After today's video you will understand clearly You will find out how the internet actually works. Is. Because in this video we will understand Computer Networks Step by Step Real With examples. Now it could be that you You think this is just a basic thing There is no overview at all. This video I have covered each and every topic in great detail. I have explained it with practical Implementation. So watch this video Later you will not only understand that the Internet How it works. You will also be able to feel that How the Internet Really Works. if you I am a first year student and currently Recently you started your programming journey Have you started or are you in any mode of life? But be genuine and explore this topic in depth. If you want to understand then this video is perfect. resource because these videos will help you Will do it for your college exams. Yours For placement preparation and along with this To understand the topic in depth Obviously this video is going to help. Is. I have a small expectation from you I keep it. You will see this video not once You will watch it multiple times. Revise points You will do it again and again. Pause the video and take notes You will make it and take a small challenge. that I like every single thing taught in this video. The topic has to be mastered. If this video After watching this you genuinely feel That our efforts are a part of your life Making impact puts. Our content you If there is valuable content for people then Please share this video on Lindin, On Twitter, on Instagram so that people can reach so that our content can be accessed and please Leave a comment below the video After watching till the end this video What did you learn? this is meaningful Sharma. You are watching Shree Sporting School. Let's Go. hello. So read Computer Networks let start. Even though the title of the video Of course, that was How the Internet Works. But how To understand internet work, you need a computer. Networking, which is a broad topic, Understanding is important first. So in this video we What are you going to read? I give you a Let me give you a small overview. and this I can also add a time stamp to the video. I will give you some specific information so that if you have any specific information, If you want to read the topic then you can also go there. You can go directly. But my suggestion Will watch the video carefully. Very There is going to be a detailed video. You will also enjoy You will come and learn a lot from this In the video. So the first topic is how Internet Works. So the internet exactly How does it work? After that we will go towards understanding a little bit of history because Exactly how did the Internet begin? Very It is an interesting topic. His internet What role did the Cold War play in the beginning? What was the role of USA? What is the role of Russia? Was? Victim Berners Lee came who www He started and created HTML and We will understand a lot of things exactly. Why was it needed and how was the time By time, how many people Contribution was to make that internet For the one you and I are using right now. After that we will move on to the next topic. data How does the transfer take place? Optical Data from one place to another through cables which are connected through optical cables across the oceans. How is the data transfer from them engaged? What happens from? What is the role of the cloud? How data is stored in the form of packets Transfer takes place. ip, tcp, ip What are protocols? of all these A little bit about your brief knowledge Will take. By the way, going forward in the video we We will also understand them in detail. So don't worry About that. After that we will know the IP What is an address? one of your computer Particular IP address and port number Basically what are your applications? Are you using it? What is their role? Is. After that we will go to Types of Network Towards understanding how networks There are. Now we have understood a broad topic. Lia How Like Internet Works. in what way Also understand that data is being transferred from I took it. So in what way is optical fiber Data is transferred through cables. You will enjoy understanding it. Then After that we will go over types of networks Like what are lan, man, van? Local Area Network and all that. Is? We will understand this topic in detail. After that we will go to understand topology On the side. So what are topologies? Exactly bus topology, mesh topology in We will know about everything in detail. His Our next topic is going to be Friends, let's take an example of Zomato. So exactly if you have done something on Zomato If you have placed an order, how is it Does it execute? Which way on the internet Where does your data get transferred? How He reaches the restaurant and says, brother, this is such and such place. The guy sitting there accepts biryani. I have ordered curry. So if Sarthak had biryani If you have ordered it then how should you prepare that biryani? Will the order be transferred? In what way does Sarah The work is about to be done. what is my request will be managed in a manner. We will understand About the OSI model What happens? and the Seven Layers of OSI Model, Physical Application, Session, Data Link, Transfer means almost everyone There are readers. After that we will know that How do computer users communicate? What is client server architecture? What is peer to peer architecture? We are going to understand all this in detail. Are. We'll go further in the video and Will understand the protocols. there are some sets of Rules. Just like there are rules in the military. Well, there are some rules on the internet here. Are. We will understand the protocols. About IP, Internet Protocol I will understand. TCp about that too Will understand. UDP about that too Will understand. What are the methods of HTP? Are there? I will understand everything. Your websites What do you see on the internet? The way the data has come to you. If you Are you using any application? If you are someone How to play email games They will understand that the transfer is taking place. After that We'll go ahead and go through TCP UDP and this is what I've done. Just these topics to give an overview They are written. This is not going to be all that. We will also introduce many new things in this video. There are readers. So please stay tuned and Sit down with a copy and pen because the video It's going to be long. You will also enjoy it. Notes If you want to make it, you can make it and it will help you Maybe it can help in college also. But going further in life, if you do anything Let's read related to any technology. What I am going to teach you today is your It's going to help a lot. so this is Basically a foundation video for likes Everyone who wants to come into this field also So, if you want, you can share this video. Can. I think we have a lot of We have discussed it and now we need to address this topic. should start with the name Computer Networking. Let's get started. Let's Go. So before understanding how the Internet Works. Let us understand one more thing What is needed is the internet. So these words Internet what does it mean? Internet is basically a connection between the Computers and an electronic device Available on the internet which is used to Transfer information from one device to another Which follows some set of rules. Now I have I added a lot of English. But listen Pay attention to what I am trying to say. It It's basically a connection. That's it. Anything else Not there. Meaning, let's assume that here There is a computer in front of you. My Don't pay attention to the writing because it's very It's bad. But let's just say there is I have three computers here. This is A, B and C. I accept my There is another computer nearby. And I have one And let's assume the computer is E. now what Is the Internet? The Internet is basically a connection Between these devices. That's it. whose Through these people are able to transfer data and There are some set of rules to follow here So that the data is transferred correctly is happening or not happening and or data Did it reach or not, where did it come from? Where will all this internet stuff go? You can understand it as a definition. Like If I Google it, here it is But you can see if I search what is internet and you will be able to see what Is it internet? a world wide system of Interconnected Computer Networks and Electronic Devices That Communicate With Each other using established set off Protocols. what are protocols Brother? These are the set of rules. means something There are rules through which data transfer takes place. Is. So it is a world wide system nothing Else. Meaning it is basically an interconnected Network of Computers and Electronics Devices. That's it. Ok? And here I had talked about some rules. Such as You must have heard this sometime in the past. Transmission Control Protocol through Data is delivered in the form of packets Is. For example, let's say I have installed a device Sent data to another device. let's assume I sent a message to Sarthak S A R T H A K Sarthak. I sent a message from here Is. So what is meaningful is not to go together. The place will be delivered in the form of packets. So How are those packages made? Something called header is placed on top. That is, the IP address of this device and where Want to go? So let's say I You take people for granted as letters I used to write in the earlier times. So when I used to write letters, used to write letters, postman If I used to send it to him through K, then I would send my He used to write letters. on the cover of the I want to send my address along with delivery to whom. He also used to write the address of the person to be contacted. I I have never done curry. But he used to write something like this In a proper way. Ok? It would have been the same here Is. Data transfer in the form of packets and there is a header above them. So Data transfer from here to there Data arrived. and the data that if you If I give you an example, let me show you my Terminal. So here I go a little bit I'll enlarge the terminal so you can see You will understand better. So here you are If you see, I have written ping here. Let's say I wrote this on shars.com We have a website and I just started this If you press enter here, you will see here You can visit sharans.com which you can find here The IP address will also be visible. From here We can see that it's 64 bits here. in means in the form of data packets 64 in the form of packets of bits or bytes Here's where the data is coming to us and here But there is something about what is ICMP sequence i.e. In which sequence are they coming together? What is TTL Time to Live and what time is it? Pay came and how is the data coming In front of us, here we have something like this Things appear. I am using this for now I terminate the process if we If you want, go here and visit our internet You can also see. Let Me Show You shars.com When I opened the website here and I'll go inspect it and go here. On the network panel, you can see here I can't see anything right now but as soon as I open the website I will reload so here you will see some things will be seen coming here What is their status code? You may have heard What is a status code? 200 to 300 You mean things related to success. Whatever error you have got from 400, then it is It is meant to be told. type here It has happened. Our editor brother zooms in on you I will show you. I also do a little bit So that they do not face any problem. So here you are You can see the initiator. Is. You can see the size, every bit. What all was there? of every single data that is here But it has come. How much time did it take you here? So we see all these things here. Are. We will discuss this further in the video. We are going to discuss it in detail. So don't Worry about that. So about the internet I understand. First of all, the internet is basically A Connection of Computer and Internet devices electronic devices that are Created to transfer data to another Have gone. And it is basically an interconnected network. That's it. Now we move forward And the next topic we have to understand here We will understand about this. what is tcp It happens? What is UDP? Such as I told you about TCP. in which data travels in the form of packets And here a set of rules is formed that brother Sir, the data that has come from here to there Should reach. there is something known UDP. What happens in UDP brother? Data travels faster in UDP But it did not reach, there is no guarantee of it It doesn't happen. like you Have you ever seen someone's live streaming? Will happen. For example, you assume Sharians that we are doing live on YouTube So if you look there you will see the data It doesn't seem to be reaching completely. Video The quality sometimes fluctuates a bit or you see some pixels missing Or we play games online. So sometimes when the ping is high in that, we Things start appearing crooked. a little This makes our pixels appear distorted. Are. So there are following UDP and TCP This is how things work here. Brother Sir, you will also understand what happens regarding this. Is. We will understand in detail. First of all we Want to understand what the Internet is? This is us I've got it. How does this work now? We will understand in the process. ok sir? So Now let us understand a little history of this Where did the story begin? This internet that we Using it today, where does this start? Let us understand about the beginning of what has happened. Are. So the story begins World War Seconds later. like world war 2 that you know two you can say powers were Allied Powers and Axis Powers. Elite Power I used to be in the USA, Russia, China, Britain, all these countries and the Axis Powers Germany, Japan, Italy and All this. So as you know, Alive Power had won this war. Isn't it? The USA nuclear attack and then Whatever the story is, you know it after that. So what happened? Russia and USA both won. They certainly were and lived together, but The ways of thinking of both of them, their The mentalities were different. USA is a Capitalist country that believes in liberty She used to do it and Russia is a communist country. So there is a debate between the two to become super powers. Because both are very big countries Was. There is a possibility of becoming a superpower between the two. A race started between us two. Who is more powerful than and it started Space Race. Dominate this space race Russia. He launched Sputnik and Sputnik was the first artificial manned satellites that went into space and From there Russia started winning this war. Did. So now the USA has a huge interest. After that incident, brother, we are fighting this war. Are losing. Brother, this cold war of ours There is a cold war going on between us, which you can term as the cold war. You might have heard it sometime. This cold war that's going on It seems Russia is winning. We lose Have been. So what did they do? They Created an agency which is called an agency Which is called Arpa Advanced Research Projects Agency Arpa Arpa Basically What did the problem do? The problem was that earlier the data Which used to be the data centers Let's say this is center one this is Center two was the center of data in this way, so What was the USA afraid of if Russia attacked us? If there is a nuclear attack, our data will be lost. Everything is centralized in one place, if there is an attack on this If this happens then all our data will be destroyed. This will become a very big problem. What did he do to avoid it? E Made Arpa. Arpa's work was basically data In what way among the military Is the transfer taking place? Its a network type These people should create some structure. which later became DARPA. What is Darpa brother? Darpa Is Basically put defense forward. the rest the same Old Arpa. My writing means a lot to me. It looks dirty brother. Pardon me. But Darpa It is written there. So made from Arpa DARPA. Now brother, what was his role here? ARPA and DARPA. You can say this. What did he do? They started Exploring the Internet. and DARPA This work was given to some universities through internet Technically it would be called making. So What happened? Where did the story begin? Story starts when four universities University of California and Los Angeles Angeles, UCLA, University of Stanford, University of University of California and S It was called something like Santa Barbara and Last up was the University of Utah. So this Four universities have been asked to develop this network. and all these universities being interconnected with each other Was working on this entire project. So I think you guys understand this story. How will these people meet each other? was working with. What is the role of Arpa? Was? How did he work? So Around 1960, the USA created ARPA. Now there used to be a scientist from there Whose name was Paul Baron. What did Paul Barron say? Said? Instead of centralizing data, we Will keep it at different places. what will happen to it That if there is an attack at even one place. Accept it or not, let's accept that these four are our There are data centers. So let's assume UC If there is an attack on LLA then these three They are interconnected. So these three are Will be able to transfer data in between. Any The entire network will not be destroyed. What Are you able to understand what I am saying? Among themselves Things move in a continuous process Will remain. So far, I think the story is Yes, you must be understanding. what happened after that? Paul Barron said, "We do one thing." Are. The data we are transferring We will not transfer together. to the data We will transfer it in the form of packets. Meaning we send small packets of data and collect those data packets in one place from one place to another we are transferring Will go. Do you understand what I am saying? Ok? So in 1969 in 1969 University of A message from California and Los Angeles Sent to the University of Stanford. Sent a message. That was the message, brothers. in. He sent a message. This was the First time where internet's heart beat Was heard. Where the Internet began. Isn't it? He sent a message to L.O.G.I. N. This was that message logged in. But what Happened? Date Transfer in the Form of Packets It was happening. So L and O passed but Could not pass GIN. So LO pass happened and the system crashed. a little of which After some time, the entire message was also transferred. Was. and this is known as the starting of the Internet. So the first message from one place Sent to another place with the help of internet That message was LO LO, what do you want to send? Were? Did you log in? Take. I hope you This is also understandable. Right? Let's go here There is no problem till now. I understand even Where did the internet originate? Is. Now if we go into a little more detail Go. I want to create another page here. So this is what I can create a page for? All right. So I think even whatever you I learned these things and understood them a little. Must be. If you go back in the video, it will come Understanding. Now what happened here? the message is Transfer happened but later on in things A little problem arose because a There was no centralized language from here If you are sending data till here then there is no need for that There wasn't a basic set of rules. so one Wind surf and bob used to be scientists Can you get their photo here on the screen? You must be seeing it. He developed it in 1983 In TCPIP protocol. what is the protocol Are there? Like there are rules in the military Are. to execute anything A set of rules has been made for this. same way He created a system to run the internet. Created a set of rules which are non-TCP and IP. What happened through this? For For example, I have a place for example. It was a big message. So what did I do? Let's consider that message as packets Broke into shape. Now this message is I want to send it from here to here. So The first packet will go first. This is the first packet that ran Went. Then the second packet will go. then the third The packet will go. Then the fourth packet will go. And Go here and find all the broken packets. They have been taken here and added goes. So I took these here Added the packets. something like this is No, these got mixed and joined. some way like this From this came the TCP/IP protocol. After that National Institute of Scientific and Industrial Research Institute of America something like this The institute which received NSF NET Made. And yes yes yes a very important I forgot to tell you something. This is the first These are the things that Arpa developed in the bar which is being transferred from one place to another Was. This thing is known as ARPANET was the first to be developed The ARPANET was developed around 1969. thing is known as rpanet i hope ya understood You guys will get it and here TCPAPI Protocols were introduced that The Internet as a centralized system was developed in which meant that you Any message from one place to another If you are transferring, how will you do it? It will be transferred there and it will develop. Now How this works, we will go into details later. I will go and understand. After that, in the 1990s Around 1990, there was a scientist named Edge Team Berners-Lee. Tim Berners-Lee What did you do? I will shorten his name to I will write it down. T. Berners-Lee. Team Bernersley developed three important