Book Image

Networking Fundamentals

By : Gordon Davies
Book Image

Networking Fundamentals

By: Gordon Davies

Overview of this book

A network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data. This book will help you become well versed in basic networking concepts and prepare to pass Microsoft's MTA Networking Fundamentals Exam 98-366. Following Microsoft's official syllabus, the book starts by covering network infrastructures to help you differentiate intranets, internets, and extranets, and learn about network topologies. You’ll then get up to date with common network hardware devices such as routers and switches and the media types used to connect them together. As you advance, the book will take you through different protocols and services and the requirements to follow a standardized approach to networking. You’ll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. Finally, you’ll be able to practice everything you’ve learned and take the exam confidently with the help of mock tests. By the end of this networking book, you’ll have developed a strong foundation in the essential networking concepts needed to pass Exam 98-366.
Table of Contents (23 chapters)
Free Chapter
Section 1: Network Infrastructure
Section 2: Network Hardware
Section 3: Protocols and Services
Section 4: Mock Exams
Mock Exam 1
Mock Exam 2


We have already introduced the concept of firewalls in Chapter 1, Differentiating between Internets, Intranets, and Extranets. Recall that a firewall can either block or deny network traffic based upon certain criteria. In this section, we will look at the common forms of firewall.

Packet-filtering firewalls

Packet-filtering firewalls are the most basic of firewalls. They are able to block or allow network traffic based on source or destination IP address, ports, or protocols within the header of the traffic. Because only the header is inspected and no analysis of the actual payload of the network traffic is carried out, this is quite a fast process. The downside to this is that it is not very secure, as traffic...