background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "Formation ICND 1 : Chapitre 2 - 8. Ethernet"

input logo icon
Cover of audio
Please wait. We're preparing links for easy ad-free video watching and downloading.
console placeholder icon
Video tags
|

Video tags

icnd1
ccna1
ccna2
cisco
ccna3
ccna4
certification
cour
formation
comment
ccna
ccnp
protocole
protocol
routage
switching
switch
routeur
router
commutateur
configurer
configuration
installer
installation
tutorial
IP
MAC
adresse MAC
adress MAC
présentation
introduction
ospf
rip
vlan
eigrp
stp
spanning tree
vtp
réseau
topologie
tcp
udp
ethernet
IOS
DHCP
NAT
PAT
ACL
NTP
trunk
native
voice
portfast
fast
HSRP
BGP
IGP
route
SNMP
WAN
LAN
PPP
HDLC
VPN
Frame
Relay
icnd
français
IT Learning
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:04
hello everyone so today we will be
00:00:06
able to move on to a slightly
00:00:08
more concrete subject we will finally be interested
00:00:09
in the protocols themselves
00:00:11
after the theory so we will start
00:00:13
at the bottom the layer of layers of the
00:00:16
model also with ethernet and we will then move on
00:00:20
to the ipo tcp and the eu of the countries
00:00:23
so we will see in this video
00:00:24
a quick presentation of the
00:00:26
ethernet protocol the addressing of the fathers therefore the
00:00:29
mac addresses their structure the
00:00:32
media access algorithm and finally
00:00:35
the structure of ethernet trams
00:00:38
so first of all what is
00:00:40
the ethernet protocol
00:00:42
so it is a network protocol made for
00:00:45
lan so it implements the physical layer one
00:00:47
of the oaci model so we can
00:00:52
have internet on cable networks
00:00:54
also of course coaxial twisted pairs
00:00:57
as baseband optical fiber
00:00:59
of course therefore as
00:01:02
opposed to broadband type ADSL
00:01:04
so that is why we use
00:01:05
moreover in the years however it
00:01:08
does not apply not to the cpl which has its
00:01:11
own in body so that for everything
00:01:14
which is really cable and gold cpl and adsl
00:01:17
etc and then it also implements
00:01:20
the link layer of the oaci model
00:01:23
therefore which will allow communication
00:01:25
between two loses so we will have here
00:01:29
the definition of a mac address etc.
00:01:32
generally when we talk about the internet
00:01:34
in the different layers of the
00:01:36
model also we will say that it is a
00:01:38
protocol of layers even if it
00:01:39
implements the layer so it is defined
00:01:44
by the standard ieee 3e 802.3 so it is a
00:01:50
standard which is used by
00:01:52
everyone today and it is
00:01:54
also a standard which is part
00:01:56
of the 802 family of network standards
00:01:58
as its name indicates which defines
00:02:01
almost everything we use on the
00:02:03
network today
00:02:06
and another protocol that you
00:02:07
know from the same layer
00:02:10
you probably know so it's wifi so
00:02:13
wifi allows us to do the same
00:02:15
thing but on the other hand for
00:02:18
wireless networks so it will be the
00:02:20
802.11 standard it is a different protocol it
00:02:24
is almost identical to the internet
00:02:26
concerning the season layer so we
00:02:28
also have the question of mac addresses etc
00:02:29
but of course there are some additions
00:02:32
compared to the specificities of wireless
00:02:35
such as for example the network identifier
00:02:37
the pair but the possibility of making
00:02:39
a discovery duration of the different
00:02:41
networks available the association that in
00:02:43
short everything which is not linked a simple
00:02:45
connection of line with the terres-net
00:02:48
we simply connect our cable
00:02:51
like that we are connected to the network
00:02:52
to which we are connected if we have
00:02:54
several cables available its
00:02:55
ducal connections where you do that no
00:02:57
need to integrate with a protocol
00:02:58
whereas with low wifi we have several
00:03:01
networks available on the airwaves
00:03:04
around us and we must be able to
00:03:05
characterize these networks to connect to them,
00:03:08
hence the network identifier the possibility of
00:03:10
discovering the different networks
00:03:11
available the association therefore the fact of connecting
00:03:14
the wifi cable in quotes to
00:03:15
make an analogy with the internet etc.
