Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
0
1
00:00:01,070 --> 00:00:03,980
In the section we're going to talk about Ethernet.
1
2
00:00:06,930 --> 00:00:09,570
as we discussed in our previous section.
2
3
00:00:09,600 --> 00:00:17,400
Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a protocol in the describing
3
4
00:00:17,430 --> 00:00:24,000
how networked devices can format data for transmission to other network devices on the same network network
4
5
00:00:24,000 --> 00:00:28,590
segment and how to put data on our network connection.
5
6
00:00:30,210 --> 00:00:39,000
Again as we talked before, data Link layer has 2 sublayers and they are L.L.C. logical link control and
6
7
00:00:39,210 --> 00:00:46,890
MAC: Media Access Control . Organizes communication with upper / lower laysers and Provides common
7
8
00:00:46,890 --> 00:00:55,830
interface, reliability and flow control and MAC Appends physical address to frame and Provides data encapsulation
8
9
00:00:55,920 --> 00:00:57,270
and error detection
9
10
00:01:00,310 --> 00:01:08,680
A collision domain is a network segment connected by a shared
10
11
00:01:08,680 --> 00:01:16,230
medium or through repeaters where data packets may collide with one another while being sent.
11
12
00:01:16,510 --> 00:01:23,720
A network collision occurs when more than one device attempts to send a packet on a network segment
12
13
00:01:23,800 --> 00:01:31,640
at the same time. Members of a collision domain may be involved in collisions with one another.
13
14
00:01:31,970 --> 00:01:37,760
Guys Only one device in the collision domain may transmit at any one time,
14
15
00:01:37,930 --> 00:01:45,490
and the other devices in the domain listen to the network and refrain from transmitting while others are
15
16
00:01:45,550 --> 00:01:53,620
already transmitting in order to avoid collisions. Because only one device may be transmitting at any one
16
17
00:01:53,620 --> 00:01:54,350
time.
17
18
00:01:54,400 --> 00:02:00,290
total network bandwidth is shared among all devices on the collision domain.
18
19
00:02:00,460 --> 00:02:08,020
Collisions also decrease network efficiency on a collision domain as collisions require devices
19
20
00:02:08,040 --> 00:02:13,350
to abort transmission and retransmit at a later time.
20
21
00:02:13,600 --> 00:02:23,050
Collisions are often in a hub environment, because each port on a hub is in the same collision domain.
21
22
00:02:23,050 --> 00:02:32,440
By contrast, each port on a bridge, a switch or a router is in a separate collision domain.
22
23
00:02:32,610 --> 00:02:45,540
here we have a switch and this switch has four ports , four different ports. each port of the switch is a
23
24
00:02:45,770 --> 00:02:47,430
separate collision domain.
24
25
00:02:47,450 --> 00:02:50,000
As you can see in here this is collusion.
25
26
00:02:50,000 --> 00:02:51,470
Domain one.
26
27
00:02:51,590 --> 00:02:54,090
This is collision domain 3.
27
28
00:02:54,170 --> 00:02:59,830
This is collision domain t2o and this is collision domain four.
28
29
00:02:59,850 --> 00:03:09,320
But as you can see in a here separate ports of the hub is not as seperate collision domain. all parts of
29
30
00:03:09,320 --> 00:03:13,760
the hub are in the same collision domain which is collision domain
30
31
00:03:13,910 --> 00:03:25,400
In a shared media , Devices may want to send data at the same time
31
32
00:03:25,400 --> 00:03:26,870
CSMA
32
33
00:03:26,900 --> 00:03:33,060
method is used for sharing the media, but collisions may ocur
33
34
00:03:33,110 --> 00:03:40,610
if two devices try to send data at the same time.
on the screen as you can see that all workstations are
34
35
00:03:40,610 --> 00:03:45,000
saying that I send my data when I want.
35
36
00:03:45,230 --> 00:03:48,260
And they don't want to share the media.
