본문 바로가기

리디 접속이 원활하지 않습니다.
강제 새로 고침(Ctrl + F5)이나 브라우저 캐시 삭제를 진행해주세요.
계속해서 문제가 발생한다면 리디 접속 테스트를 통해 원인을 파악하고 대응 방법을 안내드리겠습니다.
테스트 페이지로 이동하기

Networking Fundamentals 상세페이지

Networking Fundamentals

Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366

  • 관심 0
소장
전자책 정가
23,000원
판매가
23,000원
출간 정보
  • 2019.12.17 전자책 출간
듣기 기능
TTS(듣기) 지원
파일 정보
  • PDF
  • 495 쪽
  • 37.0MB
지원 환경
  • PC뷰어
  • PAPER
ISBN
9781838648749
ECN
-
Networking Fundamentals

작품 정보

▶Book Description
A network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data. This book will help you become well versed in basic networking concepts and prepare to pass Microsoft's MTA Networking Fundamentals Exam 98-366.

Following Microsoft's official syllabus, the book starts by covering network infrastructures to help you differentiate intranets, internets, and extranets, and learn about network topologies. You’ll then get up to date with common network hardware devices such as routers and switches and the media types used to connect them together. As you advance, the book will take you through different protocols and services and the requirements to follow a standardized approach to networking. You’ll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. Finally, you’ll be able to practice everything you’ve learned and take the exam confidently with the help of mock tests.

By the end of this networking book, you’ll have developed a strong foundation in the essential networking concepts needed to pass Exam 98-366.

▶What You Will Learn
- Become well versed in networking topologies and concepts
- Understand network infrastructures such as intranets, extranets, and more
- Explore network switches, routers, and other network hardware devices
- Get to grips with different network protocols and models such as OSI and TCP/IP
- Work with a variety of network services such as DHCP, NAT, firewalls, and remote access
- Apply networking concepts in different real-world scenarios

▶Key Features
- Build a strong foundation in networking concepts
- Explore both the hardware and software aspects of networking
- Prepare by taking mock tests with up-to-date exam questions

▶Who This Book Is For
If you’re new to the IT industry or simply want to gain a thorough understanding of networking, this book is for you. A basic understanding of the Windows operating system and your network environment will be helpful.

▶What this book covers
- Chapter 1, Differentiating between Internets, Intranets, and Extranets, provides you with an understanding of what a network is, before going into the details of internets, intranets, and extranets, describing each of these in turn. The chapter also introduces a number of basic security mechanisms, including firewalls and demilitarized zones. It goes on to explain how to configure internet security zones on a Windows client.

- Chapter 2, Understanding Local Area Networks, gives you an overview of what the author describes as scales of networks, defining the differences between LANs, WANs, PANs, MANs, and CANs. In this chapter, we focus on local area networking, and explain the use of IP addresses, hostnames, and MAC addresses to identify devices on a network. Following on from this, it describes the key characteristics of wired and wireless networks, before concluding with a discussion of virtual local area networks (VLANs).

- Chapter 3, Understanding Wide Area Networks, introduces the concept of WANs, and explains the steps required to set up and configure a broadband connection. It goes on to discuss the various WAN technologies, including circuit switching, packet switching, frame relay, and leased lines. It looks at dial-up and takes you through the process of setting this up. The chapter also focuses on carrier standards, and looks at those in use, including ISDN, xDSL, SONET, satellite, and cellular.

- Chapter 4, Understanding Wireless Networking, focuses on the ever-developing technology of wireless, specifically Wi-Fi. The chapter begins by exploring the various IEEE 802.11 standards, discussing the attributes of each, and the CSMA/CA access method. We then move on to discuss wireless topologies, before concluding the chapter by covering wireless security methods.

- Chapter 5, Network Topologies – Mapping It All Out, looks at various topologies in use in modern networks, beginning with differentiating between logical and physical topologies. The chapter then moves on to cover bus, ring, star, mesh, and hybrid topologies, discussing the attributes of each.

