Networking For Dummies

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Set up a secure network at home or the office Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage of broadband and wireless technologies, as well as storage and back-up procedures, ensures that you’ll learn how to build a wired or wireless network, secure and optimize it, troubleshoot problems, and much more. From connecting to the Internet and setting up a wireless network to solving networking problems and backing up your data―this #1 bestselling guide covers it all. • Build a wired or wireless network • Secure and optimize your network • Set up a server and manage Windows user accounts • Use the cloud―safely Written by a seasoned technology author―and jam-packed with tons of helpful step-by-step instructions―this is the book network administrators and everyday computer users will turn to again and again.

Author(s): Doug Lowe
Series: For Dummies
Edition: 12
Publisher: Wiley
Year: 2020

Language: English
Commentary: Vector PDF
Pages: 480
City: Hoboken, NJ
Tags: Linux; Cloud Computing; macOS; Microsoft Office; Virtualization; Backup; Best Practices; Network Security; Wireless Networks; Spam Detection; Microsoft Windows; Networking; Packet Filtering; Ethernet; TCP/IP; Network Topology; Emergency Response; DHCP; Network Address Translation; Firewalls; Hyper-V; User Management; Physical Security; Email; Network Storage; Network Administration; Hybrid Cloud

Title Page
Copyright Page
Table of Contents
Introduction
About This Book
Foolish Assumptions
Icons Used in This Book
Beyond the Book
Where to Go from Here
Part 1 Getting Started with Networking
Chapter 1 Let’s Network!
Defining a Network
Why Bother with a Network?
Sharing files
Sharing resources
Sharing programs
Sharing messages
Servers and Clients
Dedicated Servers and Peers
What Makes a Network Tick?
It’s Not a Personal Computer Anymore!
The Network Administrator
What Have They Got That You Don’t Got?
Chapter 2 Configuring Windows and Mac Clients
Configuring Windows Network Connections
Joining a Windows Computer to a Domain
Configuring Mac Network Settings
Joining a Mac Computer to a Domain
Chapter 3 Life on the Network
Distinguishing between Local Resources and Network Resources
What’s in a Name?
Logging on to the Network
Understanding Shared Folders
Four Good Uses for a Shared Folder
Store files that everybody needs
Store your own files
Make a temporary resting place for files on their way to other users
Back up your local hard drive
Oh, the Network Places You’ll Go
Mapping Network Drives
Using a Network Printer
Adding a network printer
Printing to a network printer
Playing with the print queue
Logging off the Network
Chapter 4 More Ways to Use Your Network
Sharing Your Stuff
Enabling File and Printer Sharing
Sharing a Folder
Using the Public Folder
Sharing a Printer
Using Microsoft Office on a Network
Accessing network files
Using workgroup templates
Networking an Access database
Working with Offline Files
Part 2 Designing Your Network
Chapter 5 Planning a Network
Making a Network Plan
Being Purposeful
Taking Stock
What you need to know
Programs that gather information for you
To Dedicate or Not to Dedicate: That Is the Question
File servers
Print servers
Web servers
Mail servers
Database servers
Application servers
License servers
Choosing a Server Operating System
Planning the Infrastructure
Drawing Diagrams
Chapter 6 Dealing with TCP/IP
Understanding Binary
Counting by ones
Doing the logic thing
Introducing IP Addresses
Networks and hosts
The dotted-decimal dance
Classifying IP Addresses
Class A addresses
Class B addresses
Class C addresses
Subnetting
Subnets
Subnet masks
The great subnet roundup
Private and public addresses
Understanding Network Address Translation
Configuring Your Network for DHCP
Understanding DHCP
DHCP servers
Understanding scopes
Feeling excluded?
Reservations suggested
How long to lease?
Managing a Windows Server 2019 DHCP Server
Configuring a Windows DHCP Client
Using DNS
Domains and domain names
Fully qualified domain names
Working with the Windows DNS Server
Configuring a Windows DNS Client
Chapter 7 Oh, What a Tangled Web We Weave: Cables and Switches
What Is Ethernet?
All about Cable
Cable categories
What’s with the pairs?
