Atjaunināt sīkdatņu piekrišanu

E-grāmata: Microsoft Windows Networking Essentials

3.62/5 (157 ratings by Goodreads)
  • Formāts: PDF+DRM
  • Izdošanas datums: 31-Mar-2011
  • Izdevniecība: Sybex Inc.,U.S.
  • Valoda: eng
  • ISBN-13: 9781118077160
  • Formāts - PDF+DRM
  • Cena: 29,11 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 31-Mar-2011
  • Izdevniecība: Sybex Inc.,U.S.
  • Valoda: eng
  • ISBN-13: 9781118077160

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.





Serves as an ideal resource for gaining a solid understanding of fundamental networking concepts and skills Offers a straightforward and direct approach to networking basics and covers network management tools, TCP/IP, the name resolution process, and network protocols and topologies Reviews all the topics you need to know for taking the MTA 98-366 exam Provides an overview of networking components, discusses connecting computers to a network, and looks at connecting networks with routers

If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Networking Essentials is essential reading.
Introduction xix
Chapter 1 Introduction to Networking
1(20)
Comparing Logical and Physical Networks
1(1)
Networking Home Computers
2(2)
Networking Small Offices and Home Offices
4(6)
Understanding Local Area Networks
6(1)
Comparing Workgroups and Domains
7(2)
Exploring the Benefits of Domains and Domain Controllers
9(1)
Networking Large Offices
10(2)
Networking Enterprises
12(3)
Understanding Wide Area Networks
12(1)
Understanding Branch Offices
13(1)
Accessing Networks Remotely
14(1)
Understanding Standards Organizations
15(3)
Understanding the Internet Engineering Task Force
16(1)
Understanding the World Wide Web Consortium
17(1)
Understanding the Institute of Electrical and Electronics Engineers
18(1)
Understanding the International Telecommunication Union
18(1)
The Essentials and Beyond
18(3)
Chapter 2 Overview of Networking Components
21(20)
Comparing Unicast, Broadcast, and Multicast Traffic
21(5)
Understanding Unicast Traffic
22(1)
Understanding Broadcast Traffic
23(2)
Understanding Multicast Traffic
25(1)
Understanding Network Hardware
26(10)
Understanding Hubs
27(1)
Understanding Switches
28(1)
Understanding Bridges
29(1)
Understanding Routers
30(2)
Understanding Firewalls
32(2)
Understanding Media
34(2)
Exploring Protocols and Services
36(2)
Exploring Protocols
36(1)
Understanding Services
37(1)
Understanding Basic Topologies
38(1)
The Essentials and Beyond
39(2)
Chapter 3 Understanding the OSI Model
41(22)
Understanding the OSI Model
41(14)
Application Layer
43(1)
Presentation Layer
44(1)
Session Layer
45(1)
Transport Layer
46(2)
Network Layer
48(1)
Data Link Layer
49(3)
Physical Layer
52(1)
Putting It Together
52(1)
Packets and Frames
53(2)
Understanding the TCP/IP Model
55(1)
Mapping Devices on the OSI and TCP Models
56(4)
Physical Layer
58(1)
Data Link Layer
59(1)
Network Layer
59(1)
Application Layer
60(1)
Mapping Protocols on the OSI and TCP/IP Models
60(1)
The Essentials and Beyond
61(2)
Chapter 4 Core TCP/IP Protocols
63(22)
Understanding TCP and UDP
63(4)
Exploring TCP
64(2)
Exploring UDP
66(1)
Exploring Common Protocols
67(12)
Address Resolution Protocol
67(1)
Hypertext Transfer Protocol
68(1)
File Transfer Protocol
69(2)
Trivial File Transfer Protocol
71(1)
Telnet
71(1)
Remote Desktop Services
71(1)
Secure Sockets Layer
72(1)
Transport Layer Security
72(1)
Secure Shell
73(1)
Internet Protocol Security
74(1)
Simple Mail Transfer Protocol
74(1)
Post Office Protocol v3
75(1)
Internet Message Access Protocol
75(1)
Lightweight Directory Access Protocol
76(1)
Kerberos
77(1)
Point-to-point Tunneling Protocol
77(1)
Layer 2 Tunneling Protocol
77(1)
Simple Network Management Protocol
78(1)
Internet Group Multicast Protocol
78(1)
Internet Control Message Protocol
78(1)
Understanding Ports
79(4)
Controlling Port Traffic with a Firewall
81(1)
Mapping Internally Used Ports and Protocols
81(2)
