1.1 Examining Local Area Networks, Devices, and Data Transfer Part 1- MTAN

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
4 hours 30 minutes
Difficulty
Beginner
Video Transcription
00:01
welcome
00:02
once again to the side. Very empty. A 98
00:06
3 66 network and Fundamentals certification Prep course.
00:14
We're going to begin its presentation by first are taking a look at module one doing module one.
00:19
We will be focusing our attention on the topic off Lesson one, understanding local area networking.
00:27
So
00:28
what? I object this for this course instruction,
00:30
they are as follows. First of all, object is to examine
00:35
no que area networks, devices and data transfer.
00:39
Last night certainly is which, identifying the various network apologies and standards.
00:45
One thing I would also add is that this particular martyr itself is broken in three specific parts. In fact, in part one re examining local area networks, devices and data transfer. We're going t on a discussion in part to buy further
01:03
discussing, examining look, Aaron networks,
01:06
devices and data transfer. We could conclude in part three by identifying the various networked apologies
01:14
and standards.
01:15
Just a reminder
01:17
at the conclusion of this particular module,
01:21
what I'm gonna do, be walking through several questions, pertain to marja, won the purpose of this exercise for you
01:27
as a future catered to be assessed your overall knowledge as was understanding off the topics or and or objectives to gonna be cover during this particular presentation.
01:40
If you recall, I mentioned earlier again in the course introduction about the skills that will be marriage is doing this particular certification prep course. Other words looking at it from a test in perspective. Now it's broken on his be specific areas in which Microsoft gonna be testing you.
01:59
If you expect. Do pass that exam in which I believe you will.
02:02
The most important thing is to remember that exam is broken in three specific parts. Understanding network infrastructure.
02:10
The weight is 30 to 35%.
02:14
Secondly, it's understanding network. Hartwell 20 to 25% is the actual weight
02:21
last night? Certainly so, which understanding protocols and service is its 45 to 50%.
02:28
Now the personage indicates a rented weight of each major topic area on exam.
02:35
The height of personage
02:37
The more question that you are lightness see on that content area on exam
02:44
model one is a great place. Begin the process, actually laying the initial foundation for this particular course of instruction.
02:52
So let's begin by first are taking a look at the network from a historical perspective,
02:59
the origin and in that can be traced back
03:01
to United States Advanced Research Project Agency,
03:07
which later became the Defense Advanced Research Project Agency, which is an agency of the United States Department of Defense, which is response before the development of emerging technology for use by the military.
03:23
Now, if you look again at development again off the network itself, as I mentioned before, if you look back in 19 eighties,
03:31
it actually begin with users who had what we call the stent along type computers. And so what happened is they were able to connect these computers together by some type of what we call a central connecting advice. As a result of that, they were able to share files
03:46
and fold is a CZ. Well,
03:49
now you may act one. The war is a cell trickle next device. A great example of a central connecting advice would be, for example, be a switch
03:59
or her. Although hope is a legacy device. Now we're gonna discuss this center connected advice in much more detail in upcoming presentation, but nevertheless, they were able to connect these computers together and bay the shell files and folders and so forth. Now this was referred to as point the port or
04:18
a dollop type connection.
04:20
Now that's an other technology that was available during that point time. We have what we call these bulletin boards. These bookable became a central point of communication in a dial up type connection now, although he became very important technology, it has some drawbacks. I'm gonna mention what the drawbacks are.
04:41
The first drawback was that it was very direct communication that was a drawback of this
04:45
type of system.
04:47
Another drawback was development was Lim Toh only with those who knew about the location off the bulletin board
04:56
and last night suddenly switch. A last drawback was that it required one morning per connection. If five people connect the simultaneously, it will require five motive connected to five separate phone lines. In order for it to act, you work. So what we've seen happen back in the 19 sixties,
05:13
during the 19 nineties, what happened? D o d.
05:15
Develop what we call this very large, reliable win and you may act one. The world is a win win stands for a wide area network and basically what it is is a telecommunication network or computer network that extends over a large geographical
05:34
business or place.
05:36
Why did when it was often extent with least telecommunication type circuits?
05:43
So as a result of this back in the 19 nineties, the D o d. When eventually became the Internet. Now, obviously there are a lot of myths off fallacies out there regarding who actually owns in there. Or in fact, if who owns in it now? Obviously, there's a lot of myth the fast, as I mentioned before, but the reality is nobody owns the Internet
06:02
now. Obviously, you may have people they provide Various resource is for you on the Internet, like, for example, Google. But Google does not own Internet. Nor do Michael's off owned in that as well.
06:15
So let's look in the Internet itself
06:17
Now when you connect a worldwide well, do it I s p other words and that service provider in order for you to be the connected and that you need to have an I S P Internet service provider.
06:30
So what is example of I S P A, T and t? Comcast is example, but we call it in that service provider in order for you debated Connect to the Internet, and it starts exchanging information. But there isn't a fixed connection between your computer and the Web server, Computer holster worldwide said. That's why you need to have an I S B.
06:50
Instead, it makes exchange using the best possible path that that particular time
06:56
special computers call rodders determined these paths bordered slow links and favoring the obviously the fast ones.
07:02
So in short, Internet is a network of computer networks. In other words, nobody owns the Internet
07:11
as computer in advance. We had what we called a peer to peer communication was gradually deliver and enhanced. Now, since the 19 nineties, the Internet has great influence and upgraded neck networking through global standards. Billions of in that uses rely on multiple application and networking technologies.
07:30
We also have in that protocol again with the Internet primary component of communication backbone.
07:35
Because the end is comprised of what we call hardware software layers. The RP communication standard is used to address schemes and identify unique connected devices. We had communication. The Internet is the most cost effective communication method in the world in which the following service's are available to you
07:56
like, for example,
07:57
email,
07:58
World Wide Web,
08:00
online movies and gaming data transfer or file sharing. FTP. In other words, file transfer protocol. Instant messaging
08:09
in that form, social networking like, for example, a good example again of Social Net. We have a lot of different what we call a social networking out there. Nowadays. We also have again online shopping, like a lot of people like this shopping e Bay and all that kind of stuff Amazon. So the intimate provide this
08:28
method by which we able, what debate to connect to one another
08:31
and the share information or share resource is.
08:35
So what are the three types of networks out there
08:39
now? I'm gonna use this slide as an introduction to the different types of networks. I tried to let the graphics do the talking on this slide.
08:48
Elaborate more needs network types in sequential slides. Nevertheless, different types of private networks are distinguished based on that size in terms of the number machines, the data transfer speeds and their reached. Their use is said to be three categories. Such networks
09:05
land look, Aaron, Network, Man, Metropolitan
09:07
or, when other words. So again, we're told by the three different types and that we have the wide area where the peer to peer and we also have again the local network, not to mention we have some other ones as well call metropolitan type as well.
Up Next