Skip to content

Commit 90f70fe

Browse files
weredukeshack94
authored andcommitted
fixed several typos and misspellings (bregman-arie#373)
1 parent 30fa6be commit 90f70fe

File tree

1 file changed

+36
-36
lines changed

1 file changed

+36
-36
lines changed

README.md

Lines changed: 36 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -151,9 +151,9 @@ An Internet Protocol address (IP address) is a numerical label assigned to each
151151
</b></details>
152152

153153
<details>
154-
<summary>Explain subnet mask and given an example</summary><br><b>
154+
<summary>Explain subnet mask and give an example</summary><br><b>
155155

156-
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, out of the total usable host addresses, two are always reserved for specific purposes and cannot be allocated to any host. These are the first address, which is reserved as a network address (a.k.a network ID) and the last address used for network broadcast.
156+
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP addresses into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, out of the total usable host addresses, two are always reserved for specific purposes and cannot be allocated to any host. These are the first address, which is reserved as a network address (a.k.a network ID) and the last address used for network broadcast.
157157

158158
[Example](https://github.com/philemonnwanne/o0o0o/tree/main/exes/exe-09)
159159

@@ -166,7 +166,7 @@ Private IP addresses are assigned to the hosts in the same network to communicat
166166

167167
<details>
168168
<summary>What is a public IP address? In which scenarios/system designs, one should use it?</summary><br><b>
169-
A public IP address is the public facing IP address. In the event that you was hosting a game server that you want your friends to join, you will give your friends your public IP address to allow their computers to identify and locate your network and server in order for the connection to take place. One time that you would not need to use a public facing IP address is in the event that you was playing with friends who was connected to the same network as you, in that case, you would use a private ip address. In order for someone to be able to connect to your server that is located internally, you will have to setup a port forward to tell your router to allow traffic from the public domain into your network and vice versa.
169+
A public IP address is the public facing IP address. In the event that you were hosting a game server that you want your friends to join, you will give your friends your public IP address to allow their computers to identify and locate your network and server in order for the connection to take place. One time that you would not need to use a public facing IP address is in the event that you were playing with friends who were connected to the same network as you, in that case, you would use a private ip address. In order for someone to be able to connect to your server that is located internally, you will have to setup a port forward to tell your router to allow traffic from the public domain into your network and vice versa.
170170
</b></details>
171171

172172
<details>
@@ -221,12 +221,12 @@ Its primarily focus it to manage access to shared medium/bus where only one host
221221

222222
CSMA/CD algorithm:
223223

224-
1. Before sending a frame, it checks whether another host already transmitting a frame.
225-
2. If no one transmitting, it starts transmitting the frame.
224+
1. Before sending a frame, it checks whether another host is already transmitting a frame.
225+
2. If no one is transmitting, it starts transmitting the frame.
226226
3. If two hosts transmitted at the same time, we have a collision.
227227
4. Both hosts stop sending the frame and they send to everyone a 'jam signal' notifying everyone that a collision occurred
228228
5. They are waiting for a random time before sending again
229-
6. Once each host waited for a random time, they try to send the frame again and so the
229+
6. Once each host waited for a random time, they try to send the frame again and so the cycle starts again
230230
</b></details>
231231

232232
<details>
@@ -260,7 +260,7 @@ Three collision domains and one broadcast domain
260260
</b></details>
261261

262262
<details>
263-
<summary>How does a router works?</summary><br><b>
263+
<summary>How does a router work?</summary><br><b>
264264

265265
A router is a physical or virtual appliance that passes information between two or more packet-switched computer networks. A router inspects a given data packet's destination Internet Protocol address (IP address), calculates the best way for it to reach its destination and then forwards it accordingly.
266266

@@ -269,12 +269,12 @@ A router is a physical or virtual appliance that passes information between two
269269
<details>
270270
<summary>What is NAT?</summary><br><b>
271271

272-
Network Address Translation (NAT) is a process in which one or more local IP address is translated into one or more Global IP address and vice versa in order to provide Internet access to the local hosts.
272+
Network Address Translation (NAT) is a process in which one or more local IP addresses are translated into one or more Global IP address and vice versa in order to provide Internet access to the local hosts.
273273

