0%

Your ultimate one-stop networking reference  

Designed to replace that groaning shelf-load of dull networking books you’d otherwise have to buy and house, Networking All-in-One For Dummies covers all the basic and not-so-basic information you need to get a network up and running. It also helps you keep it running as it grows more complicated, develops bugs, and encounters all the fun sorts of trouble you expect from a complex system. Ideal both as a starter for newbie administrators and as a handy quick reference for pros, this book is built for speed, allowing you to get past all the basics—like installing and configuring hardware and software, planning your network design, and managing cloud services—so you can get on with what your network is actually intended to do.  

In a friendly, jargon-free style, Doug Lowe—an experienced IT Director and prolific tech author—covers the essential, up-to-date information for networking in systems such as Linux and Windows 10 and clues you in on best practices for security, mobile, and more. Each of the nine minibooks demystifies the basics of one key area of network management.   

  • Plan and administrate your network 
  • Implement virtualization 
  • Get your head around networking in the Cloud 
  • Lock down your security protocols  

The best thing about this book? You don’t have to read it all at once to get things done; once you’ve solved the specific issue at hand, you can put it down again and get on with your life. And the next time you need it, it’ll have you covered.  

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Introduction
    1. About This Book
    2. Foolish Assumptions
    3. Icons Used in This Book
    4. Beyond the Book
    5. Where to Go from Here
  5. Book 1: Getting Started with Networking
    1. Chapter 1: Welcome to Networking
    2. Defining a Network
    3. Delving into Network Lingo
    4. Why Bother with a Network?
    5. Servers and Clients
    6. Dedicated Servers and Peers
    7. What Makes a Network Tick?
    8. Putting the Pieces Together
    9. Networks Big and Small
    10. It’s Not a Personal Computer Anymore!
    11. The Network Administrator
    12. Chapter 2: Network Infrastructure
    13. Introducing Infrastructure
    14. Understanding Network Protocols and Standards
    15. Recognizing Network Topology
    16. Considering Cable
    17. Perusing Ports, Interfaces, and MAC Addresses
    18. Pondering Packets
    19. Contemplating Collisions
    20. Dealing with Broadcast Packets
    21. Examining Wireless Networks
    22. Chapter 3: Switches, Routers, and VLANs
    23. Understanding Switches
    24. Looking Deeper into Switches
    25. Understanding Routers
    26. Understanding VLANs
    27. Chapter 4: Cybersecurity
    28. But We’re a Small Business — Do We Need Security?
    29. The Two Pillars of Cybersecurity
    30. Cybersecurity Frameworks
    31. The NIST Cybersecurity Framework
    32. Chapter 5: Servers and Virtualization
    33. Understanding Network Operating Systems
    34. What’s Important in a Server
    35. Components of a Server Computer
    36. Considering Server Form Factors
    37. Considering Virtualization
    38. Chapter 6: Cloud Computing
    39. Introducing Cloud Computing
    40. Looking at the Benefits of Cloud Computing
    41. Detailing the Drawbacks of Cloud Computing
    42. Examining Three Basic Kinds of Cloud Services
    43. Public Clouds versus Private Clouds
    44. Introducing Some of the Major Cloud Providers
    45. Getting Into the Cloud
  6. Book 2: Understanding Network Protocols
    1. Chapter 1: Network Protocols and Standards
    2. Understanding Protocols
    3. Understanding Standards
    4. Seeing the Seven Layers of the OSI Reference Model
    5. Following a Packet through the Layers
    6. The Ethernet Protocol
    7. The TCP/IP Protocol Suite
    8. Other Protocols Worth Knowing About
    9. Chapter 2: TCP/IP and the Internet
    10. What Is the Internet?
    11. A Little Internet History
    12. TCP/IP Standards and RFCs
    13. The TCP/IP Protocol Framework
    14. Chapter 3: IP Addresses
    15. Understanding Binary
    16. Introducing IP Addresses
    17. Classifying IP Addresses
    18. Subnetting
    19. Pondering Ports
    20. Understanding Network Address Translation
    21. Chapter 4: Routing
    22. Considering the Usefulness of Routers
    23. Understanding Routing Tables
    24. Chapter 5: DHCP
