Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
0
1
00:00:01,490 --> 00:00:07,650
In this section network access and we are gonna define how we can access to a network
1
2
00:00:07,960 --> 00:00:09,040
briefly.
2
3
00:00:09,110 --> 00:00:15,500
...
3
4
00:00:15,590 --> 00:00:17,180
...
4
5
00:00:17,300 --> 00:00:23,470
...
5
6
00:00:27,040 --> 00:00:27,950
in this lecture
6
7
00:00:27,960 --> 00:00:37,050
In this lecture, firstly we are gonna focus on OSI-Layer 1 ; Physical layer. In the seven-layer OSI model of computer
7
8
00:00:37,050 --> 00:00:46,350
networking, the physical layer or layer 1 is the first and lowest layer. The physical layer consists
8
9
00:00:46,440 --> 00:00:51,210
of the electronic circuit transmission technologies of a network
9
10
00:00:51,450 --> 00:00:59,520
It is a fundamental layer underlying the higher level functions in a network.. The physical layer defines
10
11
00:00:59,520 --> 00:01:07,730
the means of transmitting raw bits rather than logical data packets over a physical data link connecting network
11
12
00:01:07,980 --> 00:01:17,010
nodes. The bit stream may be grouped into code words or symbols and converted to a physical signal
12
13
00:01:17,010 --> 00:01:24,990
that is transmitted over a transmission medium. The physical layer provides an electrical, mechanical, and
13
14
00:01:24,990 --> 00:01:33,950
procedural interface to the transmission medium
and here are the fundamentals of the physical layer
14
15
00:01:34,410 --> 00:01:44,760
We have three medias the first medium is copper cable the second media is fiber optic cable.
15
16
00:01:44,760 --> 00:01:54,140
And the third is the wireless media. in a corporate cable media the physical components are maybe a utility
16
17
00:01:54,210 --> 00:01:57,210
cable coaxial cable.
17
18
00:01:57,300 --> 00:02:07,680
We have some connectors, we have Network Interface Cards, ports, interfaces and etc, in a fiber optic
18
19
00:02:07,680 --> 00:02:09,220
cable media.
19
20
00:02:09,220 --> 00:02:17,980
We have single multimode fibers, connectors again, Network Interface Cards, interfaces lasers
20
21
00:02:17,990 --> 00:02:20,400
and LEDs and photoreceptors.
21
22
00:02:21,000 --> 00:02:27,770
And in a wireless media our physical components are maybe access points maybe.
22
23
00:02:27,870 --> 00:02:34,850
Again network interface cards which are the wireless network interface cards this time, maybe radios
23
24
00:02:35,010 --> 00:02:45,020
bandwidth is the bit-rate of available or consumed information capacity expressed typically
24
25
00:02:45,030 --> 00:02:49,730
in metric multiples of bits per second.
25
26
00:02:49,920 --> 00:02:58,800
For example An internet connection with a larger bandwidth can move a set amount of data much faster
26
27
00:02:59,070 --> 00:03:06,960
than an internet connection with a lower bandwidth.
here as you can see the abbrv. as well.
27
28
00:03:06,960 --> 00:03:12,870
If you want to talk about the kilobits per second we're using K.B..
28
29
00:03:12,870 --> 00:03:23,560
P.S. If you want to talk about the megabit per second we're using M.B.P.S. If you want to talk
29
30
00:03:23,560 --> 00:03:33,970
about gigabit per second we're using the GBPS. let's move forward with the network media. network media
30
31
00:03:34,020 --> 00:03:40,990
Network media refers to the communication channels used to interconnect nodes on a computer network
31
32
00:03:41,210 --> 00:03:50,170
Typical examples of network media include copper coaxial cable, copper twisted pair cables and optical fiber
32
33
00:03:50,170 --> 00:04:00,900
cables used in wired networks, and radio waves used in wireless data communications networks
33
34
00:04:00,910 --> 00:04:03,610
Let's go ahead with UTP cable.