00:03:18
so let's return to our ethernet protocol
00:03:21
this subject is also applicable for
00:03:24
wifi so the addressing of the fathers so
00:03:27
to have an addressing in the layer
00:03:29
of new bikes and if we are going to use
00:03:31
the mac address therefore media access paint
00:03:34
so it is a sub-layer of the
00:03:37
link layer which is used as well by
00:03:39
the internet as the wifi the bluetooth the
00:03:42
tm the token ring music big c
00:03:43
it is really an extremely
00:03:45
widespread model generally when we talk
00:03:47
today about the drees says physical
00:03:52
any address of ten thousand houses
00:03:53
should we say but generally ten
00:03:55
physical addresses
00:03:56
we are talking about the identifier which
00:03:58
allows us to identify another
00:04:01
ethernet wifi bluetooth card etc
00:04:05
then above we will have
00:04:07
the identification of our machine for
00:04:10
the network layer so there it will be
00:04:12
the ip address we will talk about it later and at
00:04:15
great length in the chapter on
00:04:16
so if if the mac address it is an
00:04:20
address which stored on the card where
00:04:22
the network interface
00:04:23
we thought that a priori it is
00:04:25
supposed to be unique for each card
00:04:27
in any case it is supposed to
00:04:30
clearly identify a card in fact on
00:04:32
many cards thanks to certain
00:04:33
regions we can modify this attack
00:04:35
so many start from the principle that
00:04:38
this mac address makes it possible to identify
00:04:40
a machine we will therefore be able to
00:04:43
perfectly, for example, filter access
00:04:45
to a network in relation to Mac addresses,
00:04:47
this is what we often do on wifi,
00:04:48
you must have already had the leather on your box
00:04:50
to say, this machine allows us to
00:04:53
access to the network in fact
00:04:54
given that we can modify
00:04:56
the mac address of the interface a
00:04:58
malicious user very
00:05:02
well wants to give the mac address of another
00:05:05
authorized on your network to his own
00:05:07
card and thus integrate the network
00:05:09
generally this will still be
00:05:11
something that few people
00:05:12
will be able to do on a daily basis
00:05:15
so to use these mac addresses in
00:05:20
fact we will have a real source and
00:05:22
the destination address in the
00:05:24
ethernet trams we will see it later
00:05:27
so this address is coded on 48 or
00:05:30
6 oct and which we will generally
00:05:32
represented in hexadecimal form we will
00:05:34
separate each of the two
00:05:37
hexadecimal digits adopted represented by two
00:05:39
exact decimal digits by double
00:05:42
points so in our example here for
00:05:44
example 5e ff 56 etc
00:05:46
we have here the first in tc 5e the second
00:05:50
mode tff etc etc
00:05:51
sometimes we can see them represented
00:05:54
separated by shots and will be a
00:05:56
little rarer
00:05:58
so then the structure of a
00:06:01
mac address for the erm a little longer
00:06:02
how our address is made up mac
00:06:04
so the mac address I wanted to say to
00:06:07
the echo of the bit reprieves
00:06:08
there are in fact two groups of three
00:06:10
bits the first group end of group of
00:06:14
3 oct and sorry 6 oct and groups of 3
00:06:17
oct and therefore
00:06:19
the first group from October 3 and and a
00:06:23
group reserved for the different
00:06:26
manufacturers so in fact if you
00:06:28
study the mac address which is
00:06:30
provided to you for internet eternity you
00:06:32
can in theory know from which
00:06:34
manufacturer this ethernet card
00:06:36
comes from where this bluetooth wifi card and it was
00:06:38
done as I tell you we can
00:06:40
modify this so that a few for
00:06:42
certain cards so in fact you
00:06:44
should not completely trust it
00:06:47
douk in its first three bytes we have
00:06:52
in fact
00:06:53
the 1st oct is therefore composed of eight which
00:06:57
will allow us to have a
00:06:58
particular meaning in relation to
00:07:01
these last two bits so we would
00:07:03
quickly one and the beats bit
00:07:05