To shield or not to shield
When to use plenum cable
Sometimes solid, sometimes stranded
Installation guidelines
The tools you need
Pinouts for twisted-pair cables
RJ-45 connectors
Crossover cables
Wall jacks and patch panels
Understanding Switches
Comparing managed and unmanaged switches
Daisy-chaining switches
Stacking switches
Looking at distribution switches and access switches
Powering Up with Power over Ethernet
Looking at Three Types of Network Rooms
Chapter 8 Setting Up a Wireless Network
Diving into Wireless Networking
A Little High School Electronics
Waves and frequencies
Wavelength and antennas
Spectrums and the FCC
Eight-Oh-Two-Dot-Eleventy Something: Understanding Wireless Standards
Home on the Range
Using Wireless Network Adapters
Setting Wireless Access Points
Infrastructure mode
Multifunction WAPs
Roaming Capabilities
Wireless bridging
Ad-hoc networks
Configuring a Wireless Access Point
Basic configuration options
DHCP configuration
Connecting to a Wireless Network
Paying Attention to Wireless Network Security
Chapter 9 Connecting to the Internet
Connecting to the Internet
Connecting with cable or DSL
Connecting with high-speed private lines
Sharing an Internet connection
Securing Your Connection with a Firewall
Using a firewall
Comparing residential gateways to firewall routers
Looking at the built-in Windows firewall
Providing a Backup Internet Connection
Part 3 Working with Servers
Chapter 10 Virtualizing Your Network
Understanding Virtualization
Understanding Hypervisors
Understanding Virtual Disks
Understanding Network Virtualization
Looking at the Benefits of Virtualization
Choosing Virtualization Hosts
Understanding Windows Server 2019 Licensing
Introducing Hyper-V
Understanding the Hyper-V hypervisor
Understanding virtual disks
Enabling Hyper-V
Getting Familiar with Hyper-V
Creating a Virtual Switch
Creating a Virtual Disk
Creating a Virtual Machine
Installing an Operating System
Chapter 11 Setting Up a Windows Server
Planning a Windows Server Installation
Checking system requirements
Reading the release notes
Considering your licensing options
Deciding your TCP/IP configuration
Choosing workgroups or domains
Running Setup
Adding Server Roles and Features
Creating a New Domain
Chapter 12 Managing Windows User Accounts
Understanding How Active Directory Is Organized
Objects
Domains
Organizational units
Trees
Forests
Understanding Windows User Accounts
Local accounts versus domain accounts
User account properties
Creating a New User
Setting User Properties
Changing the user’s contact information
Setting account options
Specifying logon hours
Restricting access to certain computers
Setting the user’s profile information
Resetting User Passwords
Disabling and Enabling User Accounts
Deleting a User
Working with Groups
Creating a group
Adding a member to a group
Creating a Logon Script
Chapter 13 Managing Network Storage
Understanding Disk Storage
Hard disk drives
Solid state drives to the rescue!
It’s a RAID!
Three ways to attach disks to your servers
Focusing on File Servers
Understanding permissions
Understanding shares
Managing Your File Server
Using the New Share Wizard
Sharing a folder without the wizard
Granting permissions
Part 4 Managing Your Network
Chapter 14 Welcome to Network Management
What a Network Administrator Does
Choosing the Part-Time Administrator
The Three “Ups” of Network Management
Managing Network Users
Acquiring Software Tools for Network Administrators
Building a Library
Pursuing Certification
Helpful Bluffs and Excuses
Chapter 15 Supporting Your Users
Establishing the Help Desk’s Charter
Tracking Support Tickets
Deciding How to Communicate with Users
Using Remote Assistance
Enabling Remote Assistance
Inviting someone to help you via a Remote Assistance session
Responding to a Remote Assistance invitation
Creating a Knowledge Base
Creating a Self-Service Help Portal
Using Satisfaction Surveys
Tracking Help Desk Performance
Using Help Desk Management Software
Chapter 16 Using Group Policy
Understanding Group Policy
Enabling Group Policy Management on Windows Server 2019
Creating Group Policy Objects
Filtering Group Policy Objects
Forcing Group Policy Updates
Chapter 17 Managing Software Deployment
Understanding Software Licenses
Using a License Server
Deploying Network Software
Deploying software manually
Running Setup from a network share
Installing silently
Creating an administrative installation image
Pushing out software with Group Policy
Keeping Software Up to Date
Chapter 18 Managing Mobile Devices
The Many Types of Mobile Devices
Considering Security for Mobile Devices
Managing iOS Devices
Understanding the iPhone
Understanding the iPad
Integrating iOS devices with Exchange
Configuring an iOS device for Exchange email
Managing Android Devices
Looking at the Android OS
Perusing Android’s core applications
Integrating Android with Exchange
Part 5 Securing Your Network
Chapter 19 Welcome to Cybersecurity Network
Do You Need Security?
