Computer Networking Beginners Guide: An Introduction on Wireless Technology and Systems Security to Pass CCNA Exam, With a Hint of Linux Programming and Command Line
By Axel Ross
()
About this ebook
Are you studying for your CCNA exam?
Are you approaching the world of computer networking and want to fully understand all the fundamental concepts?
Do you want to know all the tools, potentials and weaknesses of a computer network, and take a dip in the programming by command line?
Do you want to learn how to juggle a complex infrastructure, using the most powerful software on the market?
Computer Networking is simply the formation of a computer network. A computer network can be defined as the collection of computers, printers, and other equipment that are connected (wired or wireless), with the ultimate aim of fostering communications between the devices. The process of creating this connection of devices is known as Computer Networking.
Technically, Computer Networking is referred to the process of transporting and exchanging data between points known as nodes, carried via a shared system, executed in an information system. The whole concept of Computer Networking does not consist only of the design, construction, and use of a network. It also involves the technical management, maintenance, and running of the involved infrastructure, software, and underlying policies.
Since the advent of wireless technologies, decades ago, our lives have never remained the same. And one thing is sure; it only promises to be better. With the gradual evolution of 5G in the mainstream, we can only imagine what is to come. One sentence does it, "Wireless technology has affected the very intrinsic properties of our lives."
It has affected the way we do business; it has transformed the way we learn; it has affected the way we communicate and keep up with family and friends. Everything has changed, and this is just a testimonial of things to come.
This guide will focus on the following:
- Protocol
- Mitigating Network Threats
- IPv6
- Wiring Your Building
- Network Cabling
- 802.11i Robust security networks
- Subnetting
- Why Automate the Network?
- Addressing Process Risks
- IPv4 Summarization…
- And more!
This book is very useful if you're studying for your CCNA exams. It includes every topic you need to know to pass the exam without any difficulty.
Have you looked at the table of contents and you think you are not able to understand the concepts contained in this book?
You'll think again when you see how simply and clearly each topic is dealt with, to allow you to understand everything deeply, even if you're starting from scratch.
Buy this book Now!
Read more from Axel Ross
Hacking with Kali Linux: A Step by Step Guide to Learn the Basics of Linux Penetration. What A Beginner Needs to Know About Wireless Networks Hacking and Systems Security. Tools Explanation Included Rating: 0 out of 5 stars0 ratings
Related to Computer Networking Beginners Guide
Related ebooks
Networking Fundamentals: Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366 Rating: 0 out of 5 stars0 ratingsNetwork Engineering - The Essential Handbook Rating: 0 out of 5 stars0 ratingsComputer Networks: A Systems Approach Rating: 4 out of 5 stars4/5The Compete Ccna 200-301 Study Guide: Network Engineering Edition Rating: 5 out of 5 stars5/5Eleventh Hour Network+: Exam N10-004 Study Guide Rating: 5 out of 5 stars5/5Ethernet Networking for the Small Office and Professional Home Office Rating: 4 out of 5 stars4/5Architecture of Network Systems Rating: 5 out of 5 stars5/5Comptia+ Network Rating: 0 out of 5 stars0 ratingsExploring Computer Systems Rating: 0 out of 5 stars0 ratingsComputer Networking: An introductory guide for complete beginners: Computer Networking, #1 Rating: 5 out of 5 stars5/5Security+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic Rating: 4 out of 5 stars4/5Cisco Network Administration Interview Questions: CISCO CCNA Certification Review Rating: 5 out of 5 stars5/5The Quick Guide to Cloud Computing and Cyber Security Rating: 4 out of 5 stars4/5Introduction to Information Systems: Information Technology Essentials, #1 Rating: 0 out of 5 stars0 ratingsMastering Python Networking Rating: 5 out of 5 stars5/5C++ Networking 101 Rating: 0 out of 5 stars0 ratingsComptia Network+ V6 Study Guide - Indie Copy Rating: 0 out of 5 stars0 ratingsTCP/IP for Everyone Rating: 4 out of 5 stars4/5Practical TCP/IP and Ethernet Networking for Industry Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Networking Explained Rating: 4 out of 5 stars4/5Managing Cisco Network Security Rating: 3 out of 5 stars3/5Comptia Security+ Primer Rating: 5 out of 5 stars5/5TCP/IP Networking Interview Questions, Answers, and Explanations: TCP/IP Network Certification Review Rating: 5 out of 5 stars5/5Understanding TCP/IP Rating: 4 out of 5 stars4/5
