Exam 98 366 MTA Networking Fundamentals 2nd Edition Microsoft Official Academic Course 2024 scribd download
Exam 98 366 MTA Networking Fundamentals 2nd Edition Microsoft Official Academic Course 2024 scribd download
com
https://textbookfull.com/product/exam-98-366-mta-
networking-fundamentals-2nd-edition-microsoft-
official-academic-course/
https://textbookfull.com/product/exam-ref-az-900-microsoft-azure-
fundamentals-2nd-edition-jim-cheshire/
textbookfull.com
https://textbookfull.com/product/exam-ref-pl-900-microsoft-power-
platform-fundamentals-craig-zacker/
textbookfull.com
https://textbookfull.com/product/microsoft-certified-azure-
fundamentals-study-guide-exam-az-900-1st-edition-james-boyce/
textbookfull.com
https://textbookfull.com/product/delhi-darshan-the-history-and-
monuments-of-india-s-capital-first-edition-giles-tillotson/
textbookfull.com
https://textbookfull.com/product/britain-and-the-arctic-1st-edition-
duncan-depledge-auth/
textbookfull.com
https://textbookfull.com/product/g-is-for-bdsm-checklist-7-1st-
edition-lila-dubois/
textbookfull.com
https://textbookfull.com/product/give-me-liberty-an-american-
history-6th-edition-eric-foner/
textbookfull.com
Old Philadelphia houses on Society Hill 1750 1840 First
Rowman & Littlefield Edition Maicher
https://textbookfull.com/product/old-philadelphia-houses-on-society-
hill-1750-1840-first-rowman-littlefield-edition-maicher/
textbookfull.com
Microsoft® Official Academic Course
Networking Fundamentals,
Exam 98-366
VP & PUBLISHER Barry Pruett
SENIOR EXECUTIVE EDITOR Jim Minatel
MICROSOFT PRODUCT MANAGER Microsoft Learning
SENIOR EDITORIAL ASSISTANT Devon Lewis
TECHNICAL EDITOR Ron Handlon
CHANNEL MARKETING MANAGER Michele Szczesniak
CONTENT MANAGEMENT DIRECTOR Lisa Wojcik
CONTENT MANAGER Nichole Urban
PRODUCTION COORDINATOR Nicole Repasky
PRODUCTION EDITOR Umamaheswari Gnanamani
COVER DESIGNER Tom Nery
Copyright © 2017 by John Wiley & Sons, Inc. All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under
Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the
Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center,
Inc. 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher
for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street,
Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008. To order books or for customer service, please call
1-800-CALL WILEY (225-5945).
Microsoft, Active Directory, AppLocker, Bing, BitLocker, Hyper-V, Internet Explorer, Microsoft Intune, Microsoft
Office 365, SQL Server, Visual Studio, Windows Azure, Windows, Windows PowerShell, and Windows Server are
either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Other product and company names mentioned herein may be the trademarks of their respective owners.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events
depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail
address, logo, person, place, or event is intended or should be inferred.
The book expresses the author’s views and opinions. The information contained in this book is provided without
any express, statutory, or implied warranties. Neither the authors, John Wiley & Sons, Inc., Microsoft Corporation,
nor their resellers or distributors will be held liable for any damages caused or alleged to be caused either directly or
indirectly by this book.
Welcome to the Microsoft Official Academic Course (MOAC) program for Networking
Fundamentals. MOAC represents the collaboration between Microsoft Learning and John
Wiley & Sons, Inc. publishing company. Microsoft and Wiley teamed up to produce a series
of textbooks that deliver compelling and innovative teaching solutions to instructors and
superior learning experiences for students. Infused and informed by in-depth knowledge from
the creators of Microsoft products, and crafted by a publisher known worldwide for the ped-
agogical quality of its products, these textbooks maximize skills transfer in minimum time.
Students are challenged to reach their potential by using their new technical skills as highly
productive members of the workforce.
Because this knowledge base comes directly from Microsoft, creator of the Microsoft
Certified IT Professional (MCITP), Microsoft Certified Technology Specialist (MCTS),
and Microsoft Certified Professional (MCP) exams (see the Microsoft Learning website at
https://www.microsoft.com/learning), you are sure to receive the topical coverage that is most
relevant to students’ personal and professional success. Microsoft’s direct participation not
only assures you that MOAC textbook content is accurate and current; it also means that
students will receive the best instruction possible to enable their success on certification exams
and in the workplace.
iii
Illustrated Book Tour
■■ Pedagogical Features
The MOAC textbook for Networking Fundamentals is designed to cover all the learning
objectives for MTA exam 98-366, which are referred to as its “objective domain.” The
Microsoft Technology Associate (MTA) exam objectives are highlighted throughout the
textbook. Many pedagogical features have been developed specifically for Microsoft Official
Academic Course programs.
Presenting the extensive procedural information and technical concepts woven throughout the
textbook raises challenges for the student and instructor alike. The Illustrated Book Tour that
follows provides a guide to the rich features contributing to Microsoft Official Academic Course
program’s pedagogical plan. Following is a list of key features in each lesson designed to pre-
pare students for success as they continue in their IT education, on the certification exams,
and in the workplace:
• Each lesson begins with an Objective Domain Matrix. More than a standard list of
learning objectives, the matrix correlates each software skill covered in the lesson to the
specific exam objective domain.
