Networking All-in-One For Dummies

Networking All-in-One For Dummies
Авторы книги: id книги: 2025780     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 3833,09 руб.     (41,09$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Зарубежная компьютерная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119689058 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Your ultimate one-stop networking reference    Designed to replace that groaning shelf-load of dull networking books you’d otherwise have to buy and house,  Networking All-in-One For Dummie s covers all the basic and not-so-basic information you need to get a network up and running. It also helps you keep it running as it grows more complicated, develops bugs, and encounters all the fun sorts of trouble you expect from a complex system. Ideal both as a starter for newbie administrators and as a handy quick reference for pros, this book is built for speed, allowing you to get past all the basics—like installing and configuring hardware and software, planning your network design, and managing cloud services—so you can get on with what your network is actually intended to do.  In a friendly, jargon-free style, Doug Lowe—an experienced IT Director and prolific tech author—covers the essential, up-to-date information for networking in systems such as Linux and Windows 10 and clues you in on best practices for security, mobile, and more. Each of the nine minibooks demystifies the basics of one key area of network management.  Plan and administrate your network Implement virtualization Get your head around networking in the Cloud Lock down your security protocols The best thing about this book? You don’t have to read it all at once to get things done; once you’ve solved the specific issue at hand, you can put it down again and get on with your life. And the next time you need it, it’ll have you covered.

Оглавление

Doug Lowe. Networking All-in-One For Dummies

Networking All-in-One For Dummies® To view this book's Cheat Sheet, simply go to www.dummies.com and search for “Networking All-in-One For Dummies Cheat Sheet” in the Search box. Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Introduction

About This Book

Foolish Assumptions

Icons Used in This Book

Beyond the Book

Where to Go from Here

Getting Started with Networking. Contents at a Glance

Welcome to Networking

Defining a Network

Delving into Network Lingo

Why Bother with a Network?

Accessing the Internet

Sharing files

Sharing resources

Sharing programs

Servers and Clients

Dedicated Servers and Peers

What Makes a Network Tick?

Putting the Pieces Together

Networks Big and Small

It’s Not a Personal Computer Anymore!

The Network Administrator

Network Infrastructure

Introducing Infrastructure

Understanding Network Protocols and Standards

Recognizing Network Topology

Bus topology

Star topology

Expanding stars

Ring topology

Mesh topology

Considering Cable

Twisted-pair cable

RJ45 connectors

Patch panels and patch cables

Repeaters and hubs

Switches

Perusing Ports, Interfaces, and MAC Addresses

Pondering Packets

Contemplating Collisions

Dealing with Broadcast Packets

Examining Wireless Networks

Switches, Routers, and VLANs

Understanding Switches

Learning

Forwarding

Flooding

Looking Deeper into Switches

Collision domains

Bridging

SFP ports and uplinks

Broadcast domains

Managed and unmanaged switches

Understanding Routers

Network address translation

Virtual private network

Understanding VLANs

Cybersecurity

But We’re a Small Business — Do We Need Security?

The Two Pillars of Cybersecurity

Prevention

Recovery

Cybersecurity Frameworks

The NIST Cybersecurity Framework

Servers and Virtualization

Understanding Network Operating Systems

Network services

File-sharing services

Multitasking

Directory services

Security services

What’s Important in a Server

Scalability

Reliability

Availability

Service and support

Components of a Server Computer

Motherboard

Processor

Memory

Hard drives

Network interfaces

Video

Power supply

Considering Server Form Factors

Tower case

Rack mount

Blade servers

SAVING SPACE WITH A KVM SWITCH

Considering Virtualization

Cloud Computing

Introducing Cloud Computing

Looking at the Benefits of Cloud Computing

Detailing the Drawbacks of Cloud Computing

Examining Three Basic Kinds of Cloud Services

Applications

Platforms

Infrastructure

Public Clouds versus Private Clouds

Introducing Some of the Major Cloud Providers

Amazon

Google

Microsoft

Getting Into the Cloud

Understanding Network Protocols. Contents at a Glance

Network Protocols and Standards

Understanding Protocols

Understanding Standards

Seeing the Seven Layers of the OSI Reference Model

The physical layer

The data link layer

The network layer

CSMA/CD IS A MOUTHFUL!

