Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
The essentials you need to learn about networking-10 books in one!
With over 900 pages of clear and trustworthy information, Networking All-in-One For Dummies is the perfect beginner's guide AND the perfect professional reference book. Small networks, large networks, business networks, cloud networks-it's all covered. Learn how to set up a network and keep it functioning, using Windows Server, Linux, and related technologies. This book also covers best practices for security, managing mobile devices, and beyond. Maybe you're just getting started with networking, or maybe you know what you're doing and need a resource with all the knowledge in one place. Either way, you've found what you need with this Dummies All-in-One
Every network administrator needs a copy of Networking All-in-One For Dummies, the comprehensive learning resource and reliable desk reference.
Doug Lowe is the information technology director for a civil engineering firm in Clovis, California. He has been managing networks at publishing companies and nonprofits for 40 years. His 50+ technology books include more than 30 in the For Dummies series. Doug has demystified everything from memory management to client/server computing.
Introduction 1
Book 1: Getting Started with Networking 5
Chapter 1: Welcome to Networking 7
Chapter 2: Network Infrastructure 23
Chapter 3: Switches, Routers, and VLANs 41
Chapter 4: Cybersecurity. 57
Chapter 5: Servers and Virtualization 69
Chapter 6: Cloud Computing 81
Book 2: Understanding Network Protocols 91
Chapter 1: Network Protocols and Standards 93
Chapter 2: TCP/IP and the Internet 115
Chapter 3: IP Addresses 123
Chapter 4: Routing 145
Chapter 5: Dhcp 155
Chapter 6: Dns 173
Chapter 7: TCP/IP Tools and Commands 207
Book 3: Planning a Network 231
Chapter 1: Local Area Networks 233
Chapter 2: Wide Area Networks 249
Chapter 3: Server Architecture 261
Chapter 4: Virtualization Architecture 271
Chapter 5: Storage Architecture 283
Chapter 6: Backup Architecture 295
Chapter 7: Hyperconverged Infrastructure 313
Book 4: Implementing a Network 325
Chapter 1: Network Hardware 327
Chapter 2: Wireless Networks 339
Chapter 3: Windows Clients 357
Chapter 4: Mac Networking 367
Chapter 5: Network Printers 377
Chapter 6: Virtual Private Networks 385
Book 5: Implementing Virtualization 391
Chapter 1: Hyper-V 393
Chapter 2: VMware 413
Chapter 3: Azure 425
Chapter 4: Amazon Web Services 441
Chapter 5: Desktop Virtualization 459
Book 6: Implementing Windows Server 2025 467
Chapter 1: Installing Windows Server 2025 469
Chapter 2: Configuring Windows Server 2025 487
Chapter 3: Configuring Active Directory 497
Chapter 4: Configuring User Accounts 507
Chapter 5: Configuring a File Server 529
Chapter 6: Using Group Policy 543
Chapter 7: Comandeering Windows Commands 555
Chapter 8: Using PowerShell 583
Book 7: Administering Microsoft 365 603
Chapter 1: Getting Started with Microsoft 365 Administration 605
Chapter 2: Configuring Exchange Online 625
Chapter 3: Administering Teams 641
Book 8: Implementing Linux 657
Chapter 1: Installing a Linux Server 659
Chapter 2: Linux Administration 673
Chapter 3: Basic Linux Network Configuration 705
Chapter 4: Running DHCP and DNS 717
Chapter 5: Linux Commands 725
Book 9: Managing a Network 755
Chapter 1: Welcome to Network Administration 757
Chapter 2: Managing Remotely 771
Chapter 3: Managing Network Assets 791
Chapter 4: Solving Network Problems 801
Book 10: Dealing with Cybersecurity 815
Chapter 1: Securing Your Users 817
Chapter 2: Managing Firewalls and Virus Protection 827
Chapter 3: Dealing with Spam 847
Chapter 4: Managing Disaster Recovery and Business Continuity Planning 861
Chapter 5: Planning for Cybersecurity Incident Response 869
Chapter 6: Penetration Testing 883
Index 895
Chapter 1
IN THIS CHAPTER
Getting a handle on networks
Considering why networking is useful (and is everywhere)
Telling the difference between servers and clients
Seeing how networks change computing life
Examining network topology
Identifying (and offering sympathy to) the network administrator
Computer networks get a bad rap in the movies. In the 1980s, the Terminator movies featured Skynet, a computer network that becomes self-aware (a computer network of the future), takes over the planet, builds deadly terminator robots, and sends them back through time to kill everyone unfortunate enough to have the name Sarah Connor. In the Matrix movies, a vast and powerful computer network enslaves humans and keeps them trapped in a simulation of the real world. And in the 2015 blockbuster Spectre, James Bond goes rogue (again) to prevent the Evil Genius Ernst Blofeld from taking over the world (again) by linking the computer systems of all the world's intelligence agencies together to form a single, all-powerful evil network that spies on everybody.
