Time
10 hours 41 minutes
Difficulty
Beginner
CEU/CPE
12

Video Transcription

00:05
so, Hobbs, you don't see helps around much anymore. They were the predecessor
00:09
to switch it.
00:12
They operate on the second layer
00:17
the same device. If using a start apology, it basically functions. Repeater switches You have dedicated band with each port, but Hub one, bam one Bandwidth was shared between all the ports, so foreign port was using more bandwidth in the other.
00:32
Too bad it, you'd see decreased performance. You could also see everyone else's traffic. There's no segregation of the traffic at all, so it was easy to pack it. Smith Packet sniff All traffic going across Hub
00:47
It's the weakest of all. The securities
00:54
Bridges are like dumb routers. They could be used to connect networks together. Two different networks.
01:03
You can do bridges and a good example of a bridge. You can do a bridge on say you into a software based bridge on your Windows machine. So if you have a
01:15
you have a wireless nick or you have a
01:19
you have a VPN connection or wire. You have wireless Nick that's talking out to the hotel Internet, and then you have your internal,
01:26
uh, wire Nick talking to a different network
01:30
plug into a switch, say to a different network. You could bridge those two connections
01:36
through the software and window. So then everyone on your
01:40
on your little subject you've just created can go bridge through your laptop to get out to the WiFi network. And they could be in there two different networks with two different I p schemes. And it's creating a bridge between the two.
01:51
So there's hardware device that do that, too, but they don't do any of the other stuff like a router does, like
01:55
port filtering
01:59
or static routes or dynamic routes.
02:05
Modems they operate where one,
02:07
ah, the physical layer. Because modems they're like next. So their way of getting data
02:15
transporting data. So modem very popular. Before, we had
02:19
fast Internet and our homes,
02:21
usually a dial up over a telephone line,
02:23
basically converts digital analog and then back again.
02:30
We used access network remotely.
02:34
They have very little security to him. They don't do compression.
02:37
I mean, they don't do encryption
02:40
most of time. The best you'll see is the user password check, username, password.
02:46
You could also check the caller I d to make sure it's coming from an I P. It's coming from telephone number that is allowed to call in
02:53
to your
02:54
network.
02:58
Or you could use a call back where the moon will call a predetermined number. After Jozic successfully authenticates
03:07
Switch was mentioned switches quite a bit. Here they operate layer to or layer three. If they're smart, switch.
03:15
What kind of a hobby combination of ah ha been a bridge?
03:20
A lot smarter than a hub,
03:23
and they have higher performance in a bridge. They can use what's called V lands or virtual local area Networks will talk about that in a second,
03:30
where we can segregated network logically
03:32
on one switch as opposed to multiple switches.
03:38
The support port security. So we could say only a PC or a nick with this Mac address can operate on this poor
03:47
so people can't just go plug in any PC into your switch and get access. The network. We can check with the Mac addresses, and if it's not in authorized Mac address,
03:55
it will not be allowed to
03:58
continue.
04:02
A Layer three switches or a smart switch also is allowed to make wrong decisions,
04:08
so you could say traffic and go to
04:10
one network has post the other
04:13
your basic switch wouldn't do. That
04:17
switches into traffic management where they learned where hosts around them by maintaining a Mac address to physical port pairing.
04:25
This is called art or dress resolution protocol.
04:30
So it takes the grabs, the Mac address off the front of the header off the packet when I first tried to communicate on the network and use that to map it to which port it's coming from.
04:41
And that's how it knows where to send traffic.
04:45
All these all these translations
04:47
are kept on what's called the content addressable memory table.
04:53
This contains the art data,
04:59
but inherently they're not security devices
05:03
the lands.
05:05
So we have physical switches that we can use to separate combined computers together. And these switches would usually talk to a router, and they would all be on the same network.
05:16
Now, if you want to be all run multiple networks on the same switch we can use was called Villains and weaken segregate certain ports off into separate networks.
05:26
So even though we have eight p sees on the same switch,
05:30
we can make it so that
05:31
those eight PCs can't see each other because they're on separate networks logically,
05:36
you know, they're plugged into the same physical switch
05:48
switches Port port. Marrying this is goes back to like. So with the hub,
05:53
all traffic is broadcasted. All ports were not using heart. We're not using our We're not doing that translation of which Mac address comes from which port, So we don't know where it's in data to. So that made it really easy to watch all traffic going across that hub.
06:06
And that's very bad from less user. But if you're doing it as a system administrator, where you want to be able to do security filtering our analysis on all the traffic going across the switch, you can set up what's called port marrying,
