From d2efb9e4417196f9a8895368049cbb1db65a3d31 Mon Sep 17 00:00:00 2001 From: Michael Cade Date: Mon, 30 May 2022 12:03:23 +0100 Subject: [PATCH] Day 23 - Grammar & Spelling --- Days/day23.md | 29 +++++++++++++---------------- 1 file changed, 13 insertions(+), 16 deletions(-) diff --git a/Days/day23.md b/Days/day23.md index 44fd50d5c..06670c739 100644 --- a/Days/day23.md +++ b/Days/day23.md @@ -21,13 +21,13 @@ Connects IP addresses to fixed physical machine addresses, also known as MAC add - FTP - File Transfer Protocol -Allows for the transfer of files from source to destination. Generally this process is authenticated but there is the ability if configured to use anonymous access. You will more frequently now see FTPS which provides SSL/TLS connectivity to FTP servers from the client for better security. This protocol would be found in the Application layer of the OSI Model. +Allows for the transfer of files from source to destination. Generally, this process is authenticated but there is the ability if configured to use anonymous access. You will more frequently now see FTPS which provides SSL/TLS connectivity to FTP servers from the client for better security. This protocol would be found in the Application layer of the OSI Model. ![](Images/Day23_Networking2.png) - SMTP - Simple Mail Transfer Protocol -Used for email transmission, mail servers use SMTP to send and recieve mail messages. You will still find even with Microsoft 365 that the SMTP protocol is used for the same purpose. +Used for email transmission, mail servers use SMTP to send and receive mail messages. You will still find even with Microsoft 365 that the SMTP protocol is used for the same purpose. ![](Images/Day23_Networking3.png) @@ -39,19 +39,19 @@ HTTP is the foundation of the internet and browsing content. Giving us the abili - SSL - Secure Sockets Layer | TLS - Transport Layer Security -TLS has taken over from SSL, TLS is a [Cryptographic Protocol]() that provides security communications over a network. It can and will be found in mail, im and other applications but most commonly it is used to secure HTTPS. +TLS has taken over from SSL, TLS is a [Cryptographic Protocol]() that provides secure communications over a network. It can and will be found in the mail, Instant Messaging and other applications but most commonly it is used to secure HTTPS. ![](Images/Day23_Networking5.png) - HTTPS - HTTP secured with SSL/TLS -An extension of HTTP, used for secure communications over a network, HTTPS is encrypted with TLS as mentioned above. The focus here was to bring authenticaion, privacy and integrity whilst data is exchanged between hosts. +An extension of HTTP, used for secure communications over a network, HTTPS is encrypted with TLS as mentioned above. The focus here was to bring authentication, privacy and integrity whilst data is exchanged between hosts. ![](Images/Day23_Networking6.png) - DNS - Domain Name System -The DNS is used to map human-freindly domain names for example we all know [google.com](https://google.com) but if you were to open a browser and put in [8.8.8.8](https://8.8.8.8) you would get Google as we pretty much know it. However good luck trying to remember all of the IP addresses for all of your websites where some of them we even use google to find information. +The DNS is used to map human-friendly domain names for example we all know [google.com](https://google.com) but if you were to open a browser and put in [8.8.8.8](https://8.8.8.8) you would get Google as we pretty much know it. However good luck trying to remember all of the IP addresses for all of your websites where some of them we even use google to find information. This is where DNS comes in, it ensures that hosts, services and other resources are reachable. @@ -72,15 +72,15 @@ There are 4 things that we need on every host for it to be able to achieve both We have covered IP address being a unique address for your host on the network it resides, we can think of this as our house number. -Subnet mask we will cover shortly, but you can think of this as post code or zip code. +Subnet mask we will cover shortly, but you can think of this as postcode or zip code. -Default gateway is the IP of our router generally on our network providing us with that Layer 3 connectivity. You could think of this as the single road that allows us out of our street. +A default gateway is the IP of our router generally on our network providing us with that Layer 3 connectivity. You could think of this as the single road that allows us out of our street. Then we have DNS as we just covered to help us convert complicated public IP addresses to more suitable and rememberable domain names. Maybe we can think of this as the giant sorting office to make sure we get the right post. As I said each host requires these 4 things, if you have 1000 or 10,000 hosts then that is going to take you a very long time to determine each one of these individually. This is where DHCP comes in and allows you to determine a scope for your network and then this protocol will distribute to all available hosts in your network. -Another example, you head into a coffee shop, grab a coffee and sit down with your laptop or your phone lets call that your host. You connect your host to the coffee shop wifi and you gain access to the internet, messages and mail start pinging through and you can navigate web pages and social media. When you connected to the coffee shop wifi your machine would have picked up a DHCP address either from a dedicated DHCP server or most likely from the router also handling DHCP. +Another example is you head into a coffee shop, grab a coffee and sit down with your laptop or your phone let's call that your host. You connect your host to the coffee shop wifi and you gain access to the internet, messages and mail start pinging through and you can navigate web pages and social media. When you connected to the coffee shop wifi your machine would have picked up a DHCP address either from a dedicated DHCP server or most likely from the router also handling DHCP. ![](Images/Day23_Networking8.png) @@ -90,17 +90,17 @@ A subnet is a logical subdivision of an IP network. Subnets break large networks into smaller, more manageable networks that run more efficiently. -Each subnet is a logical subdivision of the bigger network. Connected devices with enough subnet share common IP address identifier, enabling them to communicate with each other. +Each subnet is a logical subdivision of the bigger network. Connected devices with enough subnet share common IP address identifiers, enabling them to communicate with each other. Routers manage communication between subnets. The size of a subnet depends on the connectivity requirements and the network technology used. -An organisation is responsible for determining its number and size of the subnets within the limits of address space -available, and the details remain local to that organisation. Subnets can also be segmented into even smaller subnets for things like Point to Point links, or for sub networks supporting a few devices. +An organisation is responsible for determining the number and size of the subnets within the limits of address space +available, and the details remain local to that organisation. Subnets can also be segmented into even smaller subnets for things like Point to Point links, or subnetworks supporting a few devices. Among other advantages, segmenting large -networks into subnets enables IP address +networks into subnets enable IP address reallocation and relieves network congestion, streamlining, network communication and efficiency. Subnets can also improve network security. @@ -108,12 +108,9 @@ If a section of a network is compromised, it can be quarantined, making it diffi ![](Images/Day23_Networking9.png) - ## Resources - [Computer Networking full course](https://www.youtube.com/watch?v=IPvYjXCsTg8) - [Practical Networking](http://www.practicalnetworking.net/) -See you on [Day 24](day24.md) - - +See you on [Day 24](day24.md) \ No newline at end of file