Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,360 --> 00:00:08,920
Hello one more come to see CNPC which course prepared by or Khail Cisco do I get to see sandpits certification
2
00:00:08,980 --> 00:00:21,010
exam to in three parts and are Savitch route and T-shirt and we are starting with this be part and this
3
00:00:21,160 --> 00:00:24,700
first section will be about the basic switching concepts.
4
00:00:27,040 --> 00:00:35,130
We are starting with the harp harp is a common connection point for devices work and hubs that the word
5
00:00:35,130 --> 00:00:40,410
is commonly used to connect segments of a local area network.
6
00:00:40,480 --> 00:00:42,780
The Hub contains multiple ports.
7
00:00:42,950 --> 00:00:50,140
When a packet Arabs as one port it is applied to the other port so that all segments of the local learn
8
00:00:50,150 --> 00:00:56,760
and work can see all packets as you see them in the picture river hop.
9
00:00:57,010 --> 00:01:02,080
And we hear for ports over to Devizes
10
00:01:05,030 --> 00:01:13,970
if port one wants to communicate with port for for example the peccant is Flude to put two and Port
11
00:01:13,970 --> 00:01:15,870
three as well.
12
00:01:15,870 --> 00:01:19,870
And as you can see that that's an inefficient use of the bandwidth.
13
00:01:22,060 --> 00:01:28,450
The second one is we are going to talk about is Savitch and networks which is a computer networking
14
00:01:28,450 --> 00:01:36,520
device that connects devices together on a computer network by using packet switching to receive process
15
00:01:36,850 --> 00:01:44,950
and forward data to destination device and networks which is a multiple or bridge that uses hardware
16
00:01:45,070 --> 00:01:55,690
addresses to process and forward data at Linklater layer two of the PSI module and you can see a switch
17
00:01:58,150 --> 00:01:59,010
in here.
18
00:02:00,370 --> 00:02:06,890
This switch can be oversight layer two or layer tree as well.
19
00:02:07,030 --> 00:02:14,530
If you're are talking about the layered pre-speech that's a multilayer switch which can also make robing
20
00:02:14,530 --> 00:02:17,040
as well later.
21
00:02:17,050 --> 00:02:21,330
So it's make switching beds when they make table.
22
00:02:21,340 --> 00:02:24,530
They keep mac address stable.
23
00:02:25,530 --> 00:02:36,610
And forward the pickup's imports using that make up a stable so that provides efficient use of bandwidth
24
00:02:37,210 --> 00:02:45,520
and these devices can also provide power over the Internet and the security operations for us which
25
00:02:45,520 --> 00:02:48,820
we are going to talk about later in detail.
26
00:02:48,820 --> 00:02:55,780
Let's take a look to the broadcast domain or broadcast domain is a logical division of a computer network
27
00:02:56,160 --> 00:03:04,540
image all nodes courage each other by Bob Keth at datalink layer broadcast domain can be within the
28
00:03:04,540 --> 00:03:12,560
same law clarionet or segment or it can be bridged to other local area network segments.
29
00:03:12,560 --> 00:03:18,490
Any computer connected to the same switch is a member of the same broadcast domain.
30
00:03:18,550 --> 00:03:26,620
Further any computer connected to the same set of interconnected surveys is a member of the same broadcast
31
00:03:26,830 --> 00:03:28,250
domain.
32
00:03:28,270 --> 00:03:36,490
Please pay attention that others and other high later devices form boundaries between Burgas estimates
33
00:03:36,820 --> 00:03:41,430
and separating villans the way it's broadcast domains as well.
34
00:03:41,860 --> 00:03:43,600
Let's take a look to the picture now.
35
00:03:44,640 --> 00:03:47,040
We have four both Testament's answer.
36
00:03:47,040 --> 00:03:57,110
We have read the broadcast domains in here and as you can see that we have bandwidth twice the which
37
00:03:57,110 --> 00:04:05,200
is rather in here and also Whelan's are boundaries for the broadcast domain too.
38
00:04:05,270 --> 00:04:07,780
Let's take a look to the MAC addresses now.
39
00:04:09,180 --> 00:04:14,440
And Mekka address are for computer or printer or something.
40
00:04:14,460 --> 00:04:21,240
Any network device is a six byte unique identifier assigned to network interfaces for communications
41
00:04:21,330 --> 00:04:24,700
at that layer of a network segment.
42
00:04:24,960 --> 00:04:32,970
Megadoses are used as the network arrests for most terribly new technologies including Internet and
43
00:04:33,180 --> 00:04:41,790
Wi-Fi logically Meka addresses are used in the media access control protocols some layer of the was-I
44
00:04:42,090 --> 00:04:52,920
module and organisationally unique identifier is a 24 bit number that uniquely identifies a vendor manufacturer
45
00:04:53,010 --> 00:05:01,740
or other organization as you can see that the first portion of the MAC address is organizationally unique
46
00:05:02,010 --> 00:05:03,030
identifier.
47
00:05:03,780 --> 00:05:12,420
Other portion of the MAC address is universally administered address universally administered Everest's
48
00:05:12,480 --> 00:05:17,730
is uniquely assigned to a device by its manufacturer and that's it.
49
00:05:18,930 --> 00:05:24,880
And that's the second portion.
50
00:05:24,890 --> 00:05:27,680
Let's take a look at the Internet frame right now.
51
00:05:27,900 --> 00:05:37,060
It's in that frame consists some Feltz as you can see that in the picture they are pre-amble SFD we
52
00:05:37,060 --> 00:05:48,210
see where Mac Sendler Mac an optional relend tech and type filled payload and CRC checksum.
53
00:05:48,240 --> 00:05:52,350
For example let's take a look to the preamble first.
54
00:05:52,350 --> 00:06:00,180
Preamble communicates to the receiving devices whether a frame is coming and pro-white synchronization.
55
00:06:00,340 --> 00:06:04,770
The second fill is SFD we just start afresh.
56
00:06:04,790 --> 00:06:08,420
Delamater start him.
57
00:06:08,440 --> 00:06:14,670
Delegate who is responsible for specifying the beginning of the destination MAC address in the next
58
00:06:15,110 --> 00:06:24,010
byte and the other fields are receiver and sender Mac and an optional will intact and reheard type field
59
00:06:24,040 --> 00:06:25,150
in here.
60
00:06:25,600 --> 00:06:32,040
And we have a payload pad and CRC checksum.
61
00:06:32,050 --> 00:06:39,580
Let's take a look to the basics which you persist right now if the destination Meka is found in the
62
00:06:39,640 --> 00:06:41,770
camp table of the switch.
63
00:06:41,950 --> 00:06:45,560
The switch says the frame out of the corresponding port.
64
00:06:45,580 --> 00:06:49,120
This process is called forwarding.
65
00:06:49,540 --> 00:06:57,100
If the destination MAC address cannot be found in the camp table the form is sent to all other ports
66
00:06:57,130 --> 00:07:02,660
in the same Bil'in and this process is called Food Inc.
67
00:07:02,770 --> 00:07:08,620
If the destination MAC address of the receiving frame is the broadcast address which is
68
00:07:11,490 --> 00:07:23,040
f f f f f f f f f f f f this time the frame is sent to all the ports in the same villain.
69
00:07:23,080 --> 00:07:26,410
And this process is called also floating.
7522
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.