36
37
00:03:48,440 --> 00:03:58,790
So we have a method named CSMA/CD collision detection used for detecting collisions
37
38
00:03:58,790 --> 00:04:04,970
for ethernet networks . Logic behind this is : Check media,
38
39
00:04:05,090 --> 00:04:07,760
If it is free send.
39
40
00:04:07,820 --> 00:04:12,540
If not wait for idle and send them later.
40
41
00:04:12,560 --> 00:04:22,160
For example in here if workstation a wants to communicate with the server it sends a message saying
41
42
00:04:22,160 --> 00:04:25,190
that I need to send something.
42
43
00:04:25,190 --> 00:04:29,260
Is there anything currently on the wire or
43
44
00:04:29,330 --> 00:04:29,780
Not
44
45
00:04:32,350 --> 00:04:38,860
CSMA CA Used for detecting collisions for 802.11 wireless networks. . Logic behind
45
46
00:04:38,860 --> 00:04:43,470
This is check media if it is free.
46
47
00:04:43,550 --> 00:04:50,950
Send the notification to use it and then send your data and here how it is going on
47
48
00:04:50,950 --> 00:05:01,340
For example if the tablet want to send data to a wireless medium it's checking the data checking the
48
49
00:05:01,340 --> 00:05:08,030
medium I'm sorry first then it's sending a notification to the medium saying hey guys I'm going to send
49
50
00:05:08,030 --> 00:05:17,820
that data then it's sending whatever it's going to send and let's take a look to Ethernet Frame.
50
51
00:05:18,840 --> 00:05:26,100
in the first fields of Ethernet, we have preamble and SFD
51
52
00:05:26,100 --> 00:05:29,700
between source and destination devices.
52
53
00:05:29,700 --> 00:05:34,140
Secondly we have destination and source address fields.
53
54
00:05:34,200 --> 00:05:43,800
And they are the source and destination MAC address. and the other field is the VLAN Tag which
54
55
00:05:43,800 --> 00:05:50,710
is used for quality of services and carries the VLAN information that is an optional field.
55
56
00:05:50,940 --> 00:05:58,200
And the other field is length and type which keeps the length of data and the type of the protocol we
56
57
00:05:58,200 --> 00:05:59,410
are using.
57
58
00:05:59,880 --> 00:06:08,910
And the other field is the data field which gives the encapsulated data information from Layer 3 and
58
59
00:06:08,910 --> 00:06:19,080
the last field is fcs, frame check sequence and frame check sequence bits must match for source and
59
60
00:06:19,080 --> 00:06:19,920
destination.
60
61
00:06:19,980 --> 00:06:28,650
If no error occured and this field is used for the error detection. Lets take a look to the MAC addr.
61
62
00:06:28,650 --> 00:06:29,340
now.
62
63
00:06:29,400 --> 00:06:40,440
A media access control address (MAC address) of a device is a 48 bit unique identifier assigned to network
63
64
00:06:40,530 --> 00:06:49,200
interfaces for communications at the data link layer of a network segment. MAC addresses are used as a
64
65
00:06:49,200 --> 00:06:56,400
network address for most network technologies, including Ethernet and Wi-Fi.
65
66
00:06:58,010 --> 00:07:08,030
MAC Address is Shown in hexadecimal format , hexadecimal is a positional numeral system
66
67
00:07:08,220 --> 00:07:12,200
with a radix, or base, of 16.
67
68
00:07:12,200 --> 00:07:14,030
It uses 16
68
69
00:07:16,890 --> 00:07:25,770
distinct symbols, most often the symbols 0–9 to
69
70
00:07:25,770 --> 00:07:27,150
As you can see in here
70
71
00:07:30,120 --> 00:07:40,930
A, B, C, D, E, F to represent values ten to fifteen.
71
72
00:07:40,940 --> 00:07:49,450
MAC addresses are assigned to network devices such as PCs, printers, servers etc. And consists
72
73
00:07:49,690 --> 00:07:51,910
of two portions as you can see in here the first portion is all you OUI..
