All language subtitles for 9. Well-known Network Architectures Part-1

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,600 --> 00:00:01,350 Well, hi, guys. 2 00:00:01,650 --> 00:00:01,840 Hey. 3 00:00:01,860 --> 00:00:07,230 So in this lesson, we're going to learn some well-known network architectures and by well known, I 4 00:00:07,230 --> 00:00:09,210 mean, you're going to already you've heard about them. 5 00:00:09,990 --> 00:00:10,410 I hope. 6 00:00:10,710 --> 00:00:14,310 I think maybe does matter because after this you will. 7 00:00:16,740 --> 00:00:17,820 So networks, right? 8 00:00:18,330 --> 00:00:20,220 These are all divided into two groups. 9 00:00:20,820 --> 00:00:23,550 We've got peer to peer and we've got client server. 10 00:00:24,300 --> 00:00:30,000 And this is according to networking principles and communication types of the devices on the network. 11 00:00:31,350 --> 00:00:34,410 So we'll talk about peer to peer network architecture first. 12 00:00:36,240 --> 00:00:41,580 So networks with this type of architecture, all computers have the same rights and structure. 13 00:00:41,880 --> 00:00:46,800 There's no concept of a service unit or host at a workstation or terminal. 14 00:00:47,460 --> 00:00:53,510 Each client on the network has its own hard disk, and users can easily access and communicate with 15 00:00:53,520 --> 00:00:55,530 another other users resources whenever they want. 16 00:00:56,280 --> 00:01:03,510 So in this context, terminals share the data or service like a file or printer or the internet, that 17 00:01:03,510 --> 00:01:04,020 kind of thing. 18 00:01:05,130 --> 00:01:08,550 That they want to make available to the other terminals themselves. 19 00:01:09,480 --> 00:01:13,800 So in other words, all computers in the network can act as both clients and servers. 20 00:01:14,960 --> 00:01:21,560 And these such networks are often used in homes and small businesses that don't really require any centralized 21 00:01:21,560 --> 00:01:22,100 management. 22 00:01:25,610 --> 00:01:28,310 Now there's the client server architecture. 23 00:01:29,260 --> 00:01:29,830 But don't worry. 24 00:01:31,610 --> 00:01:35,690 Because each computer on the network now has a different role. 25 00:01:36,640 --> 00:01:38,920 So these roles can be client and server. 26 00:01:39,550 --> 00:01:42,220 And in this architecture, the server computer is located. 27 00:01:42,490 --> 00:01:49,030 Well, sometimes it just at the very center and is responsible for setting the use of files and resources 28 00:01:49,030 --> 00:01:51,670 and the privileges of all the other users. 29 00:01:52,270 --> 00:01:53,890 Now, in terms of hardware. 30 00:01:54,310 --> 00:01:59,620 Well, it's way bigger and has superior features than the average client computer, right? 31 00:02:00,670 --> 00:02:06,340 In fact, all of the client computers are connected to the server computer and can perform operations 32 00:02:06,340 --> 00:02:09,190 in line with the authorizations given by the server. 33 00:02:10,220 --> 00:02:14,720 And in addition to that, client computers can act independently of the server as well. 34 00:02:14,960 --> 00:02:16,220 But check this out. 35 00:02:16,760 --> 00:02:24,200 They would not be able to access or use any files or resources that this server does not provide and 36 00:02:24,200 --> 00:02:25,070 approve. 37 00:02:26,830 --> 00:02:32,950 All right, so what about internet access that we use on a daily basis, right? 38 00:02:32,980 --> 00:02:34,270 Constantly, some of us. 39 00:02:35,640 --> 00:02:38,820 What is it, though, is it the client server model? 40 00:02:39,570 --> 00:02:40,470 Well, yes, it is. 41 00:02:40,860 --> 00:02:48,630 So the web browser is the client makes web page requests and and a web server sends the requested web 42 00:02:48,630 --> 00:02:49,730 page to the client. 43 00:02:51,240 --> 00:02:55,950 So the client server architecture actually has two different structures in terms of its layout. 44 00:02:56,460 --> 00:02:59,190 We've got two tier and three tier. 45 00:03:00,530 --> 00:03:05,840 Right, so in the two tier model, the client can communicate directly with the server, as the name 46 00:03:05,840 --> 00:03:06,470 suggests. 