25,99 €
The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content. * Serves as an ideal resource for gaining a solid understanding of fundamental networking concepts and skills * Offers a straightforward and direct approach to networking basics and covers network management tools, TCP/IP, the name resolution process, and network protocols and topologies * Reviews all the topics you need to know for taking the MTA 98-366 exam * Provides an overview of networking components, discusses connecting computers to a network, and looks at connecting networks with routers If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Networking Essentials is essential reading.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 521
Veröffentlichungsjahr: 2011
Table of Contents
Cover
Title Page
Copyright
Publisher's Note
Dedication
Acknowledgments
About the Author
Introduction
Who Should Read This Book
What Is Covered in This Book
Chapter 1: Introduction to Networking
Comparing Logical and Physical Networks
Networking Home Computers
Networking Small Offices and Home Offices
Networking Large Offices
Networking Enterprises
Understanding Standards Organizations
Chapter 2: Overview of Networking Components
Comparing Unicast, Broadcast, and Multicast Traffic
Understanding Network Hardware
Exploring Protocols and Services
Understanding Basic Topologies
Chapter 3: Understanding the OSI Model
Understanding the OSI Model
Understanding the TCP/IP Model
Mapping Devices on the OSI and TCP Models
Mapping Protocols on the OSI and TCP/IP Models
Chapter 4: Core TCP/IP Protocols
Understanding TCP and UDP
Exploring Common Protocols
Understanding Ports
Chapter 5: Exploring IPv4
Exploring the Components of an IPv4 Address
Exploring an IPv4 Address in Binary
Subnetting IPv4 Addresses
Comparing Manual and Automatic Assignment of IPv4 Addresses
Chapter 6: Exploring IPv6
Exploring IPv6 Addresses
Exploring the Components of an IPv6 Address
Understanding the Dual IP Stack
Comparing Manual and Automatic Assignment of IPv6
Chapter 7: Connecting Computers to a Network
Identifying Potential Problems with Connectivity
Exploring Cable Types and Their Characteristics
Chapter 8: Networking Computers with Switches
Connecting Multiple Computers
Understanding Physical Ports
Comparing Hubs and Switches
Comparing Managed and Unmanaged Switches
Exploring Switch Speeds
Understanding Security Options
Chapter 9: Connecting Networks with Routers
Connecting Multiple Networks
Routing Traffic on a Network
Identifying Transmission Speeds
Routing Software in Windows Server 2008
Understanding Other Routing Protocols
Chapter 10: Resolving Names to IP Addresses
Exploring Types of Names Used in Networks
Exploring Types of Name Resolution
Identifying the Steps in Name Resolution
Chapter 11: Understanding Network Security Zones
Understanding Risks on the Internet
Exploring an Intranet
Understanding Firewalls
Identifying a Perimeter Network
Understanding Extranets
Chapter 12: Understanding Wireless Networking
Exploring Basic Wireless Components
Comparing Networking Standards and Characteristics
Comparing Network Security Methods
Using Wireless Networks
Understanding Point-to-Point Wireless
Chapter 13: Understanding Internet Access Methods and Wide Area Networks
Comparing Connectivity Methods Used in Homes and SOHOs
Comparing Connectivity Methods in Enterprises
Exploring Remote Access Services
Using RADIUS
Chapter 14: Troubleshooting TCP/IP
Using the Command Prompt
Checking the TCP/IP Configuration with ipconfig
Troubleshooting Connectivity with ping
Identifying Routers with tracert
Verifying the Routed Path with pathping
Viewing TCP/IP Statistics with netstat
Installing Telnet
Appendix A: Answers to Review Questions
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Appendix B: Microsoft’s Certification Program
Certification Objectives Map
Index
Appendix C: Answers for Additional Exercises
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Glossary
Acquisitions Editor: Jeff Kellum
Development Editor: Tom Cirtin
Technical Editors: Bradley Mitchell and Naomi Alpern
Production Editor: Christine O’Connor
Copy Editor: Kim Wimpsett
Editorial Manager: Pete Gaughan
Production Manager: Tim Tate
Vice President and Executive Group Publisher: Richard Swadley
Vice President and Publisher: Neil Edde
Book Designer: Happenstance Type-O-Rama
Compositor: James D. Kramer, Happenstance Type-O-Rama
Proofreader: Publication Services, Inc.
