Networking For Dummies

Networking For Dummies
Авторы книги: id книги: 1887774     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 2419,23 руб.     (24,19$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Зарубежная компьютерная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119748687 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Set up a secure network at home or the office   Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage of broadband and wireless technologies, as well as storage and back-up procedures, ensures that you’ll learn how to build a wired or wireless network, secure and optimize it, troubleshoot problems, and much more.  From connecting to the Internet and setting up a wireless network to solving networking problems and backing up your data—this #1 bestselling guide covers it all. Build a wired or wireless network Secure and optimize your network Set up a server and manage Windows user accounts Use the cloud—safely Written by a seasoned technology author—and jam-packed with tons of helpful step-by-step instructions—this is the book network administrators and everyday computer users will turn to again and again.

Оглавление

Doug Lowe. Networking For Dummies

Networking For Dummies® To view this book's Cheat Sheet, simply go to www.dummies.com and search for “Networking For Dummies Cheat Sheet” in the Search box. Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Introduction

About This Book

Foolish Assumptions

Icons Used in This Book

Beyond the Book

Where to Go from Here

Getting Started with Networking

Let’s Network!

Defining a Network

Why Bother with a Network?

Sharing files

Sharing resources

Sharing programs

Sharing messages

Servers and Clients

Dedicated Servers and Peers

What Makes a Network Tick?

It’s Not a Personal Computer Anymore!

The Network Administrator

What Have They Got That You Don’t Got?

Configuring Windows and Mac Clients

Configuring Windows Network Connections

Joining a Windows Computer to a Domain

Configuring Mac Network Settings

Joining a Mac Computer to a Domain

Life on the Network

Distinguishing between Local Resources and Network Resources

What’s in a Name?

Logging on to the Network

Understanding Shared Folders

Four Good Uses for a Shared Folder

Store files that everybody needs

Store your own files

Make a temporary resting place for files on their way to other users

Back up your local hard drive

Oh, the Network Places You’ll Go

Mapping Network Drives

Using a Network Printer

Adding a network printer

Printing to a network printer

Playing with the print queue

Logging off the Network

More Ways to Use Your Network

Sharing Your Stuff

Enabling File and Printer Sharing

Sharing a Folder

Using the Public Folder

Sharing a Printer

Using Microsoft Office on a Network

Accessing network files

Using workgroup templates

Networking an Access database

Working with Offline Files

Designing Your Network

Planning a Network

Making a Network Plan

Being Purposeful

Taking Stock

What you need to know

Programs that gather information for you

To Dedicate or Not to Dedicate: That Is the Question

File servers

Print servers

Web servers

Mail servers

Database servers

Application servers

License servers

Choosing a Server Operating System

Planning the Infrastructure

Drawing Diagrams

Dealing with TCP/IP

Understanding Binary

Counting by ones

Doing the logic thing

Introducing IP Addresses

Networks and hosts

The dotted-decimal dance

Classifying IP Addresses

Class A addresses

Class B addresses

Class C addresses

WHAT ABOUT IPV6?

Subnetting

Subnets

Subnet masks

The great subnet roundup

Private and public addresses

Understanding Network Address Translation

Configuring Your Network for DHCP

Understanding DHCP

DHCP servers

Understanding scopes

Feeling excluded?

Reservations suggested

How long to lease?

Managing a Windows Server 2019 DHCP Server

Configuring a Windows DHCP Client

Using DNS

Domains and domain names

Fully qualified domain names

Working with the Windows DNS Server

Configuring a Windows DNS Client

Oh, What a Tangled Web We Weave: Cables and Switches

What Is Ethernet?

OBLIGATORY INFORMATION ABOUT NETWORK TOPOLOGY

All about Cable

Cable categories

What’s with the pairs?

To shield or not to shield

When to use plenum cable

Sometimes solid, sometimes stranded

Installation guidelines

The tools you need

Pinouts for twisted-pair cables

RJ-45 connectors

Crossover cables

Wall jacks and patch panels

Understanding Switches

Comparing managed and unmanaged switches

WHY IS IT CALLED A SWITCH?