1 it will allow us we will call it
00:07:07
the iger bit it will allow us to
00:07:10
determine if the address mac is a
00:07:11
nicast address so to address
00:07:14
a card in particular so your
00:07:18
wifi ethernet card etc which is classified 6th
00:07:20
but at the value zero so our first
00:07:23
byte will therefore have a value
00:07:26
loses therefore father in hexadecimal that
00:07:29
means even numbers decimals plus in
00:07:33
seoul
00:07:35
this beat if it takes the value 1 we are
00:07:37
in fact addressing the multicast of the
00:07:39
broadcast so it will be in fact
00:07:41
to say we communicate with
00:07:43
any machine that we send this
00:07:44
information for any father
00:07:47
so here we will have our first byte a
00:07:49
father also bdf given that in and
00:07:53
in hexadecimal then the be2 called
00:07:56
bits ul so for unicast sorry for
00:08:00
ionic and local y so it will be able
00:08:02
to have as value zero point this is
00:08:05
normal we are in of binary 0 it will be
00:08:07
to indicate that it is a
00:08:09
universal address therefore an address which
00:08:11
conforms to the format 2 established by the
00:08:14
standard of beds 3e and 6.7
00:08:17
this beat had a value of 1 it is for
00:08:20
them in fact indicating a local address
00:08:24
therefore used a priori yes it is then
00:08:28
the last e3 byte define the
00:08:30
unique address of your machine in relation to the
00:08:33
manufacturers
00:08:34
3 first byte the manufacturer
00:08:36
last three opted indicates the address of this
00:08:40
card so that this address is unique
00:08:44
therefore like this we will be able to differentiate the
00:08:46
different network cards of the same
00:08:48
manufacturer
00:08:50
then concerning access to the media
00:08:54
so how the internet will define access
00:08:56
to the media in fact it will be
00:08:59
defined by the protocol csm has given in so
00:09:03
ccsm ac dc for 400 multiple access wyss
00:09:08
college section so let's first talk
00:09:10
about the first part the csm has
00:09:13
so he is the one who will define
00:09:16
the multiple access with listening to the
00:09:18
carrier so he will listen to the media
00:09:20
to check that no authorization
00:09:23
transmits data on it if it receives
00:09:24
a signal
00:09:25
it will not go to transmit
00:09:28
information so if there is no
00:09:31
signal on the media and only if
00:09:34
there is no signal it will be able to transmit
00:09:36
so like that thanks to already the
00:09:39
first seven parts of the algorithm that we
00:09:40
avoid collisions
00:09:41
I will have I remind you a collision is
00:09:44
when two signals meet on the
00:09:46
same media as a result of which they are superimposed and
00:09:49
modified which deletes the information
00:09:52
which was supposed to be be sent by these
00:09:53
two different signs in
00:09:57
fact this part of the algorithm is
00:09:59
not enough to completely avoid collisions
00:10:02
given that there can be a
00:10:04
latency on our media the profession at a
00:10:05
certain length therefore when we send
00:10:07
a signal to one end
00:10:10
the moment we send it it may not
00:10:12
be detected at the other end
00:10:14
so we are going to set up a
00:10:16
hill collision detection
00:10:18
so that is the second part the cd
00:10:19
yes what the young detection which
00:10:22
will detect if there has been a collision
00:10:25
and if there has been a collision will send the
00:10:27
same message
00:10:29
after a random delay so I
00:10:32
synthesized this via a small
00:10:33
algorithmic diagram a little agony g
00:10:35
on your right so we start the
00:10:39
procedure for sending messages
00:10:41
we will listen to the media 6 signal beds
00:10:45
we carry out a random wait and we
00:10:47
will listen to the media again if there is no
00:10:49
signal and only if it does not have signal
00:10:51
we will be able to transmit
00:10:52
if after transmission there was a collision
00:10:55
during transmission it is a
00:10:57
collision when it has this means that the
00:10:59
message has not reached its
00:11:00
recipient that it will be necessary to
00:11:02
wait again for a certain time
00:11:04
this wait is also random
00:11:06
and start the procedure again from the
00:11:09
beginning so listen to see if there is a
00:11:10
signal etc. and we will repeat our
00:11:13
operations until we have been able to
00:11:14
transmit our signal if there is no
00:11:17
signal on the media so we were able to
00:11:21
transmit and there was no
00:11:22
collision
00:11:23
in this case the signal could well have been
00:11:26
forgotten this is the end of our sending operation
00:11:28
so all this will allow us to share
00:11:31
the same media between two pairs there is
00:11:33
no token system or priority
00:11:36
of missions only this algorithm makes it possible
00:11:38
to avoid collisions
00:11:41
at least to act accordingly then
00:11:43
the question of trams so I recall
00:11:45
a model also the tram is the pd eu
00:11:48
of the link layer protocol data unit
00:11:50
therefore the element which will be sent on the
00:11:53
link layer therefore this frame defined
00:11:57
but understood a header a body and a
00:11:59
foot in the header we will have the
00:12:02
destination mac address and the mac address
00:12:03
sources so the mac address of the
00:12:06
recipient of the message recipient of
00:12:08
the frame and the mac address of the one who
00:12:10
sent it from the sender then we have a
00:12:13
third chance and the land size
00:12:14
so the hype pies that's what will
00:12:17
allow us to define the
00:12:19
higher layer protocol which was used
00:12:21
so the packet
00:12:24
is the type of the packet the protocol
00:12:25
of the packet which was encapsulated in the
00:12:28
body of our tram so an example the
00:12:33
0800 so it is the exam will
00:12:36
allow us to say it is IPv4
00:12:38
internet protocol version 4
00:12:40
we will see later which has been
00:12:42
encapsulated in our train I have
00:12:44
given you a small clickable link here to
00:12:46
consult a fairly complete list
00:12:48
of codes corresponding to the different
00:12:50
protocols which we can use on the
00:12:52
upper layer, therefore the network layer,
00:12:55
so we have taken a look at our
00:12:58
ethernet protocol,
00:12:59
we have seen in this video the
00:13:01
most common link protocol
00:13:03
ethernet, a small note in passing where
00:13:06
the word ethernet comes from, ethernet is quite
00:13:09
simply it comes from the word and r so the
00:13:11
lands is the theoretical space between quotes
00:13:15
in which we send our
00:13:17
information at the level of the layer
00:13:19
read a little bit of the history of the
00:13:20
thing so that allowed us to see
00:13:23
the physical addressing
00:13:24
mc which allows us to go a
00:13:26
little further than the internet
00:13:28
the csm has given up therefore access to the media
00:13:32
the algorithm of access to the media
00:13:34
uses the internet and finally the structure
00:13:37
of an eternal frame so this concludes
00:13:39
our presentation of the ethernet protocol
00:13:41
and we will be able to
00:13:43
move directly to the higher layers with the
00:13:45
ip protocol in its versions 4 and 6, which
00:13:48
we will further deepen in
00:13:50
the following chapters, see you immediately
00:13:51
for the free presentation

Description:

On this page you can download the media «Formation ICND 1 : Chapitre 2 - 8. Ethernet» highest quality possible WITHOUT any restrictions on the number of downloads or download speed.

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "Formation ICND 1 : Chapitre 2 - 8. Ethernet" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "Formation ICND 1 : Chapitre 2 - 8. Ethernet" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "Formation ICND 1 : Chapitre 2 - 8. Ethernet" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "Formation ICND 1 : Chapitre 2 - 8. Ethernet" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "Formation ICND 1 : Chapitre 2 - 8. Ethernet"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "Formation ICND 1 : Chapitre 2 - 8. Ethernet"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.