Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

10.0 0.254 inside ip of comcast asa firewall

08/12/2021 Client: muhammad11 Deadline: 2 Day

To Cite This Material:

Dean, Tamara. (2013). Comptia network+ n10-005 in depth. [Books24x7 version] Available from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=47482.

Chapter 1: An Introduction to Networking

After reading this chapter and completing the exercises, you will be able to:

· List the advantages of networked computing relative to stand-alone computing

· Distinguish between client/server and peer-to-peer networks

· List elements common to all client/server networks

· Describe several specific uses for a network

· Identify some of the certifications available to networking professionals

· Identify the kinds of skills and specializations that will help you excel as a networking professional

On the Job

I was the chief information officer for a large political research firm that served the president of the United States. I was also teaching at a local community college as an adjunct. Some students just stood out. They were hungry for knowledge. After 15 years of teaching, I could spot the other kind—students who were just there for a grade. Those students seemed to think they didn’t have to work hard in school because they would learn what they needed on the job. Others really wanted to get their money’s worth out of school and learn all they could.

I noticed one student who was always the last one out of class because she was trying to solve some problem or another. The material wasn’t coming easy to her, but I could tell she was curious, and that meant that she was learning things she hadn’t intended to learn. I hired her to work for the political research firm because she never rested until she solved any problem she set out to resolve. Before she even finished college, she was making $45,000 a year at her new job. She was the hardest working member of my staff and I constantly gave her new responsibilities.

After only two years, I left to go to another company, but I didn’t worry about leaving because I knew my former student could handle it. She became the youngest CIO in the history of the firm. Hard work and a lust for learning were the keys to her success.

Michael Bleacher Assistant Dean, School of Technology and School of Business Westwood College

Loosely defined, a network is a group of computers and other devices (such as printers) that are connected by some type of transmission media. Variations on the elements of a network and the way it is designed, however, are nearly infinite. A network can be as small as two computers connected by a cable in a home office or as large as several thousand computers connected across the world via a combination of cable, phone lines, and cellular links. In addition to connecting personal computers, networks might link mainframe computers, printers, plotters, fax machines, and phone systems. They might communicate through copper wires, fiber-optic cable, or radio waves. This chapter introduces you to the fundamental characteristics of networks.

Why Use Networks?

Using networks offers advantages relative to using a stand-alone computer—that is, a computer that is not connected to other computers and that uses software applications and data stored on its local disks. Most important, networks enable multiple users to share devices (for example, printers) and data (such as spreadsheet files), which are collectively known as the network’s resources. Sharing devices saves money. For example, rather than buying 20 printers for 20 staff members, a company can buy one printer and have those 20 staff members share it over a network. Sharing devices also saves time. For example, it’s faster for coworkers to share data over a network than to copy data to a removable storage device and physically transport the storage device from one computer to another—an outdated file-sharing method commonly referred to as a sneakernet (presumably because people wore sneakers when walking from computer to computer). Before networks, transferring data via floppy disks was the only possible way to share data.

Networks also allow you to manage, or administer, resources on multiple computers from a central location. Imagine you work in the Information Technology (IT) Department of a multinational bank and must verify that each of 5000 employees around the globe uses the same version of a database program. Without a network, you would have to visit every employee’s machine to check and install the proper software. With a network, however, you could provide employees with access to the database program on a single computer using a Web page. Because they allow you to share devices and administer computers centrally, networks increase productivity. It’s not surprising, then, that virtually all organizations depend on their networks to stay competitive.

Types of Networks
Computers can be positioned on a network in different ways relative to each other. They can have different levels of control over shared resources. They can also be made to communicate and share resources according to different schemes. The following sections describe two fundamental network models: peer-to-peer and client/server.

Peer-to-Peer Networks
C:\Users\Jeremiah\Desktop\f0003-01.jpg

The simplest form of a network is a peer-to-peer network. In a peer-to-peer network, every computer can communicate directly with every other computer. By default, no computer on a peer-to-peer network has more authority than another. However, each computer can be configured to share only some of its resources and prevent access to other resources. Traditional peer-to-peer networks typically consist of two or more general-purpose personal computers, with modest processing capabilities. Every computer is capable of sending and receiving information to and from every other computer, as shown in Figure 1-1.

C:\Users\Jeremiah\Desktop\f0004-01.jpg

Figure 1-1: Resource sharing on a simple peer-to-peer network

The following are advantages of using traditional peer-to-peer networks:

· They are simple to configure. For this reason, they may be used in environments in which time or technical expertise is scarce.

· They are often less expensive to set up and maintain than other types of networks. This fact makes them suitable for environments in which saving money is critical.

