Networking Basic
3 views
May 22, 2025
Networking Basic
View Video Transcript
0:00
welcome to my comprehensive CCNA course
0:03
as this is the first video allow me to
0:05
introduce the course and tell you a
0:07
little bit about what we have in store
0:09
for you this course is designed to be
0:12
your one-stop shop for everything you
0:14
need to ace the CCNA exam and it's all
0:17
completely free we'll be diving into all
0:19
the key topics on Cisco's official exam
0:22
list with lecture videos to guide you
0:24
every step of the way but that's not all
0:27
we also have practice quizzes to test
0:29
your understanding flashcards to help
0:32
you review and remember what you learned
0:34
practice labs using Cisco's packet
0:36
tracer simulation software and multiple
0:39
practice exams to get you ready for the
0:41
real thing and don't worry while the
0:43
course follows Cisco's official exam
0:45
topics list I'll also be providing
0:48
additional context and information to
0:50
really help you understand the material
0:52
and improve your understanding of
0:53
networks in general
0:55
this course is perfect for anyone who
0:58
wants to pass the CCNA 200 to 301 exam
1:02
no prior knowledge of networking
1:04
required and don't need any experience
1:06
in programming so without further ado
1:10
let's jump right in now let's discuss
1:13
networking to begin let's define what a
1:16
network is a computer network is a
1:18
digital telecommunication system for
1:20
sharing resources between computing
1:22
devices that use a common
1:24
telecommunications
1:25
technology data transmission between
1:28
devices is supported through data links
1:30
made up of physical cables or wireless
1:32
methods such as Wi-Fi or microwave
1:35
transmission the point of computer
1:37
networks is to share resources such as
1:40
information or printers in the past each
1:44
person in an office would need their own
1:46
printer but with a network a single
1:48
printer can be shared by multiple people
1:51
reducing cost another example of
1:54
resource sharing is file sharing where a
1:57
file can be transferred through sneaker
1:59
net floppy disc or USB thumb drive
2:02
instead of physical transfer the goal of
2:05
computer network is to make resource
2:07
sharing more efficient and cost
2:09
effective
2:14
networks come in all different sizes
2:16
from the smallest to the largest the
2:19
largest network on Earth that we know of
2:21
today is the internet it connects people
2:23
and devices all over the world but
2:26
networks don't have to be that big they
2:28
can be as simple as connecting two
2:30
computers together in the past to share
2:33
information between two computers you
2:35
would need to use a physical method such
2:37
as copying files onto a USB drive and
2:40
transferring it manually nowadays
2:43
networks typically use cables such as
2:45
Ethernet cables to connect
2:47
devices one example is the use of a RJ45
2:51
connector commonly known as an Ethernet
2:53
cable which connects devices through a
2:55
physical connection however with
2:58
advancements in technology wireless
3:00
methods such as Wi-Fi have become
3:03
increasingly popular as it makes
3:05
connecting and sharing information much
3:07
easier for example connecting two
3:10
smartphones together using Wi-Fi or
3:12
Bluetooth instead of a physical cable is
3:15
a common way people share information
3:17
today the idea of using cables like we
3:20
used to might seem crazy to young people
3:23
today as they expect it to be easy and
3:25
effortless to connect and share
3:27
information across
3:32
devices now let's talk about the two
3:34
main players in the game servers and
3:37
clients a server is like a superhero
3:40
providing all the resources and
3:42
capabilities that clients need to access
3:45
think of it like a big and powerful
3:47
computer that has all the storage memory
3:49
and processing power to handle multiple
3:52
requests at once but just like any
3:55
superhero it can't do it alone and
3:58
that's where clients come in clients are
4:01
the sidekicks they access the services
4:03
provided by the server and make use of
4:05
them imagine your laptop or phone as the
4:08
client reaching out to the server to get
4:10
the information it needs but just like
4:13
the server a client can also switch
4:15
roles and become a server itself it can
4:19
share resources or host services for
4:21
other clients to access now let's
4:24
imagine you're sitting in front of your
4:25
laptop and you want to access Google you
4:28
type in the web address and hit enter
4:31
that's the client reaching out to the
4:32
server which is Google in this case to
4:35
get the web page and boom Google sends
4:38
back the page and displays it on your
4:40
screen this process happens so quickly
4:44
and seamlessly that we often take it for
4:50
granted the original Ethernet used a
4:52
large yellow cable called 10b 5
4:56
repeaters were developed to amplify the
4:57
signal allowing the cable to be longer
5:00
without signal
5:02
attenuation multiple port repeaters also
5:05
called hubs were also developed to
5:07
repeat the signal from one port to
5:09
multiple other ports
5:11
these devices did not understand the
5:13
signal they only amplified it nowadays
5:16
hubs are considered obsolete but
5:18
