Microsoft Windows Networking Essentials

eBook

25,99 €
(inkl. MwSt.)
E-Book Download

Download

Bibliografische Daten
ISBN/EAN: 9781118077160
Sprache: Englisch
Umfang: 368 S., 34.90 MB
Auflage: 1. Auflage 2011
E-Book
Format: PDF
DRM: Adobe DRM

Beschreibung

The core concepts and technologies of Windows networking

Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.

Serves as an ideal resource for gaining a solid understanding of fundamental networking concepts and skillsOffers a straightforward and direct approach to networking basics and covers network management tools, TCP/IP, the name resolution process, and network protocols and topologiesReviews all the topics you need to know for taking the MTA 98-366 examProvides an overview of networking components, discusses connecting computers to a network, and looks at connecting networks with routers

If you're new to IT and interested in entering the IT workforce, thenMicrosoft Windows Networking Essentials is essential reading.

Autorenportrait

About the Author

Darril Gibson, MCSE, MCITP, ITIL v3, Security+, CISSP, is the CEO of Security Consulting and Training, LLC. A Microsoft Certified Trainer since August 1999, Darril regularly teaches, writes, and consults on a wide variety of security and technical topics. He has authored, coauthored, or contributed to 14 books on a wide range of topics that include Windows Server, Windows 7, SQL Server, and IT security.

