Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)
4/5
()
About this ebook
Keeping this high-demand information from yourself will be detrimental to your technologically-clueless future self...
Do computers and technology, in general, feel alien-like to you, as if it's something way past your time?
The advancements made in technology have taken over how our society functions, and so there's no other way to deal with your shortcomings than to handle it head-on.
According to TechCo, technology has influenced nearly every aspect of our daily lives, resulting in:
- Improved communication
- Improved forms of home entertainment
- Improved housing and lifestyle standards
- An altered healthy industry
- More convenient tools for education
And last, but certainly not least:
- Easier travel, both short and long distances
It's incredible to think there are people who have made all these things possible, yet, don't you want to know more about what's happening on the inside of it all?
In a nutshell, it's a form of communication that allows for the sharing of resources from one device to another and without computer networking, none of the technology we have today could have been attained.
Starting with the basics, you will be able to work your way up to become a computer whiz and be the one people turn to for computer advice.
In Computer Networking, you will discover:
- The fundamental elements essential to creating your network, including why each of them is so important to your start-up
- A thorough explanation of the networking terms you need to know, written in plain English for easy comprehension
- How the Internet has had a revolutionary impact on our society, as well as what you can do to keep up with this undeniable part of our lives
- The best type of cable to use according to your networking needs
- The 4 main types of wireless networks you should know, along with what factors can interfere with the consistency of these connections
- The #1 aspect of computer networking that can present a critical threat to your valuable data if not taken seriously
And much more.
Even if you are at the very bottom of the computer food chain, there's no point in staying there. Technology will continue to advance whether you'd like it to or not, so you better jump on board before it's too late.
Knowing your way around computers and how to utilize it for communication is a skill set required at almost every workplace you can find in the modern world, yet that fact is not something you should fear. Use it rather for motivation.
The more skill sets you develop, the more opportunities you open for yourself. So with that being said, there's no better time than the present to begin your journey towards a well-informed, technologically-gifted you.
Join the other side and finally be the one who's able to correct others about their computer knowledge...
If you want to overcome your computer phobia and discover the endless opportunities computer networking has in store, then you need this book today!
Related to Computer Networking
Related ebooks
The Compete Ccna 200-301 Study Guide: Network Engineering Edition Rating: 5 out of 5 stars5/5Networking All-in-One For Dummies Rating: 5 out of 5 stars5/5Computer Networking: An introductory guide for complete beginners: Computer Networking, #1 Rating: 5 out of 5 stars5/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsNetworking Fundamentals: Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366 Rating: 0 out of 5 stars0 ratingsComputer Networks: A Systems Approach Rating: 4 out of 5 stars4/5Concise and Simple Guide to IP Subnets Rating: 5 out of 5 stars5/5Cisco Network Administration Interview Questions: CISCO CCNA Certification Review Rating: 5 out of 5 stars5/5Cloud Networking: Understanding Cloud-based Data Center Networks Rating: 5 out of 5 stars5/5Comptia+ Network Rating: 0 out of 5 stars0 ratingsEleventh Hour Network+: Exam N10-004 Study Guide Rating: 5 out of 5 stars5/5Ethernet Networking for the Small Office and Professional Home Office Rating: 4 out of 5 stars4/5Comptia Network+ V6 Study Guide - Indie Copy Rating: 0 out of 5 stars0 ratingsThe Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5TCP/IP for Everyone Rating: 4 out of 5 stars4/5Networking For Dummies Rating: 0 out of 5 stars0 ratingsNetwork+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Understanding TCP/IP Rating: 4 out of 5 stars4/5Cisco Networking All-in-One For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsCisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners: Computer Networking, #3 Rating: 0 out of 5 stars0 ratingsWhat is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsUltimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Darknet Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 3 out of 5 stars3/5CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratings
Reviews for Computer Networking
4 ratings1 review
- Rating: 5 out of 5 stars5/5the good book its ari poter and a ring a
Book preview
Computer Networking - Benjamin Walker
Computer Networking
The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)
––––––––
Benjamin Walker
© Copyright 2019 - All rights reserved.