The following are disadvantages of using traditional peer-to-peer networks:

· They are not very flexible. As a peer-to-peer network grows larger, adding or changing significant elements of the network may be difficult.

· They are also not necessarily secure—meaning that in simple installations, data and other resources shared by network users can be easily discovered and used by unauthorized people.

· They are not practical for connecting more than a handful of computers because they do not always centralize resources.

For example, if your computer is part of a peer-to-peer network that includes five other computers, and computer users store their spreadsheets and word-processing files on their own hard disks, whenever your colleagues want to edit your files, they must access your machine on the network. If one colleague saves a changed version of one of your spreadsheets on her hard disk, you’ll find it difficult to keep track of which version is the most current. As you can imagine, the more computers you add to a peer-to-peer network, the more difficult it becomes to find and manage resources.

A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computer’s operating system. For example, you could choose to create a directory on your computer’s hard disk called “SharedDocs” and then configure the directory to allow all networked computers to read its files. On a peer-to-peer network, each user is responsible for configuring her computer to allow access to certain resources and prevent access to others. In other words, resource sharing is not controlled by a central computer or authority. Because access depends on many different users, it might not be uniform or secure.

Although traditional peer-to-peer networks are typically small and contained within a home or office, examples of very large peer-to-peer networks have emerged to take advantage of the Internet. These newer types of peer-to-peer networks (commonly called P2P networks) link computers from around the world to share files between each others’ hard disks. Unlike the older style of peer-to-peer network, they require specialized software (besides the computer’s operating system) to allow resource sharing. Examples of these networks include Gnutella, Bitcoin, and the original Napster. In 2001, Napster, which allowed users around the globe to share music files, was forced to cease operation due to charges of copyright infringement from musicians and music producers. Later, the service was redesigned to provide legitimate music file-sharing services. A company called BitTorrent has made a unique high-speed peer-to-peer communications method (also called BitTorrent) the foundation of its business. The company specializes in allowing companies and individuals to share video, audio, software, and games over the Internet. Although BitTorrent’s peer-to-peer technology is legal, its use for distributing illegal or copyrighted materials has generated several lawsuits against the company.

Client/Server Networks
Another way of designing a network is to use a central computer, known as a server, to facilitate communication and resource sharing between other computers on the network, which are known as clients. Clients take the form of personal computers, also known as workstations, or mobile devices, such as smartphones. A network that uses a server to enable clients to share data, data storage space, and devices is known as a client/server network. The term client/server architecture is sometimes used to refer to the design of a network in which clients rely on servers for resource sharing and processing.

In terms of resource sharing and control, you can compare the client/server network with a public library. Just as a librarian manages the use of books and other media by patrons, a server manages the use of shared resources by clients. For example, if a patron does not have the credentials to check out books, the librarian prevents the patron from doing so. Similarly, a server allows only authorized clients to access its resources.

Every computer on a client/server network acts as a client or a server. (It is possible, but uncommon, for some computers to act as both.) Clients on a network can still run applications from and save data to their local hard disk. But by connecting to a server, they also have the option of using shared applications, data, and devices. Clients on a client/server network do not share their resources directly with each other, but rather use the server as an intermediary. Clients and servers communicate through connectivity devices such as switches or routers. These devices are covered in detail in Chapter 6.

Figure 1-2 illustrates how resources are shared on a client/server network.

C:\Users\Jeremiah\Desktop\f0006-01.jpg

Figure 1-2: Resource sharing on a client/server network

To function as a server, a computer must be running an NOS (network operating system).

An NOS is a special type of software designed to do the following:

· Manage data and other resources for a number of clients.

· Ensure that only authorized users access the network.

· Control which type of files a user can open and read.

· Restrict when and from where users can access the network.

· Dictate which rules computers will use to communicate.

· Supply applications to clients.

Examples of popular network operating systems include various forms of UNIX and Linux, Microsoft Windows Server 2008 R2, and Mac OS X Server. By contrast, a stand-alone computer, or a client computer, uses an operating system, such as Windows 7 or a version of Linux, UNIX, or Mac OS, and has authority for managing resources on other computers.

Usually, servers have more memory, processing, and storage capacity than clients. They may even be equipped with special hardware designed to provide network management functions beyond that provided by the network operating system. For example, a server might contain an extra hard disk and specialized software so that if the primary hard disk fails, the secondary hard disk automatically takes its place.

Although client/server networks are typically more complex in their design and maintenance than peer-to-peer networks, they offer many advantages over peer-to-peer networks, such as:

· User logon accounts and passwords for anyone on a server-based network can be assigned in one place.

· Access to multiple shared resources (such as data files or printers) can be centrally granted to a single user or groups of users.

· Problems on the network can be monitored, diagnosed, and often fixed from one location.

· Servers are optimized to handle heavy processing loads and dedicated to handling requests from clients, enabling faster response time.

· Because of their efficient processing and larger disk storage, servers can connect more than a handful of computers on a network.

Together, these advantages make client/server networks easier to manage, more secure, and more powerful than peer-to-peer networks. They are also more scalable than peer-to-peer networks. In other words, it is easier to add computers and other devices to a client/server network.

Because client/server networks are by far the most popular type of network, most of the concepts covered in this book and on the Network+ exam pertain to client/server networks. Next, you will learn how networks are classified according to size.

LANs, MANs, and WANs
As its name suggests, a LAN (local area network) is a network of computers and other devices that is confined to a relatively small space, such as one building or even one office. Small LANs first became popular in the early 1980s. At that time, LANs might have consisted of a handful of computers connected in a peer-to-peer fashion. Today’s LANs are typically much larger and more complex client/server networks.

Often, separate LANs are interconnected and rely on several servers running many different applications and managing resources other than data. For example, imagine an office building in which each of a company’s departments runs its own LAN and all the LANs are connected. This network may contain dozens of servers, hundreds of workstations, and several shared storage devices, printers, plotters, fax machines, and even telephone interfaces. Figure 1-3 roughly depicts this type of network (in reality, the network would probably contain many more clients). As you progress through this book, you will learn about the devices on this network and how they communicate. After completing this book, you’ll understand how to integrate clients, servers, and connectivity devices so as to create networks that are reliable, secure, and manageable.

C:\Users\Jeremiah\Desktop\f0008-01.jpg

Figure 1-3: Interconnected LANs

Networks may extend beyond the boundaries of a building. A network that is larger than a LAN and connects clients and servers from multiple buildings—for example, a handful of government offices surrounding a state capitol building—is known as a MAN (metropolitan area network). Because of the distance it covers, a MAN may use different transmission technology and media than a LAN.

A network that connects two or more geographically distinct LANs or MANs is called a WAN (wide area network). Because such networks carry data over longer distances than LANs, WANs may use different transmission methods and media than LANs. Most MANs can also be described as WANs; in fact, network engineers are more likely to refer to all networks that cover a broad geographical range as WANs.

WANs commonly connect separate offices in the same organization, whether they are across town or across the world from each other. For example, imagine you work for a nationwide plumbing supply company that keeps its inventory in warehouses in Topeka, Kansas, and Panama City, Florida. Suppose also that the company’s headquarters is located in New York. When a customer calls and asks whether you have five faucets of a certain type available to ship overnight, you need to check the inventory databases for both the Topeka and Panama City warehouses. Thanks to your WAN, the data are accessible from your New York desktop. Twice a day, the warehouses’ inventory software automatically updates a database located on a central server in New York via WAN links that connect the locations.

WANs are also used to connect LANs that belong to different organizations. For example, all the public universities within a state might combine and share their resources via a WAN. The largest and most varied WAN in the world is the Internet. Figure 1-4 depicts a simple WAN.

C:\Users\Jeremiah\Desktop\f0008-02.jpg

Figure 1-4: A simple WAN

Elements Common to Client/Server Networks

C:\Users\Jeremiah\Desktop\f0003-01.jpg

You have learned that networks, no matter how simple or complex, provide some benefits over stand-alone computers. They also share terminology and common building blocks, some of which you have already encountered. The following list provides a more complete rundown of basic elements common to all client/server networks. You will learn more about these topics throughout this book:

· Client —A computer on the network that requests resources or services from another computer on a network; in some cases, a client could also act as a server. The term client may also refer to the human user of a client workstation or to client software installed on the workstation.

· Server —A computer on the network that manages shared resources; servers usually have more processing power, memory, and hard disk space than clients. They run network operating software that can manage not only data, but also users, groups, security, and applications on the network.

· Workstation —A personal computer (such as a desktop or laptop), which may or may not be connected to a network; most clients are workstation computers.

· NIC (network interface card) —The device (pronounced nick) inside a computer that connects a computer to the network media, thus allowing it to communicate with other computers; many companies (such as Intel, Linksys, and Netgear) manufacture NICs, which come with a variety of specifications that are tailored to the requirements of the workstation and the network. Some connect to the motherboard, which is the main circuit that controls the computer, some are integrated as part of the motherboard, and others connect via an external port. NICs are also known as network adapters. Figure 1-5 depicts a NIC connected to a computer’s motherboard.

C:\Users\Jeremiah\Desktop\f0009-01.jpg

· Figure 1-5: A NIC (network interface card)

Note

Because different PCs and network types require different kinds of NICs, you cannot assume that a NIC that works in one workstation will work in another.

· NOS (network operating system) —The software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. Examples include various types of UNIX and Linux operating systems, Microsoft Windows Server 2008 R2, and Mac OS X Server.

· Host —A computer that enables resource sharing by other computers on the same network.

· Node —A client, server, or other device that can communicate over a network and that is identified by a unique number, known as its network address.

· Connectivity device —A specialized device that allows multiple networks or multiple parts of one network to connect and exchange data. A small client/server network can operate without connectivity devices. However, medium- and large-sized LANs use them to extend the network and to connect with WANs. WANs use them to connect with the Internet and with other WANs.

· Segment —A part of a network. Usually, a segment is composed of a group of nodes that use the same communications channel for all their traffic.

· Backbone —The part of a network to which segments and significant shared devices (such as routers, switches, and servers) connect. A backbone is sometimes referred to as “a network of networks” because of its role in interconnecting smaller parts of a LAN or WAN. Figure 1-6 shows a LAN with its backbone highlighted in yellow.

C:\Users\Jeremiah\Desktop\f0010-01.jpg

 Figure 1-6: A LAN backbone

 Topology —The physical layout of a computer network. Topologies vary according to the needs of the organization and available hardware and expertise. Networks can be arranged in a ring, bus, or star formation, and the star formation is the most common. Hybrid combinations of these patterns are also possible. Figure 1-7 illustrates these network topologies, which you must understand to design and troubleshoot networks.

C:\Users\Jeremiah\Desktop\f0011-01_thm.jpg

 Figure 1-7: Common network topologies

 Protocol —A standard method or format for communication between networked devices. For example, some protocols ensure that data are transferred in sequence and without error from one node on the network to another. Other protocols ensure that data belonging to a Web page are formatted to appear correctly in a Web browser window. Still others encode passwords and keep data transmissions secure.

 Packet —A distinct unit of data exchanged between nodes on a network. Breaking a large stream of data into many packets allows a network to deliver that data more efficiently and reliably.

 Addressing —The scheme for assigning a unique identifying number to every node on the network. The type of addressing used depends on the network’s protocols and network operating system. Each network device must have a unique address so that data can be transmitted reliably to and from that device.

 Transmission media —The means through which data are transmitted and received. Transmission media may be physical, such as wire or cable, or atmospheric (wireless), such as radio waves. Figure 1-8 shows several examples of transmission media. Chapter 3, which explains physical transmission media in detail, offers additional images of network cabling.

C:\Users\Jeremiah\Desktop\f0012-01.jpg

· Figure 1-8: Examples of network transmission media

Now that you are familiar with basic network terminology, you are ready to appreciate the many uses of computer networks.

How Networks Are Used
The functions provided by a network are usually referred to as network services. Any network manager will tell you that the network service with the highest visibility is e-mail. If your company’s e-mail system fails, users will notice within minutes—and they will not be shy about informing you of the failure. Although e-mail may be the most visible network service, other services can be just as vital. Printer sharing, file sharing, Internet access and Web site delivery, remote access capabilities, the provision of voice (telephone) and video services, and network management are all critical business functions provided through networks. In large organizations, separate servers may be dedicated to performing each of these functions. In offices with only a few users and little network traffic, one server may perform all functions.

File and Print Services
The term file services refers to a server’s ability to share data files, applications (such as word-processing or spreadsheet programs), and disk storage space. A server that provides file services is called a file server. File services accounted for the first use of networks and remain the foundation of networking today, for a number of reasons. As mentioned earlier, it is easier and faster to store shared data at a central location than to copy files to disks and then pass the disks around. Data stored at a central location is typically more secure because a network administrator can take charge of backing up this data, rather than relying on individual users to make their own copies. In addition, using a file server to run applications for multiple users requires the purchase of fewer copies of the application and less maintenance work for the network administrator.

Using print services to share printers across a network also saves time and money. A high-capacity printer can cost thousands of dollars, but can handle the printing tasks of an entire department, thereby eliminating the need to buy a desktop printer for each worker. With one printer, less time is spent on maintenance and management. If a shared printer fails, the network administrator can diagnose the problem from a workstation anywhere on the network using the network operating system’s printer control functions. Often, the administrator can solve the problem without even visiting the printer.

Access Services
A network’s access services allow remote users to connect to the network. (The term remote user refers to a person working on a computer on a different network or in a different geographical location from the LAN’s server.) Less frequently, access services allow network users to connect to machines outside the network. Most network operating systems include built-in access services that enable users to dial in to a remote access server, log on to the network, and take advantage of the network just as if they were logged on to a workstation on the office LAN. A remote access server may also be known as simply an access server.

Organizations might use access services to provide LAN connectivity for workers at home, workers on the road, and workers at small satellite offices where dedicated WAN connections are not cost effective. In addition, access services can allow staff from other organizations (such as a software or hardware vendor) to help diagnose a network problem. For example, suppose you work for a clothing manufacturer that uses embroidery software to control the machines that sew insignias on shirts and hats. You are an expert on networking, but less adept with the automated embroidery software. When the software causes problems, you turn to the software vendor for help. But suppose the vendor’s technician can’t solve the problem except by logging on to your network. In that case, it is much more efficient and less expensive to allow the technician to dial in to your network through a remote access server than to fly the technician to your office.

It is important to remember that remote access servers—no matter which platform (hardware or operating system software) they run on—allow external users to use network resources and devices just as if they were logged on to a workstation in the office. From a remote location, users can print files to shared printers, log on to hosts, retrieve mail from an internal messaging system, or run queries on internal databases. Because they can be accessed by the world outside the local network, remote access servers necessitate strict security measures.

Communications Services
Today’s networks can help users communicate in many ways: e-mail, telephone, video, fax, cell phone, smartphone (for example, an iPhone), and personal digital assistant (for example, a BlackBerry). Using the same network to deliver multiple types of communications services is known as convergence. A similar term, unified communications, refers to the centralized management of multiple network-based communications. For example, your company might use one software program to manage intraoffice phone calls, long-distance phone calls, cell phone calls, voice mail, faxes, and text messaging for all the users on your network. Chapter 12 describes how networks deliver these services.

The oldest network communications services are mail services, which coordinate the storage and transfer of e-mail between users on a network. The computer responsible for mail services is called a mail server. Mail servers are usually connected to the Internet, but when clients only need to exchange e-mail within their organization, their mail server may be isolated on their LAN.

In addition to simply sending, receiving, and storing mail, mail servers can do the following:

· Intercept or filter unsolicited e-mail, known as spam.

· Find objectionable content in e-mails and do something about that content, such as flagging it to make the recipient aware of it.

· Route messages according to particular rules. For example, if a technical support representative has not opened a customer’s message within 15 minutes of delivery, a mail server could automatically forward the message to a supervisor.

· Provide a Web-based client for checking e-mail.

· Notify administrators or users if certain events occur, such as a user’s mailbox exceeding its maximum amount of space on a server.

· Schedule e-mail transmission, retrieval, storage, and maintenance functions.

· Communicate with mail servers on other networks so that mail can be exchanged between users who do not connect to the same LAN.

To supply these services, a mail server runs specialized mail server software, examples of which include Sendmail and Microsoft Exchange Server. Because of their critical nature and heavy use, maintaining a mail server in any sizable organization requires a significant commitment of technical support and administration resources.

Internet Services
You have probably connected to the Internet without knowing or caring about all of the services running behind the scenes. But in fact, many servers are working together to bring Web pages to your desktop. For example, a Web server is a computer installed with the appropriate software to supply Web pages to many different clients upon demand. The most popular Web server software is Apache. It’s used to deliver more than 60 percent of Web pages on the Internet.

Supplying Web pages is only one type of Internet service. Other Internet services include file transfer capabilities, Internet addressing schemes, security filters, and a means for directly logging on to other computers on the Internet.

Management Services
When networks were small and simple, a single network administrator could manage the entire network. For instance, suppose a user called to report a problem logging on to the network and that the administrator diagnosed the problem as an addressing conflict (that is, two workstations having the same network address). In a very small network, the conflicting workstations might be located right around the corner from each other, and one address could be changed quickly. In another example, if a manager needed to report the number of copies of Adobe Photoshop in use in a certain department, the network administrator could probably get the desired information by just walking through the department and checking the various workstations.

As networks grow larger and more complex, however, they become more difficult to manage. Using network management services can help you keep track of a large network. Network management services centrally administer management tasks on the network, such as ensuring that no more than 20 workstations are using Adobe Photoshop at one time in an organization that purchased a 20-user license for the software. Some organizations dedicate a number of servers to network management functions, with each server performing only one or two unique services.

Numerous services fall under the category of network management. Some of the most important ones include the following:

· Traffic monitoring and control —Determining how much traffic, or data transmission activity, is taking place on a network and notifying administrators when the network becomes overloaded. In general, the larger the network, the more critical it is to monitor traffic.

· Load balancing —Distributing data transfer activity evenly so that no single device becomes overwhelmed. Load balancing is especially important for networks in which it’s difficult to predict the number of requests that will be issued to a server, as is the case with Web servers.

· Hardware diagnosis and failure alert —Determining when a network component fails and automatically notifying the network administrator through an e-mail or text message.

· Asset management —Collecting and storing data on the number and types of software and hardware assets in an organization’s network. With asset management software, a server can electronically examine each client’s software and hardware and automatically save the data in a database. Other types of assets might be identified and tracked using RFID (Radio Frequency Identification) tags, which emit a wireless signal at all times. Wireless detection devices connected to a network can track the locations of RFID-tagged devices. For example, a hospital might use RFID tags to keep track of the wheelchairs, beds, and IV pumps that circulate throughout its campus. Before asset management services, inventory data had to be gathered manually and typed into spreadsheets.

· License tracking —Determining how many copies of a single application are currently in use on the network and ensuring that number does not exceed the number of licenses purchased. This information is important for legal reasons, as software companies are vigilant about illegally copying software or using more than the authorized number of copies.

· Security auditing —Evaluating what security measures are currently in force and notifying the network administrator if a security breach occurs.

· Software distribution —Automatically transferring a file or installing an application from the server to a client on the network. The installation process can be started from either the server or the client. Several options are available when distributing software, such as warning users about updates, writing changes to a workstation’s system files, and restarting the workstation after the update.

· Address management —Centrally managing a finite number of network addresses for an entire network. Usually this task can be accomplished without manually modifying the client workstation configurations.

· Backup and restoration of data —Backing up critical data files to a secure storage area and then restoring data if the original files are lost or deleted. Often backups are performed according to a formulaic schedule. Backup and data restoration services provide centralized management of data backup on multiple servers and on-demand restoration of files and directories.

Network management services will be covered in depth later in the book. For now, it is enough to be aware of the variety of services and the importance of this growing area of networking.

Becoming a Networking Professional
If you search online employment services, you’ll probably find hundreds of postings for computer professionals. Of course, the level of expertise required for each of these jobs differs. Some companies simply need “warm bodies” to ensure that a higher-level engineer is notified if a critical network segment fails; other companies are looking for people to plan their global information technology strategies. Needless to say, the more extensive your skills, the better your chances for landing a lucrative and interesting job in networking. To prepare yourself to enter this job market, master a number of general networking technologies. Only then should you pick a few areas that interest you and study those specialties. Hone your communication and teamwork skills, and stay abreast of emerging technologies. Consider the tremendous advantages of attaining professional certification and getting to know others in your field. The following sections offer suggestions on how to approach a career in networking.

Mastering the Technical Challenges
Although computer networking is a varied field, some general technical skills will serve you well no matter which specialty you choose. Because you are already interested in computers, you probably enjoy an aptitude for logical and analytical thinking. You probably also want to acquire these skills:

· Installing, configuring, and troubleshooting network server software and hardware

· Installing, configuring, and troubleshooting network client software and hardware

· Understanding the characteristics of different transmission media

· Understanding network design

· Understanding network protocols

· Understanding how users interact with the network

· Constructing a network with clients, servers, media, and connectivity devices

Because you can expand your networking knowledge in almost any direction, you should pay attention to the general skills that interest you most, then pick one or two of those areas and concentrate on them. The following specialties are currently in high demand:

· Network security

· Convergence (the delivery of voice, video, and data over a single network)

· In-depth knowledge about one or more NOSs: UNIX, Linux, Mac OS X Server, or Microsoft Windows Server 2008 R2

· Network management

· Wireless network design

· Configuration and optimization of routers and switches

· Centralized data storage and management for large-scale environments

Determine which method of learning works best for you. A small classroom with an experienced instructor and a hands-on projects lab is an excellent learning environment because there you can ask questions and learn by doing. There is no substitute for hands-on experience when it comes to improving your networking hardware and software skills. If you don’t already work in an IT department, try to find a position that puts you in that environment, even if it isn’t your dream job. Volunteer a few hours a week if necessary. After you are surrounded with other information technology professionals and encounter real-life situations, you will have the opportunity to expand your skills by practicing and asking questions of more experienced staff. On the Web, you can find a number of searchable online job boards and recruiter sites. The placement office at your local college or university can also connect you with job opportunities.

Developing Your Soft Skills
Knowing how to configure a router or install UNIX will serve you well, but advanced soft skills will help you stand out. The term soft skills refers to those skills that are not easily measurable, such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities. Some soft skills might appear to be advantages in any profession, but they are especially important when you must work in teams, in challenging technical circumstances, and under tight deadlines—requirements that apply to most networking projects. For this reason, soft skills merit closer examination:

· Customer relations —Perhaps one of the most important soft skills, customer relations involve an ability to listen to customers’ frustrations and desires and then empathize, respond, and guide customers to their goals without acting arrogant. Bear in mind that some of your customers will not appreciate or enjoy technology as much as you do, and they will value your patience as you help them. The better your customer relations, the more respected and popular you will be as a network professional.

· Oral and written communications —You may understand the most complicated technical details about a network, but if you cannot communicate them to colleagues and clients, the significance of your knowledge is diminished. Imagine that you are a networking consultant who is competing with several other firms to overhaul a metropolitan hospital’s network, a project that could generate millions of dollars for your company. You may have designed the best solution and have it clearly mapped out in your head, but your plan is useless if you can’t describe it clearly. The hospital’s planning committee will accept whichever proposal makes the most sense to them—that is, the proposal whose suggestions and justifications are plainly communicated.

· Dependability —This characteristic will help you in any career. However, in the field of networking, where breakdowns or glitches can occur at any time of day or night and only a limited number of individuals have the expertise to fix them, being dependable is critical. Your career will benefit when you are the one who is available to address a problem, even if you don’t always know the answer immediately.

· Teamwork —Individual computer professionals often have strong preferences for a certain type of hardware or software. Some technical people like to think that they have all of the answers. For these and other reasons, teamwork in IT departments is sometimes lacking. To be the best networking professional in your department, you must be open to new ideas, encourage cooperation among your colleagues, and allow others to help you and make suggestions.

· Leadership abilities —As a networking professional, you will sometimes need to make difficult or unpopular decisions under pressure. You may need to persuade opinionated colleagues to try a new product, tell a group of angry users that what they want is not possible, or manage a project with nearly impossible budgetary and time restrictions. In all of these situations, you will benefit from having strong leadership skills.

After your career in networking begins, you will discover which soft skills you already possess and which ones you need to cultivate. The important thing is that you realize the importance of these attributes and are willing to devote the time necessary to develop them.

Pursuing Certification
Certification is the process of mastering material pertaining to a particular hardware system, operating system, programming language, or software application, then proving your mastery by passing a series of exams. Certification programs are developed and administered either by a manufacturer or a professional organization such as CompTIA (Computing Technology Industry Association). You can pursue a number of different certifications, depending on your specialty interest. For example, if you want to become a PC technician, you should attain A+ certification. If you want to specialize in Microsoft product support and development, pursue MCITP (Microsoft Certified IT Professional) certification. To specialize in the configuration and management of Cisco Systems’ switches and routers, work toward Cisco’s CCNA (Cisco Certified Network Associate) or go for their most difficult and prestigious distinction, CCIE (Cisco Certified Internetwork Expert) certification, which requires candidates to pass lab exams. To prove a mastery of many aspects of networking, you can choose to become Network+ certified. Network+ (Net+) is a professional certification established by CompTIA that verifies broad, vendor-independent networking technology skills, such as an understanding of protocols, topologies, networking hardware, and network troubleshooting. Network+ may also be a stepping stone to more advanced certifications. The material in this book addresses the knowledge objectives you must understand to qualify for Network+ certification.

Certification is a popular career development tool for job seekers and a measure of an employee’s qualifications for employers. Following are a list of benefits to becoming certified:

· Better salary —Professionals with certification can usually ask for higher salaries than those who aren’t certified. Employers will also want to retain certified employees, especially if they helped pay for their training, and will offer incentives to keep certified professionals at the company.

· Greater opportunities —Certification may qualify you for additional degrees or more advanced technical positions.

· Professional respect —After you have proven your skills with a product or system, your colleagues and clients will gain great respect for your ability to solve problems with that system or product. They will therefore feel confident asking you for help.

· Access to better support —Many manufacturers reward certified professionals with less-expensive, more detailed, and more direct access to their technical support.

Finding a Job in Networking
With the proper credentials and demonstrated technical knowledge, you will qualify for a multitude of positions in networking. For this reason, you can and must be selective when searching for a job. Following are some ways to research your possibilities:

· Search the Web —Because your job will deal directly with technology, it makes sense to use technology to find it. Companies in the computer industry recruit intensively on the Web, either through searchable job databases or through links on their company Web sites. Most job database Web sites do not charge for their services, but may require you to register with them. One popular general Web job database is Monster at www.monster.com . IT-specific job sites include Dice at www.dice.com , Slashdot Jobs at jobs.slashdot.org , and computerjobs.com . A simple Web search could yield dozens more.

· Check your local newspaper’s Web site —Although many employers list job openings through national online services, some with specific, local opportunities might advertise only in a local or regional newspaper’s online classifieds. It’s worth checking the Web site of your newspaper for these types of listings.

· Visit a career center —Regardless of whether you are a registered university or college student, you can use career center services to find a list of job openings in your area. Companies that are hiring pay much attention to the collegiate career centers because of the number of job seekers served by these centers. Visit the college or university campus nearest you and search through its career center listings.

· Network —Find like-minded professionals with whom you can discuss job possibilities. You may meet these individuals through training classes, conferences, professional organizations, or career fairs. Let them know that you are looking for a job, and specify exactly what kind of job you want. If they can’t suggest any leads for you, ask these people if they have other colleagues who might.

· Attend career fairs —Most metropolitan areas host career fairs for job seekers in the information technology field, and some large companies host their own job fairs. Even if you aren’t sure you want to work for any of the companies represented at a job fair, attend the job fair to research the market. You can find out which skills are in high demand in your area and which types of companies are hiring the most networking professionals. You can also meet other people in your field who may offer valuable advice based on their employment experience.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

A+GRADE HELPER
Peter O.
Premium Solutions
Instant Assignment Writer
Innovative Writer
Academic Mentor
Writer Writer Name Offer Chat
A+GRADE HELPER

ONLINE

A+GRADE HELPER

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$38 Chat With Writer
Peter O.

ONLINE

Peter O.

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$43 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$17 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$30 Chat With Writer
Innovative Writer

ONLINE

Innovative Writer

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$39 Chat With Writer
Academic Mentor

ONLINE

Academic Mentor

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$36 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Audre lorde power literary analysis - A terre wilfred owen analysis - Jasper jones chapter 9 summary - 3 main processes of the water cycle - Btn war on waste - Imc planning process steps - Essay on an printing in a arts museum - How to find voc in thevenin - Producers use marketing intermediaries because they - The information for preparing a trial balance on a worksheet is obtained from - Super glue warning label - Affidavit of loss passport philippines - All the numbers on a standard roulette wheel - Triple column cash book questions with solutions - How much money i need to make affliate website? - 500 word essay MLA format - Shodor interactivate cross sections - Analyzing and Visualizing Data - The statement “either the maid did it or the butler did” is a __________. - Questions - How to prepare a production cost report - Phd university of cumberlands - Operations forecasting ops 571 - Agassi company uses a job order cost system - Strategic Management - Ib tok essay questions - 15 page powerpoint slide - Moneysmart budget planner printable - Writing assignment - Science Project - Organizational behavior tools for success 2nd edition pdf download - Supertoys last all summer long character analysis - Wk 3, HCS 335: DR 2 - Chemistry in biology answer key - Julius caesar discussion questions - Animal cell membrane color - Tri ocean energy sanctions - Binary numbers worksheet pdf - Business Policy and Strategy II Essay - Brian mcguigan tawny port - Usyd unit of study outlines - What type of innovation is the milo sensor wristband - In what ways is tom buchanan a hypocrite - Trainor alston lawyers coatbridge - Ducksters book of the dead - Faust prologue in heaven - Reply to discussion-LILIAN nur501 - Anecdotal method in psychology - Case Analysis - Sas data step keep - Disc 1 - Uses radioisotopes in imaging techniques and the importance of these techniques - Gas meter room requirements - Bsbcmm401 answers - Griffith university enrolment dates 2016 - Nathan price poisonwood bible - What is gpa rmit - Graded examinations in spoken english elementary topic form grade 5 - Tax file declaration question 9 - Jennifer aniston aveeno 2019 - Horton hospital visiting hours - 7 leita court ngunnawal - How many feet in 18 yards - Sex offender registry mn watchdog - Public policy proposal for nuclear waste - Part 1 and 2 assignment - Comprehensive pharmacy services human resources phone number - What is hppd in nursing - Hr assignment 7 - APA assignment - Sociological Imagination Pre-Writing Map - Gcu christian identity and heritage - Intercommunity peace and justice center - Monitoring toddlers and technology thesis statement - Bitcoin Economics - Mgmt - Electric field hockey answers - Drive reduction theory argues that motivation is a function of - 4 Chapters to do please read instructions carefully - 1.16 unit test arguments and speeches - Andante molto languido meaning - What is an episodic soap note - Respond post to other classmate only need 2 paragraph 2 classmates - Group Project - Does c++ use radians or degrees - How would the united states work as a direct democracy? - Panera bread company case study answers - Creating a company culture for security design document - Oxyana documentary youtube - Electrical contractors licence vic - John of plano carpini primary source - Essentials of business communication 11th edition pdf free download - Messineo messineo & messineo llc - Module 6 Project Deliverables: Waste Walk & Root Cause Analysis - Rn to bsn role transition articles - K3 fe c2o4 3 3h2o - Sap payroll process diagram - Pros and cons of accounting regulation - Harley headlight trim ring install - Why was catcher in the rye banned