wireless access points which allow
5:20
multiple devices to connect wirelessly
5:23
can be considered a type of hub a switch
5:26
is a more advanced device that allows
5:28
for multiple devices to connect and
5:30
communicate on a network without
5:31
collisions unlike a hub switches are
5:34
more advanced than hubs because they
5:36
have the ability to forward and filter
5:38
data based on the MAC address of the
5:40
devices connected to it this allows for
5:43
more efficient use of the network as
5:45
well as greater security when a device
5:48
sends a data packet to the network the
5:50
switch will check the destination MAC
5:52
address and forward the packet only to
5:54
the port connected to the device that
5:56
the packet is meant for this eliminates
5:59
the possibility of data collisions and
6:01
improves overall network
6:03
performance switch can come in different
6:05
size with varied ports some switches are
6:09
small with a few ports while others have
6:11
a large number of ports routers are
6:14
devices that are used to connect
6:16
different networks and direct traffic
6:18
between them they use routing tables and
6:21
protocols to determine the best path for
6:23
data packets to take as they travel
6:25
between networks
6:27
routers operate at the network layer OSI
6:30
layer 3 and perform tasks such as IP
6:33
address assignment subnet masking and
6:36
network address translation
6:38
NAT routers can connect networks of
6:41
different types such as LANs and WANs
6:44
and can also be used to connect networks
6:46
of the same type such as connecting
6:48
multiple LANs one of the main functions
6:50
of a router is to act as a gateway
6:52
between different networks
6:55
in summary routers are devices that
6:57
directs traffic between networks it uses
6:59
routing tables and routing protocols it
7:02
can connect different types of networks
7:04
and also can connect multiple networks
7:06
of the same type they come in different
7:09
forms from homegrade routers to
7:11
enterprisegrade routers with more
7:13
advanced features
7:19
a firewall is a security system that is
7:21
used to prevent unauthorized access to a
7:23
private network by filtering the
7:25
incoming information from the internet
7:28
its main purpose is to create a barrier
7:30
between a private network and the public
7:33
internet to protect it from hackers and
7:35
malicious traffic firewalls block
7:38
unwanted traffic and only permit wanted
7:40
traffic and it's especially important
7:43
for large organizations that had a lot
7:45
of computers and servers a firewall
7:48
works by filtering incoming network data
7:50
and determining whether it should be
7:52
allowed to enter a network based on
7:54
rules called an access control list
7:57
these rules are customizable by the
7:59
network administrator and can be based
8:01
on IP addresses domain names protocols
8:04
programs ports and keywords
8:08
there are different types of firewalls
8:10
including hostbased firewalls which are
8:12
software firewalls installed on a single
8:14
computer and many operating systems and
8:17
third party software come with built-in
8:20
hostbased firewalls another type of
8:22
firewall is the network-based firewall
8:25
also known as a packet filtering
8:27
firewall which sits at the network
8:29
perimeter and controls access to the
8:31
entire network
8:33
this type of firewall inspects each
8:35
packet of data that travels through it
8:37
and allows or denies access based on
8:40
predefined
8:41
rules network-based firewalls can also
8:44
be hardware or softwarebased and are
8:47
typically used in larger organizations
8:49
to provide more advanced security
8:51
features such as stateful inspection
8:53
which tracks the state of a connection
8:55
and ensures that only authorized traffic
8:57
is allowed to pass through another type
9:00
of firewall is the stateful inspection
9:02
firewall also known as a dynamic packet
9:05
filtering firewall which inspects not
9:08
only the header information of a packet
9:10
but also the context in which the packet
9:12
was sent such as the type of data being
9:15
transferred and the status of the
9:17
connection this allows it to detect and
9:19
block potentially malicious traffic that
9:21
may otherwise pass through a packet
9:23
filtering firewall lastly there are next
9:26
generation firewall is a type of
9:28
firewall that combines traditional
9:30
firewall features with intrusion
9:32
prevention application control and other
9:35
security features to provide a more
9:37
comprehensive security
9:39
solution next generation firewalls can
9:42
also offer additional features like
9:44
advanced threat protection and user
9:46
identity management in summary a
9:49
firewall is a security system that is
9:51
used to prevent unauthorized access to a
9:53
private network by filtering incoming
9:55
information from the internet firewalls
9:58
come in different types including
10:00
hostbased network-based stateful
10:03
inspection and next generation firewall
10:06
each with their own set of features and
10:08
level of protection they provide and
10:10
they can be hardware or softwarebased
10:13
thanks for tuning in that's all for this
10:15
video
#Data Formats & Protocols
#Network Monitoring & Management
#Networking
#Networking Equipment
#Teleconferencing