I have an exam at 10 AM in the morning and its 3 AM right now. Binging all these lectures at 2x speed. Sir, U r a god for making these lectures and helping students like me.
Best teacher on RUclips leave that you are even better than our university and college professor and if it was not true then we will not be here thanks sir guys like share comment yaar koi mehnat karta hain aaplog faayda leke chale jaate ho galat baat hain
Thnkuu soo much sir😊🙏 ur the best teacher😇 mujhe apka study kraya hua hi samj aata hai bs bkki kisi ka ni samj aata mai always exams se phle apki videos dekh k jaati hu or exam bhot acha jaata hai😀
In MESH topology, while discussing about "security", you mentioned that when A sends data to D, then B & C won't recognize the data. Hence, secure. But what if, the direct link between A and D is broken, then A had to send information to D via either B or C. In that case, how does security gets affected? Or, is there any encryption/decryption happening with the data in the flow?
Every data packet have their source and destination address and before opening that packet destination first checks the destination address of the packt if address matched open it otherwise forward/discard it
It's is secured with the help of cryptography. You will learn that in later sections. Or probably you have already learnt that bcz you have commented this 9 months. ago
When we counting the total number of ports in star topology we considered only device ports but not ports of the hub , why don't we consider hub ports also while counting the total number of ports?
In the case of a security attack against an IoT device, only a single node is compromised, as endpoints operate independently of each other. Hence, star topologies offer better security than mesh networks. 10:10 ??
in star topology, no of port will be 2*n, because hub have also port when we connect with device, no of port in device + no of port in hub, if i am wrong let me know pls.
3:05 sir no. of ports for each device apne btaya n-1 But Mesh topology me to each device me 3 nodes phir 3 hi nodes kaise? Or the formula is I think n-1 where n is number of devices(not nodes). Clear it
In mesh topology, is reliability cause insecurity because data will be send through A->B->D In case of failure between A->D cable? Please answer.. i will help
Sir,,if the cable from A to D gets destroyed in mesh topology,,,then A has to follow an indirect way to get connected with D. Will not it affect its security as the data has to pass through either B or C to reach D??
Sir I have a doubt you said that mesh have high security but if in mesh one device get hacked then all the device which is connected to that device are giving high chance that they would also get hacked can you explain it please.🙏🏻🙏🏻🙏🏻
I have an exam at 10 AM in the morning and its 3 AM right now. Binging all these lectures at 2x speed. Sir, U r a god for making these lectures and helping students like me.
All the best
Are you GTU student?
@@jeelparikh8571 me gtu
Ab tumne uss exam mai kya kiya jiski liye tum prepare krhe the 1 saal phle
@@GateSmashers sir hybrid aur tree topology nhi prhaya aapne
no one can explain like uuuu...i.e in less time smart work.....
Best teacher on RUclips leave that you are even better than our university and college professor and if it was not true then we will not be here thanks sir guys like share comment yaar koi mehnat karta hain aaplog faayda leke chale jaate ho galat baat hain
YOUR TEACHING SKILLS ARE JUST WOWWWWWWWWWWWWWWWWWWWWW... EACH N EVERY THING IS DAMN CLEAR ....
Oh
Folllwing you from 3rd semester now its my fifth sem, you explain very well Ma Sha Allah❤
true.
even though I am a Bangladeshi But the way you teach its very easy to understand. Thanks a lot
Your teaching is fabulous especially the OSI model. Today I understood the concept
Sir, u explained it in best way that is required for our mcqs... U covered every point.. thank you so much....
ThankYou
Sir, you are explaining all topics in simple way for the sake of students 💖...Superb sir 👏👏👏
I like all your videos very much...💯
Best teacher .distinction to the teacher
Super se v uparr.... Fantastic... Like to Banta hai mere bhai.
Such a useful video.... Thank You soooooo muchhhhhh Sir
You had helped me during graduation, now after PG I'm watching these videos. Wish me luck 🤞
Please give the notes as your lecture you are the best teacher of Introduction Technology 😊
Maa kasam mam ne jitna saal bhar mein nahi padhaya utna aaj sir ji se ek din mein sikh liya
such a gem channel that i just discovered! thanks man..
No of videos: 100
Average length of video: 10 minutes, 58 seconds
Total length of playlist: 18 hours, 17 minutes, 59 seconds
At 1.25x: 14 hours, 38 minutes, 23 seconds
At 1.50x: 12 hours, 11 minutes, 59 seconds
At 1.75x: 10 hours, 27 minutes, 25 seconds
At 2.00x: 9 hours, 8 minutes, 59 seconds
Achhaaaa haan smjh Gaya
Excellant training available on youtube
Best Teacher .Respect.
Best lacture for computer science student....love form Pakistan
Sir apke jesa samjahne k raaste pr hmm bhi nikal chuke h. Thankuu for inspired us
Thank you So much for your love and support..bless you
👍 great job
sir tusi great ho🙏
Thnkuu soo much sir😊🙏 ur the best teacher😇 mujhe apka study kraya hua hi samj aata hai bs bkki kisi ka ni samj aata mai always exams se phle apki videos dekh k jaati hu or exam bhot acha jaata hai😀
wah sir.each and every bit explained..