Things. The first WWW World Wide Web, which allows you to access the entire world technically in the form of a network can add. A basically internet Here's how to connect to your browser. He developed You might have heard of this too. And he also said a very important thing I developed the name of which I can go here and write it below. I will write down which is HTML: These are some of the things he developed. Currie was a British scientist who was further If he gets the knighthood award then his name should be there Sir Tim Berners-Lee went so if you If you want to become a Sir, then the British Knighthood Award Go ahead and take it, I'm joking, but 1990 Tim Berners-Lee did these three things around 2018 Developed around http and html What? What happened because of these things is that you now The internet became accessible to everyone. Internet Everyone could use it now. to the internet It was linked to the browser which caused this That is, they created a language. Whose name was HTML which was the browser's We can call it language for now. He created HTTP which helps to connect browsers to the Internet And the World Wide Web, which I mentioned I used to help people just a while ago. To connect to . http is basically a There used to be a protocol. and some way He developed things from it. about everyone I will read it over time. Ok? So this was it A Brief History of the Internet in Short Told. Well, that's a lot of detail. So if If you are interested then you can read about it I must explore where to start. Was it from? It all started here, brother. Around the time of World War II. That is, the one who World War II used to happen there. Later the Cold War started. on the Cold War Developed in the fight between the US and Russia Internet happened. And how many are there It was the role of a scientist. First were our all Baron. Then came Brother Windorf and Bobcan. Then after that we came here Using the Internet Temporarily and Continuously Development continued. my phone is off It's going to happen by the way but no problem No. After that, the Internet's Continuous Development continued. Around 2000 Brother, more updates are coming. The boom of the internet Came. then after that after that brother Claude Computing Streaming Services UDP Has come. A lot of developments followed Happened. Development of AI SaaS and all these things Happened. Where did it start, now I I think you guys understand this a little bit. I must have come. Then we move on A little bit forward. How data is Transferred. For example, in today's time I can send a message from one place to another. I do. Let's assume I'm here I am sitting in Bhopal and let's assume That I have a friend Aman who lives in USA. In. So if I am Aman from Bhopal to USA If I want to message someone, then what is the data We will understand how the transfer takes place. Just in a little while. Ok? so me It seems you people have no problem here. It will not happen. What I have told you so far People must have understood. In what ways Data is transferred in the form of packets used to do. That's it. Ok? That's it for now This is enough in history. Let us grow Needed Now moving forward. one important thing and we People meant us, not sorry Developers invented the IP address Was. You may have heard Regarding IPV4, you can say that you The data looks something like this 255 dot this is basically a 32 bit system 255 This is how data is transferred was in the IP address. Now the problem was that It is basically a very complex system Because gradually when the internet Development was taking place, a lot of people were connecting to the internet. Now you yourself Think about it. In earlier times, someone I did not save the number. when that telephone When I used to walk, people would memorize the number. Because limited people had phones. used to do. But when the number of phone users increased What do you guys do now? You have someone's number Probably don't remember. You call her name on the phone Let's save it from . Like if you believe me Let's take a number which number is 99988. Let's assume this is someone's number. Now let's assume I remember this number. If I don't want to keep it, I'll save it. I will take it. For example, in the name of Aman. Let's assume it is in the name of Aman. likewise beans Was here. Developed DNA V is known Edge Domain Name System. That means now we each The person should know every address on the internet. We call it a domain name system. Through this we will give a proper name to which Through this he can be identified. Such as If we go to the internet and search We do shars.com so this shars.com that I wrote Is www.sharan.com or http sharan.com I wrote here, This is basically a Domain Name System. If you check its IP I've got to tell you once again And I told you more. Let me tell you one more time. Correct Is? I said here it should be a little bigger. Let's try it. Once before, I Let's assume it's written here as ping google.com so if you look carefully This number which is written in front, this number which is written in front The numbers are written 1 4 2 and something like this Whatever is written here is Google's server. I can say kind of. This is from Google IPP address. You can say your kind of Are. It is one of the servers of Google. This way There are many and in the same way you can If you want to check this also, you can do so. So I think you guys got it this far. How would our work be here? Is. What was the history of the Internet and where? That's where things started. Now I think that we should move on with things and now It should be understood that the data is exactly method of transfer. Let us understand Are. Let's go. Take 32 Action. Now a very Discussion about important topics which is how data is Transferred. That is, how the data Transfer takes place. Now friend, understand this For this we have two ways. First The way could be how internally Data is being transferred. of the OSI model What is the role? Application Layer, Network What is the role of layer, data, link layer? Is. We will come to that a little later. Now! I will explain to you how to externalize data Transfer is taking place. That is, for Example, I assume I am this I am this is your Sarthak Bhaiya. and meaningful Bhaiya admits he has a friend. Peace. Send him a message. On WhatsApp Let's accept the message. Isn't it? now when If I send a message, how will that message be sent? Have you traveled on the internet? Router from here How did he go to Then how does the ISP have Went? What was everyone's role and how did they do it? Help me transfer my data For? We know what it feels like? We think That's where this data went. This went Near WhatsApp. The data has just arrived brother. The message has reached. The blue tick has arrived. As such It doesn't work. A little bit about it in detail I understand. Come on let's go. Ok? Let us go Listen carefully. Let's assume that I have peace has sent a message to Hey, let's assume I messaged Aman. Now listen, what will happen here? What is the role of things one by one Let's understand it line by line, okay, first of all. WhatsApp will come in my phone in roll The application is installed. So here is my Whatever this message is, this message is with WhatsApp. will go and WhatsApp phone means WhatsApp My WhatsApp application inside the phone He will go to him and uses WhatsApp There is a technique called end to end Encryption. If you have looked carefully So it is written there on top of every chat This message is end to end encrypted. That means you have sent the message from here. Value Let's take it, I have sent a message to Aman. Even WhatsApp will not be able to read it and Some third party guy came in between. So he too will not be able to see. The message I From here I am sending that message to Aman. It will reach and only Aman will be able to read it. Will get it. This is known as end to end Encryption. Now how does WhatsApp do this? They understand. Ok? You heard the Word will be Encryption. And you might have heard another word Decryption. Ok? That is, let's assume that I sent a message from here, so I The message that is sent will be called encryption. And the message that went to Aman is Aman who Whoever does Aman's WhatsApp will do it. Decryption. Ok? But now we understand What will happen with attention? assume that I have mentioned here that WhatsApp has the highest number of messages. What will WhatsApp do first? my phone's WhatsApp sends that message in the form of packets. I will break it. Ok? Accept my message What was my message? Hey now that message Will break into packet form. I….to you When I told you about the TCP protocol I had told you. WhatsApp also mostly uses TCP He uses it only. So that's the message to In packet form rather than bulk shipping and makes sure that he Messages are transmitted from one place to another smoothly I have reached. ok sir? Now my message which is available in the form of packets from here It has been delivered. Now those packets are packets an envelope type cover over here Type is added on every packet Which contains the IP of senders and receivers IP and some meta data like the time Stem and all. So you go here Everyone has created a cover on WhatsApp. This is the information on the packet. I mean, as it was my letter, I wrote on it No, I had put the entire envelope. same way Something here. Now what did WhatsApp do? That The packets of the message can be called that message. are encrypted. encrypted it In the form of binary. what is binary brother It happens? binary you guys know what It happens? encrypted that message In the form of binary. That means now he No one can read the message. The message I I had sent it, now no one reads it in between. Can. Here is my message Binary format has been encrypted In. ok sir? Now this thing about WhatsApp This is the message, this is what I sent here. Was. What will happen here now? can say this What will happen in this step? This will check that my phone, my phone, is connected to the internet How is it connected? Can I use any SIM? Accessing the network through Direct I am like 4G 5G whatever happens then either You can directly use 4G or 5G are you accessing the internet or Using Wi-Fi. So if when you If you use Wi-Fi, then Wi-Fi The router is installed here as I am doing this I am sitting in the room and there is a Wi-Fi router installed. It is in the outer room. Ok? So now his What are the roles? So let's come towards him. So let me clean it up a bit. So that you will understand it by looking at it. I understood No? What happened first? First of all I The message with the name was on WhatsApp will go into the application. He gives her packets of will break into the form and with it my data What will you do to it? will delete my data Encrypt. I hope you understand this How do I encrypt my data here? It has happened. Now let us do one thing. We People assume this. I am currently I am using Wi-Fi. So we have Wi-Fi Let us take an example of this. Ok? now over here My data will go to my Wi-Fi. near the router and on your phone with Wi-Fi chips that can emit different frequencies She works on You may have heard 2.4 GHz and 5 GHz, you might have heard about it. In. Isn't it? 2.5 GHz is what it is Supports a wider range of basic Is. Supports wider range. But There is a problem with this. With this The problem is that its speed is very low. More is less. Ok? 2.4 GHz means you can hear it from a long distance. You will be able to access it. But the speed is a little C is less. When we talk about 5 GHz If we do it then it has a little less range The spelling of C compare to 2.4 range is something like this I have written it in such a way that you understand and if we If you understand it a little better, then its speed It is high. Ok? So your phone has Wi-Fi. The chip that you send data to in the form Off radio waves. Meaning your data in the form of radio waves Whatever is there will go to your WiFi. Now It is installed on your WiFi router. Antenna or we can call it receiver Are. So from here I sent the data so most WhatsApp encrypted it first. Broken into packets. to those packages He got it ready. to encrypted data What did he send? Sent to the router. Now My router is the router that is installed there. It so happens that the router is between these two It works on frequencies. whoever wants You can use it in that also. you saw It will also happen many times. Now this is my router. What is its function? This is the router routers connected to that router Devices that all have an IPP address provides Is. Provides the address. I One deque was added to the address. don't worry Happen. So going here we understood that WhatsApp first encrypted messages Get it done. Then after that I went to the router. Now the router What is the use of this place? What the router will do From here? So let us understand that. But his First I want to explain a little bit about IP addresses. Let me tell you. I even told you by the way Let us understand once again that our IP The address would have been It is basically of two types. IPV4 IPV6 right? We are currently using IPV4. Are. Most people also hear about the V6. Will discuss. But now this is my message which my router gave me a local IP Had provided it. So when my message went out My router also lost my IP and I went to my router with the IP My port number. Now brother, what about the port? Does it roll? Where did this port come from? If you have ever used HTML and HTML Run your code. So while running We used to use live servers which Our port used to give us Rs 5500 each. Our live server used to provide the port. Now What is the role of port, brother? The port basically tells us it is How many ports are there basically brother? 65 meaning There are around 65535 ports. Now this What does it basically decide about our port? IP addresses of the messages you sent The address is for the entire device. Which one The application will tell you that IPP address there. Can you tell me whether he is sending it or which one? You have to pass it inside the application. So he tells the port. Like taking an example Let's see. You must have played PUBG. It doesn't matter if you played PUBG or not. But there is a message option in PUBG. Was. So if we assume that I have played PUBG If you send a message to someone inside, now PUBG This is an application that works on any IPP address. Must be doing it. Does any IP address work? must be doing? I know this. But PUBG will have a port number. Ok? i.e that any application that you are using It has a port number. how many are there Brother? Our ports number would have been around 6500 35 Are. of which from zero to Till 1023 it is called Vel Known Well Known Ports. Or you can use them as system ports You can also say. This is your system, they are yours reserves for. also called reserve ports We can do this. Isn't it? then after that His after I got something from Rs 1000 to Rs 49000 I don't remember the exact number clearly. These Basically there are application ports. So Each application works on a different port. Does. As you may have noticed, when we Create a server using NextJS So it works on port 3000. like when If we use live server then 5500 when we If you make it from white 5 7 32 In this way, some are different for everyone. There are ports. You can understand, right? So these pores basically define that Which application do you want to use here? The application has sent your message. So here But going to your router whose role was that This IP address of yours has the port Number is also included. Meaning from here IPP address and port to which the data was sent Identified the number. Now this router What is the work of? A router is basically two things. Does. Just two things. The first is the message to receive to do and also inside it NAT net To apply. Brother, what is net? Network Address Translation. Because the one who My IP address was my private one. IPP address. It is not valid on the internet. Is. So that will convert the private IP In which format? Format of Public IPP In. Ok? Which anyone can see on the internet Can see. So go here and my IP What IPP address used to be the address Was? Private. What did our router do? He was converted. To apply this net This means my private IPP He converted the address Diya Public In. Because there is no private internet But no one recognizes him. But Everyone recognizes the public person. So the router What did he do? who converted him In? In the form of a public IP. Here I have no problem and neither do you People will think that here we have just done two The same steps are written. a bit more here I did not write it. Our data here Had come to WhatsApp. of packets WhatsApp broke it in the form. encrypted it and the packets All the envelopes etc. that were to be put inside were put. He gave it. Then where did the data go? router Near. The router transmits data via radio waves. From here I sent the data to the antenna Catch him through. to receive it After that apply NET in it. NET Apply What will happen if I do this? By applying the net Your private IP should be converted In which did he go? In public IP. by the way This was my next topic. So in this you You might be able to understand it a little bit now. I You will also know a little about IPV4 and IPV6. I will tell. No problem here now Not there. Our message went to the router Has gone. What will the router do now? The router I applied for NET. Then our router to the message ISP means Internet Service Provider Will deliver to. Now which ISP is this? Am I using it? I assume you use I am living Jio Of. Let's assume I am using Jio internet. I have been. So Jio people gave me one of their own. Router was given here to connect Wi-Fi router. So from here this router of mine This will provide internet service. This is the router's The message was I am really sorry for that. These The message that internet will go through the router to service providers who assume I have Jio now or if any of you If there is someone who is using Airtel then Airtel or BSNL or whatever you want to install You can apply it. So something like this here The data will go to our ISP. So I think there's no problem here Is. Take a little pause whatever I did I have explained it so far in the video, go back and Revise them. I think even There is no issue. So now we can move forward Are. I'm going to correct this diagram a little bit. I do. After that we move ahead. So As you may remember, I have Message from me to my friend Aman Was sent here. I saw his position a little C has been placed on the side below. don't worry About that. The first message went through WhatsApp. pass that encrypted and packets Broke into the form of. went to the router Apply net on the one who received it That is, from private to public IP converted and then our data was gone near the ISP. Now how does this data go? Brother? This data goes DS L Digital Subscriber Line DSL It goes through or wirelessly. Now Internet Service Provider in my case Jio. Now what will Jio do? This is basically As soon as we assume internet service My data came to the provider. What is it Will you do it? This will check whether the destination What is the ID of the place where you want to go? Where data coming from and together it will look at Some meta data and this shortest path He will find that brother, let me reach peace. to be delivered to someone who is based in America For example, what would be the shortest path? So taking the shortest path, they move forward. The data will go. So let's assume that it has a Took the shortest path. This is the Ah position A and then this is position B. This You might have heard of taking the shortest path. Digix algorithms do something like Things. So this is where it comes in handy. basically Data went from here. took the shortest path and Through this the data is moving forward. Now My data will go from here, this is my WhatsApp Did you spell WhatsApp wrong? did. Using the WhatsApp app Server. Now I have the data here. Up to WhatsApp's servers. Now for WhatsApp The data has arrived on the server but as I told you guys that the message which Yes, mine is encrypted. So WhatsApp He cannot even access the server of that data Has come here. Now WhatsApp's server Where are you brother? WhatsApp server is not working for me right now In the US as far as I remember WhatsApp's server is established. Now Is it not in India brother? No Not in India. So brother, where is this data? Did it go the right way? This data was sent via optical fiber. With the help of cables. What does it look like? If I were to tell you, if I go here I am writing to you here about submarine cable. Map. Here you will see that brother Sir, through how many cables do we Are connected. I mean, people say that Data brother in cloud, not in optical Data is going through cable fibers. This This is our India. and the biggest in India You can say a company that manages all this Still working. His name is Tata. And you see Can you see how big these cables are here? It's starting from here. And from here How many continents are it connecting? You are watching here. Isn't it? here I went and clicked on Let's Suppose. This is Apollo. Now how much is this Apollo? It is big. Where is it coming from? if you want You can see anyone by clicking. See You can here. These continents It is connecting. 