Canny Information Center
Canny Information Center
  • 7
  • 52 360
UDP SOCKETS | SOCKET PROGRAMMING IN C - PART 2
This video will help clearing your fundamentals on Socket programming (which is independent of any programming language) and in this video I have especially talked about UDP sockets with real time examples and Complete UDP client - server programs in C.
Переглядів: 1 393

Відео

TCP/IP SOCKETS | SOCKET PROGRAMMING IN C - PART1
Переглядів 14 тис.4 роки тому
This video will help clearing your fundamentals on Socket programming (which is independent of any programming language) and in this video I have especially talked about TCP/IP sockets with real time examples and Complete client - server programs in C..
C program memory layout | Stack segment Vs Heap Segment | Stack Vs Heap
Переглядів 7034 роки тому
This video helps understanding the basic of memory layout of a C program.
Kernel Space Vs User Space
Переглядів 16 тис.4 роки тому
This Video helps clearing the fundamentals about the need and difference between Kernel Space and User Space for a program running in memory.
Why PKI & Digital Certificates ??? | PKI vs SSL | Web Server Security
Переглядів 7 тис.4 роки тому
This video is about making your foundation strong over the below topics in some amount of depth : 1) PKI(Public Key Infrastructure) vs SSL(Secure Socket Layer) with real time example 2) Necessity of Digital Certificates 3) Types of Digital Certificates 4) Fundamentals about CRL and OCSP 5) Fundamentals of Identity Certificate vs CA certificate vs Intermediate Certificate.
Why SSL, TLS, DTLS ??? | Data Security over Network | Integrity & Confidentiality | HTTPS internals
Переглядів 11 тис.4 роки тому
In this video I have given a brief introduction to concept of SSL, TLS and DTLS with necessary internal details. A separate topic on encryption techniques and certificates will be published soon.
IP address Vs MAC address explained
Переглядів 3,2 тис.4 роки тому
Many of you might know what it is without knowing the significance in details. in this video , i have tried to explain this in details .

КОМЕНТАРІ

  • @ReynaldoDaddario-t5b
    @ReynaldoDaddario-t5b 18 днів тому

    Esta Ford

  • @codewithoutdoubt
    @codewithoutdoubt 3 місяці тому

    You sould try to make videos with hindi language also

  • @JashTanna-od9pc
    @JashTanna-od9pc 6 місяців тому

    Sir this code is for linux please made for windows also please❤

  • @kittyliu6089
    @kittyliu6089 Рік тому

    Great video. Very helpful. Really hope that there's a new video explaining the self signed certificate.

  • @mhsn27mhsn10
    @mhsn27mhsn10 Рік тому

    hello bro can explain to me how to receive data from any device via ethernet or serial port and get that data to show in any application I did make it by c# or C++.

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 Рік тому

      as an suggestion you can use user space sockets(L7) or berkley packet filter(l2) or raw sockets (l2) to get this done.

  • @webtech4161
    @webtech4161 Рік тому

    This was a great explanation and a good first video! Make more please!!

  • @unithrac5781
    @unithrac5781 Рік тому

    Thanks a lot for this video! I have less exposure to the terms , but i was able to understand in depth

  • @sauravchandra9227
    @sauravchandra9227 Рік тому

    probably the only video that explains DTLS in such depth and so easily. awesome work

  • @td9242
    @td9242 Рік тому

    wonderfully explained

  • @funwone
    @funwone 2 роки тому

    Most of the things that I wanted to know... Thanks.

  • @showkatmeer5474
    @showkatmeer5474 2 роки тому

    Thanks, sir for explaining the security certificates, it might be better if u can explain it with the help of diagrams in future videos

  • @subhamthemusicalguy8851
    @subhamthemusicalguy8851 2 роки тому

    Awesome video.Thanks for the info.Please resume your channel

  • @mukundachlerkar8021
    @mukundachlerkar8021 2 роки тому

    Can u yourself see this?