Indexer: Robert Swanson
Project Coordinator, Cover: Katherine Crocker
Cover Designer: Ryan Sneed
Cover Image: © Andrew Holt / Getty Images
Copyright © 2011 by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-118-01685-5ISBN: 978-1-118-07716-0 (ebk.)ISBN: 978-1-118-07718-4 (ebk.)ISBN: 978-1-118-07717-7 (ebk.)
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Library of Congress Cataloging-in-Publication Data is available from the Publisher.
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. Microsoft and Windows are registered trademarks of Microsoft Corporation. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.
10 9 8 7 6 5 4 3 2 1
Dear Reader,
Thank you for choosing Microsoft Windows Networking Essentials. This book is part of a family of premium-quality Sybex books, all of which are written by outstanding authors who combine practical experience with a gift for teaching.
Sybex was founded in 1976. More than 30 years later, we’re still committed to producing consistently exceptional books. With each of our titles, we’re working hard to set a new standard for the industry. From the paper we print on, to the authors we work with, our goal is to bring you the best books available.
I hope you see all that reflected in these pages. I’d be very interested to hear your comments and get your feedback on how we’re doing. Feel free to let me know what you think about this or any other Sybex book by sending me an email at nedde@wiley.com. If you think you’ve found a technical error in this book, please visit http://sybex.custhelp.com. Customer feedback is critical to our efforts at Sybex.
Best regards,
Neil Edde
Vice President and Publisher
Sybex, an Imprint of Wiley
To my wife, who brings so much joyand happiness into my life.
Acknowledgments
Books are massive projects that succeed only with the cooperation and help of several people. My name is on the cover as the author, but many, many other people contributed to its success. First, I want to thank Jeff Kellum for thinking of me for this project—I love working with the Wiley team. I’m grateful for all the efforts of the technical editor, Bradley Mitchell, who provided some great feedback; I only wish there was more room in this book to implement all his suggestions. It was great to work with Tom Cirtin again, an excellent development editor who provided great editorial assistance and helped keep the book on track. I also want to thank my brother, a knowledgeable networking expert named Duane Gibson, who provided input on many of the chapters in this book. Last, thanks to Production Editor Christine O’Connor and Production Assistant Nicholas Moran, who helped make sure the final production looked as good as it does.
About the Author
Darril Gibson is the CEO of Security Consulting and Training, LLC. He has written, coauthored, and contributed to more than a dozen books, and he regularly consults and teaches on a wide variety of IT topics. Most of the books he’s been involved with are available on Amazon by searching for Darril Gibson. He has been a Microsoft Certified Trainer (MCT) since 1999 and holds a multitude of certifications including MCSE (NT 4.0, Windows 2000, and Windows 2003), MCITP (Windows 7, Windows Server 2008, and SQL Server), Security+, CISSP, and ITIL Foundations. Darril lives in Virginia Beach with his wife of more than 18 years and two dogs. Whenever possible, they escape to their cabin in the country with more than 20 acres of land where his dogs wear themselves out chasing rabbits and deer.
You can reach the author by writing to darril@mcitpsuccess.com.
Introduction
Computers are very common today, and just about any computer is connected to a network. People with the knowledge and expertise to configure and maintain networks are needed in any organization.
IT administration starts with network administration in most organizations. If the computers can’t communicate on the network, nothing else matters. Network administrators need to be able to quickly identify any communication problems and resolve them. Of course, to do this, administrators need to understand how the network works under normal conditions.
The Microsoft Technology Associate (MTA) certification is a new certification level. It includes three separate tracks: Information Technology (IT) Professional, Developer, and Database. The IT Professional track is for individuals pursuing work as administrators. The Developer track is for individuals pursuing work as programmers and software engineers. The Database track is for individuals pursuing work as database administrators and database developers.
The IT Professional series includes three certifications:
Networking Fundamentals This is the first certification in the MTA IT Professional track. It lays a solid foundation of basic networking knowledge needed for the other MTA certifications and also for the more advanced Microsoft Certified Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP) tracks. This book covers the objectives for exam 98-366. You earn this certification by taking and passing exam 98-366.
Security Fundamentals Security Fundamentals is the second certification in the MTA IT Professional track. It builds on the knowledge learned in the Networking Fundamentals certification and adds fundamental security knowledge needed by administrators. IT administrators in any environment need to be aware of the risks with IT systems. You earn this certification by taking and passing exam 98-367.
