Networking For Dummies
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Doug Lowe. Networking For Dummies
Networking For Dummies® To view this book's Cheat Sheet, simply go to www.dummies.com and search for “Networking For Dummies Cheat Sheet” in the Search box. Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Introduction
About This Book
Foolish Assumptions
Icons Used in This Book
Beyond the Book
Where to Go from Here
Getting Started with Networking
Let’s Network!
Defining a Network
Why Bother with a Network?
Sharing files
Sharing resources
Sharing programs
Sharing messages
Servers and Clients
Dedicated Servers and Peers
What Makes a Network Tick?
It’s Not a Personal Computer Anymore!
The Network Administrator
What Have They Got That You Don’t Got?
Configuring Windows and Mac Clients
Configuring Windows Network Connections
Joining a Windows Computer to a Domain
Configuring Mac Network Settings
Joining a Mac Computer to a Domain
Life on the Network
Distinguishing between Local Resources and Network Resources
What’s in a Name?
Logging on to the Network
Understanding Shared Folders
Four Good Uses for a Shared Folder
Store files that everybody needs
Store your own files
Make a temporary resting place for files on their way to other users
Back up your local hard drive
Oh, the Network Places You’ll Go
Mapping Network Drives
Using a Network Printer
Adding a network printer
Printing to a network printer
Playing with the print queue
Logging off the Network
More Ways to Use Your Network
Sharing Your Stuff
Enabling File and Printer Sharing
Sharing a Folder
Using the Public Folder
Sharing a Printer
Using Microsoft Office on a Network
Accessing network files
Using workgroup templates
Networking an Access database
Working with Offline Files
Designing Your Network
Planning a Network
Making a Network Plan
Being Purposeful
Taking Stock
What you need to know
Programs that gather information for you
To Dedicate or Not to Dedicate: That Is the Question
File servers
Print servers
Web servers
Mail servers
Database servers
Application servers
License servers
Choosing a Server Operating System
Planning the Infrastructure
Drawing Diagrams
Dealing with TCP/IP
Understanding Binary
Counting by ones
Doing the logic thing
Introducing IP Addresses
Networks and hosts
The dotted-decimal dance
Classifying IP Addresses
Class A addresses
Class B addresses
Class C addresses
WHAT ABOUT IPV6?
Subnetting
Subnets
Subnet masks
The great subnet roundup
Private and public addresses
Understanding Network Address Translation
Configuring Your Network for DHCP
Understanding DHCP
DHCP servers
Understanding scopes
Feeling excluded?
Reservations suggested
How long to lease?
Managing a Windows Server 2019 DHCP Server
Configuring a Windows DHCP Client
Using DNS
Domains and domain names
Fully qualified domain names
Working with the Windows DNS Server
Configuring a Windows DNS Client
Oh, What a Tangled Web We Weave: Cables and Switches
What Is Ethernet?
OBLIGATORY INFORMATION ABOUT NETWORK TOPOLOGY
All about Cable
Cable categories
What’s with the pairs?
To shield or not to shield
When to use plenum cable
Sometimes solid, sometimes stranded
Installation guidelines
The tools you need
Pinouts for twisted-pair cables
RJ-45 connectors
Crossover cables
Wall jacks and patch panels
Understanding Switches
Comparing managed and unmanaged switches
WHY IS IT CALLED A SWITCH?
