Sunny Classroom
Sunny Classroom
  • 209
  • 18 368 515

Відео

Stack and Queue
Переглядів 1,1 тис.3 місяці тому
Today, I will discuss two data structures: Stack and Queue. Stacks and queues are considered logical, conceptual, or abstract data structures because they organize and access data using specific rules. Their operations and efficiency are more about these rules than where the data is physically stored in the computer.
How your browser secure your communications over the Internet?
Переглядів 3,6 тис.6 місяців тому
Today, I will explain how your browser uses symmetric and asymmetric encryption and digital certificates to protect your online conversations behind the scenes.
A Brief History of the WEB
Переглядів 1,8 тис.7 місяців тому
Today I will talk about the brief evolution history of the World Wide Web. The Web is a system of interconnected pages and resources that can be accessed through the Internet. The Web has undergone different development stages, often called Web 1.0, Web 2.0, and Web 3.0. Each stage represents a significant change in how users interact with the Web and the technologies used.
A brief history of Computer Storage Media
Переглядів 1,6 тис.8 місяців тому
Today, my topic is a brief history of computer storage technology. Please support my channel by becoming a member at patreon.com/sunnyclassroom. Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics ua-cam.com/video/vcArZIAmnYQ/v-deo.html Cyber Attacks and Defense ua-cam.com/video/LXd2uP1qKDE/v-deo.html Basic Cryptography ua-cam.com/vid...
ARP poisoning and Port mirroring attacks
Переглядів 7 тис.11 місяців тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will talk about two more network switch attacks: ARP poisoning and Port mirroring attack. Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics ua-cam.com/video/vcArZIAmnYQ/v-deo.html Cyber Attacks and Defense ua-cam.com/video/LXd2uP1qKDE/v-deo.html Ba...
Switch attacks: MAC Flooding and MAC Spoofing
Переглядів 8 тис.11 місяців тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will talk about two common attacks on the network switch: MAC flooding attack and MAC spoofing attack. Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics ua-cam.com/video/vcArZIAmnYQ/v-deo.html Cyber Attacks and Defense ua-cam.com/video/LXd2uP1qKDE/...
Network Devices to Protect your Intranet
Переглядів 4 тис.Рік тому
An intranet is a private network which is heavily protected by many different networking devices, such as router, firewall, proxy server, DMZ, honeynet, IPS and IDS. This diagram is an overly-simplified version of the reality. I try to put these devices together in a reasonable order, only for teaching and learning purpose.
Malware 2: Rootkit, keylogger, logic bomb, adware, & botnet
Переглядів 3,3 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Malware is any type of software program designed to harm or exploit computer systems or a device. Malware can take many forms, including viruses, ransomware, spyware, and other types of malicious software. Today I will talk about five more types of malware: rootkits, keyloggers, logic bombs, adware, and botnets. Playl...
Malware: virus, worm, Trojan horse, spyware, & ransomware
Переглядів 6 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Malware is any type of software program designed to harm or exploit computer systems or a device. Malware can take many forms, including viruses, ransomware, spyware, and other types of malicious software. Today I will talk about five types of malware: virus, worm, trojan horse, spyware, and ransomware. Playlists: Rou...
How does cellular network work?
Переглядів 13 тис.Рік тому
Today my topic is cellular networks and their key components. We will explore how these components collaborate to provide cellular services. Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today my topic is about celluar networks: several key components of cellular networks and how they work together to deliver celluar services. Playlists: Remote Access/WAN technol...
How does SNMP work?
Переглядів 11 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today my topic is SNMP - Simple Network Management Protocol, a widely used protocol in networking and is supported by a large number of devices. The topic will include the definition of SNMP, SNMP system components, and how does SNMP work? Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3...
General switch vs managed switch
Переглядів 6 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. A switch is a network device that connects other devices on a computer network and forwards data between those devices. There are several different options available when it comes to the functions of a switch. Today I will talk about two types of switches: the general switch and the managed switch in terms of manageme...
Summary of six dynamic routing protocols
Переглядів 4,5 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will summarize six different dynamic routing protocols I have covered so far. Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics ua-cam.com/video/vcArZIAmnYQ/v-deo.html Cyber Attacks and Defense ua-cam.com/video/LXd2uP1qKDE/v-deo.html Basic Cryptogr...
Distance-vector vs link-state and a hybrid EIGRP
Переглядів 9 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. In today’s lesson, I will talk about 1) the main differences between distance-vector routing and link-state routing algorithm; 2) EIGRP - Enhanced Interior Gateway Routing Protocol, a hybrid type routing protocol of both distance-vector and link state. Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbc...
Link state routing protocols: IS to IS and OSPF
Переглядів 15 тис.Рік тому
Link state routing protocols: IS to IS and OSPF
Distance vector routing protocols: RIP and IGRP
Переглядів 12 тис.Рік тому
Distance vector routing protocols: RIP and IGRP
static vs dynamic routing & routing metrics
Переглядів 9 тис.Рік тому
static vs dynamic routing & routing metrics
Five factors of Authentication
Переглядів 4,2 тис.Рік тому
Five factors of Authentication
AS : Interior and border routers, Border Gateway Protocol
Переглядів 14 тис.Рік тому
AS : Interior and border routers, Border Gateway Protocol
ChatGPT: A mind-blowing AI
Переглядів 7 тис.Рік тому
ChatGPT: A mind-blowing AI
All about Bluetooth
Переглядів 6 тис.Рік тому
All about Bluetooth
How does a SOHO router works
Переглядів 9 тис.Рік тому
How does a SOHO router works
Routers, functions, interfaces and ports
Переглядів 8 тис.Рік тому
Routers, functions, interfaces and ports
13 types of computer networks
Переглядів 6 тис.Рік тому
13 types of computer networks
SMS phishing attacks and how to prevent them
Переглядів 5 тис.Рік тому
SMS phishing attacks and how to prevent them
Data Storage Types: File, Block, & Object
Переглядів 31 тис.Рік тому
Data Storage Types: File, Block, & Object
The ElGamal Algorithm: a simple example
Переглядів 9 тис.Рік тому
The ElGamal Algorithm: a simple example
Intro to the ElGamal Cryptosystem
Переглядів 10 тис.Рік тому
Intro to the ElGamal Cryptosystem
How to test if g is a primitive root of a prime number p?
Переглядів 3 тис.Рік тому
How to test if g is a primitive root of a prime number p?