The Essentials and Beyond
83(2)
Chapter 5 Exploring IPv4
85(32)
Exploring the Components of an IPv4 Address
85(10)
Ascertaining the Network ID and Host ID of an IP Address
86(4)
Identifying the Default Gateway
90(1)
Determining Local and Remote Addresses
91(1)
Understanding Classful IP Addresses
92(2)
Identifying Reserved IP Address Ranges
94(1)
Exploring an IPv4 Address in Binary
95(5)
Understanding the Bits of an IP Address
95(3)
Understanding CIDR Notation
98(1)
Masking the IP Address
98(2)
Using Classless IP Addresses
100(1)
Subnetting IPv4 Addresses
100(10)
Determining the Number of Subnet Bits
101(2)
Determining the Number of Hosts in a Network
103(2)
Identifying Local and Remote Addresses
105(2)
Applying Subnetting Knowledge
107(3)
Comparing Manual and Automatic Assignment of IPv4 Addresses
110(3)
Manually Configuring IPv4
110(1)
Using DHCP
110(2)
Understanding APIPA
112(1)
The Essentials and Beyond
113(4)
Chapter 6 Exploring IPv6
117(16)
Exploring IPv6 Addresses
117(6)
Comparing IPv4 Classes and IPv6 Prefixes
118(1)
Understanding Hexadecimal
119(1)
Displaying IPv6 Addresses
120(1)
Comparing IPv6 Transmission Types
121(1)
Understanding the Need for IPv6
122(1)
Understanding Neighbor Discovery
122(1)
Exploring the Components of an IPv6 Address
123(4)
Understanding Global Unicast Addresses
124(1)
Understanding Link-Local Addresses
125(1)
Understanding Unique Local Addresses
126(1)
Understanding the Dual IP Stack
127(2)
Using IPv4-Mapped IPv6 Addresses
127(1)
Understanding IPv4 to IPv6 Tunneling Protocols
128(1)
Comparing Manual and Automatic Assignment of IPv6
129(2)
Manually Configuring IPv6
129(1)
Using DHCPv6
130(1)
The Essentials and Beyond
131(2)
Chapter 7 Connecting Computers to a Network
133(20)
Identifying Potential Problems with Connectivity
133(11)
Understanding EMI
134(1)
Understanding RFI
134(1)
Avoiding Power Spikes
134(3)
Avoiding Interception
137(5)
Preventing Fire Hazards
142(1)
Understanding Cross Talk
142(2)
Exploring Cable Types and Their Characteristics
144(6)
Understanding Twisted Pair
144(2)
Comparing Unshielded and Shielded Twisted Pair
146(1)
Comparing Straight-Through and Crossover Cables
146(1)
Understanding Fiber Optic
147(2)
Understanding Wireless
149(1)
The Essentials and Beyond
150(3)
Chapter 8 Networking Computers with Switches
153(22)
Connecting Multiple Computers
153(3)
Understanding Physical Ports
156(2)
Identifying the Number and Type of Ports
156(1)
Identifying Ports in Drawings
157(1)
Comparing Hubs and Switches
158(4)
Understanding Collision Domains
159(1)
Identifying a Collision Domain with a Hub
159(1)
Identifying Collision Domains with a Switch
160(1)
Mapping Ports to MAC Addresses
161(1)
Comparing Managed and Unmanaged Switches
162(5)
Understanding Unmanaged Switches
163(1)
Understanding Managed Switches
163(1)
Comparing Layer 2 and Layer 3 Switches
164(1)
Using a Managed Switch to Create a VLAN
164(3)
Exploring Switch Speeds
167(3)
Identifying Transmission Speeds
168(1)
Understanding the Uplink Port
169(1)
Identifying Backplane Speed
170(1)
Understanding Security Options
170(2)
Understanding Port Security
171(1)
Planning Hardware Redundancy
171(1)
The Essentials and Beyond
172(3)
Chapter 9 Connecting Networks with Routers
175(22)
Connecting Multiple Networks
175(5)
Comparing Hardware Routers and Software Routers
177(1)
Understanding Default Routes
177(2)
Understanding Directly Connected Routes
179(1)
Routing Traffic on a Network
180(7)
Creating Static Routes
180(2)
Configuring Dynamic Routing
182(3)
Understanding the Routing Table
185(2)
Identifying Transmission Speeds
187(1)
Routing Software in Windows Server 2008
188(4)
Adding Routing Services to Windows Server 2008
188(2)
Configuring a Router on Windows Server 2008
190(2)
Understanding Other Routing Protocols
192(3)
Using a DHCP Relay Agent
193(1)
Using an IGMP Router and Proxy
194(1)
Using NAT
195(1)
The Essentials and Beyond
195(2)
Chapter 10 Resolving Names to IP Addresses
197(22)
