- 71
- 135 089
ComputerNetworkingNotes
India
Приєднався 10 лип 2021
Welcome to the official channel of ComputerNetworkingNotes.com. This channel presents videos that explains networking concepts in easy way. Here you can finds videos about basic networking, CCNA, Linux, Windows and many more topics that are related to computer networking.
ARP (Address Resolution Protocol), Unicast, and Broadcast Explained | CCNA Video - 03
This video is the third video in our ongoing tutorial series on CCNA. This video explains unicast, broadcast, and Address Resolution Protocol.
Video description
We have a simple network of four PCs. PC1 wants to send a file to PC3. For this, PC1 needs to know the IP address and MAC address of PC3. PC1 can learn the IP address of PC3 in two ways. It can use the hosts file or a DNS server. A hosts file is a text file. Almost all operating systems have it. It allows us to map IP addresses to names. If this file does not contain an entry for a name, the system uses the DNS server to translate the name.
From the hosts file entries, PC1 learns that PC3's IP address is 10.0.0.3/8.
After knowing PC3's IP address, it needs to know the MAC address of PC3. It uses the ARP protocol to learn the MAC address of PC3. ARP protocol uses a simple mechanism to know the MAC address of the given IP address. It sends a broadcast message to the network, assuming the device with this IP address will listen and reply. The broadcast message includes the source's MAC address, IP address, request message, and intended device's IP address. The broadcast message reaches all devices in the network. A recipient device matches its IP address with the IP address listed in the indented IP address field of the broadcast message to determine whether this message is for it.
This broadcast message is for the device with the IP address 10.0.0.3/8. PC2 and PC4 ignore this message as their IP addresses do not match with it. Only PC3 replies to this message as its IP address matches the IP address listed in the indented IP address field of the broadcast message. Since this message also includes the PC1's MAC and IP addresses, PC3 does not need a broadcast message to reply. It can send a direct message to PC1. A direct message is known as a unicast message. PC3 sends a unicast reply message to PC1. The reply message includes PC3's MAC address. PC1 learns the PC3's MAC address from the reply message. After learning PC3's MAC address, it sends the file directly to PC3 using a unicast message.
This mechanism explains three things: broadcast, unicast, and ARP protocol.
Broadcast
A broadcast message is for all. It contains pre-defined IP and MAC addresses in the destination IP and MAC address fields.
These IP (255.255.255.255) and MAC (FFFF.FFFF.FFFF) addresses belong to all devices in the network, and all devices listen to them.
Devices use their logic to determine whether to reply to it.
The sending device does not need to know the intended device's IP and MAC address.
Unicast
A unicast message is for a particular device.
It contains the IP and MAC addresses of the intended device in the destination IP and MAC address fields.
A device can send a unicast message only when it knows the IP and MAC addresses of the destination device.
ARP
ARP stands for Address Resolution Protocol.
An end device uses it to find the MAC address associated with an IP address.
It sends an ARP broadcast to know the MAC address associated with an IP address.
It contains the source device's MAC and IP addresses in the source field, the intended IP address, and the broadcast IP and MAC addresses in the destination field.
All devices on the local network listen to it.
They compare the intended IP address with their IP address to determine whether it belongs to them.
Only the device whose IP address matches the intended IP address replies to the message. All other devices ignore it.
The matched device sends a unicast message to the source device.
The message contains the MAC address associated with the intended IP address.
The source device learns the MAC address from the message and saves it in the ARP cache for later use.
The source device sends an ARP broadcast to know the MAC address associated with an IP address. The broadcast message contains the source device's MAC and IP addresses in the source field, the intended IP address, and the broadcast IP and MAC addresses in the destination field.
Since the broadcast message contains the IP and MAC addresses that belong to all, all devices listen to it. They compare the intended IP address with their IP address to determine whether it belongs to them. Only the device whose IP address matches the intended IP address replies to the message. All other devices ignore it. The matched device sends a unicast message to the source device. The message contains the MAC address associated with the intended IP address. The source device learns the MAC address from the message. It saves this address in the ARP cache for further use. If it gets a data packet for the same IP address again, it uses the cache entry instead of repeating this process.