34
35
00:04:03,610 --> 00:04:07,140
First Unshielded twisted pair (UTP)
35
36
00:04:07,130 --> 00:04:16,170
TIPPY is a type of copper cabling used in telephone wiring and the local area networks incited you to
36
37
00:04:16,180 --> 00:04:22,200
is a type of copper cabling used in telephone wiring and local area networks (LANs).Inside a
37
38
00:04:23,660 --> 00:04:33,980
UTP cable is up to four twisted pairs of copper wires, enclosed in a protective plastic cover,
38
39
00:04:34,580 --> 00:04:43,460
with the greater number of pairs corresponding to more bandwidth. The two individual wires in a single
39
40
00:04:43,580 --> 00:04:53,570
pair are twisted around each other, and then the pairs are twisted around each other, as well.
40
41
00:04:53,570 --> 00:05:01,940
This is done to reduce crosstalk and electromagnetic interference, each of which can degrade network
41
42
00:05:02,060 --> 00:05:06,300
performance. Each signal on a twisted pair requires both wires.
42
43
00:05:06,340 --> 00:05:16,920
here are the standards when we are using UTP cabling. UTP categories
43
44
00:05:17,010 --> 00:05:23,070
are starting with cat one and finishing with the cat 7.
44
45
00:05:23,190 --> 00:05:31,170
We have various rates for each categories as you can see for example if you are using cat 1 you can
45
46
00:05:31,170 --> 00:05:33,650
use up to one megabit per second.
46
47
00:05:33,660 --> 00:05:41,160
But if you're are using cat 7 cable you can use up to 10 gigabit per second.
47
48
00:05:41,160 --> 00:05:42,600
data rate
48
49
00:05:42,600 --> 00:05:50,330
The maximum lengths are almost the same as you can see it's almost 100 meters.
49
50
00:05:50,520 --> 00:05:59,490
And the applications that are using the different categories are for example Cat 1 is used in old telephone
50
51
00:05:59,490 --> 00:06:09,360
cables cat 2 is used in the token ring networks for for example Cat 6 is being used in gigabit
51
52
00:06:09,420 --> 00:06:12,060
and ten gigabit networks.
52
53
00:06:14,160 --> 00:06:23,310
Let's go ahead with UTP connectors. connector is the part of a cable that plugs into a port or
53
54
00:06:23,400 --> 00:06:27,230
interface to connect one device to another.
54
55
00:06:27,240 --> 00:06:38,010
Most connectors are either male (containing one or more exposed pins) or female (containing holes in which
55
56
00:06:38,100 --> 00:06:41,320
or female (containing holes in which the male connector can be inserted).
56
57
00:06:41,530 --> 00:06:49,320
The RJ-45 connector is an eight-wire connector that is commonly used to connect networking devices such
57
58
00:06:49,320 --> 00:06:54,280
as switches , routers or PCs to a local area network (LAN).
58
59
00:06:54,300 --> 00:07:02,190
This connector is used with Cat-5 or Cat-6 cables commonly and consists of 8 pins.
59
60
00:07:02,190 --> 00:07:05,750
Here is the male connector.
60
61
00:07:05,910 --> 00:07:11,700
And here as you can see this is a female connector.
61
62
00:07:12,270 --> 00:07:21,240
Let's go with UTPcable types. T568A and T568B
62
63
00:07:21,360 --> 00:07:29,640
are the two color codes used for wiring eight-position RJ45 modular plugs
63
64
00:07:29,880 --> 00:07:38,520
The only difference between the two color codes is that the orange and green pairs are interchanged.
64
65
00:07:38,940 --> 00:07:46,770
Straight-through cable is a type of CAT5 which the RJ-45 connectors at each end
65
66
00:07:46,880 --> 00:07:57,060
have the same pin out. (color code use on both ends are the same)Straight-Through cable is also referred to
66
67
00:07:57,150 --> 00:08:06,720
as a “patch cable.” Straight-through cable is used to connect computers and other end user devices to
67
68
00:08:06,800 --> 00:08:18,350
networking devices such as hubs & switches.
A Crossover cable is a type of CAT
68
69
00:08:18,410 --> 00:08:26,340
where one end is T568A configuration and the other as T568B configuration.