73
74
00:07:51,940 --> 00:07:55,010
And the second UAA.
74
75
00:07:55,180 --> 00:08:01,330
...
75
76
00:08:01,390 --> 00:08:12,250
The first portion is OUI. An organizationally unique identifier (OUI) is a 24-bit number that
76
77
00:08:12,310 --> 00:08:19,350
uniquely identifies a vendor, manufacturer, or other organization.
77
78
00:08:19,360 --> 00:08:21,290
The second portion is
78
79
00:08:21,410 --> 00:08:25,460
UAA or Extended / Device Identifier.
79
80
00:08:25,480 --> 00:08:34,260
This is a number unique to the vendor.
for example lets say that this first portion is unique for
80
81
00:08:34,260 --> 00:08:39,330
for example maybe Intel maybe Qualcomm
81
82
00:08:41,950 --> 00:08:48,900
then the MAC addresses that Intel manufactures or Qualcomm manufacturers are finishing with the
82
83
00:08:48,920 --> 00:08:57,590
arbitrary numbers that the Intel or Qualcomm says
83
84
00:09:00,280 --> 00:09:11,260
MAC Addresses can be represented in three ways mostly. In the first, dots are used between each four charachters.
84
85
00:09:11,260 --> 00:09:15,190
as you can see here.
85
86
00:09:15,510 --> 00:09:19,700
And the second dashes are used between each two charachters
86
87
00:09:19,710 --> 00:09:20,110
Correct.
87
88
00:09:20,120 --> 00:09:29,940
like here you can see as well and in the third double columns are used between each two charachters.
88
89
00:09:31,950 --> 00:09:43,170
There are also three different types of ethernet addresses and they are unicast multicast and broadcast
89
90
00:09:43,980 --> 00:09:52,410
a unicast frame contains the unique MAC address of the destination receiver and unicast
90
91
00:09:52,470 --> 00:09:57,060
address frame is all the send of the specific port leading to the receiver.
91
92
00:09:57,060 --> 00:10:04,860
For example if this computer, computer one wants to communicate with the tree or the switch.
92
93
00:10:04,860 --> 00:10:18,620
And if this is a unicast, frame is going to here but not here and forwarded to here .
93
94
00:10:18,620 --> 00:10:26,990
A multicast frame contains the unique multicast MAC address of an application, protocol, or data stream. A multicast
94
95
00:10:27,020 --> 00:10:36,250
addressed frame is either flooded out all ports (if no multicast optimization is configured) or sent out
95
96
00:10:36,350 --> 00:10:39,260
only the ports interested in receiving the traffic.
96
97
00:10:39,470 --> 00:10:47,650
. If you want to send a multicast layer-2 traffic, your destination MAC should start with 0100.5e
97
98
00:10:47,650 --> 00:10:51,030
...
98
99
00:10:52,610 --> 00:10:53,430
...
99
100
00:10:53,590 --> 00:11:00,440
Let's talk about the broadcast mac address. A broadcast frame is flooded
100
101
00:11:00,700 --> 00:11:10,960
A broadcast frame contains all binary 1’s as the destination address (FFFF.FFFF.FFFF)
101
102
00:11:10,960 --> 00:11:23,770
..
102
103
00:11:23,770 --> 00:11:30,250
For example if this guy wants to communicate with all these other guys, the source adress of the Ethernet frame is this guy's MAC address and the destination can be here.
103
104
00:11:34,400 --> 00:11:39,460
let's go with ARP.
104
105
00:11:39,530 --> 00:11:45,900
ARP (Address resolution protocol) is Used for resolution of IP address into MAC Address.
105
106
00:11:46,010 --> 00:11:53,310
ARP request is made via broadcast to FFFF.FFFF.FFFF
106
107
00:11:53,540 --> 00:12:05,480
and ARP reply is made by related device as unicast.