Daisy-chaining switches

Stacking switches

Looking at distribution switches and access switches

Powering Up with Power over Ethernet

Looking at Three Types of Network Rooms

Setting Up a Wireless Network

Diving into Wireless Networking

A Little High School Electronics

Waves and frequencies

Wavelength and antennas

Spectrums and the FCC

AND NOW, A WORD FROM THE IRONY DEPARTMENT

Eight-Oh-Two-Dot-Eleventy Something: Understanding Wireless Standards

Home on the Range

Using Wireless Network Adapters

Setting Wireless Access Points

Infrastructure mode

Multifunction WAPs

Roaming Capabilities

Wireless bridging

Ad-hoc networks

Configuring a Wireless Access Point

Basic configuration options

DHCP configuration

Connecting to a Wireless Network

Paying Attention to Wireless Network Security

ROGUE ACCESS POINTS

DON’T NEGLECT THE BASICS

Connecting to the Internet

Connecting to the Internet

Connecting with cable or DSL

Connecting with high-speed private lines

Sharing an Internet connection

Securing Your Connection with a Firewall

Using a firewall

Comparing residential gateways to firewall routers

Looking at the built-in Windows firewall

Providing a Backup Internet Connection

Working with Servers

Virtualizing Your Network

Understanding Virtualization

THE LONG TREK OF VIRTUALIZATION

Understanding Hypervisors

Understanding Virtual Disks

Understanding Network Virtualization

Looking at the Benefits of Virtualization

Choosing Virtualization Hosts

Understanding Windows Server 2019 Licensing

Introducing Hyper-V

Understanding the Hyper-V hypervisor

Understanding virtual disks

Enabling Hyper-V

Getting Familiar with Hyper-V

Creating a Virtual Switch

Creating a Virtual Disk

Creating a Virtual Machine

Installing an Operating System

Setting Up a Windows Server

Planning a Windows Server Installation

Checking system requirements

Reading the release notes

Considering your licensing options

Deciding your TCP/IP configuration

Choosing workgroups or domains

Running Setup

Adding Server Roles and Features

Creating a New Domain

Managing Windows User Accounts

Understanding How Active Directory Is Organized

Objects

Domains

Organizational units

Trees

Forests

Understanding Windows User Accounts

Local accounts versus domain accounts

User account properties

Creating a New User

Setting User Properties

Changing the user’s contact information

Setting account options

Specifying logon hours

Restricting access to certain computers

Setting the user’s profile information

Resetting User Passwords

Disabling and Enabling User Accounts

Deleting a User

Working with Groups

Creating a group

Adding a member to a group

Creating a Logon Script

Managing Network Storage

Understanding Disk Storage

Hard disk drives

Solid state drives to the rescue!

It’s a RAID!

Three ways to attach disks to your servers

Focusing on File Servers

Understanding permissions

Understanding shares

Managing Your File Server

Using the New Share Wizard

Sharing a folder without the wizard

Granting permissions

Managing Your Network

Welcome to Network Management

What a Network Administrator Does

Choosing the Part-Time Administrator

The Three “Ups” of Network Management

Managing Network Users

Acquiring Software Tools for Network Administrators

Building a Library

Pursuing Certification

Helpful Bluffs and Excuses

Supporting Your Users

Establishing the Help Desk’s Charter

Tracking Support Tickets

Deciding How to Communicate with Users

Using Remote Assistance

Enabling Remote Assistance

Inviting someone to help you via a Remote Assistance session

Responding to a Remote Assistance invitation

Creating a Knowledge Base

Creating a Self-Service Help Portal

Using Satisfaction Surveys

Tracking Help Desk Performance

Using Help Desk Management Software

Using Group Policy

Understanding Group Policy

Enabling Group Policy Management on Windows Server 2019

Creating Group Policy Objects

Filtering Group Policy Objects

Forcing Group Policy Updates

Managing Software Deployment

Understanding Software Licenses

Using a License Server

Deploying Network Software

Deploying software manually

Running Setup from a network share

Installing silently

Creating an administrative installation image

Pushing out software with Group Policy

Keeping Software Up to Date

Managing Mobile Devices

The Many Types of Mobile Devices

Considering Security for Mobile Devices

Managing iOS Devices

Understanding the iPhone

Understanding the iPad

Integrating iOS devices with Exchange

Configuring an iOS device for Exchange email

Managing Android Devices

Looking at the Android OS

Perusing Android’s core applications

Integrating Android with Exchange

Securing Your Network

Welcome to Cybersecurity Network

Do You Need Security?

The Three Pillars of Cybersecurity

Two Approaches to Security

Physical Security: Locking Your Doors

Securing User Accounts

Obfuscating your usernames

Using passwords wisely

Generating passwords For Dummies

Secure the Administrator account

Managing User Security

User accounts

Built-in accounts

User rights

Permissions (who gets what)

NETWORK RIGHTS WE WANT TO SEE

Group therapy

User profiles

Logon scripts

Securing the Human Firewall

Hardening Your Network

Firewalls

THE BUILT-IN WINDOWS FIREWALL

The Many Types of Firewalls

Packet filtering

Stateful packet inspection (SPI)

Circuit-level gateway

Application gateway

Next-generation firewall

Virus Protection

What is a virus?

