Home
Videos uploaded by user “Sunny Classroom”
Kerberos - authentication protocol
 
06:08
At 4:30: A mistake: step 3: When the file server gets the token, it "decrypts" (not "encrypts") the token with the secret key shared with TGS. In Greek mythology, Kerberos is a dog with three heads. But today I will not talk about the dog. Kerberos is an authentication protocol for client/server applications. I will demonstrate with an example how Kerberos works. Keep in mind, Kerberos implements private key encryption. Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Advanced Cryptography: https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Please leave comments, questions and Please subscribe to my channel Many thanks, Sunny Classroom
Views: 65496 Sunny Classroom
What is digital signature?
 
05:03
A digital signature is equivalent to a handwritten signature in paper, and a digital signature serves three basic purposes. Digital signature is commonly used for software distribution, financial transactions and other cases where it is important to detect forgery. Digital signatures are very popular with e-mail users. In this video, I will talk about the digital, uses, and the whole process of creating and sending digitally signed document over the Internet. Keep in mind, digital signature is not about encrypting document, just like paper-based signature. Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Advanced Cryptography: https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Please subscribe to my channel! Please leave comments or questions! Many thanks, Sunny Classroom
Views: 103125 Sunny Classroom
How SSL certificate works?
 
06:30
When we are online shopping or banking, we want to make sure it is HTTPS, and a green padlock icon is in the address bar. What does HTTPS mean? What is significant about that small green padlock? To answer these two questions, we need to understand SSL certificate and how it works. Playlist: Advanced Cryptography/Public Key Infrastructure https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Please leave comments, questions and please subscribe! Sunny Classroom
Views: 107705 Sunny Classroom
Circuit Switching vs. Packet Switching
 
04:28
Circuit switching is a type of communications in which a dedicated channel or circuit is established for the duration of a transmission, a method used by the traditional telephone call- calls carried over the public switched telephone network (PSTN), also referred to as the Plain Old Telephone Service (POTS). Packet switching uses different methods. Packet switching networks are connected through many routers, each serving different segment of networks. Circuit-switched networks are used for traditional phone calls and packet-switched networks handle data. But nowadays, you can get phone service delivered over the Internet just like digital data packets. In this video, you will find examples to demonstrate these two signaling methods. Please leave comments, questions and Please subscribe to my channel Many thanks, Sunny Classroom
Views: 39584 Sunny Classroom
IDS and IPS
 
03:19
An intranet is a private network which is heavily protected by many different networking devices, such as router, firewall, proxy server, honeynet, IPS and IDS. This diagram is an overly-simplified version of the reality. I try to put these devices together in a reasonable order, only for teaching and learning purpose. IDS and IPS are two networking security devices. IDS stands for Intrusion-detection system.IPS stands for Intrusion Prevention System. They play different roles and work together to protect a local area network. In this video, you will learn what they are and what are their main functions. This is my education channel. My topics cover networking, security, cyber threats and defense, and other computer-related materials. Please subscribe my channel.
Views: 14666 Sunny Classroom
Public Key Encryption (Asymmetric Key Encryption)
 
05:06
In public key encryption, two different keys are used to encrypt and decrypt data.One is the public key and other is the private key. These two keys are mathematically related. They come as a pairs. The public key encryption is also called asymmetric key encryption because two different keys are used. Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication. In this video, I will use an example to demonstrate how to use public key. Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Advanced Cryptography: https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Please leave comments, questions and please subscribe!
Views: 29898 Sunny Classroom
OFDM - Orthogonal Frequency Division Multiplexing
 
04:39
Today I will talk about variation of FDM: Orthogonal Frequency Division Multiplexing, or OFDM. OFDM is being used for many of the latest wireless and telecommunications standards, such as Wi-Fi 802.11ac, both 4G LTE and 5G cellular technologies, WiMAX, and many more. It is a very popular multiplexing technology. So what is big deal of the OFDM? Why does it have many advantages over FDM? My topics are organized by playlists: https://www.youtube.com/user/sunnylearning/playlists My most popular videos: https://www.youtube.com/user/sunnylearning/videos?sort=p&view=0&flow=grid Wireless and Wi-Fi https://www.youtube.com/watch?v=PcbTMSf0D2M&list=PLSNNzog5eydvJG48PYnWnNY7-tQIfxTRb This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 8960 Sunny Classroom
Subnetting -  the simplest way
 
