Routers, The Internet & YouTube Offline - Computerphile

Поділитися
Вставка
  • Опубліковано 3 гру 2024

КОМЕНТАРІ • 199

  • @marsandbars
    @marsandbars 3 роки тому +7

    0:35 My man predicted the future.

  • @umaikakudo
    @umaikakudo 3 роки тому +9

    "All this has happened before, and all this will happen again." So say we all. The great Facebook outage of 2021.

  • @ChrisSeltzer
    @ChrisSeltzer 10 років тому +7

    Excellent video, I love when they're about real topics not just theory.

  • @DanniV8
    @DanniV8 10 років тому +6

    This is mindblowing! And here I am, shouting at my router when the internet is slow. I had no idea :(

  • @KenanVideos
    @KenanVideos 8 років тому +45

    "...rooting is something completely different in Australia"
    na ye... ye.

  • @paulzapodeanu9407
    @paulzapodeanu9407 10 років тому +15

    That was very good explanation! I'm network engineer so it was easy for me to understand but even someone who doesn't have that expertise should have gotten a rough idea of what's going on.

  • @LLubdeRr
    @LLubdeRr 2 роки тому +2

    I just love you guys! I understood more in 14 minutes than i did in 4 hours in university. The BGP Problems were covered so simple but perfectly.

  • @antonydandrea
    @antonydandrea 10 років тому +9

    I love this channel. Has such good quality informative videos!

  • @TheArKabZol
    @TheArKabZol 10 років тому +2

    Hoping to see some more computer network videos the next few days, they're my favourite!

  • @b4ux1t3-tech
    @b4ux1t3-tech 10 років тому +19

    Is anyone else imagining a bunch of guys sitting in a room shouting "hello" at one another?

    • @luciferdeathbringer7906
      @luciferdeathbringer7906 10 років тому +7

      Is it me you're looking for?

    • @HelepodGTech
      @HelepodGTech 10 років тому +3

      LuciferDeathbringer I can see it in your eyes, I can see it in your smile.

    • @michael-gary-scott
      @michael-gary-scott 10 років тому +2

      ***** You're all I've ever wanted, And my arms are open wide

    • @Triantalex
      @Triantalex Місяць тому

      No, noone else.

  • @trefod
    @trefod 10 років тому +5

    BGP is a path vector protocol. There are similar protocols in private networks, like Eigrp and Ripv2. The link state protocol is called OSPF.

    • @richardmortier9614
      @richardmortier9614 10 років тому +6

      whoops-- i thought i mentioned BGP as a path vector protocol. in fact, there are two link-state protocols in common use that i know of: OSPF and IS-IS. (i think i did say that, but it hit the cutting room floor :)
      EIGRP and RIP are distance vector rather than path vector protocols. (we could've gone into that as well, but it already seemed plenty long enough!)

    • @trefod
      @trefod 10 років тому

      Richard Mortier Dammit you're right, distance vector, not path vector. And does anybody use IS-IS? I've only encountered OSPF, perhaps because IS-IS is a layer 2 protocol and there is a move towards layer 3 routing in the distribution layer switches. (Or maybe because I never see the ISP side of things).
      Anyway, nice walk through, though I think I'd have been lost without a CCNA, CCNP background.

    • @richardmortier9614
      @richardmortier9614 10 років тому

      trefod thanks! back in 2001/2 when i spent 6 months at Sprint's IP research group, i wrote code to monitor their IP backbone routing protocols (github.com/mor1/pyrt) -- they used IS-IS then and i believe they still do (though no doubt someone will correct me if i'm wrong :) it was pretty interesting -- though IS-IS was updated to carry IP prefix information (RFC1195), it still runs over CLNP so i got to see bits of both. (if you're really interested, we used the data we collected to analyse the reliability characteristics of their backbone -- see www.cs.nott.ac.uk/~rmm/papers/pdf/imw02-linkfailures.pdf for the results :)

    • @KarnKaul
      @KarnKaul 10 років тому

      trefod Yes, some organisations use IS-IS - it's the routing protocol of the OSI model (most of the world and internet follows the TCP/IP model).

  • @1954BJohn
    @1954BJohn 10 років тому +3

    Well explained,clear and concise - Thanks Dr Richard Mortier

  • @sahildadia590
    @sahildadia590 10 років тому +2

    finally some insight about how internet works! great job! should do more videos about internet

  • @EgoShredder
    @EgoShredder 9 років тому +6

    Strange how the famous American song Route 66 is sung in the British way!