КОМЕНТАРІ

  • @jbasiboi
    @jbasiboi День тому

    doesn't this only solve for /24?

  • @mayankjain8812
    @mayankjain8812 2 дні тому

    Hi Sir, what if subnet is less than 24

  • @Sotospetrou
    @Sotospetrou 2 дні тому

    Awesome explanation. I have a question though. Is there another Sunny Table in case we need more than 256 hosts?

  • @tapiomarkkanen6170
    @tapiomarkkanen6170 3 дні тому

    Thanks for connecvting tagging to Trunking!

  • @devakandukuri5833
    @devakandukuri5833 3 дні тому

    Thank you

  • @angsantana15
    @angsantana15 3 дні тому

    SO FUN!

  • @tallsensei
    @tallsensei 3 дні тому

    watching this in 2024. thanks a lot this is very simple and concise!

  • @troyv808
    @troyv808 4 дні тому

    Just want to say that you're my go-to guy when I need some tech explanation. You make it very easy to understand! A BIGH MAHALO to you Sunny!

  • @fernandavln38
    @fernandavln38 4 дні тому

    Good explanation.

  • @Rasukutty777
    @Rasukutty777 4 дні тому

    Excellent explanation sir.... Thank you so much ❤❤❤❤

  • @meilynandrade2868
    @meilynandrade2868 4 дні тому

    Great job! It was so easy to understand.

  • @mirlsgrabbaszad594
    @mirlsgrabbaszad594 5 днів тому

    thank you Sir

  • @mmasefiri
    @mmasefiri 5 днів тому

    Loving your video

  • @AllAroundHnadyMan
    @AllAroundHnadyMan 5 днів тому

    Thank you

  • @Franbot1
    @Franbot1 5 днів тому

    Sorry if this is a blonde question but in the real world - who choses what your original ID is? A lot of the case studies I see in textbooks start with "you've been given this network ID with this mask, generate n number of subnets." What I don't understand about all of this is, how does this original network ID get generated for a business or organisation, and how does it get passed down for you to work on? Second question - it looks like there is not a fixed limit for the number of hosts and subnets. The table in the last video stopped at 256, this one stops at 65536. Are there realworld practical limitations on the number of devices a business can include in a subnet? Thank you so much for your videos - you are my first ever UA-cam subscribe because they are wonderful.

  • @rebelous9335
    @rebelous9335 7 днів тому

    Mr. Sunny, I’ve just made practical CCNA exam only because of you. Many thanks from the Czech Republic! 🙏

  • @hadesknight5838
    @hadesknight5838 7 днів тому

    You can always count on Sunny to have your back!