107
108
00:12:05,540 --> 00:12:15,330
For example if PC one sends and arp request, the message this message is broadcast, comes to here
108
109
00:12:15,330 --> 00:12:23,100
And let's say the PC one is researching the physical address of the station that has the IP address 21.3 which is PC 3
109
110
00:12:23,100 --> 00:12:33,600
PC 3 takes this request and replies back with its MAC address
110
111
00:12:33,630 --> 00:12:38,250
and this packet is just sent to PC one as unicast.
111
112
00:12:38,260 --> 00:12:46,660
Let's take a look to the ARP table. On networking devices A table, usually called the ARP cache or ARP
112
113
00:12:46,660 --> 00:12:56,080
Table is used to maintain a correlation between each MAC address and its corresponding IP address
113
114
00:12:56,140 --> 00:13:02,920
. ARP provides the protocol rules for making this correlation and providing address conversion in both directions.
114
115
00:13:02,920 --> 00:13:04,460
In here you are seeing an arp table of a router and in here.
115
116
00:13:04,540 --> 00:13:13,750
You're seeing an ARP table of a PC. the command that we are using is show IP arp command to display
116
117
00:13:13,840 --> 00:13:20,850
the ARP cache of a router.
117
118
00:13:21,010 --> 00:13:30,340
And as you can see in here we are seeing the IP addresses and the MAC addresses of the same device on
118
119
00:13:30,340 --> 00:13:34,510
the table.
119
120
00:13:34,520 --> 00:13:42,860
Let's go ahead with LAN switches. A LAN switch is a networking device that connects devices together on
120
121
00:13:42,950 --> 00:13:51,170
a computer network by using packet switching to receive, process, and forward data to the destination device.
121
122
00:13:51,200 --> 00:13:52,000
...
122
123
00:13:52,240 --> 00:13:56,860
Switches mostly operate at Layer-2 of the OSI Model and Provides switching according to MAC addresses
123
124
00:13:57,080 --> 00:14:02,490
Layer-2 of the OSI Model and Provides switching according to MAC addresses
124
125
00:14:02,530 --> 00:14:10,990
using MAC address table. On the LAN switches, there is a table called MACaddress table and
125
126
00:14:10,990 --> 00:14:11,730
...
126
127
00:14:15,570 --> 00:14:26,350
what L2 switch is making is just switching between different ports by using MAC address information
127
128
00:14:26,530 --> 00:14:28,940
located in the MAC address table.
128
129
00:14:30,690 --> 00:14:36,150
Let's see how MAC address table is established on a switch right now.
129
130
00:14:36,390 --> 00:14:40,870
Firstly MAC address table is empty.
130
131
00:14:40,890 --> 00:14:45,540
This is the switch guys and MAC address table is empty.
131
132
00:14:48,530 --> 00:14:49,620
As you can see
132
133
00:14:49,640 --> 00:15:01,290
in the first step if PC one wants to forward the packet to PC 2, switch floods it out off all ports and
133
134
00:15:01,290 --> 00:15:04,680
adds PC ones MAC address to its MAC address table.
134
135
00:15:04,790 --> 00:15:15,190
Well what is going on in here is PC one wants to communicate with PC two, switch checks the frame and
135
136
00:15:15,190 --> 00:15:23,800
then checks the MAC address and immediately adds the PC1's MAC address to the MAC address table
136
137
00:15:23,830 --> 00:15:31,270
and saying that hey on my first port have a MAC address of this
137
138
00:15:31,690 --> 00:15:38,620
Wants to communicate with this MAC address but I don't have this MAC address on this table so I'm flooding the
138
139
00:15:38,620 --> 00:15:44,230
requests out from all my ports.
139
140
00:15:44,290 --> 00:15:54,740
Then let's say the PC two sends unicast reply to PC 1 and switch adds the PC2's MAC address to MAC address
140
141
00:15:54,790 --> 00:16:05,680
stable to then after this process if PC one wants to send the data to PC two frame is forwarded directly
141
142
00:16:07,950 --> 00:16:09,150
in the end.