    • @MrNateSPF
      @MrNateSPF 9 років тому +1

      +EgoShredder It is actually pronounced either way in America.

    • @EgoShredder
      @EgoShredder 9 років тому +2

      The way I understand it in the UK is a "rowt" vowel sound is used when something is drilled like a hole using a "rowter" (router). Things like network connections that define the route use the "root" vowel sound, because my network router does not drill anything. So that is the simple way of differentiating between drilling a hole or driving along a road to somewhere.

  • @SevenDeMagnus
    @SevenDeMagnus 7 років тому

    Inventors of the web, the internet and the hardware and those who teach it like sir on the vidoe- they are geniuses. Humankind is truly smart:-)

  • @sophrapsune
    @sophrapsune 6 років тому

    Excellent, concise description, thanks.

  • @GregoryKuyckx
    @GregoryKuyckx 10 років тому +1

    Could you explain how internet server providers work?
    Keep up the good work!

  • @ElectiveTool
    @ElectiveTool 10 років тому

    Really interesting, I'd love to hear more on this! I found it to be just the right level of detail :)

  • @TheRealFlenuan
    @TheRealFlenuan 9 років тому +4

    I hope I live to see the day when BGP has been replaced by something safer…

  • @AlexMegremis
    @AlexMegremis 10 років тому

    Great vid. Thanks for making this.

  • @CheapSushi
    @CheapSushi 8 років тому

    At this point, for the consumer / prosumer level, what's the difference between a switch and router? At the Enterprise level, I know and there's dedicated hardware to make the latency so insanely low on the switch but for everything else, say for a homelab, with software, can't you have a whitebox do both?

  • @EscapeMCP
    @EscapeMCP 8 років тому +2

    Can you do a video on subnetting please?!

  • @KarmicBeats
    @KarmicBeats 9 років тому +12

    You guys did another video on how an attack could take down the internet. Sounds like a BGP attack could do even worse damage or reroute everyone to your store 😁 Curious if any hackers have used BGP to much things up or profit?

    • @Ice_Karma
      @Ice_Karma 6 років тому +1

      Dunno if you got a reply to this, but: There have definitely been cases of nation state-level actors causing "funny" routing to happen so they can conduct surveillance on a target, and also of criminal organizations rerouting traffic for dodgy purposes. I don't have any citations handy, but it shouldn't be too difficult to rustle some up with some Googling.

    • @bottlekruiser
      @bottlekruiser 6 років тому +16

      >want more visits to your store
      >do BGP attack to reroute everyone to your store
      >realise you just DDoSed your store

    • @Douglas_Gillette
      @Douglas_Gillette 2 роки тому

      Egypt did it during the Arab Spring. They forced providers to reconfigure BGP. Much of the country could not interact on the internet.

    • @Triantalex
      @Triantalex Місяць тому

      false.

  • @philipsalter934
    @philipsalter934 10 років тому +1

    Its about time we get a new TCP stack with built in encryption!

  • @billy653
    @billy653 10 років тому +1

    Hi, can you make a video on subnetting?

  • @cappie2000
    @cappie2000 10 років тому

    I learned something new today.. thank you for this video

  • @random-characters4162
    @random-characters4162 Рік тому

    I wonder who control routers configuration? ISPs? Are they well protected?

  • @Tyranisaur
    @Tyranisaur 10 років тому

    So when trying to match the destination address to the longest matching prefix in the routing table, what algorithm is used? I thought it just had the prefixes in a topological order such that when you can do linear search and do find a match, it is definitively the longest matching prefix.

    • @Macvombat
      @Macvombat 10 років тому

      I seem to remember from my networking class that the prefix's are sorted according to length in descending order such that the first match is the correct match.

    • @boenrobot
      @boenrobot 10 років тому

      You'll notice the prefixes also contain a slash, followed by a number. That number is the key. It tells you how many bits long is the prefix.
      For IPv4, where the addresses are 32 bits, what happens is:
      1. Start off with the assumption that the matching prefix is 32 bits long.
      2. Are there any prefixes this long in the table?
      3. If so, get the one that matches it.
      4. If not, assume the prefix is one bit less, and go back to step 2, unless you've already checked 0 bits, and there's no match.
      5. If there's no match even in 0 bits, drop the packet (since it's destination is unknown).
      Now... Many modern routers also go one level deeper, in that they allow you to have the same length prefix defined multiple times, once for each interface, thus allowing you to reduce the overall load on the network - you send one packet on one interface, and the next on another, thus allowing the two other routers to process more packets (i.e. not just yours).
      EDIT: It's important to note that for the sake of optimization, many routers "sort" the table in advance, upon creation/modification, and merely check records in it in a single complete pass.