69
70
00:08:26,460 --> 00:08:36,450
Pin 1 is crossed with Pin 3 and Pin 2 is crossed with Pin 6.Crossover cable is used to connect two
70
71
00:08:36,500 --> 00:08:37,690
same devices (for example routers) together
71
72
00:08:37,740 --> 00:08:49,830
here as you can see the T 5 6 8 a pinout and as you can see
72
73
00:08:49,830 --> 00:08:52,760
we have 8 pins in here.
73
74
00:08:52,920 --> 00:09:06,630
If are using this pin out with the five six eight A in the first pin you're using white green cable.
74
75
00:09:06,670 --> 00:09:15,900
In the second you're using green third white orange blue white blue orange white brown and brown.
75
76
00:09:16,210 --> 00:09:25,420
If you're using five six eight b in the first pin ur using white orange cable this time.
76
77
00:09:25,420 --> 00:09:34,130
Then orange white green blue white blue green and white brown and they're brown.
77
78
00:09:34,160 --> 00:09:41,810
Let's go ahead with the Shielded twisted pair . Shielded twisted pair is a special kind
78
79
00:09:41,810 --> 00:09:47,590
of copper cable used in telephone or LAN systems.
79
80
00:09:47,740 --> 00:09:58,040
An outer covering or shield is added to the ordinary twisted pair wires prevent
80
81
00:09:58,040 --> 00:10:05,160
electromagnetic interference and the shield functions as a ground.
81
82
00:10:05,480 --> 00:10:13,310
Coaxial cable is a type of copper cable specially built with a metal shield and other components
82
83
00:10:13,370 --> 00:10:16,660
engineered to block signal interference.
83
84
00:10:16,670 --> 00:10:25,250
It is primarily used by cable TV companies to connect their satellite antenna facilities to customer
84
85
00:10:25,250 --> 00:10:34,160
homes and businesses. Some homes and offices use coaxial cable, too, but
85
86
00:10:34,250 --> 00:10:43,490
its widespread use as an Ethernet connectivity medium in enterprises and data centers has
86
87
00:10:43,490 --> 00:10:52,490
been supplanted by the deployment of twisted pair cabling.
A fiber optic cable is a network cable that contains
87
88
00:10:52,490 --> 00:10:58,810
strands of glass fibers inside an insulated casing.
88
89
00:10:58,940 --> 00:11:02,470
They're designed for long distance,
89
90
00:11:02,510 --> 00:11:10,880
very high performance data networking and telecommunications.Compared to wired cables, fiber optic cables
90
91
00:11:10,880 --> 00:11:17,760
provides higher bandwidth and can transmit data over longer distances.
91
92
00:11:19,070 --> 00:11:29,490
The two primary types of fiber cables are called single mode and multi mode fiber.
92
93
00:11:29,640 --> 00:11:36,140
Single mode fiber uses very thin glass strands and a laser to generate light
93
94
00:11:36,150 --> 00:11:47,910
while multi mode fibers use LEDs. Single mode fiber networks often use Wave Division Multiplexing (WDM) techniques techniques
94
95
00:11:48,210 --> 00:11:58,490
to increase the amount of data traffic that can be sent across the strand.
as I told you multimode fibers
95
96
00:11:58,510 --> 00:12:05,820
use LED as light source and provide multiple paths for light.
96
97
00:12:05,830 --> 00:12:14,120
If you compare with the single mode they provide lowe bw and higher attenuation.
97
98
00:12:14,440 --> 00:12:19,740
And here are the connection types that we can use in the fiber optic cables.
98
99
00:12:19,750 --> 00:12:33,400
...
99
100
00:12:33,400 --> 00:12:40,520
let's compare the fiber optic with the copper cable.
100
101
00:12:40,710 --> 00:12:49,680
As you can see in here the first let's take a look to the distance. optical fiber can provide communication
101
102
00:12:49,850 --> 00:12:58,380
up to 12 miles while copper provides communication up to 300 feeets
102
103
00:12:58,640 --> 00:13:07,070
The weight is almost 4 LBS is in here while the copper is thirty nine.