  • @MuhammadKhan-yl7mt
    @MuhammadKhan-yl7mt 2 роки тому

    Good 👍

  • @soumyaneogy9522
    @soumyaneogy9522 2 роки тому

    You still need improvement , good start however ! you need to be choose proper words , and prepare well .

  • @ifan328
    @ifan328 2 роки тому

    👏🏾👏🏾👏🏾🔥 But I am having an issue, from the first one connecting to google is there a way I can observe a the osi/network model layers?? Thank you

  • @exquisitedog8069
    @exquisitedog8069 2 роки тому

    The cookie is mainly used because it allows the server to be stateless during the hello world exchange, which means that in case of DOS attack it does not allocate a channel for the client until the next exchange.

  • @emmanuelugwu6586
    @emmanuelugwu6586 2 роки тому

    So a kernel is like an API?

  • @himanshubillorePeoplesoftHRMS
    @himanshubillorePeoplesoftHRMS 2 роки тому

    i was asked : "At which can we know that now program has entered into kernel space, and when do we know it has returned to user space?".. any thoughts?

  • @simranthakur8596
    @simranthakur8596 3 роки тому

    Can you please put the complete code of client & server in comment section?

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 3 роки тому

      Hi, i believe you can see the complete uncut code in the video itself and and type it down and it should work . I am afraid i havent saved it anywhere

    • @simranthakur8596
      @simranthakur8596 3 роки тому

      @@cannyinformationcenter8236 Thanks for the reply. I am trying to modify your code for some other need. I want this server to handle multiple clients using threads and attend all the requests in fifo manner. Client shouldn't get disconnected until shutdown command is given. Can you suggest something

  • @fucyahoo
    @fucyahoo 3 роки тому

    This is a circular reasoning explanation. The ip address is used to locate a specific device within a network. (at this point why would another identifier be necessary?) Then the mac address is used to identify the specific device to deliver the information. This is circular. What is the specific purpose of the mac address in data delivery when all you need to identify the destination of the data is the IP?

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 3 роки тому

      Thanks for for your reply , first of all ip is not used to locate a device within a network, rather it can be within or out side of network. Secondly if its outside of network then how the sender knows where it is ? Here comes mac i.e. sender will use mac of the next known gateway until it reaches the destination where as ip will remain as destition ip. Another point is ip is not constant to a particular device but mac is .i hope it brings you some more clarity

  • @donator5724
    @donator5724 3 роки тому

    Thanks a lot for the tutorial

  • @QuadDerrick
    @QuadDerrick 3 роки тому

    i think i understand the difference now, userspace is shared memory for users, kernel space is , more locked down memory space for system. i still do not quite understand , why there is a userspace and kernalspace. is it a security feauture ? if so, is it a effective one really ?

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 3 роки тому

      Simplest answer for this question is "if there are multiple users for one system, and if one user has the authority to bring down the entire system ,isnt it bad for other users. Hence there are different spaces provided for users which you can say user space and all internal work used to maintain the system is not exposed to user and is handled by the system(kernel) which is kernel space". I hope this clarifies a bit

    • @QuadDerrick
      @QuadDerrick 3 роки тому

      @@cannyinformationcenter8236 That do makes some sence. Thanks.

  • @nadaah9
    @nadaah9 3 роки тому

    i will make sure that i share your videos to my fellow colleagueues

  • @nadaah9
    @nadaah9 3 роки тому

    Thank you so much sir even though I am not understand the last part where you inputted linux commands "ps -ef |grep server" i really got something to hold on to I will look forward into learning your next course and I really appreciate you for uploading free contents like this that helps us in navigating this course and networks in general thank you so much again you saved me

  • @situna100
    @situna100 3 роки тому

    Thank you Sanjay ....This videos are really helpful

  • @mmayur100
    @mmayur100 3 роки тому

    Shandaar Jabardast Jindabad <3

  • @nozdoz4166
    @nozdoz4166 3 роки тому

    BEST EXPLANATION I'VE EVER SEEN THANK YOU

  • @viswanathkanagarla1376
    @viswanathkanagarla1376 3 роки тому

    please send code

    • @creativecodelab
      @creativecodelab Рік тому

      A big word of advice, follow along as he codes, then start off with a self project and try to tweak it as he's doing it. Learn by doing.