Antivirus programs

Safe computing

Patching Things Up

Securing Your Email

Defining Spam

Sampling the Many Flavors of Spam

Using Antispam Software

Understanding Spam Filters

Looking at Three Types of Antispam Software

On-premises antispam

Antispam appliances

Cloud-based antispam services

Minimizing Spam

Backing Up Your Data

3-2-1: The Golden Rule of Backups

How Often Should You Back Up Your Data?

Choosing Where to Back Up Your Data

Establishing Two Key Backup Objectives

Backing Up to Tape

Understanding Backup Software

Examining File-Based Backups

Full backups

Copy backups

Incremental backups

Differential backups

Backup and Virtualization

Verifying Tape Reliability

Keeping Backup Equipment Clean and Reliable

Setting Backup Security

Planning for Disaster

Assessing Different Types of Disasters

Environmental disasters

Deliberate disasters

Disruption of services

Equipment failure

Other disasters

Analyzing the Impact of a Disaster

Developing a Business Continuity Plan

Holding a Fire Drill

More Ways to Network

Accommodating Remote Users

Using Outlook Web App

Using a Virtual Private Network

Looking at VPN security

Understanding VPN servers and clients

Connecting with Remote Desktop Connection

Enabling Remote Desktop Connection

Connecting remotely

Using keyboard shortcuts for Remote Desktop

Life in Cloud City

Introducing Cloud Computing

Looking at the Benefits of Cloud Computing

Detailing the Drawbacks of Cloud Computing

Examining Three Basic Kinds of Cloud Services

Applications

Platforms

Infrastructure

Public Clouds versus Private Clouds

Introducing Some of the Major Cloud Providers

Amazon

Google

Microsoft

Getting into the Cloud

Going Hybrid

What Is a Hybrid Cloud?

What Are the Benefits of Hybrid Cloud?

Elasticity

Flexibility

Agility

Innovation

Operational efficiency

Integrating Identity

Azure Active Directory

Single sign-on

Looking at Hybrid Cloud Virtualization Platforms

The Part of Tens

Ten Networking Commandments

I. Thou Shalt Back Up Thy Data Religiously

II. Thou Shalt Protect Thy Network from Infidels

III. Thou Shalt Train Up Thy Users in the Ways of Safe Computing

IV. Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files

V. Thou Shalt Not Tinker with Thine Network Configuration unless Thou Knowest What Thou Art Doing

VI. Thou Shalt Not Covet Thy Neighbor’s Network

VII. Thou Shalt Not Take Down Thy Network without Proper Notification

VIII. Thou Shalt Keep an Adequate Supply of Spare Parts

IX. Thou Shalt Not Steal Thy Neighbor’s Program without a License

X. Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone

Ten Big Network Mistakes

Skimping on Hardware

Turning Off or Restarting a Server Computer While Users Are Logged On

Deleting Important Files on the Server

Copying a File from the Server, Changing It, and Then Copying It Back

Sending Something to the Printer Again Just Because It Didn’t Print the First Time

Assuming That the Server Is Safely Backed Up

Connecting to the Internet without Considering Security Issues

Plugging in a Wireless Access Point without Asking

Thinking You Can’t Work Just Because the Network Is Down

Running Out of Space on a Server

Always Blaming the Network

Ten Things You Should Keep in Your Closet

Duct Tape

Tools

Patch Cables

Cable Ties and Velcro

Twinkies

Replacement Parts

Cheap Network Switches

The Complete Documentation of the Network on Tablets of Stone

The Network Manuals and Disks

Ten Copies of This Book

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

About the Author

Dedication

Author’s Acknowledgments

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Welcome to the 12th edition of Networking For Dummies, the book that’s written especially for people who have this nagging feeling in the back of their minds that they should network their computers but haven’t a clue about how to start or where to begin.

Do you often copy a spreadsheet to a flash drive just so you can give it to someone else in your office? Are you frustrated because you can’t use the fancy color laser printer that’s on the financial secretary’s computer? Do you wait in line to use the computer that has the customer database? You need a network!

.....

Many software manufacturers sell their software with a concurrent usage license, which means that you can install the software on as many computers as you want, but only a certain number of people can use the software at any given time. Usually, special licensing software that runs on one of the network’s server computers keeps track of how many people are currently using the software. This type of license is frequently used with more specialized (and expensive) software, such as accounting systems or computer drafting systems.

Another benefit of networking is that networks enable computer users to communicate with one another over the network by sharing messages. Those messages can come in many forms. Email and instant-messaging programs are the most common. But you can also exchange audio or video messages. For example, you can hold online meetings over the network. Network users who have inexpensive video cameras (webcams) attached to their computers can have videoconferences. You can even play a friendly game of Hearts over a network — during your lunch break, of course.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Networking For Dummies
Подняться наверх