103
104
00:13:07,340 --> 00:13:18,140
The maximum bandwidth that optical fiber can provide 69 tbps per second which is much higher than
104
105
00:13:18,170 --> 00:13:20,950
the 10 gigabit per second.
105
106
00:13:21,410 --> 00:13:36,060
but optical fiber is hard to tap and easy to alarm but copper emits the EMI electromagnetic interface.
106
107
00:13:36,220 --> 00:13:43,930
Let's go ahead with the wireless communication .wireless communication is the transfer of information
107
108
00:13:43,930 --> 00:13:49,590
between two or more points that are not connected by a cable.
108
109
00:13:49,630 --> 00:13:59,400
The most common wireless technologies use radio waves. With radio waves speeds may be low as 3 mbps
109
110
00:13:59,440 --> 00:14:00,210
per seconds.
110
111
00:14:00,220 --> 00:14:10,180
for bluetooth, or may be really high up to 1 gbps for Wi-MAX
111
112
00:14:12,990 --> 00:14:20,140
and let's take a look to 802.11 wifi standards.
112
113
00:14:20,400 --> 00:14:29,640
Standards are Set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless
113
114
00:14:29,880 --> 00:14:33,620
local area network communication. In the chart you
114
115
00:14:33,630 --> 00:14:43,200
can see the evolution of the standards. In the first standard 802.11, maximum data rate is
115
116
00:14:43,320 --> 00:14:45,000
2mbps,
116
117
00:14:45,000 --> 00:14:47,160
but in 802.11ac
117
118
00:14:47,160 --> 00:14:54,760
max data rate is 7gbps.
118
119
00:14:54,780 --> 00:14:55,920
...
119
120
00:14:56,310 --> 00:15:04,120
And here you can see the frequency bands , bandwidths modulation types and advanced antenna technologies
120
121
00:15:04,170 --> 00:15:13,550
for each standard as well. let's go with the datalink layer protocols and media access control.
121
122
00:15:13,550 --> 00:15:23,870
The data link layer or layer 2 is the second layer of the seven-layer OSI model of computer
122
123
00:15:23,870 --> 00:15:29,920
networking and provides access to media via mac addresses.
123
124
00:15:29,920 --> 00:15:39,200
Guys This layer is the protocol layer that transfers data between adjacent network nodes. The data link layer
124
125
00:15:39,590 --> 00:15:46,670
provides the functional and procedural means to transfer data between network entities and might provide the
125
126
00:15:46,670 --> 00:15:53,580
means to detect and possibly correct errors that may occur in the physical layer.
126
127
00:15:53,680 --> 00:16:04,520
Protocols like Ethernet, PPP and HDLC operate at this layer.
127
128
00:16:04,610 --> 00:16:12,820
The most important standards used in Layer-2 are, Ethernet
128
129
00:16:12,860 --> 00:16:27,930
bluetooth which are created by IEEE and ADSL and MPLS which are created
129
130
00:16:27,990 --> 00:16:42,670
by ITU-T and we have HDLC and MAC which are created by ISO and we have FDDI which is created by ANSI
130
131
00:16:42,690 --> 00:16:44,800
see these are the most important ones.
131
132
00:16:45,870 --> 00:16:56,150
The data link layer functionality is usually split it into 2 logical sub-layers as you can see we have logically
132
133
00:16:56,150 --> 00:17:07,250
control and media access control. the upper sub-layer, termed as LLC, that interacts
133
134
00:17:07,250 --> 00:17:17,870
with the network layer above and the lower sub-layer, termed as MAC media access control is the one that
134
135
00:17:17,960 --> 00:17:21,360
interacts with the physical layer below.
135
136
00:17:21,590 --> 00:17:29,670
While LLC is responsible for handling multiple Layer3 protocols (multiplexing/de-multiplexing) and link services
136
137
00:17:29,690 --> 00:17:39,130
like reliability and flow control, the MAC is responsible for framing
137
138
00:17:39,170 --> 00:17:43,900
and the media access control for broadcast media
138
139
00:17:46,770 --> 00:17:56,310
Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a protocol in the describing
139
140
00:17:56,340 --> 00:18:06,240
how networked devices can format data for transmission to other network devices on the same network segment, and
140
141
00:18:06,330 --> 00:18:10,530
how to put that data out of network connection.