274274
</b></details>
275275

276276
<details>
277-
<summary>What is a proxy? How does it works? What do we need it for?</summary><br><b>
277+
<summary>What is a proxy? How does it work? What do we need it for?</summary><br><b>
278278

279279
A proxy server acts as a gateway between you and the internet. It’s an intermediary server separating end users from the websites they browse.
280280

@@ -284,7 +284,7 @@ Proxy servers provide varying levels of functionality, security, and privacy dep
284284
</b></details>
285285

286286
<details>
287-
<summary>What is TCP? How does it works? What is the 3 way handshake?</summary><br><b>
287+
<summary>What is TCP? How does it work? What is the 3-way handshake?</summary><br><b>
288288

289289
TCP 3-way handshake or three-way handshake is a process which is used in a TCP/IP network to make a connection between server and client.
290290

@@ -338,24 +338,24 @@ A default gateway serves as an access point or IP router that a networked comput
338338
</b></details>
339339

340340
<details>
341-
<summary>What is ARP? How does it works?</summary><br><b>
341+
<summary>What is ARP? How does it work?</summary><br><b>
342342

343343
ARP stands for Address Resolution Protocol. When you try to ping an IP address on your local network, say 192.168.1.1, your system has to turn the IP address 192.168.1.1 into a MAC address. This involves using ARP to resolve the address, hence its name.
344344

345345
Systems keep an ARP look-up table where they store information about what IP addresses are associated with what MAC addresses. When trying to send a packet to an IP address, the system will first consult this table to see if it already knows the MAC address. If there is a value cached, ARP is not used.
346346
</b></details>
347347

348348
<details>
349-
<summary>What is TTL? What does it helps to prevent?</summary><br><b>
349+
<summary>What is TTL? What does it help to prevent?</summary><br><b>
350350

351351
- TTL (Time to Live) is a value in an IP (Internet Protocol) packet that determines how many hops or routers a packet can travel before it is discarded. Each time a packet is forwarded by a router, the TTL value is decreased by one. When the TTL value reaches zero, the packet is dropped, and an ICMP (Internet Control Message Protocol) message is sent back to the sender indicating that the packet has expired.
352352
- TTL is used to prevent packets from circulating indefinitely in the network, which can cause congestion and degrade network performance.
353-
- It also helps prevent packets from being trapped in routing loops, where packets continuously travel between the same set of routers without ever reaching their destination.
353+
- It also helps to prevent packets from being trapped in routing loops, where packets continuously travel between the same set of routers without ever reaching their destination.
354354
- In addition, TTL can be used to help detect and prevent IP spoofing attacks, where an attacker attempts to impersonate another device on the network by using a false or fake IP address. By limiting the number of hops that a packet can travel, TTL can help prevent packets from being routed to destinations that are not legitimate.
355355
</b></details>
356356

357357
<details>
358-
<summary>What is DHCP? How does it works?</summary><br><b>
358+
<summary>What is DHCP? How does it work?</summary><br><b>
359359

360360
It stands for Dynamic Host Configuration Protocol, and allocates IP addresses, subnet masks and gateways to hosts. This is how it works:
361361

@@ -368,22 +368,22 @@ Read more [here](https://linuxjourney.com/lesson/dhcp-overview)
368368
</b></details>
369369

370370
<details>
371-
<summary>Can you have two DHCP servers in the same network? How it works?</summary><br><b>
371+
<summary>Can you have two DHCP servers in the same network? How it work?</summary><br><b>
372372

373373
It is possible to have two DHCP servers on the same network, however it is not recommended, and it is important to configure them carefully to prevent conflicts and configuration problems.
374374
- When two DHCP servers are configured on the same network, there is a risk that both servers will assign IP addresses and other network configuration settings to the same device, which can cause conflicts and connectivity issues. Additionally, if the DHCP servers are configured with different network settings or options, devices on the network may receive conflicting or inconsistent configuration settings.
375375
- However, in some cases, it may be necessary to have two DHCP servers on the same network, such as in large networks where one DHCP server may not be able to handle all the requests. In such cases, DHCP servers can be configured to serve different IP address ranges or different subnets, so they do not interfere with each other.
376376
</b></details>
377377