  • @abioyeabdulmajeed9858
    @abioyeabdulmajeed9858 7 днів тому

    This looks cool for class C IP address. Why is no one asking what happens when it's a class A or B IP address!!

  • @NoobRiderJ
    @NoobRiderJ 8 днів тому

    This is by far the simplest most intuitive subnetting approach on youtube! Thank you sir!

  • @carrienakano5252
    @carrienakano5252 8 днів тому

    Thank you Sunny! It takes great intelligence to teach subnetting so clearly and simply.😊

  • @latandin
    @latandin 8 днів тому

    Much Appreciation. I had 3 hours lecture on it but clearly understood from your video.

  • @sudarshanseshadri5504
    @sudarshanseshadri5504 9 днів тому

    It would be great if these graphs more clearly indicated what domain they are in!

  • @stefanzza
    @stefanzza 10 днів тому

    Can someone explain to me please, why we divide 16,384 by 256, not to some other number? 6.57min on the video.

  • @sagrgywejhxcvx
    @sagrgywejhxcvx 14 днів тому

    hallo.

  • @ericy8980
    @ericy8980 14 днів тому

    "A diligent student needs no master"

  • @myelibrary
    @myelibrary 15 днів тому

    Excellent video

  • @isimbiemmanuella
    @isimbiemmanuella 15 днів тому

    hey please show me how to find valid subnet and valid host

  • @thesexrace
    @thesexrace 15 днів тому

    Why is the subnet /27 instead of /24?

  • @Pwnstr95
    @Pwnstr95 15 днів тому

    got my exam in 2 hours, well hope this covers it, if it's asking /16 address i hope I know what to do

  • @junwenteh
    @junwenteh 15 днів тому

    Simple and straight to the point, thank you!

  • @biblecontext2024
    @biblecontext2024 16 днів тому

    If my router did a PAT from port 80 to 8000, how does the other router know that I'm requesting a port 80(web) instead of 8000? Thank you.

  • @iamthemoss
    @iamthemoss 16 днів тому

    Sunny, great video.

  • @ajaypaswan6158
    @ajaypaswan6158 16 днів тому

    What is fin

  • @Boyhoody
    @Boyhoody 16 днів тому

    So comprehensive yet so simply put! Your explanation is clear and understandable. Cheers!

  • @marvinmarvo
    @marvinmarvo 17 днів тому

    Very crisp and concise explanation.

  • @thelitepredator
    @thelitepredator 17 днів тому

    love u sunnny great job

  • @StudyTime-uv6ve
    @StudyTime-uv6ve 17 днів тому

    sunny sir thank you soo much you are the best!

  • @INIOBONGUDOFIA
    @INIOBONGUDOFIA 17 днів тому

    Muito bom!

  • @cassieward7390
    @cassieward7390 17 днів тому

    People in my System Management course cried over how our teacher explained it, we were so confused. This is so much easier!

  • @blind_mind_color_eyes
    @blind_mind_color_eyes 17 днів тому

    Thank you, sir. The video was really helpful. I understand it properly.❤

  • @JamesTooth-sn1ot
    @JamesTooth-sn1ot 18 днів тому

    thank you sir

  • @neelammughal8165
    @neelammughal8165 18 днів тому

    WHere I can get this slides

  • @user-yc7qj6vt1z
    @user-yc7qj6vt1z 19 днів тому

    In my humble opinion, you are the best on this topic on UA-cam.

  • @ElectronicsFunky
    @ElectronicsFunky 19 днів тому

    Thank you very much Sir 👌👏

  • @yassak2
    @yassak2 20 днів тому

    GÜZEL

  • @timohjunior2856
    @timohjunior2856 20 днів тому

    the power of experiences

  • @timohjunior2856
    @timohjunior2856 20 днів тому

    perfect !

  • @baldovincadenamejia244
    @baldovincadenamejia244 20 днів тому

    Hi Sunny great video as always! In the example we are told the network ID range is 172.30.232.0/24. You explained in this video that we use one subnetting table or the other depending on the subnet mask (e.g. /16 subnetting not the same as /24 subnetting). But how is it determined that a /24 mask is used for the network ID range? Why not 172.30.232.0/16 or 172.30.232.0/8? Also I was read in an article that, for subnetting, it is possible to borrow one bit from the network in case you need more subnets than the ones one can make with the given subnet. How is this done? Is there any limitation to this? Thank you in advance.

  • @EvanMbise
    @EvanMbise 21 день тому

    what a marvelous explanation!!!! Thank you so much

  • @user-hg9cc7rz9d
    @user-hg9cc7rz9d 21 день тому

    You are my life saver. Keep it up with the good work.