13:33
A subnet is a logical subdivision of an IP network. The process of dividing a network into two or more networks is called subnetting. In this video, I will use an example to demonstrate a simple way of subnetting. Some background links https://www.youtube.com/watch?v=vcArZIAmnYQ&list=PLSNNzog5eydt_plAtt3k_LYuIXrAS4aDZ Example used in the video: One day your supervisor walks to you, saying: “here is the network ID 192.168.4.0/24, please create three separate networks or subnets for a coffee shop: Sunny Cafe.” The three separate subnets/networks are: One is for the office, one for the front desk and storage room, and one is for public use. Your task is to list each subnet network ID, subnet mask, Host ID Range, # of usable host IDs, and Broadcast ID. One last question: How many subnets are wasted after subnetting? Subnetting Practice With the same network ID: 192.168.4.0/24, you are required to get 6 subnets. List each of new network ID, subnet mask, host ID range, # of usable hosts, and broadcast ID. One last question: how many subnets are wasted after subnetting? Answer for your reference: We will have 8 subnets. subnet mask is /27 for all 8 subnets. The number of usable host IDs is 30 for all 8 subnets. I list below 8 subnets’ network ID,host ID range, and broadcast ID in the order. #1: 192.168.4.0, 192.168.4.1-192.168.4.30, 192.168.4.31 #2: 192.168.4.32, 192.168.4.33-192.168.4.62, 192.168.4.63 #3: 192.168.4.64, 192.168.4.65-192.168.4.94, 192.168.4.95 #4: 192.168.4.96, 192.168.4.97-192.168.4. 126, 192.168.4.127 #5: 192.168.4.128, 192.168.4.129-192.168.4. 158, 192.168.4.159 #6: 192.168.4.160 , 192.168.4.161-192.168.4. 190, 192.168.4.191 #7: 192.168.4.192, 192.168.4.193-192.168.4. 222, 192.168.4.223 #8: 192.168.4.224, 192.168.4.225-192.168.4. 254, 192.168.4.255 Class B Subnetting table: N (the first row of the table): 1,2,4, 8, 16, 32, 64, 128, 256, 512, 1024, 2048, 4096, 8192, 16384, 32768, 65536 H (host number, the second row) 65536,32768, 16384, 8192, 4096, 2048, 1024, 512, 256, 128, 64, 32, 16, 8, 4, 2, 1 below is the third row. 16/ /17 /18 /19 /20 /21 /22 /23 /24 /25 /26 /27 /28 /29 /30 /31 /32 Class B subnet mask: 255.255.0.0 =/16
Views: 147350 Sunny Classroom
collision vs. broadcast domain: Hub, Switch and Router
 
05:54
In an Ethernet network, a collision domain is a group of nodes that hear each other. When one node is talking, everyone is listening. When one node is using the hub, all other nodes must wait. Collision occurs when two nodes send signals at the same time. Thus, hub would create a collision domain. If the collision domain gets too large, you’ll start running into traffic problems. If you try to daisy chain or cascade some hubs, you actually expand the collision domain.The more hubs we use on a local network, the larger collision domain we create. A switch is much smarter than a hub because it gives every conversation the full bandwidth of the network. When node A is talking, only its receiver B can hear. When node C is talking, only its receiver D can hear. Now communications on a network become one-to-one conversations. If A and B are talking at the same time, no collision would occur. Thus, switch separates the collision domain. Router operates at layer 3, or the network layer of the OSI model. Routers only forward IP packets based on IP address. Routers not only separate collision domains, but also separate broadcast domains. This is my education channel. My topics cover networking, security, programming, and other computer-related materials. Please subscribe my channel. Many thanks.
Views: 9057 Sunny Classroom
Why digital certificate?
 