Windows Server Administration Fundamentals This certification builds on the knowledge gained in the Networking Fundamentals and Security Fundamentals certifications. It digs deeper into knowledge and skills needed by Windows Server administrators. You earn this certification by taking and passing exam 98-365.
Each of these certifications can serve as a stepping-stone to Microsoft’s next levels of certifications: Microsoft Certified Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP).
We have included an Appendix at the back of this book that highlights the Microsoft certification program, as well as lists the exam objectives for Exam 98-366, and how they map to this book’s content.
Who Should Read This Book
This book is for current or aspiring professionals seeking a quick grounding in the fundamentals of networking in a Microsoft environment. The goal is to provide quick, focused coverage of fundamental skills.
If you want to break into networking or are already working in networking and want to fill in some gaps on fundamental networking, this book is for you. You can use the knowledge gained from this book as a foundation for more advanced studies.
This book is focused on the objectives of the Microsoft Technology Associates (MTA) Networking Fundamentals certification. This is the first certification in the MTA IT Professional series. After mastering this material, you can move onto the Security Fundamentals and Windows Server Administration Fundamentals MTA certifications.
You can read more about the MTA certifications and MTA exam certification paths at www.microsoft.com/learning/en/us/certification/mta.aspx.
What You Will Learn
You will learn the essentials of networking in a Microsoft environment. In addition, this book covers all the objectives of the Microsoft Technology Associates Networking Fundamentals exam (exam 98-366).
What You Need
Since this book is focused on providing you with only the essentials, the biggest requirement is a desire to learn. You aren’t expected to have a lot of knowledge or experience in networking before starting the book. It starts with the basics in Chapter 1 and steadily builds on the knowledge through the end of the book.
Ideally, you’ll have some hardware that you can use. Since this is a Microsoft book, it would be good to have a system running Microsoft Windows Server 2008 or Windows Server 2008 R2.
If you’re running another operating system, such as Windows 7, you can create a virtual server running Windows Server 2008. I have included an optional lab for this book, which can be downloaded at: www.sybex.com/go/networkingessentials. It will lead you through the following steps:
Configuring Windows 7 with virtualizationLocating and downloading an evaluation copy of Windows Server 2008Installing Windows Server 2008Promoting it to a domain controllerYou can then use this virtual lab environment to experiment with Windows Server 2008 while going through the book.
What Is Covered in This Book
Microsoft Windows Networking Essentials is organized to provide you with the knowledge needed to master the basics of networking in a Microsoft environment.
Chapter 1, “Introduction to Networking” Identifies the names of many of the physical and logical components of a network and then introduces the networking components included in networks of all sizes.
Chapter 2, “Overview of Networking Components” Presents a big-picture view of networking components and how they work together. The chapter starts by explaining basic transmission methods used within networks such as unicast, broadcast, and multicast, and then it introduces basic hardware components used in networks.
Chapter 3, “Understanding the OSI Model” Presents the Open Systems Interconnect (OSI) and TCP/IP models commonly referenced by many IT professionals. You’ll learn the layers of these models, what occurs at each layer, what networking hardware is used on which layer, and which protocols operate on different layers.
Chapter 4, “Core TCP/IP Protocols” Presents many of the protocols contained in the TCP/IP protocol suite. You’ll learn about key protocols such as TCP and UDP and also how systems use well-known ports to identify a protocol.
Chapter 5, “Exploring IPv4” Identifies the different components of IPv4 addresses. Once you understand the components of the addresses, it becomes much easier to troubleshoot basic problems. You’ll also learn how the Dynamic Host Configuration Protocol (DHCP) automatically assigns IP addresses and other TCP/IP configuration information.
Chapter 6, “Exploring IPv6” Explains why IPv6 is needed, compares the differences between IPv4 and IPv6, and provides information on how IPv4 and IPv6 coexist.
Chapter 7, “Connecting Computers to a Network” Presents the different types of media used to connect computers and some of the common problems that can interfere with the transmission of data.
Chapter 8, “Networking Computers with Switches” Compares hubs and switches, managed and unmanaged switches, and layer 2 and layer 3 switches. You’ll also learn how a switch is used to create a virtual LAN.