    25. Understanding DHCP
    26. Understanding Scopes
    27. Working with a DHCP Server
    28. How to Configure a Windows DHCP Client
    29. Chapter 6: DNS
    30. Understanding DNS Names
    31. Top-Level Domains
    32. The Hosts File
    33. Understanding DNS Servers and Zones
    34. Understanding DNS Queries
    35. Zone Files and Resource Records
    36. Reverse Lookup Zones
    37. Working with the Windows DNS Server
    38. How to Configure a Windows DNS Client
    39. Chapter 7: TCP/IP Tools and Commands
    40. Using the arp Command
    41. Using the hostname Command
    42. Using the ipconfig Command
    43. Using the nbtstat Command
    44. Using the netstat Command
    45. Using the nslookup Command
    46. Using the pathping Command
    47. Using the ping Command
    48. Using the route Command
    49. Using the tracert Command
  7. Book 3: Planning a Network
    1. Chapter 1: Local Area Networks
    2. Making a Network Plan
    3. Being Purposeful
    4. Taking Stock
    5. Considering Cable
    6. Surmising Switches
    7. Planning the Network Topology
    8. Planning the TCP/IP Implementation
    9. Drawing Diagrams
    10. More Questions Your Network Plan Should Address
    11. Chapter 2: Wide Area Networks
    12. Connecting to the Internet
    13. Choosing a Router
    14. Securing Your Connection with a Firewall
    15. Providing Redundancy for Your Internet Connection
    16. Securing Connections to Remote Locations and Remote Users
    17. Connecting Remote Offices with an Ethernet Private Line
    18. Chapter 3: Server Architecture
    19. Deciding How Many Servers You Need
    20. Deciding Which Servers You Need
    21. Connecting Your Servers
    22. Chapter 4: Virtualization Architecture
    23. Understanding Virtualization
    24. Understanding Hypervisors
    25. Understanding Virtual Disks
    26. Understanding Network Virtualization
    27. Considering the Benefits of Virtualization
    28. Choosing Virtualization Hosts
    29. Understanding Windows Server 2019 Licensing
    30. Chapter 5: Storage Architecture
    31. Planning Disk Capacity
    32. Considering Disk Drive Types
    33. Considering Drive Interfaces
    34. Considering RAID
    35. Considering Attachment Types
    36. Chapter 6: Backup Architecture
    37. Backup Basics
    38. Considering Three Basic Types of Backup
    39. Where to Back Up Your Data
    40. Backing Up to Tape
    41. Backing Up to NAS
    42. Using a Backup Appliance
    43. Understanding File-Based Backup
    44. Understanding Image-Based Backups and Virtualization
    45. Backup Security
    46. Chapter 7: Hyperconverged Infrastructure
    47. Considering the Headaches of Traditional IT Architecture
    48. Defining Hyperconverged Infrastructure
    49. Discerning Deduplication
    50. Understanding How Deduplication Works
    51. Considering Backup
    52. Digging into HCI Clusters
    53. Incorporating HCI Into Your Plan
  8. Book 4: Implementing a Network
    1. Chapter 1: Network Hardware
    2. Working with Cable
    3. Installing Switches
    4. Chapter 2: Wireless Networks
    5. Installing a Wireless Access Point
    6. Configuring a Wireless Access Point
    7. Connecting to a Wireless Network
    8. Paying Attention to Wireless Network Security
    9. Chapter 3: Windows Clients
    10. Configuring Network Connections
    11. Joining a Domain
    12. Chapter 4: Mac Networking
    13. Basic Mac Network Settings
    14. Joining a Domain
    15. Connecting to a Share
    16. Chapter 5: Network Printers
    17. Configuring Network Printers
    18. Chapter 6: Virtual Private Networks
    19. Understanding VPN
    20. Looking at VPN Security
    21. Understanding VPN Servers and Clients
  9. Book 5: Implementing Virtualization
    1. Chapter 1: Hyper-V
    2. Understanding the Hyper-V Hypervisor
    3. Understanding Hyper-V Virtual Disks
    4. Enabling Hyper-V
    5. Getting Familiar with Hyper-V
    6. Creating a Virtual Switch
    7. Creating a Virtual Disk
    8. Creating a Virtual Machine
    9. Installing an Operating System
    10. Chapter 2: VMware
    11. Looking at vSphere
    12. Getting Started with VMware Workstation Pro
    13. Creating a Virtual Machine
    14. Installing VMware Tools
    15. Chapter 3: Azure
    16. Looking at Azure Services
    17. Creating an Azure Account
    18. Examining the Azure Portal
    19. Creating a Windows Virtual Machine
