Book Image

Networking Fundamentals

By : Gordon Davies
Book Image

Networking Fundamentals

By: Gordon Davies

Overview of this book

A network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data. This book will help you become well versed in basic networking concepts and prepare to pass Microsoft's MTA Networking Fundamentals Exam 98-366. Following Microsoft's official syllabus, the book starts by covering network infrastructures to help you differentiate intranets, internets, and extranets, and learn about network topologies. You’ll then get up to date with common network hardware devices such as routers and switches and the media types used to connect them together. As you advance, the book will take you through different protocols and services and the requirements to follow a standardized approach to networking. You’ll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. Finally, you’ll be able to practice everything you’ve learned and take the exam confidently with the help of mock tests. By the end of this networking book, you’ll have developed a strong foundation in the essential networking concepts needed to pass Exam 98-366.
Table of Contents (23 chapters)
Free Chapter
Section 1: Network Infrastructure
Section 2: Network Hardware
Section 3: Protocols and Services
Section 4: Mock Exams
Mock Exam 1
Mock Exam 2


In this chapter, we looked at the various IEEE 802.11 standards pertaining to wireless technologies, including their various attributes and access methods. We discussed factors that would influence our planning of wireless networks, and the two modes available, ad hoc and infrastructure mode. We talked about the configuration of these networks, before moving onto security, emphasizing the main methods for protecting our data.

From this chapter, you will have gained the ability to deploy a basic wireless network, ensuring that you have considered factors that would impact the performance of the network. You also learned how to configure a wireless access point with appropriate security settings for your environment.

In the next chapter, we will look at the various network topologies available to us. We will describe the use cases and highlight the pros and cons of each...