Video description
We have a simple network of four PCs. PC1 wants to send a file to PC3. For this, PC1 needs to know the IP address and MAC address of PC3. PC1 can learn the IP address of PC3 in two ways. It can use the hosts file or a DNS server. A hosts file is a text file. Almost all operating systems have it. It allows us to map IP addresses to names. If this file does not contain an entry for a name, the system uses the DNS server to translate the name.
From the hosts file entries, PC1 learns that PC3's IP address is 10.0.0.3/8.
After knowing PC3's IP address, it needs to know the MAC address of PC3. It uses the ARP protocol to learn the MAC address of PC3. ARP protocol uses a simple mechanism to know the MAC address of the given IP address. It sends a broadcast message to the network, assuming the device with this IP address will listen and reply. The broadcast message includes the source's MAC address, IP address, request message, and intended device's IP address. The broadcast message reaches all devices in the network. A recipient device matches its IP address with the IP address listed in the indented IP address field of the broadcast message to determine whether this message is for it.
This broadcast message is for the device with the IP address 10.0.0.3/8. PC2 and PC4 ignore this message as their IP addresses do not match with it. Only PC3 replies to this message as its IP address matches the IP address listed in the indented IP address field of the broadcast message. Since this message also includes the PC1's MAC and IP addresses, PC3 does not need a broadcast message to reply. It can send a direct message to PC1. A direct message is known as a unicast message. PC3 sends a unicast reply message to PC1. The reply message includes PC3's MAC address. PC1 learns the PC3's MAC address from the reply message. After learning PC3's MAC address, it sends the file directly to PC3 using a unicast message.
This mechanism explains three things: broadcast, unicast, and ARP protocol.
Broadcast
A broadcast message is for all. It contains pre-defined IP and MAC addresses in the destination IP and MAC address fields.
These IP (255.255.255.255) and MAC (FFFF.FFFF.FFFF) addresses belong to all devices in the network, and all devices listen to them.
Devices use their logic to determine whether to reply to it.
The sending device does not need to know the intended device's IP and MAC address.
Unicast
A unicast message is for a particular device.
It contains the IP and MAC addresses of the intended device in the destination IP and MAC address fields.
A device can send a unicast message only when it knows the IP and MAC addresses of the destination device.
ARP
ARP stands for Address Resolution Protocol.
An end device uses it to find the MAC address associated with an IP address.
It sends an ARP broadcast to know the MAC address associated with an IP address.
It contains the source device's MAC and IP addresses in the source field, the intended IP address, and the broadcast IP and MAC addresses in the destination field.
All devices on the local network listen to it.
They compare the intended IP address with their IP address to determine whether it belongs to them.
Only the device whose IP address matches the intended IP address replies to the message. All other devices ignore it.
The matched device sends a unicast message to the source device.
The message contains the MAC address associated with the intended IP address.
The source device learns the MAC address from the message and saves it in the ARP cache for later use.
The source device sends an ARP broadcast to know the MAC address associated with an IP address. The broadcast message contains the source device's MAC and IP addresses in the source field, the intended IP address, and the broadcast IP and MAC addresses in the destination field.
Since the broadcast message contains the IP and MAC addresses that belong to all, all devices listen to it. They compare the intended IP address with their IP address to determine whether it belongs to them. Only the device whose IP address matches the intended IP address replies to the message. All other devices ignore it. The matched device sends a unicast message to the source device. The message contains the MAC address associated with the intended IP address. The source device learns the MAC address from the message. It saves this address in the ARP cache for further use. If it gets a data packet for the same IP address again, it uses the cache entry instead of repeating this process.
Переглядів: 345
Відео
Downloading, Installing, Configuring, and Understanding Packet Tracer | CCNA Video - 02
Переглядів 167Місяць тому
This video is the second part of the ongoing video tutorial series on CCNA. In this video, I will explain how to download, install, configure, and use Packet Tracer simulator software. Video description Packet Tracer is network simulator software. It can simulate all essential Cisco devices we need to practice CCNA exam topics. Downloading Packet Tracer You can download the latest version of Pa...
Basic Network Components, Characteristics, and Types Explained | CCNA Course Video 01
Переглядів 2312 місяці тому
This video is the first part of an ongoing and complete tutorial series on CCNA. In this video, I will explain what the CCNA course covers, essential network components, network characteristics, and network types. What does the CCNA course include? CCNA is all about networks. It explains how networks work and how various Cisco devices function in networks. It sees networks from Cisco's angle. I...
Basic Concepts of Computer Networking
Переглядів 4312 місяці тому
This video explains the basic concepts and fundamentals of computer networking. Video description Network A network is a group of devices connected for data and hardware sharing. It includes at least two devices. There is no limit on the upper side. For example, the Internet, the largest ever-built network, connects millions of devices. Networking Networking is the subject that explains how to ...
Installing Ubuntu 22.04 on Virtualbox on Windows 11
Переглядів 1323 місяці тому
This video explains how to install the latest version of Ubuntu on VirtualBox. It also explains the common issues and errors you may face during the installation. This video is based on the following tutorial. www.computernetworkingnotes.com/linux-tutorials/installing-ubuntu-22-04-on-virtualbox-windows.html Command to disable Hyper-V Disable-WindowsOptionalFeature -Online -FeatureName Microsoft...
User Account Types Explained on a Standalone Linux System
Переглядів 1363 місяці тому
This video explains user account types on a standalone Linux system. This video is based on the following tutorial. www.computernetworkingnotes.com/linux-tutorials/types-of-users-in-linux-explained-with-accounts.html Video Description User account types On a standalone Linux system, there are five types of accounts: - root user, super user, sudo user, regular user, and service accounts. The roo...
The /etc/passwd File Explained with Examples
Переглядів 5964 місяці тому
This video explains the purpose and contents of the /etc/passwd file. This video is based on the following tutorial. computernetworkingnotes.com/linux-tutorials/etc-passwd-file-in-linux-explained-with-examples.html Video Description Linux saves local user accounts' information in the /etc/passwd file on the local system. In other words, the /etc/passwd file is the database of all local user acc...
EtherChannel Basic Concepts and Fundamentals Explained | EtherChannel Modes | Static, LACP, PAgP
Переглядів 3634 місяці тому
EtherChannel Basic Concepts and Fundamentals Explained | EtherChannel Modes and Options This tutorial explains the following topics. What is an EtherChannel? How does an EtherChannel work? What are the EtherChannel modes? Differences between Static, LACP, and PAgP modes How EtherChannel works with STP What is an EtherChannel pool? EtherChannel load balancing rules How does EtherChannel load-bal...
STP, RSTP, PVST, RPVST, and MSTP | Similarities and Differences between All STP Variations
Переглядів 2,1 тис.6 місяців тому
This video compares all STP variations and explains their similarities and differences in detail. This video is based on the following tutorial. www.computernetworkingnotes.com/ccna-study-guide/stp-rstp-pvst-rpvst-and-mstp.html Video description We have five STP variations: IEEE's STP, Cisco's PVST, IEEE's RSTP, Cisco's RPVST, and IEEE's MSTP. First, let us understand the similarities between t...
STP and Switching Loops Explained | How to Enable or Disable STP | Packet Tracer Example
Переглядів 6146 місяців тому
This tutorial explains how STP manages switching loops through a packet tracer example. It explains the following topics. What is the Spanning-Tree Protocol? What causes switching loops? What is the packet tracer? Building practice lab How to use the ping command to send broadcast traffic on Packet Tracer? Testing broadcast frame Creating a switching loop Disabling the switching loop Viewing th...
STP Root Bridge Election Process Explained | How STP selects the root bridge
Переглядів 8736 місяців тому
This video explains the STP root bridge election process. Learn how to manipulate the STP root bridge election process. This video is based on the following tutorial. www.computernetworkingnotes.com/ccna-study-guide/stp-root-bridge-election-process-explained.html Video description STP (Spanning Tree Protocol) is a layer two protocol. It finds and removes switching loops from the network. It bui...
Layer 2 Switching Loops in Network Explained
Переглядів 1,9 тис.7 місяців тому
This video explains the following topics. What are Layer 2 switching loops? Why do Layer 2 switching loops occur? What is a redundant link? What is the use of a redundant link? How does a redundant link work? What is a broadcast storm? The effect of a switch loop over a network How switches learn MAC addresses Why do switches always forward broadcast frames How do broadcast frames trap in switc...
Differences between Access port and Trunk port | Access ports and Trunk ports Explained
Переглядів 20 тис.8 місяців тому
This video explains the following topics. What is an access port on an Ethernet switch What is a trunk port on an Ethernet switch Difference between access port and trunk port How a trunk port differs from an access port How an access port differs from a trunk port How an access port works How a trunk port works Access and trunk ports Explained Cisco access ports Cisco trunk ports What is trunk...