    • @DaveLillethun
      @DaveLillethun 10 років тому

      boenrobot Tyranisaur As long as routers _behave_ in the way described in the video they can interoperate, so they're free to _implement_ that behavior any way they choose. I'm sure different routers do it slightly differently.
      The thing that jumps immediately to mind is building a bitwise trie (prefix tree). When you reach a terminal state in a search of the trie, that nodes is necessarily the longest prefix for the search parameter (IP address, in this case). This would make runtime independent of the number of addresses stored in the trie.
      However, it's possible they have something tricky they can do with hashing that provides an even faster implementation.
      It's also worth bearing in mind that routers aren't (normally) general purpose PCs, and the big routers in particular are highly specialized machines. That means that they may include hardware specifically designed to accelerate the operations needed to do forwarding table lookups.

  • @cupofkoa
    @cupofkoa 5 років тому

    So if a router has to hold a table of 4 billion possible entries for IPV4 would all routers have to be updated to handle the 3.4×10^38 possible entries for IPV6?

  • @0x400Bogdan
    @0x400Bogdan 7 років тому

    Is it possible to specify preferred route when sending network packet? Or better force it to travel specific route.

    • @lilyydotdev
      @lilyydotdev 8 місяців тому +1

      It depends on what role you play on the internet. If you had two ISPs connected to your home router you could simply insert routing table entries manually pointing a specific route at one of the two interfaces connected to those ISPs. If you're an ISP you can decrease or increase BGP local preference, or manipulate other metrics BGP uses for best path calculation, to manipulate which route is chosen as best.
      The key takeaway here is that you can only manipulate the routing decisions that happen within your own network. You can never arbitrarily choose what path a packet should take, only what the next "hop" for that packet will be.

  • @Shimmen
    @Shimmen 10 років тому

    Very simple and understandable! Cheers :)

  • @guillecobo_
    @guillecobo_ 3 роки тому

    Dr Mortier you are a magician

  • @JakeDavidHarrison
    @JakeDavidHarrison 10 років тому +20

    Didn't start numbering from 0, unsubbed!
    JK, I love this channel.

  • @Roxor128
    @Roxor128 10 років тому +3

    I expect there's quite a few fellow Australians snickering through the whole video.
    In Australian English "route" and "root" are pronounced the same, but "router" is pronounced "row-ta" regardless of whether you're talking about woodworking or computing, and "routing" is pronounced "row-ting".

  • @divdac
    @divdac 10 років тому +7

    this dude is fucking awesome

  • @briannielsen2002
    @briannielsen2002 7 років тому

    Does LSR protocols like e.g. OSPF not promise loop free routing, I thought ?

  • @jimalexberger
    @jimalexberger 10 років тому

    so is there a way to make an map of every computer and router if you get acces to that database?

    • @AntonAdelson
      @AntonAdelson 10 років тому +1

      I'm not sure but maybe this is what you're looking for? internet-map.net/

  • @159753smith
    @159753smith 8 років тому

    I'm curious about the shortest path algorithm.

  • @tiger10guy
    @tiger10guy 10 років тому

    Great video!

  • @sussycat500
    @sussycat500 6 років тому

    I wish there were subtitles on all of these vids

  • @mckennacisler01
    @mckennacisler01 10 років тому

    So when a new router is installed, does it first run a shortest-path algorithm itself or get information from routers close to it to understand where it is on the network?

    • @KarnKaul
      @KarnKaul 10 років тому

      It and the routers it would talk to have to be configured. OSPF will not communicate with an arbitrary router; in fact there is a lot of configuration that needs to be identical for neighbour relationships to form (even Hello timers), not to mention encrypted authentication. Why? Because otherwise, you could simply connect a rogue router with a bunch of extremely-specific addresses that point to nowhere and flood a network with garbage routes in no time. Worse, the infiltrator would have ALL the information about ALL the networks and endpoints known by the corresponding OSPF process (in short, the routing table)!