07:33
Digital Signature: https://www.youtube.com/watch?v=TmA2QWSLSPg&t=2s Digital signature is used for authentication, non-repudiation and data integrity, but there is one weakness of digital signature alone: man-in-the-middle attack. Digital certificates are electronic credentials issued by a trusted third party. A digital certificate not only verifies the identity of the owner, but also verifies that the owner owns the public key. In this video, I will demonstrate why digital signature has weakness and how digital certificate comes in place to make sure digitally signed document must come originally from the claimed sender. Advanced Cryptography: https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Please leave comments, questions and please subscribe! Sunny Classroom
Views: 28771 Sunny Classroom
SSL/TLS  handshake Protocol
 
05:04
What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers. Playlist: Advanced Cryptography - https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Please subscribe to my channel! Please leave comments or questions! Many thanks, Sunny Classroom
Views: 67634 Sunny Classroom
How hash function work?
 
04:29
What is hash function/algorithm? What is mainly used for? What are three basic characteristics of a secure hash algorithm? In this video, I will also demonstrate how hash function works. Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Advanced Cryptography: https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Please leave comments, questions, and Please subscribe! Thank you very much! Sunny Classroom
Views: 36373 Sunny Classroom
DNS recursive query vs. Iterative query
 
07:55
The goal of DNS is to resolve a fully qualified domain name (FQDN) to an IP address. The process is called name resolution. In this video I will use one example to demonstrate the whole process how name resolution is done. At the same time, the difference between recursive query and iterative query is explained. Please leave comments, questions and Please subscribe to my channel Many thanks, Sunny Classroom
Views: 16349 Sunny Classroom
OSI Model
 
12:14
Keep in mind that OSI model is not laws of physics. It is only a guideline. While many protocols fit neatly into one of the seven layers, others do not. But OSI model is a great tool to learn and understand how network hosts communicate with each other. Any serious network professionals and students should know about it.
Views: 14876 Sunny Classroom
Private Key Encryption (Symmetric Key Encryption)
 
04:52
In private key encryption, data is encrypted using a single same key that only the sender and the receiver know. That is why private key encryption is also called symmetric key encryption because the same key is used during both encryption and decryption of the transmitted data. In this video, I will also use an example to demonstrate the process of using private key encryption. Two different methods -stream encryption and block encryption- of private key algorithm are also depicted with animation. Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Advanced Cryptography: https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Please leave comments, questions and please subscribe!
Views: 20239 Sunny Classroom
Proxy server
 
05:56
An intranet is a private network which is heavily protected by many different networking devices, such as router, firewall, proxy server, DMZ, honeynet, IPS and IDS. This diagram is an overly-simplified version of the reality. I try to put these devices together in a reasonable order, only for teaching and learning purpose. In this video, I will talk about proxy server and its five basic functions. The first four functions are normal setup of a proxy server from an organization’s perspective. The fifth function is different from the normal setup of a proxy server.
Views: 17601 Sunny Classroom
Revocation of digital certificates: CRL, OCSP, OCSP stapling
 
06:40
Digital certificate are normally expired after one year, but some situations might cause a certificate to be revoked before expiration. How does a client check the revocation status? Here I introduce three methods: CRL, OCSP, & OCSP stapling. What are they? How do they work? You would find answers in this video. Playlist: Advanced Cryptography - https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Please subscribe to my channel! Please leave comments or questions! Many thanks, Sunny Classroom
Views: 7293 Sunny Classroom
VPN  - Virtual Private Network
 
03:34
In this video, I will talk about what virtual Private network is and how it works. In China, many people use VPN to bypass Chinese government big firewall. Please subscribe to my channel. Many thanks, sunny classroom.
Views: 5748 Sunny Classroom
Secret of subnet mask
 
08:53
!!! Correction note: from 5:09 to 8:09, Computer A's IP address' fourth octet in binary should be "00000010". Sorry about the confusion. ---------------- Every host on a network has IP address and subnet mask. What is subnet mask? Why does a computer on a network need a subnet mask? What does a subnet mask look like? How does a computer knows whether its target computer is local or remote? What is the secret? In this video, you may find all these questions. This is my education channel. My topics cover networking, security, programming, and other computer-related materials. Please subscribe my channel. Many thanks.
Views: 14788 Sunny Classroom
Three-way handshake and 4-step to say goodbye.
 