Daisy-chaining switches
Stacking switches
Looking at distribution switches and access switches
Powering Up with Power over Ethernet
Looking at Three Types of Network Rooms
Setting Up a Wireless Network
Diving into Wireless Networking
A Little High School Electronics
Waves and frequencies
Wavelength and antennas
Spectrums and the FCC
AND NOW, A WORD FROM THE IRONY DEPARTMENT
Eight-Oh-Two-Dot-Eleventy Something: Understanding Wireless Standards
Home on the Range
Using Wireless Network Adapters
Setting Wireless Access Points
Infrastructure mode
Multifunction WAPs
Roaming Capabilities
Wireless bridging
Ad-hoc networks
Configuring a Wireless Access Point
Basic configuration options
DHCP configuration
Connecting to a Wireless Network
Paying Attention to Wireless Network Security
ROGUE ACCESS POINTS
DON’T NEGLECT THE BASICS
Connecting to the Internet
Connecting to the Internet
Connecting with cable or DSL
Connecting with high-speed private lines
Sharing an Internet connection
Securing Your Connection with a Firewall
Using a firewall
Comparing residential gateways to firewall routers
Looking at the built-in Windows firewall
Providing a Backup Internet Connection
Working with Servers
Virtualizing Your Network
Understanding Virtualization
THE LONG TREK OF VIRTUALIZATION
Understanding Hypervisors
Understanding Virtual Disks
Understanding Network Virtualization
Looking at the Benefits of Virtualization
Choosing Virtualization Hosts
Understanding Windows Server 2019 Licensing
Introducing Hyper-V
Understanding the Hyper-V hypervisor
Understanding virtual disks
Enabling Hyper-V
Getting Familiar with Hyper-V
Creating a Virtual Switch
Creating a Virtual Disk
Creating a Virtual Machine
Installing an Operating System
Setting Up a Windows Server
Planning a Windows Server Installation
Checking system requirements
Reading the release notes
Considering your licensing options
Deciding your TCP/IP configuration
Choosing workgroups or domains
Running Setup
Adding Server Roles and Features
Creating a New Domain
Managing Windows User Accounts
Understanding How Active Directory Is Organized
Objects
Domains
Organizational units
Trees
Forests
Understanding Windows User Accounts
Local accounts versus domain accounts
User account properties
Creating a New User
Setting User Properties
Changing the user’s contact information
Setting account options
Specifying logon hours
Restricting access to certain computers
Setting the user’s profile information
Resetting User Passwords
Disabling and Enabling User Accounts
Deleting a User
Working with Groups
Creating a group
Adding a member to a group
Creating a Logon Script
Managing Network Storage
Understanding Disk Storage
Hard disk drives
Solid state drives to the rescue!
It’s a RAID!
Three ways to attach disks to your servers
Focusing on File Servers
Understanding permissions
Understanding shares
Managing Your File Server
Using the New Share Wizard
Sharing a folder without the wizard
Granting permissions
Managing Your Network
Welcome to Network Management
What a Network Administrator Does
Choosing the Part-Time Administrator
The Three “Ups” of Network Management
Managing Network Users
Acquiring Software Tools for Network Administrators
Building a Library
Pursuing Certification
Helpful Bluffs and Excuses
Supporting Your Users
Establishing the Help Desk’s Charter
Tracking Support Tickets
Deciding How to Communicate with Users
Using Remote Assistance
Enabling Remote Assistance
Inviting someone to help you via a Remote Assistance session
Responding to a Remote Assistance invitation
Creating a Knowledge Base
Creating a Self-Service Help Portal
Using Satisfaction Surveys
Tracking Help Desk Performance
Using Help Desk Management Software
Using Group Policy
Understanding Group Policy
Enabling Group Policy Management on Windows Server 2019
Creating Group Policy Objects
Filtering Group Policy Objects
Forcing Group Policy Updates
Managing Software Deployment
Understanding Software Licenses
Using a License Server
Deploying Network Software
Deploying software manually
Running Setup from a network share
Installing silently
Creating an administrative installation image
Pushing out software with Group Policy
Keeping Software Up to Date
Managing Mobile Devices
The Many Types of Mobile Devices
Considering Security for Mobile Devices
Managing iOS Devices
Understanding the iPhone
Understanding the iPad
Integrating iOS devices with Exchange
Configuring an iOS device for Exchange email
Managing Android Devices
Looking at the Android OS
Perusing Android’s core applications
Integrating Android with Exchange
Securing Your Network
Welcome to Cybersecurity Network
Do You Need Security?
The Three Pillars of Cybersecurity
Two Approaches to Security
Physical Security: Locking Your Doors
Securing User Accounts
Obfuscating your usernames
Using passwords wisely
Generating passwords For Dummies
Secure the Administrator account
Managing User Security
User accounts
Built-in accounts
User rights
Permissions (who gets what)
NETWORK RIGHTS WE WANT TO SEE
Group therapy
User profiles
Logon scripts
Securing the Human Firewall
Hardening Your Network
Firewalls
THE BUILT-IN WINDOWS FIREWALL
The Many Types of Firewalls
Packet filtering
Stateful packet inspection (SPI)
Circuit-level gateway
Application gateway
Next-generation firewall
Virus Protection
What is a virus?
Antivirus programs
Safe computing
Patching Things Up
Securing Your Email
Defining Spam
Sampling the Many Flavors of Spam
Using Antispam Software
Understanding Spam Filters
Looking at Three Types of Antispam Software
On-premises antispam
Antispam appliances
Cloud-based antispam services
Minimizing Spam
Backing Up Your Data
3-2-1: The Golden Rule of Backups
How Often Should You Back Up Your Data?