Inhalt

Introduction xix

Chapter 1 Introduction to Networking 1

Comparing Logical and Physical Networks 1

Networking Home Computers 2

Networking Small Offices and Home Offices 4

Understanding Local Area Networks 6

Comparing Workgroups and Domains 7

Exploring the Benefits of Domains and Domain Controllers 9

Networking Large Offices 10

Networking Enterprises 12

Understanding Wide Area Networks 12

Understanding Branch Offices 13

Accessing Networks Remotely 14

Understanding Standards Organizations 15

Understanding the Internet Engineering Task Force 16

Understanding the World Wide Web Consortium 17

Understanding the Institute of Electrical and Electronics Engineers 18

Understanding the International Telecommunication Union 18

The Essentials and Beyond 18

Chapter 2 Overview of Networking Components 21

Comparing Unicast, Broadcast, and Multicast Traffic 21

Understanding Unicast Traffic 22

Understanding Broadcast Traffic 23

Understanding Multicast Traffic 25

Understanding Network Hardware 26

Understanding Hubs 27

Understanding Switches 28

Understanding Bridges 29

Understanding Routers 30

Understanding Firewalls 32

Understanding Media 34

Exploring Protocols and Services 36

Exploring Protocols 36

Understanding Services 37

Understanding Basic Topologies 38

The Essentials and Beyond 39

Chapter 3 Understanding the OSI Model 41

Understanding the OSI Model 41

Application Layer 43

Presentation Layer 44

Session Layer 45

Transport Layer 46

Network Layer 48

Data Link Layer 49

Physical Layer 52

Putting It Together 52

Packets and Frames 53

Understanding the TCP/IP Model 55

Mapping Devices on the OSI and TCP Models 56

Physical Layer 58

Data Link Layer 59

Network Layer 59

Application Layer 60

Mapping Protocols on the OSI and TCP/IP Models 60

The Essentials and Beyond 61

Chapter 4 Core TCP/IP Protocols 63

Understanding TCP and UDP 63

Exploring TCP 64

Exploring UDP 66

Exploring Common Protocols 67

Address Resolution Protocol 67

Hypertext Transfer Protocol 68

File Transfer Protocol 69

Trivial File Transfer Protocol 71

Telnet 71

Remote Desktop Services 71

Secure Sockets Layer 72

Transport Layer Security 72

Secure Shell 73

Internet Protocol Security 74

Simple Mail Transfer Protocol 74

Post Office Protocol v3 75

Internet Message Access Protocol 75

Lightweight Directory Access Protocol 76

Kerberos 77

Point-to-Point Tunneling Protocol 77

Layer 2 Tunneling Protocol 77

Simple Network Management Protocol 78

Internet Group Multicast Protocol 78

Internet Control Message Protocol 78

Understanding Ports 79

Controlling Port Traffic with a Firewall 81

Mapping Internally Used Ports and Protocols 81

The Essentials and Beyond 83

Chapter 5 Exploring IPv4 85

Exploring the Components of an IPv4 Address 85

Ascertaining the Network ID and Host ID of an IP Address 86

Identifying the Default Gateway 90

Determining Local and Remote Addresses 91

Understanding Classful IP Addresses 92

Identifying Reserved IP Address Ranges 94

Exploring an IPv4 Address in Binary 95

Understanding the Bits of an IP Address 95

Understanding CIDR Notation 98

Masking the IP Address 98

Using Classless IP Addresses 100

Subnetting IPv4 Addresses 100

Determining the Number of Subnet Bits 101

Determining the Number of Hosts in a Network 103

Identifying Local and Remote Addresses 105

Applying Subnetting Knowledge 107

Comparing Manual and Automatic Assignment of IPv4 Addresses 110

Manually Configuring IPv4 110

Using DHCP 110

Understanding APIPA 112

The Essentials and Beyond 113

Chapter 6 Exploring IPv6 117

Exploring IPv6 Addresses 117

Comparing IPv4 Classes and IPv6 Prefixes 118

Understanding Hexadecimal 119

Displaying IPv6 Addresses 120

Comparing IPv6 Transmission Types 121

Understanding the Need for IPv6 122

Understanding Neighbor Discovery 122

Exploring the Components of an IPv6 Address 123

Understanding Global Unicast Addresses 124

Understanding Link-Local Addresses 125

Understanding Unique Local Addresses 126

Understanding the Dual IP Stack 127

Using IPv4-Mapped IPv6 Addresses 127

Understanding IPv4 to IPv6 Tunneling Protocols 128

Comparing Manual and Automatic Assignment of IPv6 129

Manually Configuring IPv6 129

Using DHCPv6 130

The Essentials and Beyond 131

Chapter 7 Connecting Computers to a Network 133

Identifying Potential Problems with Connectivity 133

Understanding EMI 134

Understanding RFI 134

Avoiding Power Spikes 134

Avoiding Interception 137

Preventing Fire Hazards 142

Understanding Cross Talk 142

Exploring Cable Types and Their Characteristics 144

Understanding Twisted Pair 144

Comparing Unshielded and Shielded Twisted Pair 146

Comparing Straight-Through and Crossover Cables 146

Understanding Fiber Optic 147

Understanding Wireless 149

The Essentials and Beyond 150

Chapter 8 Networking Computers with Switches 153

Connecting Multiple Computers 153

Understanding Physical Ports 156

Identifying the Number and Type of Ports 156

Identifying Ports in Drawings 157

Comparing Hubs and Switches 158

Understanding Collision Domains 159

Identifying a Collision Domain with a Hub 159

Identifying Collision Domains with a Switch 160

Mapping Ports to MAC Addresses 161

Comparing Managed and Unmanaged Switches 162

Understanding Unmanaged Switches 163

Understanding Managed Switches 163

Comparing Layer 2 and Layer 3 Switches 164

Using a Managed Switch to Create a VLAN 164

Exploring Switch Speeds 167

Identifying Transmission Speeds 168

Understanding the Uplink Port 169

Identifying Backplane Speed 170

Understanding Security Options 170

Understanding Port Security 171

Planning Hardware Redundancy 171

The Essentials and Beyond 172

Chapter 9 Connecting Networks with Routers 175

Connecting Multiple Networks 175

Comparing Hardware Routers and Software Routers 177

Understanding Default Routes 177