06:19
where it will watch all the data going across any switches you put in that port marrying group and you can watch you can do analysis on it.
06:29
So it makes a mirror of all the traffic going through
06:32
very similar dial hub usedto work. I mean, it's not something you want to leave on all the time. There's a performance hit, but
06:41
power Efren Ethernet a lot the higher and switches that you'd see in a corporate environment a lot of them support. It's called Party Over Ethernet,
06:51
which allows you to power devices through these in that cable.
06:57
So
06:58
you start seeing that with stuff like voice right P phones. So instead of having a separate plug,
07:04
you can just plug it into
07:05
a Cat five or standard network cable and now provide power.
07:12
Also, uh, another common uses I p surveillance equipment.
07:15
Sarah, you don't have to worry about running electricity to the side of the house
07:19
where you wanna plug in your camera because it can receive its power over the Ethernet cable very similar to how phones
07:28
worked. You never had to plug in your phone unless you had a lot of extra features on it. And a lot of us don't have landlines anymore, but it's a small amount of voltage enough to power the phone.
07:36
It's the same concept with par or Ethernet.
07:44
The standards at the fine. How power either networks.
07:47
You need to have at least Category five cable for
07:51
for most devices like voice right P phone
07:55
but can function over Category three and a lot lower rate.
07:58
Category three Cable is the same kind of cable that you use for your telephone
08:05
significantly skinnier
08:07
that a network cable
08:11
firewalls are secure device that control traffic entering or leaving a network. So we have all our traffic. Finally, goto one point to get out the Internet
08:20
so we could put a firewall there, which could monitor for malicious activity,
08:24
filter out most activity or control. What kind of activity won't allow in and out of the network?
08:31
This is the more commonplace that you'd see
08:33
your port filtering in your access control less the block traffic
08:41
blocking on where it's coming from, where it's going from. What kind of application
08:46
is trying to go through your network? What service if its web of his D. N s,
08:56
another network components network storage is. We have two kinds that we're gonna talk about. A NASA, which the network attached storage.
09:05
Basically a hard drive plugged into a network that you can use to save files, too,
09:09
that need to be plugged into a server or anything. It's usually a standalone device with just a network card attached to it that has three or four hard drives in it,
09:18
and then other machines on your network and use it like a window share
09:24
toe access data.
09:26
You want to set up an entire server to share files over the network. You can use a network area a network attached storage
09:33
to as opposed to a sand, which is basically a huge,
09:37
uh,
09:39
storage
09:41
facility, has a lot of hard drives in it, But
09:43
it's all story one place, but you're it's accessible over the network, just like nasty as opposed to it being the entire store space being shared. Your mapping that to an individual user machine.
09:56
So the host thinks he's has his own hard drive when it's really stored in a storage area network that also contains other people's hard drives. It's one big pool of storage that is segmented out
10:09
for specific purposes,
10:11
so a sand will be larger than a nasty
10:15
her network attached storage.
10:20
Now we mentioned voiceover. I appeal of it before,
10:26
with less and less use of regular landlines,
10:31
people are using voice over I P, which allows you to make telephone calls
10:35
using the Internet.
10:37
There's two kinds of voices right piece to consider. There's voice right P where it's only gonna talk to other phones
10:43
that are on voice of right P within your network.
10:46
If you want to talk to regular telephones at some point, needs to talk to a server that's gonna convert that into a standard telephone line and make a call out to a regular phone number so you can have it be an internal only solution where you come in with your own dialing scheme. It doesn't
11:03
days like a huge internal intercom system
11:07
where you can have it interface with what's called pots playing a telephone system where then you can use it as a regular telephone to call out
11:18
runs over a stair network cable sometimes have passed through where you know, instead of having to networking was coming off the wall, you can have the network cable come out of the wall, go into the phone and then from the phone house, another Jack that you can plug into your computer So you kind of daisy chain.
11:31
You don't have to, Jax
11:37
Voice over i p. You can. Still, it provides a live additional functionality that would be hard to implement on your own. In a traditional phone system where you can set your own voice mail, you can have it tied into
11:48
maybe your your enterprise identity solution that would have
11:52
email addresses and other contact information.
11:58
A lot of other niceties. You gonna sign?
12:00
Picture to your identity. So when you call, everyone can see what your picture looks like. Ah, lot more of those. Nice to have that you'd see using a computer.

Up Next