Logical addressing

Routing

The transport layer

The session layer

The presentation layer

The application layer

Following a Packet through the Layers

The Ethernet Protocol

Standard Ethernet

Fast Ethernet

Gigabit Ethernet

Beyond gigabit

The TCP/IP Protocol Suite

10BASE WHAT?

IP

TCP

UDP

THE FASCINATING STORY OF TCP/IP

Other Protocols Worth Knowing About

TCP/IP and the Internet

What Is the Internet?

A Little Internet History

TCP/IP Standards and RFCs

The TCP/IP Protocol Framework

Network interface layer

Network layer

Transport layer

Application layer

IP Addresses

Understanding Binary

Counting by ones

Doing the logic thing

Working with the binary Windows Calculator

Introducing IP Addresses

Networks and hosts

The dotted-decimal dance

Classifying IP Addresses

WHAT ABOUT IPv6?

Class A addresses

Class B addresses

Class C addresses

Subnetting

Subnets

Subnet masks

Network prefix notation

Default subnets

The great subnet roundup

IP block parties

Private and public addresses

Pondering Ports

Understanding Network Address Translation

Routing

Considering the Usefulness of Routers

Connecting to the Internet

Connecting remote locations

Splitting up large networks

Understanding Routing Tables

DHCP

Understanding DHCP

Configuration information provided by DHCP

DHCP servers

How DHCP actually works

Understanding Scopes

Scopes, subnets, and VLANs

Feeling excluded?

Reservations suggested

WHAT ABOUT BootP?

How long to lease?

Working with a DHCP Server

Installing a Windows Server 2019 DHCP server

Configuring a new scope

How to Configure a Windows DHCP Client

Automatic private IP addressing

Renewing and releasing leases

DNS

Understanding DNS Names

Domains and domain names

Fully qualified domain names

DNS AND URLs

Top-Level Domains

Generic domains

Geographic domains

The Hosts File

Understanding DNS Servers and Zones

Zones

THE OLD PHONY HOSTS FILE TRICK

Primary and secondary servers

Root servers

Caching

Understanding DNS Queries

A real-life DNS example

Zone Files and Resource Records

SOA records

NS records

A records

CNAME records

PTR records

MX records

Reverse Lookup Zones

Working with the Windows DNS Server

Creating a new zone

Creating a new host record

How to Configure a Windows DNS Client

TCP/IP Tools and Commands

Using the arp Command

Using the hostname Command

Using the ipconfig Command

Displaying basic IP configuration

Displaying detailed configuration information

Renewing an IP lease

Releasing an IP lease

Flushing the local DNS cache

Using the nbtstat Command

Using the netstat Command

Displaying connections

Displaying interface statistics

Using the nslookup Command

Looking up an IP address

Using nslookup subcommands

GET ME OUT OF HERE!