  • @moinahmed3513
    @moinahmed3513 3 роки тому

    Very Nice , helped me understand it properly, Thank you

  • @passivepuppy
    @passivepuppy 3 роки тому

    Thank You!

  • @reinathefox6600
    @reinathefox6600 3 роки тому

    Thank you this was actually very helpful !

  • @khachaturarmenyan1438
    @khachaturarmenyan1438 3 роки тому

    At time 2:22 you mention MAC needs to change from hop to hop. I am not clear why. What would happen if there was no MAC address at all? Say, hostA sends the packet for hostB in the different network. If gateway or router does not know how to route to this IP, it sends it up to the upper level, until at some point the router knows where to send this packet. In the end, ARP protocol is basically based on IP is requesting for MAC address. The question is if the ARP packet was able to get to the host based on IP, why would hostA not send the data packet based on the same IP?

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 3 роки тому

      To answer this i will give an example , your home address = ip address and your id is your mac, and your local postoffice address is your nearest mac , for example someone send a courier to you , what happens ,does the postman know where you are based on your home address (no). He will send to his nearest postoffice(mac), they will then forward to another post office (another mac) then going through different mac it finally reaches you. I hope this example explains your doubt

    • @khachaturarmenyan1438
      @khachaturarmenyan1438 3 роки тому

      @@cannyinformationcenter8236 thanks for the response. Well, it does not fully address my question. You brought an example on postman, but I am not convinced this is well associated with tcp packet transfer. The postman delivers the parcel to postoffice, not because he cannot find me, but to split the responsibilities: he will deliver thousands of parsels to postoffice and then postoffice will distribute them to addressees. Postoffice does not add any new address to envelope after receiving it, so in theory it could have been delivered straight to the address. Same question is for IP protocol. ARP packet gets delivered to a host using IP address only, without MAC, that means it is possible. Why not to leave MAC address empty always and deliver data like ARP? Does my question make any sense?

  • @rekhanatarajan6149
    @rekhanatarajan6149 3 роки тому

    very clear explanation ....

  • @aninditasaha0307
    @aninditasaha0307 3 роки тому

    i am running the prog but it is not giving me the shown output.. it get stuck ...no compilation error..but not giving right output..pls help

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 3 роки тому

      Please send me your code on my email cannynetworks@gmail.com

    • @aninditasaha0307
      @aninditasaha0307 3 роки тому

      @@cannyinformationcenter8236 sir.. It is working now... Actually I made some mistake from my side.. Thanx for the concern

    • @aninditasaha0307
      @aninditasaha0307 3 роки тому

      Can you please create some code for stop and wait, go back n etc.. Those sliding window protocols...

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 3 роки тому

      @@aninditasaha0307 i will try to create

  • @paulpach
    @paulpach 3 роки тому

    Very informative, thank you1

  • @krystof7059
    @krystof7059 3 роки тому

    nice video and what if i want to connect to server from different device and from different connection?

  • @dipan246
    @dipan246 4 роки тому

    Nice explanation. Could you please explain more in depth about client certificate authentication. If we have enabled the client side authentication, server will ask for client certificate. Then client will provide its certificate (which contains client's public key) to the server. After that in "Certificate Verify" client will encrypt previous handshake messages with its private key and send to the server. But here is the question, since everybody knows the client's public key and anybody can decrypt it, so how the confidentiality is maintain here. Please explain the 'Certificate Verify".

  • @sysdoc6890
    @sysdoc6890 4 роки тому

    nice video sir

  • @SURYAPRAKASH-gg2zf
    @SURYAPRAKASH-gg2zf 4 роки тому

    It was helpful alot, thanks sir ! Can you make an video on usefull commands in linux for networking ...

  • @manasam4772
    @manasam4772 4 роки тому

    Wonderful video, it is so clear and helpful. can u clarify this doubt for me, if Apple phones could call to apple phones only, no one would probably buy apple phone, so how apple phones to android phones, the calls get connected can u explain with respect to OSI model please?

