Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,600 --> 00:00:01,350
Well, hi, guys.
2
00:00:01,650 --> 00:00:01,840
Hey.
3
00:00:01,860 --> 00:00:07,230
So in this lesson, we're going to learn some well-known network architectures and by well known, I
4
00:00:07,230 --> 00:00:09,210
mean, you're going to already you've heard about them.
5
00:00:09,990 --> 00:00:10,410
I hope.
6
00:00:10,710 --> 00:00:14,310
I think maybe does matter because after this you will.
7
00:00:16,740 --> 00:00:17,820
So networks, right?
8
00:00:18,330 --> 00:00:20,220
These are all divided into two groups.
9
00:00:20,820 --> 00:00:23,550
We've got peer to peer and we've got client server.
10
00:00:24,300 --> 00:00:30,000
And this is according to networking principles and communication types of the devices on the network.
11
00:00:31,350 --> 00:00:34,410
So we'll talk about peer to peer network architecture first.
12
00:00:36,240 --> 00:00:41,580
So networks with this type of architecture, all computers have the same rights and structure.
13
00:00:41,880 --> 00:00:46,800
There's no concept of a service unit or host at a workstation or terminal.
14
00:00:47,460 --> 00:00:53,510
Each client on the network has its own hard disk, and users can easily access and communicate with
15
00:00:53,520 --> 00:00:55,530
another other users resources whenever they want.
16
00:00:56,280 --> 00:01:03,510
So in this context, terminals share the data or service like a file or printer or the internet, that
17
00:01:03,510 --> 00:01:04,020
kind of thing.
18
00:01:05,130 --> 00:01:08,550
That they want to make available to the other terminals themselves.
19
00:01:09,480 --> 00:01:13,800
So in other words, all computers in the network can act as both clients and servers.
20
00:01:14,960 --> 00:01:21,560
And these such networks are often used in homes and small businesses that don't really require any centralized
21
00:01:21,560 --> 00:01:22,100
management.
22
00:01:25,610 --> 00:01:28,310
Now there's the client server architecture.
23
00:01:29,260 --> 00:01:29,830
But don't worry.
24
00:01:31,610 --> 00:01:35,690
Because each computer on the network now has a different role.
25
00:01:36,640 --> 00:01:38,920
So these roles can be client and server.
26
00:01:39,550 --> 00:01:42,220
And in this architecture, the server computer is located.
27
00:01:42,490 --> 00:01:49,030
Well, sometimes it just at the very center and is responsible for setting the use of files and resources
28
00:01:49,030 --> 00:01:51,670
and the privileges of all the other users.
29
00:01:52,270 --> 00:01:53,890
Now, in terms of hardware.
30
00:01:54,310 --> 00:01:59,620
Well, it's way bigger and has superior features than the average client computer, right?
31
00:02:00,670 --> 00:02:06,340
In fact, all of the client computers are connected to the server computer and can perform operations
32
00:02:06,340 --> 00:02:09,190
in line with the authorizations given by the server.
33
00:02:10,220 --> 00:02:14,720
And in addition to that, client computers can act independently of the server as well.
34
00:02:14,960 --> 00:02:16,220
But check this out.
35
00:02:16,760 --> 00:02:24,200
They would not be able to access or use any files or resources that this server does not provide and
36
00:02:24,200 --> 00:02:25,070
approve.
37
00:02:26,830 --> 00:02:32,950
All right, so what about internet access that we use on a daily basis, right?
38
00:02:32,980 --> 00:02:34,270
Constantly, some of us.
39
00:02:35,640 --> 00:02:38,820
What is it, though, is it the client server model?
40
00:02:39,570 --> 00:02:40,470
Well, yes, it is.
41
00:02:40,860 --> 00:02:48,630
So the web browser is the client makes web page requests and and a web server sends the requested web
42
00:02:48,630 --> 00:02:49,730
page to the client.
43
00:02:51,240 --> 00:02:55,950
So the client server architecture actually has two different structures in terms of its layout.
44
00:02:56,460 --> 00:02:59,190
We've got two tier and three tier.
45
00:03:00,530 --> 00:03:05,840
Right, so in the two tier model, the client can communicate directly with the server, as the name
46
00:03:05,840 --> 00:03:06,470
suggests.