378378
<details>
379-
<summary>What is SSL tunneling? How does it works?</summary><br><b>
379+
<summary>What is SSL tunneling? How does it work?</summary><br><b>
380380

381381
- SSL (Secure Sockets Layer) tunneling is a technique used to establish a secure, encrypted connection between two endpoints over an insecure network, such as the internet. The SSL tunnel is created by encapsulating the traffic within an SSL connection, which provides confidentiality, integrity, and authentication.
382382

383383
Here's how SSL tunneling works:
384384

385385
1. A client initiates an SSL connection to a server, which involves a handshake process to establish the SSL session.
386-
2. Once the SSL session is established, the client and server negotiate encryption parameters, such as the encryption algorithm and key length, and exchange digital certificates to authenticate each other.
386+
2. Once the SSL session is established, the client and server negotiate encryption parameters, such as the encryption algorithm and key length, then exchange digital certificates to authenticate each other.
387387
3. The client then sends traffic through the SSL tunnel to the server, which decrypts the traffic and forwards it to its destination.
388388
4. The server sends traffic back through the SSL tunnel to the client, which decrypts the traffic and forwards it to the application.
389389
</b></details>
@@ -403,7 +403,7 @@ Here's how SSL tunneling works:
403403

404404
There are several reasons why we should consider using IPv6 over IPv4:
405405

406-
1. Address space: IPv4 has a limited address space, which has been exhausted in many parts of the world. IPv6 provides a much larger address space, allowing for trillions of unique IP addresses..
406+
1. Address space: IPv4 has a limited address space, which has been exhausted in many parts of the world. IPv6 provides a much larger address space, allowing for trillions of unique IP addresses.
407407
2. Security: IPv6 includes built-in support for IPsec, which provides end-to-end encryption and authentication for network traffic.
408408
3. Performance: IPv6 includes features that can help to improve network performance, such as multicast routing, which allows a single packet to be sent to multiple destinations simultaneously.
409409
4. Simplified network configuration: IPv6 includes features that can simplify network configuration, such as stateless autoconfiguration, which allows devices to automatically configure their own IPv6 addresses without the need for a DHCP server.
@@ -425,9 +425,9 @@ MTU stands for Maximum Transmission Unit. It's the size of the largest PDU (prot
425425
<details>
426426
<summary>What happens if you send a packet that is bigger than the MTU?</summary><br><b>
427427

428-
With IPv4 protocol, router can fragment the PDU then sending all the fragmented PDU through the transaction.
428+
With IPv4 protocol, router can fragment the PDU then send all the fragmented PDU through the transaction.
429429

430-
With IPv6 protocol, it issues a error to the user's computer.
430+
With IPv6 protocol, it issues an error to the user's computer.
431431
</b></details>
432432

433433
<details>
@@ -446,20 +446,20 @@ False. Ping is actually using ICMP (Internet Control Message Protocol) which is
446446
<details>
447447
<summary>What is ICMP? What is it used for?</summary><br><b>
448448

449-
- ICMP stands for Internet Control Message Protocol. It is a protocol used for diagnostic and control purposes in IP networks. It is part of the Internet Protocol suite, operating at the network layer.
449+
- ICMP stands for Internet Control Message Protocol. It is a protocol used for diagnostic and control purposes in IP networks. It is a part of the Internet Protocol suite, operating at the network layer.
450450

451451
ICMP messages are used for a variety of purposes, including:
452452
1. Error reporting: ICMP messages are used to report errors that occur in the network, such as a packet that could not be delivered to its destination.
453453
2. Ping: ICMP is used to send ping messages, which are used to test whether a host or network is reachable and to measure the round-trip time for packets.
454454
3. Path MTU discovery: ICMP is used to discover the Maximum Transmission Unit (MTU) of a path, which is the largest packet size that can be transmitted without fragmentation.
455455
4. Traceroute: ICMP is used by the traceroute utility to trace the path that packets take through the network.
456-
5. Router discovery: ICMP is used to discover the routers on a network.
456+
5. Router discovery: ICMP is used to discover the routers in a network.
457457
</b></details>
458458