Displaying DNS records

Locating the mail server for an email address

Taking a ride through DNS-Land

Using the pathping Command

Using the ping Command

Using the route Command

Displaying the routing table

Modifying the routing table

Using the tracert Command

UNDERSTANDING HOW TRACERT WORKS

Planning a Network. Contents at a Glance

Local Area Networks

Making a Network Plan

Being Purposeful

Taking Stock

What you need to know

Programs that gather information for you

Considering Cable

Surmising Switches

Planning the Network Topology

Planning the TCP/IP Implementation

Drawing Diagrams

More Questions Your Network Plan Should Address

Wide Area Networks

Connecting to the Internet

Connecting with cable or DSL

Connecting with T1 lines

Connecting with fiber

Connecting with a cellular network

Choosing a Router

Choosing a small office router

Choosing an enterprise router

Choosing a cellular router

Securing Your Connection with a Firewall

Providing Redundancy for Your Internet Connection

Securing Connections to Remote Locations and Remote Users

Connecting Remote Offices with an Ethernet Private Line

Server Architecture

Deciding How Many Servers You Need

Deciding Which Servers You Need

Domain controllers

DHCP servers

Mail servers

File servers

Print servers

Web servers

Database servers

Application servers

Backup servers

License servers

Deployment servers

Update servers

Virtualization management platform

Connecting Your Servers

Virtualization Architecture

Understanding Virtualization

Understanding Hypervisors

Understanding Virtual Disks

Understanding Network Virtualization

Considering the Benefits of Virtualization

Choosing Virtualization Hosts

Understanding Windows Server 2019 Licensing

Storage Architecture

Planning Disk Capacity

Considering Disk Drive Types

Hard disk drives

Solid state drives

FORM FACTORS

Considering Drive Interfaces

SATA

SAS

Considering RAID

RAID 10

RAID 5

RAID 6

Considering Attachment Types

Direct attached storage

Storage area networks

Network-attached storage

Backup Architecture

Backup Basics

Considering Three Basic Types of Backup

Where to Back Up Your Data

Backing Up to Tape

Looking closer at LTO

Hardware for tape backup

A word about tape reliability

About cleaning the heads

Backing Up to NAS

Using a Backup Appliance

Understanding File-Based Backup

Types of file-based backups

Normal backups

Copy backups

Daily backups

Incremental backups

Differential backups

Understanding Image-Based Backups and Virtualization

Backup Security

Hyperconverged Infrastructure

Considering the Headaches of Traditional IT Architecture

Defining Hyperconverged Infrastructure

Discerning Deduplication

Understanding How Deduplication Works

HASHING FOR FUN AND PROFIT

Considering Backup

Digging into HCI Clusters

Incorporating HCI Into Your Plan

Implementing a Network. Contents at a Glance

Network Hardware

Working with Cable

Cable categories

CAT GOT YOUR TONGUE?

What’s with the pairs?

To shield or not to shield

When to use plenum cable

PLENUM SPACE

Sometimes solid, sometimes stranded

Installation guidelines

Getting the tools that you need

Pinouts for twisted-pair cables

Attaching RJ-45 connectors

Wall jacks and patch panels

Server rooms and distribution frames

Installing Switches

Wireless Networks

Installing a Wireless Access Point

Configuring a Wireless Access Point

Basic configuration options

DHCP configuration

Connecting to a Wireless Network

Paying Attention to Wireless Network Security

Understanding wireless security threats

Intruders

Freeloaders

Eavesdroppers

Spoilers

Rogue access points

Securing your wireless network

Changing the password

Securing the SSID

Enabling WEP

Using WPA and WPA2

Using MAC address filtering

DON’T NEGLECT THE BASICS

Placing your access points outside the firewall

Troubleshooting a wireless network

Checking for obvious problems

Pinpointing the problem

Changing channels

Fiddling with the antennas

Adding another access point

Help! I forgot my router’s password!