• Concise and frequent Step-by-Step instructions teach students new features and pro-
vide an opportunity for hands-on practice. Numbered steps give detailed, step-by-step
instructions to help students learn software skills.
• Illustrations: Screen images provide visual feedback as students work through the exer-
cises. The images reinforce key concepts, provide visual clues about the steps, and allow
students to check their progress.
• Key Terms: Important technical vocabulary terms are listed at the beginning of the
lesson. When these terms are used later in the lesson, they appear in bold italic type and
are defined.
• Engaging point-of-use Reader Aids, located throughout the lessons, tell students why
this topic is relevant (The Bottom Line) and provide students with helpful hints (Take
Note). Reader Aids also provide additional relevant or background information that adds
value to the lesson.
• Certification Ready features throughout the text signal students where a specific
certification objective is covered. They provide students with a chance to check their
understanding of that particular MTA objective and, if necessary, review the section of
the lesson where it is covered. MOAC offers complete preparation for MTA certification.
• End-of-Lesson Questions: The Knowledge Assessment section provides a variety of
multiple-choice, true-false, matching, and fill-in-the-blank questions.
• End-of-Lesson Exercises: Business case scenarios and Workplace Ready exercises are
projects that test students’ ability to apply what they’ve learned in the lesson.
iv
Illustrated Book Tour | v
■■ Lesson Features
O B J E C T I V E D O M A I N M AT R I X
Objective Domain Matrix
Skill/ConCept exam objeCtive objeCtive number
Examining Local Area Networks, Understand local area networks (LANs) 1.2
Devices, and Data Transfer
Understand switches 2.1
Identifying Network Topologies and Understand network topologies and 1.5
Standards access methods
KEY TERMS
broadcast frame P2P
Carrier Sense Multiple Access
with Collision Avoidance
(CSMA/CA)
full-duplex
half-duplex
peer-to-peer
perimeter network Key Terms
host print server
Carrier Sense Multiple Access
hub ring topology
with Collision Detected
(CSMA/CD) IEEE 802.3 RJ-45
centralized computing IP address serial data transfer 2 | Lesson 1
client/server local area network (LAN) star topology
computer telephony integration mesh topology switch
messaging server transceive
Local area networks are used by just about every organization, and today many homes
CTI-based server have them as well. This lesson refers to a fictitious company named Proseware, Inc., that
data transfer rate multiport repeater unicast wants to implement a new LAN in a brand‐new office, which will serve approximately
database server multistation access unit (MAU) virtual LAN (VLAN) 20 users. The company requires an extremely quick network that can transfer many
demilitarized zone (DMZ) network adapter web server different types of data. They want the most cost‐effective layout without losing speed
network controller Windows 10
or efficiency! The network engineer’s job responsibilities include selecting the right
distributive computing equipment, making sure it is all compatible, and getting it installed on time. The network
Ethernet network documentation wireless access point (WAP) engineer should have a thorough understanding of technologies, such as Ethernet and
file server network operating system (NOS) wireless local area network switching, because she will be critical in designing and implementing the network. This
network topology (WLAN) lesson covers all of the concepts necessary so you can be confident installing the network
that this company desires. As we progress through this book, we will build on this scenario
and add lots more networking technologies to the infrastructure.
Bottom Line network (LAN) is a group of these computers that are confined to a small geographic
area, usually one building. Setting up a LAN requires computers with network adapters,
central connecting devices to connect those computers together, and a numbering scheme
Reader Aid
THE BOTTOM LINE
(such as IP addresses) to differentiate one computer from the next. It can also include
servers, some type of protective device such as a firewall, and connections to perimeter
networks that are adjacent to the LAN.
Certification connections. These must be connected together in some way to facilitate the transfer
of data. It is important to define how they are connected together, as well as how they
actually transmit data.
Take Note Reader Aid networks, devices, and operating systems are insecure when they are fresh out of the box. Just
having a network doesn’t ensure security. In fact, many steps must be taken to implement a
secure network.
To understand local area networks (LANs) better, it helps to write out the structure of the
LAN—to document it. Network documentation is any information that helps describe,
define, and otherwise explain how computers are connected in a physical and logical way. For
example, the physical connection could be cables, and the logical connection could be the
various IP addresses used by the devices on the network.
8 | Lesson 1
6. Click the Advanced tab. If you click the Speed & Duplex option, you can then
change the value, as shown in Figure 1‑8.
Screen Images
TAKE NOTE *
A network adapter is
only as fast as the
network it connects to!
Full-duplex means that the network card can send and receive data simulta-
neously. In the Speed and Duplex drop‐down menu, you can select various speeds ,
including 10 Mbps, 100 Mbps, and 1 Gbps. You can also select half‐duplex, which
means that the network adapter can send and receive data, but not at the same
time. Full‐duplex is the superior connection, as long as your central connecting
device supports it. A full‐duplex connection can transceive (transmit and receive)
twice as much information per second compared with a half‐duplex connection. So,
to meet the requirements of the original scenario, you would probably want your
client computers to connect at 1 Gbps as well as utilize full‐duplex negotiations.
You can tell that a card is active because the Link Status field on the physical
device shows a green light. You can also open the device Status window (Open
Network and Sharing Center, and clink the adapter link) to see the current speed
of the adapter such as 1 Gbps, its media state, how long it has been up and the
current activity.
