Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Computer Networking Beginners Guide: An Introduction on Wireless Technology and Systems Security to Pass CCNA Exam, With a Hint of Linux Programming and Command Line
Computer Networking Beginners Guide: An Introduction on Wireless Technology and Systems Security to Pass CCNA Exam, With a Hint of Linux Programming and Command Line
Computer Networking Beginners Guide: An Introduction on Wireless Technology and Systems Security to Pass CCNA Exam, With a Hint of Linux Programming and Command Line
Ebook126 pages1 hour

Computer Networking Beginners Guide: An Introduction on Wireless Technology and Systems Security to Pass CCNA Exam, With a Hint of Linux Programming and Command Line

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Are you studying for your CCNA exam?

Are you approaching the world of computer networking and want to fully understand all the fundamental concepts?

Do you want to know all the tools, potentials and weaknesses of a computer network, and take a dip in the programming by command line?

Do you want to learn how to juggle a complex infrastructure, using the most powerful software on the market?


Computer Networking is simply the formation of a computer network. A computer network can be defined as the collection of computers, printers, and other equipment that are connected (wired or wireless), with the ultimate aim of fostering communications between the devices. The process of creating this connection of devices is known as Computer Networking.

 

Technically, Computer Networking is referred to the process of transporting and exchanging data between points known as nodes, carried via a shared system, executed in an information system. The whole concept of Computer Networking does not consist only of the design, construction, and use of a network. It also involves the technical management, maintenance, and running of the involved infrastructure, software, and underlying policies.

 

Since the advent of wireless technologies, decades ago, our lives have never remained the same. And one thing is sure; it only promises to be better. With the gradual evolution of 5G in the mainstream, we can only imagine what is to come. One sentence does it, "Wireless technology has affected the very intrinsic properties of our lives."

 

It has affected the way we do business; it has transformed the way we learn; it has affected the way we communicate and keep up with family and friends. Everything has changed, and this is just a testimonial of things to come. 

 

This guide will focus on the following:

 

  • Protocol
  • Mitigating Network Threats
  • IPv6
  • Wiring Your Building
  • Network Cabling
  • 802.11i Robust security networks
  • Subnetting
  • Why Automate the Network?
  • Addressing Process Risks
  • IPv4 Summarization…
  • And more!

 

This book is very useful if you're studying for your CCNA exams. It includes every topic you need to know to pass the exam without any difficulty.
Have you looked at the table of contents and you think you are not able to understand the concepts contained in this book?
You'll think again when you see how simply and clearly each topic is dealt with, to allow you to understand everything deeply, even if you're starting from scratch.


Buy this book Now!

LanguageEnglish
PublisherAxel Ross
Release dateMay 5, 2022
ISBN9798201693114
Computer Networking Beginners Guide: An Introduction on Wireless Technology and Systems Security to Pass CCNA Exam, With a Hint of Linux Programming and Command Line

Read more from Axel Ross

Related to Computer Networking Beginners Guide

Related ebooks

Intelligence (AI) & Semantics For You

View More

Related articles

Reviews for Computer Networking Beginners Guide

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Computer Networking Beginners Guide - Axel Ross

    Axel Ross

    Description

    Introduction

    Chapter 1 - Protocol

    Why protocols are needed?

    So What Is An Agreement In Protocol?

    The Birth and Standardization of Computer Communications

    Chapter 2 - Mitigating Network Threats

    Identifying threats

    How attacks happen

    Chapter 3 - IPv6

    How to convert a decimal into hexadecimal?

    How to convert a hexadecimal into decimal?

    IPv6 structure

    Remember the following rules

    IPv6 address types

    Unicast

    Link local unicast:

    IPv4compatible IPv6

    Multicast address

    Chapter 4 - Wiring Your Building

    Chapter 5 - Network Cabling

    Chapter 6 - 802.11i Robust security networks

    Management Operations

    Contention-Free Service

    Chapter 7 - Subnetting

    Chapter 8 - Why Automate the Network?

    Chapter 9 - Packet Tracer Activities

    Chapter 10 - Malware: A Hacker’s Henchman

    Types of Malware

    Virus:

    Vulnerability to Malware

    Homogeneity

    Cover your tracks

    Crimeware

    Bots

    Chapter 11 - Products and Services Offered by Cisco Networking Solutions

    Access Points

    Outdoor and Industrial Access

    Wireless Controllers

    Networking Management

    Optical Networking

    Interfaces and Modules

    Next Generation Firewall

    Chapter 12 - Addressing Process Risks

    People and Policy Risks

    Advanced Malware Protection

    VPN Security Clients

    Advanced Email Security Protection

    Web Security

    Business Collaborations (Collaboration Endpoints)

    Customer Collaborations

    Unified Communications

    Unified Computing

    Data Center Automation

    Secure Data Center

    Hyper-Converged Infrastructure

    Chapter 13 IPv4 Summarization

    Its Purpose & Configurations

    Conclusion

    © Copyright 2019 - All rights reserved

    No part of this book may be reproduced in any form without permission in writing from the author. Reviewers may quote brief passages in reviews.

