• Home
  • Microsoft
  • MTA: Networking Fundamentals (Microsoft Technology Associate Networking Fundamentals) Dumps

Pass Your Microsoft MTA: Networking Fundamentals Certification Easy!

100% Real Microsoft MTA: Networking Fundamentals Certification Exams Questions & Answers, Accurate & Verified By IT Experts

Instant Download, Free Fast Updates, 99.6% Pass Rate.

Microsoft MTA: Networking Fundamentals Certification Exam Dumps & Practice Test Questions

Prepare with top-notch Microsoft MTA: Networking Fundamentals certification practice test questions and answers, vce exam dumps, study guide, video training course from ExamCollection. All Microsoft MTA: Networking Fundamentals certification exam dumps & practice test questions and answers are uploaded by users who have passed the exam themselves and formatted them into vce file format.

Understanding Network Infrastructures

7. Overview of Wide Area Networks

MTA Networking Fundamentals Wide Area Networks Do you remember the previous lesson we asked about? We started with a question. I asked you to identify a network device. Let's try it again. What is that? I hope you manage to recognise it as a router. To be more specific, it is a wireless router. It means, well, to be more specific, a router with a built-in access point. It means that a wireless client can connect to your network as well. However, our main focus is going to be on the router here. Why? Because we are going to talk about wide-area networks. A wide area network allows you to connect to more than one local area network here. at least two or even more local area networks. I found a really nice network diagram that will help you understand that. And this is a network diagram that you can find in the real world. It's really important. You're going to be MTA certified. at the end of this training. You will have a very good idea about networking, hardware, services, protocols, and troubleshooting. That's why it's very important that you know how to identify a network device and even create a network. a network diagram. Let's take a quick look. We've got two local area networks. local area network one and local area network two. Now we've got two routers: router one and router two. These devices are switches: switch one, switch two, switch three, and switch four. Everything else on the network—end devices, phones, computers, printers, service scanners, whatever—doesn't really matter. And device users: they browse the Internet, they access shares, they send emails every day, and in most cases, they play online games and go to Facebook. Here we have a wide-area network. Why? because we are going to connect more than one local area network. This one is connected to that one. It means that we have just created our first wide-area network. Yes, this is our first wide-area network. The most important device is the erota arua. allows you to create a white area network, manage it, decide what to do with it, what is allowed, and how to route your traffic. That's the keyword. Please memorise it for now. We're going to talk about routers later on and what they do. For now, please make sure that you memorise that. To keep things simple, they can root packets or, more precisely, root messages. Routers are really important in our networks. Of course. What's missing here? a link to the Internet. Maybe this router is connected to the cloud, and this guy is connected to the cloud. Now, a question that you can come up with OK, what is that guy? What is that? It all depends. We can have many different white area network connections. We talked about one of them; do you remember? A secure connection or a secure tunnel? Yes, VPNs. We can use dial-up, frame relay, or ADSL. We'll talk about solutions like that later on. For now, it is just a way for you to go from one router to another. In most cases, we use an ISP or ISPs, or Internet service providers. ISPs. They can provide a link like that. You go to your local ISP; in most cases, it's your phone provider as well. And you ask them, "Okay, listen guys, I have an office in Chicago, London, Paris, whatever, and I need a link to the office over there." Can you make it happen, please? and they can come up with a solution. They can look at their infrastructure. Of course, if you want to create a VPN connection, then you don't have to ask anyone. You can create a tunnel over here as long as you have an Internet connection. That is the great thing aboutVPNs, because you don't need anyone. All you have to do is arrange access to the Internet. That's all you need. Everything else can be done by routers. You create a VPN tunnel on a router. That's it. You don't need your ISP. And of course, what's even more important is that you don't have to pay your ISP. wide area network connections Solutions like that can be pretty expensive, especially if we talk about list lines. They're really expensive here. You simply purchase a router, select the abroadband package, and configure your VPN connection. In this lecture, we talked about wide area networks. In our next lecture, we'll talk about wireless. Yes, it is a very important, very important topic. I want to spend a lot of time talking about wireless because wireless is everywhere. In the next lecture, we'll talk about wireless standards and things that make it possible for you, for instance, to use an Internet connection on your mobile phone. I encourage you to watch my video dedicated to access points where we talk about hardware. There is a bonus. Where I go through an installation process and configuration steps for a business-class access point Thank you very much.

8. Let's talk about Wireless and wireless security

Wireless networking. Do you remember your first wireless device? I do remember, yes. Again, it makes me feel really old when I say that. Yes, I do remember. It was really great to do. It is pretty obvious when we talk about a wireless connection. That's what we're going to cover in this lecture. Wireless standards. As you can imagine, behind almost everything there is a standard, and the same applies to wireless. We need a standard. We need something that we can use to identify our wireless solutions. and that's what is available today. I found a really nice table for you. We'll go check out a real access point. You will see that on an ASES access point in a moment. Here, I want to show you some wireless standards. The latest one is 800 and 211 AC. That is the latest one. It is really, really fast. And that is the last one in this table. In theory. and it can go even above three gigabits per second. That's really awesome. Of course, that's in theory. In the real world, you will get about 20% of that speed. Still, it is really impressive. When we think about wireless and wireless standards, I remember how it changed when we moved to this guy, 800 and 211 N. That is just a name. All standards are simply given names and numbers. And I remember when it was introduced in 2009; it's changed the world because when you look at the speeds and things that can be achieved, especially the distance, everything was improved at the time, and it was really great. Of course, people were very happy to buy it because of the HD videos. everything available on the internet. When you have streaming views, everything is online. Cloud-based solutions are everywhere. That's why people need a fast wireless connection as well. because you want to watch a movie on your mobile device. Tablets changed everything as well because you could watch something on a tablet.And in most cases, ABG, they were too slow. Even though you can see like 54 megabits per second, for instance, in G or A, that's not what you will find in the real world. For instance, this guy and that guy In the real world, all you can get is around two or three megabytes per second, okay? Megabits per second, because it is measured in megabits. I'm not sure if you know how to calculate that. So let's say it is 54 megabits per second, okay? And there are megabytes per second, megabytes, and megabits, OK? And you have to divide it by eight to figure it out in megabytes. So here it's in megabytes, and that's how, for instance, if you copy a file in Windows, it's in megabytes. So it was around the maximum of three megabytes, okay? That gives you 24 megabits per second. That was the maximum you could get for ABG. And three megabytes per second—that is, of course, the maximum. It means that you will not get anything like that. 100%. Let's say that is three. It means it will go like that, then it will drop. That's the problem with wireless. And it might be too slow for some HD Blu-ray movies or things like that. That's why people were very happy to move to 811 N and AC. Well, I am not very happy to upgrade anything in my network because, to be honest, 8211 N is absolutely fine with me. I can get around eight megabytes per second. Two things that I want to cover Here is an example of WiFi interference and an SSID. I'm pretty sure you know the first one. That's the main disadvantage of wireless. It's not reliable. OK? And one of the problems is interference. It can happen because of other devices running on the same frequency. There can be something in your walls—a lot of things—and it's very difficult to troubleshoot. The easiest thing I can give you is a tip: try and move your router or access point. Sometimes that will do the trick. Move it, sometimes even just from your table. Just move it, I don't know, next to your chair or whatever. Sometimes, you can be surprised. It can even double the speed. Now, "SSID" is a name that identifies a network. If you want to connect to a network, that's the name. Of course, we will try and see that on a real access point because it makes more sense. Let's check. First of all, we can see the frequency. There are two main frequencies that we can use. two, four, and five. Five is better. We have more channels. However, a lot of devices do not support that frequency. Here is our name. Because it's an ASUS router. The default name was Asus. Of course, you can customise and change it. Hide SSID. Sometimes they call it "do not broadcast." SSID, it means that you will not be able to see the name of your network on the list in Windows. Some people consider that a great security solution. If not, it's pretty easy to figure it out. And for your end users, it's a nightmare because they cannot see that network on the list, and they will be upset because they have no idea how to set it up. They can't click on it. They have to enter everything. They hate it. Don't really do that. Wireless Mode: we'll just leave it. Channel Bandwidth There are two options. by 2040, and it's even 80. If we go back in time, that is 80 or even 160 degrees Celsius in AC. Of course, this router is okay with 20 and 40 channels. It means that "auto" means that this router will decide the channel to go for. Or you can assign a channel yourself here. Authentication We're going to talk about security in a moment. Let's do ide the chanMany, many years ago, when wireless was introduced, people were so amazed by it that they didn't really think about security. After a while, they realised and said, "Oh, okay." What do you mean? It means that anyone can connect to my network. That's not good. And that's how we were created. They didn't have a lot of time. They had to come up with something. It was not perfect. It was cracked immediately. And we do not use WEP anymore. Don't use it. Don't do it. Then they decided to go online and announce, "OK, guys, we need a new wireless standard for security." However, you're not allowed to ask for new hardware. You have to use the existing hardware and come up with an algorithm—something that will be better than WEP. However, you're not allowed to ask for new hardware. That's how the WPA was created. And then with WPA 2, in most cases, you need a new piece of hardware. WPA Two is something that we use today. It's a standard for wireless because it uses AES for encryption. There is a solution available in many companies called 8211 X. You need an authentication server like Radius or Takacs. It's beyond our discussion, if you're interested. For instance, there is a section of, I think, three or four lectures dedicated to 802.1X in my CCNA security training. A few words about Bluetooth I'm pretty sure you've seen it before. You have heard about Bluetooth. Maybe you have a headset that you bought online. Yeah, Bluetooth. Bluetooth is a standard that was created for exchanging data over short distances. It's particularly useful for wireless devices such as headsets. It's really great. I have a headset like that. It's really great. A lot of laptops have a built-in Bluetooth module. Thanks to that, you can take advantage of this standard and buy a device that is compatible with it. The last point I'd like to bring up is wireless bridging, which MTA (Microsoft) requires you to be aware of. It means that you have two access points. And then what you want to do is create a network. It means that it's not going to be a wide-area network. However, you're going to bridge You're going to allow these guys—they're allowed to connect to that lane. They are in the same local area network. However, because they cannot see each other, you can't run a cable; you can bridge; or you can use two access points and ask them to bridge to create a point-to-point connection. It's not a great solution. There are a lot of issues with it. If you use high-end devices, it's okay. With some simple devices, you can face a lot of problems. In this section, we talked about wireless. That's not the end of our wireless discussion. As I mentioned, I am going to spend a lot of time talking about wireless, even more than Microsoft asks you to know, because it's important. That's why I added a separate lecture in the Hardware section dedicated to access points. I'll show you a Business Class access point I show you a few other devices and things that you really need to know if you want to work with wireless. Thank you very much.