05:17
Today my topic is how TCP starts and closes a session. Three-way handshake and four-step closure will be discussed. What are they? This is my education channel. My topics cover networking, security, programming, and other computer-related materials. Please subscribe my channel. Many thanks.
Views: 7738 Sunny Classroom
Firewall
 
07:20
An intranet is a private network which is heavily protected by different networking devices, such as router, firewall, proxy server, honeynet, IPS and IDS. This diagram is an overly-simplified version of the reality. I try to put these devices together in a reasonable order, only for teaching and learning purpose. In this video, I will talk about firewall’s basic functions. I will also talk about static and dynamic inspection and their difference. This is my education channel. My topics cover networking, security, cyber threats and defense, and other computer-related materials. Please subscribe my channel. My main entertaining channel: SunnySunKansas at http://www.youtube.com/user/sunnysunkansas
Views: 15860 Sunny Classroom
How to salt and pepper passwords?
 
05:21
How to salt your passwords? How to add "pepper" to salted passwords? What is the difference between salt and pepper? This video would define the salt and pepper techniques and how they work. Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Advanced Cryptography: https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Please leave comments, questions and please subscribe! Sunny Classroom
Views: 7147 Sunny Classroom
Honeynet and DMZ
 
05:44
An intranet is a private network which is heavily protected by many different networking devices, such as router, firewall, proxy server, DMZ, honeynet, IPS and IDS. This diagram is an overly-simplified version of the reality. I try to put these devices together in a reasonable order, only for teaching and learning purpose. Today my topic is honeynet and DMZ. I will talk about what they are and what roles they play in securing a local area network. This is my education channel. My topics cover networking, security, cyber threats and defense, and other computer-related materials. Please subscribe my channel.
Views: 15196 Sunny Classroom
TCP vs. UDP
 
05:37
Today my topic is TCP and UDP. This is my education channel. My topics cover networking, security, programming, and other computer-related materials. Please subscribe my channel. Many thanks.
Views: 9660 Sunny Classroom
How DHCP works?
 
07:21
I will introduce DHCP - Dynamic Host Configuration Protocol. I will talk about what happens without this DHCP technology. How does it work step by step. What types of communications occur between DHCP clients and a DHCP server? How many steps are involved for a client to get necessary network credentials so that it could join a private network? What port numbers are used? Playlist: IPv4 basics - https://www.youtube.com/watch?v=vcArZIAmnYQ&list=PLSNNzog5eydt_plAtt3k_LYuIXrAS4aDZ This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please subscribe my channel. Please leave comments or questions. Many thanks, Sunny Classroom
Views: 10727 Sunny Classroom
FHSS - Frequency Hopping Spread Spectrum
 
05:54
In 802.11 standards, three different modulation/transmission methods are used to transmit wireless signals: 1) Frequency Hopping Spread Spectrum, or FHSS; 2) Direct Sequence Spread Spectrum, or DSSS, and 3) Orthogonal Frequency Division Multiplexing, or OFDM. These techniques are used for several reasons, including the reduction of natural interference, noise and jamming, and prevention of detection and interception. In this lesson, I will focus on one of spread spectrum modulation methods used in wireless communications: Frequency-Hopping Spread Spectrum, or FHSS. My topics are organized by playlists: https://www.youtube.com/user/sunnylearning/playlists My most popular videos: https://www.youtube.com/user/sunnylearning/videos?sort=p&view=0&flow=grid Wireless and Wi-Fi https://www.youtube.com/watch?v=PcbTMSf0D2M&list=PLSNNzog5eydvJG48PYnWnNY7-tQIfxTRb This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 5406 Sunny Classroom
PKI: self-signed digital certificate?
 