7. Finally, every network adapter will have a logical name. By default, the net‑
work adapter is known as Ethernet, although you can change the name if you so
desire. Ethernet will have its own Properties page and a status page. Let’s view
these now:
a. Right‐click the Network icon on the far right of the taskbar and choose Open
Network and Sharing Center. The Network and Sharing Center window opens.
An alternate way to access the Network and Sharing Center is to right‐click
Start and choose Control Panel. Then, navigate to Network and Internet >
Network and Sharing Center.
b. Click the Change adapter settings link. The Network Connections window
opens. (Navigation to this window is slightly different in other versions of Win‑
dows.)
c. In this window, right‐click the Ethernet icon and choose Properties. The Ether‑
net Properties dialog box opens, as shown in Figure 1‑9.
vi | Illustrated Book Tour
house number and the street you live on, an IP address identifies your computer number and
the network it lives on. A common example of an IP address is 192.168.1.1.
Now, every IP address is broken down into two parts: the network portion, in this case
192.168.1, which is the network your computer is a member of, and the host portion, which
is the individual number of your computer, differentiating your computer from any others on
the network. In this case, it’s .1. How do we know this? The subnet mask tells us.
The subnet mask is a group of four numbers that define what IP network the computer is a
member of. All of the 255s in a subnet mask collectively refer to the network portion, while
the 0s refer to the host portion. This is illustrated in Table 1‑1. This table shows a typical
Class C IP address and the default corresponding subnet mask. If you were to configure the
IP address of a Windows computer as 192.168.1.1, Windows would automatically default to
a subnet mask of 255.255.255.0. If any other computers would like to communicate with
yours, they need to be configured with the same network number; however, every computer
on the same network needs to have a different host number or an IP conflict might ensue.
Of course, as a talented administrator, you’ll learn how to avoid IP conflicts—and you’ll learn
some tips on how to do so in Lessons 4 and 5.
Table 1-1
An IP Address and Type of Address firsT ocTeT second ocTeT Third ocTeT fourTh ocTeT
Easy-to-Read Tables
Corresponding Subnet Mask
IP address 192 168 1 1
CONFIGURE IP ADDRESSES
GET READY. To configure IP addresses, perform the following steps.
1. Access the Ethernet Properties dialog box.
2. Click Internet Protocol Version 4 and then click the Properties button. The Inter‑
net Protocol Version 4 Properties dialog box opens. Write down the current settings
(if there are any) so that you can return the computer to these settings at the
end of the exercise.
3. By default, the Obtain an IP address automatically and Obtain DNS server address
automatically radio buttons are enabled, as shown in Figure 1‑11. That means that Understanding Local Area Networking | 11
the network adapter will attempt to get all its IP information from a DHCP server
or other device like a SOHO (Small Office/Home Office) four‐port router. However,
we want to configure the adapter statically, so let’s continue on! house number and the street you live on, an IP address identifies your computer number and
the network it lives on. A common example of an IP address is 192.168.1.1.
Now, every IP address is broken down into two parts: the network portion, in this case
192.168.1, which is the network your computer is a member of, and the host portion, which
is the individual number of your computer, differentiating your computer from any others on
the network. In this case, it’s .1. How do we know this? The subnet mask tells us.
The subnet mask is a group of four numbers that define what IP network the computer is a
member of. All of the 255s in a subnet mask collectively refer to the network portion, while
the 0s refer to the host portion. This is illustrated in Table 1‑1. This table shows a typical
Class C IP address and the default corresponding subnet mask. If you were to configure the
IP address of a Windows computer as 192.168.1.1, Windows would automatically default to
a subnet mask of 255.255.255.0. If any other computers would like to communicate with
yours, they need to be configured with the same network number; however, every computer
on the same network needs to have a different host number or an IP conflict might ensue.
Of course, as a talented administrator, you’ll learn how to avoid IP conflicts—and you’ll learn
some tips on how to do so in Lessons 4 and 5.
Table 1-1
An IP Address and Type of Address firsT ocTeT second ocTeT Third ocTeT fourTh ocTeT
Corresponding Subnet Mask
IP address 192 168 1 1
26 | Lesson 1
to increase the speed of torrent downloads. It is estimated that between 20% and 35% of the
data transfers on the Internet involve torrents. Another benefit of the BitTorrent client is that
you can line up a large number of downloads from one torrent location (or multiple loca-
tions), and just let your computer download them while you do other things. A file is seeded
(stored) on one or more computers. Then, as clients (peers) download that file (or portions of
the file), they are automatically set up to distribute the file (or portions of the file). This way,
more and more computers are added to the “swarm,” making the availability of the file much
greater. Computers are set up to automatically distribute the file; it’s the default setting, but
you can turn off seeding/distribution in your client. You could also block it at your firewall.
Instead of a server hosting the file, a server simply tracks and coordinates the distribution of
files. The actual torrent starts with an initial small file (called a torrent file) that you download,
which contains information about the files to be downloaded. The reason the whole process is
called a torrent is because it usually begins with a small file that starts the download. One of
the differences is that when downloading a torrent, there is more than one TCP connection
(could be quite a few) to different machines in the P2P network. Contrast this to a single file
download from a web server where only one TCP connection is made. This is controlled in a
pseudorandom fashion by the tracking server to ensure availability of data. Another difference
is that most web servers will put a cap on the number of concurrent downloads you can do,
but not so with the torrent client program. The average person uses a BitTorrent client to
download movies, MP3s, and other media. Sometimes, these are distributed with the consent
of the owner; other times (and quite often), they are illegally seeded and distributed—as well
as downloaded! An example of legitimate usage is the World of Warcraft game. The owners of
the game use the Blizzard BitTorrent to distribute just about everything involved in the game.