Windows Clients

Configuring Network Connections

Joining a Domain

Mac Networking

Basic Mac Network Settings

Joining a Domain

Connecting to a Share

Network Printers

Configuring Network Printers

Adding a network printer

Accessing a network printer using a web interface

Virtual Private Networks

Understanding VPN

ACCESSING YOUR COMPUTER REMOTELY

Looking at VPN Security

Understanding VPN Servers and Clients

Implementing Virtualization. Contents at a Glance

Hyper-V

Understanding the Hyper-V Hypervisor

Understanding Hyper-V Virtual Disks

Enabling Hyper-V

Getting Familiar with Hyper-V

Creating a Virtual Switch

Creating a Virtual Disk

Creating a Virtual Machine

Installing an Operating System

VMware

Looking at vSphere

Getting Started with VMware Workstation Pro

Creating a Virtual Machine

Installing VMware Tools

Azure

Looking at Azure Services

Creating an Azure Account

Examining the Azure Portal

Creating a Windows Virtual Machine

Managing an Azure Virtual Machine

Connecting to an Azure Virtual Machine

Amazon Web Services

Looking at What Amazon Web Services Can Do

Creating an Amazon Web Services Account

Examining the Amazon Web Services Console

Creating a Windows Virtual Machine

Managing an Amazon Web Services Virtual Machine

Connecting to an Amazon Web Services Virtual Machine

Desktop Virtualization

Introducing Desktop Virtualization

Considering Two Approaches to Desktop Virtualization

Looking at VMware’s Horizon View

Looking at Citrix XenApp

Implementing Windows Server 2019. Contents at a Glance

Installing Windows Server 2019

Planning a Windows Server Installation

Checking system requirements

Reading the release notes

Deciding whether to upgrade or install

Considering your licensing options

Thinking about multiboot

Planning your partitions

Deciding your TCP/IP configuration

Choosing workgroups or domains

Before You Install …

Backing up

Checking the event logs

Applying updates

Disconnecting UPS devices

Running Setup

Considering Your Next Steps

Adding Server Roles and Features

Configuring Windows Server 2019

Using the Administrator Account

Using Remote Desktop Connection

Enabling remote access

Connecting remotely

Using Microsoft Management Console

Working with MMC

Taking an overview of the MMC consoles

Customizing MMC

Configuring Active Directory

What Directories Do

Remembering the Good Ol’ Days of NT Domains

PDCs and BDCs

Trusts

NetBIOS names

Active Directory to the Rescue

Understanding How Active Directory Is Structured

Objects

Domains

Organizational units

Trees

Forests

Creating a New Domain

Creating an Organizational Unit

Configuring User Accounts

Understanding Windows User Accounts

Local accounts versus domain accounts

User account properties

Creating a New User

Setting User Properties

Changing the user’s contact information

Setting account options

Specifying logon hours

Restricting access to certain computers

Setting the user’s profile information

Resetting User Passwords

Disabling and Enabling User Accounts

Deleting a User

Working with Groups

Group types

Group scope

Default groups

Creating a group

Adding a member to a group

Working with User Profiles

Types of user profiles

Roaming profiles

Creating a Logon Script

Configuring a File Server

Understanding Permissions

Understanding Shares

Considering Best Practices for Setting Up Shares

Managing Your File Server

Using the New Share Wizard

Sharing a folder without the wizard

Granting permissions

Using Group Policy

Understanding Group Policy

Enabling Group Policy Management on Windows Server 2019

Creating Group Policy Objects

Filtering Group Policy Objects

Typing Windows Commands

Using a Command Window

Opening and closing a command window

Editing commands

Using the Control menu

Special Command Tricks

Wildcards

Chaining commands

Redirection and piping

Environment variables

Batch files

The EventCreate Command

Net Commands

The Net Accounts command

The Net Computer command

The Net Config command

The Net Continue command

The Net File command

The Net Group command

The Net Help command

The Net Helpmsg command

The Net Localgroup command

The Net Pause command

The Net Session command

The Net Share command

The Net Start command

The Net Statistics command

The Net Stop command

The Net Time command

The Net Use command

The Net User command

The Net View command

The RunAs Command

Using PowerShell

Using PowerShell

Understanding PowerShell Commands

Using Cmdlets

Using Parameters

Getting Help

Using Aliases

Using the Pipeline

Using Providers

Using Scripts

Administering Microsoft Office 365. Contents at a Glance

Getting Started with Office 365 Administration

Introducing Office 365

WAIT, IS IT OFFICE 365 OR MICROSOFT 365?

Considering Office 365 Plans

Understanding Tenants

Creating an Office 365 Tenant

Creating a New User

Resetting a User’s Password

Disabling a User

Configuring Exchange Online

Looking at Exchange Online Recipient Types

Examining the Exchange Admin Center

Managing Mailboxes

Creating an email alias

Delegating a mailbox

Converting a standard mailbox to a shared mailbox

Enabling or disabling mailbox apps

Creating a forwarder

Creating a Shared Mailbox

Administering Teams

What Is Teams?