47
00:03:06,830 --> 00:03:10,700
There are two layers in the architecture of the client and the server layer.
48
00:03:11,820 --> 00:03:19,140
And the model may cause some security vulnerabilities, as well as some performance problems, because
49
00:03:19,140 --> 00:03:20,880
web browsers and web servers.
50
00:03:21,150 --> 00:03:27,000
Well, they'll work in this architecture and right, sometimes you might have heard that there might
51
00:03:27,000 --> 00:03:31,230
be some problems connecting to the internet or what you get back from the internet.
52
00:03:32,270 --> 00:03:33,260
That's why.
53
00:03:34,260 --> 00:03:38,010
They use something called SSL or secure socket layer.
54
00:03:38,730 --> 00:03:42,120
Right, so SSL is used here to avoid security problems.
55
00:03:43,540 --> 00:03:49,120
So, for example, if the server is a database server, the client can retrieve information directly
56
00:03:49,120 --> 00:03:50,800
from this database server.
57
00:03:50,830 --> 00:03:51,130
Yes.
58
00:03:53,180 --> 00:03:58,730
Now in the three tier architecture, there is an intermediate layer between the client and the server.
59
00:03:59,300 --> 00:04:04,550
Now this layer is used to provide security and grant rights and privileges to clients.
60
00:04:05,240 --> 00:04:11,420
So this layer receives all the requests from all the clients and then forwards them to the server after
61
00:04:11,420 --> 00:04:12,320
authentication.
62
00:04:13,310 --> 00:04:18,590
So in the client's request returns from the server, it's been transmitted first to the middle layer
63
00:04:18,590 --> 00:04:20,150
and then to the client.
64
00:04:21,720 --> 00:04:26,040
So here there are three layers the client application and server.
65
00:04:29,200 --> 00:04:31,900
All right, so now let's have a look at the server types.
66
00:04:32,530 --> 00:04:34,450
So we've got a file server, OK?
67
00:04:34,900 --> 00:04:40,840
And it's used to share various folders on the server and perform operations such as who can use the
68
00:04:40,840 --> 00:04:46,890
folders, the file types that can be created here, and whether or not people can read or write.
69
00:04:46,900 --> 00:04:48,430
And these are called permissions.
70
00:04:49,300 --> 00:04:51,970
But its main task is essentially file sharing, right?
71
00:04:52,000 --> 00:04:53,320
That's why it's called a file server.
72
00:04:53,710 --> 00:04:59,020
So apart from sharing, it will also provide central storage services to clients.
73
00:05:01,680 --> 00:05:03,240
And we've got a database server.
74
00:05:04,270 --> 00:05:10,090
So these are the servers that are created to provide database services so clients can use a variety
75
00:05:10,090 --> 00:05:15,340
of SQL statements, depending on the authorization given over the database servers.
76
00:05:15,910 --> 00:05:20,170
For example, there's a SQL server, MySQL or Oracle.
77
00:05:20,380 --> 00:05:22,930
These are some of the most well known database servers.
78
00:05:25,800 --> 00:05:29,130
Now there's another thing called the transaction server.
79
00:05:30,800 --> 00:05:36,620
So the transactions here actually allows using SQL statements, just like in a database server.
80
00:05:37,220 --> 00:05:43,970
But it's kind of different because it allows multiple SQL statements to be run on the server in batches.
81
00:05:45,160 --> 00:05:47,530
So it basically works with all or nothing logic.
82
00:05:48,070 --> 00:05:54,520
In other words, if one of the SQL statements encounters an error, the changes made by the running
83
00:05:54,520 --> 00:05:56,770
ask you, well, statements are reversed.
84
00:05:57,860 --> 00:06:04,640
So, for example, when transferring money between two accounts, there are two school statements deducting
85
00:06:04,640 --> 00:06:08,390
from the account and adding to the other account.
86
00:06:09,830 --> 00:06:13,970
If there's a problem with one of them, there's going to be a lot of money in the accounts.
87
00:06:15,100 --> 00:06:21,370
So transaction servers avoid such problems and reflects results to the accounts.
88
00:06:21,610 --> 00:06:23,770
If both SQL statements work.
89
00:06:24,130 --> 00:06:26,200
Otherwise, it just cancels both of them.
90
00:06:28,630 --> 00:06:34,900
Web server, so this is responsible for storing the Web pages on the internet and sending these pages
91
00:06:34,900 --> 00:06:39,370
to the requesting users and making everybody happy with cat videos and things.
92
00:06:41,100 --> 00:06:47,570
So moving right along, we've got a proxy server, so a proxy server is used during internet access,
93
00:06:47,580 --> 00:06:51,300
the computer that will access the internet access is through the proxy server.
94
00:06:51,930 --> 00:06:57,870
That's a heavily visited page is cached by the proxy server, increasing the access speed by sending
95
00:06:57,870 --> 00:07:00,930
it to the web page from a cache of the requesting computer.
96
00:07:01,960 --> 00:07:08,290
Now, in addition to all of that, it can prevent users from accessing the page by banning the pages
97
00:07:08,290 --> 00:07:14,320
to be accessed, or it can send the requesting computer after cleaning the inappropriate parts of the
98
00:07:14,320 --> 00:07:16,900
pages containing the inappropriate content.
99
00:07:18,120 --> 00:07:22,170
So proxy servers can actually clean infected files automatically.
100
00:07:23,610 --> 00:07:28,740
They also reduce the chances of spreading a virus or malicious program, as no one on the network has
101
00:07:28,740 --> 00:07:30,420
direct access to the internet.
102
00:07:30,600 --> 00:07:30,870
Right.
103
00:07:31,080 --> 00:07:32,520
They're all done through proxy.
104
00:07:35,530 --> 00:07:39,470
So let's take a look and see the types of networks classified geographically.
105
00:07:40,900 --> 00:07:44,500
All right, so we've got a pan, which is a personal area network.
106
00:07:46,230 --> 00:07:51,690
So the personal area network or pan, is a type of network that has been used in recent years, it covers
107
00:07:51,690 --> 00:07:58,620
an average area of maybe 10 meters, but under ideal conditions it can actually reach up to 100 meters.
108
00:07:59,400 --> 00:08:02,280
It's a type of network that's created by mobile devices.
109
00:08:03,060 --> 00:08:08,130
So a pen can be used to connect mobile devices to each other, as well as to connect to the internet
110
00:08:08,130 --> 00:08:09,750
or share the internet, you know?
111
00:08:10,700 --> 00:08:18,080
So wired pans can also be set up by connecting to a computer with the device's USB or FireWire ports,
112
00:08:18,080 --> 00:08:24,920
or even wirelessly using network technology such as IATA, Bluetooth, Wireless, Z-Wave, Zigbee,
113
00:08:24,920 --> 00:08:25,700
these kinds of things.
114
00:08:28,210 --> 00:08:30,640
A land or local area network?
115
00:08:31,730 --> 00:08:38,720
Is it type of network created for the communication and sharing of resources of devices in a small geographical
116
00:08:38,720 --> 00:08:43,460
areas, such as a home, school and office or workplace, whatever?
117
00:08:44,330 --> 00:08:47,390
So the speed in the network can actually reach gigabit level?
118
00:08:48,570 --> 00:08:52,290
Twisted pair of cables, coaxial cables and fiber optic cables.
119
00:08:52,620 --> 00:08:54,630
These were all used when creating land.
120
00:08:55,470 --> 00:08:58,440
There's also bus ring, star and mesh.
121
00:08:58,800 --> 00:09:00,180
These are topologies.
122
00:09:01,220 --> 00:09:07,700
And today, lands are usually formed as a star topology with twisted pair cables.
123
00:09:09,800 --> 00:09:16,070
Now we've also got a man, but don't be confused because this is the metropolitan area network.
124
00:09:17,500 --> 00:09:21,790
So it covers a larger area geographically than a typical land.
125
00:09:22,510 --> 00:09:29,740
It's also known as a campus network, so it can be used on university campuses and very large workplaces.
126
00:09:30,580 --> 00:09:36,280
Networks created by enterprises spread across the country are also included in this class.
127
00:09:37,150 --> 00:09:44,110
It's in fact often used to interconnect lands using fiber optic cable and high capacity backbone technology.
128
00:09:45,430 --> 00:09:50,100
So an example of this would be intranet if you've heard of intranet.
129
00:09:51,250 --> 00:09:58,420
Now, while the backbone of a man application can be provided by using one or two cables, modems are
130
00:09:58,420 --> 00:09:59,950
actually widely used today.
131
00:10:01,580 --> 00:10:05,180
And then we've got our wide area network or when.
132
00:10:06,750 --> 00:10:14,250
So this is a type of network that is created by local networks at very far distances, so geographically
133
00:10:14,250 --> 00:10:16,710
it's larger than a land and a man.
134
00:10:17,860 --> 00:10:21,730
It actually can be a country or worldwide network.
135
00:10:22,660 --> 00:10:27,940
The Inter Network connection can be made with fiber optic cable or with the help of satellites.
136
00:10:28,810 --> 00:10:32,560
And although different from lens router devices are used in these networks.
137
00:10:33,720 --> 00:10:39,180
So the most well-known when you've probably heard of it, too, we call it the internet.
138
00:10:42,390 --> 00:10:43,730
Then we come to VPNs.
139
00:10:43,760 --> 00:10:46,460
Now this is a virtual private network.
140
00:10:46,910 --> 00:10:54,260
And this is something that probably is in everybody's email box or advertisement portfolio because everybody's
141
00:10:54,260 --> 00:10:57,290
getting ads for the newest VPN.
142
00:10:58,850 --> 00:11:00,200
But I'll explain to you what it is.
143
00:11:01,150 --> 00:11:03,730
It's the lowest cost when creation method.
144
00:11:04,750 --> 00:11:05,080
Right.
145
00:11:05,200 --> 00:11:11,500
Because it's a virtual network that's created to provide encrypted and secure access to the networks
146
00:11:11,860 --> 00:11:14,770
within an organization over the internet.
147
00:11:15,400 --> 00:11:18,190
And it basically works as if it's part of the network.
148
00:11:19,640 --> 00:11:26,510
So the same can be done with leased lines, but VPN is very low cost and easy to configure because the
149
00:11:26,510 --> 00:11:27,680
VPN is virtual.
150
00:11:28,220 --> 00:11:35,090
Multiple VPN users can use the network at the same time, and since the traffic on the VPN has provided
151
00:11:35,810 --> 00:11:42,950
over the internet, security measures such as encryption, data verification and authorization can also
152
00:11:42,950 --> 00:11:44,930
be taken for security purposes.
153
00:11:46,270 --> 00:11:52,810
So VPN is set up to provide a confidential and private information flow between neighboring networks,
154
00:11:53,680 --> 00:11:59,800
even if the package go over the internet, you see, even if they are listened to thanks to the security
155
00:11:59,800 --> 00:12:05,860
measures used, the person attacking the encrypted packets cannot make sense of the information that
156
00:12:05,860 --> 00:12:07,540
they could harvest.
157
00:12:09,820 --> 00:12:13,430
So that means that VPN is actually divided into two.
158
00:12:13,720 --> 00:12:16,060
According to the purpose of its use.
159
00:12:16,900 --> 00:12:22,390
So these are remote access VPNs and site to site VPNs.
160
00:12:23,990 --> 00:12:32,360
So we'll talk about remote access VPNs, because these will allow the networks to join the roaming corporate
161
00:12:32,360 --> 00:12:33,950
network from anywhere.
162
00:12:34,040 --> 00:12:34,340
Right?
163
00:12:34,460 --> 00:12:36,320
Remote Access VPN.
164
00:12:37,770 --> 00:12:41,640
Or it can be used for different offices of companies to communicate with the center.
165
00:12:43,670 --> 00:12:45,350
Now we've got site to site VPN.
166
00:12:46,630 --> 00:12:53,560
Site to site VPN is used to enable different companies to communicate over VPN and to enable different
167
00:12:53,560 --> 00:12:57,580
offices of the company to communicate with its center office.
168
00:12:58,480 --> 00:13:08,290
So the difference between remote access VPN and site site VPN is there's a VPN server between two points
169
00:13:08,290 --> 00:13:11,320
that perform the VPN operation.
170
00:14:06,410 --> 00:14:07,310
What about can?
171
00:14:07,940 --> 00:14:11,510
Yeah, there's a can it's called Controller Area Network.
172
00:14:13,440 --> 00:14:19,980
So it's a serial network technology that was developed by Bosch in the mid-1980s for use in automotive
173
00:14:19,980 --> 00:14:20,640
automation.
174
00:14:21,620 --> 00:14:27,170
Although it was developed, especially in vehicles, it has found its use in many branches of the industry.
175
00:14:27,590 --> 00:14:33,560
So its purpose is actually to make cars safer and to save fuel because they can also make them lighter
176
00:14:33,740 --> 00:14:34,670
and quicker.
177
00:14:36,200 --> 00:14:42,710
So Can is essentially a system for automobile systems that works on the principle that the electronic
178
00:14:42,710 --> 00:14:49,430
elements in the vehicles will send data to a single central executive element over a serial path.
179
00:14:50,120 --> 00:14:57,320
For example, it enables systems such as the ABS and the ACR that need to be answered in a really short
180
00:14:57,320 --> 00:15:00,230
period of time to be managed from a single center.
181
00:15:01,920 --> 00:15:08,730
Can eliminate the crowd cabling structure, thanks to the bus structure and twisted pair cable it uses.
182
00:15:09,630 --> 00:15:16,980
Although bus is the most commonly used topology in the Khan network, structure star and ring topology
183
00:15:17,010 --> 00:15:17,880
can also be used.
184
00:15:20,160 --> 00:15:27,390
Now, don't get that confused with Cam as the abbreviation for a campus area network.
185
00:15:28,080 --> 00:15:32,220
This naming refers to the network that universities create within themselves.
186
00:15:35,050 --> 00:15:36,280
So let's talk about the sand.
187
00:15:36,400 --> 00:15:39,700
It's also known as a storage area network.
188
00:15:40,060 --> 00:15:45,760
So it's a type of network that emerged when the storage areas of the servers on the network started
189
00:15:45,760 --> 00:15:47,020
to become insufficient.
190
00:15:47,290 --> 00:15:49,180
Can you believe that too small?
191
00:15:50,610 --> 00:15:56,760
So storage area networks are basically lands used for storing and transmitting large amounts of data.
192
00:15:57,600 --> 00:16:03,120
It provides a fast and reliable connection with fiber optic cable, oftentimes between servers and storage
193
00:16:03,120 --> 00:16:03,570
units.
194
00:16:04,620 --> 00:16:11,160
A storage unit on the network does not belong just to one server, but maybe is even common property
195
00:16:11,160 --> 00:16:12,090
of the entire network.
196
00:16:13,800 --> 00:16:19,980
Although servers do their part as storage media, their capacity can be limited and bottlenecks can
197
00:16:19,980 --> 00:16:23,130
occur when many people try to access the same information.
198
00:16:23,880 --> 00:16:31,440
Therefore, many organizations use peripheral storage device such as tape units, raid disks and optical
199
00:16:31,440 --> 00:16:32,810
storage systems.
200
00:16:33,650 --> 00:16:39,580
He says devices play an active role in backing up data online and storing large amounts of information.
201
00:16:41,160 --> 00:16:47,580
Now, as server sizes and heavy applications increase, the traditional storage strategies mentioned
202
00:16:47,580 --> 00:16:55,050
above are also failing because these peripheral devices are pretty slow to access and and transparent
203
00:16:55,050 --> 00:16:58,950
access to these storage devices may not even be possible for every user.
204
00:16:59,640 --> 00:17:06,570
So sand storage area networks offer faster access to data and more options.
205
00:17:07,920 --> 00:17:14,550
So storage networks can provide high speed direct fibre channel connectivity between each server storage
206
00:17:14,550 --> 00:17:17,310
system, as well as a tape backup library.
207
00:17:18,550 --> 00:17:25,360
So this means that the local network will no longer be used to move data in the backup and restore process.
208
00:17:26,380 --> 00:17:31,420
You see how that would be improving performance for those services and users on the local network.
209
00:17:33,830 --> 00:17:34,820
It's always moving up.
210
00:17:36,430 --> 00:17:42,340
So thanks for hanging in there, guess what, we've got somewhere else to go in the next lesson.
211
00:17:43,210 --> 00:17:43,960
So I'll see you then.
21791
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.