Newer games for the PS3 and other consoles are doing the same type of thing. D‐Link and
other network equipment companies are embracing torrent technology as well.
S K I L L S U M M A RY
Skill Summary
In thIs lesson, you learned:
• A network is two or more computers that exchange data. A local area network (LAN) is a
group of these computers that are confined to a small geographic area, usually one building.
• The network adapter, also known as a network interface card (NIC), is the device that
enables the sending and receiving of data to and from your computer. Today, multiple
devices can connect to each other and communicate using a switch.
• Internet Protocol (IP) is the part of TCP/IP that, among other things, governs IP addresses.
The IP address is the cornerstone of networking. It defines the computer or host you are
working on.
• A wireless local area network (WLAN) has many advantages, the most standout of which
is the ability to roam. A person with a laptop, handheld computer or PDA, or other like
device can work from anywhere.
• Network topologies define the physical connections of hosts in a computer network. There
are several types of physical topologies, including bus, ring, star, mesh, and tree.
• Today’s computing is known as distributive computing and is used for both client/server
and peer‐to‐peer networks. This means that every device or workstation has its own
processing power.
• The client/server model is an architecture that distributes applications between servers, such
as Windows Server 2016, and client computers, such as Windows 8/8.1 or Windows 10.
• Peer‐to‐peer networking, first and foremost, means that each computer is treated as an
equal. This means each computer has the equal ability to serve data and to access data,
just like any other computer on the network. Before servers became popular in PC‐based
computer networks, each PC had the ability to store data.
Illustrated Book Tour | vii
T Workplace Ready
Photos
Analyzing an FTP Connection
The File Transfer Protocol is probably the most commonly used protocol when it comes to
file transfer (quite an appropriate name!). However, it can be insecure. Some FTP servers use
the standard port 21 for all data transfers. It is better to use port 21 for the initial connec-
tion, and then use dynamically assigned ports for subsequent data transfers. Also, some FTP
implementations send the user password as cleartext; this is not desirable. Passwords should
be complex, and authentication should be encrypted if possible. Also, more secure FTP pro-
grams should be utilized. For example, Pure‐FTPd (http://www.pureftpd.org) could be uti-
lized on the server side and FileZilla (http://filezilla‐project.org) could be incorporated on the
client side.
The type of cable is known as twisted pair. It has an RJ‐45 plug on the end,
which is molded so it can only connect one way to the RJ‐45 port. It also has
a tab that locks it in place. The RJ‐45 plug is slightly larger than a telephone
cable’s RJ‐11 plug, but looks very similar. Another difference is that the phone
plug usually has four wires, whereas the RJ‐45 plug has eight.
4. Identify the cable that connects your computer to the network. Disconnect the
cable (finish any downloads from the Internet if in progress first) and view the
connector. If you are connected via a cable, attempt to identify what device is
connected to the other end of the cable, such as a hub, switch, or router.
5. Now let’s access the operating system and look at the properties of a network
adapter. For this example, we are using a Windows 10 client computer with a
Realtek PCIe network adapter. However, older versions of Windows have almost
identical window and dialog box names, and the navigation to those windows is
similar as well.
Knowledge
Assessment
a. Half‐duplex
b. Full‐duplex
c. Simplex
d. 100 Mbps
Laptop Mac
6. When connecting a computer at a rate of 100,000,000 bits per second, which of the fol-
lowing should be the speed of the network adapter being installed?
a. 10 Mbps CERTIFICATION READY You will notice that in the center of the diagram is a hub, also known as a mul-
b. 100 MB/s What are the capabilities tiport repeater. This is the most basic of central connecting devices (CCDs); it
c. 100 Mbps of hubs as compared to connects each of the computers, known as hosts, to each other by way of copper‐
d. 1,000 Mbps switches? based cables. When a host needs to send data, it first sends that data to the
Objective 2.1 hub, where it is amplified and broadcast to the rest of the network. Broadcasting
7. When connecting to a router that has the IP address 192.168.1.100 on a standard, means that the data is sent out to every host on the network. Of course, only
default Class C network using the subnet mask 255.255.255.0, which of the following is the intended recipient keeps the data; the rest of the hosts discard it. Although
a valid IP address for the network adapter? this is a bit wasteful, it was the standard for a long time. Today, however, switch‑
TAKE NOTE *
a. 192.168.0.1 ing technology, which is more efficient, is the standard. You’ll learn more about
b. 192.168.1.1 Today, a hub is consid‑ switching technology later in this lesson.
c. 192.168.100.1 ered a legacy hardware In the figure, several hosts connect to the hub, including:
d. 192.168.1.100 device that is largely
obsolete. Hubs have • A server, used to centralize data and share it with (or serve it to) other computers on
been replaced by net‑ the network.
work switches, which • A PC (personal computer) usually acts as a client on the network, most likely get‑
are discussed later in ting its information from the server. The PC can also store information locally.
this section and can be • A Mac (Macintosh) computer, which is another type of client computer; once again,
found in very old instal‑ this computer can store information locally, or get it from the server.
lations or specialized
• A laptop, which could be a PC or a Mac, is meant for portability. However, it can
applications.
also store and access data the same way the other computers do.