Chapter 9, “Connecting Networks with Routers” Explains the use of routers in a network. The chapter includes information on routing tables and how routing tables are updated.
Chapter 10, “Resolving Names to IP Addresses” Presents the two types of computer names—host names and NetBIOS names—and how these names are resolved to IP addresses. Name resolution methods included in this chapter are the Domain Name System (DNS), the Windows Internet Naming System (WINS), the hosts file, the lmhosts file, and cache.
Chapter 11, “Understanding Network Security Zones” Presents the different areas of a network as security zones. Varying levels of security are required in different zones. The Internet is the riskiest zone. Internal networks, or intranets, are the safest. Between these two, you can create perimeter networks as a buffer zone.
Chapter 12, “Understanding Wireless Networking” Covers the common protocols used for wireless networks in the IEEE 802.11 family. You’ll also learn about the different methods you can use to secure wireless networks.
Chapter 13, “Understanding Internet Access Methods and Wide Area Networks” Covers the different types of methods used for Internet access. You’ll also learn how enterprises use wide area networks (WANs) to connect remote offices.
Chapter 14, “Troubleshooting TCP/IP” Shows you how to use several different tools to check and verify basic connectivity issues. Tools include ipconfig, ping, tracert, pathping, and netstat.
Appendix A, “Answers to Review Questions” Includes all of the answers to the review questions found in "The Essentials and Beyond" section at the end of every chapter.
Appendix B, “Microsoft’s Certification Program” Maps the objectives in the MTA Networking Essentials exam (exam 98-366) to each specific chapter where the objective is covered.
In addition, we have created an online Glossary, as well as the suggested or recommended answers to the additional exercises we have included at end of each chapter. You can download these at www.sybex.com/go/networkingessentials.
Sybex strives to keep you supplied with the latest tools and information you need for your work. Please check its website at www.sybex.com/go/networkingessentials, where we’ll post additional content and updates that supplement this book if the need arises. Enter networking essentials in the Search box (or type the book’s ISBN—978-1-118-01685-5), and click Go to get to the book’s update page.
Chapter 1
Introduction to Networking
Just about any computer you’ll use today is on a network. Networked computers are so common it’s easy to take them for granted. However, many components and technologies are working together behind the scenes to ensure a networked computer can access resources on the network.
In this chapter, I start by identifying the names of many of the physical and logical components of a network. I then introduce the components included in very small networks and show you how additional components are added as a network grows. I conclude with information on some standards organizations that help ensure all of these computers can work together no matter who manufactured them or where they’re operating.
Comparing logical and physical networksNetworking home computersNetworking small offices and home officesNetworking large officesNetworking enterprisesUnderstanding standards organizationsComparing Logical and Physical Networks
A network is a group of computers and other devices connected together. These connections can be with cables, wireless connections, or both. Networks are discussed in both logical and physical terms.
The logical organization of a network identifies the overall design of a network. It differentiates between local area networks (LANs) and wide area networks (WANs). The logical design of the network provides a high-level overview of the entire network and may not show smaller components such as all the switches, routers, and firewalls. By contrast, the physical network infrastructure includes the details of the physical components. The physical components are the devices and cabling that you can touch and feel.
This chapter presents concepts on logical network organization. You’ll learn about the different types of network designs that you may find in home networks, small offices, larger offices or organizations, and enterprises.
Chapter 2 provides an overview of these physical components, and later chapters in the book (such as Chapters 7, 8, and 9) dig deeper into how these devices work.
It’s important to understand how devices in a logical structure work to fully understand how data moves through a network. Once you understand how the data moves through the network, you are better prepared to maintain it and troubleshoot it when problems occur.
Networking Home Computers
Most home computers are part of a network today. At the very least, home computers have the ability to connect to the Internet, which is a massive network of networks. Figure 1-1 shows a simple networked home computer.
Figure 1-1: Home computer with access to Internet
In the figure, the computer has access to the Internet through a modem to an Internet service provider (ISP). This could be a cable modem used in a broadband connection or a modem used for dial-up connections. Broadband connections are widely available in urban areas. This includes connections through cable TV systems, fiber-optic lines, and even phone connections such as ISDN and 3G/4G data services.
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Tausende von E-Books und Hörbücher
Ihre Zahl wächst ständig und Sie haben eine Fixpreisgarantie.
Sie haben über uns geschrieben: