Microsoft Windows Networking Essentials - Darril Gibson - E-Book

Microsoft Windows Networking Essentials E-Book

Darril Gibson

0,0
25,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content. * Serves as an ideal resource for gaining a solid understanding of fundamental networking concepts and skills * Offers a straightforward and direct approach to networking basics and covers network management tools, TCP/IP, the name resolution process, and network protocols and topologies * Reviews all the topics you need to know for taking the MTA 98-366 exam * Provides an overview of networking components, discusses connecting computers to a network, and looks at connecting networks with routers If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Networking Essentials is essential reading.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 521

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Title Page

Copyright

Publisher's Note

Dedication

Acknowledgments

About the Author

Introduction

Who Should Read This Book

What Is Covered in This Book

Chapter 1: Introduction to Networking

Comparing Logical and Physical Networks

Networking Home Computers

Networking Small Offices and Home Offices

Networking Large Offices

Networking Enterprises

Understanding Standards Organizations

Chapter 2: Overview of Networking Components

Comparing Unicast, Broadcast, and Multicast Traffic

Understanding Network Hardware

Exploring Protocols and Services

Understanding Basic Topologies

Chapter 3: Understanding the OSI Model

Understanding the OSI Model

Understanding the TCP/IP Model

Mapping Devices on the OSI and TCP Models

Mapping Protocols on the OSI and TCP/IP Models

Chapter 4: Core TCP/IP Protocols

Understanding TCP and UDP

Exploring Common Protocols

Understanding Ports

Chapter 5: Exploring IPv4

Exploring the Components of an IPv4 Address

Exploring an IPv4 Address in Binary

Subnetting IPv4 Addresses

Comparing Manual and Automatic Assignment of IPv4 Addresses

Chapter 6: Exploring IPv6

Exploring IPv6 Addresses

Exploring the Components of an IPv6 Address

Understanding the Dual IP Stack

Comparing Manual and Automatic Assignment of IPv6

Chapter 7: Connecting Computers to a Network

Identifying Potential Problems with Connectivity

Exploring Cable Types and Their Characteristics

Chapter 8: Networking Computers with Switches

Connecting Multiple Computers

Understanding Physical Ports

Comparing Hubs and Switches

Comparing Managed and Unmanaged Switches

Exploring Switch Speeds

Understanding Security Options

Chapter 9: Connecting Networks with Routers

Connecting Multiple Networks

Routing Traffic on a Network

Identifying Transmission Speeds

Routing Software in Windows Server 2008

Understanding Other Routing Protocols

Chapter 10: Resolving Names to IP Addresses

Exploring Types of Names Used in Networks

Exploring Types of Name Resolution

Identifying the Steps in Name Resolution

Chapter 11: Understanding Network Security Zones

Understanding Risks on the Internet

Exploring an Intranet

Understanding Firewalls

Identifying a Perimeter Network

Understanding Extranets

Chapter 12: Understanding Wireless Networking

Exploring Basic Wireless Components

Comparing Networking Standards and Characteristics

Comparing Network Security Methods

Using Wireless Networks

Understanding Point-to-Point Wireless

Chapter 13: Understanding Internet Access Methods and Wide Area Networks

Comparing Connectivity Methods Used in Homes and SOHOs

Comparing Connectivity Methods in Enterprises

Exploring Remote Access Services

Using RADIUS

Chapter 14: Troubleshooting TCP/IP

Using the Command Prompt

Checking the TCP/IP Configuration with ipconfig

Troubleshooting Connectivity with ping

Identifying Routers with tracert

Verifying the Routed Path with pathping

Viewing TCP/IP Statistics with netstat

Installing Telnet

Appendix A: Answers to Review Questions

Chapter 1

Chapter 2

Chapter 3

Chapter 4

Chapter 5

Chapter 6

Chapter 7

Chapter 8

Chapter 9

Chapter 10

Chapter 11

Chapter 12

Chapter 13

Chapter 14

Appendix B: Microsoft’s Certification Program

Certification Objectives Map

Index

Appendix C: Answers for Additional Exercises

Chapter 1

Chapter 2

Chapter 3

Chapter 4

Chapter 5

Chapter 6

Chapter 7

Chapter 8

Chapter 9

Chapter 10

Chapter 11

Chapter 12

Chapter 13

Chapter 14

Glossary

Acquisitions Editor: Jeff Kellum

Development Editor: Tom Cirtin

Technical Editors: Bradley Mitchell and Naomi Alpern

Production Editor: Christine O’Connor

Copy Editor: Kim Wimpsett

Editorial Manager: Pete Gaughan

Production Manager: Tim Tate

Vice President and Executive Group Publisher: Richard Swadley

Vice President and Publisher: Neil Edde

Book Designer: Happenstance Type-O-Rama

Compositor: James D. Kramer, Happenstance Type-O-Rama

Proofreader: Publication Services, Inc.

Indexer: Robert Swanson

Project Coordinator, Cover: Katherine Crocker

Cover Designer: Ryan Sneed

Cover Image: © Andrew Holt / Getty Images

Copyright © 2011 by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN: 978-1-118-01685-5ISBN: 978-1-118-07716-0 (ebk.)ISBN: 978-1-118-07718-4 (ebk.)ISBN: 978-1-118-07717-7 (ebk.)

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Library of Congress Cataloging-in-Publication Data is available from the Publisher.

TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. Microsoft and Windows are registered trademarks of Microsoft Corporation. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.

10 9 8 7 6 5 4 3 2 1

Dear Reader,

Thank you for choosing Microsoft Windows Networking Essentials. This book is part of a family of premium-quality Sybex books, all of which are written by outstanding authors who combine practical experience with a gift for teaching.

Sybex was founded in 1976. More than 30 years later, we’re still committed to producing consistently exceptional books. With each of our titles, we’re working hard to set a new standard for the industry. From the paper we print on, to the authors we work with, our goal is to bring you the best books available.

I hope you see all that reflected in these pages. I’d be very interested to hear your comments and get your feedback on how we’re doing. Feel free to let me know what you think about this or any other Sybex book by sending me an email at [email protected]. If you think you’ve found a technical error in this book, please visit http://sybex.custhelp.com. Customer feedback is critical to our efforts at Sybex.

Best regards,

Neil Edde

Vice President and Publisher

Sybex, an Imprint of Wiley

To my wife, who brings so much joyand happiness into my life.

Acknowledgments

Books are massive projects that succeed only with the cooperation and help of several people. My name is on the cover as the author, but many, many other people contributed to its success. First, I want to thank Jeff Kellum for thinking of me for this project—I love working with the Wiley team. I’m grateful for all the efforts of the technical editor, Bradley Mitchell, who provided some great feedback; I only wish there was more room in this book to implement all his suggestions. It was great to work with Tom Cirtin again, an excellent development editor who provided great editorial assistance and helped keep the book on track. I also want to thank my brother, a knowledgeable networking expert named Duane Gibson, who provided input on many of the chapters in this book. Last, thanks to Production Editor Christine O’Connor and Production Assistant Nicholas Moran, who helped make sure the final production looked as good as it does.

About the Author

Darril Gibson is the CEO of Security Consulting and Training, LLC. He has written, coauthored, and contributed to more than a dozen books, and he regularly consults and teaches on a wide variety of IT topics. Most of the books he’s been involved with are available on Amazon by searching for Darril Gibson. He has been a Microsoft Certified Trainer (MCT) since 1999 and holds a multitude of certifications including MCSE (NT 4.0, Windows 2000, and Windows 2003), MCITP (Windows 7, Windows Server 2008, and SQL Server), Security+, CISSP, and ITIL Foundations. Darril lives in Virginia Beach with his wife of more than 18 years and two dogs. Whenever possible, they escape to their cabin in the country with more than 20 acres of land where his dogs wear themselves out chasing rabbits and deer.

You can reach the author by writing to [email protected].

Introduction

Computers are very common today, and just about any computer is connected to a network. People with the knowledge and expertise to configure and maintain networks are needed in any organization.

IT administration starts with network administration in most organizations. If the computers can’t communicate on the network, nothing else matters. Network administrators need to be able to quickly identify any communication problems and resolve them. Of course, to do this, administrators need to understand how the network works under normal conditions.

The Microsoft Technology Associate (MTA) certification is a new certification level. It includes three separate tracks: Information Technology (IT) Professional, Developer, and Database. The IT Professional track is for individuals pursuing work as administrators. The Developer track is for individuals pursuing work as programmers and software engineers. The Database track is for individuals pursuing work as database administrators and database developers.

The IT Professional series includes three certifications:

Networking Fundamentals This is the first certification in the MTA IT Professional track. It lays a solid foundation of basic networking knowledge needed for the other MTA certifications and also for the more advanced Microsoft Certified Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP) tracks. This book covers the objectives for exam 98-366. You earn this certification by taking and passing exam 98-366.

Security Fundamentals Security Fundamentals is the second certification in the MTA IT Professional track. It builds on the knowledge learned in the Networking Fundamentals certification and adds fundamental security knowledge needed by administrators. IT administrators in any environment need to be aware of the risks with IT systems. You earn this certification by taking and passing exam 98-367.

Windows Server Administration Fundamentals This certification builds on the knowledge gained in the Networking Fundamentals and Security Fundamentals certifications. It digs deeper into knowledge and skills needed by Windows Server administrators. You earn this certification by taking and passing exam 98-365.

Each of these certifications can serve as a stepping-stone to Microsoft’s next levels of certifications: Microsoft Certified Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP).

We have included an Appendix at the back of this book that highlights the Microsoft certification program, as well as lists the exam objectives for Exam 98-366, and how they map to this book’s content.

Who Should Read This Book

This book is for current or aspiring professionals seeking a quick grounding in the fundamentals of networking in a Microsoft environment. The goal is to provide quick, focused coverage of fundamental skills.

If you want to break into networking or are already working in networking and want to fill in some gaps on fundamental networking, this book is for you. You can use the knowledge gained from this book as a foundation for more advanced studies.

This book is focused on the objectives of the Microsoft Technology Associates (MTA) Networking Fundamentals certification. This is the first certification in the MTA IT Professional series. After mastering this material, you can move onto the Security Fundamentals and Windows Server Administration Fundamentals MTA certifications.

You can read more about the MTA certifications and MTA exam certification paths at www.microsoft.com/learning/en/us/certification/mta.aspx.

What You Will Learn

You will learn the essentials of networking in a Microsoft environment. In addition, this book covers all the objectives of the Microsoft Technology Associates Networking Fundamentals exam (exam 98-366).

What You Need

Since this book is focused on providing you with only the essentials, the biggest requirement is a desire to learn. You aren’t expected to have a lot of knowledge or experience in networking before starting the book. It starts with the basics in Chapter 1 and steadily builds on the knowledge through the end of the book.

Ideally, you’ll have some hardware that you can use. Since this is a Microsoft book, it would be good to have a system running Microsoft Windows Server 2008 or Windows Server 2008 R2.

If you’re running another operating system, such as Windows 7, you can create a virtual server running Windows Server 2008. I have included an optional lab for this book, which can be downloaded at: www.sybex.com/go/networkingessentials. It will lead you through the following steps:

Configuring Windows 7 with virtualizationLocating and downloading an evaluation copy of Windows Server 2008Installing Windows Server 2008Promoting it to a domain controller

You can then use this virtual lab environment to experiment with Windows Server 2008 while going through the book.

What Is Covered in This Book

Microsoft Windows Networking Essentials is organized to provide you with the knowledge needed to master the basics of networking in a Microsoft environment.

Chapter 1, “Introduction to Networking” Identifies the names of many of the physical and logical components of a network and then introduces the networking components included in networks of all sizes.

Chapter 2, “Overview of Networking Components” Presents a big-picture view of networking components and how they work together. The chapter starts by explaining basic transmission methods used within networks such as unicast, broadcast, and multicast, and then it introduces basic hardware components used in networks.

Chapter 3, “Understanding the OSI Model” Presents the Open Systems Interconnect (OSI) and TCP/IP models commonly referenced by many IT professionals. You’ll learn the layers of these models, what occurs at each layer, what networking hardware is used on which layer, and which protocols operate on different layers.

Chapter 4, “Core TCP/IP Protocols” Presents many of the protocols contained in the TCP/IP protocol suite. You’ll learn about key protocols such as TCP and UDP and also how systems use well-known ports to identify a protocol.

Chapter 5, “Exploring IPv4” Identifies the different components of IPv4 addresses. Once you understand the components of the addresses, it becomes much easier to troubleshoot basic problems. You’ll also learn how the Dynamic Host Configuration Protocol (DHCP) automatically assigns IP addresses and other TCP/IP configuration information.

Chapter 6, “Exploring IPv6” Explains why IPv6 is needed, compares the differences between IPv4 and IPv6, and provides information on how IPv4 and IPv6 coexist.

Chapter 7, “Connecting Computers to a Network” Presents the different types of media used to connect computers and some of the common problems that can interfere with the transmission of data.