This book uses particular fonts, symbols, and heading conventions to highlight important
information or to call your attention to special steps. For more information about the features
in each lesson, refer to the Illustrated Book Tour section.
Convention Meaning
This feature provides a brief summary of the material to be
covered in the section that follows.
CERTIFICATION READY This feature signals the point in the text where a specific
certification objective is covered. It provides you with a
chance to check your understanding of that particular MTA
objective and, if necessary, review the section of the lesson
where it is covered.
Reader aids appear in shaded boxes found in your text. Take
Note provides helpful hints related to particular tasks or topics.
Download provides information on where to download use-
ful software.
viii
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
Instructor Support Program
The Microsoft Official Academic Course programs are accompanied by a rich array of resources
that incorporate the extensive textbook visuals to form a pedagogically cohesive package.
These resources provide all the materials instructors need to deploy and deliver their courses.
Resources available online for download include:
• The Instructor’s Guide contains solutions to all the textbook exercises, chapter sum-
maries, and lecture notes. Instructor Guides are available from the Instructor’s Book
Companion site (http://www.wiley.com/college/microsoft).
• The Test Bank contains hundreds of questions in multiple-choice, true-false, short
answer, and essay formats, and is available to download from the Instructor’s Book
Companion site (http://www.wiley.com/college/microsoft). A complete answer key is
provided.
• A complete set of PowerPoint presentations and images are available on the Instructor’s
Book Companion site (http://www.wiley.com/college/microsoft) to enhance classroom
presentations. Approximately 50 PowerPoint slides are provided for each lesson. Tailored
to the text’s topical coverage and Objective Domain Matrix, these presentations are
designed to convey key concepts addressed in the text. All images from the text are on
the Instructor’s Book Companion site (http://www.wiley.com/college/microsoft). You
can incorporate them into your PowerPoint presentations, or create your own overhead
transparencies and handouts. By using these visuals in class discussions, you can help
focus students’ attention on key elements of technologies covered and help them under-
stand how to use it effectively in the workplace.
ix
Student Support Program
Technology plays a role in virtually every business around the world. Possessing the
fundamental knowledge of how technology works and understanding its impact on today’s
academic and workplace environment is increasingly important—particularly for students
interested in exploring professions involving technology. That’s why Microsoft created the
Microsoft Technology Associate (MTA) certification—a new entry-level credential that
validates fundamental technology knowledge among students seeking to build a career in
technology.
The Microsoft Technology Associate (MTA) certification is the ideal and preferred path to
Microsoft’s world-renowned technology certification programs, such as Microsoft Certified
Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP). MTA is
positioned to become the premier credential for individuals seeking to explore and pursue a
career in technology, or augment related pursuits such as business or any other field where
technology is pervasive.
The MTA certification program is designed specifically for secondary and post-secondary stu-
dents interested in exploring academic and career options in a technology field. It offers stu-
dents a certification in basic IT and development. As the new recommended entry point for
Microsoft technology certifications, MTA is designed especially for students new to IT and
software development. It is available exclusively in educational settings and easily integrates
into the curricula of existing computer classes.
MTA provides a new standard for measuring and validating fundamental technology
knowledge right in the classroom while keeping your budget and teaching resources intact.
MTA helps institutions stand out as innovative providers of high-demand industry creden-
tials and is easily deployed with a simple, convenient, and affordable suite of entry-level
x
Student Support Program | xi
technology certification exams. MTA enables students to explore career paths in technology
without requiring a big investment of time and resources, while providing a career foundation
and the confidence to succeed in advanced studies and future vocational endeavors.
In addition to giving students an entry-level Microsoft certification, MTA is designed to be a
stepping stone to other, more advanced Microsoft technology certifications, like the Microsoft
Certified Technology Specialist (MCTS) certification.
Acknowledgments
xii
Brief Contents
Appendix 202
Index 203
| xiii
Contents
xiv |
Contents | xv
Working with Advanced TCP/IP Commands 115 Defining Packet Switching 164
Using netstat and nbtstat 115 Defining T-Carriers 171
Using tracert and pathping 118 Defining Other WAN Technologies and Internet
Using nslookup 120 Connectivity 172
Using ftp and telnet 121 Skill Summary 174
Using Windows PowerShell 122
Knowledge Assessment 175
Using net 127
Business Case Scenarios 177
Skill Summary 129
Workplace Ready 178
Knowledge Assessment 130
Business Case Scenarios 136
Workplace Ready 138 Lesson 8: Defining Network
Infrastructures and
Lesson 6: Working with Networking Network Security 179
Services 139 Objective Domain Matrix 179
Key Terms 179
Objective Domain Matrix 139
Understanding Networks Outside the LAN 180
Key Terms 139 Defining the Internet 180
Setting Up Common Networking Services 140 Defining Intranets and Extranets 181
Working with the Dynamic Host Configuration Protocol Configuring VPN Connections
(DHCP) 141 and Authentication 181
Introducing Remote Administration 145 Selecting Types of VPN Protocols 182
Defining More Networking Services 148 Selecting Authentication for VPN Connections 185
Defining RRAS 148 Creating a VPN Connection Using the Create a VPN
Defining IPsec 150 Connection Wizard 185
Defining Name Resolution Techniques 151 Creating a VPN Connection Using Windows 10
Defining DNS 152 Settings 188
Defining WINS 153 Using Connection Manager (CM) and the Connection
Manager Administration Kit (CMAK) 189
Skill Summary 154
Understanding Security Devices and Zones 190
Knowledge Assessment 155 Defining Firewalls and Other Perimeter Security
Business Case Scenarios 157 Devices 190
Workplace Ready 158 Redefining the DMZ 193
Putting It All Together 194
Skill Summary 196
Lesson 7: Understanding Wide Area Knowledge Assessment 196
Networks 159 Business Case Scenarios 199
Workplace Ready 200
Objective Domain Matrix 159
Key Terms 159
Understanding Routing 160
Identifying Static and Dynamic Routing 160 Appendix 202
Understanding Quality of Service (QoS) 163
Index 203
Defining Common WAN Technologies
and Connections 164
Understanding Local LE S S O N 1
Area Networking
O B J E C T I V E D O M A I N M AT R I X
KEY TERMS
broadcast frame P2P
Carrier Sense Multiple Access full-duplex peer-to-peer
with Collision Avoidance half-duplex perimeter network
(CSMA/CA)
host print server
Carrier Sense Multiple Access
hub ring topology
with Collision Detection
(CSMA/CD) IEEE 802.3 RJ-45
file server network operating system (NOS) wireless local area network
network topology (WLAN)
1
2 | Lesson 1
Local area networks are used by just about every organization, and today many homes
have them as well. This lesson refers to a fictitious company named Proseware, Inc., that
wants to implement a new LAN in a brand-new office, which will serve approximately
20 users. The company requires an extremely quick network that can transfer many
different types of data. They want the most cost-effective layout without losing speed
or efficiency! The network engineer’s job responsibilities include selecting the right
equipment, making sure it is all compatible, and getting it installed on time. The network
engineer should have a thorough understanding of technologies, such as Ethernet and
switching, because she will be critical in designing and implementing the network. This
lesson covers all of the concepts necessary so you can be confident installing the network
that this company desires. As we progress through this book, we will build on this scenario
and add lots more networking technologies to the infrastructure.
Simply stated, a network is two or more computers that exchange data. A local area
network (LAN) is a group of these computers that are confined to a small geographic
area, usually one building. Setting up a LAN requires computers with network adapters,
THE BOTTOM LINE
central connecting devices to connect those computers together, and a numbering scheme
(such as IP addresses) to differentiate one computer from the next. It can also include
servers, some type of protective device such as a firewall, and connections to perimeter
networks that are adjacent to the LAN.
We mentioned that a network is used to exchange data. But what are the real reasons that an
CERTIFICATION READY
What is a local area
organization will desire (or need) a network? They can be organized into four categories:
network (LAN)? • Sharing: The sharing of files, databases, and media
Objective 1.2
• Communication: The methods of communication, such as email, instant messaging,
and faxing
• Organization: The ability to centralize data and make it more accessible and efficient
• $$$: The ability for the network to provide cost savings and/or increase productivity
Some would place security in this list of categories, but, unfortunately, as you will find, many
networks, devices, and operating systems are insecure when they are fresh out of the box. Just
having a network doesn’t ensure security. In fact, many steps must be taken to implement a
secure network.
To understand local area networks (LANs) better, it helps to write out the structure of the
LAN—to document it. Network documentation is any information that helps describe,
define, and otherwise explain how computers are connected in a physical and logical way. For
example, the physical connection could be cables, and the logical connection could be the
various IP addresses used by the devices on the network.
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
Understanding Local Area Networking | 3
Figure 1-1
Basic LAN documentation
Server PC
Hub
Laptop Mac
CERTIFICATION READY You will notice that in the center of the diagram is a hub, also known as a
What are the capabilities multiport repeater. This is the most basic of central connecting devices (CCDs); it
of hubs as compared to connects each of the computers, known as hosts, to each other by way of copper-
switches? based cables. When a host needs to send data, it first sends that data to the
Objective 2.1 hub, where it is amplified and broadcast to the rest of the network. Broadcasting
means that the data is sent out to every host on the network. Of course, only
the intended recipient keeps the data; the rest of the hosts discard it. Although
TAKE NOTE *
this is a bit wasteful, it was the standard for a long time. Today, however, switch‑
ing technology, which is more efficient, is the standard. You’ll learn more about
Today, a hub is consid- switching technology later in this lesson.
ered a legacy hardware In the figure, several hosts connect to the hub, including:
device that is largely
obsolete. Hubs have • A server, used to centralize data and share it with (or serve it to) other com‑
been replaced by net- puters on the network.
work switches, which • A PC (personal computer) usually acts as a client on the network, most likely
are discussed later in getting its information from the server. The PC can also store information locally.
this section and can be • A Mac (Macintosh) computer, which is another type of client computer; once
found in very old instal- again, this computer can store information locally, or get it from the server.
lations or specialized
• A laptop, which could be a PC or a Mac, is meant for portability. However, it
applications.
can also store and access data the same way the other computers do.
4 | Lesson 1
TAKE NOTE * 2. Examine your own network and record your results. Use Visio, if possible; other‑
wise, draw out your own network documentation on paper. Whether you are at
If you are using home or at a school or business, chances are that you are connected to a LAN. Try
Microsoft Visio, uti- to identify any hosts on the network (PCs, laptops, servers, etc.). Then, identify
lize the Basic Network the central connecting device that ties everything together. This could be a basic
Diagram template. This hub, a switch, or a router or multifunction network device.
can be accessed in the
Network section when 3. Examine Figure 1‑2. This is an intermediate example of a LAN.
starting a new document.