47 00:03:06,830 --> 00:03:10,700 There are two layers in the architecture of the client and the server layer. 48 00:03:11,820 --> 00:03:19,140 And the model may cause some security vulnerabilities, as well as some performance problems, because 49 00:03:19,140 --> 00:03:20,880 web browsers and web servers. 50 00:03:21,150 --> 00:03:27,000 Well, they'll work in this architecture and right, sometimes you might have heard that there might 51 00:03:27,000 --> 00:03:31,230 be some problems connecting to the internet or what you get back from the internet. 52 00:03:32,270 --> 00:03:33,260 That's why. 53 00:03:34,260 --> 00:03:38,010 They use something called SSL or secure socket layer. 54 00:03:38,730 --> 00:03:42,120 Right, so SSL is used here to avoid security problems. 55 00:03:43,540 --> 00:03:49,120 So, for example, if the server is a database server, the client can retrieve information directly 56 00:03:49,120 --> 00:03:50,800 from this database server. 57 00:03:50,830 --> 00:03:51,130 Yes. 58 00:03:53,180 --> 00:03:58,730 Now in the three tier architecture, there is an intermediate layer between the client and the server. 59 00:03:59,300 --> 00:04:04,550 Now this layer is used to provide security and grant rights and privileges to clients. 60 00:04:05,240 --> 00:04:11,420 So this layer receives all the requests from all the clients and then forwards them to the server after 61 00:04:11,420 --> 00:04:12,320 authentication. 62 00:04:13,310 --> 00:04:18,590 So in the client's request returns from the server, it's been transmitted first to the middle layer 63 00:04:18,590 --> 00:04:20,150 and then to the client. 64 00:04:21,720 --> 00:04:26,040 So here there are three layers the client application and server. 65 00:04:29,200 --> 00:04:31,900 All right, so now let's have a look at the server types. 66 00:04:32,530 --> 00:04:34,450 So we've got a file server, OK? 67 00:04:34,900 --> 00:04:40,840 And it's used to share various folders on the server and perform operations such as who can use the 68 00:04:40,840 --> 00:04:46,890 folders, the file types that can be created here, and whether or not people can read or write. 69 00:04:46,900 --> 00:04:48,430 And these are called permissions. 70 00:04:49,300 --> 00:04:51,970 But its main task is essentially file sharing, right? 71 00:04:52,000 --> 00:04:53,320 That's why it's called a file server. 72 00:04:53,710 --> 00:04:59,020 So apart from sharing, it will also provide central storage services to clients. 73 00:05:01,680 --> 00:05:03,240 And we've got a database server. 74 00:05:04,270 --> 00:05:10,090 So these are the servers that are created to provide database services so clients can use a variety 75 00:05:10,090 --> 00:05:15,340 of SQL statements, depending on the authorization given over the database servers. 76 00:05:15,910 --> 00:05:20,170 For example, there's a SQL server, MySQL or Oracle. 77 00:05:20,380 --> 00:05:22,930 These are some of the most well known database servers. 78 00:05:25,800 --> 00:05:29,130 Now there's another thing called the transaction server. 79 00:05:30,800 --> 00:05:36,620 So the transactions here actually allows using SQL statements, just like in a database server. 80 00:05:37,220 --> 00:05:43,970 But it's kind of different because it allows multiple SQL statements to be run on the server in batches. 81 00:05:45,160 --> 00:05:47,530 So it basically works with all or nothing logic. 82 00:05:48,070 --> 00:05:54,520 In other words, if one of the SQL statements encounters an error, the changes made by the running 83 00:05:54,520 --> 00:05:56,770 ask you, well, statements are reversed. 84 00:05:57,860 --> 00:06:04,640 So, for example, when transferring money between two accounts, there are two school statements deducting 85 00:06:04,640 --> 00:06:08,390 from the account and adding to the other account. 86 00:06:09,830 --> 00:06:13,970 If there's a problem with one of them, there's going to be a lot of money in the accounts. 87 00:06:15,100 --> 00:06:21,370 So transaction servers avoid such problems and reflects results to the accounts. 88 00:06:21,610 --> 00:06:23,770 If both SQL statements work. 89 00:06:24,130 --> 00:06:26,200 Otherwise, it just cancels both of them. 90 00:06:28,630 --> 00:06:34,900 Web server, so this is responsible for storing the Web pages on the internet and sending these pages 91 00:06:34,900 --> 00:06:39,370 to the requesting users and making everybody happy with cat videos and things. 92 00:06:41,100 --> 00:06:47,570 So moving right along, we've got a proxy server, so a proxy server is used during internet access, 93 00:06:47,580 --> 00:06:51,300 the computer that will access the internet access is through the proxy server. 94 00:06:51,930 --> 00:06:57,870 That's a heavily visited page is cached by the proxy server, increasing the access speed by sending 95 00:06:57,870 --> 00:07:00,930 it to the web page from a cache of the requesting computer. 96 00:07:01,960 --> 00:07:08,290 Now, in addition to all of that, it can prevent users from accessing the page by banning the pages 97 00:07:08,290 --> 00:07:14,320 to be accessed, or it can send the requesting computer after cleaning the inappropriate parts of the 98 00:07:14,320 --> 00:07:16,900 pages containing the inappropriate content. 99 00:07:18,120 --> 00:07:22,170 So proxy servers can actually clean infected files automatically. 100 00:07:23,610 --> 00:07:28,740 They also reduce the chances of spreading a virus or malicious program, as no one on the network has 101 00:07:28,740 --> 00:07:30,420 direct access to the internet. 102 00:07:30,600 --> 00:07:30,870 Right. 103 00:07:31,080 --> 00:07:32,520 They're all done through proxy. 104 00:07:35,530 --> 00:07:39,470 So let's take a look and see the types of networks classified geographically. 105 00:07:40,900 --> 00:07:44,500 All right, so we've got a pan, which is a personal area network. 106 00:07:46,230 --> 00:07:51,690 So the personal area network or pan, is a type of network that has been used in recent years, it covers 107 00:07:51,690 --> 00:07:58,620 an average area of maybe 10 meters, but under ideal conditions it can actually reach up to 100 meters. 108 00:07:59,400 --> 00:08:02,280 It's a type of network that's created by mobile devices. 109 00:08:03,060 --> 00:08:08,130 So a pen can be used to connect mobile devices to each other, as well as to connect to the internet 110 00:08:08,130 --> 00:08:09,750 or share the internet, you know? 111 00:08:10,700 --> 00:08:18,080 So wired pans can also be set up by connecting to a computer with the device's USB or FireWire ports, 112 00:08:18,080 --> 00:08:24,920 or even wirelessly using network technology such as IATA, Bluetooth, Wireless, Z-Wave, Zigbee, 113 00:08:24,920 --> 00:08:25,700 these kinds of things. 114 00:08:28,210 --> 00:08:30,640 A land or local area network? 115 00:08:31,730 --> 00:08:38,720 Is it type of network created for the communication and sharing of resources of devices in a small geographical 116 00:08:38,720 --> 00:08:43,460 areas, such as a home, school and office or workplace, whatever? 117 00:08:44,330 --> 00:08:47,390 So the speed in the network can actually reach gigabit level? 118 00:08:48,570 --> 00:08:52,290 Twisted pair of cables, coaxial cables and fiber optic cables. 119 00:08:52,620 --> 00:08:54,630 These were all used when creating land. 120 00:08:55,470 --> 00:08:58,440 There's also bus ring, star and mesh. 121 00:08:58,800 --> 00:09:00,180 These are topologies. 122 00:09:01,220 --> 00:09:07,700 And today, lands are usually formed as a star topology with twisted pair cables. 123 00:09:09,800 --> 00:09:16,070 Now we've also got a man, but don't be confused because this is the metropolitan area network. 124 00:09:17,500 --> 00:09:21,790 So it covers a larger area geographically than a typical land. 125 00:09:22,510 --> 00:09:29,740 It's also known as a campus network, so it can be used on university campuses and very large workplaces. 126 00:09:30,580 --> 00:09:36,280 Networks created by enterprises spread across the country are also included in this class. 127 00:09:37,150 --> 00:09:44,110 It's in fact often used to interconnect lands using fiber optic cable and high capacity backbone technology. 128 00:09:45,430 --> 00:09:50,100 So an example of this would be intranet if you've heard of intranet. 