- Chapter 6, Switches and Switching – Forwarding Traffic on a Local Network, looks at how data moves around a local network. It begins by explaining the purpose of switching and how frame-forwarding decisions are made, before focusing on the use of spanning-tree protocols to combat broadcast storms. The chapter then covers the characteristics of switches, such as managed versus unmanaged, connectivity, ports, and VLANs, and finishes with a discussion of switch security.

- Chapter 7, Routers and Routing – Beyond a Single Network, moves us into the realm of moving data between networks, and begins by looking at how routing decisions are made, and discusses static and default routes. The chapter then moves on to provide an overview of distance vector, link-state, and hybrid protocols. It then explains the steps required to implement routing on a Windows Server, before concluding the chapter with a discussion of network address translation and quality of service.

- Chapter 8, Media Types – Connecting Everything Together, discusses the various means of physically connecting networking devices. The chapter looks at the attributes of each cable type – coaxial, twisted pair, and fiber optic – and a use case of each.

- Chapter 9, Understanding the OSI Model, introduces the concept of network models before focusing on the OSI model. We take each of the seven layers of the OSI model in turn, discussing the functionality of each, and, where applicable, discuss the use of ports and highlight common protocols for the layers.

- Chapter 10, Understanding TCP/IP, looks at the second of the two common network models. It provides a comparison between this and the OSI model, and explains the functionality of each layer.

- Chapter 11, Understanding IPv4, discusses the most common of the addressing schemes in use today. The chapter begins by providing an overview of IPv4, in particular, the structure of an IPv4 address. It then moves on to discuss the five classes of IPv4 available, including, where appropriate, providing a distinction between public and private address ranges. Following on from this, subnet masks and their purposes are covered, before moving on to classless inter-domain routing. Finally, the chapter explains the steps in assigning IPv4 addresses to hosts.

- Chapter 12, Understanding IPv6, introduces you to the successor to IPv4, namely, IPv6. An overview of IPv6 is provided, including the syntax of an IPv6 address, and the rules for representing an IPv6 address in a shortened format. The chapter then moves on to discuss the various address types and prefixes, and how IPv6 addresses are assigned. The chapter concludes by covering methods of interoperability between IPv4 and IPv6.

- Chapter 13, Understanding Name Resolution, discusses the purpose of name resolution in modern networks. We cover the most prevalent method, Domain Name Service (DNS), explaining the use of fully qualified domain names, and how they link to DNS records to provide resolution. The chapter then explains how host files are used to provide a localized static name resolution methodology, before looking at the relative legacy name resolution provided by Windows Internet Name Service (WINS).

- Chapter 14, Network Services, rounds up a number of common network services. The chapter begins by disusing Dynamic Host Configuration Protocol (DHCP), including how it operates, and explains the steps to setting this up on a server. We then move on to covering firewalls, providing differentiation between how each type of firewall operates. Next, an overview of proxy servers is provided, before we move on to remote desktop services and explain the steps for connecting to such a service. The chapter then explains the difference between active and passive file transfer protocols. Following this, the chapter covers file servers, and introduces the concepts of share and NTFS permissions. The chapter concludes by discussing print servers and domain controllers.

- Chapter 15, Mock Exam 1, provides you with an opportunity to test the knowledge that you have acquired throughout this book by means of a 40-question mock exam.

- Chapter 16, Mock Exam 2, provides a second mock exam of 40 questions to test your knowledge even further.

작가 소개

▶About the Author
- Gordon Davies
Gordon Davies has been in the IT industry for 18 years. He has worked for a number of high profile UK national and global organizations with a particular focus on networking and infrastructure. More recently, Gordon has provided IT training to IT apprentices in the UK undertaking infrastructure, networking, and cybersecurity apprenticeships. Gordon has recently joined an international cybersecurity service provider as a cybersecurity analyst.