The content contained within this book may not be reproduced, duplicated or transmitted without direct written permission from the author or the publisher.
Under no circumstances will any blame or legal responsibility be held against the publisher, or author, for any damages, reparation, or monetary loss due to the information contained within this book. Either directly or indirectly.
Legal Notice:
This book is copyright protected. This book is only for personal use. You cannot amend, distribute, sell, use, quote or paraphrase any part, or the content within this book, without the consent of the author or publisher.
Disclaimer Notice:
Please note the information contained within this document is for educational and entertainment purposes only. All effort has been executed to present accurate, up to date, and reliable, complete information. No warranties of any kind are declared or implied. Readers acknowledge that the author is not engaging in the rendering of legal, financial, medical or professional advice. The content within this book has been derived from various sources. Please consult a licensed professional before attempting any techniques outlined in this book.
By reading this document, the reader agrees that under no circumstances is the author responsible for any losses, direct or indirect, which are incurred as a result of the use of information contained within this document, including, but not limited to, — errors, omissions, or inaccuracies.
Table of Contents
Introduction
Computer Networking Defined: The Whole Concept.
What is Computer Networking?
Components of Networking
Computer Networking Components Defined
Network bridges
Methods of Forwarding
Networking Topologies
Bus Topology
Ring Topology
Star Topology
Mesh Topology
Tree Topology
Hybrid Topology
Chapter 1: Types of Computer Networking
Local Area Network (LAN)
Nodes of a LAN
Types of a Local Area Network
Deploying a Wireless LAN
Wide Area Network (WAN)
Types of WAN connections – and how they work.
WAN Optimization
WAN Security
Advantages and Disadvantages of the Wide Area Network
Metropolitan Area Network (MAN)
Factors that distinguish the Metropolitan Area Network
Chapter 2: Wired Network Technology
Wired Network technology
Types of Wired Network Media
Advantages of using a wired network
Disadvantages of the wired network
Chapter 3: Functionality of Wireless Network
What exactly is the wireless system?
Wireless Technology Standards
The various forms of the Wireless standards
Wireless Interference
Data Security
Types of Data Security explained
Compliance and Standards of Data Security
Firewalls defined
How does the firewall work?
Types of firewall
Chapter 4: Revolutionary Impact of the Wireless Technology and Breakthroughs of Computer Networking
VLAN – Virtual Local Area Network
Types of VLANs
How does VLAN work?
Advantages and Disadvantages of the VLAN
The Internet and how it has impacted our lives
Social Media on the Internet
New Media (Mass Communication)
Chapter 5: Wireless Network Computer Architecture
Components of Wireless Communication
Wireless Application Protocol
WAP Model
WAP Architecture
Bluetooth Architecture
Lower Stack Layers
Upper stack layer
MOBITEX
CDPD
Features of the CDPD technology
The CDPD architecture
Advantages and Disadvantages of CDPD
I-MODE
Chapter 6: Wireless Communication Technologies
Basic components of the wireless communication systems
Types of Wireless Communication Systems
Multiple Access Techniques
Frequency Division Multiple Access (FDMA)
Time division multiple access (TDMA)
Code division multiple-access (CDMA)
Space division multiple access (SDMA)
Spread spectrum multiple access (SSMA)
Channel Characteristics
Types of Paths
Diversity and its types
Types of diversity
Chapter 7: Wireless Technology for Internet of Things
Zigbee Wireless Technology: Its Architecture and application
The Zigbee Architecture
Zigbee Operating Modes and its Topologies
Application of Zigbee Technology
WiMax
Advantages of WiMax
Disadvantages of WiMax
Advantages of Wireless Technology
Disadvantages of Wireless Technology
Top Wireless Technology Challenges
Chapter 8: Network Protocols
Internet Protocols
Types of internet protocols
Transmission Control Protocol (TCP)
What does the TCP do?