4600 km It is long. What is coming to India. go here I assume you click on this cable. Get it done. So hey brother, 25,000 means It started here from France and it is going How far has it been? It is going to China. There is such a big cable here. Now this is visible How do you give it brother? A fiber optic cable. optical fiber cable It looks something like this Are. Some look like this. Ok? Some look like this Brothers. You can see. Brother, these Sharks etc. do not eat it. no, I don't eat Brother. Don't worry. Ok? because enough If they are too coated then no one eats them. Don't worry. So this is how your Data transfer takes place. so many things It is inside it. Now understand meditation here. From. Here he somehow moved around Here our data is transferred to WhatsApp servers. It was provided. now here after The further process starts from here. WhatsApp Go here to the server of WhatsApp and will go to the server and check if my Friend Aman is online right now. If If it is online then the server of WhatsApp He is transferring this message to Aman. Will give. Brother, this is not directly the same thing. The process goes first to the ISP and then Router and all will run here. If you accept If Aman is not online right now then this is his The pass will store the data. In which format will you store it brother? Encrypted. Stored in encrypted form I will do it and keep it. And as soon as Aman comes online So there's something there on your phone. Non AI push notifications. will go there and There he will say that brother send him a WhatsApp If you get a message on it, it will get a notification. Send. Then Aman will get a notification that You have received a message from Sarthak. Are you able to understand what I am saying? and like The message will come here only on WhatsApp's server But you can say one thing, the response will come that brother Message What is there has been delivered Is. Or another message may come which Yes, you must have seen the message scenes etc. How everything that happens works out Is. So if this happens here then go here I don't know what role WhatsApp's server played. I don't think you need to explain. What is the role of WhatsApp's server here? Was? What work did the WhatsApp server do and WhatsApp's server can also be accessed here to access the data. and will store the data He will further send it to Aman. If If it is not available online then store it with you. It will do the work and I will get the response later. He will also tell me to transfer the message to brother Aman. Did it happen or not? WhatsApp in this way It works. What I just told you I just told you the process. How to transfer data externally Used to be. And go here for WhatsApp The server also has a lot of things. Meaning WhatsApp must have a server. No, not a computer. He has a lot of There will be servers. So there will be a performance What will load balancing do? so that Your data that has reached there is should be sent to the server so that it can better In a way that can balance it. his load Can balance. So that program there It will work sir and then this data will reach Aman. It will reach there through the same process. So so many things were involved here. How easy do we think that data is from here? I went ahead and got my work done here. Went. But the scene here is nothing like that. Buddy. A little and a lot of things work Is doing. I mean, internet in a day. It must not have been made, right? Time to become the internet Felt it brothers. You guys probably understand. Is No? So now we move on to the next topic. Which was the IPP address and I went here and I have explained a little bit to you IPP About Address and I and Ports. I Explain it a little bit better Let me explain what IPV4 and IPV6 are and What is a port number? I think that You should understand this a little. Ok? So this Go to the topic first tell me before Are you still alive? Comment The section is open. Do you understand or not coming. And I know it's like this is Just A 10 to 20% knowledge that I have right now Till now whatever I have to say about this topic Level of knowledge I have learned so far I am bringing it to you from here and there. because the video then almost goes away Otherwise, this is a very big 10-12 hour period. The video goes away but I'm trying my best. as simply as possible and My editor Sopu is sitting with me. The name is also meaningful, by the way, that too is very If you are working hard then please support me brother. Comment below and tell us your IP address. Go. Before that, please leave a quick comment. Go. Then we move forward. Let's Go. Now a little about IPP addresses and ports Let us understand the number in a little detail. Because I discussed that topic a little bit in the middle. Had left it. So let's talk about IP addresses. of. Now the question is what is the IPP address brother? What? it is basically a Internet Protocol. Protocol Whenever Word Your If it appears, try connecting it. Protocol word as a rules. Meaning, understand it like this that IP address or Internet Protocol Address (IP Address) is basically an Internet Protocol address. But here is your address. That means on the internet you Where are you situated? What is your location? If I want to know where to find it, Will I get it? What does an IP address mean? Where are you available on the internet right now? You must have heard the name of VPA. Virtual private network. basically what does it do Is? This changes your IPP address. Kind of about it later too We will read it in detail. But right now IPP Addresses are now IP addresses, basically on the Internet. This is my location. IPP addresses here We have two ways. which is IPV4 end IPV6 IPV4 means that means here We have a 32 bit system. 32 bit This system is 32 bit, meaning go here and your I told you about it here, friend. 255.2 I have told you this three or four times. But still it's okay. 255 here for your Pass locations from 0 to 25 55 It happens and you can enter your IPP address on these. Anything can happen in it. Total Its How many combinations are there? So for IPV4 Total combinations are 4.3 Billion. 4.3 billion IPP addresses Combinations can be made. Butt Problem The only thing here is that this too is ending. Is. Meaning so many new devices are added Have been. So many connections on the internet IPV4 is becoming more and more popular over time. Are coming to an end. That is why a future The technology was developed, which is called IPV6. This is a 128 bit system. 128 bit system means that here you have There are basically eight positions. in which you Any number from zero to nine and a Any alphabet from A to F. That means this is an alphanumeric number. Go here and keep them in sets of four. Can. So let's say I wrote 1 2 3 A 1 2 3B 1 2 3 2 C and a and a and a and 1 2 3 4 You understand the meaning of 5 6 7 and eight here. Combinations of four will have four digits. Here we and those who will be alpha Numerical means from zero to nine can be any number from A to It can be any alphabet up to F. It is basically a combination of everything Types of Things. And how many of them Are there combinations, brother? Diez R 3.4* by power of 10 38 Do you understand? 10 to the power 38 is a billion Not there. It's not even a trillion. Here it goes I don't know how much you are able to understand? I What do I want to say? Meaning 3.4 * 10 raised to the power 38. I hope you are understanding this. IPV4 and What is the difference between IPV6 and IPV6? Because as Moving with the times, new Devices are coming, new networks are coming. Have been. So we need more and more One unique IPP address for multiple people Can provide. So IPV6 was removed. which is much more advanced and this It's not going to end soon, and because It is unique. It is also more advanced. Ok? Let us go. So I think the IPP address is a bit We are understanding a lot now. What happens? My local on the internet Address. Now let's accept what happens That I live in a building. Sherion Scoring School building In which I am sitting right now. Now the IP What did I know from the address? My What is the address of the building? if I knew I want to know what is the address of my room? Meaning if someone comes into the building then it will be He might have come into the building. my room It hasn't arrived yet. then comes into the building Two garlands will be offered. After offering two garlands, He will come to my room. So if I need If I want to know the IPP address then IPP Address: Basically, he would tell me the address. It is quite a good way. But if we If we need any particular Application number in any particular We will get the application number. I also told you the port number from the port number. I gave it, probably the port numbers are basically From zero to 65500 something right now Let's discuss that only, wait for two minutes, let's go Come on, let's go, okay, let's talk now. This is what it was all about That's all for now, this was all about IP. Now let's talk about port numbers. In. So the port number is basically our Which port are the applications sitting on? They help in explaining. Because Different applications on different ports Will remain seated. Neither the IP address of the device It happens completely. So the port number Basically it is 650 500 35 out of which From zero to 100, 23 are reserved. Ports, well known ports, or systems Port. I had told this. So I this I am not telling you again. From 1024 49000 151 means I remember the number well. Not there. Go and recheck it once. Deez r non-s application ports that your Games, Applications, Web Pages, All These Pay Assignments There are. And it works something like this Are. From 49151 to Up to 65000 535 these are called temporary Ports. Ok? Ok? So temporary These are called ports. and even some of this How your IP port numbers work Are. As you may have noticed, http The port number is 80 and that of the live server I told you it is 5500 and the price of weed The server is created and it has something like 5732 I don't remember such a thing very well. Take. Some work like this here Are. This is about IPP address and port Number. You heard about something else? Which is known as DNS. Brother DNS What happens? Domain Name System Correct Is domain Name system bhaiya what is dns what is What is Domain Name System, now IPP address is a number okay I've also done that before It was told that IP address is a number and the number It's very difficult to remember at first It was easy in those times that limited people have access to the internet, we can I could remember IP addresses, but so many People are done, so what does DNS basically do? DN NS is more like a phone to book. Like your phone assumes you Let's assume that I am Harsh Bhaiya's I don't remember the number. Ok? let's assume That's Harsh Bhaiya's number. 999 888. Ok? This is Harsh Bhaiya's mobile number. Is. I don't remember this number now. Easy Is. I know it. But let's assume Harsh I don't remember brother's number. So I What should I do? On the phone by the name Harsh Bhaiya I will save this. Now what happens with this Will you go? When I open my phone and there I am I will search Harsh Bhaiya's name and there I will go and put it in Harsh Bhaiya's name. Call. So which number is the call basically on? It is on this number. This is DNS domain Name system. Who provides this? There is an institute. A this is basically non It is profitable. I can now its full form Firstly, I don't remember the full form of the name. It happens with great difficulty. Internet Corporation of assigned names and numbers, perhaps this is I don't remember it well. that I I remember it was told that way. This is basically a It is a non-profit organization that Provides your DNS. domain name The system provides. ok sir? So What happens here? Every single IP One IP is used for one domain name system. Is. Let's say I'm a little bit I'll clean it up so it looks better We can understand from this. Things to come next. I I keep speaking also. You guys keep listening. DNS means Domain Name System I can Provides and it is free at one time Used to be. But now I have to pay them We have to read it. Like if we assume I have to say bye. Like if we assume If I have to say goodbye Sarthak Sharma Dot.com is the domain name system. Now respect Let's assume it will have an IP Let's assume 192.168.0.1 is my IP. So this is why I don't have to remember this IP. This domain name system was created to What happens is that I create a domain name for this Directly redirect to this IP via I can. Now this IP, oh sorry, this There is a domain, there is a story inside it too. If we assume that you have seen this many times would be like A Courses.com dot now if we destructure this a little bit Brother, tell me what is written inside it. Like you might have seen things like this cesarians.com So if we destructure this Do this particular thing is known as top level domain TLD this particular thing is Non edge sl d second level domain and this Particular thing is known as I guess all domain. Ok? This top level domain is our It tells us that our domain name is Basically which category does it belong to? Like I even write it down. here I'll write it on the side. Like it used to be for commercial Things Belongs to Nonprofit Organization Non And you should understand that it is written there, okay. and dot not dot UK with US dot, this is basically a country There are level domains. Meaning, if I Provide service in a particular country If I am using these then these are called country level domains. Are. Isn't it? And there are also some such as Some are niche domains. like I'm here But I will write it down. As you have seen many times It would be dot dave or you might have seen ai or Then you must have seen a dot app like this. So these are basically niche domains. Despicable They don't happen. There are niches. Niche Domains Base Why am I saying lowly? Niche Domains Those who are basically Made to support particular niche Let's go. If I were to write a development based I am making a website. Not a website But development based product or any I am making AI based things so there I can also go and get my own niche based domain. Am. Now where can I get these domains brother? Are? So what happens? As I told you I had told you. I'm going to do this a little bit again I would like to clarify. Dude, I want to stay written. should I give it? You guys should read a little bit. This. Ok? I provide you this I will get the note completed. Ok? then it would have been What is that icon you used to have? International Internet Corporation of Assign Numbers and network it basically it Provides registrars Who are the registrars, brother? Registrars are your Goddaddy. heard You might have heard of Hostinger You may have heard of Big Rock. It must be that this is an Indian company, so it is basically All these are called our registrars. These Basically, registers take this IPP address. and its through sorry its through domain Let's take the name system and it will tell users We will get it provided. like 500 or ₹1000 or whatever the yearly cost is It happens and you can go here and create your domain name. You can say bye. Like if I went And I go here and search GD Pay. I will go to G Daddy and search, let's say are worthwhile shma.com Sarthak shma.com is already taken You can buy Sarthak shma.in for ₹1 per year It will seem so, but understand its meaning a little. There are ways to get some money. Ok? Registration applied in this manner. So You can check the cost and more here. Domain names here. Sarthak Sharma. Shark Sharma. Club VIP Okay sir. then some This is how your domain names are created. So what was I trying to explain to you? First of all I told you this is our last one. This thing is called top level domain. These Basically it tells at the organizational level. This is called second level domain. Such as Lions is written here. as meaningful as shma.com So Sarthak Sharma is It will be called second level domain. And this is basically Our website is called Kind of and Nothing. And before that, what they are applying All this is domain. Like this is our On any particular feature within the website If I have to take it, I'll be here. I will use subdomains. I'm a little faster I speak So take care brother. Ok? and many more Staying put by doing research and lots of reading Yes, this video is for you guys so that Don't leave anything out. So please let me know if You want if you like this video. And if you want anything else please let me know in Comment section. Like it brother To the video. That's all I am saying. Here Till then I don't think there will be any issue. domain You get the name system. from the register Let's assume you have registered under the username It happened that brother, I did something worthwhile Have purchased shma.com. Now it's in my name Up to 1 year Up to 2 years It is in my name for the time being. I have some Pay the cost and buy it in your name. Took. What will happen now? Now I'm using my server I will make it. So my server has something like IP. That IP will resolve and come to me. In the form of a domain name. So whenever someone If you type Sarthak shma.com then my server We will reach that server. Correct Yes sir. Now let us understand externally that Brother, how to date devices are connected. how the data Transfer takes place. I have done everything very well I have explained it in detail, brothers. Isn't it? And I told you about optical cables. Data moves from one place to another. 25-25,000 km Connecting the Continents There were optical cables that ran under the sea. She used to go from inside. I know, many times Sharks attack them. so one There was once an island, I know its name. I don't remember anything that was fuzzy. many of their Internet connection was lost for days. It was because the optical fiber cables were It was destroyed. Ok? No for this There Was a Creator on the Internet I know her name is Cleo Abraham. I write I also give. If You Want to Know How Data Is transferred externally. Cleo There is a video of Abraham. Not watching now First complete it completely, not now. You will be confused to see one of Cleobram This is the video he had posted on wax. Dekhna How Internet How Data How Internet I also have some such videos working I don't remember it well, he said. How to transfer data externally How many big companies are there? All this is there, so if you want you can see that too. For now, let's move on to types of On the network side and types of networks There are many networks like you You must have heard lan van man pan dan van very All are there. I will explain everything one by one And I'll explain a little bit about topologies. About this. So now we understand this Understood what a network is. Now what networks are connected in a way I understand them. First, I want you to Revise them once. In the video Go back. If you are making notes, then take notes Make. Then we move forward. So Now let's discuss types of networks about how many types of networks there are Are. The first one of which we We will discuss that is PA N i.e. Personal Area Network. Personal Area network, that is, let's say I'm For example, this is my Bluetooth phone. device. These are my ear buds. OnePlus's Yes brother, I am a little poor. So you accept it Yes, I am using this and if I want to connect it to my phone. Basically it will use Bluetooth. so it is basically A This is what I created R. understand personal Area network. This is Pan's personal area network. Ok? This is basically a very low range and security inside it There is a slight risk because my There are ear buds. Now I have accepted ear buds. Let's connect it to our phone and I have Vedanta sitting outside, our great I would have accepted the editor even from his phone. If we connect this, let's assume that Whenever I go somewhere, he takes my device Can connect to itself. Ok? And Its range is also comparatively It is a little less. ok sir? So this Is pain. I am not writing here anymore. You must understand that whatever I am telling you I am telling you all to keep taking notes on yourselves. What are the special features of PAN? The range is short at first. This is the specialty The downside is that the range is a little less. Is. Very fast connection establishment It happens. Very secure connection No, but it is fast and has a short range. I work in. more setup etc. There is no cost. Then this off course I mean, Bluetooth was on, right? In this I didn't spend much on Bluetooth. Something different. ok sir. So quite less cost it occurs. Let's talk about the second one, which is Known as L.A.N.L. it is known age local area network. local area network What does it mean brother? local area Network means LAN. basically what does it do Is? This is for a small area. Like for example, I have in my house I have installed Wi-Fi so that I can see my mother, My father, my younger brother and our All the devices are connected Can. This is known as local area network. Small. Like our Lions There is an office, so we have a Wi-Fi is installed. Now local area network That means what are the special features of the lawn? So The speciality with this is that speed comes first. So you get very good speed. Security is available with firewall and many more. You get all the secure networks Here. Along with this, there is also an evil If we assume that for a while now Earlier the lights went out in our dojo. So As soon as the lights went out, the Wi-Fi went off. Everyone's devices that were connected are gone. Finished, It's all over. Ok? So LAN means local Area Network Area and Network here It is written, understand this is used