04:04
What is self-signed certificates? Can you make them free? Are self-signed certificates less secure than those signed by commercial CAs. What is the difference between commercial certificates and self-signed certificates. What situation suits self-signed certificates or commercial certificates? You will find all these answers in this video. Playlist: Advanced Cryptography - https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Please subscribe to my channel! Please leave comments or questions! Many thanks, Sunny Classroom
Views: 5745 Sunny Classroom
NAT - SNAT, DNAT, PAT & Port Forwarding
 
09:50
In this video, I will talk about how classic private TCP/IP network was set up for the first two decades of the Internet. Why it did not work? What is network address translation, or NAT? Why do we need it? For most parts, I will talk about four different types of NAT: Static NAT, Dynamic NAT, PAT, and Port Forwarding. I will discuss each in detail. Playlist link: IPv4 Basics: https://www.youtube.com/watch?v=vcArZIAmnYQ&list=PLSNNzog5eydt_plAtt3k_LYuIXrAS4aDZ This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please subscribe my channel. Please leave comments or questions. Many thanks, Sunny Classroom
Views: 21369 Sunny Classroom
CSMA/CA - Wireless Medium Access Control Protocol
 
05:18
This is my education channel. My topics cover networking, security, cyber threats and defense, and other computer-related materials. Please leave comments, questions and Please subscribe to my channel Many thanks, Sunny Classroom
Views: 11739 Sunny Classroom
PKI -  trust & chain of trust -why, who and how?
 
08:19
What is public key infrastructure? What is trust? Why do we need trust over the Internet? Who should be trusted? In this video, I will talk about two trust models: Hierarchical Trust Model and distributed trust model, and how they help us to build trust with strangers over the Internet so that we could be able to do business online. I will use an example how these models work. Playlist: Advanced Cryptography - https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Please subscribe to my channel! Please leave comments or questions! Many thanks, Sunny Classroom
Views: 14767 Sunny Classroom
CSMA/CD - Carrier Sense Multiple Access with Collision Detection
 
04:55
This is my education channel. My topics cover networking, security, cyber threats and defense, and other computer-related materials. Please leave comments, questions and Please subscribe to my channel Many thanks, Sunny Classroom
Views: 5445 Sunny Classroom
Why do we need both IP and MAC address?
 
03:39
On a TCP/IP network, why do we use both IP and MAC address? In order to answer this question, we need to answer these two questions first. 1) What happens if we just use MAC address alone, and 2) what happens if we just use IP address alone? MAC address tells us “who” you are which will never change, and the IP address tells us “where” you are, which can change. Both IP and MAC address makes sure the message is delivered to the right device on the right network. They work together perfectly in TCP/IP world. Playlist - IPv6 Basics https://www.youtube.com/watch?v=X8RxRr7KNl8&list=PLSNNzog5eydtb5wyH2UtK09L9MsW9Hufq Playlist - IPv4 Basics https://www.youtube.com/watch?v=vcArZIAmnYQ&list=PLSNNzog5eydt_plAtt3k_LYuIXrAS4aDZ This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 5519 Sunny Classroom
Address Resolution Protocol (ARP)
 
07:26
Correction !!!: At the third step (5:52s) , the destination IP address should be 192.168.1.50, which is the server's IP address. Sorry for my mistake. Today's topic is ARP. What is ARP? Why do we need ARP? How often do we use ARP? How does it work? This video would answer all these questions. This is my education channel. My topics cover networking, security, programming, and other computer-related materials. Please subscribe my channel. Many thanks.
Views: 7214 Sunny Classroom
Bandwidth, throughput, and speed
 