Intelligence (AI) & Semantics For You
The Insane ChatGPT Millionaire Guide Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Midjourney Mastery - The Ultimate Handbook of Prompts Rating: 5 out of 5 stars5/5101 Midjourney Prompt Secrets Rating: 3 out of 5 stars3/5ChatGPT For Dummies Rating: 0 out of 5 stars0 ratingsTensorFlow in 1 Day: Make your own Neural Network Rating: 4 out of 5 stars4/5ChatGPT: The Future of Intelligent Conversation Rating: 4 out of 5 stars4/5Killer ChatGPT Prompts: Harness the Power of AI for Success and Profit Rating: 2 out of 5 stars2/5ChatGPT For Fiction Writing: AI for Authors Rating: 5 out of 5 stars5/5Hacking : Guide to Computer Hacking and Penetration Testing Rating: 5 out of 5 stars5/5The Secrets of ChatGPT Prompt Engineering for Non-Developers Rating: 5 out of 5 stars5/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsDancing with Qubits: How quantum computing works and how it can change the world Rating: 5 out of 5 stars5/5The Algorithm of the Universe (A New Perspective to Cognitive AI) Rating: 5 out of 5 stars5/5A Quickstart Guide To Becoming A ChatGPT Millionaire: The ChatGPT Book For Beginners (Lazy Money Series®) Rating: 4 out of 5 stars4/5Chat-GPT Income Ideas: Pioneering Monetization Concepts Utilizing Conversational AI for Profitable Ventures Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Enterprise AI For Dummies Rating: 3 out of 5 stars3/5Artificial Intelligence: A Guide for Thinking Humans Rating: 4 out of 5 stars4/5Our Final Invention: Artificial Intelligence and the End of the Human Era Rating: 4 out of 5 stars4/5
Reviews for Computer Networking Beginners Guide
0 ratings0 reviews
Book preview
Computer Networking Beginners Guide - Axel Ross
Axel Ross
Description
Introduction
Chapter 1 - Protocol
Why protocols are needed?
So What Is An Agreement In Protocol?
The Birth and Standardization of Computer Communications
Chapter 2 - Mitigating Network Threats
Identifying threats
How attacks happen
Chapter 3 - IPv6
How to convert a decimal into hexadecimal?
How to convert a hexadecimal into decimal?
IPv6 structure
Remember the following rules
IPv6 address types
Unicast
Link local unicast:
IPv4compatible IPv6
Multicast address
Chapter 4 - Wiring Your Building
Chapter 5 - Network Cabling
Chapter 6 - 802.11i Robust security networks
Management Operations
Contention-Free Service
Chapter 7 - Subnetting
Chapter 8 - Why Automate the Network?
Chapter 9 - Packet Tracer Activities
Chapter 10 - Malware: A Hacker’s Henchman
Types of Malware
Virus:
Vulnerability to Malware
Homogeneity
Cover your tracks
Crimeware
Bots
Chapter 11 - Products and Services Offered by Cisco Networking Solutions
Access Points
Outdoor and Industrial Access
Wireless Controllers
Networking Management
Optical Networking
Interfaces and Modules
Next Generation Firewall
Chapter 12 - Addressing Process Risks
People and Policy Risks
Advanced Malware Protection
VPN Security Clients
Advanced Email Security Protection
Web Security
Business Collaborations (Collaboration Endpoints)
Customer Collaborations
Unified Communications
Unified Computing
Data Center Automation
Secure Data Center
Hyper-Converged Infrastructure
Chapter 13 IPv4 Summarization
Its Purpose & Configurations
Conclusion
© Copyright 2019 - All rights reserved
No part of this book may be reproduced in any form without permission in writing from the author. Reviewers may quote brief passages in reviews.
Disclaimer
No part of this publication may be reproduced or transmitted in any form or by any means, mechanical or electronic, including photocopying or recording, or by any information storage or retrieval system, or transmitted by email without permission in writing from the publisher.
While all attempts have been made to verify the information provided in this publication, neither the author nor the publisher assumes any responsibility for errors, omissions, or contrary interpretations of the subject matter herein.