    • @Mostlyharmless1985
      @Mostlyharmless1985 10 років тому

      When you take a new router out of the box and plug it in, it immediately does absolutely nothing at all. You have to tell it about your network. That is, what interfaces you want to use, what networks those interfaces are responsible for, and how it should advertise what it knows to the other routers.
      If you plug in your "router" you bought from your local consumer store, it politely asks your isp where it should send all of the packets not relevant to it's subnet.
      I have no idea how they did a video on routing without even mentioning gateway of last resort.
      What they failed to mention about the routing table is that routers are usually configured with "and if you reach the end of your routing list, send it here, it's not your problem anymore." That's known as the gateway of last resort, or simply, gateway.
      Every network device on network maintains a routing table, if you want to see the one for your computer running windows, open a command window and type route print -4.
      What your computer does when you type a web address into your browser is check that ip against it's list, running down until it finds a match, then, when it hits the last one it goes "aha! here's where I send this" and off it goes. Then your home router takes a look at it and checks it against it's routing table, finds it doesn't have any idea where it goes, and sends it up to your ISP. That's where the magic of routing protocols really happen.

    • @KarnKaul
      @KarnKaul 10 років тому

      ^ A couple of errors:
      1. A router doesn't have to have a default route, it can simply discard packets it doesn't have a matching route for. In fact this is the recommended practice; using default routes or default gateways are only common in consumer environments.
      In fact, this is the primary difference between a router and a switch: while the latter is designed to broadcast a frame for an unknown destination, the former is designed to drop packets that aren't a match.
      2. "Every device on a network maintains a routing table" - not true. Only Layer 3 devices that participate in routing & forwarding do. For example, (L2) switches do not contain a routing table (most switches these days are L3 capable, for line-rate routing between VLANs and other purposes).
      3. The computer doesn't have an exhaustive list of all IPs on the internet - that's equivalent to running full BGP on a desktop machine! Theoretically it has a hosts file, but this isn't really used in practice any more; the OS just sends a DNS request out: the router forwards it without caring. Once the DNS response is back, the OS can then initiate a connection with a specific IP address: the router again forwards it without regard for what it is for.
      From a consumer-grade router's perspective, it doesn't know which end is the "ISP", it's just got two interfaces with two IP addresses, possibly one public. It simply maintains its own routing table between these two.

    • @denivyruck
      @denivyruck 10 років тому

      Karn Kaul I'm trying to understand the relation between routing tables and the link state protocol. Where the actual search in the routing tables comes in? It feels like two different ways of solving the problem of "where to send". When the router receives a packet, it'll then get the match with the highest subnet mask or it'll apply the link-state protocol? I might be a little confused here, so i'd appreciate your answer!

    • @Mostlyharmless1985
      @Mostlyharmless1985 10 років тому

      Karn Kaul Network device. Please tell me what layer 3 is called in the OSI Model.
      Whats that? It's called the Network Layer?
      Well then, guess it wasn't an error so much as semantics. I'll say it again, this time being perfectly clear.
      Every Layer 3 device on the network maintains a routing table. Full Stop.
      If you don't believe me, check it yourself. In the Windows Command Line: route print -4 Hosts file doesn't even play into this. That's DNS, you are jumping around the model. DNS is at the application layer. Remember, if you can interact with it with human language, it's an application.
      From a consumer grade router's perspective, it knows exactly which end is the ISP. It's the end with the default gateway. GOLR is the route it uses for networks not under it's responsibility. Grossly oversimplifying it, the side it NAT/PATs over is the ISP. If we are talking pure routing, in the perfect beautiful world that doesn't exist, you would be correct in saying it doesn't know which side is the ISP. We don't live in that world.

  • @WindyDelcarlo
    @WindyDelcarlo 10 років тому

    In the example table at 5:26, is a computer smart enough to know "Oh, the two that it could match both go the same way, let's send it that way"?

  • @MacyBoy11
    @MacyBoy11 10 років тому

    Is this the basis of how proxy servers work? In terms of BGP?

    • @DrRChandra
      @DrRChandra 10 років тому

      No, not really. Proxying is another topic unto itself, and forced proxying even more advanced than that.

  • @Sachin_J
    @Sachin_J 10 років тому

    I took Networking is high school and Video is really Bringing about Memories.