    20. Managing an Azure Virtual Machine
    21. Connecting to an Azure Virtual Machine
    22. Chapter 4: Amazon Web Services
    23. Looking at What Amazon Web Services Can Do
    24. Creating an Amazon Web Services Account
    25. Examining the Amazon Web Services Console
    26. Creating a Windows Virtual Machine
    27. Managing an Amazon Web Services Virtual Machine
    28. Connecting to an Amazon Web Services Virtual Machine
    29. Chapter 5: Desktop Virtualization
    30. Introducing Desktop Virtualization
    31. Considering Two Approaches to Desktop Virtualization
    32. Looking at VMware’s Horizon View
    33. Looking at Citrix XenApp
  10. Book 6: Implementing Windows Server 2019
    1. Chapter 1: Installing Windows Server 2019
    2. Planning a Windows Server Installation
    3. Before You Install …
    4. Running Setup
    5. Considering Your Next Steps
    6. Adding Server Roles and Features
    7. Chapter 2: Configuring Windows Server 2019
    8. Using the Administrator Account
    9. Using Remote Desktop Connection
    10. Using Microsoft Management Console
    11. Customizing MMC
    12. Chapter 3: Configuring Active Directory
    13. What Directories Do
    14. Remembering the Good Ol’ Days of NT Domains
    15. Active Directory to the Rescue
    16. Understanding How Active Directory Is Structured
    17. Creating a New Domain
    18. Creating an Organizational Unit
    19. Chapter 4: Configuring User Accounts
    20. Understanding Windows User Accounts
    21. Creating a New User
    22. Setting User Properties
    23. Resetting User Passwords
    24. Disabling and Enabling User Accounts
    25. Deleting a User
    26. Working with Groups
    27. Working with User Profiles
    28. Creating a Logon Script
    29. Chapter 5: Configuring a File Server
    30. Understanding Permissions
    31. Understanding Shares
    32. Considering Best Practices for Setting Up Shares
    33. Managing Your File Server
    34. Chapter 6: Using Group Policy
    35. Understanding Group Policy
    36. Enabling Group Policy Management on Windows Server 2019
    37. Creating Group Policy Objects
    38. Filtering Group Policy Objects
    39. Chapter 7: Typing Windows Commands
    40. Using a Command Window
    41. Special Command Tricks
    42. The EventCreate Command
    43. Net Commands
    44. The RunAs Command
    45. Chapter 8: Using PowerShell
    46. Using PowerShell
    47. Understanding PowerShell Commands
    48. Using Cmdlets
    49. Using Parameters
    50. Getting Help
    51. Using Aliases
    52. Using the Pipeline
    53. Using Providers
    54. Using Scripts
  11. Book 7: Administering Microsoft Office 365
    1. Chapter 1: Getting Started with Office 365 Administration
    2. Introducing Office 365
    3. Considering Office 365 Plans
    4. Understanding Tenants
    5. Creating an Office 365 Tenant
    6. Creating a New User
    7. Resetting a User’s Password
    8. Disabling a User
    9. Chapter 2: Configuring Exchange Online
    10. Looking at Exchange Online Recipient Types
    11. Examining the Exchange Admin Center
    12. Managing Mailboxes
    13. Creating a Shared Mailbox
    14. Chapter 3: Administering Teams
    15. What Is Teams?
    16. A Brief Look at How Teams Works
    17. Using the Teams Admin Center
    18. Managing Teams
  12. Book 8: Implementing Linux
    1. Chapter 1: Installing a Linux Server
    2. Planning a Linux Server Installation
    3. Installing Fedora Server
    4. Chapter 2: Linux Administration
    5. On Again, Off Again
    6. Wait, Where’s the Desktop?
    7. Playing the Shell Game
    8. Getting into Virtual Consoles
    9. Using a Remote Console
    10. Enabling the root User
    11. Using the sudo Command
    12. Using the RPM Package Manager
    13. Editing Text Files with Vi
    14. Using Cockpit
    15. Managing User Accounts
    16. Chapter 3: Basic Linux Network Configuration
    17. Using Cockpit to Configure Network Interfaces
    18. Working with Network Configuration Files
    19. Displaying Your Network Configuration with the ifconfig Command
    20. Chapter 4: Running DHCP and DNS
    21. Running a DHCP Server
    22. Running a DNS Server
    23. Chapter 5: Doing the Samba Dance
    24. Understanding Samba
    25. Installing Samba
    26. Starting and Stopping Samba
    27. Editing the smb.conf File
    28. Using the Samba Client
    29. Chapter 6: Running Apache
    30. Installing Apache