in a Smaller areas and as if home is yours Meaning, home has become like school has become like That the office is done in all this you local area Use the network. here devices that connect to one Some are for smaller areas than others. Speed It is a little more. Security remains It is quite good and lives quite well too. Are. That's it. Meaning work in a small area If you are doing it then the cost would also be a little less. Is. Isn't it? I mean, in comparison to a pen It may be more but it is a little less. Next let's talk about which is known as M A N Man. Man means man. No Man Meaning Metropolitan. Now check the spelling once again I don't remember taking it well. Metropolitan area Network. This is basically They are city based. Like your cable One cable service in the entire city providing access to all people It is reaching. can you understand what I'm saying Are you? This is the man. a little It is comparatively costly. speed which is It is slightly smaller in comparison to its length. Is. It is secure and city-wide allowing people to access data or networks It helps to connect to . So It has a wider range. means the lowest Whose range was it? It was a pan. then from him Who had the highest range? I came to Lan. then from him Who had the highest range? I came to Man. Ok? We have the benefits of all three and we have Whatever important use cases were there, I Tell me. There are many things to note. Isn't it? After that we go to Pan Lan Man Done. Then we go to the van Pay. What does van mean, brother? Wide Area network. of wide area network What does it mean brother? This is basically They are country wise. as we assume Let's take the internet as an example. Wide area network. because the internet is all It is spread across the country. like you Let us assume A is like SBI. Ok? Bank Is. Now banks are open all over his country. Are. It has branches all over the country. So Now she wants to connect them. from the network. So what will they use? They Will use the van. The range is obviously higher it occurs. Chances of getting hacked because of its There are more too. Isn't it? So the range is more it occurs. There are chances of getting hacked To a large extent. And the security is quite good You can apply saree to control it. Will go. If you want, you can write one on this also. Will make a detailed video. But the van means that wide area network basically country Wise works to control things Is. To connect country wise. network What does RD Network mean? network R The Network Between Multiple Computers, Multiple Devices Connection Between them. So this country wise people It works to connect. Speed is in It is less than all three. Do you guys understand? What am I trying to say? So this happened When. After that we come to the next page which is I will write the fifth non-age here. This is can can is what bhaiya campus area I should have written the network above. But it doesn't matter, just understand that If I keep my personal mobile in my ear If you want to connect it to the bud then here network has been established this is known Personal Area Network (PAN) Basically devices for small devices Meaning it can also be connected via Bluetooth and wirelessly can come back in a much better way We are on penis, what is penis brother, penis is A local area network such as Wi-Fi The router is installed here. like we If you install NSS then you have to connect everyone with it. So There is a local area network there. pan It provides high speed but security It is very less in this and the range is the highest More is less. local area network That is, if we talk about the penis, then inside the penis The speed is quite good. who can say Yes, we have a limited range. Is. home equivalent, school equivalent or a small If there is an office nearby, then there Will come. Then after these three you will get the disc I should have discussed myself, can but this Is Known Age Campus Area Network. These Basically it is a campus type. Such as There is a college in Bhopal name is RGPV. Now RGPV College is very big. Meaning it is spread over many acres. And assume their multiples in the same college There are branches and each one has its own There is a building. Do you understand what I am saying? Isn't it? So there's an established inside each one A network is required. As if assuming a CS branch has a separate building. So there But they could land. but now What do we need? The entire campus is well Connect with each other. hostels Get connected too. Ok? It's a mess too Let's get connected. So who will come to work there? In? Cain will come there. like IIT It's Delhi. Now he has everything all to himself As much as you can say that There are buildings, as many branches as there are Everyone has to be connected. All the hostels Everyone has to be connected. So who is there Will it be useful? The can will come in handy. Ok? So its range is comparatively longer than LAN. It is a little more. a little bit from Maine It decreases. You get the range. Speed It is quite nice. a little way from Le Lane It remains too much. Meaning from Sorry Lane A little less but quite good She lives in comparison to other people. Correct Yes sir? Man Metropolitan City Based Complete Connection happens and van country based complete There is a connection. And I have here for you I have also included a small diagram here. I had taken it out on So you can understand by looking at this also. Can. What is the range of pan? One The speed is low for 10 meters. personal devices, phones, watches and here are some of his Its specialties and some of its disadvantages are written here. Have happened. Like it has low cost. Easy Two users can connect wirelessly. So This is the speciality. What is there in evil? Very Has short range. A little bit of security There is an issue. What does the lawn do? a building or Then a little like our whole setup right now It is in the same building. Kind of can say Are. There are a couple of other buildings nearby. It is in me only. And the speed would have been a little higher. Is. Schools and offices can connect all of these. Can. Fast is secure. Limited There is area. And read it here, friend. You can see this in front of you. I Let me make it a little smaller. and Sopu Brother, show them properly. This which They can see the diagram. if you want You can take a screenshot. Easy in detail Read this. What is the benefit? what harm Is it his? And I think it's probably good Is. Now we can move on to the next topic. The side whose name is topology. Now topologies What is happening brother? Let us assume that we I have planted a penis here. after planting How our devices are connected each other. So that's where it comes in handy Topologies. Ok? Networks are basically wider in range He talks. Now like us in Lions I am using it. Basically now mesh topology In which every device is connected to each other It happens. Ok? So let's go through everything one by one. Will understand. What is bus topology? Mash Topology Star topology. But before that I want man you sorry this jo network Types of networks, they have a little bit Please revise it. I'm talking about one more thing I forgot to tell you a little bit in a hurry. I will tell you about him once. Am. I want a little bit here Should I make a place here, you guys will understand, right? What is written? What was written here? You will understand, right? Ok? You have to understand it, right? Please. Here we will talk about a small thing. Let's talk more. Which Is VP. You might have heard about this too. virtual Private Network. basically this What happens is this is a way It is an encrypted network that contains This is that I assume that right now your I am sitting on the lions in front and I want that I go home and still my The location should be visible as per the lions. So What do we do here? one of your data Let's say in encrypted form my Which is the IP, now I have changed my own IP I used VPA without using it and So that I can now use IP of some other place through VPN. What should I explain, you all downloaded it. I have done VPA and have seen everything that You know what you're thinking, okay? What is a VPN? Virtual Private Network means I I will encrypt my IP address. Can anyone track my IP on the Internet? I won't be able to do it and I'm using an IP address from somewhere else. I can also use it, it's called VPN. Okay, and a little more if you want it. You can also read it in detail if you want. I mean, there's a lot of stuff here, man. How does VPA work? And you might have heard that he was one of the guys in Brave. There is an option there for your like torque How can it work using This is a different topic. ok sir. So its We will discuss about this sometime. VPN is A Virtual Private Network. I am here I will also write it down. pick up a small pen Me. Ok? this is basically a Virtual private network. In this you can your network Create a proxy and connect to somewhere else Can. So let's say I'm from the Lions I want to be seen, but I'm sitting I will use VPN at home. So that my IP will be encrypted. And if I want to, I need to have the lions If I see the IP, I can set that there also. and show me the IP of the lions She will start giving. It works something like this Our VPN. I hope everything so far It is clear. There will be no problem. Now I think we should move on Towards topologies. So once this topic Please revise it thoroughly in detail. So Now let us understand a little about topologies In. So what are topologies? basically Our networks which are local area networks or Then wide area network or man man Metropolitan Area Network in I have connected everyone. But How do we store our notes on our devices? Topology tells us how to connect. Correct Is? So the first topology that we have You will understand that it is non-age. Topology. Which topology? Bus topology. Bhaiya, what is bus topology? In this What happens is that there is a backbone cable. Now multiple devices can be connected through this backbone cable. are connected. So this is device A, This is device B, This is device C and This is device D. A backbone cable. This I would have also written that particular cable is non-age I am there. back bone What is a cable? All devices in this one are connected by cables and are quite It is more cost effective. If new How much easier it is to add a device Is. Just simple go here and add a new device Had to do it. Take tax Took. that's over. This happened in the network Connected. So it is more cost effective It happens. This is for larger networks. Can't use this. and all There are dependencies on this backbone cable. If these cables accept, let's assume this The cable got damaged. Let's assume the cable is faulty. It's done. What will be the problem now? The problem will be the entire network It will be destroyed. So all our Dependencies are on this backbone cable. And it is through this backbone cable that our entire The network goes. Enough for small areas It's great. The speed is also quite good. And sometimes there are challenges in speed. Also, I mean challenges and whatever it is He is telling all the benefits one by one. Am. So, you mean them in your own way. Make arrangements. I am telling you again. Its first advantage is its speed. It is good. Great for small areas This is good. and add new devices It is quite easy to do. cost effective it occurs. What are the disadvantages? Backbone There is complete dependence on the cable. Together Another problem arises here, assuming that this device B is more Consuming the internet. faster If he wants, then its effect on these devices It will become visible. Ok? Because all these things are on the same cable. Is it connected to this? So this cable is This is our main cable. This is the cable that This is our main cable. Now everyone is like this Are connected. Now it can transfer data faster If you start taking it, it will affect the rest. No. Are you understanding what I am saying? what am I What am I trying to say? then this would be the problem Is. Let's talk about the second topology. is the ring topology. Is it okay brother? What is ring topology? Ring topology by the way is a way of There is topology. I'll change the diagram a little bit. I would like to delete it so that I can stay here I can make another diagram again. Ok? So now let us understand ring topology. about. What happens is that your Devices are something like this with each other from are interconnected. That means something like this Methods From. Now what are the benefits of this? Brother? This is the advantage, my dear. Brother. This is non-edge ring topology. Now The advantage of this is that the data is quite Fast transfers. Ok? and new Adding devices is a bit easier here. It's difficult because everyone Are connected. So take one in the middle. If you want to come then go here and Adjustments etc. will have to be made. a little You understand what I am trying to say, right? The first advantage of ring topology is the advantage and Loss means I would throw it all away at once. Am. You must be confused. So listen. This is the first advantage of ring topology. data Transfers quite nicely. It is also cost effective because more There is no expense. Inside Smaller Areas Works quite well. Speed It is quite good. So this is some of it There are benefits. The disadvantage is that we assume That device also failed. let's assume The device also got corrupted. The device is also hacked Went. The device is also not working. So this The entire network starts getting affected from here. Will go. Are you able to understand what I am saying? So this is its first challenge. and seconds The challenge is to add new devices. It is a bit complicated to do. Its structure is very easy. So this Writing in the benefit that its structure is very It is easy. But adding new devices Doing a little bit of a complex term in this Will be called. ok sir? And what happens next? Value Let's say I'm sitting at Device A. Am. I want to send a message to device D. So he will go to B, he will go to C. And then after that it will go to D. So There is also some security concern in this. It is there but it is cheap so people use it. There is no problem in that either. Ok? I Hope you will understand. Ring Topology What happens? Benefits I once again I will get it revised. enough speed enough It is good here and for small areas Works very well for it. It is cost effective. Challenges What are they? that when the data hops Through here means through the middle notes. If transfer happens then in the middle notes There is a risk of data leakage here. There is a risk of data being hacked. New Adding devices is a bit tricky. And if one of the devices fails in the middle So we will see its effect on the entire network. Is visible. But there is also a benefit Here. If we have any problem in the network I understood. Let us assume that the one with B is corrupt. If it happened, it would have been identified quickly. Is. So there is a benefit also. Ok? Third Let's talk about V is Star Topology start brother why are you crooked Do you write? That's why you write crookedly. my hand He walks crookedly. Dont know why. Ok? What happens in star topology? one would have been There is a central cable. Ok? A central You can call it a server. central device Can. I would have made it so big Am. Ok? This is our central device. And all the devices are in this center are connected to the device. ok sir? So all the devices are in this center connected to the device Are. Can you understand? Center device quite It plays a more vital role here. Because all the devices are connected from the center device. We are connected here. So if the center Assume the device is corrupted or Let's assume the center device is damaged. All these people will face the challenge. But What are the benefits of this? Its first The advantage is that if I need a new node If you want to add then it is easy. The easiest of all The easiest way to add a new device is to Connect with it, the device is added now And what are the benefits of speed brother? It is very good but the speed is It depends on whoever gets the data from here. I want to pass the security check, I can do it the most Technically, most of it happens in this. If they go, because all the people If they are connected to each other then they are connected If not, then as long as everyone is alive It will control and this is a very powerful machine If it does, it does not get corrupted so quickly. But if it happens, then this is the first challenge that What if the center device gets corrupted? We will do the second challenge, this is what happens here. that a little comparatively ring and bus Slightly more costly in comparison It happens. Isn't it? Setup is a bit complicated Making these devices etc. is a bit costly. It happens. And the speed is quite good Is. I have already told you this. So this is star topology. Isn't it? There is a little bit of it now, brother, not so much that Whatever you guys have read, I read it and forgot it. We'll do a little of it ourselves Also explore it thoroughly by Googling it. do. I will brief you about everything I am giving you an introduction. ok sir? So this I told you about star topology. Revising the benefits once again thoroughly I am going to setup if I want to add a new device So it happens quite well. Very It happens easily. The second advantage is this The speed is quite good and the third advantage This happens if one of the devices is corrupted. Let's assume that my e-device is this If it becomes corrupt then it will not affect others. Will not be visible. You don't understand what I am saying I have been. But let us assume that its What are the disadvantages? So the disadvantage is that If this center node fails then everything will be affected. The effect will be visible. And what are the disadvantages? Brother? The disadvantage is that it is a little It is costly. Its disadvantages, its advantages This happens. It means a little bit of cost It is effective but it is a loss. and the center ones There is a lot of dependency on the device. Setup It is much easier. And This Is Star topology. Now a couple of things remain. If they are there then we read them too. All right. So Bus topology, ring topology and star topology We have understood the topology. Now we Let's move on to the next topology. which is Non Edge mesh topology. Brother, what is mesh topology and what is it What happens? So let's say this is ours Computer A This is our Computer B And let's say there's a C here. Here But there is a D. There's an E here. match In topology, all these People are interconnected with each other. Meaning, this ring has just been formed. but if I also connected A to E. to A I did it with D also. I got P from D I also did it and also did it with C Directly. Something like this: I'm sorry. And this is how you see the topology in which all the nodes are our are interconnected. of being interconnected What do you mean brother? of being interconnected Meaning that all the nodes are connected to each other Are. This topology is non-edge mesh Topology. What happens in a mesh topology? Right friends? Some of its advantages are that First of all, if we assume that there is a node I got spoiled. Let's assume my A If the number note gets damaged then more There will be no problem. the first thing is It is much easier to identify Will go. The second thing is that if this note fails If it is also happening then the rest is interconnected So no one will have any problem. Correct Is? If I want, I can easily replace it. should be able to. No problem with that either Will come. What other benefits are there brother? Data is transmitted very fast. Here But there is no data loss, no collisions. And it works quite well. Transfer data with very fast speed Does. What are some of the disadvantages of Brother? Not cost effective. Very It costs a lot of money to make it. And You know we are also in the Lions. I am using the same. I mean, don't say that I have been spending a lot of money. I this I just want to say that in mesh topology Even if one particular node fails So the rest remain connected to it. a little It is expensive and has a high setup cost. It comes in excess. Very easy to maintain as well It costs money and if you accept me If you want to add a new device, then that too It is a challenge for us because then Let's all assume I've put F here. So now I need to put the F back here. You have to connect with everyone Buddy. So many cables involved. how mach I had to understand things again. So in this It will take a little effort, friend. So a little So we can assume that it costs Is. Adding new devices is quite a big deal. It is challenging but the speed is quite good. and there is no risk of data collisions Would. There is no risk of data loss and The elements are connected to each other. Even if one person leaves, there is no problem. It would have been. Let's move on to the next one which Is star got, mashed, ring got It's gone, it's done. The next topology is brothers Tree Topology. What is tree topology, brother? It happens? Tree topology is basically a connection of a you can say combination of Star Plus Bus Topology. This is tree topology. Now in this What happens? This is what happens in this, brothers Let's say I am using the smaller pen. I make it. It will be able to be made much better. Value Let's assume that I have one like ours. What topology did it used to be in? Bus in topology. We used to have one Backbone cable. So let me make a