Book Image

Networking Fundamentals

By : Gordon Davies
Book Image

Networking Fundamentals

By: Gordon Davies

Overview of this book

A network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data. This book will help you become well versed in basic networking concepts and prepare to pass Microsoft's MTA Networking Fundamentals Exam 98-366. Following Microsoft's official syllabus, the book starts by covering network infrastructures to help you differentiate intranets, internets, and extranets, and learn about network topologies. You’ll then get up to date with common network hardware devices such as routers and switches and the media types used to connect them together. As you advance, the book will take you through different protocols and services and the requirements to follow a standardized approach to networking. You’ll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. Finally, you’ll be able to practice everything you’ve learned and take the exam confidently with the help of mock tests. By the end of this networking book, you’ll have developed a strong foundation in the essential networking concepts needed to pass Exam 98-366.
Table of Contents (23 chapters)
Free Chapter
Section 1: Network Infrastructure
Section 2: Network Hardware
Section 3: Protocols and Services
Section 4: Mock Exams
Mock Exam 1
Mock Exam 2


In this chapter, we discussed the minimal requirements that are needed to form a network. We highlighted how networks had grown away from the traditional idea of connecting personal computers together and moved toward the interconnectivity of a whole range of items. We introduced the concept of internets, intranets, and extranets while highlighting the subtle difference between internets and the Internet. Then, we went on to describe some of the basic security concepts involved in a network. Firewalls were discussed as a means of regulating traffic in and out of our network. Then, we covered demilitarized zones, or perimeter networks, and their use of providing public access to a subset of an organization's infrastructure. Next, VPNs and their implementation were introduced. Finally, we listed the security zones that are available in Windows operating systems and...