    Disclaimer

    No part of this publication may be reproduced or transmitted in any form or by any means, mechanical or electronic, including photocopying or recording, or by any information storage or retrieval system, or transmitted by email without permission in writing from the publisher.

    While all attempts have been made to verify the information provided in this publication, neither the author nor the publisher assumes any responsibility for errors, omissions, or contrary interpretations of the subject matter herein.

    This book is for entertainment purposes only. The views expressed are those of the author alone and should not be taken as expert instructions of commands. The reader is responsible for his or her own actions.

    Adherence to all applicable laws and regulations, including international, federal, state and local governing professional licensing, business practices, advertising, and all other aspects of doing business in the US, Canada, or any other jurisdiction is the sole responsibility of the purchaser or reader.

    Neither the author nor the publisher assumes any responsibility or liability whatsoever on the behalf of the purchaser or reader of these materials.

    Any perceived slight of any individual or organization is purely unintentional.

    Description

    Computer Networking is simply the formation of a computer network. A computer network can be defined as the collection of computers, printers, and other equipment that are connected (wired or wireless), with the ultimate aim of fostering communications between the devices. The process of creating this connection of devices is known as Computer Networking. 

    Technically, Computer Networking is referred to the process of transporting and exchanging data between points known as nodes, carried via a shared system, executed in an information system. The whole concept of Computer Networking does not consist only of the design, construction, and use of a network. It also involves the technical management, maintenance, and running of the involved infrastructure, software, and underlying policies.

    Since the advent of wireless technologies, decades ago, our lives have never remained the same. And one thing is sure; it only promises to be better. With the gradual evolution of 5G in the mainstream, we can only imagine what is to come. One sentence does it, Wireless technology has affected the very intrinsic properties of our lives.

    It has affected the way we do business; it has transformed the way we learn; it has affected the way we communicate and keep up with family and friends. Everything has changed, and this is just a testimonial of things to come.

    This guide will focus on the following:

    Protocol

    Mitigating Network Threats

    IPv6

    Wiring Your Building

    Network Cabling

    802.11i Robust security networks

    Subnetting

    Why Automate the Network?

    Addressing Process Risks

    IPv4 Summarization... AND MORE!!!

    Introduction

    A computer network is made up primarily of interconnecting common, programmable hardware. The hardware is designed for a specific purpose (for example, to transmit data or video signals). This programmable hardware can be used to transmit a variety of different types of data and can support a wide and growing range of applications.  

    According to this definition: (1) the hardware connected to a computer network is not limited to ordinary computers, but includes smartphones and other different types of devices like AR devices, smartwatches that are flooding the market every day (2) computer networks are not specifically designed to transmit data, but are capable of supporting a wide variety of applications (including those that may arise in the future). 

    We know that in the beginning, computer networks were really used to transmit data. But with the development of network technology, the application scope of a computer network is increasing, not only networks can transmit audio and video files, but also the application scope has far exceeded the general communication scope and can be perfectly used for many applications.  

    It is generally believed that computer network refers to the connection of multiple computers and network equipment with independent instruments in different geographical locations through communication lines (including transmission media and network equipment). A computer system for resource sharing and information transfer under the co-management and coordination of Network Operating System, network management software and network communication protocol. If you don't know what a computer network is, go home, or go to an Internet cafe, or go to your company and see for yourself. What you see is a network of pcs (personal computers) that appear to be independent and located in different places, connected by cables and boxes of devices (switches, routers).  

    Simply put, a computer network is a collection of computer systems, or groups of computer systems, that work independently and are connected to each other by communication lines, including connecting cables and network equipment. In this set of computer systems, resources can be shared among computers, access to each other can be carried out for a variety of computer network applications. The computers can be microcomputers, minicomputers, midsized computers, mainframes.   

    By sharing, I mean sharing resources. Resource sharing has many implications. It can be information sharing, software sharing, or hardware sharing. For example, there are many servers on the Internet (that is, a dedicated computer) that store a large number of valuable electronic documents (including audio and video files) that can be easily read or downloaded (for free or for a fee) by Internet users. Because of the network, these resources are as easy to use as if they were right next to the user.    

    A typical example of data resource sharing is database resource sharing, where each network user can centrally invoke relevant data information in a single database server. A variety of application servers are also examples of sharing data resources, such as receiving email through client-side programs like Fox Mail and Outlook, and the online games you and your friends play every day Or you and your Family Watch the same movie on the Internet every day on a different computer at home. There are many examples of sharing software resources, such as in the enterprise internal network we will provide all employees on the server to share some common tools, let users choose to install. If pushed to the Internet, it is more intuitive, we downloaded from the Internet are all examples of software resource sharing. 

    Protocol

    In the field of computer network

    Enjoying the preview?
    Page 1 of 1