142
143
00:16:09,250 --> 00:16:17,340
In the end of the day switch learns all of MAC address connected to all of its ports and establishes a
143
144
00:16:17,470 --> 00:16:25,480
full MAC address as you can see in here. and saying that on my first port I have this MAC address on
144
145
00:16:25,480 --> 00:16:27,520
my third port.
145
146
00:16:27,520 --> 00:16:37,390
I have this MAC address on my forth this 7th this, and 8 this.from now on.
146
147
00:16:37,660 --> 00:16:48,160
If this PC 5 wants to communicate with PC one frame is directly forwarded to PC one.
147
148
00:16:48,640 --> 00:16:51,850
Let's go ahead with the duplex options.
148
149
00:16:51,850 --> 00:16:54,430
We have two duplex options :
149
150
00:16:54,430 --> 00:17:03,520
Half duplex and full duplex. Half-duplex is used to describe communication where only... one side can
150
151
00:17:03,580 --> 00:17:06,310
send data at at time.
151
152
00:17:06,340 --> 00:17:14,530
Once one side has finished transmitting its data, the other side can respond. Only one node can send
152
153
00:17:14,530 --> 00:17:17,410
data at a time in half duplex.
153
154
00:17:17,560 --> 00:17:24,740
If both try to send data at the same time, a collision will occur on the network.
154
155
00:17:24,880 --> 00:17:32,890
On the other hand, full-duplex is used to describe communication where both sides are able to
155
156
00:17:32,890 --> 00:17:37,050
send and receive data at the same time.
156
157
00:17:37,060 --> 00:17:44,620
In these cases, there is no danger of a collision and therefore the transfer of data is completed much
157
158
00:17:44,920 --> 00:17:45,710
faster.
158
159
00:17:47,410 --> 00:17:55,000
Let's go ahead with the auto MDX feature. in today's networks using the appropriate cable type is way
159
160
00:17:55,000 --> 00:18:02,160
important guys and certain devices has a great feature to help us preventing wrong
160
161
00:18:02,200 --> 00:18:03,210
Cabling.
161
162
00:18:03,380 --> 00:18:12,490
. Auto MDI-X ports on newer network interfaces detect
162
163
00:18:12,580 --> 00:18:21,930
if the connection would require a crossover, and automatically chooses the MDI or MDI-X configuration to properly match the other end of the link.
163
164
00:18:24,590 --> 00:18:27,760
and let's take a look to the frame forwarding types.
164
165
00:18:27,760 --> 00:18:37,560
We have 3 frame forwarding types.When we are forwarding a frame in our switches ; and they are store and forward, cut through and cut through
165
166
00:18:38,020 --> 00:18:44,050
and cut through fragment free. In store and forward method
166
167
00:18:44,050 --> 00:18:54,730
The frame is forwarded after that whole frame received and there is no CRC. in cut through fast forward
167
168
00:18:55,060 --> 00:19:04,270
the Frame is forwarded after the destination MAC is checked. In cut through fragment free
168
169
00:19:04,270 --> 00:19:12,270
frame is forwarded after 6 to 4 bytes of the frame is checked.
169
170
00:19:13,010 --> 00:19:17,130
Let's go ahead with POE
170
171
00:19:17,150 --> 00:19:27,680
Power over Ethernet or PoE describes any of systems which pass electric power along with data on twisted pair Ethernet
171
172
00:19:27,830 --> 00:19:28,720
cabling.
172
173
00:19:29,060 --> 00:19:37,010
This allows a single cable to provide both data connection and electric power to devices such
173
174
00:19:37,070 --> 00:19:48,070
access points, IP cameras, and VoIP phones. To provide electric over data cables to end devices, End devices
174
175
00:19:48,070 --> 00:19:51,980
also must be supporting POE technology too
175
176
00:19:52,140 --> 00:19:58,490
in here we are seeing a poe switch and we have an access point.
176
177
00:19:58,610 --> 00:20:05,880
IP camera, industrial sensor and voip phone connected to our poe switch.