How TCP works
TCP Addressing
User Datagram Protocol (UDP)
Requirements of UDP
What are the features of the UDP?
UDP Header
Applications of UDP
Wireless Network Protocols
LTE
Wi-Fi
Bluetooth
60 GHz Protocols – WirelessHD and WiGig
Wireless Home Automation Protocols – Z – Wave and Zigbee
Network Routing Protocols
Classes of Routing Protocols
Distance Vector routing protocol
Link State Routing Protocols
Advanced distance vector routing protocol
Types of Network routing protocols
Routing information protocol
Interior gateway routing protocol
Open shortest path first
Exterior gateway protocol
Enhanced interior gateway routing protocol
Order Gateway Protocol
Intermediate system to intermediate system
Network Security Protocols
Network Management Protocols
Types of the Network Management Protocols
Chapter 9: Communication and Cellular Systems
Features of Cellular Network systems
Shape of Cells
Square
Hexagonal
Frequency Reuse
Evolution of cellular networks
1G
Features of 1G
2G – The Second Generation Communication System
Features of 2G
2.5G and 2.75G system
3G – Third Generation
Features of 3G
3.5G to 3.75 Systems
4G – Fourth Generation communication system
Features
5G – Fifth Generation Communication System
Features of the 5G
Cellular System Architecture
Mobile switching centers
Elements of a Communication System
Information source
Input transducer
Transmitter
Communication channel
Noise
Receiver
Output transducer
Destination
Messaging systems: Electronic Mail and Voice Processing
Electronic Mail
What can email be used for?
Short comings of the Email
Speech Processing
Techniques of Speech Processing
Fundamentals of data communication
Public Switched Telephone Network (PSTN)
Chapter 10: Wireless Network Technology and its Utilities
What is CISCO systems?
Cisco Routers for Home
Cisco Routers and the Internet
Cisco CSR – Carrier Routing Systems
Cisco ASR – Aggregation Service Routers
Cisco ISR – Integrated Services Routers
Cisco IOS – Internetwork Operating System
CISCO Network Certifications
Entry Level (CCENT & CCT)
Associate Level (CCNA & CCDA)
Cisco Professional Level Certifications (CCNP & CCDP)
Cisco’s Expert-Level Certifications (CCIE & CCDE)
Cisco’s Architect-Level Certifications
Job Opportunities for the various Certifications
Cisco Packet Tracers
Chapter 11: Differences Between Wired and Wireless Networks
Wired networks
Wireless networks
Table of Comparison
Chapter 12: Computer Network Security
Common Security Threats
Computer Virus
Rogue security software
Trojan horse
Phishing
DOS and DDOS attack
Rootkit
SQL Injection attack
Man-in-the-middle attacks
How do network viruses spread?
Signs of Viral Attacks on Computers
How to prevent your computer from viruses
Spywares
Types of spyware
How does spyware find its way to your computer?
Zero-hour and Zero-day attacks
How to protect your system from zero-day attacks
Hacker Attacks
Types of Cyber-attacks.
Botnet
How do they work?
Botnet infection features
Botnet structures
How to prevent your network from botnet attack
Chapter 13: Internet of Things.
What exactly is Internet of things?
How does it work?
Applications
Internet of things and homes
Internet of things and smart cities
Internet of things and artificial intelligence
Internet of things: Security and Privacy
What is the future of IoT?
Conclusion
Introduction
What do you know about Computers? What do you know about Computer Networking? There are so much going on in the world. Tech is evolving every day, and the interconnections in the computer field have left us with a giant web of systems and machines interacting with one another. What makes computer technology powerful is the interconnection it fosters. Right from your phone, you can interact with your desktop computer. This connection spans in so many different ways, all at the same time. Thanks to networking, the computer has become ubiquitous. It is the very core on which our 21st-century life is premised.
The world has changed, it's either you stay on top of your game, or you end up in the dark. Staying in the loop of what is going on is the best you can do. Tech has transcended its role of revolutionizing our lives. It has become the very basis of life in the 21st century. It all started with a giant machine, numerous wires connected spanning different distances. Now, it’s all a matter of bandwidth and more advanced networks.
There is so much to understand in the computer world, the widest of which is the whole Computer Network. A computer network are sets of computers which are connected for resource sharing.
This definition is as basic as it can get. However, don't be fooled; there are so many intricacies underlining this definition. Computer Networking is a whole world; it is easy to get blown away in this world. This book is culled from the immense knowledge of the author, on this subject, subjected to a grammatical breakdown which will foster an easy comprehension from you.
This text spans the whole essential elements to be understood, to the various functionalities, the wireless systems, communication, and to the more advanced concepts. In spite of the technical frameworks and structure that embellishes the Computer Networking world, this text is poised to deliver a perfect understanding of the most straightforward combination of words.
By reading this book from start to finish, your knowledge of Computer Networking is bound to attain professionalism, irrespective of its starting point. This is bound to be a long but enjoyable ride. Come along.
Hello World!
Computer Networking Defined: The Whole Concept.
What is Computer Networking?
Computer Networking is simply the formation of a computer network. A computer network can be defined as the collection of computers, printers, and other equipment that are connected (wired or wireless), with the ultimate aim of fostering communications between the devices. The process of creating this connection of devices is known as Computer Networking.
Technically, Computer Networking is referred to the process of transporting and exchanging data between points known as nodes, carried via a shared system, executed in an information system. The whole concept of Computer Networking does not consist only of the design, construction, and use of a network. It also involves the technical management, maintenance, and running of the involved infrastructure, software, and underlying policies.
In Computer Networking; systems, endpoints, and other devices can be connected, over a local area network (LAN), or a more extensive network. The larger networks, in this case, are the internet and the private Wide Area Network (WAN).
Every stakeholder (service providers, businesses, and consumers) has a role to play in ensuring that resources are effectively shared. This system of stakeholders also provides the effective use and offering of services.
Once the system involves a system responding to controls and information from a remote location, it can only be facilitated by one form of Computer Networking. Right from the making and receiving of Telephone calls, to the streaming of movies on the internet, to the internet of things. A network of Computers facilitates all.
The level of complexity of a particular network decides the skill level required to operate and maintain it. For instance, if an enterprise has numerous nodes amidst other security checks (like end-to-end encryptions), it requires an advanced level of technical administration to oversee it effectively. This is unlike the Local Area Network being utilized in a school’s computer laboratory.
Components of Networking
Networking of Computers requires so many infrastructures for a seamless operation. The various types of network structures require different parts. These will be looked at extensively in the course of this book.
Physical network infrastructures are needed for a Computer Network, which includes but is not limited to; switches, routers, wireless access points, etc. There is also some underlying firmware which makes these infrastructures function correctly. Other than the physical systems, there is also the needed software deployed to monitor, manage, and secure the network.
For advanced networks, there is a need for standard protocols, which are designed to perform numerous discrete functions. These protocols are also used to communicate different data types, irrespective of the underlying hardware.
For instance, in the telephone system, a voice over IP (VoIP) can bring about the transportation of IP telephony traffic from one point to another, once these points support the protocol. This is also similar to what occurs in the browser, with the HTTP providing portals to accessing webpages. Also, over an IP based network, the IP protocols to transport data and services, since there is protocol compatibility.
Computer Networking Components Defined
As said earlier, hardware components need to be installed for the creation of a network. The fundamental elements are the Cables, Hubs, Switch, Network Interface Card (NIC), modem, and routers. In a wireless network, there is no need for cables; hence, it is eliminated.
The essential components needed for a computer network are;
Network Interface Card (NIC)
Hub
Switches
Cables and Connectors
Router
Modem
Computer networks range from simple to complex. However, all make use of the same essential devices and rules
Network Interface card (NIC)
This is also known as the Network adapter. This is a device that enables communication between the computer and other devices involved in the network. This framework makes