Figure 1-2
Intermediate LAN
documentation
Server
Internet
Router
Laptop PC
In Figure 1‑2, the hub is replaced with a basic four-port router; these are also
referred to as SOHO (Small Office/Home Office) routers. The router acts as a central
connecting device, connecting the hosts together, but also has a special communica‑
tions link to the internet, allowing the hosts to send and receive data to and from
computers on the internet. That communications link between the router and the
internet is where the LAN ends. So, the PC, laptop, server, and router are part of the
LAN. Anything else beyond the router is considered to be outside of the LAN.
4. Examine your own LAN again. If possible, identify any routers and connections to
the internet (or other networks). Add these to your written, or Visio, documentation.
5. Examine Figure 1‑3. This is a slightly more advanced example of a LAN.
Figure 1-3
Advanced LAN documentation Switch
Understanding Local Area Networking | 5
In Figure 1‑3, more central connecting devices are added. Instead of connecting hundreds of
devices to a single central connecting device, you can break up the network in a hierarchical
fashion. For example, on the left side of the figure are two PCs and one server connected to
a hub. Let’s say that these represent 24 computers, and that each other group of computers
connected to a hub also represents 24 computers. Instead of connecting all the computers to
a single, central connecting device, which might not be able to physically support all of the
hosts, the groups of 24 hosts are connected to their own hub. Then, the hubs are all daisy-
chained to a switch at the top of the figure. The switch will most likely be a powerful (and
expensive) device, in order to support all of the computers that ultimately connect to it. You
can regard the individual hubs as devices that allow connectivity for single departments in a
company, or individual classrooms in a school. The master switch at the top of the hierarchi-
cal tree connects everything together; however, it also acts as a single point of failure, which
is addressed in Lesson 2. As you can guess, this type of network architecture is the kind we
will need to use to accomplish the goals laid out in the scenario at the beginning of this
lesson.
The network adapter, also known as a network interface card (NIC), is the device that
enables the sending and receiving of data to and from your computer. It might be integrated
into the motherboard or it might act as a separate device that connects to a PCI slot, or per-
haps connects to a PC Card slot or USB port. It connects to the network by way of cable
(wired) or by air (wireless). It has its own basic CPU to process transmitted data and a ROM
chip to store information about itself. Network adapters also have a software component
known as a driver, defining how the card will interact with the operating system; this usually
includes a Properties page that can be accessed in the operating system, enabling the user to
configure the adapter as he sees fit.
Figure 1-4
Photo of a typical network
adapter
Photo used with permission from John Wiley & Sons, Inc.
6 | Lesson 1
This particular network adapter is a PCI card, but again, network adapters come
in many different forms. However, notice the port on the card. This is known as
an RJ-45 port, and is where the RJ-45 plug at the end of the network cable con‑
nects. This is the most common type of network adapter port, allowing the adapter
to connect to most of today’s wired networks.
2. Look for the network adapter on your computer. If the computer only uses a
wireless network adapter, look for an antenna on the card. Laptops have an
internal antenna, but you can usually find out if you are connected wirelessly by
looking at the wireless LED.
3. Examine Figure 1‑5. This is a typical patch cable that connects to an RJ-45 port.
Figure 1-5
Photo of a typical patch cable
Photo used with permission from John Wiley & Sons, Inc.
The type of cable is known as twisted pair. It has an RJ-45 plug on the end,
which is molded so it can only connect one way to the RJ-45 port. It also has
a tab that locks it in place. The RJ-45 plug is slightly larger than a telephone
cable’s RJ-11 plug, but looks very similar. Another difference is that the phone
plug usually has four wires, whereas the RJ-45 plug has eight.
4. Identify the cable that connects your computer to the network. Disconnect the
cable (finish any downloads from the internet if in progress first) and view the
connector. If you are connected via a cable, attempt to identify what device is
connected to the other end of the cable, such as a hub, switch, or router.
5. Now let’s access the operating system and look at the properties of a network
adapter. For this example, we are using a Windows 10 client computer. However,
older versions of Windows have almost identical window and dialog box names, and
the navigation to those windows is similar as well.
Understanding Local Area Networking | 7
Figure 1-6
Device Manager with the
Network adapters category
expanded
d. Right-click the network adapter and choose Properties. A dialog box similar to
the one shown in Figure 1‑7 opens.
Figure 1-7
Properties dialog box of a
network adapter
Random documents with unrelated
content Scribd suggests to you:
Clelia. Eppure Marianna...
Rob. Ebbene sì.
Clelia. Come rispondi!
Rob. (Addolcito) Scusami...
Mar. (Rientra col lume)
Rob. Ma questo è per voi! — Portane un altro per me.
Clelia. Non vuoi star qui?
Rob. Non posso, ho da fare.
Clelia. Prendi questo. (A Marianna, che aspetta) Va, va.
Mar. (Via).
Rob. (Prende il lume e s’incammina).
Clelia. Roberto!... senza dir nulla a tua moglie?
Rob. (Fermandosi) Ma sì... ma sì, altro! (Va verso Elena).
Elena. (Lo guarda fissamente, aspettando).
Rob. (Posando il lume sulla tavola nervosamente) Insomma cosa c’è?