03:03
Today my topic is about the difference between three terms, which are often misused in networking field: Bandwidth, throughput, and speed. My topics are organized by playlists: https://www.youtube.com/user/sunnylearning/playlists My most popular videos: https://www.youtube.com/user/sunnylearning/videos?sort=p&view=0&flow=grid Wireless and Wi-Fi https://www.youtube.com/watch?v=PcbTMSf0D2M&list=PLSNNzog5eydvJG48PYnWnNY7-tQIfxTRb This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 2639 Sunny Classroom
DSSS - Direct Sequence Spread Spectrum
 
06:41
In 802.11 standards, three different modulation/transmission methods are used to transmit wireless signals: 1) Frequency Hopping Spread Spectrum, or FHSS; 2) Direct Sequence Spread Spectrum, or DSSS, and 3) Orthogonal Frequency Division Multiplexing, or OFDM. These techniques are used for several reasons, including the reduction of natural interference, noise and jamming, and prevention of detection and interception. In this lesson, I will focus on DSSS. My topics are organized by playlists: https://www.youtube.com/user/sunnylearning/playlists My most popular videos: https://www.youtube.com/user/sunnylearning/videos?sort=p&view=0&flow=grid Wireless and Wi-Fi https://www.youtube.com/watch?v=PcbTMSf0D2M&list=PLSNNzog5eydvJG48PYnWnNY7-tQIfxTRb This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 5868 Sunny Classroom
Subnetting a subnet  --sunny way
 
11:36
Subnetting a subnet is similar to subnetting. Compared to subnetting, subnetting a subnet takes only one more step to find the column we need in Sunny table. Once we identify the column, the rest of subnetting process is exactly the same. Example used in the video. You are given a single network ID 125.23.200.64/26, and you are asked to set up three separate subnets for 3 different departments sharing a building. Your task is to list each new subnet’s network ID, new subnet mask, Host ID Range, # of usable host IDs, and Broadcast ID. Practice question: You are given a single network ID 125.23.200.128/25, and you are asked to set up three separate subnets for 3 different departments. Your task is to list each new subnet’s network ID, new subnet mask, Host ID Range, # of usable host IDs, and Broadcast ID. Answer for your reference (you can choose three out of four subnets. One is wasted.) #1: 125.23.200.128/27, 129 - 158, 30, 125.23.200.159 #2: 125.23.200.160/27, 161 - 190, 30, 125.23.200.191 #3: 125.23.200.192/27, 193- 222, 30, 125.23.200.223 #4: 125.23.200.224/27, 225 - 254, 30, 125.23.200.255 Subnetting - Sunny way https://www.youtube.com/watch?v=ecCuyq-Wprc&t=283s This is my education channel. My topics cover networking, security, programming, and other computer-related materials. Please subscribe my channel. Many thanks.
Views: 19840 Sunny Classroom
Wireless LAN two modes:  Ad Hoc vs Infrastructure
 
03:40
In this lesson, I will introduce two modes of Wireless LAN architecture: AD HOC mode and Infrastructure mode. AP and wireless routers are also discussed. My topics are organized by playlists: https://www.youtube.com/user/sunnylearning/playlists My most popular videos: https://www.youtube.com/user/sunnylearning/videos?sort=p&view=0&flow=grid Wireless and Wi-Fi https://www.youtube.com/watch?v=PcbTMSf0D2M&list=PLSNNzog5eydvJG48PYnWnNY7-tQIfxTRb This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 2401 Sunny Classroom
Dictionary Attack and  Brute Force Attack: hacking passwords - part 3
 
05:28
In this video, I will talk about two hacking methods used by hackers to crack stolen our password even though they are stored in database in the format of digest. These two methods include dictionary attack and brute force attack. I will also talk about how they work, and minimum measures we should take to protect our passwords? Playlist: Basic Cryptography https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV Advanced Cryptography: https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7 Please leave comments, questions and Please subscribe to my channel Many thanks, Sunny Classroom
Views: 12347 Sunny Classroom
Wi-Fi signals: reflection, absorption, diffraction, scattering, and interference
 