backbone Cable. I make this with a different color. A I make it with this color. This Is Our Backbone Cable. Now all my things can be connected through this back cable. The notes are connected. But this time only Notes not connected. This time My main device is connected. I this Let me call it the main device. like a star Used to be in topology. Center Device Used to be. And this allows multiple devices Are connected. Let's say this is A, this is B, this is C and this is D. These It is used in big offices. Correct Is? Let's say I have another main device. Is connected. I'll give it MD2. And multiple devices are connected to it. such as E, such as F, such as G and a And let's say we made it [music] MD3 and other similar devices Are connected. So I hope you understand this Coming to the star topology and bus The combination of topologies is called a tree. Topology. Inside the tree topology, we have Devices connected by a backbone cable There are. and just go over here like It used to be in topology that here Each device was connected directly. Now the scene here is something like this, here the main The device is connected and connected to the main devices Multiple nodes are connected. some way like this From. I hope you understand that I Devices are connected and to the main devices Multiple data are connected. first thing What is there in this that brother on the backbone cable too much dependency because if it If it fails, everything fails. But we Let's make it such that it doesn't fail. Most of the time. What happens next? In this What is the benefit? We come to the benefits The first advantage is that If you are installing large devices, If you want to make big setups then this comes in use. And let's assume that a Let me take an example and see. assume that Shareers has an office with multiple There are sectors. Like one of the developers Sector. Isn't it? There is a section. assume one We have our editors' section, one of our Marketing is a section of the team. So our Multiple sections remain nearby. So What did I do? from a backbone cable here I connected everyone on Pay. This is for Developer, This Is For Editors, This Is For Marketing Team and One More Is for Content Creators. Ok? So what will happen now? all People are connected separately. So now every A particular group of people was formed. like this A group was formed. This became a group. These A group was formed. Somehow, one of all The group has been formed. Ok? and benefit from it What happens brother? This is the advantage brother Sir, now I accept that my editor This team system has become corrupt. So Now only this will be affected. the rest of There will be no effect on people. First This is the benefit here. Second advantage What happened brother? that I need to upgrade to new devices If you want to add. I want to create a new section So it's not that difficult for me will be. I can easily implement it here. I can do it. can you understand what I'm saying Are? How much does it cost brother? So cost It looks quite good. means as much as mash It doesn't look like it, but it looks quite good. Correct Is? Secondly, there is another advantage of going here which I personally think that now that all the nodes Connected from here. So if you accept There is a problem in some node. These Let's assume that this D node is It has become corrupt. If it gets corrupted then I only need this G node connect corrupt It has happened. So I don't need to go to the rest of the node. The effect will not be visible. All other great ways Will continue doing my work. And I'll be happy I will also identify that node of mine Yes, he has become corrupt. I hope you like this I understand how it is happening. Correct Is? And understand one disadvantage of this. Now what Is? All the dependency is on the backbone cable. So if this cable gets corrupted then this It will get corrupted in all the dependencies. And Above the center device here There is also dependency. So if it is corrupt If this happens then it will affect all the notes. Will be seen. Like the server of editors That's what crashed. Meaning that all those people Were connected. So the entire editing team should We will get to see the effect, brothers. So This becomes one of its disadvantages. What else Is there any harm? Cost is much higher than others Meaning in comparison of bus and ring topology Costs a little more in comparison It is his. But still quite meaningful Works for large devices. To big people, to more people Helping to connect. So enough It is beneficial. So let's use this Companies. Isn't it? Large offices use We do. Ok? Next is why my pen Not working? Next I scroll down. Am. Next is Brothers Which Is Known Age Hybrid. Hybrid is a combination of Multiple Topologies. Hybrid topologies. Hybrid Basically it is a combination is of multiple topologies. like you created the ring topology and the bus topology and From that you assume some other topology Added to . Added the star. So In that case, you use which here. C topology? Hybrid. Hybrid means Combination of multiple. as if assuming that I went here and did a A let's say I created one here Ringto. Don't pay attention to my writing Brother please. I made a ring topology and ring topology assume it is connected with a star topology then this becomes Gaya Hybrid Hybrid means combination of Multiple is simple, not complex. This is just one of its disadvantages and I can say more. It is possible that we can do more things according to our own wishes. You can add the . As if assuming that My editors need information on ring topology. through their work and developers should If their work is done through star topology then we You can set it up there. ok sir? So this is hybrid topology and I have a A small diagram for you guys too. has made. So all these notes became votes. Take it in the best possible way. ok sir? Who I said pause the video and relax. Making notes from it. If you look at the diagram If you look at it, the diagram looks something like this. This is a basic diagram. I just went here This is how the bus topology looks like. Does she give? What does a star topology look like? Is? Ring topology, Mesh topology, Tree Topology and Hybrid Topology and more There are some which are not that popular. Is. such as point-to-point topology in which one point is connected to another point It is done. This is point to point Topology. That's it. There is one who Let's say Daisy Chain Topology. What happens? Now about this You should explore a little bit. Daisy Chain What is topology? All through chains People are connected. Ok? So these Please read and understand everything carefully. How do they work? to this thing Please explore it. This is your small work. It is going to happen. This is going to be your homework. Is. I've told you all about it in detail. Each topology has been explained. The next topic is taking examples. Let's look at Zomato. But I want Don't take the example of Zomato right now. First I want to explain to you OSI The model through which we will understand internally here How is the work going on? externally so I think we figured it out For example, WhatsApp. I think Now let us understand the OSI model a little bit. We should understand and after that we will understand all the layers. After understanding this, we come to Zomato. ok sir? So let's understand topologies now, Please revise it. Then we move on Towards the OSI model. Computer Networking is one of the most important topics of OSI model. And now we will get into the details There are those who understand. Meaning, in such detail that If someone wakes you up and asks you, What is the OSI model? Tell. So you Be able to answer it. So much in detail If you read it, look carefully. and a small There is another request. If this video If you are watching till here then watch till the end. stay. Enjoy learning and supporting us Do it friend so that such videos and similar ones can be seen. We were able to bring more videos for you guys. Very detailed video because we want That it is available to the people free of cost. So that we can impart knowledge. Ok? So the OSI model Let's talk about it. OSI means open System Inter Connection model. OSI Open System interconnection model it is basically a Conceptual Framework. what does it mean Brother of this? Meaning of Conceptual Framework That it's basically a standard set up. Is. What is the standard brother? Standard means how to relate to a system Data will be sent to another system. This one Standard that I have taken one from my system I have messaged. So my friend's system How is it reaching there? Companies are Build your network by following standards Develops it. This is an OSI model. It Was developed by ISO ISO OSI means reversed Look, ISO company has made this In 1984, it was called an organization, not a company. would say the International Organization of Standardization They made it in 1984 And what is the main reason behind making it? Had computers with each other able to communicate and connect No compatibility issues What is the compatibility issue brother? We'll discuss that in a moment, just one thing to remember it it is a Standard it is a Standard Not a Protocol So Our people create it inside this. As We created all these protocols like TCP, IP. We do. It is not a protocol. it is a Standard. It is a model. these define How does data get from one place to another? reaching another place and in a manner Is he able to reach or not? every One layer. There is total intake in this Layers. Seven layers define our Data is stored correctly without any loss Reach out securely is reaching or is not reaching and we To discuss all seven layers in detail If you are going to do so, don't worry. just for now So understand this much. OSI model means open The system interconnection model is a standard. One could say that a conceptual framework that defines data from one place to another how's is going. Isn't it? It is standard. Any There is no protocol. Remember this. Now its What is a use case? Why was it made? So let me tell you here first before OSI Before OSI Problems What-If It used to happen, right? The first problem was this That brother, there is no compatible network. used to do. So let's assume that Microsoft Created my own network. Isn't it? Apple A network of its own Made. Apple created its own network. IBM created its own network. So all of these There were different networks and these were interconnected with each other. Interconnections fail to work properly Were. This used to be a problem. There is a compatibility issue and if till now What are the problems if OSI is not available? Would it have been? The problem is that we assume I am using Airtel SIM and My friend is using Jio SIM. Used to be. So I used my Airtel SIM. Sent him some messages. So my my jo My internet service, you might say. My ISP was the provider, he had I would have created a network of some kind and The other friend's network service provider, he created one in his own way There must be a network in both. There is a problem with compatibility issue. And these two ways do not communicate This issue would have happened before OSI. What happened to them after OSI? One can say that we have created a standard. Diya, which we call universal Hello brothers please don't rely on my notes. I mean, I'm just writing here. So that you people can understand. if you want So you make your own notes. He is more It will be better. Ok? Universal Standard It is created here. and universal What was the benefit of Standard, brother? Now Connecting different computers Can. Whether it is a different operating system You are using the system i.e. Window, Are you using Linux or Mac? They can communicate with each other Internet Pay and Data Access Is he reaching or is he not reaching that thing also? Make sure you can. So this is about OSI model. What does the OSI model define? Is? The OSI model defines that if I transferred some data from one place to another. If it is delivered, is that data accessible properly? Used to be? A standard has been established. One The framework is ready. a way has been made This is how the data is passed forward. Is. ok sir? So these are the OSI model's own Understood some benefits. Now as I Explained the seven layers within the OSI model There are some of which I have given you a description here. A descent diagram has been made. Now if you If you understand carefully then here in front of you There are seven layers. I will take everyone one by one I will explain in detail. So don't worry about it That. The first layer is the application layer and If you look carefully, what we have There are seven layers, let's assume there is someone Non as sender and there is someone known Edge receiver. How does data get transferred from the sender to the receiver? How is the transfer done? First of all The sender interacts with the application layer and the application layer forwards it In the presentation layer. presentation layer It goes through multiple layers happened lastly physical layer and then when If we have a receiver, now carefully You'll see this diagram because I I put the diagram here after some thought. Is. If you look carefully, when I I talk about the sender, so when I talk about the sender If I do this then the data will be displayed on top of the bottom flow Is. If you look into it point by point. When you look at this, the data is my top two Bottom flow occurs. That means first came into the application layer. Then the presentation layer, then session layer, then transport layer, network layer, data link layer, Physical layer. Did you understand what happened? when I If I talk about the receiver, then the data bottom to It is top. Meaning the data came from the physical layer, net in the data link layer, then the network layer in, then in the transport layer, then in the session layer, then the application layer, then My user's system means the receiver's system In the system layer. So if you pay attention You will understand when we talk about Sender when We Talk About Sender so sender this layer's model Follows top to bottom and the receiver takes these layers of ours down to Top follows. ok sir? So this is for you Have to understand. Now I will tell them everything in detail. I will tell you. Don't worry about that. every one I will explain the layer in detail. every one What vulnerabilities can a layer have? which causes attacks. like you You must have heard about DoS attack, DoS attack, denial. What is a Denial of Service Attack, DDoS Attack? It is applied at the application layer. All of these You will understand it well. Isn't it? What is the function of the presentation layer after that? Is? Rest of the details of each layer one by one I am going to understand. Don't worry about that. Just understand that when we talk about the sender If we do it then in the sender like ours Let's say I have an application Let's assume you've written a mail to a friend, right? So when I wrote him an email, my Browser which is connected to Application Layer Browser Is Not Application Layer Browser Is Connected to Application layer and then from the application layer Presentation then session then transport then Network then Data Link and then Physical Physical means this is my data Available means now to reach Ready is ready. when I talk of the receiver. Whom should I talk about brothers? Tell me quickly. Whom should I talk about? I I will talk about the receiver. So when we look at the receiver If we talk about it, our data is physical. through data link, then network, then Transport, then Application, then Presentation and then application. That means that It will reach its application layer. Meaning First top to bottom, then bottom to top. Understanding What happened? Now give it your practical Let us understand it a little better with an example. That it is not even practical. Firstly I I want to understand each layer well. I will give it one by one. Applications, presentations, session, transport, network, data link and Physical at last. Mix each layer well Let me explain. Understand the role of each layer I will give it to you. After that, you will do well We will also understand through examples. Ok? Let's move ahead. Let's go and understand. Me Here you have to create pages etc. So I'll quickly clean this up and come back. wait 1 minute. So now roll each layer one by one And every layer understands Keynes. First of all Next comes the application layer. So brother, you Why is the countdown written? because this They have been named in this manner. Physical Layer is number one. Application Is Layer Is Number seven. But the user would first accept is that I went on the internet and I typed Get www.ube.com so when I type youtube.com If I do it then first the layer from which my The interaction will be called an application. Layer. Because the users are mostly It is close. So first of all I want to Understand this. So what is the application layer? Basically you can say application layer Values vary from application to application This is my application. to connect to it Who will do this work? Application layer. this is Not an application. I mean, if you're thinking about it that my software is mine There is the application layer. That's my it is equal To application layer so this is not. This is Not. Your Software Is Not an Application Layer. What is the application layer? The application layer is the layer that Application means whatever software you use. Let's say you're emailing someone Do you want to send it or do you accept it? that you want to access a website If yes, then go to Google Drive and click on any If you want to download any file then go there But the layer that interacts will be called Application layer means whatever is related to the user Our user is our first priority The one who interacts does the application. layer, the protocols used inside it They are http protocol s SMTP protocol is used for emails. It happens. File Transfer Protocol To access our files and so on Upload, delete, and download There is work to be done for all of this. So our HTTP within the application layer, SMTP, FTP, all these protocols are used There are. So what happens is that I tell you If I explain it simply then application layer is Understand the used in easy language. Absolutely Don't be confused. Application Layer Is Used to connect the application software to the network. Let's assume here that I I went to a website like youtube.com and there But http request will work. http request It will work. So its job is to make this http request To receive. This is the http request To receive it. I think most of the People did not understand. So let's have a Let us understand with an example. assume that I go to a restaurant. Now he who I go to the restaurant and sit down I called the waiter and said, "Waiter brother, come here." And bring me a masala dosa. So now When I'm interacting with the waiter This particular thing is known as application Layer. Because my waiter is Will work with the application layer. They Directly from me, i.e. from the software Connecting me and the entire network is working to connect the . are you mine Are you able to understand the matter? Right now I am everything I will explain from Sanders' perspective. Then After that, I also look at it from the receiver's perspective. I will explain everything. Ok? means now First we are going from top to bottom. 7 6 5 4 3 2 1 Then we'll go back upstairs 1 2 3 4 5 6 Till 7. ok sir? You will enjoy that too. So What was the role of the application layer here? The role of the application layer was to Applications are designed to help you manage your software. Meaning attaching to the network. with him Add. This is where our network begins. it occurs. Understand it like this, as if we Had an interaction with the waiter. likewise beans This is where it plays a role. This allows us to network It works to connect together. This is Application layer. Ok? which ones What protocols are used? http protocol, SMTP protocol and What are its uses, brother? Use here There is our FTP protocol. And here But neither what you might have heard nor DDoS attack DDoS attack or HTTP flood Does this do anything or is it our URL? Something happens by doing something. All these Exploring a bit. if you want to Let us go a little further and explore this as well. do. In the upcoming videos. ok sir. So for now I'm going to use the application I am telling the layer till here. back now Will come on this. When we climb back up. The application layer enables our software to from the application layer to our internet Working on connecting. ok sir? Meaning, the closest to me interactively. Which layer is it in? Application. Let's go again After that we come to the presentation layer. Now what is the function of the presentation layer? If If you noticed, I Went to the restaurant. I told the waiter that Brother, bring me a masala dosa. Now which Our waiter is Bhaiya, he took my order. jotted down. Now when they go in and the chef Let's assume the chef is South Indian. So I said, "I want a masala dosa." Bring it. In such a strong voice, Chef South If he is Indian then he will tell it a little in their language. Give me a masala dosa. Yes, this He will convert it and tell you in a proper manner. Correct Yes sir. So in the application layer I have called waiter I had spoken to. What will the presentation layer do? that data, whatever my data, whatever my There is a request, she will present it. whatever I want to send it this way will present that the upcoming ones The layers were able to understand it properly. Now What are its roles, brother? Its The first role is translation. So the format in which I Translating the data sent into network it properly in a good way Could understand from this. I don't know a little if you If you are studying then always stay together Keep a bottle handy. I take such a big I sit. Ok? So whenever a little bit If you feel like this, I mean it many times I feel thirsty. But if you feel like it should I say that brother I am tired friend or else what does it mean I am feeling sleepy, I am getting bored. a sip Drink water. Your mind will become fresh. TRAI Try it and see. Is No? So the first role of the presentation layer is We understood. translation data that we sent, the way we sent him, our Translate the request that was made. Its second function is translation. etc. it is done here Compression means the data I collect is very large. If you can compress it all Compressing and happens simultaneously What does encryption mean? Brother, encryption means whatever my data is Encrypting it like in WhatsApp What is end-to-end encryption? What that presentation layer does is give you Do you understand what I am trying to say? So what is the function of the presentation layer? Translate Compress Encryption Whatever we want to do with our data, we can do something like this to present it in this way encrypt and prepare that the next Easily select my upcoming layers. So that you can understand what I sent from here Is. Now another important thing for example I type www.ube.com is now youtube.com youtube.com is what I typed in there. That is his domain name. what do you do now Is? Convert domain name to IP address. So if you are thinking that this work If the presentation layer does it then it is not like that. This work has already been done by the application layer. So the process of converting from DA AS to IP Who does this work? This does our Application layer. So don't confuse it Happen. What is its function? to the data perform translations, compress data, Encryption. translation means whatever The code has arrived, ask him to Unicode etc. Converting or compressing. For example, data that is spread out can be zipped. Converting a file or MB3 to JPEG Converting all of these into encryption Like end-to-end encryption of data Isn't it all about doing what you've heard about? HTTPS HTTPs to HTTPS This S is the last one, this S Hyper Text Transfer Protocol At last there is secure which is that S Who does that? That presentation layer does that. It means security makes it secure. It provides it by using SSL and TSL L I Guess T TLS or TSL TLS is there, I guess it is not secure socket Translation: By doing this, something happens, we I will also understand it in detail later. I don't remember the full forms very well. Brother, I will explain it to you better. But okay listen, we went here and Understand the function of the presentation layer. Presenting the data Now let's come to the next step. On something that is more important brother Keep writing these things, don't forget them I will not forget, I will not forget at all Okay, now we come to the next important thing. I think the presentation layer is understandable. What happened to the application layer? Get the user interacted. The user requested that I have to go to such and such a place or send an email Because I need to send an email to this place. What did the presentation layer do? to that email presented a little in such a way that The coming layers should be able to understand it properly. Now The next important layer is called session. Layer. What are your names, brothers? Session layer. What is the function of the session layer? Session Layer The job is to create a session. What To create? Session. For example, I Call me on Domino's and I on Domino's Domino's I don't know is better Doesn't seem so. Try Lapinos Sounds a little bit nice. Meaning as Compare Two Domino's Lapinos I like a little bit Is. So let's assume that we have Lapinos on and after calling Lapinos I said, brother, I want a sweet corn I want to eat pizza. Just sweet corn pizza. Now when I gave him sweet sweet corn When I asked for pizza, he said okay sir 30 Will be delivered in minutes. very nice now Delivering in a fantastic 30 minutes. So Now what happens from here? A session from here It was created. What was created? Session. session What does it mean to be created, brother? session Creation means that brother when the data Where is the data being transferred from and when? It is reaching here. You can say one time It was decided that brother a session should be created. I said, yes brother, the data is from here. The arrival has already begun. when it will arrive So we will assume that the session is over. Is. like I called someone and like The call got connected and I said hello. When I said hello, my session started from there. It started and I talked to him. The conversation is going on inside the session and when I disconnected the call and said bye, so here I am. Pay session is over. So what about the session layer? Does it work? The function of the session layer is to Let's say I called someone. or whenever I am passing the data From somewhere, a thing is created there session that brother this data which was sent from here It's starting to move forward from here. Now you can keep handling this and the session layer. Another task is to place the data correctly and assume the mean Let's assume that the sender to the receiver Is the data reaching properly or not? I am checking this. It's arriving in a good way It is not reaching. Now what happens, many There is a huge amount of data that can be collected from one place. It takes some time to reach the other place It may seem so. So it has one more function. This creates check points Is. Brother, what are check points? Check Points means something like this in between points were made, for example, let's say a Data was transferred from one place to another. Now Let us assume that data transfer takes place between I failed. So where did it fail? This What did you do? A check point was made in the middle of Brother data friend had reached 40% pay. 40% After reaching , it stopped at 40% and Couldn't get beyond that. So what about it Was there work? Its job was to establish checkpoints. Of. So it had created check points that Is the data reaching properly or not? It is not reaching, keep checking it and Where did you reach? Make check points in between That this is his small work. So the session We have understood the role of the layer. These Basically, the session is created by the sender and Makes the receiver in the middle and in the middle Check points. What are check points, brother? Are? I told you once. one more time I will tell you in detail. Check Points What are they basically? as if assuming Yes, I ordered something from Flipkart. Now When my order is coming from Flipkart, many Sometimes it happens like Flipkart Let's take it, I am sitting in Bhopal. I I have ordered something from Mumbai. So from Mumbai The order is first placed on their server. Will go. from the server to their database Will go. There will be change. Then go there and There is a warehouse where the data will go. over there From the warehouse, let's say in Bhopal The data at the Flipkart center Came. Then from there to the centre and then to my home Came. So sessions should be created in this way What work is done? So let's assume that Let's say I downloaded a 2 GB file. It's curry. There is another example. then it would have been What is there, from zero to 100% here It goes on. And if we assume that in the middle The connection was lost here. Internet runs Went. So it starts again from zero. But If there was a session layer here, what would we do? Do? We would have made check points here. Like from zero to 100 What did I do? Place a marker in the middle Given here at 50% off. So what will happen? First Up to 1GB will be downloaded. then back to 1 Up to GB will be downloaded. And if here in the middle But if the connection is lost then this is what is left here You can download 1GB in this way. So the basic function of the session layer is A session between the sender and receiver To create. data is arriving properly or I am not reaching. Make sure that Whether the data is reaching properly or not Used to be. That's it. Now what is the use here? Are they there brother? Here the protocols that Uses are let me remove it all. take a session Friend, you guys are understanding the meaning, right brother? Look at the pizza I ordered from Lapinos You did it, now how did you make that pizza brother? First my brother was made there and then what I had Delivery boy whatever I mean delivery He is a partner, what did he do? You should have first considered that order to be from my house. That even the neighborhoods that come to my neighborhood Let's not assume that it is 5 km from here So they have a session every kilometer. Now I can call and ask them. I wonder how far brother has he reached? Brother, they will say 1 km. Brother, 2 km is left. Saved. So this is how the sessions happen. They Make sure you are processing the data properly Is it reaching or not? now here One of the protocols that are in place is Net BIOS Network Basic Input Output System A remote procedure call (PPTP) point to Point Turning Protocol, all this There are. Explore them and see to see what protocols work Let's do it in the session layer. I understood the role Its. The role is to organize this session here. It creates and Make sure the date is delivered on time. As soon as the Zoom meeting started, brother Your session from start to finish It was created and is being managed through the session layer. Is. So now we have understood the three layers in detail. I am getting it revised quickly once. There was a rule of application layer. Application first So I will remove this. Brothers, I I am not making notes. But you guys You have to make it, please. I don't speak like that Am. My Notes. This is how I make videos I don't upload it because I know it You are smart. My audience is smart And only smart people can teach us. Now it is fun brothers that those people are You can make notes accordingly, right? First, the application layer, what is its job? That was my website Whose is it right to connect him to? The work was application layer work We understood about the application layer. That waiter is interacting with us directly. Analogy video, coming back and Understanding the presentation layer thoroughly What was the function of the presentation layer? The date data that I have received well presented to do, to encrypt it, to Translate it, compress it. These Who is useful in everything? It all works. Who? presentation layer. The work of the session layer What is? data from one place to another whether it is reaching or not, Creating a session. And make sure to do this So that the data reaches end to end properly. Make Make sure that the data is accessible properly. Is it reaching or is it not reaching? The same that Lapin ordered him data is coming no It was something like this. Ok? Presentation What was Lear's role? Translate the data to do. Meaning, tell me that brother, I have come Masala Dosa ji. Telling the data in this way. Ok? I I am not racist brother. Don't make fun of me. The rest of the layers understand. Come on, come. So the most First prepare their notes. then after that We move to the next layer. Let us go. So the beginning We have understood the three layers of it. First application, presentation, session. Now The next layer from here is called Transport layer. of the transport layer What is the work brother? Transport Layer Its job is to transport data. No The job of the transport layer is to transfer that data Preparing for transportation. Meaning If I were to tell you what its roles are, So its first role will be Segmentation. Segmentation means data in the form of small packets to break. This is its first role: segmentation. Segmentation means dividing the data into large chunks which we Data is divided into small packets Breaking into. Let's assume that I There are 11 players for Team India. There are 11 Sent Lions T-shirts for people. Value Let's accept it, what's the harm in accepting it. Meaning Not the Lions' 11 but the Team India's There are 11 people, for those 11 people I Sent 11 Lions T-shirts. Now it is complete Not ordering at once. What did he do? They Which was my huge courier box I broke it into smaller multiples In couriers. And gave each one a name. Like it was named 1 of 11. name it Gave 2 out of 11, named it 3 off 11 And so on. In this way he Gave names to everyone. So its first role We understood what that was? First roll The segmentation of data into packets Breaking into. I mean, my big data It used to be in small packets Breaking into form. What is his other job? Is? Its second role is Sequencing. brother what is sequencing Is? That's what I just told you, one of He made separate T-shirts for everyone, 11, two of 11. I had kept it in the box. this is Segmentation had occurred. Sequencing them all He did the sequencing. And another one of this What's the work? This is another function of it. What is the wrong spelling of transport? Correct. So this is the spelling Spelling of transport. Segmentation Sequencing. Another function of this is that brother Make sure all packages are delivered Have you gone or have you not? So here I am I will write the acknowledgement. That is, the value Let's say I sent 11 packets. 11 Packet number five could not be sent. Are you understanding what I am saying? Now number five The packet could not be sent. So this What did you do? Acknowledge him and Sent again. Are you understanding what I am saying? I What am I trying to say? Now make it professional What do you write in the language? So according to your Please write that the first one was the acknowledgement of Brother, did the data reach or not? That I look at the object and write down the data. Consider it a kind of resend. Isn't it? So Let's say five number data which is my Could not reach. What did he make him do? He resent it. to him again to send it back to the transport layer Made it ready for. means to prepare that Did I send it or not? Right now we are all Understanding from Sanders' perspective. Isn't it? Now we will understand the receiver. How does it work from a perspective? So what did the transport layer do here? To transport our data Ready it or brother, break it, sequence Done it. Check if I am going or not. Used to be. And if it's not working, do it again. Sending is going on. Now the protocols here They are used, they are the world famous TCP and UDP. We are going to read these in detail. I have been saying this for so long that I have made it. Below It also has a slide. So your details on that When I come, we will discuss this also. What are TCP and UDP protocols? Are? I just said a little bit earlier in the video I have told you this and tell me in detail later. Give. So this is all about transport Layer. ok sir? So what do we have Happened? We have applications from our Application layer connected to software Through. Presenting and forwarding data Went. A session was created so that It is known that the data is also going forward That I am not going. And then our The transport layer prepares that data. Given to forward. Now comes the network Layer. What is the function of the network layer? The job of the network layer is to send data. That's it. Ok? That means this is my data is To route it. get him ready to forward. So the network layer The first role made us understand that this performs routing. It has another role. These Basically provides IP. So as that I told you guys that there is something known as private IP and there is Something known as public IP. So this public Provides IP and indicates that Exactly where to go and this It also serves as a delivery service. So I like I think I should write this first. Was. What does it basically do? This is an IP assigns and what it does with Is? It does routing together, that brother, then where let's say I Let's assume you type google.com. So I I need an IP address before I can go to google.com. You will get it and I mean understand now. We had reached the transport layer. What's next after the transport layer? Routing through multiple servers passing from here to there from here to there from here Where will I reach by going there? I will access Google's servers. Did you understand till here? Hum I Hope Aya will be. His After water with code. After that we come At the data link layer. Data Link Layer What does it basically do? What was its function? IP assignment, routing, and data transfer To take him to his desired location. On this The protocol used is IP. Internet Protocol. There are some more. Like there is one, RIP RIP RIP means is routing i Internet Protocol. So this Some protocols work here Inside the network layer. It means more to There is nothing to understand, friend. like Google There is MA. So what happens in Google MA? Is? Your address in Google Maps Friend's address means wherever you If you want to go to the desired location, His Address Pani with ko yeh to andar se matlab My body could not support it. Joke I am doing it. Listen, go over here and this is mine. There is an address. This is my friend's address. So what did you do after going here? You have your Got the IP. You got your friend's IP. You took him through multiple paths I took it here and there and delivered it to him. This is the main role of what? Transport The layer that came after the layer was the network layer. ok sir? IP Protocol RIP Protocols work here. Next Let's come to the layer called data link Layer. What does the data link layer basically do? Is? For example, let's say I have a Order booked Was. I ordered something, I admit. From Flipkart. Now the order from Flipkart He came till the gate of my society. So what IP is it will identify it and IP What will it do after identifying it? To identify the IP. Meaning of IP What will happen, right? As if I assume my Society means I am a society I don't live here. I am in the neighborhood I live. But let us assume that our This is my IP and he is telling me that brother There are four blocks in the society. So this is what The order is this will go inside A block. Now a I know how to go inside the block. There's Something Known as Mac Address. What is a MAC address? every one A unique media access control of the device There is an address that shows that this The device is unique. So what did this reveal? A The order has to be sent inside the block. and Mac What did you find out from the address? Inside A Block This address has to be sent to flat number 202. So what did we do? We network With the help of the layer we reached the society gate. Had reached. Now from here the data link layer The work starts. Here's that check Which IP will you have to go to and there will go to and check its MAC address and Through that, that data goes here and gets 202 flats. This data will be delivered to the number. You understand this Came? Each layer has its own role. Meaning, what did the transport layer do to the data? What did you do? The transport layer transports the data Sir, it was prepared. Forms of packets I break it down and put sequences etc. on everything. Had given. He was making sure that access It is not reaching. After that, our network layer was, what did the network layer do Kara? to deliver to that particular address The work has been done, right? And our data was Make sure he reaches there or not. How is the approach working? Whose job was it to do routing etc.? Network layer access to public IP After that the work of data link layer From here the data link layer starts What was the function of the data link layer? That when it reached the society, it reached the society So put him in my block and then in my The work was to deliver it to the flat. I understand Isn't that what I'm trying to say. So this is the main role of network layer and data Link layer. After that, the most The important layer comes which is physical Layer. What is physical layer brother? Physical layer is basically what you have up to here. The data has arrived, what will you convert it into? In bits. It will convert it into bits. and bits because your data electrical signals pass through Is. Radio waves pass through. If you want to send it somewhere nearby or if If you want to send it somewhere far away then it should be sent through wires. Our wires have zero data inside them. And pass it in the form of forest in this manner It happens. So that's where it comes in handy Physical layer. So here is my data. They are in the form of bits through the physical layer. I will break down. Forms of Zeros and Ones and through radio waves Traveling to my desired destination Will reach to. Meaning, if we say in simple language If I understand it, the physical layer stores our raw data. Transmission is in progress. Raw What is data transmission brother? Raw Data transmission means you can understand it like this can see that if we start from Of course I'm going to come back right now, I mean right now. From the center's perspective, I looked there Type google.com into the presentation layer. What did you do? You are typing Google.com. So converted into IP address and Started the process. Presentation What did Lear do? present it to him Had given. If HTTP then HTTPS etc. and if it is HTTPS then Secure it and present it well And sent it forward. What did the session layer do? Create a session and ensure that data is being delivered. I am not able to reach it, make sure of it. Just watch out for multiple checkpoints. His What was the function of the transport layer? Breaking data into packets. Meaning my request should be sent in the form of packets. Break in or whatever I want to send For him. Isn't it? And sequencing it. What was the function of the network layer? network The work of the layer is also clear to us. till there To reach that place. Now, let's look at the data link layer. What's the work? The job of the data link layer is to To a particular server to that particular IP MAC address etc. to that particular place To get there. Now the data is at our disposal It is done in the physical layer. Our data It has reached the physical layer. Physical The job of the layer is to do raw transmission. data to send in the form of bits. to the data in the form of bits inside wires Will send. So what will we do with the data? Now we will encode the data. encoding What does it mean brother? Encoding Meaning It happens to him in the form of zeros and ones To convert. Whose job is this? These This is the work of our physical layer. and this Whose job is it to do the raw transmission of data? It happens? The work of the physical layer is done. Let us go Now I understand everything till now, which The work has been done in a proper manner. Now we go A little bit behind in time. assume that If I now talk from the receiver's perspective What will happen if I do it? When I turn off the receiver I will talk from perspective, so now here passing through the physical layer The data has reached my server. Let's say I messaged from here. Same old message to my friend Aman on WhatsApp Remember the example. So now the data It has reached the physical layer. That means that As that data reaches WhatsApp's server And got transferred. Now what from here will be? From here the data is now in the countdown The going will begin. Meaning the data will go from here Where? In the data link layer. Data Link What was the function of the layer earlier? That data to a desired location or Make sure he did not reach there. So now What will be its function now? Now its working It will happen that brother, the MAC of our device This decision is made by reading the address and IP. Where will the data end up? Then What is the function of the network layer? that brother Exactly deliver the data to my destination To deliver. Meaning now the data is forwarded from the server Is going towards. Isn't it? Then transport What is the function of the layer? Transport in Layer work that's in my segments Joining the data that was broken means You guys don't remember my 11 packets I put my 11 packets in a big bag. Keep it inside the courier, otherwise I will do it brother. It sent a large courier in pieces. I sent him away, if this doesn't work then he will be sent back. Breaking and arranging sequence wise if any sequence not reached if any particular packet of data is not delivered then make Make sure he arrives and then have a session This is the job of the layer, brother, it is okay Everything went well in the session, if there was any problem Checking everything at checkpoints did not happen. That was correct What is the function of the presentation layer? Recovering the encrypted data Decrypting by using private key And the public knows what we have. decrypt and save it as a zip file convert it back into the form In whatever format you want. Isn't it? Then it is the job of the application layer to The data that comes to us through these layers It is the user's application layer Work The idea is to pass it to the user's software. That is it. This is all work. So if I give you Let me give you a quick review of all these again. If you look at things carefully, Our data was from the application layer It happened and came to the presentation layer. Applications that interact with the software The presentation he was doing gave him a way Framed it nicely and made the same idli Dosa Wala Session Layer created a session How is the data reaching here, brother? Make sure data is arriving properly Is this thing being noticed or not? The transport layer stores that data segmentation and then into packets I did a little sequencing of her and some If it hasn't arrived, please check it first. If you have not acknowledged it, then come back It was the job of the network layer to send it, brother. Providing IP is public and desirable routing it to the server To do etc. The job of the data link layer was to Brother, data access to our servers If it is done then he should get a proper and particular Accessing IP via MAC address and Through all these things, meaning if someone nearby I mean, from my system, Directly if I say what I I want to send him something to the printer. So there will be the role of data link layer. He works by finding its MAC address. Will do. And the job of the physical layer is to store the raw data. to pass forward. So we have all these Understood the work of layers. Now the data is being sent to the server Had reached. Now it will start again from here. The data will go to the link layer. IP and so on Will find. My receivers from the network layer will find the route to the IP address up to . from the transport layer back to Will arrange sequence wise. a large packet Will make. End the session by going to the session layer He will say that it is okay brother, now he will reach further. data. What will happen in the presentation layer? The data that is processed in the presentation layer It will decrypt whatever was encrypted. After reaching the application layer, Data access to my user's application Will go. This is about OSi model. Now another one What is the important thing at this time, brother? Is the OSI model being used extensively? No. Why brother? It's gotten a little old. So some new models have come out which are better than this Works in a better way. a little bit from this Lesions are complex. what is that Brother? There is one TCP IP Model. If you want then you can make this video further. I will discuss. Meaning if you want you How will you tell in the middle of the video? I this We will discuss further in the video. But right now Also OSI model relevant. Why Is it relevant? Because a trouble shooting Useful to find out where the data is Stuck or not stuck. Isn't it? and one more The standard remains. So quite a lot Companies still follow this. Who The old applications remain the same. They are made on. So it is necessary for us to We understand about it. I am not understanding What am I trying to say? So this was OSI A detailed description of the model Explanation. Now we will understand a little bit. Now Now here is an example of this which I have given above. I accidentally left it for you guys. How let's take the example of Zomato. So I think now we should follow the example of Zomato. There's no need because you've already figured it out. How is the data coming to us? Is. Now I want you to do this part. Please please please do it to yourself for me So that you can understand how the data is processed. Transfer is taking place. And the same example that We had Lapinos and Domino's. The same example applies to Zomato as well. Will be done. So make sure that brother this one Explore the part yourself once. Put a small prompt on GPT that how a Zomato Transfer the Order and Explain It via OSI model. So he explains it to you I will do it and this is your homework. so me Please let us know in the comments below whether you I understood it or not. By the way, I don't Looks like an example is needed now. Now good It got cleared from. So let's move forward We do. Let's go. So now let's understand that computers exactly how Let's communicate. That means the client Regarding server architecture. Come on I understand. I'm not just a client or server. I will tell you. I will tell you one more thing which I call There is peer to peer architecture. then to him Let's discuss later. First clients Understand the server well. So the client What is meant by server architecture? That Computers connect with each other through the Internet How are you able to communicate? Let's say you are on a website. and after visiting that website you Let's type google.com I went to the browser and I went and wrote google.com so google.com It gets opened. Now he understands how this happened. Are. Listen. Let's assume this is a computer. A This is my computer. I am running this Am. This is my computer. ok sir. There for it is non as client computer. It is known as client site. Ok? And there is one more, let's assume it is a big one. This is Instagram's server. There is a lot of it in All the buttons etc. are installed. something like this In a proper way. It looks something like this. This Let's assume it's Instagram's server. Now I sent one from here request and here I got one Response. This is non-age client server Architecture. Yours here The client sends a request to the server. Is. This is a no age request. And your server according to that request Responds. Now I know you I don't understand at all what is going on here What's going on. So, a little in your own way understand from Are. Chachit Code I'm just kidding man. At the beginning of the video I thought that full on I will pursue studies with professionalism. But A little bit is fine. Look, tell the truth No. Come and see quickly. So go here We said what is client server architecture? It happens? How does it look? Now I Let me explain this a little with a practical example. Am. Let's say I'm on my browser. I am going. So my browser is my browser Software: Let's assume I use WhatsApp I'm doing it or I'm using Instagram. Am. All these will be called clients. Ok? Now I go to the browser and there I write www.com So what? I wrote there Instagram's DNS is part of the Domain Name System. It will be seen through first. his domain I wrote the name there. Now his The domain name will resolve to an IP address. And now will what? My request has gone here Above. What is my request? Understand this be careful. My request is my very It's a simple request. very small I have a request brother. I am a small man. I said here my request is open Instagram. This is my request. thats It. Now here comes the same thing on the server. What did the server do now? what would a server be That's exactly what the server is doing. We will understand later. First, let's understand the server What happens? An Imaginary Journey with Me Everyone has to walk for 2 minutes. Ok? Listen to me carefully. Imagine one Computer. Imagine imagine a computer. What does the computer look like now? you people You must have imagined that there is a screen. The monitor is what we call it. There is a CPU Nice bit. Let's assume that the keyboard There is a mouse, and speakers are also placed next to it. Are. And if you want to keep something else then go to printer end If you want to keep all this, you can keep all that too. yes. So let's assume we have There is a computer. Now do one thing for me. Ask carefully what? inside that computer Remove the monitor from the Say it was removed. Remove Gave. Ok? Remove the keyboard and mouse. Remove Gave. If there was a speaker, it was removed. Two. Removed all extra accessories. Two. What's left? CPU. What's left? CPU. Now your CPU is used in a way Connect it to the internet like this firstly and then something like this Program whatever request comes. She is with him, give him some response Could. This is a non-age server. That's it. Server, if you think about it in your mind then that Those big Google servers give us Imaginations come to mind. But he There are also servers. And now let's suppose mine The laptop is kept here. So this is also a It can work as a server in this manner. What Are you able to understand what I am saying? So the server What is it basically? A computer system is which is connected to the internet which is Program to Accept Request and Send Back response. That's it. Nothing Else. Understanding What happened? So if we ask the client What are servers, brother? So the client What is it basically? The client is my device What I am currently using is Through I'm going to request. So this Is client I'm a client. Do you understand? And what is the server? A server is one such device. Which is according to my request Will give me a response. So go here In response, for example, to me Got the HTML, CSS and JS files. These What did I get? This is the response I got. So I requested Instagram.com From and it will give me a response. Ok? So What happened as soon as you made the request? http which Our request went through http over there. Go here to request Accepted. It was seen here that What response to give and according to that Response was given. this is known as Client Server Architecture. If I slightly Let me tell you more clearly. for example We remember the restaurant owner I had taken an example. This is I went inside the restaurant. When I went inside the restaurant, I said that I Kitchen Joe I have to connect with him. Ok? Me The kitchen has to connect with what it is. This is me you can say I'm a client and this Kitchen is a server. Are you understanding what I am saying? So this waiter between us This is the waiter who accepts my request. working to get there and The task of bringing his response to me doing. Do you understand? This is the internet. This is client server artist. in what way From? I mean, this waiter, basically a waiter My request is going there and His response is reaching me. I have ordered food, brother, I have come Idli Dosa. Yes. So he had Idli Dosa there. Went and said that he is asking for Idli Dosa. So He said yes, okay take it. So he brought Gave it to me. Who is this happening through? It is happening through the internet. This is the role off internet which is between my client and my server is working to connect the . I am understanding No? has client and server architecture What? This is just an architecture of a Client: A device that requests anything And a server which gives back response. Understanding Are you getting my point? Now it is not the case that a The client of the system is different, the server is different. It happens. One of your devices as a client and Edge a Server can do both. Any It is not such a big thing. I will tell you that too How to go ahead? But this is client server. Architecture. Client Server Architecture Meaning how we can connect our computers to servers with and in what way can such a device Let's connect together. This is known as Joe's response. Is giving. This is known as client server Architecture. That's it. I hope you understood this will be. Right? Now let's understand peer to peer What is architecture? So now a little bit Understanding peer-to-peer architecture Let's take it. So if you understand carefully then Here our client server The architecture was that our server was Client is not necessarily server Hey friend, what have you become, architecture? Went? I don't necessarily have to here I will make a little something nice. This is mine Let's assume a central server. ok sir. Now the central server It is something like this, accept it, this is my Server. Ok? I will also write here Pay. This is my server. Now it can't be that multiple clients are connected to it yes. Do you understand what I want to say? Am? And everyone is connected to it. This Let's accept this. Let us assume that it Sent him some requests. This gave him some I gave the response. Then it made some requests Sent. It got some response. It has some Sent the request. It got some response. This is client server architecture. I hope You got this. peer to peer What happens in architecture? peer to A central hub in a peer architecture It doesn't happen. There is no central server. every A device interacts with each other as a client and as a The server works. That is, understand it like this That there is a device here. Device A is a Let's assume device B is a device Let's say C & D & E then this is a connected in a mesh-like manner There are. some way like this Everything is connected to each other. Ok? Now it is connected. now here What happens, right? This will act as a client And server because they are peer to peer. Meaning, understand it like this that in pair to peer What happens is that we assume that a device. Now it is both a client and a server. Is. Now if it needs any data then He will ask his companions that brother, yours Does anyone have such and such thing? and this If the companions have it, they should send it to him. Will give. Something like this. Ok? If this I'll give you a little more good example. Let me explain, for example, our WhatsApp There is a group. Now in WhatsApp group What happens when there is a group of friends? What happens in that, I receive the message. I can do it too. I also message, call and message I can send it also. I want to message Brother, will you go for a walk tomorrow? so friends The answer I am getting is yes brother Will go. Someone is saying no brother plan Cancelled. So this is the group. And what is in it Used to be? What is happening is that every one Individual can also send messages and messages Can also receive. And there is a client Server architecture. What is there in it? It is the central hub. So all the people from the central hub It is connected. from the central server Are connected. But there's nothing like that here Is. Now this has some benefits. What First of all, dependency on the central hub It doesn't happen. Second, let's assume one hub. Yes, it has gone bad. Let's assume this is a If it gets spoiled then the rest will have no responsibility on it. The effect will not be visible. Ok? and what else Are there good things inside it brother? Its There is cost effectiveness inside. Enough It is cheaper as compared to this thing. Because it costs money and is dangerous. Because brother, you like the central system We have to make it according to people's requests. able to accept and respond to them So it will take some hard work, right? Nothing like this happens in this. And another one in this Good thing if you want to add a new device If so, you can do that easily too. in that There was no problem either Is. So client server architecture architecture There is a central server that all people access. Are connected. peer to peer Is connected. So everyone has the data. Sometimes in small, tiny forms It remains available and everyone can access that data. If someone has requested then as a We provide it by acting as a server. Now there are some challenges here too. The first challenge is that there is a little bit There is no security concern because It does get decentralized a little bit, doesn't it? There is a concern about security. in that Everything was centralized in this If it is decentralized then it should be about security Can. Maybe I assume that Said, brother, I want to download a movie. His name is A: Let's assume Alexander. Now I am Sikandar If you want to download the movie then everyone has Sikandar If there is a little bit of it, then Everyone will go here and send it or whatever If someone has it, he can send it too. Can. So what did it do here? This Act as a server. What did he do? Age a Get the client act. Now from here it has If he asked, it could have been both of them. You might have answered it together. So these two edges A server is acting. And this age The client is acting. Are you understanding? And in some case it needs data and from A If needed, this server will be created. These clients It will be made. That's all. Where would this be used now? Is it brother? Oh, this is used a lot. Brother. Where can it be used? this use It may be possible brother. If you have used torrent You may have heard the name, if there is anyone among us There is an old player sitting there who has torrent If you know about it, then bitrent is basically like this Used to work on tech. peer to peer I used to work only on architecture. You probably You must have heard about blockchain. Bitcoin, Ether what goes into all this? All these A decentralized system operates in things. Peer to peer architecture works. Any There is no central body that is connecting To all the people who help run everything Do. Not everyone is a client and not everyone is a Servers are acting there and another Brothers are mining for others. At the best level. Ok? So This Is Pear Two Peer Architecture and This Was Client Server architecture. So now in a little detail Let's understand the protocols What are protocols? Ok? I HTTP, TCP, More about UDp and IP later I will tell you. But I have this word here But these are the protocols that are written What does exactly mean? So Protocols mean friends set Off Rules. Set of rules means data is mine Meaning leave the data also. Let's assume the internet Pe are our computers. what way is that Will communicate with. In what way is he a Will send data to another. in what way is he Will receive other's data. on the internet How will the data be transferred? all this Let us explain our protocols. protocols Meaning there are rules. available on the internet How we should perform things These are the rules they make. Protocols. ok sir? So if ever This question comes to your mind: protocols What are they? So what does protocol mean? Use rules such as let's say TCp So this is a kind of rule. Transmission A control protocol is a set of rules. Similarly, IP is an Internet Protocol. There is a rule of thumb. Simple, right? So now a Let us understand with an example. let's assume This is me and I accept that this is mine. Friend. Ok? Yes, there is no problem. Now both of us are talking to each other. We both are communicating. such as values Let's take devices that are on the internet just like that We are the people. We both are from each other Are communicating. So what happens No? We both speak a language that we We are able to find a medium to communicate. Let's assume that's the language for now. Hindi. By the way, we also know English. But now let us talk in Hindi. Value Let's take it. Isn't it? So I assume I I spoke here in Hindi and it impressed me. Let's assume the answer is given for now. In what? In Hindi. No problem even No problem. So I said something to In Hindi. It understood him and Accordingly, he responded to me in Hindi. Then he said something to me. I had his Accordingly, I responded to this in Hindi. So we are talking in Hindi right now. But if we assume that my friend I don't know Hindi. Let's assume he comes He is Chinese. And what do I know? I am getting It is Hindi. So I will speak to him in Hindi. And he will answer me in Chinese. Now this I don't know Hindi and I don't know Chinese. So will he understand what I say? Is? Will he understand what he says? Is he going to come in? what's between us Will communication be possible? It will not be possible. So Who comes into the role there? Our Protocols. Protocols are the set of Rules about which language you will speak It has already been decided. So because of this There is a lot of communication on our internet. It becomes easier. Just Because Of Protocols. Excellent. Now more about protocols What are the roles brother? protocols There are many other roles as well. I I will tell you everything in writing one by one. Am. Let me show you. We understand this that set of rules is called our Protocols. And what is its role? Its first role is how data is transformed into a Deciding where to go from one place to another. Checking whether the data has been delivered or not. To acknowledge. Whether the data arrived properly or not Reached. Isn't it? If the data is not in order If it has reached then send the data again. Resend and then acknowledge. these Rules are the function of these protocols. These are basically the rules. Let's check these That brother, how will the data go? which way Will you go from here? Will routing be required for that? Will acknowledge whether brother has arrived or not Reached does not mean reached successfully If it reaches you will send it again, right? How is our data used on the Internet? Routing etc. will all happen, this is basically it It's not work, but these protocols will help you Understand how to do the work Whatever programs we have on the internet We've created something for what's going on. I hope you understand the rules correctly. Brother, what other use cases does it have? It has one more function that brother whatever you The data sent will also be verified. Won't you verify that brother's data? If I reached, I reached safely. Any There is no problem or trouble. right in that To verify whether the data is there or not It works. Ok? All of Sara's data I reached or did not reach, this is also the work to be done He does ours. So I mean, example everyone Leave it. Just understand this much. These are The set of communication. set of rules Which can be helpful to perform Communication between multiple devices. For example, let's say I have installed a new app on my device. sent a request to the server from. Ok? Let's assume I have a request Sent. So the request I'll send is this Which protocol will it follow? it It will go through HTTP. http Let's talk about protocol for now. and which I will get a response, that too via HTTP. Will come only after following the protocol. So Now what happened here? protocol here How was the data used, brother? Request is going from, response is coming Is. This is a small example I gave I have told. Ok? Now let's go through everything one by one Let's move on to understanding the protocols. Let's go. So the first one is HTTP. After that comes IP, after that comes TCp And at last UDP will come one by one Let's move towards understanding everyone. Come on now Let us understand http and https i.e. Hyper text Trans Transmission Protocol: This is basically an application layer. What is protocol and what is application layer? I probably need to tell you this No, it is an application layer. protocol It is an application layer protocol. What is the Application Layer in the OSI Model? I have told you to go and look carefully, okay? Yes, so application layer protocol i.e. What is it basically: http or https Let's do this, our browser, that is Connecting the client to the server And this is basically the connection between us Work to establish. data How is that thing going forward? and go through a set of rules Let me tell you that brother, the data should go in the right way. Whether the data is going or not or has it arrived Or did it not come, what response did it come like For example, for example, I said this Let's admit this is me I said that Brother I want to access google.com I He said that I need Brother google no problem now it is google.com's server so what happens from here. What happened from here? The response came from here take that brother HTML CSS and JS pages. what happened here Pay? I requested Open the home page of Google.com. And this What did you do? He gave me all three in response. Gave the pages. Meaning the entire page was given with These files. So what will happen with this? From this It will happen that here I Google.com will appear to open. Now HTTP hypertext is used here The transmission protocol that my Make sure the request is the last one and whatever response I get Make sure he comes back to me Go. So this was the HTTP protocol application There is a layer protocol. But what is HTTPS? Does it happen brother? HTTPS Basically Secure The version is of http. because the problem What happens, right? Let's assume that I Someone demanded data. I said that Brother, please open google.com for me. Now what will be the problem with the data that will come? It will come in plain text form and The request I am sending is also normal. It will go the way it does. So the problem is just this It will happen that some hacker comes in between and may break the connection. Information He can take away everything that is important to us. Ok? So what can we do? we there put on the HTTPS Hyper Text Transmission Protocol Secure. it is basically a h Http Plus Security. Well, what does it mean brother? Its This means basically that whatever data you Sending from one place to another here It happens brother Encryption. what is encryption Brother? Encryption. Same data brother converting it into this form that whatever I The request is only for my server. Could resolve and the response from the server Only I can resolve what has come. Correct Is? Here we have keys that Consider that I am sending an envelope first. Was. Let's say on my server I am a client. I was sending an envelope On the server. But that envelope was open. So If there was a smart person in between He could have sat and read that envelope. But the envelope I'm sending now I'm inside a box inside a box I am sending it packed in which I Entered the password. Now the password is mine only. The server knows. So I took the data from here. Sent it to the server and the server answered my request. Will see. According to him, to me Will respond. So the response he gave me I have given that too to you, keep it inside a box has been given by. So I only have him I know the password. So I only see him I can. So this is the benefit of https. Ok? Where is https used brother? As soon as there is a banking site or Anywhere where we need to access our site To make it secure, we use https. I hope you are understanding this. Meaning, if we Let us understand carefully what HTP servers are. Are? What are HTTP protocols? Are? I am really sorry. So this is basically They work to establish connections. There are application layer protocols. Mostly works on browsers. Web They have been specially made for this only. and HTTP It works on port number 80. This is its There is a port. You just need to specify the port Not now, probably. And HTTPS works 443 Pay. Ok? This is HTTP s. This is HTTP's Is. Are you understanding what I am saying? So these two Works on different ports. HTTP What does it do? HTTP brother connection How is the Establish Connection working? The data has not reached him, there is no one in between I mean, no one is reading it, secure it. whether it is there or not and to see all these things Who will do the work http I'm sorry He will not do security work but will do everyone else's work. Who will do http and https http plus Security and it uses me a little to make a place I want both of these by the way Both of these are ours by the way Work in the application live So here in the application layer, Who comes here to help? SSL System socket 1 minute wait is just Neither SSL nor Secure Sockets Layer Transport Layer Security Correct We are useful here, so here SSL and TSL come in handy. TSL Basically, it can be said in a way that it is SSL. Yes, we are the upgraded version. SSL Secure Sockets Layer and TSL Transport Security Layer. something like this It happens in a way. I once had her full You will have to look at the form. But this is basically What do you do? Whatever this is ours, it is ours request or whatever our response Let's encrypt them and this Make sure that the data we collect from here He's getting there through privacy. It should be transferred properly and it is not happening So brother, tell me is this secure? No, don't go towards this, do you understand me? What is the point here, this is the benefit When we work on the web, we use our http protocol. If we do it then client server architecture It would have played a very important role in Is. ok sir. So I told you as much as I can right now From that you have got one thing in your mind So it must have become clear that HTTP and What is HTTPS? I hope you understand Came. Now let us move on to IP. Let's Go. When I sit down to make a video, I bring something to eat and drink along with water. Like biscuits are kept right now, so that would be Biscuit with cod. Understand carefully. we come Brothers, over the Internet Protocol. Internet Protocol, that is, HTTP Got it. What is Internet Protocol? Is? It is basically a network Layer protocol. What was http? What was it? What was it? Tell me quickly. Application layer right? What is this? Network layer protocols. Its What's the work brother? Its job is simply to For example, let's say I have a courier. Let's say I have a courier who goes ahead There has to be a transfer. So its job is just this That Add the source IP address to it and Add the destination IP address to do. So let's assume I am from Bhopal. Mumbai someone wants to send some letters Am. So what have we done now? Now! We have just written our address on it. The address where it will be delivered is written and Posted it. Haven't arrived yet What to do if it doesn't arrive? This gives us It doesn't make any sense. of the Internet Protocol This is the work. That's all it does. What is its function brother? Its job is to It is a network layer protocol. So its The work is our source IP, destination IP to make it plugged in and assigning the data That brother you have to go here and you can go from here You have come out. So when the data arrives there Same IP and SEM of source and destination This is how the Internet Protocol works. It happens. Now the Internet Protocol is alone Not very powerful but when it combines with TCP means Transmission Control The protocol then becomes very powerful. What happens brother? TCP means that Understand that brother is the hero of our story. Meaning, absolutely perfect transmission control The protocol is written above. in full form I am not writing again. This is basically not very He is very reliable and the best guy. Meaning, understand that it depends on it. May go. He is like Virat Kohli of all The all the like network is not TCP If so, let's say the data is properly secured. I will go brother. Meaning Virat is left, so now become Will go. The run will be chased. Same TCP is with. TCP is like very reliable. it What does it do? What roles does it have? Are? Its first role is to store data Breaking into packets. All the packets that are made Sequencing What else do you do brother, these packets Pay does the sequencing. Forms of packets I have broken down the data. acknowledges that Whether the data arrived properly or not. And If it doesn't reach him, he does it again. Then Sends data from. means a lot More reliable, one might say. Our people are delivery boys who collect data properly. transporting from one place to another is very works well. And along with this, which Sequencing the packets that have arrived. Meaning breaking the data into packets Gave. I told you it was bigger than 11 people. It was a courier. He has 11 small couriers I broke it. Write down the names of all of them one by one. And then after that he sent it. Check that it Whether it reached properly or not. Do you understand? No, what I'm trying to say is remember that It is a transport layer Protocol Which Layer Transport Layer Protocol Bhaiya Transport Layer means What is transport layer, tell me? OSI gave, don't do this drama, it is still there, isn't it? You know, listen to people, go over here. I told you that breaking the packets means that Breaking down couriers turned sequencing Now this make sure that all that If one of the beaches can be reached in a good way I missed number four or number seven. Our Thala brother's kit was left behind. of the Lions. So what did we do? We have him Send it again. And when there again When it reaches, arrange them again. From. Sequence after rearranging According to them, make sure that the same arrived in the sequence in which Sender wanted to deliver them. Do you understand? No, what am I trying to say? this is the Roll of TCP. And this is a lot of work. Brother. ok sir. Now understand this as Let us assume that there is a wedding and in the wedding there is one who those whose son gets married or The father-in-law type who are all as many as they can be When there are guests, they say to them that Be sure to eat food before leaving. Brother, please eat your food Let's go. Meaning, the most they talk about is food. Be sure to eat before leaving. why are they doing it As such? Because they are making sure that If someone has come, then when he leaves from here He must have eaten food before leaving. are you able to understand No? Well, understand it like this. This is it TCP. What does TCP do? This is Going to make sure data is properly from one place Reaching another place, not reaching Reaching the right way. not reach If anything remains, he is sending it again. And this is A spoiled boy. This is known as UDP. User Data Gram Protocol. Understand it like this That is just the opposite of TCP. what does it do Isn't it? The data will travel very fast. Meaning Will travel very fast. Isn't it? to the data It was broken in the form of packets You. You did a great job by breaking it. You that The data was also sent. But here at There is no sequencing. Meaning, understand it like this Let's assume low sequencing doesn't exist. And there is no acknowledgement here either. And sending the data again is no big deal. Not there. Meaning, understand it like this that the uncle You were there, son, please eat that food before leaving. Eat Friends, please eat it before leaving. Definitely eat food Go. So, he is not like that uncle. What did he do? He said it only once The food is ready in the diya mike. whichever Whoever wants to eat, come. Now whoever heard it came Will go. Whoever has not heard will not come. You understand the meaning, right? Its job is to process data Very fast delivery. from one place to another Place. Now he hasn't fully arrived. It is not a problem to reach there. This means that our There is no work. It's fine now. If you arrive, you arrive If it doesn't reach then it doesn't reach. next time Will understand. But it is going very fast. So This is also used a lot. So brother Both have different use cases. Meaning Yes, absolutely so. Ok. So UDP's Coach, tell me better. I told you the same It's the same, friend. Fast data transfer Is. Does sequencing. No knowledge Sequencing does not. Not even acknowledgment Does. If I missed something, it won't happen again. Sells. Do you understand what I am saying? what am I What am I trying to say? and fast so use is done. And TCP does the same thing. Who is not doing this. Isn't it? and a little It is a little slow in comparison. Good. So where do we use TCP? Are? And where is UDP used? Its By the way, I also made a diagram below. Is. But let's understand for now. TCp Where I need reliability and security With that I mean, brother, whatever data I need That data should come completely. Such as Is it on the bank's website or something? in e-commerce etc. or if your big Is it a brand or do you want to learn something like this? Meaning, in which data I need that brother loss I can't afford that. So there Where will Pay DCP be used? Live There are also a couple of frames dropping while streaming. If so, what is the problem? I mean I'm saying I am here and I have you by my side I seem to have a couple of frames missing. The frame of one of my eyes disappeared. What Any problem? If you had accepted it live. Where Is it used? Games In. Where is it used? In video calls. It is also used many times in voice calls. Ok? In video slash voice calls. I mean, as you may have seen, I I am talking on the phone and the network is not working properly. An error occurs several times. So I say something. Hello where? Went ahead. Do you understand? My What am I trying to say? So this Both have different use cases. So I A diagram has also been made. I show you I give. It has become quite small. So this Let's make it a little bigger. Just A minute we Ok. By the way, I will also give you this diagram. I will get it provided. to to full form to I don't need to tell you. Transmission Control protocol, user datagram Hypertext Transfer Protocol Hypertext Transfer Protocol Protocol, Secure and Internet Protocol. Now in which layers do we work? UDP And I already knew about TCp. It is in the transport layer. This application Both are in layers and this is the network layer is in. Connection brother is connection oriented. But UDP is connectionless. Brother No need to establish a connection. Because happens in TCP Three Way Handshake or Three Steps of Handshake. In which what does one do first? They Makes the connection. Meaning, understand that What will he do first? I this I forgot to tell you in a hurry. But no one It's not the point, I'm telling you again. Isn't it? It establishes connections in three ways. First that A establishes this connection from the client side Brother, I am going to ask for data. Meaning I need this data. Then the server's comes from the side Response. Yes, I am ready. Ok? And Then thirdly, here is the flow of data. It turns on. So it's connection oriented. Is. And as far as our UDP is concerned, in this There is no connection setup at all. So the data That's why it gets released, my friend. Correct Is? And everything else is also connectionless. Reliable brother, he is very reliable. UDP is not there at all. Not even this Is. These are not considered reliable. But this If added with TCP then this also They become reliable. Ok? Speed TCp is comparatively slow. So for UDP Absolutely blazing fast. Ok? The speed of both http https has a little meaning The problem is because it's a little bit without If it comes with encryption then it comes fast and It comes with encryption so it's a little It comes slowly. okay and so the IP address Just tell me what his job is and create a source. Just tell me the destination and I'll go. So that's it. Ok? And here Everything is written down. such as error Handling is done only by TCp. anyone else does not. Like security in someone There is not as much security as It happens in our https. this is made for Just security and a little more of it So it happens because in this we and many others All protocols are followed. such as email If you are selling then SMTP protocol will be required. Simple Mail Transfer Protocol is this? in a manner and according to their use Emails are written, web file transfers are done If there is FTP protocol, video call Website for gaming and streaming If you are browsing, use http secure Are you using https for banking websites? and routing between different networks. Correct Is? And the port number is also in front of you here They are written below. So I hope you here By then you would have understood the protocols. Congratulations for watching this video till the end Have seen. So now you have to provide proof. Of this matter. Go to the comment section below I will have to write it down. I have completed this Video Till The End. so that I can know That's the video I made for you guys. You really liked it and this The video has made some impact on your life. Have done. This was Sarthak Sharma and you have Been a great audience. and if a similar video You want more please let us know in a comment Section. Thank you so much for watching this Video. Bye-bye. [music]