The Three Pillars of Cybersecurity
Two Approaches to Security
Physical Security: Locking Your Doors
Securing User Accounts
Obfuscating your usernames
Using passwords wisely
Generating passwords For Dummies
Secure the Administrator account
Managing User Security
User accounts
Built-in accounts
User rights
Permissions (who gets what)
Group therapy
User profiles
Logon scripts
Securing the Human Firewall
Chapter 20 Hardening Your Network
Firewalls
The Many Types of Firewalls
Packet filtering
Stateful packet inspection (SPI)
Circuit-level gateway
Application gateway
Next-generation firewall
Virus Protection
What is a virus?
Antivirus programs
Safe computing
Patching Things Up
Chapter 21 Securing Your Email
Defining Spam
Sampling the Many Flavors of Spam
Using Antispam Software
Understanding Spam Filters
Looking at Three Types of Antispam Software
On-premises antispam
Antispam appliances
Cloud-based antispam services
Minimizing Spam
Chapter 22 Backing Up Your Data
3-2-1: The Golden Rule of Backups
How Often Should You Back Up Your Data?
Choosing Where to Back Up Your Data
Establishing Two Key Backup Objectives
Backing Up to Tape
Understanding Backup Software
Examining File-Based Backups
Full backups
Copy backups
Incremental backups
Differential backups
Backup and Virtualization
Verifying Tape Reliability
Keeping Backup Equipment Clean and Reliable
Setting Backup Security
Chapter 23 Planning for Disaster
Assessing Different Types of Disasters
Environmental disasters
Deliberate disasters
Disruption of services
Equipment failure
Other disasters
Analyzing the Impact of a Disaster
Developing a Business Continuity Plan
Holding a Fire Drill
Part 6 More Ways to Network
Chapter 24 Accommodating Remote Users
Using Outlook Web App
Using a Virtual Private Network
Looking at VPN security
Understanding VPN servers and clients
Connecting with Remote Desktop Connection
Enabling Remote Desktop Connection
Connecting remotely
Using keyboard shortcuts for Remote Desktop
Chapter 25 Life in Cloud City
Introducing Cloud Computing
Looking at the Benefits of Cloud Computing
Detailing the Drawbacks of Cloud Computing
Examining Three Basic Kinds of Cloud Services
Applications
Platforms
Infrastructure
Public Clouds versus Private Clouds
Introducing Some of the Major Cloud Providers
Amazon
Google
Microsoft
Getting into the Cloud
Chapter 26 Going Hybrid
What Is a Hybrid Cloud?
What Are the Benefits of Hybrid Cloud?
Elasticity
Flexibility
Agility
Innovation
Operational efficiency
Integrating Identity
Azure Active Directory
Single sign-on
Looking at Hybrid Cloud Virtualization Platforms
Part 7 The Part of Tens
Chapter 27 Ten Networking Commandments
I. Thou Shalt Back Up Thy Data Religiously
II. Thou Shalt Protect Thy Network from Infidels
III. Thou Shalt Train Up Thy Users in the Ways of Safe Computing
IV. Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files
V. Thou Shalt Not Tinker with Thine Network Configuration unless Thou Knowest What Thou Art Doing
VI. Thou Shalt Not Covet Thy Neighbor’s Network
VII. Thou Shalt Not Take Down Thy Network without Proper Notification
VIII. Thou Shalt Keep an Adequate Supply of Spare Parts
IX. Thou Shalt Not Steal Thy Neighbor’s Program without a License
X. Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone
Chapter 28 Ten Big Network Mistakes
Skimping on Hardware
Turning Off or Restarting a Server Computer While Users Are Logged On
Deleting Important Files on the Server
Copying a File from the Server, Changing It, and Then Copying It Back
Sending Something to the Printer Again Just Because It Didn’t Print the First Time
Assuming That the Server Is Safely Backed Up
Connecting to the Internet without Considering Security Issues
Plugging in a Wireless Access Point without Asking
Thinking You Can’t Work Just Because the Network Is Down
Running Out of Space on a Server
Always Blaming the Network
Chapter 29 Ten Things You Should Keep in Your Closet
Duct Tape
Tools
Patch Cables
Cable Ties and Velcro
Twinkies
Replacement Parts
Cheap Network Switches
The Complete Documentation of the Network on Tablets of Stone
The Network Manuals and Disks
Ten Copies of This Book
Index
EULA