  • @simonharris3797
    @simonharris3797 3 роки тому

    If you are doing a CCNA when he says prefixes he means subnets. He does not define prefixes. These describes how many networks are seen within the range rather than how many IPs are in the range. Eg there are x prefixes of subnet y bytes . Should have put RFC but google CIDR and VLSM with rfc.

  • @ssholum
    @ssholum 10 років тому

    So, why is it that connecting to UA-cam straight from my ISP is buggy (videos will stop streaming or flat out crash), but going through a longer, more complex route (VPN), it works just fine?
    My best guess was that the way UA-cam streams makes something along the regular path think it's done sending, so it gets dropped, but I don't know much of anything about networking.

    • @dykam
      @dykam 10 років тому

      ISP's etc can cache UA-cam videos. It's part of UA-cam's system to reduce strain on the internet and their network. But ISP's being ISP's they can mess it up and are somewhat prone to failures.
      There are ways to disable it and avoid your ISP without a VPN. Look up some browser extensions.

    • @ssholum
      @ssholum 10 років тому

      Dykam
      Alright, thanks! It's not something that only happens with UA-cam, so that will definitely be of help.

    • @ssholum
      @ssholum 10 років тому

      Richard Smith
      I'm pretty sure it's finally been ruled illegal, here in the states, to force companies to pay more for bandwidth. And it does irritate me when that happens, thus the VPN (one of many reasons I got it). Of course, either way I know that it's not UA-cam now, so thanks for your reply!

    • @dykam
      @dykam 10 років тому

      ssholum The caching isn't illegal (it is in cooperation with UA-cam), and AFAIK the practice of capping I think still is legal.

    • @ssholum
      @ssholum 10 років тому

      Dykam
      Not the caching, the throttling. Pretty sure a court ruled that Comcast's requirement for Netflix to pay for equal priority on pipes was unlawful, setting the legal precedent. Of course, I don't use Comcast, but it shouldn't take much more for it to be considered unlawful to extort companies in such a way (assuming this common carrier thing ever gets concluded).

  • @THE16THPHANTOM
    @THE16THPHANTOM 10 років тому

    how do they descide the shortest path, do they have extra information on the distance to other routers?...as i'm writing this i just realized they probably use pinging and use the time as distance or something like that to determine the shortest path. is this reason even close?

    • @richardmortier9614
      @richardmortier9614 10 років тому

      nothing so dynamic since the ARPANET days-- the way i illustrated it made it look like hop counts (ie, every link "costs" the same amount). in practice, links are actually assigned integer weights when the routers are configured, and those give the costs. (the weight for a link may well be initially set based on some combination of the delay and capacity of the link though, and then subsequently tweaked to get the traffic flowing in your network how you want.)

  • @raymondlee1024
    @raymondlee1024 8 років тому

    Surprised that the first ever router virus/network crash wasn't mentioned

  • @TheJaguar1983
    @TheJaguar1983 6 років тому

    We had an issue in 2012, where a router from the ISP Dodo sent every route it knew to the upstream Telstra router which then decided that the Dodo router we the best path for most internet traffic, slowing the internet through most of Australia.

  • @ianholden7
    @ianholden7 7 років тому

    Why does my router keep discontentng re connects runs fine for a while then disconnects again red lights orange lights flashing

  • @Epinardscaramel
    @Epinardscaramel 10 років тому +1

    Remember the time when every PC was connected directly to the internet? You could almost ping any ip in the world :O

    • @BineroBE
      @BineroBE 10 років тому +4

      This is still the case with IPv6.

    • @Mostlyharmless1985
      @Mostlyharmless1985 10 років тому

      That's the way it's supposed to be. Though I fear people used to the natural firewall effect NAT has and forget to set up an appropriate firewall. IPv6 has unroutable addresses as well, so that's not exactly the case.

    • @BineroBE
      @BineroBE 10 років тому

      Mostlyharmless1985
      While that is true, in general you can. There have always been exceptions.

  • @SpaceBurgerLP
    @SpaceBurgerLP 10 років тому +1

    what does router mean in Australia??

    • @CAZinAustralia
      @CAZinAustralia 10 років тому +5

      rooter* to give someone a root... shag... sex.

    • @spooky6703
      @spooky6703 10 років тому +1

      Rooting is sex. It just sounds the same.

    • @kikazz91
      @kikazz91 10 років тому +1

      www.google.com/

    • @fred321cba
      @fred321cba 10 років тому +2

      In Australian slang to "root" means to have sex (similar to the word "f***").

