Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Table of Contents
Introduction
About This Book
Foolish Assumptions
Icons Used in This Book
Beyond the Book
Where to Go from Here
Part 1: Getting Started with Networking
Chapter 1: Let’s Network!
Defining a Network
Why Bother with a Network?
Servers and Clients
Dedicated Servers and Peers
What Makes a Network Tick?
It’s Not a Personal Computer Anymore!
The Network Administrator
What Have They Got That You Don’t Got?
Chapter 2: Life on the Network
Distinguishing between Local Resources and Network Resources
What’s in a Name?
Logging On to the Network
Understanding Shared Folders
Four Good Uses for a Shared Folder
Oh, the Network Places You’ll Go
Mapping Network Drives
Using a Network Printer
Logging Off the Network
Chapter 3: More Ways to Use Your Network
Sharing Your Stuff
Sharing a Folder
Using the Public Folder
Sharing a Printer
Using Microsoft Office on a Network
Working with Offline Files
Part 2: Setting Up a Network
Chapter 4: Planning a Network
Making a Network Plan
Being Purposeful
Taking Stock
To Dedicate or Not to Dedicate: That Is the Question
Choosing a Server Operating System
Planning the Infrastructure
Drawing Diagrams
Chapter 5: Dealing with TCP/IP
Understanding Binary
Introducing IP Addresses
Classifying IP Addresses
Subnetting
Understanding Network Address Translation
Configuring Your Network for DHCP
Managing a Windows Server 2016 DHCP Server
Configuring a Windows DHCP Client
Using DNS
Working with the Windows DNS Server
Configuring a Windows DNS Client
Chapter 6: Oh, What a Tangled Web We Weave: Cables, Switches, and Routers
What Is Ethernet?
All about Cable
Working with Switches
Daisy-Chaining Switches
Using a Router
Chapter 7: Configuring Windows Clients
Configuring Network Connections
Joining a Domain
Chapter 8: Connecting Your Network to the Internet
Connecting to the Internet
Securing Your Connection with a Firewall
Chapter 9: Setting Up a Wireless Network
Diving into Wireless Networking
A Little High School Electronics
Eight-Oh-Two-Dot-Eleventy Something?: Understanding Wireless Standards
Home on the Range
Using Wireless Network Adapters
Setting Wireless Access Points
Roaming Capabilities
Configuring a Wireless Access Point
Connecting to a Wireless Network
Paying Attention to Wireless Network Security
Chapter 10: Virtual Networking
Understanding Virtualization
Understanding Hypervisors
Understanding Virtual Disks
Understanding Network Virtualization
Looking at the Benefits of Virtualization
Introducing Hyper-V
Enabling Hyper-V
Getting Familiar with Hyper-V
Creating a Virtual Switch
Creating a Virtual Disk
Creating a Virtual Machine
Installing an Operating System
Part 3: Working with Servers
Chapter 11: Setting Up a Server
Server Operating System Features
The Many Ways to Install a Network Operating System
Gathering Your Stuff
Making Informed Decisions
Final Preparations
Installing a Server Operating System
Configuring Your Server
Chapter 12: Managing Windows User Accounts
Understanding Windows User Accounts
Creating a New User
Setting User Properties
Resetting User Passwords
Disabling and Enabling User Accounts
Deleting a User
Working with Groups
Creating a Logon Script
Chapter 13: Managing Network Storage
Understanding Network Storage
Understanding Permissions
Understanding Shares
Managing Your File Server
Chapter 14: Managing Exchange Server 2016
Creating a Mailbox
Managing Mailboxes
Configuring Outlook for Exchange
Chapter 15: Creating an Intranet
Defining an Intranet
Identifying Intranet Uses
Setting Up an Intranet
Setting Up an IIS Web Server
Understanding the Default Website
Creating Websites
Part 4: Managing and Protecting Your Network
Chapter 16: Welcome to Network Management
What a Network Administrator Does
Choosing the Part-Time Administrator
The Three “Ups” of Network Management
Managing Network Users
Acquiring Software Tools for Network Administrators
Building a Library
Pursuing Certification
Helpful Bluffs and Excuses
Chapter 17: Solving Network Problems
When Bad Things Happen to Good Computers
Fixing Dead Computers
Ways to Check a Network Connection
A Bunch of Error Messages Just Flew By!
