1.8 Identifying Network Topologies and Standards Part 2 - MTAN
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Welcome back to Cy Berries Empty, A 98 3 66 network and Fundamentals Certification prep course.
00:13
When we come through Ethan that
00:15
now either net or adapt or that controller is a term used to describe it, even that network card used to connect a desktop computer to a network. If you're looking for networking that the driver, you confined them again obsolete. Do the various vent do that vendor
00:30
and how could now can you go about the prosecutor letting anything that came all you need to do away? If you said that one in your home network,
00:37
use Ethernet cable to your computer. The price is the same you look for on your camper. You look for Nick or network interface card. Once you locate that network interface card, you're gonna push that cable. Connect into the pore until you hear a click if connected properly with the connection on the other end
00:55
what you're going to see. The green light should appear to indicate the signal it's found.
01:00
If you want a discontinuity that cable, you simply press down on the top tap and pulled the back gently on that connector.
01:07
We put much restored some of this particular presentation are doing this presentation. We learned that the network gets in private to a more complete exchange. Data we also learned in the local area network is a group of these computers. Again, they could be in a small geographical area or one building well, *** trust, a network adapter or Nick Carter,
01:26
where all devices
01:27
most bit device. And now they have on some type of what we call the network interface card
01:33
the car. Obviously, we tell by the network interface card. It could also be a wireless network interface card as well. Obviously, multiple device can hit at each other and communicate using again a switch
01:45
We also learned it in. That protocol is part of the TCP I P that, among other thing, what it does for that governs I p addresses. In that protocol, it's a corner. Obviously I pee again. Address is obviously the cornerstone of networking. It defines computers or host that you're working on. We also discuss while it's local area that we're gonna win
02:05
or while its access born a person with a laptop again on handheld computer are tablet. They can live to connect to any other vices and can work from anywhere. Other words of advice. And with that mobility,
02:17
we also discussed not to party. Defied the physical connection. We learned what? What a bus works, we learn with a ring. We learned some of that advantage and disadvantage of the mess is. Well,
02:28
at this point time, we have a quiz for you. As I mentioned before, the first question we're gonna be going over doing this. Particular Marjorie is course number one.
02:38
You have a key network administrators leave your company.
02:42
Therefore, what does the company pin on to continue to use the network? Is it eh?
02:49
Our uses path, Where is be active directory, is it? See a master network switch? Or is it d?
02:58
Okay, if you said like the day, you're absolutely correct.
03:01
So again, the better understand your land better. It helps to write down what its structure is. In other words, to document it, you need to have some form of documentation, never documentations any information that helps describe defined, otherwise explained how the network computers connected physically as well asked logically. In fact,
03:21
if you're gonna build on that with the first thing, I'm gonna do is build it, get on paper
03:25
before you actually physically go out by the price of doing that as well.
03:30
Question number two What is the most common central device used today? Connect computers to a network? Is it a up? Is it be a switch? Is it? See a small office home office Roger or is it D A. V P and running.
03:44
If you say like that again or switch, you're absolutely correct because hubs are considered legacy devices and they have been replaced by switches. Switches allow multiple computers connected together. The evangel switched over. Hope is that it can handle several conversation
04:00
at the same time, and it has intelligent built within it.
04:03
Unlike the Hub
04:05
course, Number three was the most common adapter connected. Used to connect a computer to a wired network isn't a RG six? Is it be an RG 58? Or is it? See it R J 45 or D and R J eight.
04:20
If you selected See
04:24
and r. J. 45 you're absolutely correct
04:27
because an R J. 45 is associate with Ethan. That network is the most common Why, adapted by default, it's found on virtually every computer these days.
04:40
Course the number four, which you're following doesn't switch. Use for increase performance again. We're looking at an increase performance. Is it a simplex? Is it be? Ah, half duplex is the C four duplex or the D A sliding duplex.
04:57
Now, if you select it again, see, you're absolutely correct.
05:00
Switch is very A switch switch is very fast between multiple connections, which allows motor computers communicate at the same time as Rizzo each client and sent and received at the same time. You have four duplex woods gives better performance.
05:16
Question number five What? What do you use to isolate a group of computers within your organization?
05:25
Is it a
05:27
be
05:29
C or D
05:34
again? Remember the key? What? What do you use the isolated group of computers
05:40
if you selected again V land. You're absolutely correct because it stands for a virtual land.
05:46
If you remember a virtual and is a group of host with a common set of requirements that communicated through, they were connected together as normal on one switch. Regardless, that physical connection, a villainous implemented to segment and network reduce collision, organizing network
06:00
boost performance and last night's of things of which you want to increase your performance.
06:06
Question number six.
06:09
What do you use to create a V land? We discussed that during the presentation.
06:14
Is it a A router? Isn't B or switch, is it See a firewall or the D A proxy server?
06:21
Take a few moments and think about this.
06:28
If you select the switch, you're absolutely correct. Switches you to control the villain like seven in a V. Lang compartmentalized, compartmentalize eyes other words with a network anchor and isolate the metal. So again they used to isolate the network as well.
06:46
We'll compartmentalize. That is, well,
06:48
question number seven.
06:50
What zone is used? A public external websites for an organization?
06:56
Is that a intra
06:58
ex Annette Inter Network or D M Z?
07:03
If you said let the D you're absolutely correct, A permanent they're also known as the D. M. Z is a small network that is Sep. Separate from the company's private land and the Internet. It's called a perimeter network because it is usually on the edge off your local area network
07:20
course. The number eight,
07:21
which the party is the most redundant as well as the most expensive
07:28
for you. Is it a a start apology?
07:30
Is it be a ring
07:32
isn't see mess? Or is it the ah bus?
07:38
If you select it again, I mess. You're absolutely correct.
07:43
A network apart defies a physical connection of hosts in a computer network with the Mesta party area. Computer connects to area other computer no central unit devices needed. Since Air Computer connects the area. Other contributors, it requires the most cabling, which increases the costs
07:59
so it could be very pricey. In other words,
08:01
what's the number nine?
08:03
What Standard describes again? A CS in May
08:07
again
08:09
backs last CD
08:09
is that a eight or two out 2801.2 is the 82.3. Is it see attitude out? Five or eight? 02 died 11.
08:24
Okay, the correct answer is
08:26
be
08:28
the art Tripoli. It'll two out. Three Defines caress since multiple access with collision detection. Because computers on a D for Internet land all share the same channel,
08:39
it go again. This assistant governor with computers coexist with limited collisions. So again you use is mainly on a wire type network, not a while its network.
08:48
My last question is course number 10. What mechanism to Wallace that were used to access again? The network.
08:56
Is it a
08:58
Is it B
08:58
or the C or D?
09:07
If you select it
09:07
be you're absolutely correct.
09:11
If an organization uses wireless Ethernet caress, since multiple access with collision of ordnance is use again, I want to thank you very much for your attention to detail
09:22
drew in the course of this particular discussing a murder one, and I look forward to seeing your future training presentations.
Up Next
Instructed By
Similar Content