You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+36-36Lines changed: 36 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -151,9 +151,9 @@ An Internet Protocol address (IP address) is a numerical label assigned to each
151
151
</b></details>
152
152
153
153
<details>
154
-
<summary>Explain subnet mask and given an example</summary><br><b>
154
+
<summary>Explain subnet mask and give an example</summary><br><b>
155
155
156
-
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, out of the total usable host addresses, two are always reserved for specific purposes and cannot be allocated to any host. These are the first address, which is reserved as a network address (a.k.a network ID) and the last address used for network broadcast.
156
+
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP addresses into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, out of the total usable host addresses, two are always reserved for specific purposes and cannot be allocated to any host. These are the first address, which is reserved as a network address (a.k.a network ID) and the last address used for network broadcast.
@@ -166,7 +166,7 @@ Private IP addresses are assigned to the hosts in the same network to communicat
166
166
167
167
<details>
168
168
<summary>What is a public IP address? In which scenarios/system designs, one should use it?</summary><br><b>
169
-
A public IP address is the public facing IP address. In the event that you was hosting a game server that you want your friends to join, you will give your friends your public IP address to allow their computers to identify and locate your network and server in order for the connection to take place. One time that you would not need to use a public facing IP address is in the event that you was playing with friends who was connected to the same network as you, in that case, you would use a private ip address. In order for someone to be able to connect to your server that is located internally, you will have to setup a port forward to tell your router to allow traffic from the public domain into your network and vice versa.
169
+
A public IP address is the public facing IP address. In the event that you were hosting a game server that you want your friends to join, you will give your friends your public IP address to allow their computers to identify and locate your network and server in order for the connection to take place. One time that you would not need to use a public facing IP address is in the event that you were playing with friends who were connected to the same network as you, in that case, you would use a private ip address. In order for someone to be able to connect to your server that is located internally, you will have to setup a port forward to tell your router to allow traffic from the public domain into your network and vice versa.
170
170
</b></details>
171
171
172
172
<details>
@@ -221,12 +221,12 @@ Its primarily focus it to manage access to shared medium/bus where only one host
221
221
222
222
CSMA/CD algorithm:
223
223
224
-
1. Before sending a frame, it checks whether another host already transmitting a frame.
225
-
2. If no one transmitting, it starts transmitting the frame.
224
+
1. Before sending a frame, it checks whether another host is already transmitting a frame.
225
+
2. If no one is transmitting, it starts transmitting the frame.
226
226
3. If two hosts transmitted at the same time, we have a collision.
227
227
4. Both hosts stop sending the frame and they send to everyone a 'jam signal' notifying everyone that a collision occurred
228
228
5. They are waiting for a random time before sending again
229
-
6. Once each host waited for a random time, they try to send the frame again and so the
229
+
6. Once each host waited for a random time, they try to send the frame again and so the cycle starts again
230
230
</b></details>
231
231
232
232
<details>
@@ -260,7 +260,7 @@ Three collision domains and one broadcast domain
260
260
</b></details>
261
261
262
262
<details>
263
-
<summary>How does a router works?</summary><br><b>
263
+
<summary>How does a router work?</summary><br><b>
264
264
265
265
A router is a physical or virtual appliance that passes information between two or more packet-switched computer networks. A router inspects a given data packet's destination Internet Protocol address (IP address), calculates the best way for it to reach its destination and then forwards it accordingly.
266
266
@@ -269,12 +269,12 @@ A router is a physical or virtual appliance that passes information between two
269
269
<details>
270
270
<summary>What is NAT?</summary><br><b>
271
271
272
-
Network Address Translation (NAT) is a process in which one or more local IP address is translated into one or more Global IP address and vice versa in order to provide Internet access to the local hosts.
272
+
Network Address Translation (NAT) is a process in which one or more local IP addresses are translated into one or more Global IP address and vice versa in order to provide Internet access to the local hosts.
273
273
274
274
</b></details>
275
275
276
276
<details>
277
-
<summary>What is a proxy? How does it works? What do we need it for?</summary><br><b>
277
+
<summary>What is a proxy? How does it work? What do we need it for?</summary><br><b>
278
278
279
279
A proxy server acts as a gateway between you and the internet. It’s an intermediary server separating end users from the websites they browse.