Understanding Directly Connected Routes 179

Routing Traffic on a Network 180

Creating Static Routes 180

Configuring Dynamic Routing 182

Understanding the Routing Table185

Identifying Transmission Speeds 187

Routing Software in Windows Server 2008 188

Adding Routing Services to Windows Server 2008 188

Configuring a Router on Windows Server 2008 190

Understanding Other Routing Protocols 192

Using a DHCP Relay Agent 193

Using an IGMP Router and Proxy 194

Using NAT 195

The Essentials and Beyond 195

Chapter 10 Resolving Names to IP Addresses 197

Exploring Types of Names Used in Networks 197

Understanding Host Names 199

Understanding NetBIOS Names 199

Creating NetBIOS Names from Host Names 202

Viewing and Modifying a Computer Name 203

Exploring Types of Name Resolution 204

Understanding Domain Naming Service 205

Viewing the Host Cache 210

Viewing the Hosts File 211

Understanding WINS 212

Viewing the NetBIOS Cache 213

Understanding the Lmhosts File 214

Understanding Broadcast Name Resolution 214

Understanding Link-Local Multicast Name Resolution 214

Identifying the Steps in Name Resolution 215

Identifying Steps in Host Name Resolution 215

Identifying Steps in NetBIOS Name Resolution 216

The Essentials and Beyond 217

Chapter 11 Understanding Network Security Zones 219

Understanding Risks on the Internet 219

Exploring an Intranet 221

Understanding Network Address Translation 222

Understanding Proxy Servers 224

Understanding Firewalls 227

Exploring the Windows Server 2008 Firewall 229

Identifying a Perimeter Network 232

Understanding a Reverse Proxy Server 233

Understanding Guest Networks 234

Understanding Extranets 235

The Essentials and Beyond 236

Chapter 12 Understanding Wireless Networking 239

Exploring Basic Wireless Components 239

Using Wireless Access Points 240

Naming the Wireless Network 241

Comparing CSMA/CD and CSMA/CA 243

Comparing Networking Standards and Characteristics 243

Comparing FHSS, DSSS, and OFDM 244

IEEE 802 11 245

IEEE 802 11a 246

IEEE 802 11b 247

IEEE 802 11g 247

IEEE 802 11n 248

Comparing Network Security Methods 248

Wired Equivalent Privacy 249

Wi-Fi Protected Access 251

WPA2 252

Using an IEEE 802 1x Authentication Server 253

Using Wireless Networks 254

Home Wireless Networks 255

Wireless Networks in a Business 258

Understanding Point-to-Point Wireless 259

The Essentials and Beyond 261

Chapter 13 Understanding Internet Access Methods and Wide Area Networks 263

Comparing Connectivity Methods Used in Homes and SOHOs 263

Using a Dial-up Connection 264

Connecting with DSL 265

Employing Broadband Cable 266

Connecting via Satellite 267

Comparing Connectivity Methods in Enterprises 269

Exploring Digital Signal Lines 271

Using ISDN 271

Using T1/T3 Lines and E1/E3 Lines 272

Ethernet WAN 273

Exploring Remote Access Services 273

Connecting to RAS via Dial-up 274

Connecting to RAS via a VPN 276

Comparing Client VPNs with Gateway VPNs 278

Adding Remote Access Services to Windows Server 2008 278

Using RADIUS 279

The Essentials and Beyond 280

Chapter 14 Troubleshooting TCP/IP 283

Using the Command Prompt 283

Getting Help at the Command Prompt 284

Using Switches 285

Understanding Case Sensitivity 285

Checking the TCP/IP Configuration with ipconfig 287

Troubleshooting Connectivity with ping 291

Identifying Routers with tracert 295

Verifying the Routed Path with pathping 297

Viewing TCP/IP Statistics with netstat 299

Installing Telnet 304

The Essentials and Beyond 306

Appendix A Answers to Review Questions 309

Chapter 1 309

Chapter 2 310

Chapter 3 310

Chapter 4 311

Chapter 5 312

Chapter 6 312

Chapter 7 313

Chapter 8 314

Chapter 9 314

Chapter 10 315

Chapter 11 316

Chapter 12 316

Chapter 13 317

Chapter 14 317

Appendix B Microsofts Certification Program 319

Certification Objectives Map 320

Index 325

Informationen zu E-Books

Herzlichen Glückwunsch zum Kauf eines Ebooks bei der BUCHBOX! Hier nun ein paar praktische Infos.

Adobe-ID

Hast du E-Books mit einem Kopierschutz (DRM) erworben, benötigst du dazu immer eine Adobe-ID. Bitte klicke einfach hier und trage dort Namen, Mailadresse und ein selbstgewähltes Passwort ein. Die Kombination von Mailadresse und Passwort ist deine Adobe-ID. Notiere sie dir bitte sorgfältig. 
 
Achtung: Wenn du kopiergeschützte E-Books OHNE Vergabe einer Adobe-ID herunterlädst, kannst du diese niemals auf einem anderen Gerät außer auf deinem PC lesen!!
 
Du hast dein Passwort zur Adobe-ID vergessen? Dann kannst du dies HIER neu beantragen.
 
 

Lesen auf dem Tablet oder Handy

Wenn du auf deinem Tablet lesen möchtest, verwende eine dafür geeignete App. 

Für iPad oder Iphone etc. hole dir im iTunes-Store die Lese-App Bluefire

Für Android-Geräte (z.B. Samsung) bekommst du die Lese-App Bluefire im GooglePlay-Store (oder auch: Aldiko)
 
Lesen auf einem E-Book-Reader oder am PC / MAC
 
Um die Dateien auf deinen PC herunter zu laden und auf dein E-Book-Lesegerät zu übertragen gibt es die Software ADE (Adobe Digital Editions).
 
 

Andere Geräte / Software

 

Kindle von Amazon. Wir empfehlen diese Geräte NICHT.

EPUB mit Adobe-DRM können nicht mit einem Kindle von Amazon gelesen werden. Weder das Dateiformat EPUB, noch der Kopierschutz Adobe-DRM sind mit dem Kindle kompatibel. Umgekehrt können alle bei Amazon gekauften E-Books nur auf dem Gerät von Amazon gelesen werden. Lesegeräte wie der Tolino sind im Gegensatz hierzu völlig frei: Du kannst bei vielen tausend Buchhandlungen online Ebooks für den Tolino kaufen. Zum Beispiel hier bei uns.

Software für Sony-E-Book-Reader

Wenn du einen Sony-Reader hast, dann findest du hier noch die zusätzliche Sony-Software.
 

Computer/Laptop mit Unix oder Linux

Die Software Adobe Digital Editions ist mit Unix und Linux nicht kompatibel. Mit einer WINE-Virtualisierung kommst du aber dennoch an deine E-Books.