Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer Networks, Networking all-in-one for dummies, Computer networks -…
Computer Networks
Networking all-in-one for dummies
Book 1. Networking basics
Chapter 1. Welcome to networking
Chapter 2. Network infrastructure
Chapter 3. Swtiches, Routers, and VLANs
Chapter 4. Servers and virtualization
Chapter 5. Cloud computing
Book 2. Understanding network protocols
Chapter 1. Network protocols and standards
Chapter 2. TCP/IP and the internet
Chapter 3. IP addresses
Chapter 4. Routing
Chapter 5. DHCP
Chapter 6. DNS
Chapter 7. TCP/IP tools and commands
Book 3. Planning a network
Chapter 1. Local area networks
Chapter 2. Wide area networks
Chapter 3. Server architecture
Chapter 4. Virtualization architecture
Chapter 5. Storage architecture
Book 4. Implementing a network
Chapter 1. Network hardware
Chapter 2. Wireless networks
Chapter 3. Windows clients
Chapter 4. Mac networking
Chapter 5. Network printers
Chapter 6. Virtual private networks
Book 5. Implementing virtualization
Chapter 1. Hyper-V
Chapter 2. VMware
Chapter 3. Azure
Chapter 4. Amazon web services
Chapter 5. Desktop virtualization
Book 6. Implementing windows server 2016
Chapter 1. Installing windows serer 2016
Chapter 2. Configuring windows server 2016
Chapter 3. Configuring active directory
Chapter 4. Configuiring user accounts
Chapter 5. Configuring a file server
Chapter 6. Using group policy
Chapter 7. Configuring internet information services
Chapter 8. Configuring exchange server 2016
Chapter 9. Configuring SQL server 2014
Chapter 10. Windows commands
Chapter 11. Using powershell
Book 7. Implementing Linux
Chapter 1. Installing a linux server
Chapter 2. Configuring linux
Chapter 3. Basic linux network configuration
Chapter 4. Running DHCP and DNS
Chapter 5. Doing the samba dance
Chapter 6. Running apache
Chapter 7. Running sendmail
Chapter 8. Linux commands
Book 8. Managing a network
Chapter 1. Welcome to network administration
Chapter 2. Managing remotely
Chapter 3. Managing network assets
Chapter 4. Managing the help desk
Chapter 5. Solving network problems
Chapter 6. Managing software deployment
Chapter 7. Managing Email retention
Chapter 8. Managing mobile devices
Book 9. Managing Cybersecurity
Chapter 1. Welcome to cybersecurity
Chapter 2. Managing firewalls and virus protection
Chapter 3. Managing spam
Chapter 4. Managing backups
Chapter 5. Managing disaster recovery and business continuity planning
Computer networks - Andrew S. Tanenbaum
Introduction
1.1 Uses of computer networks
1.2 Network hardware
1.3 Network software
1.4 Reference models
1.5 Example networks
1.6 Network standardization
The physical layer
2.1 The theoretical basis for data communication
2.2 Guided transmission media
2.3 Wireless transmission
2.4 Communication satellites
2.5 Digital modulation and multiplexing
2.6 The public switched telephone network
2.7 The mobile telephone system
2.8 Cable television
The data link layer
3.1 Data link layer design issues
3.2 Error detection and correction
3.3 Elementary data link protocols
3.4 Sliding window protocols
3.5 Example data link protocols
The medium access control sublayer
4.1 The channel allocation problem
4.2 Multiple access protocols
4.3 Ethernet
4.4 Wireless lans
4.5 Broadband wireless
4.6 Bluetooth
4.7 RFID
4.8 Data link layer switching
The network layer
5.1 Network layer design issues
5.2 Routing algorithms
5.3 Congestion control algorithms
5.4 Quality of service
5.5 Internetworking
5.6 The network layer in the internet
The transport layer
6.1 The transport service
6.2 Elements of transport protocols
6.3 Congestion control
6.4 The internet transport protocols:UDP
6.5 The internet transport protocols: TCP
6.6 Performance issues
6.7 Delay-tolerant networking
The application layer
7.1 DNS - The domain name system
7.2 Electronic mail
7.3 The world wide web
7.4 Streaming audio and video
7.5 Content delivery
Network security
8.1 Cryptography
8.2 Symmetric-key algorithms
8.3 Public-key algorithms
8.4 Digital signatures
8.5 Management of public keys
8.6 Communication security
8.7 Authentication protocols
8.8 Email security
8.9 Web security
8.10 Social issues