Professional Documents
Culture Documents
Data Communication and Computer Networks A Business Users Approach 9Th Edition Jill West Online Ebook Texxtbook Full Chapter PDF
Data Communication and Computer Networks A Business Users Approach 9Th Edition Jill West Online Ebook Texxtbook Full Chapter PDF
Data Communication and Computer Networks A Business Users Approach 9Th Edition Jill West Online Ebook Texxtbook Full Chapter PDF
https://ebookmeta.com/product/comptia-network-guide-to-networks-
mindtap-course-list-9th-edition-west-jill/
https://ebookmeta.com/product/friendship-and-technology-a-
philosophical-approach-to-computer-mediated-communication-1st-
edition-tiffany-a-petricini/
https://ebookmeta.com/product/computer-networks-and-inventive-
communication-technologies-proceedings-of-third-
iccnct-2020-s-smys/
https://ebookmeta.com/product/computer-networks-and-inventive-
communication-technologies-proceedings-of-fifth-
iccnct-2022-s-smys/
Essential Interviewing: A Programmed Approach to
Effective Communication 9th Edition David R Evans
https://ebookmeta.com/product/essential-interviewing-a-
programmed-approach-to-effective-communication-9th-edition-david-
r-evans/
https://ebookmeta.com/product/computer-networks-big-data-and-iot-
proceedings-of-iccbi-2020-a-pasumpon-pandian/
https://ebookmeta.com/product/computer-networks-and-inventive-
communication-technologies-proceedings-of-fourth-iccnct-2021-1st-
edition-s-smys/
https://ebookmeta.com/product/business-analytics-a-data-driven-
decision-making-approach-for-business-volume-i-1st-edition-amar-
sahay/
https://ebookmeta.com/product/computer-communication-networking-
and-iot-proceedings-of-icicc-2020-lecture-notes-in-networks-and-
systems-197-editors-bhateja/
Data Communications
& Computer Networks
A Business User’s Approach
Ninth Edition
Jill West
Curt M. White
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Important Notice: Media content referenced within the product description or the product
text may not be available in the eBook version.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Data Communications & Computer Networks: © 2023, 2016, 2013 Cengage Learning, Inc. ALL RIGHTS RESERVED.
A Business User’s Approach, Ninth Edition
No part of this work covered by the copyright herein may be reproduced
Jill West and Curt M. White
or distributed in any form or by any means, except as permitted by U.S.
copyright law, without the prior written permission of the copyright owner.
SVP, Higher Education Product Management: Erin
Joyner Unless otherwise noted, all content is © Cengage, Inc.
VP, Product Management, Learning Experiences:
Thais Alencar
Product Director: Jason Fremder For product information and technology assistance, contact us at
Product Manager: Natalie Onderdonk Cengage Customer & Sales Support, 1-800-354-9706
or support.cengage.com.
Product Assistant: Tom Benedetto
Content Manager: Arul Joseph Raj, Lumina For permission to use material from this text or product, submit all
Datamatics, Inc. requests online at www.copyright.com.
Digital Delivery Quality Partner: Jim Vaughey
Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis in connection
with any of the product information contained herein. Publisher does not assume, and expressly disclaims, any obligation to obtain
and include information other than that provided to it by the manufacturer. The reader is expressly warned to consider and adopt
all safety precautions that might be indicated by the activities described herein and to avoid all potential hazards. By following
the instructions contained herein, the reader willingly assumes all risks in connection with such instructions. The publisher makes
no representations or warranties of any kind, including but not limited to, the warranties of fitness for particular purpose or
merchantability, nor are any such representations implied with respect to the material set forth herein, and the publisher takes no
responsibility with respect to such material. The publisher shall not be liable for any special, consequential, or exemplary damages
resulting, in whole or part, from the readers’ use of, or reliance upon, this material.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Brief Contents
Preface xiii
iii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents
Chapter 1
Introduction to Data Communications and Computer Networks 1
1-1: The Language of Computer Application Layer 16
Networking 3 Transport Layer 16
Remember this… 4 Network Layer 16
Self-check 4 Data Link Layer 16
Physical Layer 17
1-2: The Big Picture of Networks 5
The OSI Model 17
Remember this… 6
Logical and Physical Connections 18
Self-check 6
The TCP/IP Protocol Suite in Action 19
1-3: Common Network Examples 6 Remember this… 22
The Desktop Computer and the Internet 6 Self-check 22
A Laptop Computer and a Wireless Connection 8
1-5: Cloud Computing 22
Cellular Network 9
Cloud Computing Characteristics 22
Other Common Network Systems 9
Cloud Service Models 24
Sensor Networks 10
Remember this… 26
Business Mainframe Network 11
Self-check 26
Satellite Networks 11
Summary 27
Cloud Networks 11
Key Terms 28
Remember this… 13
Review Questions 29
Self-check 13
Hands-On Project 1 31
1-4: Network Architectures 14
Reflection Discussion 1 33
The TCP/IP Protocol Suite 14
Solutions to Self-Check Questions 34
Chapter 2
Conducted and Radiated Media 37