A Brief Look at How Teams Works

Microsoft 365 Group

SharePoint

OneDrive for Business

Using the Teams Admin Center

Managing Teams

Implementing Linux. Contents at a Glance

Installing a Linux Server

Planning a Linux Server Installation

Checking system requirements

Choosing a distribution

Going virtual

Deciding on your TCP/IP configuration

Installing Fedora Server

VIRTUAL CONSOLES AND THE INSTALLATION PROGRAM

Linux Administration

On Again, Off Again

Logging in

Logging out

Shutting down

Wait, Where’s the Desktop?

Playing the Shell Game

Getting into Virtual Consoles

Using a Remote Console

Enabling the root User

Using the sudo Command

Understanding the file system

Looking at top-level directories

Browsing the file system

Using the RPM Package Manager

Listing packages

Installing packages

Removing packages

Updating packages

Editing Text Files with Vi

Starting vi

Saving changes and quitting Vi

Understanding Vi's operating modes

Moving around in a file

Inserting text

Deleting text

Changing text

Copying and pasting text

Repeating commands

Other useful Vi commands

Using Cockpit

Managing User Accounts

Basic Linux Network Configuration

Using Cockpit to Configure Network Interfaces

Working with Network Configuration Files

The Network file

The ifcfg files

The Hosts file

The resolv.conf file

Displaying Your Network Configuration with the ifconfig Command

Running DHCP and DNS

Running a DHCP Server

Installing DHCP

Configuring DHCP

Starting DHCP

Running a DNS Server

Installing BIND

Editing BIND configuration files

named.conf

named.ca

Zone files

Restarting BIND

Doing the Samba Dance

Understanding Samba

Installing Samba

Starting and Stopping Samba

Editing the smb.conf File

Configuring global settings

Creating a share

Using the Samba Client

Running Apache

Installing Apache

Starting and Stopping Apache

Opening the Firewall for Apache

Confirming That Apache Is Running

Looking at the httpd.config File

Understanding Access Rules

Configuring Virtual Hosts

Running Postfix

Understanding Email

Installing Postfix

Modifying main.cf

Using SpamAssassin

Installing SpamAssassin

Customizing SpamAssassin

Block listing and friends listing email addresses

Using the Mail Console Client

Linux Commands

Command Shell Basics

Getting to a shell

Editing commands

Wildcards

Redirection and piping

Environment variables

Shell scripts

Running a command with root-level privileges

Directory- and File-Handling Commands

The pwd command

The cd command

The mkdir command

The rmdir command

The ls command

The cp command

The rm command

The mv command

The touch command

The cat command

Commands for Working with Packages and Services

The service command

The yum and dnf commands

Commands for Administering Users

The useradd command

The usermod command

The userdel command

The chage command

The passwd command

The newusers command

The groupadd command

The groupdel command

The gpasswd command

Commands for Managing Ownership and Permissions

The chown command

The chgrp command

The chmod command

Networking Commands

The hostname command

The ifconfig command

The netstat command

The ping command

The route command

The traceroute command

Managing a Network. Contents at a Glance

Welcome to Network Administration

Knowing What Network Administrators Do

Choosing the Part-Time Administrator

Establishing Routine Chores

Managing Network Users

Patching Up Your Operating System and Software

Discovering Software Tools for Network Administrators

Building a Library

Getting Certified

CompTIA

Microsoft

Cisco

Gurus Need Gurus, Too

Helpful Bluffs and Excuses

Managing Remotely

Enabling Remote Desktop Connection

Connecting Remotely

Using Keyboard Shortcuts for Remote Desktop

Configuring Remote Desktop Options

Setting the Display options

Setting the Local Resources options

Setting the Experience options

Setting the Advanced options

Using Remote Assistance

Enabling Remote Assistance

Inviting Someone to Help You via a Remote Assistance Session

Responding to a Remote Assistance Invitation

Managing Network Assets

Introducing IT Asset Management

Why Bother?

Getting Organized

ISO/IEC 19770

What to Track

Taking Pictures

Picking a Number

Making Labels

DEVELOPING AN EQUIPMENT LOSS POLICY

Tracking Software

Using Asset-Tracking Software

Other Sources of Asset-Tracking Information

Solving Network Problems

When Bad Things Happen to Good Computers

Fixing Dead Computers

Ways to Check a Network Connection

A Bunch of Error Messages Just Flew By!