177
178
00:20:06,080 --> 00:20:17,660
If this switch is supporting poe and also this VOIP phone sensor IP camera and access point are
178
179
00:20:17,700 --> 00:20:26,060
the poe feature.too we don't need that extra power cable we don't need an extra power adapter we don't need anything
179
180
00:20:26,060 --> 00:20:28,280
else.
180
181
00:20:28,370 --> 00:20:32,240
We can provide the power of these devices by using the twisted pair of copper cables.
181
182
00:20:32,420 --> 00:20:39,710
...
182
183
00:20:39,850 --> 00:20:43,720
Let's take a look to the fixed and modular switches.
183
184
00:20:43,720 --> 00:20:51,730
These are the types of the switches guys. fixed configurations switches are fixed in their configuration
184
185
00:20:51,730 --> 00:21:00,250
what that means is that you cannot add features or options to the switch beyond those that orginally
185
186
00:21:00,250 --> 00:21:02,230
came with the switch.
186
187
00:21:02,320 --> 00:21:08,110
The particular model you purchase determines the features and options available
187
188
00:21:08,140 --> 00:21:16,750
For example, if you purchase a 24-port gigabit fixed switch, you cannot add additional ports when
188
189
00:21:16,750 --> 00:21:18,420
you need them.
189
190
00:21:18,430 --> 00:21:25,150
There are typically different configuration choices that vary in how many and what types of ports
190
191
00:21:25,240 --> 00:21:29,700
And let's take a look to modular switches. Modular switches: offer more flexibility in their configuration. Modular
191
192
00:21:29,860 --> 00:21:38,080
Modular switches: offer more flexibility in their configuration. modular switches typically come with different
192
193
00:21:38,080 --> 00:21:38,990
sized
193
194
00:21:39,060 --> 00:21:47,290
chassis that allow for the installation of different numbers of modular line cards the line cards actually
194
195
00:21:47,290 --> 00:21:48,710
contain the ports.
195
196
00:21:48,890 --> 00:21:52,000
The line card fits into the switch chassis
196
197
00:21:52,000 --> 00:21:55,440
like expansion cards fit into a PC.
197
198
00:21:55,480 --> 00:22:00,070
The larger the chassis, the more modules it can support.
198
199
00:22:00,130 --> 00:22:11,840
And mostly this modular switches can carry high traffic and let's take a look a great feature which is
199
200
00:22:11,890 --> 00:22:20,480
A stackable switch is a network switch that is fully functional operating standalone
200
201
00:22:20,540 --> 00:22:29,120
but which can also be set up to operate together with one or more other network switches, with this group
201
202
00:22:29,120 --> 00:22:33,200
of switches showing the characteristics of a single switch
202
203
00:22:33,230 --> 00:22:37,530
but having the port capacity of the sum of the combined
203
204
00:22:37,640 --> 00:22:45,950
switches.
The term “stack” refers to the group of switches that have been set up in this way.
204
205
00:22:45,980 --> 00:22:53,990
The common characteristic of a stack acting as a single switch is that there is a single IP address for
205
206
00:22:53,990 --> 00:23:01,430
remote administration of the stack as a whole, not an IP address for the administration of each unit in the
206
207
00:23:01,430 --> 00:23:02,720
stack.
207
208
00:23:02,720 --> 00:23:12,290
And then lastly we to talk about SFP small for Factor pluggable. this small form factor pluggable is a
208
209
00:23:12,650 --> 00:23:22,100
a compact, hot-pluggable optical module transceiver used for both telecommunication and data communications
209
210
00:23:22,760 --> 00:23:24,780
applications and SFP interface.
210
211
00:23:24,830 --> 00:23:33,710
on networking hardware provides the device with a modular interface that the user can easily
211
212
00:23:34,010 --> 00:23:39,340
adapt to various fiber optic and copper networking standards.
212
213
00:23:39,350 --> 00:23:48,650
This is the fiber optic SFP and there are also types of these SFP which supports the copper cables
213
214
00:23:48,740 --> 00:23:49,360
as well.
24108
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.