(a Clelia) Tu mi parli come a un ragazzo mal educato; Elena mi fa
una faccia! Se ci son novità, ditelo. Se no, lasciatemi andare. (Dopo
breve pausa). E non state in quest’aria; si gela. Venite via; fatevi
accendere il fuoco nel salotto.
Clelia. (Con le lagrime nella voce) Ah Roberto, come ci fai male!
Rob. (Tra’ denti) Ecco.
Clelia. Sono sempre stata buona con te. Non rimpiango niente, ma
questo è il momento di ricordartene. Tu lasci una moglie che ti vuole
un bene dell’anima, per correr dietro... sappiamo tutti a chi. È un
vero scandalo, sai. Non è l’esempio che devono dare i signori. — E
so anche altre cose... Giudizio Roberto, giudizio, per carità! Pensa ai
bambini, pensa ad Elena, pensa a me...
Rob. Elena... Elena ha torto: dovrebbe capire che non si può restar
gli stessi per tutta la vita... Se fosse sincera, vedrebbe che anche lei
non mi ama più come una volta.
Elena. (Scattando in piedi) Credi questo tu? — Non lo è. — Tu
vorresti che lo fosse, eh?
Rob. Oh santo Dio!
Elena. Sei cambiato? Ti giuro che io non lo sono. Il mio amore sei tu,
la mia felicità sei tu. Mi sono data a te per tutta in vita, non posso
capire quello che adesso succede.
Rob. È un cattivo momento per discutere. Siamo tutti nervosi...
Elena. No, no, no, finiamola, finiamola subito, d’un colpo. A te, parla.
Rob. Ebbene sia. Non sono più degno di te. Perdonami quello che ti
faccio soffrire.
Elena. Avanti, avanti; non puoi aver finito.
Rob. Hai mia madre che ti ama come una figlia...
Clelia. Ah sì, questo sì!
Rob. Hai i bambini... Amatevi fra di voi, e non pensate più a me.
Vedete bene che non misuro più le cose. Soffro, son vinto, è finita!
Elena. (A Clelia) Lo senti, lo senti!
Clelia. Roberto!
Rob. Conducila via, fa questo per lei!
Elena. Aspetta! Parlo io. Dunque è finita; non posso sperar più, non
tornerai quel di prima, non saremo più noi, mai, mai, mai!? Allora,
per forza, devo cambiare anch’io. Noi madri amiamo i nostri figli, li
difendiamo. Bada a te! badate a voi! Non farei nulla per me, ma
penso a loro. — Guardatevi!
Clelia. (Spaventata) Non dir queste cose! Per carità; non parlare
così!
Elena. Tu non sai che cosa è questo momento per me! — Dimmi
ancora: non vivrò più a lungo; se muoio, tu la sposerai?
Rob. (A Clelia) Conducila via, conducila via!
Elena. (Con grandissima intensità di passione) Dimmi no, dimmi no!
Trova una parola, Roberto! trovala, trovala...
Clelia. (Abbracciandola) Vieni; lasciamolo stare, vieni con me. (A
Roberto, severamente) Non ti riconosco più, fa quello che vuoi! (Via,
conducendo Elena, dalla sinistra).
SCENA SETTIMA.
Roberto solo.
SCENA OTTAVA.
Elena, poi Marianna.
Cala la tela.
LA PRIMAVERA DEL ’99
SCENE.
PERSONAGGI
Andrea Reviglio.
Il cavaliere di Priasco.
La contessa Clara Malan del Villar.
Don Rolando, prete di casa.
Rosa.
Alban.
Un uffiziale francese.
Un sergente.
Soldati.
SCENA PRIMA.
Alban, Rosa.
SCENA SECONDA.
Alban, Rosa, Don Rolando.
SCENA TERZA.
Don Rolando, Andrea.
SCENA QUARTA.
Rolando, Andrea, Alban.
SCENA SESTA.
Andrea e Don Rolando.
SCENA SETTIMA.
Andrea, Don Rolando, Alban.
Alban (frettoloso, passando). Michele è tornato... Ha visto il cavalier
di Priasco, che si è battuto tutta la notte... che sarà qui a momenti
(via a sinistra).
Andrea (colpito). Ah! Dunque è per lui che dovevo andare a Priasco!?
Rolando. Certo. È cugino della signora; era il miglior amico del nostro
povero conte... Dunque non ti vuoi muovere?
Andrea (risoluto). No.
Rolando. A rivederci.
SCENA OTTAVA.
Andrea e Clara.
SCENA NONA.
Andrea, Clara, Rosa.
SCENA DECIMA.
Clara, il Cavaliere.
SCENA UNDICESIMA.
Clara, Il Cavaliere, Alban.
SCENA DODICESIMA.
Clara, il Cavaliere, Alban e Rosa.
SCENA TREDICESIMA.
Clara, poi Alban con un uffiziale francese.
SCENA QUATTORDICESIMA.
Clara, l’uffiziale, il sergente.
SCENA QUINDICESIMA.
Clara, l’uffiziale, Alban, poi Andrea, il sergente ed alcuni
soldati.
SCENA SEDICESIMA.
Clara, l’uffiziale, Alban, Andrea, il sergente, i soldati, il
Cavaliere di Priasco.
(Un silenzio).
SCENA DICIASSETTESIMA.
Clara, Andrea, il Cavaliere di Priasco.
(Un silenzio).
Clara. Ah!