141
142
00:18:10,730 --> 00:18:16,720
Ethernet defines two units of transmission, packet and frame.
142
143
00:18:16,770 --> 00:18:25,350
The frame includes not just the "payload" of data being transmitted but also addressing information
143
144
00:18:25,470 --> 00:18:36,780
identifying the physical "Media Access Control" (MAC) addresses of both sender and receiver, VLAN tagging
144
145
00:18:36,810 --> 00:18:44,860
and quality of service information, and error-correction information to detect problems in
145
146
00:18:44,860 --> 00:18:53,190
transmission. Each frame is wrapped in a packet, which affixes several bytes of information used
146
147
00:18:53,190 --> 00:18:59,730
in establishing the connection and marking where the frame starts.
147
148
00:18:59,750 --> 00:19:07,620
Another protocol used in the data link layer player is the point to point protocol. Point-to-Point Protocol (PPP) is a data link layer (layer 2)
148
149
00:19:07,680 --> 00:19:19,630
communications protocol used to establish a direct connection between two nodes.
149
150
00:19:19,630 --> 00:19:24,520
For example these devices are routers
150
151
00:19:24,760 --> 00:19:32,750
It connects two routers directly without any host or any other networking device in between.
151
152
00:19:32,860 --> 00:19:43,410
It can provide connection authentication, transmission encryption and compression.
152
153
00:19:43,410 --> 00:19:50,790
we are going to focus on the topologies So what is a topology? A network topology is the arrangement
153
154
00:19:50,850 --> 00:19:56,600
of a network, including its nodes and connecting lines.
154
155
00:19:56,610 --> 00:20:06,250
There are two ways of defining network geometry: the physical topology and the logical topology
155
156
00:20:08,780 --> 00:20:15,290
Here we are seeing a physical topology.Physical topology is the placement of the various components
156
157
00:20:15,290 --> 00:20:20,600
of a network, including device location and cable installation.
157
158
00:20:20,600 --> 00:20:30,410
Here we can see a physical topology and what we are seeing is just the cable connections and name and
158
159
00:20:30,410 --> 00:20:31,760
symbols of the devices.
159
160
00:20:31,760 --> 00:20:43,480
As you can see. for example we have an Apple II Mac connected to gigabit switch we have an iPad which
160
161
00:20:43,480 --> 00:20:47,010
is connect to Apple Airport Extreme.
161
162
00:20:47,170 --> 00:20:54,940
We have an iPhone also connected to Apple Airport Extreme and we have Tivo premier which are connected
162
163
00:20:55,000 --> 00:20:57,440
to our gigabit switch.
163
164
00:20:57,490 --> 00:21:05,170
We have printer in here which is connected to gigabit switch and etc That's the physical view
164
165
00:21:05,170 --> 00:21:08,290
of the topology.
165
166
00:21:08,450 --> 00:21:17,180
We have three types of physical LAN topologies and they are Ring, Bus and Star.
166
167
00:21:17,200 --> 00:21:24,770
In the ring network topology, the workstations are connected in a closed loop configuration. as you can see in here
167
168
00:21:25,380 --> 00:21:34,520
. Adjacent pairs of workstations are directly connected. Other pairs of workstations are indirectly connected, the data passing through one or more intermediate nodes.
168
169
00:21:34,700 --> 00:21:35,540
...
169
170
00:21:35,870 --> 00:21:43,620
For example lets say that here is the PC one wants to communicate with the PC two: here the direction
170
171
00:21:43,680 --> 00:21:47,280
of the packets.
171
172
00:21:47,380 --> 00:21:53,110
Pc1 is going to this guy then this guy and this guy.