Sir, u r really god
Explained very well🥰
very nicely explained
Excellent explanation
Thanku sir u deserve uncountable wishes and thanks ..great bro keep it up
well done sir
Sir u r d best Teacher
vry vry nyc explanation sir...i have no words to explain u r intelligency..God bless u forever..keep it up
.🤗🤗
bhai tera way of teaching is best I have ever see
awesome
Amazing teaching methods 🥳🤗😍
You are dronacharya I like your teaching style sir
Sir you are god for us
Very good explanation sir
Thanks sir always happy sir
Very nice work keep it up
Nice video as always. Your teaching skills are undoubtedly the best. Please keep it up.
Nice lecturer 👩🏫
Wonderful explanation
You are a saviour 😭❤️ i hope you know
Thank you sir ❣️
In MESH topology, while discussing about "security", you mentioned that when A sends data to D, then B & C won't recognize the data. Hence, secure. But what if, the direct link between A and D is broken, then A had to send information to D via either B or C. In that case, how does security gets affected? Or, is there any encryption/decryption happening with the data in the flow?
What an observation. Suitable question bro.
Every data packet have their source and destination address and before opening that packet destination first checks the destination address of the packt if address matched open it otherwise forward/discard it
@@rahuldora1587 Thank You bro
It's is secured with the help of cryptography. You will learn that in later sections.
Or probably you have already learnt that bcz you have commented this 9 months. ago
@@salildeogade1213 Ya got it, thanks!
thank u so much sir.....🥰
Thank you bhai!
Bahut acha se explain kiya sir apne👍
Ma ek state level exam ki preparation krrha but bhot helpful, zyada detailm nhi jata hu, but basic clear hojate h hr topic ki ist video se
When we counting the total number of ports in star topology we considered only device ports but not ports of the hub ,
why don't we consider hub ports also while counting the total number of ports?
In the case of a security attack against an IoT device, only a single node is compromised, as endpoints operate independently of each other. Hence, star topologies offer better security than mesh networks. 10:10
??
Sir yours explanation method truly amazing ,you done a great job ,thanku sr
Best explanation sir... Please daily more networking ki video daliye....din m 2 video dijiye sir
Only your video... Contains no. Of cables and ports.... That are frequently asked in ibps exam✌
❤❤❤
bundles of love from Pakistan
You are my best teacher sir. Lots of love and respect ❤️. Please create some graphic video.
Brilliant 😎😎
Thnku sir...
in star topology, no of port will be 2*n, because hub have also port when we connect with device, no of port in device + no of port in hub, if i am wrong let me know pls.
Thankyou🥰😍
VERY NICE SIR
Very nice explanation sir. I loved your videos and really enjoyed learning these concepts from you. Big fan sir🥰😍❤🔥💯.
Thanks sir g
Sir ,can you provide notes....of your...it is most helpful for us....pls sir....
Sir...Oswm your teaching style 😍😍😍😍
Thank you sir
Thanx Smasher
Thanku sir
Thank you
UGC-NET ka pata nahi par btech me bohot help hori
Thank you so much 😇😇plzzz tell me to get the notes of same type i mean as ur lecture❤️
Hy
@@sukhsagar4675 hello
Yes
Sir acha padha rhe hai aur bhi video upload kijiye.
Great
65 out of 70 mark in my ip exam thank you sir for explaining topology
Nice
Osme explaintion
In star topology it has minimal line cost only (n-1) lines r required
Super
Thanks sir
Yes
Ty sir
3:05 sir no. of ports for each device apne btaya n-1
But Mesh topology me to each device me 3 nodes phir 3 hi nodes kaise?
Or the formula is I think n-1 where n is number of devices(not nodes).
Clear it
nodes means no.of devices bhai
BADIYA..AH
But sir (5:55 ) relability ka case me security hogi kya.
In mesh topology, is reliability cause insecurity because data will be send through A->B->D In case of failure between A->D cable? Please answer.. i will help
7:20, point to point is use din WAN, no?
Thnku
Sir,,if the cable from A to D gets destroyed in mesh topology,,,then A has to follow an indirect way to get connected with D. Will not it affect its security as the data has to pass through either B or C to reach D??
GM
SIR, WHEN WIRE B/W A-D DAMAGE, THEN DATA WILL BE TRANFER VIA C OR B.. THEN HOW WE CAN SAY IT IS SECURED COMPLETELY ?
Awesome explanation sir. Please make video for types of communication in network.
Has anyone created handwritten notes of Computer Networks from Gate Smashers?
good
Sir Please explain the formula Nc2
Sir, if the main wire of A and D got damaged does, the mesh topology still provide security??
Aap sab na sir ka mou hi pager liya
Star topology is reliable if any problem occurs in node entire network will not stop working.
🥰🥰😍😍
I wish to see you in Sandeep maheshwasri show .❤
Anyone has the same feelings?
Ya
Sir I have a doubt you said that mesh have high security but if in mesh one device get hacked then all the device which is connected to that device are giving high chance that they would also get hacked can you explain it please.🙏🏻🙏🏻🙏🏻