    • @SpaceBurgerLP
      @SpaceBurgerLP 10 років тому +1

      oh, of course

  • @B3Band
    @B3Band 10 років тому +2

    Roto-rooter?

  • @thegoonist
    @thegoonist 3 роки тому

    5:09 but thats just the same as looking up almost the entire IP address no? in the example hes just leaving out the last byte? if the router is looking up the longest prefix, isnt it basically looking up the entire IP address (out of the 4 billion table?)? how is this the 'more efficient' method?

  • @PvtHaggard
    @PvtHaggard 10 років тому

    Can you guys do a video about IP addresses and subnet masks.

  • @todaywiththeCJB
    @todaywiththeCJB 10 років тому

    Nice info!

  • @rubenprod24
    @rubenprod24 10 років тому +2

    Whats a rooter
    ?

    • @Azmodaeus49
      @Azmodaeus49 10 років тому

      (row´ter) (n.) A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.
      Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.

    • @LGD3
      @LGD3 10 років тому

      Someone who has sex, or obtains privileges on a a unix or linux system. This video however is about routers.

  • @bunnybreaker
    @bunnybreaker 8 років тому +1

    Very interesting.

  • @noxim_
    @noxim_ 8 років тому

    so theoratically you could disrupt the whole internet with one network?

  • @a8lg6p
    @a8lg6p 6 років тому

    I guess the British pronunciation makes sense because it finds a rout. But now that I think about it, I think in the US rout (as in a path) can actually be pronounced either way.

  • @jhonbus
    @jhonbus 10 років тому

    10:39 Packet! He said Packet.

  • @blueguy5588
    @blueguy5588 3 роки тому

    That's astounding! So ISPs just built/own the rights to a bunch of regional subnets? Mind Blown.

  • @godfreypoon5148
    @godfreypoon5148 8 років тому +4

    Ha! Ha! Their routes were rooted! (Not as in rootkit.)

  • @lachee3055
    @lachee3055 8 років тому +2

    At the very begining.. Yea, in Australia we use American pronunciation, and yes.. rooting is something very different....... very :P

  • @bulldogg110
    @bulldogg110 10 років тому

    Does anyone know why UA-cam has been so slow lately?? Here in Florida I get about 90 Mbps down and 10 Mbps up via Ethernet. i have tried clearing history in Firefox but that doesn't work. Chrome does the same. the loading bar in the UA-cam video just stops and the video starts buffering. is it just me?

    • @BineroBE
      @BineroBE 10 років тому +3

      Might be throttled by your ISP.

    • @bulldogg110
      @bulldogg110 10 років тому

      Comcast wouldn't care to throttle that. i think its UA-cam. plus why would my ISP throttle UA-cam and not other sites?

    • @BineroBE
      @BineroBE 10 років тому

      bulldogg110
      Because UA-cam competes with Comcast's own cable services. It's very unlikely it's UA-cam, UA-cam has no idea whether you are using a VPN or not.
      You probably connect to the VPN, which is fine for Comcast, and then the VPN connects to UA-cam, on their own non-comast ISP.

    • @bulldogg110
      @bulldogg110 10 років тому

      I don't connect to a virtual private network. switching DNS servers wouldn't work either. meh, its probably me, but UA-cam is known to go under maintenance often.

    • @BineroBE
      @BineroBE 10 років тому

      bulldogg110
      Ah sorry, I had a conversation about this earlier last week and I guessed I mixed up the conversations. I never have any issues with UA-cam, and I'm on here *a lot*.

  • @KillerSpud
    @KillerSpud 9 років тому +11

    no no no, Roots are what hold trees in the ground.

  • @FEARbraveheart
    @FEARbraveheart 9 років тому

    I'm still baffled by the idead of the X11 server and it's future. I'd love an explanation on common Linux/Unix components (cups, modules, X11) if you ever run out of ideas.

    • @RonJohn63
      @RonJohn63 9 років тому

      FEARbraveheart What do you find baffling about X11?

  • @CHURINDOK
    @CHURINDOK 9 років тому +3

    It's router, not router, god damn it.

    • @Frostbite1003
      @Frostbite1003 9 років тому

      So which one is it?

    • @CHURINDOK
      @CHURINDOK 9 років тому +1

      Frostbite1003 The one over yonder, god damn it.

