View Content
Networking Essentials
Ethernet
6 minutes
This video provides an introduction to networking, and discusses the different network topologies.
Ethernet
4 minutes
This video reviews Ethernet wiring standards and physical layer classifications.
OSI Model
2 minutes
This video introduces the OSI model, and the associate layer-1 through layer-3 in an audio-video installation context.
MAC Addresses
2 minutes
This video discusses what a MAC address is and how it is derived.
Subnet Mask
4 minutes
This video discusses basic concepts of subnetting and standard class addressing.
Gateway Addresses
1 minute
This video introduces the role that the default gateway plays in a network.
NAT & PAT
4 minutes
This video reviews network/port address translation (NAT and PAT) technologies and the different opportunities of connecting private LAN devices to the public WAN.
DHCP
1 minute
This video reviews the dynamic host configuration protocol (DHCP) including a use case for dynamic reservation tables.
Ping Utility
3 minutes
This video introduces and demonstrates the ping utility accessed through the Windows Command Prompt application.
IPConfig Utility
3 minutes
This video introduces and demonstrates the ipconfig utility through the Windows Command Prompt application. Review ipconfig show all and duck options.
Switches & Routers
3 minutes
This video discusses network switch and router hardware equipment.
IP Scanner Utility
2 minutes
This video review different hardware and software techniques for finding IP devices on a network.
Port Numbers
4 minutes
This video review the role of the port number in association with the IP address of a network destination.
Unicast
3 minutes
This video compares different network communication technologies with a focus on Unicast communications.
Multicast
3 minutes
This video discusses the benefits of Multicast communications, especially in consideration of network media streaming.
-
802.1x Security
2 minutes
This video reviews 802.1x network port security, including the role of the RADIUS server as well as security certificate and credentialization requirements at the client.
-