Double-Checking Your Network Settings
Using a Windows Troubleshooter
Time to Experiment
Who’s on First?
Restarting a Client Computer
Booting in Safe Mode
Using System Restore
Restarting Network Services
Restarting a Network Server
Looking at Event Logs
Documenting Your Trials and Tribulations
Chapter 18: Backing Up Your Data
Backing Up Your Data
Choosing Where to Back Up Your Data
Backing Up to Tape
Understanding Backup Software
Comparing Types of Backups
Choosing between Local and Network Backups
Deciding How Many Sets of Backups to Keep
Verifying Tape Reliability
Keeping Backup Equipment Clean and Reliable
Setting Backup Security
Chapter 19: Securing Your Network
Do You Need Security?
Two Approaches to Security
Physical Security: Locking Your Doors
Securing User Accounts
Managing User Security
Securing Your Users
Chapter 20: Hardening Your Network
Firewalls
The Many Types of Firewalls
The Built-In Windows Firewall
Virus Protection
Patching Things Up
Chapter 21: Network Performance Anxiety
Why Administrators Hate Performance Problems
What Exactly Is a Bottleneck?
The Five Most Common Network Bottlenecks
Tune Your Network the Compulsive Way
Monitoring Network Performance
More Performance Tips
Part 5: More Ways to Network
Chapter 22: Life in Cloud City
Introducing Cloud Computing
Looking at the Benefits of Cloud Computing
Detailing the Drawbacks of Cloud Computing
Examining Three Basic Kinds of Cloud Services
Public Clouds versus Private Clouds
Introducing Some of the Major Cloud Providers
Getting Into the Cloud
Chapter 23: Managing Mobile Devices
The Many Types of Mobile Devices
Considering Security for Mobile Devices
Managing iOS Devices
Managing Android Devices
Chapter 24: Connecting from Home
Using Outlook Web App
Using a Virtual Private Network
Part 6: Networking Beyond Windows
Chapter 25: Networking with Linux
Comparing Linux with Windows
Choosing a Linux Distribution
Installing Linux
On Again, Off Again
Using GNOME
Getting to a Command Shell
Enabling the SUDO Command
Managing User Accounts
Network Configuration
Doing the Samba Dance
Chapter 26: Mac Networking
Basic Mac Network Settings
Joining a Domain
Connecting to a Share
Part 7: The Part of Tens
Chapter 27: Ten Networking Commandments
I. Thou Shalt Back Up Thy Hard Drive Religiously
II. Thou Shalt Protect Thy Network from Infidels
III. Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files
IV. Thou Shalt Not Tinker with Thine Network Configuration Unless Thou Knowest What Thou Art Doing
V. Thou Shalt Not Covet Thy Neighbor’s Network
VI. Thou Shalt Schedule Downtime before Working upon Thy Network
VII. Thou Shalt Keep an Adequate Supply of Spare Parts
VIII. Thou Shalt Not Steal Thy Neighbor’s Program without a License
IX. Thou Shalt Train Thy Users in the Ways of the Network
X. Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone
Chapter 28: Ten Big Network Mistakes
Skimping on Hardware
Turning Off or Restarting a Server Computer While Users Are Logged On
Deleting Important Files on the Server
Copying a File from the Server, Changing It, and Then Copying It Back
Sending Something to the Printer Again Just Because It Didn’t Print the First Time
Assuming That the Server Is Safely Backed Up
Connecting to the Internet without Considering Security Issues
Plugging In a Wireless Access Point without Asking
Thinking You Can’t Work Just Because the Network Is Down
Running Out of Space on a Server
Always Blaming the Network
Chapter 29: Ten Things You Should Keep in Your Closet
Duct Tape
Tools
Patch Cables
Cable Ties
Twinkies
Replacement Parts
Cheap Network Switches
The Complete Documentation of the Network on Tablets of Stone
The Network Manuals and Disks
Ten Copies of This Book
About the Author
Connect with Dummies
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →