1 00:00:00,150 --> 00:00:06,060 So in this video, we are going to talk about the co-pilot as to why this is the arrangement of a network 2 00:00:06,720 --> 00:00:09,360 on how to connect, how to transfer the data. 3 00:00:10,170 --> 00:00:12,210 So these are different sort of words. 4 00:00:12,510 --> 00:00:17,190 First, I want to raise, I thought, to write some notes on these companies. 5 00:00:17,610 --> 00:00:19,490 What point of view? 6 00:00:19,500 --> 00:00:21,800 You just scan every computer in the network. 7 00:00:22,320 --> 00:00:23,400 So that's what I thought. 8 00:00:23,400 --> 00:00:25,640 These companies are not that much important. 9 00:00:25,710 --> 00:00:27,810 But you need to know about dishtowels. 10 00:00:29,050 --> 00:00:36,280 So let's start with this, what Boscobel, in the best of all, the computers are connected to a single 11 00:00:36,280 --> 00:00:36,670 cable. 12 00:00:38,020 --> 00:00:46,570 And these transfers that are Trudi's cable only, right, if this computer wants to call or send data 13 00:00:46,570 --> 00:00:49,220 to discover that it will throw in a single cable. 14 00:00:49,240 --> 00:00:52,790 And in that case, would the data gets transferred. 15 00:00:53,500 --> 00:01:01,660 So the main disadvantage of this, Mustapa, is if you're turning files and distorter segment after 16 00:01:01,660 --> 00:01:01,990 this. 17 00:01:03,190 --> 00:01:04,690 Computer files, right? 18 00:01:05,290 --> 00:01:10,960 So if this single cable fits the Internet purpose, that is the main drawback of this past. 19 00:01:11,800 --> 00:01:18,190 So it is very easy to or very cheap to implement because there is only one cable and the cable goes 20 00:01:18,190 --> 00:01:20,120 to these computers. 21 00:01:20,140 --> 00:01:20,370 Right. 22 00:01:22,230 --> 00:01:22,650 And. 23 00:01:23,820 --> 00:01:31,530 Let me stop pursue this, Mr. Valge is one is to end poverty and one that is connected to three or more 24 00:01:31,530 --> 00:01:32,190 computers. 25 00:01:33,030 --> 00:01:36,960 And as you can see, this computer has created this one, this one and this one. 26 00:01:38,400 --> 00:01:46,560 And this apology, some take some more cash because of this vice, and if you have more, come with 27 00:01:46,560 --> 00:01:46,740 us. 28 00:01:46,740 --> 00:01:55,440 This is somewhat confusing to understand because we it goes to each one and deciding to come to this 29 00:01:55,440 --> 00:01:56,370 one friend of ours. 30 00:01:57,840 --> 00:02:03,150 So in this, the computers are connected to adjacent computers. 31 00:02:03,210 --> 00:02:03,480 Right. 32 00:02:04,590 --> 00:02:12,330 And if you if I want to send this data from this computer to this computer, it has to travel through 33 00:02:12,330 --> 00:02:14,710 this ring or this ring. 34 00:02:15,120 --> 00:02:18,390 So the main drawback of this thing, these. 35 00:02:21,220 --> 00:02:27,050 You need to send the data through multiple computers if you want to reach some fast computer. 36 00:02:27,790 --> 00:02:33,180 So if I want to read from this to this one, I need to travel through these two computers. 37 00:02:33,700 --> 00:02:34,960 So take some time. 38 00:02:37,020 --> 00:02:44,250 And every body has its own trouble and we need to improve it according to our number of computers and 39 00:02:44,250 --> 00:02:51,090 according to the size of the network and coming to the start of this, usually we are improving. 40 00:02:51,090 --> 00:02:56,820 Here happens each and every computer to this switch or other network device. 41 00:02:57,390 --> 00:02:59,490 And this network device is connected to Internet. 42 00:03:01,140 --> 00:03:09,600 So the one the main drawback is if there is 100 computers connected to this, which are 50 computers, 43 00:03:10,080 --> 00:03:10,740 then. 44 00:03:12,310 --> 00:03:19,840 If everyone tries to sell at the same time, the condition takes place, so it's it's like Denial-of-service, 45 00:03:19,840 --> 00:03:25,900 but it's not that much do no service, but the somewhat condition takes place when there is only a single 46 00:03:25,900 --> 00:03:27,610 dose handling that every request. 47 00:03:27,910 --> 00:03:32,140 So if the single device fails, then whole network fails, right. 48 00:03:34,490 --> 00:03:41,960 And in the ring towards you, also, if a single note breaks and almost half of the ring breaks, so 49 00:03:41,960 --> 00:03:49,700 intractable or the wrong, suppose if this ring is broken and you need to transfer the data all through 50 00:03:49,700 --> 00:03:51,480 computers to reach this computer. 51 00:03:51,890 --> 00:03:55,520 So even in a normal situation, it takes time. 52 00:03:55,760 --> 00:04:04,490 And if the wiring is broken and it takes more time than normal succumbing to this fully, this is the 53 00:04:04,490 --> 00:04:06,870 combination of Mosch and bring towards you. 54 00:04:07,520 --> 00:04:11,390 So the drawback of today is the time. 55 00:04:11,660 --> 00:04:20,640 And that was that was identified by using this methodology between those computers. 56 00:04:21,470 --> 00:04:31,520 So this is very cost effective because every computer should have those many cables and other ports 57 00:04:31,520 --> 00:04:32,300 to connect to. 58 00:04:33,830 --> 00:04:41,210 And this was advantageous, even a single inquest, there will be another backup link, right? 59 00:04:41,870 --> 00:04:47,450 That is that when they discovered you, but it is much more cost efficient than any other topologies.