  • @viengsamphet
    @viengsamphet 7 років тому

    My whole town actually had an internet outag

  • @mrmadmaxalot
    @mrmadmaxalot 6 років тому

    A "rooter" sounds like a utility for gaining root access.

  • @ytnafr
    @ytnafr 2 роки тому

    The noise of this pen is dreadful…😵‍💫 The explanation however is great.

  • @RealCadde
    @RealCadde 10 років тому

    Wait, so the English says "rooter", how do they pronounce "route"? If it's "root" then how do they distinguish between "root" and "route"?
    That bit at the beginning was pointless.

    • @Lawa9919
      @Lawa9919 10 років тому +2

      context?

    • @wei495
      @wei495 10 років тому +1

      The same way Americans can differentiate between rout and route - context. In fact, rooter is also a common American pronunciation as well.

  • @Lozlesndstuff
    @Lozlesndstuff 10 років тому

    Very interesting

  • @locust76
    @locust76 10 років тому +7

    The two "UA-cam" networks should have been *192.168.0.0/17* and 192.168.128.0/17, not 192.168.127.0/17 and 192.168.128.0/17.
    192.168.127.0/17 is technically 192.168.127-254.0-255, whereas 192.168.0.0/17 is 192.168.0-127.0-255. 192.168.128.0/17 would then take the top half of the /16 subnet with 192.168.128-255.0-255

    • @DaveLillethun
      @DaveLillethun 10 років тому +1

      192.168.127.0/17 is 192.168.0-127.0-255, i.e., the same as 192.168.0.0/17. (127d = 0111 1111 b) The reason the latter prefix notation is "better" is that, by convention, any bits that are not part of the prefix are made 0. However, they both indicate the same range of IP addresses.

    • @retepaskab
      @retepaskab 10 років тому

      Why, the 17th bit is the first bit of 127 = 0 and 128 = 1, and we only look at the 17th bit. How could one bit have three different states?

    • @DaveLillethun
      @DaveLillethun 10 років тому

      Right. The 17th bit of 192.168.127.0/17 is 0, and the 17th bit of 192.168.0.0/17 is also 0. Therefore, they are the same prefix.

    • @locust76
      @locust76 10 років тому +1

      Yes, if you're talking about strict CIDR subnet notation, 192.168.127.0/17 does technically indicate the lower half of the subnet, but it's sloppy notation because it's a random address in the middle of the subnet and not the actual network address, which is 192.168.0.0/17. The way he wrote it is no different than 192.168.43.177/17.
      However, many devices don't automatically calculate the network address, and they will throw an error if you try to plug in 192.168.127.0/17. Some will also assume a range by calculating how many hosts can be in the given subnet mask and add that to your input, therefore 192.168.127-254.

    • @DaveLillethun
      @DaveLillethun 10 років тому

      Thought that's what I said. :)

  • @voltare2amstereo
    @voltare2amstereo 10 років тому

    rooter means something different in australia Hell yeah,

  • @freibuis
    @freibuis 10 років тому

    root is singular. route is plural. so "rooter" is incorrect. root have many routes... there 4 its a router! (as in many root's) and if your and aussie like me.. "rooter" is one who has a great time (alot) ;)

  • @hburke7799
    @hburke7799 9 років тому +3

    I think TOR would make an interesting video.

  • @amigojapan
    @amigojapan 9 років тому +1

    was it youtube that was banning Pakistan from viewing their site? or was it Pakistan trying to block youtube in Pakistan that caused this problem?

    • @kalleguld
      @kalleguld 9 років тому +3

      amigojapan It was Pakistan trying to block UA-cam in Pakistan.

    • @amigojapan
      @amigojapan 9 років тому +2

      Kasper Guldmann this seems like a terrible vulnerability that the internet may have against an attack from another country.... in virtual warfare....

  • @Jackklassen
    @Jackklassen 8 років тому +1

    ranker

  • @tedmosby9409
    @tedmosby9409 7 років тому

    arr the day the NSA installed there LAN Turtle

  • @TheJaguar1983
    @TheJaguar1983 6 років тому

    Yes, here it Australia that is definitely something different....

  • @paulmichaelfreedman8334
    @paulmichaelfreedman8334 10 років тому

    Call me nuts but did he illustrate with a private address space??? 192.168.x.y is a network space you see a lot behind NAT routers.
    edit, nevermind, he admitted it when he explained.