Chapter 8, “Networking Computers with Switches” Compares hubs and switches, managed and unmanaged switches, and layer 2 and layer 3 switches. You’ll also learn how a switch is used to create a virtual LAN.

Chapter 9, “Connecting Networks with Routers” Explains the use of routers in a network. The chapter includes information on routing tables and how routing tables are updated.

Chapter 10, “Resolving Names to IP Addresses” Presents the two types of computer names—host names and NetBIOS names—and how these names are resolved to IP addresses. Name resolution methods included in this chapter are the Domain Name System (DNS), the Windows Internet Naming System (WINS), the hosts file, the lmhosts file, and cache.

Chapter 11, “Understanding Network Security Zones” Presents the different areas of a network as security zones. Varying levels of security are required in different zones. The Internet is the riskiest zone. Internal networks, or intranets, are the safest. Between these two, you can create perimeter networks as a buffer zone.

Chapter 12, “Understanding Wireless Networking” Covers the common protocols used for wireless networks in the IEEE 802.11 family. You’ll also learn about the different methods you can use to secure wireless networks.

Chapter 13, “Understanding Internet Access Methods and Wide Area Networks” Covers the different types of methods used for Internet access. You’ll also learn how enterprises use wide area networks (WANs) to connect remote offices.

Chapter 14, “Troubleshooting TCP/IP” Shows you how to use several different tools to check and verify basic connectivity issues. Tools include ipconfig, ping, tracert, pathping, and netstat.

Appendix A, “Answers to Review Questions” Includes all of the answers to the review questions found in "The Essentials and Beyond" section at the end of every chapter.

Appendix B, “Microsoft’s Certification Program” Maps the objectives in the MTA Networking Essentials exam (exam 98-366) to each specific chapter where the objective is covered.

In addition, we have created an online Glossary, as well as the suggested or recommended answers to the additional exercises we have included at end of each chapter. You can download these at www.sybex.com/go/networkingessentials.

Sybex strives to keep you supplied with the latest tools and information you need for your work. Please check its website at www.sybex.com/go/networkingessentials, where we’ll post additional content and updates that supplement this book if the need arises. Enter networking essentials in the Search box (or type the book’s ISBN—978-1-118-01685-5), and click Go to get to the book’s update page.

Chapter 1

Introduction to Networking

Just about any computer you’ll use today is on a network. Networked computers are so common it’s easy to take them for granted. However, many components and technologies are working together behind the scenes to ensure a networked computer can access resources on the network.

In this chapter, I start by identifying the names of many of the physical and logical components of a network. I then introduce the components included in very small networks and show you how additional components are added as a network grows. I conclude with information on some standards organizations that help ensure all of these computers can work together no matter who manufactured them or where they’re operating.

Comparing logical and physical networksNetworking home computersNetworking small offices and home officesNetworking large officesNetworking enterprisesUnderstanding standards organizations

Comparing Logical and Physical Networks

A network is a group of computers and other devices connected together. These connections can be with cables, wireless connections, or both. Networks are discussed in both logical and physical terms.

The logical organization of a network identifies the overall design of a network. It differentiates between local area networks (LANs) and wide area networks (WANs). The logical design of the network provides a high-level overview of the entire network and may not show smaller components such as all the switches, routers, and firewalls. By contrast, the physical network infrastructure includes the details of the physical components. The physical components are the devices and cabling that you can touch and feel.

This chapter presents concepts on logical network organization. You’ll learn about the different types of network designs that you may find in home networks, small offices, larger offices or organizations, and enterprises.

Chapter 2 provides an overview of these physical components, and later chapters in the book (such as Chapters 7, 8, and 9) dig deeper into how these devices work.

It’s important to understand how devices in a logical structure work to fully understand how data moves through a network. Once you understand how the data moves through the network, you are better prepared to maintain it and troubleshoot it when problems occur.

Networking Home Computers

Most home computers are part of a network today. At the very least, home computers have the ability to connect to the Internet, which is a massive network of networks. Figure 1-1 shows a simple networked home computer.

Figure 1-1: Home computer with access to Internet

In the figure, the computer has access to the Internet through a modem to an Internet service provider (ISP). This could be a cable modem used in a broadband connection or a modem used for dial-up connections. Broadband connections are widely available in urban areas. This includes connections through cable TV systems, fiber-optic lines, and even phone connections such as ISDN and 3G/4G data services.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!