Choosing Where to Back Up Your Data
Establishing Two Key Backup Objectives
Backing Up to Tape
Understanding Backup Software
Examining File-Based Backups
Full backups
Copy backups
Incremental backups
Differential backups
Backup and Virtualization
Verifying Tape Reliability
Keeping Backup Equipment Clean and Reliable
Setting Backup Security
Planning for Disaster
Assessing Different Types of Disasters
Environmental disasters
Deliberate disasters
Disruption of services
Equipment failure
Other disasters
Analyzing the Impact of a Disaster
Developing a Business Continuity Plan
Holding a Fire Drill
More Ways to Network
Accommodating Remote Users
Using Outlook Web App
Using a Virtual Private Network
Looking at VPN security
Understanding VPN servers and clients
Connecting with Remote Desktop Connection
Enabling Remote Desktop Connection
Connecting remotely
Using keyboard shortcuts for Remote Desktop
Life in Cloud City
Introducing Cloud Computing
Looking at the Benefits of Cloud Computing
Detailing the Drawbacks of Cloud Computing
Examining Three Basic Kinds of Cloud Services
Applications
Platforms
Infrastructure
Public Clouds versus Private Clouds
Introducing Some of the Major Cloud Providers
Amazon
Microsoft
Getting into the Cloud
Going Hybrid
What Is a Hybrid Cloud?
What Are the Benefits of Hybrid Cloud?
Elasticity
Flexibility
Agility
Innovation
Operational efficiency
Integrating Identity
Azure Active Directory
Single sign-on
Looking at Hybrid Cloud Virtualization Platforms
The Part of Tens
Ten Networking Commandments
I. Thou Shalt Back Up Thy Data Religiously
II. Thou Shalt Protect Thy Network from Infidels
III. Thou Shalt Train Up Thy Users in the Ways of Safe Computing
IV. Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files
V. Thou Shalt Not Tinker with Thine Network Configuration unless Thou Knowest What Thou Art Doing
VI. Thou Shalt Not Covet Thy Neighbor’s Network
VII. Thou Shalt Not Take Down Thy Network without Proper Notification
VIII. Thou Shalt Keep an Adequate Supply of Spare Parts
IX. Thou Shalt Not Steal Thy Neighbor’s Program without a License
X. Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone
Ten Big Network Mistakes
Skimping on Hardware
Turning Off or Restarting a Server Computer While Users Are Logged On
Deleting Important Files on the Server
Copying a File from the Server, Changing It, and Then Copying It Back
Sending Something to the Printer Again Just Because It Didn’t Print the First Time
Assuming That the Server Is Safely Backed Up
Connecting to the Internet without Considering Security Issues
Plugging in a Wireless Access Point without Asking
Thinking You Can’t Work Just Because the Network Is Down
Running Out of Space on a Server
Always Blaming the Network
Ten Things You Should Keep in Your Closet
Duct Tape
Tools
Patch Cables
Cable Ties and Velcro
Twinkies
Replacement Parts
Cheap Network Switches
The Complete Documentation of the Network on Tablets of Stone
The Network Manuals and Disks
Ten Copies of This Book
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Z
About the Author
Dedication
Author’s Acknowledgments
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
Welcome to the 12th edition of Networking For Dummies, the book that’s written especially for people who have this nagging feeling in the back of their minds that they should network their computers but haven’t a clue about how to start or where to begin.
Do you often copy a spreadsheet to a flash drive just so you can give it to someone else in your office? Are you frustrated because you can’t use the fancy color laser printer that’s on the financial secretary’s computer? Do you wait in line to use the computer that has the customer database? You need a network!
.....
Many software manufacturers sell their software with a concurrent usage license, which means that you can install the software on as many computers as you want, but only a certain number of people can use the software at any given time. Usually, special licensing software that runs on one of the network’s server computers keeps track of how many people are currently using the software. This type of license is frequently used with more specialized (and expensive) software, such as accounting systems or computer drafting systems.
Another benefit of networking is that networks enable computer users to communicate with one another over the network by sharing messages. Those messages can come in many forms. Email and instant-messaging programs are the most common. But you can also exchange audio or video messages. For example, you can hold online meetings over the network. Network users who have inexpensive video cameras (webcams) attached to their computers can have videoconferences. You can even play a friendly game of Hearts over a network — during your lunch break, of course.
.....