리뷰

0.0

구매자 별점
0명 평가

이 작품을 평가해 주세요!

건전한 리뷰 정착 및 양질의 리뷰를 위해 아래 해당하는 리뷰는 비공개 조치될 수 있음을 안내드립니다.
  1. 타인에게 불쾌감을 주는 욕설
  2. 비속어나 타인을 비방하는 내용
  3. 특정 종교, 민족, 계층을 비방하는 내용
  4. 해당 작품의 줄거리나 리디 서비스 이용과 관련이 없는 내용
  5. 의미를 알 수 없는 내용
  6. 광고 및 반복적인 글을 게시하여 서비스 품질을 떨어트리는 내용
  7. 저작권상 문제의 소지가 있는 내용
  8. 다른 리뷰에 대한 반박이나 논쟁을 유발하는 내용
* 결말을 예상할 수 있는 리뷰는 자제하여 주시기 바랍니다.
이 외에도 건전한 리뷰 문화 형성을 위한 운영 목적과 취지에 맞지 않는 내용은 담당자에 의해 리뷰가 비공개 처리가 될 수 있습니다.
아직 등록된 리뷰가 없습니다.
첫 번째 리뷰를 남겨주세요!
'구매자' 표시는 유료 작품 결제 후 다운로드하거나 리디셀렉트 작품을 다운로드 한 경우에만 표시됩니다.
무료 작품 (프로모션 등으로 무료로 전환된 작품 포함)
'구매자'로 표시되지 않습니다.
시리즈 내 무료 작품
'구매자'로 표시되지 않습니다. 하지만 같은 시리즈의 유료 작품을 결제한 뒤 리뷰를 수정하거나 재등록하면 '구매자'로 표시됩니다.
영구 삭제
작품을 영구 삭제해도 '구매자' 표시는 남아있습니다.
결제 취소
'구매자' 표시가 자동으로 사라집니다.

개발/프로그래밍 베스트더보기

  • 핸즈온 LLM (제이 알아마르, 마르턴 흐루턴도르스트)
  • 조코딩의 AI 비트코인 자동 매매 시스템 만들기 (조동근)
  • 모던 소프트웨어 엔지니어링 (데이비드 팔리, 박재호)
  • 요즘 우아한 AI 개발 (우아한형제들)
  • 주니어 백엔드 개발자가 반드시 알아야 할 실무 지식 (최범균)
  • 개정판 | 혼자 공부하는 머신러닝+딥러닝 (박해선)
  • 개정4판 | 스위프트 프로그래밍 (야곰)
  • 웹 접근성 바이블 (이하라 리키야, 고바야시 다이스케)
  • Do it! LLM을 활용한 AI 에이전트 개발 입문 (이성용)
  • 혼자 공부하는 네트워크 (강민철)
  • 컴퓨터 밑바닥의 비밀 (루 샤오펑, 김진호)
  • 7가지 프로젝트로 배우는 LLM AI 에이전트 개발 (황자, 김진호)
  • 러닝 랭체인 (메이오 오신, 누노 캄포스)
  • LLM 엔지니어링 (막심 라본, 폴 이우수틴)
  • 멀티패러다임 프로그래밍 (유인동)
  • LLM 서비스 설계와 최적화 (슈레야스 수브라마니암, 김현준)
  • 이펙티브 소프트웨어 설계 (토마스 레렉, 존 스키트)
  • 테스트 너머의 QA 엔지니어링 (김명관)
  • 혼자 공부하는 컴퓨터 구조+운영체제 (강민철)
  • 기획자로 산다는 것 (카카)

본문 끝 최상단으로 돌아가기

spinner
앱으로 연결해서 다운로드하시겠습니까?
닫기 버튼
대여한 작품은 다운로드 시점부터 대여가 시작됩니다.
앱으로 연결해서 보시겠습니까?
닫기 버튼
앱이 설치되어 있지 않으면 앱 다운로드로 자동 연결됩니다.
모바일 버전