    • @DrRChandra
      @DrRChandra 10 років тому

      Yes, but IANA has several "private" blocks, some of which are supposed to be used for for documentation (and by extension, examples like this one). tools.ietf.org/html/rfc5737 So with a little studying, the presenter could have used those instead. A lot of people know the 10/8, 172.16/12, and 192.168/16 prefixes, whilst the other ones like 192.0.2.0/24 are not talked about as often.

  • @joshuastevenabbott
    @joshuastevenabbott 10 років тому

    #7m0s The packets are called HELO packets not HELLO.

  • @kbhushan12
    @kbhushan12 8 років тому

    LOL, BGP messed up youtube access pretty bad!

  • @miserablehero7072
    @miserablehero7072 6 років тому

    i see MUX logic gate in a router system

  • @sogwatchman
    @sogwatchman 10 років тому

    EIGRP FTW!

  • @DSB42
    @DSB42 10 років тому

    Nice

  • @BlackopSandman
    @BlackopSandman 10 років тому

    After 1 year of Cisco certification classes and exams, I can conclude that about 30% of this is bs.

  • @JimFortune
    @JimFortune 10 років тому

    I've never seen a slash used in an IP address
    Never mind. He explains about minute 10

    • @vikohone
      @vikohone 10 років тому

      en.wikipedia.org/wiki/Subnetwork

    • @JimFortune
      @JimFortune 10 років тому

      Thanks for the cite.

    • @EscapeMCP
      @EscapeMCP 8 років тому

      +Jim Fortune Yes, I think they really should do a subnetting video. It's what TCP/IP relies on and people may well have come across it as part of their IP address on their computer. It's certainly been seen by the average user far more than BGP, RIP or OSPF will have been. It's neat how it works.

  • @phisherPhisher
    @phisherPhisher 10 років тому

    nice.

  • @QayLikeKay
    @QayLikeKay 7 років тому

    THA ROOTER

  • @woon1957
    @woon1957 10 років тому

    :D

  • @buggyland
    @buggyland 10 років тому

    first rooter!

  • @random-characters4162
    @random-characters4162 Рік тому

    Why are you confused me so much straight at the beginning?! This is not how educational vids should be lol 😅

  • @OfficialEpicPixel
    @OfficialEpicPixel 10 років тому

    Farewell.

  • @runcyoommen
    @runcyoommen 7 років тому

    The "route" (root) of all evil is Pakistan!
    Got the pun? :-)

  • @OriginBullet
    @OriginBullet 10 років тому

    So if I root my phone in Australia, am I a sexual deviant?

  • @Khaltazar
    @Khaltazar 10 років тому

    Please stop using permanent markers the sound they make is terrible! :(

  • @quartekoen
    @quartekoen 10 років тому

    Wow, that seems like it could have been an enormous security risk (and perhaps still is). Imagine if that Pakistani network wasn't trying to block UA-cam, but instead redirected requests to a site they built to be identical to UA-cam, and which prompted users to update their flash player. Users thinking they were on UA-cam would download and run a file with much less fear of malicious software being installed. Even if it only happened for a moment, it could affect thousands of people.

    • @DrRChandra
      @DrRChandra 10 років тому

      ...except noone but Google has UA-cam's private TLS key. Therefore browsers all over the world would warn their users, hey, you're not actually connecting to UA-cam like you thought you were. The digital signature isn't right. But they could execute a wicked DoS as the video and you propose. The security in the Border Gateway Protocol (BGP) is fairly lax and depends on peers trusting each other. There are also filter mechanisms to prevent propagation of false routes. If for example I've been delegated two netblocks, say 24.48.72/24 and 24.48.96/24, and I advertise I can handle traffic for 128.205/16 (SUNY at Buffalo), my peers (probably one or two ISPs) can disallow propagation of that, or any prefixes other than the ones they know can be reached through me. I might do that to set up load balancing, overflow traffic, or redundancy in case of link failure.
      In practice though, no IPv4 prefixes longer than /19 are propagated via BGP, according to ISP policy...so those example network prefixes above are too long (for BGP).

    • @quartekoen
      @quartekoen 10 років тому +1

      That's a very good point about the TLS key. Thanks for the info!

  • @gonace
    @gonace 7 років тому +1

    Please concider to swap the dampn marker/highlighter type of pens, can't watch these damn video....the NOISE!!!!