Book Image

Networking Fundamentals

By : Gordon Davies
Book Image

Networking Fundamentals

By: Gordon Davies

Overview of this book

A network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data. This book will help you become well versed in basic networking concepts and prepare to pass Microsoft's MTA Networking Fundamentals Exam 98-366. Following Microsoft's official syllabus, the book starts by covering network infrastructures to help you differentiate intranets, internets, and extranets, and learn about network topologies. You’ll then get up to date with common network hardware devices such as routers and switches and the media types used to connect them together. As you advance, the book will take you through different protocols and services and the requirements to follow a standardized approach to networking. You’ll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. Finally, you’ll be able to practice everything you’ve learned and take the exam confidently with the help of mock tests. By the end of this networking book, you’ll have developed a strong foundation in the essential networking concepts needed to pass Exam 98-366.
Table of Contents (23 chapters)
Free Chapter
1
Section 1: Network Infrastructure
7
Section 2: Network Hardware
11
Section 3: Protocols and Services
18
Section 4: Mock Exams
19
Mock Exam 1
20
Mock Exam 2

Understanding the application layer

Similar to its namesake in the OSI model, the application layer of the TCP/IP model acts as an interface between the applications themselves and the network stack, rather than the place the applications actually sit. Again, this is through the use of APIs and programming libraries. This layer performs the functionality of the application and the presentation layers of the OSI model, including the formatting, compression, and encryption of data.

There are a number of protocols in use on the application layer, and these can be divided into two areas:

  • User protocols
  • Support protocols

The user may have some involvement with the initial configuration of these, but then they are usually just left to do their own thing. We will discuss these protocols in more depth in upcoming sections.

...