280
280
@@ -284,7 +284,7 @@ Proxy servers provide varying levels of functionality, security, and privacy dep
284
284
</b></details>
285
285
286
286
<details>
287
-
<summary>What is TCP? How does it works? What is the 3way handshake?</summary><br><b>
287
+
<summary>What is TCP? How does it work? What is the 3-way handshake?</summary><br><b>
288
288
289
289
TCP 3-way handshake or three-way handshake is a process which is used in a TCP/IP network to make a connection between server and client.
290
290
@@ -338,24 +338,24 @@ A default gateway serves as an access point or IP router that a networked comput
338
338
</b></details>
339
339
340
340
<details>
341
-
<summary>What is ARP? How does it works?</summary><br><b>
341
+
<summary>What is ARP? How does it work?</summary><br><b>
342
342
343
343
ARP stands for Address Resolution Protocol. When you try to ping an IP address on your local network, say 192.168.1.1, your system has to turn the IP address 192.168.1.1 into a MAC address. This involves using ARP to resolve the address, hence its name.
344
344
345
345
Systems keep an ARP look-up table where they store information about what IP addresses are associated with what MAC addresses. When trying to send a packet to an IP address, the system will first consult this table to see if it already knows the MAC address. If there is a value cached, ARP is not used.
346
346
</b></details>
347
347
348
348
<details>
349
-
<summary>What is TTL? What does it helps to prevent?</summary><br><b>
349
+
<summary>What is TTL? What does it help to prevent?</summary><br><b>
350
350
351
351
- TTL (Time to Live) is a value in an IP (Internet Protocol) packet that determines how many hops or routers a packet can travel before it is discarded. Each time a packet is forwarded by a router, the TTL value is decreased by one. When the TTL value reaches zero, the packet is dropped, and an ICMP (Internet Control Message Protocol) message is sent back to the sender indicating that the packet has expired.
352
352
- TTL is used to prevent packets from circulating indefinitely in the network, which can cause congestion and degrade network performance.
353
-
- It also helps prevent packets from being trapped in routing loops, where packets continuously travel between the same set of routers without ever reaching their destination.
353
+
- It also helps to prevent packets from being trapped in routing loops, where packets continuously travel between the same set of routers without ever reaching their destination.
354
354
- In addition, TTL can be used to help detect and prevent IP spoofing attacks, where an attacker attempts to impersonate another device on the network by using a false or fake IP address. By limiting the number of hops that a packet can travel, TTL can help prevent packets from being routed to destinations that are not legitimate.
355
355
</b></details>
356
356
357
357
<details>
358
-
<summary>What is DHCP? How does it works?</summary><br><b>
358
+
<summary>What is DHCP? How does it work?</summary><br><b>
359
359
360
360
It stands for Dynamic Host Configuration Protocol, and allocates IP addresses, subnet masks and gateways to hosts. This is how it works:
361
361
@@ -368,22 +368,22 @@ Read more [here](https://linuxjourney.com/lesson/dhcp-overview)
368
368
</b></details>
369
369
370
370
<details>
371
-
<summary>Can you have two DHCP servers in the same network? How it works?</summary><br><b>
371
+
<summary>Can you have two DHCP servers in the same network? How it work?</summary><br><b>
372
372
373
373
It is possible to have two DHCP servers on the same network, however it is not recommended, and it is important to configure them carefully to prevent conflicts and configuration problems.
374
374
- When two DHCP servers are configured on the same network, there is a risk that both servers will assign IP addresses and other network configuration settings to the same device, which can cause conflicts and connectivity issues. Additionally, if the DHCP servers are configured with different network settings or options, devices on the network may receive conflicting or inconsistent configuration settings.
375
375
- However, in some cases, it may be necessary to have two DHCP servers on the same network, such as in large networks where one DHCP server may not be able to handle all the requests. In such cases, DHCP servers can be configured to serve different IP address ranges or different subnets, so they do not interfere with each other.
376
376
</b></details>
377
377
378
378
<details>
379
-
<summary>What is SSL tunneling? How does it works?</summary><br><b>
379
+
<summary>What is SSL tunneling? How does it work?</summary><br><b>
380
380
381
381
- SSL (Secure Sockets Layer) tunneling is a technique used to establish a secure, encrypted connection between two endpoints over an insecure network, such as the internet. The SSL tunnel is created by encapsulating the traffic within an SSL connection, which provides confidentiality, integrity, and authentication.