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 3 роки тому

      1) if there is something in apple(which i am not aware of) where only apple phonecan communicate with apple phone only . Then this would be completely based on software feature specific to apple and they might have used mac based(OUI) filter for that. To answer your second question, every call is just processed like any other networking packets do. Here when someone calls ,the data packet reaches another receiver(phone) over antenna then the signal is converted to digital data and packet is stored in a buffer (this happens at layer 1 ,physical layer) .the the buffer goes to mac layer i.e. layer 2(inside kernel), this layer has proprietory code meant to parse and do specific operations only meant for call datas , here the ethernet header is added(so that information can pass through internet after this layer). Then that data is passed over to layer 3 i.e network layer network .(either here or in layer 2 , decision is taken whether to forward the call data or it is meant for this device) and if forwarding is need no other operation is needed ,it will just pass it down the stack over to internet else it will go up to layer 4 (here kernel layer ends) and then to userspace application for consumption. I hope it gives you little clarification. Thanks for visiting Canny Information Center

  • @anjalisoni5114
    @anjalisoni5114 4 роки тому

    Very neat explanation. Usually, I do not comment on videos but this video has compelled me to do so.Keep making such informative videos. Thank you so much for clearing my doubts.

  • @gajpalsinghrawat9263
    @gajpalsinghrawat9263 4 роки тому

    this video is very important for vpn engineer. sir i want to learn vpn as site to site ssl remote access. please give me suggestion. I am working on checkpoint firewall . I need to learn about vpn. Thanks

  • @narnavaramrajasekhar3531
    @narnavaramrajasekhar3531 4 роки тому

    This video is excellent to understand sockets. Can you please make similar video on Websockets.

  • @taniakarmakar
    @taniakarmakar 4 роки тому

    this really helped in clearing my doubts. I do see some discrepancy in the explanation at the certificate exchange stage. probably u can explain a bit more about the ServerHello stage. but nevertheless. its a good video to understand the basics. I really hope you upload detailed video related to certificates very soon. :)

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 4 роки тому

      Sure I will make a separate video for Certificates soon as per request. Thanks for your valuable comments

  • @ashutoshkumar-sw3bw
    @ashutoshkumar-sw3bw 4 роки тому

    Hi, can you explain.. how to send some meaningful msg(not random character).. suppose i want to send 100 msg... each msg contains few fields, such as name , roll number of a student

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 4 роки тому

      There are many ways to handle this, One way to deal with this is to first design the encoding or communication scheme for example TLV(type-length-value or tag-length-value) format for your communication of data over socket that should be known to both client and server and then you need to structure your composite data in form of some structure that can be decoded on the other end. And regarding reading input which is a separate topic ,I suppose you would have taken care of. I hope this answers your question.

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 4 роки тому

      you can send each structure of data inside a TLV and write code to parse it on the other end. remember to take care of converting data into network order and viceversa .

    • @ashutoshkumar-sw3bw
      @ashutoshkumar-sw3bw 4 роки тому

      @@cannyinformationcenter8236 Thanks for reply... i will explore more about this (TLV) as i dont have much idea about this... if you can please provide some reference for this it will be graet help

    • @cannyinformationcenter8236
      @cannyinformationcenter8236 4 роки тому

      ​@@ashutoshkumar-sw3bw I would encourage to watch the second part of socket programming on UDP , there in the coding example I have shown some example for structuring certain valid data and sending to server, regarding tlv(type,length,value) , its pretty simple , you can check on google . If you still find difficulty ,revert back and I can make an example code and send it to you

  • @siddharthmakwan
    @siddharthmakwan 4 роки тому

    bro doing a good job. Keep it up.

  • @bikash7773
    @bikash7773 4 роки тому

    sanga badhia

  • @abhinabrohit
    @abhinabrohit 4 роки тому

    Plz tell me how are you editing your videos bcoz I want to create stuffs like this.

  • @abhinabrohit
    @abhinabrohit 4 роки тому

    You are helping me out in this lockdown period. Thanks for sharing these kind of videos.