Understanding Segments, Packets, and Frames - Data Encapsulation Series

Sdílet
Vložit
  • čas přidán 1. 06. 2024
  • In this video we go into more detail about the data encapsulation process and discuss in a little more detail for our layer 4 segments, layer 3 packets, and layer 2 frames.
    Take my Cisco CCNA iOS Administration Labs Course for $10.00
    www.udemy.com/cisco-ccna-rs-2...
    Take my Subnetting - Become a subnet master Course for $10.00 (Best selling online subnetting course)
    www.udemy.com/subnetting-beco...

Komentáře • 38

  • @atdeul
    @atdeul Před 8 měsíci

    wireshark never made this much sense , thanks man. The way you break down the concepts , excellent !

  • @user-hz7hp1dj1k
    @user-hz7hp1dj1k Před 2 měsíci

    Thank You so much, your channel and your explanation is really amazing!
    Please keep your channel updated!

  • @mrrairai
    @mrrairai Před 2 lety +3

    These trainings are amazing. I understand all of this so much better now.

  • @clark201
    @clark201 Před 4 lety +4

    The pacing is intense! Loved it though. It gave me a fuller understanding on the segment, packet, frames and bits part of the OSI model. Thank you!

  • @MahipalYadavmahii
    @MahipalYadavmahii Před 4 lety +2

    excellent video, clears many of the obvious doubts that one can have while studying for ccna certification

  • @inb4play167
    @inb4play167 Před 3 lety +1

    Great quality video, hope to get some notifications from any new work in the future

  • @kurwakazdynickzajety
    @kurwakazdynickzajety Před rokem

    The best video i've found on CZcams about TCP/IP model. I saw many in german and polish, but just yours is coplete! TNANK YOU SO MUCH!

  • @allybiggs5423
    @allybiggs5423 Před 4 lety +2

    Excellent clear and concise explanations I now understand the encapsulation process thank you :)

  • @Be_thechange
    @Be_thechange Před 5 lety +11

    The best video on youtue explaining this, trust me have done lots of searching..thankyou, keep doing more videos, pls cover SAN also..

  • @redhippieful
    @redhippieful Před 3 lety +1

    I am finally understanding the difference! Thanks!

  • @footballcafe.2635
    @footballcafe.2635 Před rokem

    This is the best explanation I've got on Networking, thank you so much sir.

  • @oluwaseunogundipe1531
    @oluwaseunogundipe1531 Před 4 lety +1

    A very helpful video. Thanks

  • @zenapplejones
    @zenapplejones Před 2 lety

    Had to slow it down to understand- I got it NOW !!!! Thanks !!!

  • @lukasbeacon372
    @lukasbeacon372 Před rokem

    Than you so much!! Awesome instructor. This is amazing content

  • @SJTUer0
    @SJTUer0 Před 5 lety +2

    Very helpful!

  • @roa455
    @roa455 Před 3 lety

    bloody brilliant

  • @mirjanballa9132
    @mirjanballa9132 Před rokem

    Well explained sir!

  • @AbdurRehmanSayed
    @AbdurRehmanSayed Před 9 měsíci

    Well explained.

  • @peshutanpavri1599
    @peshutanpavri1599 Před 2 lety

    Hi, this is a good tutorial. I am just a bit confused about a few things. I thought MAC addresses were only there to resolve local IP addresses? So if a packet is moving from one router to another and they are in different networks, how will it get the Mac address?

  • @jaccisherry24
    @jaccisherry24 Před 2 lety

    Very helpful

  • @donhjoe2162
    @donhjoe2162 Před 2 lety

    I have a question, there are 2 computers connected directly and configured to be a point to point network I mean PC A and PC B. And I want to send a data (word, name, characters) from one computer to another (from A to B), How the computer B knows that the package have been send completely from computer A, in what layer this happen?

  • @davidebarbieri5374
    @davidebarbieri5374 Před 5 lety

    How is a URL translated into an IP, since the DNS is not on my (source) PC?
    If my PC does'nt know the destination IP, does it mean it first encapsulates any segment with the IP of the ISP DNS? Thanks

    • @WellPlayedGaming
      @WellPlayedGaming Před 4 lety

      I know this is an older question but to answer for the future. When this happens, your PC first reaches out to the DNS server to get the IP back before starting the connection to the host.
      You can download Wireshark to see this process for yourself. You'll notice that if you go to a site that you haven't been to before, there is first a DNS request sent to get the IPs and then the TCP request is sent after you get the IPs back.

  • @slyuk9482
    @slyuk9482 Před 3 lety

    Very useful video...but at warp speed! :-)

  • @01waterwalker
    @01waterwalker Před 5 lety +3

    Man, you talk fast but great video! Very well explained.

  • @istuart0
    @istuart0 Před 2 lety

    I understand why the packets are built but not the how they are built. It would be very useful to also know, *where* does the transport layer get the port numbers from? Where does the Network layer get the IP addresses and how does the data layer get the MAC address of a machine that is on the other side or the world?

  • @scottsmyth1862
    @scottsmyth1862 Před 3 lety

    Nice

  • @rammohanty6070
    @rammohanty6070 Před 3 lety

    what is data packet produced

  • @ramirez368
    @ramirez368 Před 4 lety +1

    You talk a little too fast, but it's a very good video.

  • @spacefentionz
    @spacefentionz Před 5 lety +1

    I understand everything except what unpacks the segment layer and how. The router needs to remove the frame layer in order to see the ip address, and then repackage the data block in another frame and then send it off, but what I don't understand is where the segment is looked at. The destination port is 80, and I thought that that was handled at the router level as well (firewalls are usually on the router), but you didn't really talk about that part. What am I missing?

    • @LearnTechTraining
      @LearnTechTraining  Před 5 lety +6

      Probably one of the best questions I’ve received in a while...
      First of all, routers are routers. Not firewalls. Yes you can implement features that permit or deny the flow of traffic, but it should be a routers prime job of only routing. Firewalls, are ‘beefed’ up routers with plenty of more features allowing the control of traffic.
      Segments for source and destination port information are providing a service to the layers above it, so the application layer.
      TCP has addresses called ports, and the application is assigned to one of the addresses, port 6000 for example. TCP will segment these data and put TCP headers on the data segment. The TCP headers include the source and destination port number.
      This then gets added to the packet where now we need to know where the information is being sent to, and from for network communication.
      Then the frame.
      Each of these get encapsulated and decapsulated by software built into the nic’s on your end user devices or networking equipment. Each device will know what information it needs and decapsulate the packet until it learns that information.
      Firewalls control our traffic, same with access control lists on routers. This can allow certain traffic to and from different applications. Maybe one application has the ability to use http, https, telnet, and ssh. But http and telnet are not secure so we can block traffic to/from that one application for those two based on the port information, but we still need to access it... so we will allow the secure https or ssh traffic. Again, supporting the application.
      Hope this helped clear some of that up.

  • @arammaldonado2451
    @arammaldonado2451 Před 4 lety

    😴😴😴😴

  • @zurieltraininganddevelopme1198

    Too fast sir. Couldn't tag along the speed.

  • @WLwiza
    @WLwiza Před rokem

    Excellent but you are too fast in explaining. It you explain this slowly it will be more excellent.

  • @punkeyengineer
    @punkeyengineer Před 3 lety +1

    not helpful, you went a bit way too fast.

  • @fifthamendment1
    @fifthamendment1 Před 5 měsíci

    Talk too fast. Hard to follow.

  • @frenchmike
    @frenchmike Před 3 lety

    sir this is not a race. you speak like u have to run somewhere not as a tutorial.