Networking Concepts Part 2

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
8 hours 20 minutes
Difficulty
Beginner
CEU/CPE
8
Video Transcription
00:05
now, as we mentioned earlier, When we have a network, we have a group of interconnected devices.
00:10
So how do we connect those devices?
00:13
You connect them through media and through specific devices designed to connect computers.
00:18
Hubs are what we used to use very commonly back in the day simply for the fact that they were cheap.
00:24
But hubs introduced problems in some security vulnerabilities into the network, so we moved from hubs. Two switches,
00:31
switches give us greater control of traffic and switches in a lot of ways. Act like a police officer of a busy intersection, directing traffic from one path to another.
00:42
Switches will allow you to manage traffic on your network more efficiently.
00:46
Routers are primarily about connecting to different networks.
00:50
If I want to connect to the Internet,
00:52
I usually do so through a router.
00:54
If I want to connect to my branch in Minnesota, usually I connect to an external network through my router.
01:00
Villains are going to give us benefits of both switches and routers.
01:04
A villain is going to be a virtual Elian, so we'll be able to segment our network into different subnets if you will, and we can do so on a switch,
01:15
we'll talk about why that's desirable later.
01:18
And then, of course, we have to consider wireless access and wireless access points. And how will allow these hosts to connect without being physically wired in
01:26
on Every thing to consider is VPN servers and with wireless and VPN. We'll talk about those ideas. When we get to the remote access section,
01:36
every one of these terms will go into more deeply.
01:41
The next thing we have to have if we're going to allow communication is a protocol.
01:45
A protocol is really important because you can think of this as the language that computers speak and we have to speak the same language
01:53
quite honestly. That's not the best definition you're going to hear. This is a good way to think about it, because if I'm speaking Greek and you're speaking Spanish, we're not going to be able to communicate unless we have a translator.
02:05
The more translators we have, the more unreliable the communication is.
02:08
If you ever want to do something fun, use Google. Translate to speak a phrase and translate it into Spanish.
02:15
Then take that Spanish freeze and translated back to English, then take that result and translate it back to Spanish.
02:23
Do that about 10 times and you'll find the end result is hysterical.
02:27
By the end, you don't have anything like you were originally communicating,
02:30
and that's the problem when it comes to protocols.
02:34
Mhm
02:35
when you have too many different protocols, even though we can get a conversion and can get a device called a gateway, that's a protocol converter. We don't get good, true communication.
02:46
So what we like to be doing is to all use the same protocol.
02:50
A better definition of a protocol is that it's the set of rules and requirements that govern communication.
02:55
So things like how much data can be sent at once. How do I know if I'm sending more data than you can receive?
03:01
How long should data exist on the network? And how should the packets be formatted? Are all examples of information that make up a protocol?
03:10
But again, from this standpoint, you can think of it as a language we have to share the language. The most common protocol we have and used by far, is the TCP I P Protocol. It's actually not a protocol. It's called a protocol stack or sweet.
03:28
It's called a protocol stock because it's made up of a lot of little protocols.
03:32
As a matter of fact, you already know two of these protocols, TCP and I p.
03:38
There's also http UDP icmp element opiate feels like
03:45
there are a lot of protocols that make up the TCP I P suite,
03:49
and each of them have a particular purpose,
03:52
just like everything we're going to go over this and more depth later,
03:57
the medium cable or the airwaves. And with cable, there are three main types that we use for networking,
04:03
quack CEO, twisted pair and fiber optic cable.
04:08
Each of these are in use today, and they each have their place.
04:12
We'll cover this in another chapter, where we get into more details on the specifics of mediums.
04:16
We have to have cable or airwaves are going to traverse because we need that path for data to travel.
04:24
Ultimately, what we talked about here is the fact that there are a lot of elements that have to come together if we're going to be able to share resources and communicate across the network
04:33
at the very basic level. We have the systems we want to connect.
04:38
Then if you want a domain environment,
04:40
we have to have a network operating system,
04:43
and that creates the domain or the realm.
04:46
We use connectivity, devices and protocols. That way we can agree on how to communicate.
04:49
And of course, there is media, which is what we Travers
04:54
also mentioned here. We have certain network services that we utilize, like DNS and D H C P,
05:00
which we'll talk about in just a bit.
Up Next
CompTIA Network+ (N10-007)

The Cybrary Network+ Certification course provides students with the knowledge and insight to perform entry-level network-related tasks and to serve as one portion of a balanced study effort required to pass the Network+ exam.

Instructed By