459459
<details>
460460
<summary>What is NAT? How does it work?</summary><br><b>
461461

462-
NAT stands for network address translation. It’s a way to map multiple local private addresses to a public one before transferring the information. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers.
462+
NAT stands for Network Address Translation. It’s a way to map multiple local private addresses to a public one before transferring the information. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers.
463463
For example, your computer's private IP could be 192.168.1.100, but your router maps the traffic to it's public IP (e.g. 1.1.1.1). Any device on the internet would see the traffic coming from your public IP (1.1.1.1) instead of your private IP (192.168.1.100).
464464
</b></details>
465465

@@ -485,7 +485,7 @@ For example, your computer's private IP could be 192.168.1.100, but your router
485485
</b></details>
486486

487487
<details>
488-
<summary>Which factors affect network performances</summary><br><b>
488+
<summary>Which factors affect network performance?</summary><br><b>
489489

490490
Several factors can affect network performance, including:
491491

@@ -502,46 +502,46 @@ Several factors can affect network performance, including:
502502
<details>
503503
<summary>What is APIPA?</summary><br><b>
504504

505-
APIPA is a set of it addresses that devices are allocated
505+
APIPA is a set of IP addresses that devices are allocated
506506
when the main DHCP server is not reachable
507507

508508
</b></details>
509509

510510
<details>
511-
<summary>What ip range does APIPA use?</summary><br><b>
511+
<summary>What IP range does APIPA use?</summary><br><b>
512512

513-
APIPA uses the ip range: 169.254.0.1 - 169.254.255.254.
513+
APIPA uses the IP range: 169.254.0.1 - 169.254.255.254.
514514

515515
</b></details>
516516

517517
#### Control Plane and Data Plane
518518

519519
<details>
520-
<summary>What "control plane" refers to?</summary><br><b>
520+
<summary>What does "control plane" refer to?</summary><br><b>
521521

522522
The control plane is the part of the network that decides how to route and forward packets to a different location.
523523
</b></details>
524524

525525
<details>
526-
<summary>What "data plane" refers to?</summary><br><b>
526+
<summary>What does "data plane" refer to?</summary><br><b>
527527

528528
The data plane is the part of the network that actually forwards the data/packets.
529529
</b></details>
530530

531531
<details>
532-
<summary>What "management plane" refers to?</summary><br><b>
532+
<summary>What does "management plane" refer to?</summary><br><b>
533533

534-
Refers to monitoring and management functions.
534+
It refers to monitoring and management functions.
535535
</b></details>
536536

537537
<details>
538-
<summary>To which plane (data, control, ...) is creating routing tables belongs to?</summary><br><b>
538+
<summary>To which plane (data, control, ...) does creating routing tables belong to?</summary><br><b>
539539

540540
Control Plane.
541541
</b></details>
542542

543543
<details>
544-
<summary>Explain Spanning Tree Protocol (STP)</summary><br><b>
544+
<summary>Explain Spanning Tree Protocol (STP).</summary><br><b>
545545
</b></details>
546546

547547
<details>
@@ -557,19 +557,19 @@ Control Plane.
557557
</b></details>
558558

559559
<details>
560-
<summary>What is GRE? How does it works?</summary><br><b>
560+
<summary>What is GRE? How does it work?</summary><br><b>
561561
</b></details>
562562

563563
<details>
564-
<summary>What is VXLAN? How does it works?</summary><br><b>
564+
<summary>What is VXLAN? How does it work?</summary><br><b>
565565
</b></details>
566566

567567
<details>
568568
<summary>What is SNAT?</summary><br><b>
569569
</b></details>
570570

571571
<details>
572-
<summary>Explain OSPF</summary><br><b>
572+
<summary>Explain OSPF.</summary><br><b>
573573
</b></details>
574574

575575
<details>

0 commit comments

Comments
 (0)