Top videos

Introduction to Computer (Udemy)
69 Vues · 6 mois depuis

Module 6 Part 5: ⁣Security Best Practices, Compliance, and Emerging Threats

Understanding Japan A Cultural History
37 Vues · 5 mois depuis

What makes 1989 the turning point for contemporary Japan? Explore four pivotal moments from that year whose repercussions are still being felt in the Japan of the 21st century: the death of Hirohito, China's Tiananmen Square Massacre, the bursting of the Japanese real estate bubble, and a dramatic stock market crash.

C# Bootcamp (Udemy)
78 Vues · 2 années depuis

Part 15 of C# .NET Bootcamp: ⁣The C# Compiler

In this lesson, you are going to learn about the C# compiler, how it works and how can you work with it

Dion Training CompTIA IT Fundamentals+
34 Vues · 6 mois depuis

⁣⁣⁣CompTIA IT Fundamentals+ Course | Module 21 Part 2

C# Bootcamp (Udemy)
93 Vues · 2 années depuis

Part 41 of C# .NET Bootcamp: Polymorphism

Networking Fundamentals (Udemy)
82 Vues · 2 années depuis

Part 15 of Computer Networking Fundamentals: Network Switches

Switches

At the end of this episode, I will be able to:

  1. Identify the characteristics and basic functionality of a network switch.

Learner Objective: Identify the characteristics and basic functionality of a network switch.

Description: In this episode, the learner will be introduced to the basics of network switches, the basic is switching process and characteristics of a network switches.


  • Introduction to Network Hardware
    • Switches
      • Managed vs. unmanaged
        • Managed switch - this type of switch provides a configuration interface commonly in the form of a command line interface or terminal.
        • Unmanaged - this is the most basic type of switch that requires no configuration tasks and utilizes a sort of "Plug and Play" implementation.
      • Basic components
        • Network adapter - this is a circuit board or embedded component installed on a network device such as a computer, smart tv, gaming console, VoIP phone and more. This component controls the communication for the network device.
        • Network media - this is the bounded connection media that connects the network device to the switch. The most prevalent media is copper twisted pair cabling however fiber optic cabling is also used.
        • Network Switch - this device receives the electrical communications from the network devices connected via ports on the face of the switch. These devices make decisions on what ports to forward the communications to.
      • Media Access Control (MAC) address
        • A MAC address is a unique 48-bit or 6-byte hardware identifier associated with a network adapter. This address is used to identify the network device on Ethernet switched networks.
        • The MAC address is comprised of two components:
          • 1st 3 bytes = Organizationally Unique Identifier (OUI) - a globally unique vendor/manufacturer identifier.
          • 2nd 3 bytes = Unique LAN identifier - uniquely identifies the network adapter within the vendor/manufacturer.
      • The switching process
        • The switch receives a communication frame from a network device connected to one of the switch and adds the Media Access Control address of the network device to a database (MAC Table or CAM Table).
        • The switch inspects the MAC Table for a device connected to a switch port with the matching destination MAC address in the received frame and forwards the data tothe appropriate network device.
      • Switch Characteristics
        • Port Speeds
          • Ethernet = 10 Mbps (10Base)
          • Fast Ethernet = 100 Mbps (100Base)
          • Gigabit Ethernet = 1000 Mbps/1 Gbps (1000Base)
        • Transmission Types
          • Half Duplex - A link that can only communicate in a single direction at a time.
          • Full Duplex - A link that performs simultaneous two-way communications
        • Port Security
          • DHCP Snooping - a technique that controls which ports are allowed to receive DHCP messages.
          • ARP Inspection - a technique that rejects malicious ARP packets
          • Flood Gaurd - a technique that prevents Denial-of-Service (DoS) attacks using malicious broadcast messages.
        • VLANs
          • Allows for the logical division or grouping of a subnet of the network devices connected to the switch.
      • Physical vs. Virtual Switches
        • Physical switch - a tangible hardware connectivity device.
        • Virtual switch - a software-based application/element used in virtualization technologies.
      • Layer 2 vs. Layer 3 switch
        • Layer 2 - A switch that operates in the Data-link layer (L2) of the OSI model
        • Layer 3 - A switch that is capable of using IP addresses, operating on the Network layer (L3) of the OSI model.

C# Bootcamp (Udemy)
50 Vues · 2 années depuis

Part 43 of C# .NET Bootcamp: Implicit Typing in C# (using var Keyword)

Introduction to Computer (Udemy)
68 Vues · 6 mois depuis

Module 5 Part ⁣2: Network Architecture and Protocols

From water fountains to self-playing musical instruments, the Golden Age saw an astounding amount of ingenuity. Take a look at a few of the era's most interesting and delightful inventions and automations, and then examine the life and work of al-Jazari, who today is considered the father of robotics.""

From 700 to 500 B.C., thinkers around the world began to turn to fundamental philosophical questions. This lecture focuses on those whose concerns addressed this world and its pragmatic issues through rational inquiry, including Confucius, the Legalists, and the Greek philosophers known as the Ionian Rationalists.

Understanding Japan A Cultural History
29 Vues · 5 mois depuis

How did the decline of the court and the rise of the warrior class shape the evolution of Buddhist aesthetic, spiritual, and philosophical concepts? Find out in this illuminating lecture, which covers the massive growth of Pure Land Buddhism (the dominant form in Japan today) and the two main schools of Zen Buddhism.

Dion Training CompTIA IT Fundamentals+
41 Vues · 6 mois depuis

⁣⁣⁣CompTIA IT Fundamentals+ Course | Module 20 Part 2

C# Bootcamp (Udemy)
78 Vues · 2 années depuis

Part 19 of C# .NET Bootcamp: ⁣C# .NET Value Types

Dion Training CompTIA IT Fundamentals+
49 Vues · 6 mois depuis

⁣⁣⁣CompTIA IT Fundamentals+ Course | Module 7 Part 9: Domain Name System (DNS)

C# Bootcamp (Udemy)
85 Vues · 2 années depuis

Part 27 of C# .NET Bootcamp: Conditionals using Switch Statement

Dion Training CompTIA IT Fundamentals+
41 Vues · 6 mois depuis

⁣⁣⁣CompTIA IT Fundamentals+ Course | Module 9 Part 9: Google Android

Understanding Japan A Cultural History
42 Vues · 5 mois depuis

Take a fresh approach to the story of early 20th-century Japan. Rather than a review of major events, focus instead on the ideologies of three individuals whose competing views shaped Japan's actions on the eve of World War II: Nitobe Inazō and Shidehara Kijūrō, both proponents of democracy and international cooperation; and Ishiwara Kanji, a die-hard militarist.




Showing 4 out of 18