This book is for entertainment purposes only. The views expressed are those of the author alone and should not be taken as expert instructions of commands. The reader is responsible for his or her own actions.
Adherence to all applicable laws and regulations, including international, federal, state and local governing professional licensing, business practices, advertising, and all other aspects of doing business in the US, Canada, or any other jurisdiction is the sole responsibility of the purchaser or reader.
Neither the author nor the publisher assumes any responsibility or liability whatsoever on the behalf of the purchaser or reader of these materials.
Any perceived slight of any individual or organization is purely unintentional.
Description
Computer Networking is simply the formation of a computer network. A computer network can be defined as the collection of computers, printers, and other equipment that are connected (wired or wireless), with the ultimate aim of fostering communications between the devices. The process of creating this connection of devices is known as Computer Networking.
Technically, Computer Networking is referred to the process of transporting and exchanging data between points known as nodes, carried via a shared system, executed in an information system. The whole concept of Computer Networking does not consist only of the design, construction, and use of a network. It also involves the technical management, maintenance, and running of the involved infrastructure, software, and underlying policies.
Since the advent of wireless technologies, decades ago, our lives have never remained the same. And one thing is sure; it only promises to be better. With the gradual evolution of 5G in the mainstream, we can only imagine what is to come. One sentence does it, Wireless technology has affected the very intrinsic properties of our lives.
It has affected the way we do business; it has transformed the way we learn; it has affected the way we communicate and keep up with family and friends. Everything has changed, and this is just a testimonial of things to come.
This guide will focus on the following:
Protocol
Mitigating Network Threats
IPv6
Wiring Your Building
Network Cabling
802.11i Robust security networks
Subnetting
Why Automate the Network?
Addressing Process Risks
IPv4 Summarization... AND MORE!!!
Introduction
A computer network is made up primarily of interconnecting common, programmable hardware. The hardware is designed for a specific purpose (for example, to transmit data or video signals). This programmable hardware can be used to transmit a variety of different types of data and can support a wide and growing range of applications.
According to this definition: (1) the hardware connected to a computer network is not limited to ordinary computers, but includes smartphones and other different types of devices like AR devices, smartwatches that are flooding the market every day (2) computer networks are not specifically designed to transmit data, but are capable of supporting a wide variety of applications (including those that may arise in the future).
We know that in the beginning, computer networks were really used to transmit data. But with the development of network technology, the application scope of a computer network is increasing, not only networks can transmit audio and video files, but also the application scope has far exceeded the general communication scope and can be perfectly used for many applications.
It is generally believed that computer network refers to the connection of multiple computers and network equipment with independent instruments in different geographical locations through communication lines (including transmission media and network equipment). A computer system for resource sharing and information transfer under the co-management and coordination of Network Operating System, network management software and network communication protocol. If you don't know what a computer network is, go home, or go to an Internet cafe, or go to your company and see for yourself. What you see is a network of pcs (personal computers) that appear to be independent and located in different places, connected by cables and boxes of devices (switches, routers).
Simply put, a computer network is a collection of computer systems, or groups of computer systems, that work independently and are connected to each other by communication lines, including connecting cables and network equipment. In this set of computer systems, resources can be shared among computers, access to each other can be carried out for a variety of computer network applications. The computers can be microcomputers, minicomputers, midsized computers, mainframes.
By sharing, I mean sharing resources. Resource sharing has many implications. It can be information sharing, software sharing, or hardware sharing. For example, there are many servers on the Internet (that is, a dedicated computer) that store a large number of valuable electronic documents (including audio and video files) that can be easily read or downloaded (for free or for a fee) by Internet users. Because of the network, these resources are as easy to use as if they were right next to the user.
A typical example of data resource sharing is database resource sharing, where each network user can centrally invoke relevant data information in a single database server. A variety of application servers are also examples of sharing data resources, such as receiving email through client-side programs like Fox Mail and Outlook, and the online games you and your friends play every day Or you and your Family Watch the same movie on the Internet every day on a different computer at home. There are many examples of sharing software resources, such as in the enterprise internal network we will provide all employees on the server to share some common tools, let users choose to install. If pushed to the Internet, it is more intuitive, we downloaded from the Internet are all examples of software resource sharing.
Protocol
In the field of computer network