172
173
00:21:53,780 --> 00:22:04,970
But what if this guy fails? if this guys fails if there is an interruption on this guy, you can send the
173
174
00:22:05,090 --> 00:22:15,830
packet also from this way on the ring topology. in the bus network topology every workstation is connected
174
175
00:22:15,830 --> 00:22:21,940
to the main cable called the bus.
175
176
00:22:21,980 --> 00:22:29,750
Therefore, in effect, each workstation is directly connected to every other workstation in the network.
176
177
00:22:29,750 --> 00:22:34,170
as you can see. in the Star topology.
177
178
00:22:34,170 --> 00:22:42,310
There is a central computer server this guy to reach all the workstations are directly connected to
178
179
00:22:42,740 --> 00:22:50,110
Every workstation is indirectly connected to every other through the central computer.
179
180
00:22:50,300 --> 00:22:58,130
For example if this PC one wants to communicate with the PC two that should send the packet to this guy
180
181
00:22:58,160 --> 00:23:01,780
and this guy should forward the packet to the PC2.
181
182
00:23:02,240 --> 00:23:12,050
OK that seems like good but if theres a problem on the central device all the devices will fail as you
182
183
00:23:12,050 --> 00:23:21,110
can see and here are the physical WAN topologies. point to point
183
184
00:23:21,150 --> 00:23:23,800
Topology is the first one.
184
185
00:23:24,150 --> 00:23:27,240
That's the simplest topology with a dedicated link.
185
186
00:23:27,270 --> 00:23:41,230
between two endpoints. as you can see the second one is hub and spoke topology. hub and spoke here in
186
187
00:23:41,230 --> 00:23:52,840
a Hub-and-spoke Site-to-Site Wide Area Network (WAN) network topology, one physical
187
188
00:23:52,890 --> 00:24:00,570
site act as Hub while other physical sites act as spokes. Spoke sites are connected to each
188
189
00:24:00,570 --> 00:24:10,000
other via Hub as you can see in here and In Hub-and-spoke Wide Area Network (WAN) topology, the network communication
189
190
00:24:10,000 --> 00:24:15,040
between two spokes always travel through the hub.
190
191
00:24:15,310 --> 00:24:22,960
And here is the lastly we are going to focus on full mesh topology. full mesh topology connects each
191
192
00:24:22,960 --> 00:24:32,690
node to all other cluster nodes. This topology is highly reliable and fast, but it does not scale well.
192
193
00:24:32,890 --> 00:24:42,120
It is reliable because it provides many paths through the fabric in case of cable or node failure.
193
194
00:24:42,400 --> 00:24:50,410
It is fast with low latency because you can get to any node in the fabric in just one hop.
194
195
00:24:50,440 --> 00:24:57,690
It does not scale well because each additional node increases the number of fabric links and switch
195
196
00:24:57,700 --> 00:25:04,900
ports exponentially. as you can see in here we have r1 -2 -3
196
197
00:25:04,960 --> 00:25:11,340
4-5 and they're connected each other.
197
198
00:25:11,410 --> 00:25:16,700
And that provides really really big reliablity in this network.
198
199
00:25:16,710 --> 00:25:22,990
There's a really big redundancy for example if router one wants to communicate with router 2 to this path
199
200
00:25:22,990 --> 00:25:24,640
can be used.
200
201
00:25:24,640 --> 00:25:31,110
This path can be used or this path can be used because we are of various ways as you can see.
201
202
00:25:31,180 --> 00:25:40,570
So that means no matter if this link fails the traffic will go through from here from here from here
202
203
00:25:40,570 --> 00:25:41,900
or something like that.
203
204
00:25:43,270 --> 00:25:50,890
And lastly we're going to talk about logical topology.logical topology is the arrangement of devices
204
205
00:25:50,890 --> 00:25:58,570
computer network and how they communicate with one another.Logical topologies describe how signals act
205
206
00:25:58,660 --> 00:26:07,420
on the network. in a logical topology we can see IP addresses as you can see in here we can see
206
207
00:26:07,420 --> 00:26:11,770
Tunnell types we can see subnetmask and something like that.
207
208
00:26:11,770 --> 00:26:15,220
That's the logical view of the topology.
24818
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.