Double-Checking Your Network Settings

Time to Experiment

Who’s on First?

Restarting a Client Computer

Booting in Safe Mode

Using System Restore

Restarting Network Services

Restarting a Network Server

Looking at Event Logs

Documenting Your Trials and Tribulations

Managing Software Deployment

Understanding Software Licenses

Using a License Server

Options for Deploying Network Software

Deploying software manually

Running Setup from a network share

Installing silently

Creating an administrative installation image

Pushing out software with group policy

Keeping Software Up to Date

Managing Mobile Devices

The Many Types of Mobile Devices

Considering Security for Mobile Devices

Managing iOS Devices

Understanding the iPhone

Understanding the iPad

Integrating iOS devices with Exchange

Managing Android Devices

Looking at the Android OS

Perusing Android’s core applications

Integrating Android with Exchange

Dealing with Cybersecurity. Contents at a Glance

Securing Your Users

Knowing the Difference between Authentication and Authorization

Following Password Best Practices

COMING UP WITH A GREAT PASSWORD

Securing the Administrator Account

Understanding Multifactor Authentication

Securing the Human Firewall

Establishing cybersecurity policies

Training

Phish testing

Managing Firewalls and Virus Protection

Firewalls

The Many Types of Firewalls

Packet filtering

Stateful packet inspection (SPI)

Circuit-level gateway

Application gateway

Firewall Best Practices

The Built-In Windows Firewall

Configuring Windows Defender Firewall with Group Policy

Virus Protection

What is a virus?

Antivirus programs

Safe computing

Dealing with Spam

Defining Spam

Sampling the Many Flavors of Spam

Using Antispam Software

Understanding Spam Filters

Looking at Three Types of Antispam Software

On-premises antispam

Antispam appliances

Cloud-based antispam services

Minimizing Spam

Managing Disaster Recovery and Business Continuity Planning

Assessing Different Types of Disasters

Environmental disasters

Deliberate disasters

Disruption of services

Equipment failure

Other disasters

Analyzing the Impact of a Disaster

Developing a Business Continuity Plan

Holding a Fire Drill

Appendixes. Contents at a Glance

Directory of Useful Websites

Certification

Hardware

Home and Small-Business Networking

Linux

Magazines

Microsoft

Network Standards Organizations

Reference

TCP/IP and the Internet

Wireless Networking

Smartphones

Glossary

Index. Symbols and Numerics

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

About the Author

Dedication

Author’s Acknowledgments

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Welcome to the eighth edition of Networking All-in-One For Dummies, the one networking book that’s designed to replace an entire shelf full of the dull and tedious networking books you’d otherwise have to buy. This book contains all the basic and not-so-basic information you need to know to get a network up and running and to stay on top of the network as it grows, develops problems, and encounters trouble.

If you’re just getting started as a network administrator, this book is ideal. As a network administrator, you have to know about a lot of different topics: installing and configuring network hardware and software, planning a network, working with TCP/IP, securing your network, working with mobile devices, virtualizing your servers, backing up your data, managing cloud services, and many others.

.....

That’s the second most important thing to know. The first most important thing to know about hubs is that they’re almost never used anymore. That’s because simply repeating all incoming signals on all ports is an incredibly bad idea, for reasons that will become apparent later in this chapter and in Chapter 3 of this minibook. If your network still has hubs, you should seriously consider replacing them with switches, which are described in the next section and further explained in the next chapter.

A switch is a layer-2 device that is similar to a hub in that it allows you to connect more than one device, and packets received on one port are relayed to other ports. The difference, however, is that a switch is able to examine the actual contents of the data that it receives. As I explain in the “Pondering Packets” section, later in this chapter, data is sent in units called packets that contain a destination address. A switch looks at this destination address and repeats the incoming packet only on the port that can deliver the packet to the intended destination.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Networking All-in-One For Dummies
Подняться наверх