06:40
In this video, I will talk about five factors affecting wireless signals: absorption, reflection, diffraction, scattering, and interference. Please leave comments, questions and Please subscribe to my channel Many thanks, Sunny Classroom
Views: 4170 Sunny Classroom
MPLS  - Multiprotocol Label Switching (2.5 layer protocol)
 
04:59
MPLS can create end-to-end paths that act like circuit-switched connections, but deliver layer 3 IP packet. As we know, routing is the layer 3 function while switching is the layer 2 function. MPLs makes those routers on the Internet act like switches on a local network. That is why MPLS is also called 2.5 layer protocol. My topics are organized by playlists: https://www.youtube.com/user/sunnylearning/playlists My most popular videos: https://www.youtube.com/user/sunnylearning/videos?sort=p&view=0&flow=grid Wireless and Wi-Fi https://www.youtube.com/watch?v=PcbTMSf0D2M&list=PLSNNzog5eydvJG48PYnWnNY7-tQIfxTRb Remote Access/WAN technologies https://www.youtube.com/watch?v=B1tElYnFqL8&list=PLSNNzog5eyduTVeiVQRV_AM35YKSrFgzr This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 1498 Sunny Classroom
data encapsulation & de-encapsulation - PDU
 
06:24
Data encapsulation is about creating and wrapping user’s data with control information layer by layer and data de-encapsulation is stripping off control information and restore original user’s data. Together, they complete each other with one beautiful round of data transmission. This is my education channel. My topics cover networking, security, programming, and other computer-related materials. Please subscribe my channel. Many thanks. Sunny Classroom.
Views: 3249 Sunny Classroom
TDM, Statistical TDM & FDM
 
05:48
Today my topic is three types of multiplexing methods: Time Division Multiplexing (TDM), Statistical Time division Multiplexing, or STDM, and Frequency Division Multiplexing, or FDM. The topic covers their differences, features and where they are used. My topics are organized by playlists: https://www.youtube.com/user/sunnylearning/playlists Remote access and WAN technologies: https://www.youtube.com/watch?v=B1tElYnFqL8&list=PLSNNzog5eyduTVeiVQRV_AM35YKSrFgzr Wireless and Wi-Fi https://www.youtube.com/watch?v=PcbTMSf0D2M&list=PLSNNzog5eydvJG48PYnWnNY7-tQIfxTRb This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 2401 Sunny Classroom
Tricks to five classes of IPv4
 
10:08
Every networking professionals need to know IPv4 five classes, their first octet, the IP range, their default subnet mask, and the number of hosts per network for each class, Today my topic is how to remember five classes of IP version 4 without memorizing it. In this 10-minute tutorial, I will break apart five classes piece by piece. By the end of the video, I hope you could be able to remember the table or at least understand how these numbers come from. Many thanks for your time. Please leave your comments and questions, and do not forget to subscribe my channel. More videos are coming soon. Many thanks. Sunny Classroom
Views: 10543 Sunny Classroom
Router' ACL- Access Control List
 
03:00
An intranet should be heavily protected by different networking devices, such as router, firewall, proxy server, honeynet, IPS and IDS. This diagram is an overly-simplified version of the reality. I try to put these devices together in a reasonable order. It is only for teaching and learning purpose as I talk about different devices and their functions in different videos. Router is an important layer 3 device. Without routers, there is no Internet. This video will introduce you only one feature of a router in terms of security: ACL - access control list. This is my education channel. My topics cover networking, security, cyber threats and defense, and other computer-related materials. Please subscribe my channel.
Views: 3660 Sunny Classroom
IPv6 address classification - unicast, multicast & anycast
 
06:46
In this video I will introduce IPv6 address classification and three types of IPv6 addresses: unicast, multicast,and anycast. Multicast and its three different types are discussed in details in this introduction. Playlist - IPv6 Basics https://www.youtube.com/watch?v=X8RxRr7KNl8&list=PLSNNzog5eydtb5wyH2UtK09L9MsW9Hufq Playlist - IPv4 Basics https://www.youtube.com/watch?v=vcArZIAmnYQ&list=PLSNNzog5eydt_plAtt3k_LYuIXrAS4aDZ Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 2343 Sunny Classroom
Why do we need modulation during transmission?
 