Exploring Types of Names Used in Networks
197(7)
Understanding Host Names
199(1)
Understanding NetBIOS Names
199(3)
Creating NetBIOS Names from Host Names
202(1)
Viewing and Modifying a Computer Name
203(1)
Exploring Types of Name Resolution
204(11)
Understanding Domain Naming Service
205(5)
Viewing the Host Cache
210(1)
Viewing the Hosts File
211(1)
Understanding WINS
212(1)
Viewing the NetBIOS Cache
213(1)
Understanding the Lmhosts File
214(1)
Understanding Broadcast Name Resolution
214(1)
Understanding Link-Local Multicast Name Resolution
214(1)
Identifying the Steps in Name Resolution
215(2)
Identifying Steps in Host Name Resolution
215(1)
Identifying Steps in NetBIOS Name Resolution
216(1)
The Essentials and Beyond
217(2)
Chapter 11 Understanding Network Security Zones
219(20)
Understanding Risks on the Internet
219(2)
Exploring an Intranet
221(6)
Understanding Network Address Translation
222(2)
Understanding Proxy Servers
224(3)
Understanding Firewalls
227(5)
Exploring the Windows Server 2008 Firewall
229(3)
Identifying a Perimeter Network
232(3)
Understanding a Reverse Proxy Server
233(1)
Understanding Guest Networks
234(1)
Understanding Extranets
235(1)
The Essentials and Beyond
236(3)
Chapter 12 Understanding Wireless Networking
239(24)
Exploring Basic Wireless Components
239(4)
Using Wireless Access Points
240(1)
Naming the Wireless Network
241(2)
Comparing CSMA/CD and CSMA/CA
243(1)
Comparing Networking Standards and Characteristics
243(5)
Comparing FHSS, DSSS, and OFDM
244(1)
IEEE 802.11
245(1)
IEEE 802.11a
246(1)
IEEE 802.11b
247(1)
IEEE 802.11g
247(1)
IEEE 802.11n
248(1)
Comparing Network Security Methods
248(6)
Wired Equivalent Privacy
249(2)
Wi-Fi Protected Access
251(1)
WPA2
252(1)
Using an IEEE 802.1x Authentication Server
253(1)
Using Wireless Networks
254(5)
Home Wireless Networks
255(3)
Wireless Networks in a Business
258(1)
Understanding Point-to-Point Wireless
259(2)
The Essentials and Beyond
261(2)
Chapter 13 Understanding Internet Access Methods and Wide Area Networks
263(20)
Comparing Connectivity Methods Used in Homes and SOHOs
263(6)
Using a Dial-up Connection
264(1)
Connecting with DSL
265(1)
Employing Broadband Cable
266(1)
Connecting via Satellite
267(2)
Comparing Connectivity Methods in Enterprises
269(4)
Exploring Digital Signal Lines
271(1)
Using ISDN
271(1)
Using T1/T3 Lines and E1/E3 Lines
272(1)
Ethernet WAN
273(1)
Exploring Remote Access Services
273(6)
Connecting to RAS via Dial-up
274(2)
Connecting to RAS via a VPN
276(2)
Comparing Client VPNs with Gateway VPNs
278(1)
Adding Remote Access Services to Windows Server 2008
278(1)
Using RADIUS
279(1)
The Essentials and Beyond
280(3)
Chapter 14 Troubleshooting TCP/IP
283(26)
Using the Command Prompt
283(4)
Getting Help at the Command Prompt
284(1)
Using Switches
285(1)
Understanding Case Sensitivity
285(2)
Checking the TCP/IP Configuration with ipconfig
287(4)
Troubleshooting Connectivity with ping
291(4)
Identifying Routers with tracert
295(2)
Verifying the Routed Path with pathping
297(2)
Viewing TCP/IP Statistics with netstat
299(5)
Installing Telnet
304(2)
The Essentials and Beyond
306(3)
Appendix A Answers to Review Questions
309(10)
Chapter 1
309(1)
Chapter 2
310(1)
Chapter 3
310(1)
Chapter 4
311(1)
Chapter 5
312(1)
Chapter 6
312(1)
Chapter 7
313(1)
Chapter 8
314(1)
Chapter 9
314(1)
Chapter 10
315(1)
Chapter 11
316(1)
Chapter 12
316(1)
Chapter 13
317(1)
Chapter 14
317(2)
Appendix B Microsoft's Certification Program
319(6)
Certification Objectives Map
320(5)
Index 325
About the Author

Darril Gibson, MCSE, MCITP, ITIL v3, Security+, CISSP, is the CEO of Security Consulting and Training, LLC. A Microsoft Certified Trainer since August 1999, Darril regularly teaches, writes, and consults on a wide variety of security and technical topics. He has authored, coauthored, or contributed to 14 books on a wide range of topics that include Windows Server, Windows 7, SQL Server, and IT security.