129 00:09:51,250 --> 00:09:58,420 Now, while the backbone of a man application can be provided by using one or two cables, modems are 130 00:09:58,420 --> 00:09:59,950 actually widely used today. 131 00:10:01,580 --> 00:10:05,180 And then we've got our wide area network or when. 132 00:10:06,750 --> 00:10:14,250 So this is a type of network that is created by local networks at very far distances, so geographically 133 00:10:14,250 --> 00:10:16,710 it's larger than a land and a man. 134 00:10:17,860 --> 00:10:21,730 It actually can be a country or worldwide network. 135 00:10:22,660 --> 00:10:27,940 The Inter Network connection can be made with fiber optic cable or with the help of satellites. 136 00:10:28,810 --> 00:10:32,560 And although different from lens router devices are used in these networks. 137 00:10:33,720 --> 00:10:39,180 So the most well-known when you've probably heard of it, too, we call it the internet. 138 00:10:42,390 --> 00:10:43,730 Then we come to VPNs. 139 00:10:43,760 --> 00:10:46,460 Now this is a virtual private network. 140 00:10:46,910 --> 00:10:54,260 And this is something that probably is in everybody's email box or advertisement portfolio because everybody's 141 00:10:54,260 --> 00:10:57,290 getting ads for the newest VPN. 142 00:10:58,850 --> 00:11:00,200 But I'll explain to you what it is. 143 00:11:01,150 --> 00:11:03,730 It's the lowest cost when creation method. 144 00:11:04,750 --> 00:11:05,080 Right. 145 00:11:05,200 --> 00:11:11,500 Because it's a virtual network that's created to provide encrypted and secure access to the networks 146 00:11:11,860 --> 00:11:14,770 within an organization over the internet. 147 00:11:15,400 --> 00:11:18,190 And it basically works as if it's part of the network. 148 00:11:19,640 --> 00:11:26,510 So the same can be done with leased lines, but VPN is very low cost and easy to configure because the 149 00:11:26,510 --> 00:11:27,680 VPN is virtual. 150 00:11:28,220 --> 00:11:35,090 Multiple VPN users can use the network at the same time, and since the traffic on the VPN has provided 151 00:11:35,810 --> 00:11:42,950 over the internet, security measures such as encryption, data verification and authorization can also 152 00:11:42,950 --> 00:11:44,930 be taken for security purposes. 153 00:11:46,270 --> 00:11:52,810 So VPN is set up to provide a confidential and private information flow between neighboring networks, 154 00:11:53,680 --> 00:11:59,800 even if the package go over the internet, you see, even if they are listened to thanks to the security 155 00:11:59,800 --> 00:12:05,860 measures used, the person attacking the encrypted packets cannot make sense of the information that 156 00:12:05,860 --> 00:12:07,540 they could harvest. 157 00:12:09,820 --> 00:12:13,430 So that means that VPN is actually divided into two. 158 00:12:13,720 --> 00:12:16,060 According to the purpose of its use. 159 00:12:16,900 --> 00:12:22,390 So these are remote access VPNs and site to site VPNs. 160 00:12:23,990 --> 00:12:32,360 So we'll talk about remote access VPNs, because these will allow the networks to join the roaming corporate 161 00:12:32,360 --> 00:12:33,950 network from anywhere. 162 00:12:34,040 --> 00:12:34,340 Right? 163 00:12:34,460 --> 00:12:36,320 Remote Access VPN. 164 00:12:37,770 --> 00:12:41,640 Or it can be used for different offices of companies to communicate with the center. 165 00:12:43,670 --> 00:12:45,350 Now we've got site to site VPN. 166 00:12:46,630 --> 00:12:53,560 Site to site VPN is used to enable different companies to communicate over VPN and to enable different 167 00:12:53,560 --> 00:12:57,580 offices of the company to communicate with its center office. 168 00:12:58,480 --> 00:13:08,290 So the difference between remote access VPN and site site VPN is there's a VPN server between two points 169 00:13:08,290 --> 00:13:11,320 that perform the VPN operation. 170 00:14:06,410 --> 00:14:07,310 What about can? 171 00:14:07,940 --> 00:14:11,510 Yeah, there's a can it's called Controller Area Network. 172 00:14:13,440 --> 00:14:19,980 So it's a serial network technology that was developed by Bosch in the mid-1980s for use in automotive 173 00:14:19,980 --> 00:14:20,640 automation. 