< Return to Video

Hub, Bridge, Switch, Router - Network Devices - Networking Fundamentals - Lesson 1b

  • 0:01 - 0:03
    Hello. Welcome to the second part of our
  • 0:03 - 0:05
    lesson on network devices.
  • 0:05 - 0:06
    This is the first lesson from the first
  • 0:06 - 0:09
    module of my new course
    on networking fundamentals.
  • 0:09 - 0:11
    The purpose of this module is to teach you
  • 0:11 - 0:13
    how data flows through the internet.
  • 0:13 - 0:15
    In part one of this lesson, we discussed
  • 0:15 - 0:16
    the concepts of a host,
  • 0:16 - 0:19
    an IP address, and a network. If you
  • 0:19 - 0:20
    haven't watched that video, go ahead and
  • 0:20 - 0:23
    pause this video right now
    and watch the first video.
  • 0:23 - 0:25
    There'll be a link in the description.
  • 0:25 - 0:26
    In this video, we're simply going to
  • 0:26 - 0:28
    continue right where we left off.
  • 0:28 - 0:30
    Now, the main idea we want to teach in
  • 0:30 - 0:32
    this video are these last two devices:
  • 0:32 - 0:35
    switches and routers.
    But we can't really understand those
  • 0:35 - 0:37
    until we understand
    where we've come from.
  • 0:37 - 0:40
    So we have to start there.
  • 0:40 - 0:42
    In the last video, we unpacked the idea
  • 0:42 - 0:44
    of a network. We identified that a
  • 0:44 - 0:45
    network is created anytime you connect
  • 0:45 - 0:48
    two computers to each other using a wire.
  • 0:48 - 0:50
    One thing to understand about sending
  • 0:50 - 0:52
    data across a wire is that it decays as
  • 0:52 - 0:54
    it travels greater and greater distances.
  • 0:54 - 0:56
    If the two computers you're connecting
  • 0:56 - 0:57
    are in the same room, then you don't
  • 0:57 - 0:58
    really have to worry about it.
  • 0:58 - 1:00
    The decay will still occur, but the
  • 1:00 - 1:02
    signal will still get through,
    and therefore,
  • 1:02 - 1:05
    connectivity between these
    hosts is still attained.
  • 1:05 - 1:07
    If, however, these hosts span greater
  • 1:07 - 1:10
    distances, maybe you're
    connecting two computers on
  • 1:10 - 1:12
    opposite sides of a building, or even in
  • 1:12 - 1:15
    two different buildings,
    then you might have a problem.
  • 1:15 - 1:18
    If the signal decays before
    it gets the other side,
  • 1:18 - 1:21
    then these two hosts cannot share data.
  • 1:21 - 1:23
    In those cases, what you need is a
  • 1:23 - 1:26
    repeater. A repeater is a device
    whose sole purpose is to
  • 1:26 - 1:29
    regenerate signals.
    Anything that comes in on one end
  • 1:29 - 1:32
    simply gets regenerated
    out the other side.
  • 1:32 - 1:37
    This allows you to connect devices
    together which span greater distances.
  • 1:39 - 1:41
    So far, we've been talking
    about networking
  • 1:41 - 1:43
    from the perspective of
    connecting one host
  • 1:43 - 1:46
    directly to another host. Well, if you add
  • 1:46 - 1:49
    a third host, you now have
    to connect that host
  • 1:49 - 1:52
    to all the other hosts which
    you've already established.
  • 1:52 - 1:54
    And if you add a fourth host,
  • 1:54 - 1:55
    you now have to connect this fourth host
  • 1:55 - 1:58
    to all the hosts that already exist.
  • 1:58 - 2:01
    And again, if you add a fifth host,
    you now have to connect this fifth host
  • 2:01 - 2:03
    to every host that
    has already been connected.
  • 2:03 - 2:06
    As you can see, connecting
    hosts directly to each other
  • 2:06 - 2:08
    simply doesn't scale.
  • 2:08 - 2:10
    Instead, we created devices
    which we could put
  • 2:10 - 2:12
    at the center of every network and connect
  • 2:12 - 2:14
    all the hosts to those devices.
  • 2:14 - 2:16
    And these devices would then handle
  • 2:16 - 2:19
    funneling communication
    between these different hosts.
  • 2:19 - 2:22
    The benefit to these types of devices is
  • 2:22 - 2:24
    that if a sixth host gets spun up,
  • 2:24 - 2:26
    it's very easy to simply connect it once
  • 2:26 - 2:28
    to that device,
    and now it has connectivity
  • 2:28 - 2:30
    to every host that has already existed.
  • 2:30 - 2:32
    That's what all of these are. And the
  • 2:32 - 2:35
    first of these types of devices
    that we're going to discuss
  • 2:35 - 2:38
    is known as a hub. A hub
  • 2:38 - 2:41
    is nothing more than
    a multi-port repeater.
  • 2:41 - 2:43
    Earlier, we discussed repeaters, and we
  • 2:43 - 2:45
    said all they do is regenerate signals.
  • 2:45 - 2:47
    Hubs do the same thing, except they do it
  • 2:47 - 2:49
    across multiple ports.
  • 2:49 - 2:51
    For example, if these two hosts over here
  • 2:51 - 2:52
    need to communicate,
  • 2:52 - 2:54
    one of them sends a packet to the other,
  • 2:54 - 2:56
    it'll hit the hub, and the hub will
  • 2:56 - 2:58
    simply duplicate that packet and send it
  • 2:58 - 2:59
    out all remaining ports.
  • 2:59 - 3:04
    That'll allow what this guy
    sends to arrive over here.
  • 3:04 - 3:07
    This fixes the scale problem. A hub is the
  • 3:07 - 3:08
    first device that allows us to connect
  • 3:08 - 3:10
    multiple devices in the center, and now
  • 3:10 - 3:13
    all of them have connectivity to each other.
  • 3:13 - 3:15
    But, as you can probably see, the problem
  • 3:15 - 3:17
    with the hub is that everybody receives
  • 3:17 - 3:19
    everybody else's data.
  • 3:19 - 3:20
    These two hosts over here, which are
  • 3:20 - 3:23
    uninvolved in the communication
    between these two hosts,
  • 3:23 - 3:27
    are receiving a copy of
    everything they send.
  • 3:27 - 3:30
    Which brings us to bridges.
  • 3:30 - 3:32
    Here, we have two sets of hosts, all
  • 3:32 - 3:34
    interconnected using a hub.
  • 3:34 - 3:36
    And a bridge is meant to sit in between
  • 3:36 - 3:38
    hub-connected hosts.
  • 3:38 - 3:41
    Bridges, by definition, only have two
  • 3:41 - 3:43
    ports: one port facing one set of
  • 3:43 - 3:45
    hub-connected devices and another port
  • 3:45 - 3:48
    facing the other set of
    hub-connected devices.
  • 3:48 - 3:51
    Bridges will also then learn
    which hosts are on which
  • 3:51 - 3:53
    side of the bridge. This would allow the
  • 3:53 - 3:55
    bridge to contain communication
  • 3:55 - 3:58
    to only the side that is necessary.
    For example,
  • 3:58 - 4:02
    if these hosts again need
    to speak to each other,
  • 4:02 - 4:03
    when they send data to each other
  • 4:03 - 4:05
    through that hub, the hub is of course
  • 4:05 - 4:07
    going to simply regenerate that signal
  • 4:07 - 4:09
    at all ports
  • 4:09 - 4:10
    and notice that the bridge can be
  • 4:10 - 4:13
    getting a copy of that packet.
  • 4:13 - 4:14
    But the bridge knows that the other
  • 4:14 - 4:17
    green host is on this side of the bridge,
  • 4:17 - 4:19
    and therefore, the bridge isn't going to
  • 4:19 - 4:21
    bring that packet to the other side.
  • 4:21 - 4:23
    The bridge is the first type of device
  • 4:23 - 4:27
    that helps contain packets
    only to their relative networks.
  • 4:27 - 4:30
    On the other side, if these hosts
    need to speak to each other,
  • 4:30 - 4:32
    they can also send packets to each other
  • 4:32 - 4:34
    through their hub, and once again, the
  • 4:34 - 4:36
    bridge will not let those packets bleed
  • 4:36 - 4:38
    into the other side, because it knows
  • 4:38 - 4:43
    the yellow devices exist on the right hub.
  • 4:43 - 4:45
    And of course, if this device needs to
  • 4:45 - 4:47
    send something to this device, the bridge
  • 4:47 - 4:48
    is going to know that that traffic
  • 4:48 - 4:50
    is going to have to cross the bridge,
  • 4:50 - 4:52
    and the bridge will allow that packet to
  • 4:52 - 4:55
    traverse to the other side.
  • 4:58 - 5:00
    The main takeaway is understanding that
  • 5:00 - 5:03
    bridges can learn
    which hosts are connected
  • 5:03 - 5:06
    on either side of the two
    ports of the bridge.
  • 5:06 - 5:09
    Now this finally brings
    us to switches.
  • 5:09 - 5:11
    Switches are sort of like a combination
  • 5:11 - 5:15
    of hubs and bridges. They are like hubs
  • 5:15 - 5:16
    in the sense that many devices can
  • 5:16 - 5:19
    connect to the switch, and they are like
  • 5:19 - 5:22
    bridges in the sense
    that they can learn which hosts
  • 5:22 - 5:24
    are connected to each port.
  • 5:24 - 5:26
    The main difference is that they're
  • 5:26 - 5:29
    doing it on a per-port basis,
  • 5:29 - 5:31
    which means if these two
    hosts want to speak to
  • 5:31 - 5:33
    each other, the switch
    will know that the only ports
  • 5:33 - 5:35
    that need to receive this traffic
  • 5:35 - 5:36
    are the two that are connected to those
  • 5:36 - 5:38
    green hosts, and will keep that communication
  • 5:38 - 5:43
    contained to just those ports.
    Moreover, if these
  • 5:43 - 5:44
    two hosts want to speak to each other,
  • 5:44 - 5:46
    the switch will again make sure that
  • 5:46 - 5:50
    that communication only flows
    between the relative ports.
  • 5:50 - 5:52
    So this is how a switch is like a
  • 5:52 - 5:55
    combination of a hub and a bridge.
  • 5:55 - 5:57
    The formal definition of a switch that
  • 5:57 - 6:00
    we want to use is that
    a switch is a device
  • 6:00 - 6:06
    which facilitates
    communication within a network.
  • 6:06 - 6:08
    Earlier, we defined a network as a
  • 6:08 - 6:10
    logical grouping of hosts which require
  • 6:10 - 6:14
    similar connectivity. Which means
  • 6:14 - 6:16
    all of these devices over here all
  • 6:16 - 6:17
    belong to the same network.
  • 6:17 - 6:21
    Moreover, networks all share the same
  • 6:21 - 6:23
    IP address space,
  • 6:23 - 6:25
    which means this network owns all the IP
  • 6:25 - 6:27
    addresses which start with
  • 6:27 - 6:29
    192.168.1.anything,
  • 6:29 - 6:31
    and this host's identity is the IP
  • 6:31 - 6:35
    address 192.168.1.33
  • 6:35 - 6:40
    And this host would be 192.168.1.66.
  • 6:40 - 6:43
    And this set of devices could
    very easily represent
  • 6:43 - 6:46
    all the different hosts on
    your home wi-fi network.
  • 6:46 - 6:48
    Maybe this device is your printer, and
  • 6:48 - 6:51
    this device is your laptop,
    and this device is your mobile phone,
  • 6:51 - 6:52
    and so on.
  • 6:52 - 6:55
    Or maybe this network and these devices
  • 6:55 - 6:57
    represent all the PCs that might exist
  • 6:57 - 6:58
    within a particular classroom
  • 6:58 - 7:01
    of the school network. Or maybe, even
  • 7:01 - 7:03
    further, all these devices represent
  • 7:03 - 7:05
    hosts that exist in the sales team
  • 7:05 - 7:09
    of the London office of the
    ACME corporation.
  • 7:09 - 7:11
    One way or another, since all these
  • 7:11 - 7:13
    devices are connected with a switch,
  • 7:13 - 7:16
    they all belong to the same network.
  • 7:16 - 7:20
    Now, let's go back to that
    example of the school network.
  • 7:20 - 7:23
    we said that the school
    likely has many different classrooms,
  • 7:23 - 7:27
    and each of those classrooms
    belong to their own network,
  • 7:27 - 7:28
    which means this would be a more
  • 7:28 - 7:30
    accurate representation of the school
  • 7:30 - 7:32
    network. We would have Classroom Two
  • 7:32 - 7:34
    owning that IP space, and Classroom Three
  • 7:34 - 7:36
    owning that IP space.
  • 7:36 - 7:38
    Now, the reason you might want to
  • 7:38 - 7:41
    separate these two sets of devices into
  • 7:41 - 7:43
    their own network is
    because they might have
  • 7:43 - 7:45
    different connectivity requirements.
  • 7:45 - 7:48
    For example, maybe
    these computers over here
  • 7:48 - 7:50
    all belong to the biology classroom and
  • 7:50 - 7:53
    all they need is simple
    internet connectivity,
  • 7:53 - 7:54
    but maybe these computers over here
  • 7:54 - 7:57
    belong to the computer science classroom,
  • 7:57 - 7:59
    and they not only need internet connectivity,
  • 7:59 - 8:01
    but also access to various cloud resources
  • 8:01 - 8:04
    to do their studies. Well, since these
  • 8:04 - 8:06
    computers have different
    connectivity requirements
  • 8:06 - 8:08
    than these computers, it's a good idea to
  • 8:08 - 8:12
    separate those out into separate networks.
  • 8:12 - 8:14
    Now, in both cases, we can still use
  • 8:14 - 8:15
    switches to facilitate
  • 8:15 - 8:18
    all the communication within the networks,
  • 8:18 - 8:20
    meaning this switch can handle all the
  • 8:20 - 8:22
    communication between these three
  • 8:22 - 8:25
    hosts, and this switch can
    handle all the communication
  • 8:25 - 8:29
    between these three hosts.
  • 8:29 - 8:31
    But what happens if this host down here
  • 8:31 - 8:35
    wants to speak to this host
    on a different network?
  • 8:35 - 8:37
    Well, if a switch can only facilitate
  • 8:37 - 8:40
    communication within a network,
  • 8:40 - 8:41
    we would need another type of
  • 8:41 - 8:43
    device to handle the communication
  • 8:43 - 8:47
    between networks, and that device would be
  • 8:47 - 8:50
    a router. A router is a device whose
  • 8:50 - 8:53
    primary purpose is to
    facilitate communication
  • 8:53 - 8:57
    between networks. At the very least,
  • 8:57 - 8:59
    you're going to need that router to
  • 8:59 - 9:02
    connect you with the
    ultimate network of networks
  • 9:02 - 9:04
    known as the internet.
  • 9:04 - 9:06
    So let's unpack this further.
  • 9:06 - 9:09
    Routers provide traffic
    control points between
  • 9:09 - 9:12
    networks. Let's say we wanted to limit
  • 9:12 - 9:16
    the traffic that could go
    from this PC to this PC.
  • 9:16 - 9:19
    Well, since these two PCs
    aren't separate networks,
  • 9:19 - 9:21
    all that traffic has to flow through the
  • 9:21 - 9:23
    router, creating a great place
  • 9:23 - 9:25
    to add security policies or traffic
  • 9:25 - 9:26
    filtering, or even redirecting that
  • 9:26 - 9:29
    traffic elsewhere entirely.
  • 9:29 - 9:31
    Since routers sit on the boundary between
  • 9:31 - 9:36
    networks, they provide a logical
    location to apply security policies.
  • 9:36 - 9:38
    This type of security filtering isn't
  • 9:38 - 9:40
    traditionally available on switches.
  • 9:40 - 9:42
    These days, there are modern switches
  • 9:42 - 9:44
    that can do such filtering, but it is
  • 9:44 - 9:46
    generally accepted that
    the devices sitting
  • 9:46 - 9:48
    on the same network don't
    typically need filtering for
  • 9:48 - 9:50
    traffic traveling within the network.
  • 9:50 - 9:52
    If you had devices that needed different
  • 9:52 - 9:54
    types of connectivity, you'd want to
  • 9:54 - 9:56
    place them in different networks.
  • 9:56 - 9:58
    The network boundary is
    what is meant to be
  • 9:58 - 10:01
    the logical separation of devices.
  • 10:01 - 10:04
    The way routers work is that they learn
  • 10:04 - 10:05
    which networks that they are
  • 10:05 - 10:08
    attached to. Meaning, this router is going
  • 10:08 - 10:09
    to learn that on this interface, it's
  • 10:09 - 10:13
    connected to the 172.16.20 network
  • 10:13 - 10:17
    And on this interface, it's
    connected to the 172.16.30 network.
  • 10:17 - 10:20
    And out here is the direction
    to go to the internet.
  • 10:20 - 10:22
    The knowledge of each of these different
  • 10:22 - 10:24
    networks is known as a route,
  • 10:24 - 10:26
    and all these routes are stored in what
  • 10:26 - 10:28
    the router calls a routing table.
  • 10:28 - 10:31
    A routing table is therefore
  • 10:31 - 10:33
    all the networks that a router knows
  • 10:33 - 10:35
    about, and the router is going to use
  • 10:35 - 10:37
    this routing table in
    order to funnel traffic
  • 10:37 - 10:40
    out the appropriate interface.
  • 10:40 - 10:42
    Now, when we say a router learns which
  • 10:42 - 10:44
    networks they are attached to,
  • 10:44 - 10:47
    what we mean is that
    a router has an IP address
  • 10:47 - 10:50
    in every network that they're attached to.
  • 10:50 - 10:53
    For example, when this
    router is attached to this
  • 10:53 - 10:57
    network, it is given an
    IP adress in that network.
  • 10:57 - 11:03
    This interface's identity
    is the IP address 172.16.20.1,
  • 11:03 - 11:05
    and this interface's identity
    is the IP address
  • 11:05 - 11:08
    172.16.30.254.
  • 11:08 - 11:11
    This IP address is going to serve as
  • 11:11 - 11:13
    what's known as a gateway.
  • 11:13 - 11:18
    A gateway is a host's way
    out of their local network.
  • 11:18 - 11:21
    For example, this host over here has the
  • 11:21 - 11:24
    IP address 172.16.20.33
  • 11:24 - 11:27
    But if that host wants to
    speak to something on a
  • 11:27 - 11:30
    different network, it knows
    it's going to have to go
  • 11:30 - 11:33
    through a router, and the IP address for
  • 11:33 - 11:36
    that router is stored as
    that host's default gateway.
  • 11:36 - 11:42
    Notice, this host has a
    default gateway of 172.16.20.1.
  • 11:42 - 11:45
    That's this interface
    IP address of that router.
  • 11:46 - 11:49
    Now, if we go a step higher than that,
  • 11:49 - 11:51
    routers are actually what create
  • 11:51 - 11:53
    the hierarchy in networks and IP
  • 11:53 - 11:55
    addresses that we discussed in the prior
  • 11:55 - 11:58
    sections of this lesson. For example, the
  • 11:58 - 12:00
    New York office of the ACME corporation
  • 12:00 - 12:02
    that had all the different teams that
  • 12:02 - 12:04
    each had their own IP networks?
  • 12:04 - 12:06
    Well, each of those networks
    are connected to different
  • 12:06 - 12:08
    routers, and each of
    those routers are then
  • 12:08 - 12:10
    connected to another router.
  • 12:10 - 12:12
    And if a host in the sales team wants to
  • 12:12 - 12:14
    speak to a host on the marketing team,
  • 12:14 - 12:16
    it's going to use its gateway, which is
  • 12:16 - 12:18
    its closest router IP address,
  • 12:18 - 12:19
    which is then going to send the packet
  • 12:19 - 12:21
    to the next router, to the next router,
  • 12:21 - 12:24
    and then finally to the
    host on the marketing team.
  • 12:24 - 12:27
    The Tokyo office of the ACME corporation
  • 12:27 - 12:29
    is likely going to have a similar setup,
  • 12:29 - 12:31
    and both of these routers are then
  • 12:31 - 12:33
    likely going to connect to the internet.
  • 12:33 - 12:35
    The internet is nothing more than a
  • 12:35 - 12:37
    bunch of different routers itself.
  • 12:37 - 12:39
    Meaning, if a host on the marketing team
  • 12:39 - 12:41
    wants to speak to a host on the
  • 12:41 - 12:43
    engineering team in Tokyo,
  • 12:43 - 12:45
    that host will send the data to the
  • 12:45 - 12:47
    router, which will send
    the data to the next router,
  • 12:47 - 12:50
    which will send it through all
    the routers on the internet,
  • 12:50 - 12:51
    which will finally send it
    to the Tokyo router, and
  • 12:51 - 12:54
    finally to the engineering team.
  • 12:54 - 12:57
    That is how data is going to
    flow across the internet,
  • 12:57 - 12:59
    and that is the role that routers play
  • 12:59 - 13:02
    in making that possible.
  • 13:02 - 13:04
    Now, the last idea I want
    to leave you with
  • 13:04 - 13:08
    actually involves pulling back
    the definition of switches as well.
  • 13:08 - 13:10
    There's something important
    you have to understand
  • 13:10 - 13:13
    about what we've defined
    as routers and switches.
  • 13:13 - 13:17
    Routing is the process
    of moving data between
  • 13:17 - 13:21
    networks. A router,
    as we have described it,
  • 13:21 - 13:23
    is simply a device whose primary purpose
  • 13:23 - 13:27
    is to perform routing. In the same way,
  • 13:27 - 13:31
    switching is the process
    of moving data within networks.
  • 13:31 - 13:34
    And a switch, as we have described it, is
  • 13:34 - 13:35
    a device whose primary purpose
  • 13:35 - 13:38
    is switching. The reason I bring that up
  • 13:38 - 13:40
    is there are many other types of network
  • 13:40 - 13:42
    devices that exist out there.
  • 13:42 - 13:45
    Access points, firewalls, load balancers,
  • 13:45 - 13:46
    Layer-3, switches, proxies,
  • 13:46 - 13:48
    and there's even devices that only exist
  • 13:48 - 13:52
    in the cloud, like
    virtual switches and virtual routers.
  • 13:52 - 13:55
    One way or another,
    all these devices are going to
  • 13:55 - 13:59
    perform routing, or
    switching, or both. So later on
  • 13:59 - 14:00
    in this module, when we describe
  • 14:00 - 14:03
    what a router does, or what a switch does,
  • 14:03 - 14:05
    what we are actually describing is what
  • 14:05 - 14:08
    any device does that implements routing,
  • 14:08 - 14:12
    or any device does
    that implements switching.
  • 14:12 - 14:14
    And with that, we close our lesson on
  • 14:14 - 14:17
    network devices.
    In part one of this lesson,
  • 14:17 - 14:21
    we unpacked hosts,
    IP addresses, and networks,
  • 14:21 - 14:22
    and in part two,
  • 14:22 - 14:25
    we continued that discussion
    by illustrating repeaters,
  • 14:25 - 14:29
    hubs, bridges, switches, and routers.
  • 14:29 - 14:31
    In the next lesson, we're going to give
  • 14:31 - 14:35
    you a practical perspective
    on the OSI model.
  • 14:35 - 14:36
    This will lay the foundation to
  • 14:36 - 14:38
    understand what all of these devices do
  • 14:38 - 14:41
    to enable data flowing
    through the internet.
  • 14:41 - 14:43
    But that wraps up this lesson. Your main
  • 14:43 - 14:46
    takeaways are on the slide right now.
  • 14:46 - 14:49
    I hope you enjoyed this lesson.
    I want to thank you for watching,
  • 14:49 - 14:52
    and we'll see you in the next one.
  • 14:52 - 14:54
    Hey, YouTube. I hope you enjoyed that free
  • 14:54 - 14:56
    lesson for my new course on
    networking fundamentals.
  • 14:56 - 14:58
    I'll be releasing the entire first
  • 14:58 - 15:00
    module for free here on YouTube.
  • 15:00 - 15:02
    I want this course to be the ultimate
  • 15:02 - 15:03
    networking fundamentals course, and since
  • 15:03 - 15:05
    I'm still scoping out the outline, you
  • 15:05 - 15:07
    could have a say in what topics will be covered.
  • 15:07 - 15:08
    Let me know in the comments below what
  • 15:08 - 15:11
    subjects you want included in this course.
  • 15:11 - 15:13
    Otherwise, remember to like and subscribe,
  • 15:13 - 15:14
    and of course, if you learned something
  • 15:14 - 15:16
    from this video, the best way to thank me
  • 15:16 - 15:17
    is to share this video.
  • 15:17 - 15:19
    It's a small act of gratitude, but one I
  • 15:19 - 15:21
    appreciate greatly.
  • 15:21 - 15:23
    I hope you enjoyed this lesson. I want to
  • 15:23 - 15:24
    thank you for watching, and we'll see you
  • 15:24 - 15:27
    in the next one.
Title:
Hub, Bridge, Switch, Router - Network Devices - Networking Fundamentals - Lesson 1b
Description:

more » « less
Video Language:
English
Duration:
15:26

English subtitles

Revisions Compare revisions