Create, configure, Increase, Verify, and Delete the swap space on Linux using a Partition or File
Переглядів 2328 місяців тому
This video explains the following topics:- Create, configure, verify, and delete the swap space on Linux How to use a partition or a file for the swap space How to increase the swap space How to create a swap partition How to use a file for the swap space The swap space file permission The 0600 file permission for the swap space This video is based on the following tutorial. www.computernetwork...
Linux swap space Explained with Examples | What is the swap space | How does the swap space work
Переглядів 1 тис.9 місяців тому
This video explains the following topics. What is the swap space? How does swap work? How Linux uses the swap space Linux swap space swap space in Linux When Linux uses the swap space When Linux does not use the swap space What is the threshold value on the swap space This video is based on the following tutorial. www.computernetworkingnotes.com/linux-tutorials/the-swap-space-on-linux-explained...
Type of access lists | The access-list command | The ip access-list command
Переглядів 24510 місяців тому
Type of access lists | The access-list command | The ip access-list command
The gdisk command | create, delete, and change partition type | Linux disk management
Переглядів 2,7 тис.10 місяців тому
The gdisk command | create, delete, and change partition type | Linux disk management
What is VLAN | How VLAN works | Basic concepts and fundamentals of VLAN | Switch VLAN Configuration
Переглядів 2,5 тис.11 місяців тому
What is VLAN | How VLAN works | Basic concepts and fundamentals of VLAN | Switch VLAN Configuration
Linux File System EXT3, EXT4, and XFS | Mounting partitions Temporarily and Permanently
Переглядів 1,8 тис.11 місяців тому
Linux File System EXT3, EXT4, and XFS | Mounting partitions Temporarily and Permanently
BIOS, UEFI, MBR, GPT, Primary, Extended and Logical Partition Types Explained
Переглядів 6 тис.11 місяців тому
BIOS, UEFI, MBR, GPT, Primary, Extended and Logical Partition Types Explained
The fdisk Command | Creating, Modifying, and Deleting Partitions | The /etc/fstab file
Переглядів 433Рік тому
The fdisk Command | Creating, Modifying, and Deleting Partitions | The /etc/fstab file
How to add or remove the hard disk from a virtual machine on the VMware workstation | lsblk command
Переглядів 558Рік тому
How to add or remove the hard disk from a virtual machine on the VMware workstation | lsblk command
Hard Disk Types | SCSI, SATA, PATA, NVMe | BIOS and UEFI | MBR and GPT Explained with Examples
Переглядів 5 тис.Рік тому
Hard Disk Types | SCSI, SATA, PATA, NVMe | BIOS and UEFI | MBR and GPT Explained with Examples
The /etc/issue & /etc/motd files Explained | Configure Message of the Day and Login banner on Linux
Переглядів 990Рік тому
The /etc/issue & /etc/motd files Explained | Configure Message of the Day and Login banner on Linux
Store and forward, Cut Through, and Fragment Free Switching Methods
Переглядів 3,3 тис.Рік тому
Store and forward, Cut Through, and Fragment Free Switching Methods
Network, Host, Connected, Local, Dynamic, Floating Static, and Default routes in the Routing table
Переглядів 608Рік тому
Network, Host, Connected, Local, Dynamic, Floating Static, and Default routes in the Routing table
DNS Server Configuration Explained | Primary, Secondary, and Caching-only Name Server Configurations
Переглядів 1,1 тис.Рік тому
DNS Server Configuration Explained | Primary, Secondary, and Caching-only Name Server Configurations
DNS (Domain Name System) Explained | DNS Everything you need to known about #dns #dnsserver
Переглядів 279Рік тому
DNS (Domain Name System) Explained | DNS Everything you need to known about #dns #dnsserver
Finding, Changing, and Viewing IP addresses on Linux | Linux Network Interface Naming Convention
Переглядів 121Рік тому
Finding, Changing, and Viewing IP addresses on Linux | Linux Network Interface Naming Convention
Dynamic Host Configuration Protocol (DHCP) Explained with Examples
Переглядів 202Рік тому
Dynamic Host Configuration Protocol (DHCP) Explained with Examples
I was about to close the video in the first 3 seconds because of the computer voice but I'm glad I didn't, it's a great summary. Good vid!