382
382
383
383
Here's how SSL tunneling works:
384
384
385
385
1. A client initiates an SSL connection to a server, which involves a handshake process to establish the SSL session.
386
-
2. Once the SSL session is established, the client and server negotiate encryption parameters, such as the encryption algorithm and key length, and exchange digital certificates to authenticate each other.
386
+
2. Once the SSL session is established, the client and server negotiate encryption parameters, such as the encryption algorithm and key length, then exchange digital certificates to authenticate each other.
387
387
3. The client then sends traffic through the SSL tunnel to the server, which decrypts the traffic and forwards it to its destination.
388
388
4. The server sends traffic back through the SSL tunnel to the client, which decrypts the traffic and forwards it to the application.
389
389
</b></details>
@@ -403,7 +403,7 @@ Here's how SSL tunneling works:
403
403
404
404
There are several reasons why we should consider using IPv6 over IPv4:
405
405
406
-
1. Address space: IPv4 has a limited address space, which has been exhausted in many parts of the world. IPv6 provides a much larger address space, allowing for trillions of unique IP addresses..
406
+
1. Address space: IPv4 has a limited address space, which has been exhausted in many parts of the world. IPv6 provides a much larger address space, allowing for trillions of unique IP addresses.
407
407
2. Security: IPv6 includes built-in support for IPsec, which provides end-to-end encryption and authentication for network traffic.
408
408
3. Performance: IPv6 includes features that can help to improve network performance, such as multicast routing, which allows a single packet to be sent to multiple destinations simultaneously.
409
409
4. Simplified network configuration: IPv6 includes features that can simplify network configuration, such as stateless autoconfiguration, which allows devices to automatically configure their own IPv6 addresses without the need for a DHCP server.
@@ -425,9 +425,9 @@ MTU stands for Maximum Transmission Unit. It's the size of the largest PDU (prot
425
425
<details>
426
426
<summary>What happens if you send a packet that is bigger than the MTU?</summary><br><b>
427
427
428
-
With IPv4 protocol, router can fragment the PDU then sending all the fragmented PDU through the transaction.
428
+
With IPv4 protocol, router can fragment the PDU then send all the fragmented PDU through the transaction.
429
429
430
-
With IPv6 protocol, it issues a error to the user's computer.
430
+
With IPv6 protocol, it issues an error to the user's computer.
431
431
</b></details>
432
432
433
433
<details>
@@ -446,20 +446,20 @@ False. Ping is actually using ICMP (Internet Control Message Protocol) which is
446
446
<details>
447
447
<summary>What is ICMP? What is it used for?</summary><br><b>
448
448
449
-
- ICMP stands for Internet Control Message Protocol. It is a protocol used for diagnostic and control purposes in IP networks. It is part of the Internet Protocol suite, operating at the network layer.
449
+
- ICMP stands for Internet Control Message Protocol. It is a protocol used for diagnostic and control purposes in IP networks. It is a part of the Internet Protocol suite, operating at the network layer.
450
450
451
451
ICMP messages are used for a variety of purposes, including:
452
452
1. Error reporting: ICMP messages are used to report errors that occur in the network, such as a packet that could not be delivered to its destination.
453
453
2. Ping: ICMP is used to send ping messages, which are used to test whether a host or network is reachable and to measure the round-trip time for packets.
454
454
3. Path MTU discovery: ICMP is used to discover the Maximum Transmission Unit (MTU) of a path, which is the largest packet size that can be transmitted without fragmentation.
455
455
4. Traceroute: ICMP is used by the traceroute utility to trace the path that packets take through the network.
456
-
5. Router discovery: ICMP is used to discover the routers on a network.
456
+
5. Router discovery: ICMP is used to discover the routers in a network.
457
457
</b></details>
458
458
459
459
<details>
460
460
<summary>What is NAT? How does it work?</summary><br><b>
461
461
462
-
NAT stands for network address translation. It’s a way to map multiple local private addresses to a public one before transferring the information. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers.
462
+
NAT stands for Network Address Translation. It’s a way to map multiple local private addresses to a public one before transferring the information. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers.
463
463
For example, your computer's private IP could be 192.168.1.100, but your router maps the traffic to it's public IP (e.g. 1.1.1.1). Any device on the internet would see the traffic coming from your public IP (1.1.1.1) instead of your private IP (192.168.1.100).
464
464
</b></details>
465
465
@@ -485,7 +485,7 @@ For example, your computer's private IP could be 192.168.1.100, but your router
0 commit comments