04:01
In this video, we will answer two questions: what is modulation and why do we need modulation. My topics are organized by playlists: https://www.youtube.com/user/sunnylearning/playlists My most popular videos: https://www.youtube.com/user/sunnylearning/videos?sort=p&view=0&flow=grid Wireless and Wi-Fi https://www.youtube.com/watch?v=PcbTMSf0D2M&list=PLSNNzog5eydvJG48PYnWnNY7-tQIfxTRb This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much!
Views: 883 Sunny Classroom
IPv6 - How DHCPv6 works?
 
05:32
DHCPv6 stands for Dynamic Host Configuration Protocol version 6, or Dynamic Host Configuration Protocol for IPv6. DHCPv6 is equivalent of DHCP in IPv4. It is a network protocol for configuring IPv6 clients with IPv6 prefixes and other information required to operate on an IPv6 network. In this video, I will talk about how DHCPv6 works and discuss about the difference between stateless and stateful IP address autoconfiguration. Playlist - IPv6 Basics https://www.youtube.com/watch?v=X8RxRr7KNl8&list=PLSNNzog5eydtb5wyH2UtK09L9MsW9Hufq Playlist - IPv4 Basics https://www.youtube.com/watch?v=vcArZIAmnYQ&list=PLSNNzog5eydt_plAtt3k_LYuIXrAS4aDZ This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 1776 Sunny Classroom
Wireless association: active vs passive scanning, & roaming
 
06:16
In this video, I would introduce two association methods: active scanning and passive scanning. I will also discuss about re-association when a wireless device is roaming from one basic service set to another. My topics are organized by playlists: https://www.youtube.com/user/sunnylearning/playlists My most popular videos: https://www.youtube.com/user/sunnylearning/videos?sort=p&view=0&flow=grid Wireless and Wi-Fi https://www.youtube.com/watch?v=PcbTMSf0D2M&list=PLSNNzog5eydvJG48PYnWnNY7-tQIfxTRb This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 1310 Sunny Classroom
How to calculate the total number of the usable host IDs?
 
03:38
Today my topic is how to calculate the total number of usable host IDs on a network if subnet mask is given. Any TCP/IP network has subnet mask, network ID, broadcast ID, and usable Host IDs. To calculate the total number of usable host IDs, we will use a simple formula. Understanding usable host IDs, subnet mask, broadcast ID is also the foundation for subnetting or subnetting a subnet. This is my education channel. My topics cover networking, security, programming, and other computer-related materials. Please subscribe my channel. Many thanks.
Views: 2513 Sunny Classroom
Wireless LAN: WAP, BSS, BSSID, SSID, ESS, & ESSID
 
05:26
In this lesson, I will introduce several terms related to wireless access point (WAP/AP): BSS, BSSID, SSID, ESS, and ESSID. My topics are organized by playlists: https://www.youtube.com/user/sunnylearning/playlists My most popular videos: https://www.youtube.com/user/sunnylearning/videos?sort=p&view=0&flow=grid Playlist: Wireless and Wi-Fi https://www.youtube.com/watch?v=WOTeFceIeM8&list=PLSNNzog5eydvJG48PYnWnNY7-tQIfxTRb&index=1 This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom This is my education channel. My topics cover networking, security, programming, data structure, algorithm, programming and other computer-related materials. Please leave comments, questions and subscribe! Thank you very much! Sunny Classroom
Views: 2824 Sunny Classroom

Maxudin 20 mg vyvanse
Is liv 52 good for weight loss
Prazosin hcl 1mg for nightmares jason
Chloroquine phosphate tablets ip 500mg keflex
Cefixime dispersible tablet 100 mg