:16:43,780 --> 00:16:49,540 Anyway, tokens are three bytes of information circulating between these notes. 207 00:16:51,570 --> 00:16:57,150 All right, so that does it for all of this, you have now taken a marvellous tour of topology. 208 00:16:57,570 --> 00:17:04,350 We've also covered peer to peer network architecture, the client server architecture, file servers, 209 00:17:04,350 --> 00:17:08,100 database servers, transaction servers, web servers. 210 00:17:08,160 --> 00:17:17,490 We covered proxy servers, pans or personal area networks, LANs or local area networks, mands metropolitan 211 00:17:17,490 --> 00:17:20,580 area networks and web and wide area networks. 212 00:17:20,790 --> 00:17:21,450 Wow. 213 00:17:21,750 --> 00:17:22,730 There's a lot, huh? 214 00:17:23,100 --> 00:17:31,320 Because we also did VPNs or virtual private networks, cans, controller area networks, sands storage 215 00:17:31,320 --> 00:17:37,200 area networks, bus topology, ring topology, star topology, mesh topology. 216 00:17:37,680 --> 00:17:44,580 And then we kept it all off with the hierarchical tree topology, which, OK, try to say that three 217 00:17:44,580 --> 00:17:45,330 times fast. 218 00:17:46,280 --> 00:17:51,050 And then we wrapped it all up with broadcast apology and token ring to apology. 219 00:17:51,450 --> 00:17:54,650 Now, if I had told you we were going to learn all of that. 220 00:17:55,590 --> 00:17:57,990 You would never have started this, right? 221 00:17:58,470 --> 00:18:04,200 But you see how just one thing builds on another and another, and then before you know it, it's like, 222 00:18:04,200 --> 00:18:06,870 Wow, you actually know something now. 223 00:18:07,410 --> 00:18:10,560 So thank you so much for listening and playing along. 224 00:18:10,980 --> 00:18:14,850 We've got a whole bunch covered, and I hope you enjoyed it as much as I did. 225 00:18:15,940 --> 00:18:19,030 But there's more there's always more. 226 00:18:19,150 --> 00:18:21,100 All right, so I want to see you in our next lesson. 227 00:18:21,190 --> 00:18:22,630 Until then, have a great day. 23437

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.