9. Network Topologies

Network topologies. In this lecture, we'll talk about network topologies, especially focusing on the start topology. What is a network topology? It is something that allows you to create, for instance, a network diagram that can help you design a network. You can define that as the virtual structure of your network. As you can see, we have many different types of network topologies ring, mashing, and star tree bars, a lot of them are not in use. The most popular topologies that we can find today are star and mash; these two star mash topologies are really popular, especially the star topology. That's how we create all our local area networks. What do you mean by a "start topology"? I'd like to demonstrate and provide the following example: Think and imagine there is a building, okay? And inside, we've got two floors, 10 total. Now what you do is you put two switches on the first floor, you take a cable, and you connect a cable like that to two ISPs (Internet service providers). You want to browse the Internet, so you take a switch and put it on each floor, and you connect them like that. That's too small, but you get the point. Can you see a star here? That is an example of the startopology that is really important, and that is how we like to design our networks. We don't want to have a single point of failure. What we mean by that is that if ISPone fails, everything dies in this company. It's not going to happen in the topology that I created because we can use ISP #2. Let's say that our core switch has that name: core switch. Let's say this guy dies, okay? It's not a problem. The second switch can take over, and this guy can browse the Internet using ISP 1. That's how we like to design our networks. We want to have some redundancy; we want to make sure that if something fails, we're okay. We can go to Facebook now; don't do it during your business hours. Two things that I decided to add to MTA to make sure that you understand are physical and logical topology. It's really important to understand how it works, and maybe you will be asked to create a network diagram. That's why you have to understand the main difference between these two topologies. Please review the diagram I prepared for you. Physical topology just shows how they are connected. It displays cables, ports, devices, logical topology, and how the flow in our case works; you can ask, "Okay, there's one link missing; what's wrong with this guy?" Well, because that is beyond our discussion. However, there is a loop in this network. That's why there is a protocol called the "spanning tree" protocol that kicks in and is going to block one of the links. It means that this link and that guy are not in use. Physical topology shows that link because it is in place. However, the second one is not going to show it because switch three will use switch two to go to switch one. It will not go directly into this section. We talked about network topologies. I hope that you will remember and know what a starting topology is and how you can create a physical and logical diagram. Make sure that you memorise all these things. I encourage you to go to Google and type "network topology." Check out a few more network diagrams that you can find online. Try to identify some devices that you find in there. That was our last lecture in understanding network infrastructure. Yes, we are going to move Section Number Two, Network Hardware. Our first lecture switches. Thank you very much.

10. Let's summarize this section

In this section, we talked about network infrastructures. I hope that you managed to learn a lot and understand what LANs, VPNs, and all these things are all about. There is one thing I want to tell you: VPNs are really important in my opinion. If you finish your MTA training, you should go and read a little more about VPNs, because in the reward you need more than that. Of course, you are welcome to participate in my VPN training. I cover everything that you have to know in detail. Thank you very much.

ExamCollection provides the complete prep materials in vce files format which include Microsoft MTA: Networking Fundamentals certification exam dumps, practice test questions and answers, video training course and study guide which help the exam candidates to pass the exams quickly. Fast updates to Microsoft MTA: Networking Fundamentals certification exam dumps, practice test questions and accurate answers vce verified by industry experts are taken from the latest pool of questions.

Read More


Add Comment

Feel Free to Post Your Comments About EamCollection VCE Files which Include Microsoft MTA: Networking Fundamentals Certification Exam Dumps, Practice Test Questions & Answers.

SPECIAL OFFER: GET 10% OFF

ExamCollection Premium

ExamCollection Premium Files

Pass your Exam with ExamCollection's PREMIUM files!

  • ExamCollection Certified Safe Files
  • Guaranteed to have ACTUAL Exam Questions
  • Up-to-Date Exam Study Material - Verified by Experts
  • Instant Downloads
Enter Your Email Address to Receive Your 10% Off Discount Code
A Confirmation Link will be sent to this email address to verify your login
We value your privacy. We will not rent or sell your email address

SPECIAL OFFER: GET 10% OFF

Use Discount Code:

MIN10OFF

A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.

Next

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.