    31. Starting and Stopping Apache
    32. Opening the Firewall for Apache
    33. Confirming That Apache Is Running
    34. Looking at the httpd.config File
    35. Understanding Access Rules
    36. Configuring Virtual Hosts
    37. Chapter 7: Running Postfix
    38. Understanding Email
    39. Installing Postfix
    40. Modifying main.cf
    41. Using SpamAssassin
    42. Using the Mail Console Client
    43. Chapter 8: Linux Commands
    44. Command Shell Basics
    45. Directory- and File-Handling Commands
    46. Commands for Working with Packages and Services
    47. Commands for Administering Users
    48. Commands for Managing Ownership and Permissions
    49. Networking Commands
  13. Book 9: Managing a Network
    1. Chapter 1: Welcome to Network Administration
    2. Knowing What Network Administrators Do
    3. Choosing the Part-Time Administrator
    4. Establishing Routine Chores
    5. Managing Network Users
    6. Patching Up Your Operating System and Software
    7. Discovering Software Tools for Network Administrators
    8. Building a Library
    9. Getting Certified
    10. Gurus Need Gurus, Too
    11. Helpful Bluffs and Excuses
    12. Chapter 2: Managing Remotely
    13. Enabling Remote Desktop Connection
    14. Connecting Remotely
    15. Using Keyboard Shortcuts for Remote Desktop
    16. Configuring Remote Desktop Options
    17. Using Remote Assistance
    18. Enabling Remote Assistance
    19. Inviting Someone to Help You via a Remote Assistance Session
    20. Responding to a Remote Assistance Invitation
    21. Chapter 3: Managing Network Assets
    22. Introducing IT Asset Management
    23. Why Bother?
    24. Getting Organized
    25. What to Track
    26. Taking Pictures
    27. Picking a Number
    28. Making Labels
    29. Tracking Software
    30. Using Asset-Tracking Software
    31. Other Sources of Asset-Tracking Information
    32. Chapter 4: Solving Network Problems
    33. When Bad Things Happen to Good Computers
    34. Fixing Dead Computers
    35. Ways to Check a Network Connection
    36. A Bunch of Error Messages Just Flew By!
    37. Double-Checking Your Network Settings
    38. Time to Experiment
    39. Who’s on First?
    40. Restarting a Client Computer
    41. Booting in Safe Mode
    42. Using System Restore
    43. Restarting Network Services
    44. Restarting a Network Server
    45. Looking at Event Logs
    46. Documenting Your Trials and Tribulations
    47. Chapter 5: Managing Software Deployment
    48. Understanding Software Licenses
    49. Using a License Server
    50. Options for Deploying Network Software
    51. Keeping Software Up to Date
    52. Chapter 6: Managing Mobile Devices
    53. The Many Types of Mobile Devices
    54. Considering Security for Mobile Devices
    55. Managing iOS Devices
    56. Managing Android Devices
  14. Book 10: Dealing with Cybersecurity
    1. Chapter 1: Securing Your Users
    2. Knowing the Difference between Authentication and Authorization
    3. Following Password Best Practices
    4. Securing the Administrator Account
    5. Understanding Multifactor Authentication
    6. Securing the Human Firewall
    7. Chapter 2: Managing Firewalls and Virus Protection
    8. Firewalls
    9. The Many Types of Firewalls
    10. Firewall Best Practices
    11. The Built-In Windows Firewall
    12. Configuring Windows Defender Firewall with Group Policy
    13. Virus Protection
    14. Chapter 3: Dealing with Spam
    15. Defining Spam
    16. Sampling the Many Flavors of Spam
    17. Using Antispam Software
    18. Understanding Spam Filters
    19. Looking at Three Types of Antispam Software
    20. Minimizing Spam
    21. Chapter 4: Managing Disaster Recovery and Business Continuity Planning
    22. Assessing Different Types of Disasters
    23. Analyzing the Impact of a Disaster
    24. Developing a Business Continuity Plan
    25. Holding a Fire Drill
  15. Book 11: Appendixes
    1. Appendix A: Directory of Useful Websites
    2. Certification
    3. Hardware
    4. Home and Small-Business Networking
    5. Linux
    6. Magazines
    7. Microsoft
    8. Network Standards Organizations
    9. Reference
    10. TCP/IP and the Internet
    11. Wireless Networking
    12. Smartphones
    13. Appendix B: Glossary
  16. Index
  17. About the Author
  18. Advertisement Page
  19. Connect with Dummies
  20. End User License Agreement
18.222.23.119