174 00:14:21,620 --> 00:14:27,170 Although it was developed, especially in vehicles, it has found its use in many branches of the industry. 175 00:14:27,590 --> 00:14:33,560 So its purpose is actually to make cars safer and to save fuel because they can also make them lighter 176 00:14:33,740 --> 00:14:34,670 and quicker. 177 00:14:36,200 --> 00:14:42,710 So Can is essentially a system for automobile systems that works on the principle that the electronic 178 00:14:42,710 --> 00:14:49,430 elements in the vehicles will send data to a single central executive element over a serial path. 179 00:14:50,120 --> 00:14:57,320 For example, it enables systems such as the ABS and the ACR that need to be answered in a really short 180 00:14:57,320 --> 00:15:00,230 period of time to be managed from a single center. 181 00:15:01,920 --> 00:15:08,730 Can eliminate the crowd cabling structure, thanks to the bus structure and twisted pair cable it uses. 182 00:15:09,630 --> 00:15:16,980 Although bus is the most commonly used topology in the Khan network, structure star and ring topology 183 00:15:17,010 --> 00:15:17,880 can also be used. 184 00:15:20,160 --> 00:15:27,390 Now, don't get that confused with Cam as the abbreviation for a campus area network. 185 00:15:28,080 --> 00:15:32,220 This naming refers to the network that universities create within themselves. 186 00:15:35,050 --> 00:15:36,280 So let's talk about the sand. 187 00:15:36,400 --> 00:15:39,700 It's also known as a storage area network. 188 00:15:40,060 --> 00:15:45,760 So it's a type of network that emerged when the storage areas of the servers on the network started 189 00:15:45,760 --> 00:15:47,020 to become insufficient. 190 00:15:47,290 --> 00:15:49,180 Can you believe that too small? 191 00:15:50,610 --> 00:15:56,760 So storage area networks are basically lands used for storing and transmitting large amounts of data. 192 00:15:57,600 --> 00:16:03,120 It provides a fast and reliable connection with fiber optic cable, oftentimes between servers and storage 193 00:16:03,120 --> 00:16:03,570 units. 194 00:16:04,620 --> 00:16:11,160 A storage unit on the network does not belong just to one server, but maybe is even common property 195 00:16:11,160 --> 00:16:12,090 of the entire network. 196 00:16:13,800 --> 00:16:19,980 Although servers do their part as storage media, their capacity can be limited and bottlenecks can 197 00:16:19,980 --> 00:16:23,130 occur when many people try to access the same information. 198 00:16:23,880 --> 00:16:31,440 Therefore, many organizations use peripheral storage device such as tape units, raid disks and optical 199 00:16:31,440 --> 00:16:32,810 storage systems. 200 00:16:33,650 --> 00:16:39,580 He says devices play an active role in backing up data online and storing large amounts of information. 201 00:16:41,160 --> 00:16:47,580 Now, as server sizes and heavy applications increase, the traditional storage strategies mentioned 202 00:16:47,580 --> 00:16:55,050 above are also failing because these peripheral devices are pretty slow to access and and transparent 203 00:16:55,050 --> 00:16:58,950 access to these storage devices may not even be possible for every user. 204 00:16:59,640 --> 00:17:06,570 So sand storage area networks offer faster access to data and more options. 205 00:17:07,920 --> 00:17:14,550 So storage networks can provide high speed direct fibre channel connectivity between each server storage 206 00:17:14,550 --> 00:17:17,310 system, as well as a tape backup library. 207 00:17:18,550 --> 00:17:25,360 So this means that the local network will no longer be used to move data in the backup and restore process. 208 00:17:26,380 --> 00:17:31,420 You see how that would be improving performance for those services and users on the local network. 209 00:17:33,830 --> 00:17:34,820 It's always moving up. 210 00:17:36,430 --> 00:17:42,340 So thanks for hanging in there, guess what, we've got somewhere else to go in the next lesson. 211 00:17:43,210 --> 00:17:43,960 So I'll see you then. 21791

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.