Glad you enjoyed it!
good explanation
Thanks and welcome
I have no other choice than to subscribe and like - BRILLIANT!!!!! 😎😎
Glad to hear that !
This video is after 5 minutes already better than the whole Cisco Network course. Well done
Thanks
Thank u very much! It is very helpful and rescue me from my homework. It is so clear I understand easily. The best video about STP and cisco packet tracer! Thank u!
Happy to hear that!
excellent!
Welcome
Great explanation
Thanks!
Greate explernation. kudos to creator <3
Thanks
another video conveying the basics for the ccna? great
More to come!
Thank you very much for making such simple understanding tutorials. Great
I'm glad you found it helpful!
Computer narration sucks. I wish where was a "negative subscribe" button that would prevent me from ever seeing your channel again.
Thanks you, it was realy useful
You are welcome
+1 subscriber
Thanks
One of the best video.SImple and Easy.Thanks alot
Most welcome 😊
Helpful. Thanks!
You're welcome!
Good, clarified me about setting up labs in various scenarios
Thanks
Very good explanation and very good illustration too.
Glad you liked it!
one of the best Videos Easily Understand all concepts 😊😊😊😊
Thanks
Mindblowing. Truly amazing video. thank you so much and god bless u.
Most welcome 😊
What a fantastic tutorial? Powerpoint slides or presentation really outstanding. Thank you and much appreciated.
You're very welcome!
One of the best in straightforward explanation on VLAN. Thanks
Glad you think so!
I don't like the robot voice but the explanations are really good and helped me understand better. Thank you
You're welcome
👏👏👏
Thanks
Thanks, your videos are really amazing😍👏🏻
Glad you like them!
1. LAN CARD 2. Scalability 3. LAN OR SOHO
These are the correct answers.
Thanks but one thing, BIOS supports maximum 4 primary partition not 14.
Yes, that is why the concept of primary and logical partitions was used to create more partitions. This concept allows you to convert the last primary partition into logical partitions. Logical partitions reside inside a physical partition. Only the operating system sees logical partitions. BIOS only considers the physical partitions.
Thank you so much❤
You're welcome 😊
this video is definitely a god-like level editing, helped to explain a lot to me, thank you
Glad you liked it!
Excellent explanation and very helpfull.
Thanks for your feedback
I really appreciate this video! The examples provided are fantastic and offer deep insights into the topics. I feel like I have a much better understanding now. Thank you for creating such informative content!
Glad it was helpful!
Glad to watched the first video of ccna
Thanks
Thanks for sharing! Very useful refresher!
Glad it was helpful!
I second below comment...for best collection of videos on network explanations with illustrations!
Glad you think so!
Very well explained! Thank you!
You're very welcome!
Excellent explanation, those animations are helping A LOT to better understand. Thank you very much, I really appreciate your effort 💯👍 😎
You're very welcome!
Schultz Pines
Thanks for your comment.
Rempel Square
Thanks for your comment.
You are amazing 🎉🎉🎉
Thanks
Subnet VLAN-10, 10Mbps, VLAN-20 20Mbps, VLAN-30 30Mbps
Thanks
why is that ... please explain
@@Regea_Love_LyricsCould you please give me more details about what you are actually asking?
@@computernetworkingnotesyoutube how do I know the speed on subnet vlan is 10mbps vlan 20 is 20mbps..... Etc
@@Regea_Love_Lyrics VLANs have nothing to do with speed. They are layer two implementations to control broadcast messages. 10, 20, and 30 are VLAN identification numbers, not speed in VLAN-10, VLAN-20, and VLAN-30.
I'm currently studying to become a network administrator, and I plan to specialize in Linux in the future. Thanks a lot for your videos.
Best of luck!
wow, just wow :)
Thanks
Great tutorial and explanation of how DNS generaly works.
Glad it was helpful!
Such a knowledgeable video ,thaks a lot
My pleasure
Your videos are very good but too fast , thanks by the way ❤
Thanks for your positive feedback.
The best explanation I've ever seen! THANK YOU!
You're very welcome!
Informative despite the same voice as Anime recap videos 😂
Thanks for your positive feedback.
🎉
Thanks
Amazing video.
Glad you think so!
thank you bro <3
You're welcome!
Very clearly explained
Glad you think so!