Fear not. These bad networks exist only in the dreams of science-fiction writers. Real-world networks are much more calm and predictable. Although sophisticated networks do seem to know a lot about you, they don't think for themselves and they don't evolve into self-awareness. And although they can gather a sometimes disturbing amount of information about you, they won't try to kill you, even if your name is Sarah Connor.
Now that you're over your fear of networks, you're ready to breeze through this chapter. It's a gentle, even superficial, introduction to computer networks, with a slant to the concepts that can help you use a computer that's attached to a network. This chapter goes easy on the details; the detailed stuff comes later.
A network is nothing more than two or more computers connected by a cable or by a wireless radio connection so that they can exchange information.
You can create a simple computer network by using a device called a switch to connect all the computers in your network to each other. You do that by stringing a network cable from the switch to each computer. The cable plugs into a special jack on the back of each computer; this jack is connected to a network interface, which is an electronic circuit that resides inside your computer to facilitate networking. Voilà! You have a working network.
If you don't want to mess with cables, you can create a wireless network instead. In a wireless network, the computers use wireless network adapters that communicate via radio signals. All modern laptop computers have built-in wireless network adapters, as do most desktop computers. (If yours doesn't, you can purchase a separate wireless network adapter that plugs into one of the computer's USB ports.) You'll need a device called a wireless access point (WAP) to enable the computers to properly connect. In small office or home networks, the WAP is bundled with a device called a router, which lets you connect your network to the internet. The combination of a WAP and a router is called a wireless router.
Figure 1-1 shows a typical network with five computers. This network is a home network used by a family that bears only a totally coincidental similarity to a famous TV family you may or may not have heard of. You can see that each family member has a device that connects to the network - two of them wirelessly, two of them through cables. There's also a printer that connects wirelessly.
In this example, the wireless router also has a built-in switch that provides several jacks for connecting computers via cable. Most wireless routers include this feature, typically with three to five wired network ports.
Although the network is a small one, it has much in common with larger networks that contain dozens, hundreds, or even thousands of connected computers.
FIGURE 1-1: A typical network.
Here's the rundown for each of the devices connected to this network:
Computer networking has its own strange vocabulary. Although you don't have to know every esoteric networking term, it helps to be acquainted with a few of the basic buzzwords:
Local area network (LAN): Networks are often called LANs, short for local area network.
LAN is the first three-letter acronym (TLA) of this book. You don't really need to remember it or any of the many TLAs that follow. You may guess that the acronym for four-letter acronym is FLA. Wrong! A four-letter acronym is an ETLA, which stands for extended three-letter acronym. After all, it just wouldn't be right if the acronym for four-letter acronym had only three letters.
Frankly, computer networks are a bit of a pain to set up. So, why bother? Because the benefits of having a network outweigh the difficulties of setting one up.
You don't have to be a PhD to understand the benefits of networking. In fact, you learned everything you need to know in kindergarten: Networks are all about sharing. Specifically, networks are about sharing three things: files, resources, and programs.
Probably the main reason most small business and home networks exist is to allow everyone to access the internet through a single shared internet connection. In Figure 1-1, you can see that the wireless router is connected to the internet. By sharing this connection, all the computers on the network, whether connected wirelessly or via cables, can access the internet through the wireless router.
It's important to note that nearly all wireless routers also contain a built-in firewall. The firewall helps protect the computers on the network from the imminent dangers of the internet. The moment you connect a home or office network to the internet, cybercriminals will begin trying to break into your network and try to trick you into divulging sensitive information, such as the password to your bank account.
Never - and I mean never - allow any computer to connect directly to the internet without a firewall in place.
Networks enable you to share information with other computers on the network. Depending on how you set up your network, you can share files with your network friends in several different ways. You can send a file from your computer directly to a friend's computer by attaching the file to an email message and then mailing it. Or you can let your friend access your computer over the network so that your friend can retrieve the file directly from your hard drive. Yet another method is to copy the file to a disk on another computer and then tell your friend where you put the file so that your friend can...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.