2-1: Cabling Standards 38 Unshielded and Shielded Twisted Pair 45
Personal Area Network (PAN) Connection Standards 39 Coaxial Cable 47
Universal Serial Bus (USB) 39 Fiber-Optic Cable 48
Thunderbolt 40 Cable Connectors 51
Lightning 41 Twisted Pair Cable Connectors 51
Remember this… 41 Coaxial Connectors 51
Self-check 42 Fiber Connectors 52
Summary of Wired LAN Technologies 53
2-2: Conducted Media 42
Remember this… 54
Twisted Pair Cable 42
Self-check 54
Types of Twisted Pair Cable 43
iv
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents v
Chapter 3
Fundamentals of Data and Signals 74
3-1: Data and Signals 75 Phase Shift Keying 89
Analog vs. Digital 75 Transmitting Analog Data with Digital Signals 92
Analog Data and Signals 76 Pulse Code Modulation 92
Digital Data and Signals 77 Delta Modulation 94
Fundamentals of Signals 79 Remember this… 96
Remember this… 83 Self-check 97
Self-check 83 3-3: Characters and Codes 97
3-2: Converting Data into Signals 83 ASCII 97
Chapter 4
Frames and Errors 108
4-1: Data Link Frames 108 4-2: Noise and Errors 111
Data Link Responsibilities 109 Gaussian Noise 111
Frame Components 109 Impulse Noise 112
Remember this… 110 Crosstalk 113
Self-check 111 Echo 113
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
vi Contents
Chapter 5
Wired and Wireless Local Area Networks 141
5-1: Using LANs 142 Remember this… 158
Putting LANs to Work 143 Self-check 158
Advantages and Disadvantages of LANs 144 5-4: Wired LANs 158
Remember this… 145 Ethernet Standards 158
Self-check 145 Wired Ethernet Frame Format 160
5-2: Evolution of LAN Technologies 145 Remember this… 162
Bus Topology 145 Self-check 163
Star-Wired Bus Topology 147 5-5: Wireless LANs 163
Contention-Based Protocols 148 Wireless CSMA/CA 163
Star Topology 149 CSMA/CA Frame Format 164
Remember this… 150 Remember this… 166
Self-check 150 Self-check 166
5-3: Switches 151 Summary 166
MAC (Medium Access Control) Addresses 151 Key Terms 168
Virtual LANs 154 Review Questions 168
Link Aggregation 155 Hands-On Project 5 170
Spanning Tree Algorithm 156 Reflection Discussion 5 173
Quality of Service 157 Solutions to Self-Check Questions 174
Chapter 6
Network Systems and Software 175
6-1: Network Servers and Software 175 Remember this… 182
RAID Configurations 176 Self-check 182
Storage Types 178 6-2: Server Operating Systems 183
Utilities 179 Unix 183
Software Licensing Models 180 Linux 183
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents vii
Chapter 7
The Internet 215
7-1: Internet Protocol (IP) 216 Remember this… 233
IP Packets 217 Self-check 233
Internet Protocol Version 4 (IPv4) 218 7-4: Internet Services 233
IPv4 Addresses 219 Email 233
Internet Protocol Version 6 (IPv6) 221 File Transfer Protocol (FTP) 234
IPv6 Addresses 223 Intranets and Extranets 236
Remember this… 223 Remote Login 236
Self-check 223 Telnet 236
7-2: Locating a Resource on the Secure Remote Login Protocols 237
Internet 223 Voice over IP (VoIP) 238
Uniform Resource Locator (URL) 224 Media Streaming 240
Domain Name System (DNS) 225 The Internet of Things (IoT) 240
Dynamic Host Configuration Protocol (DHCP) 225 Data Analytics 242
Network Address Translation (NAT) 226 Remember this… 243
Remember this… 228 Self-check 243
Self-check 228 Summary 244
7-3: Protocols of the Internet 229 Key Terms 245
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii Contents
Chapter 8
Risk, Security, and Compliance 255
8-1: Network Security Risks 256 DES (Data Encryption Standard) and AES
(Advanced Encryption Standard) 274
Common Vulnerabilities and Attack Types 256
Public Key Cryptography 275
Compromise Users 256
Public Key Infrastructure (PKI) 275
Compromise Software 256
Compromise Availability 256 Technologies That Use Encryption 278
Compromise Accounts 257 Digital Signatures 278
Other Attack Strategies 257 Tunneling Protocols 278
Risk and Security Assessments 259 Remember this… 279
Risk Response 261 Self-check 279
Security Policies 261 8-4: IAM (Identity and Access
Incident Response 261 Management) 279
Remember this… 262 Access Rights 280
Self-check 262 Authentication 280
8-2: Network Security Technologies 262 Hashing 281
Blockchain 284
Physical Security 263
Single Sign-On (SSO) and Federated Identity
Prevention Methods 263
Management (FIM) 284
Detection Methods 263
Authorization 285
Anti-Malware 264
Accounting 285
Proxy Server 264
Remember this… 286
Access Control Lists (ACLs) 265
Self-check 287
Firewalls 265
Firewall Effectiveness 265
8-5: Wireless Security 288
Firewall Functionality in the Cloud 266 Securing Wireless LANs 288
Firewall Limitations 267 Spread Spectrum Technology 288
Intrusion Detection and Prevention Systems 267 Frequency Hopping Spread Spectrum 288
Remember this… 268 Direct Sequence Spread Spectrum 290
Self-check 269 Remember this… 290
Self-check 290
8-3: Data Security Technologies 269
Summary 291
CIA Triad 269
Key Terms 293
Data Security Regulations and Compliance 270
Review Questions 294
Encryption 271
Hands-On Project 8 295
Monoalphabetic Substitution-Based Ciphers 272
Reflection Discussion 8 300
Polyalphabetic Substitution-Based Ciphers 272
Solutions to Self-Check Questions 301
Transposition-Based Ciphers 273
Chapter 9
Wide Area Networks 303
9-1: Networks That Connect LANs 304 Remember this… 306
Campus Area Networks (CANs) 304 Self-check 306
Metropolitan Area Networks (MANs) 304 9-2: Routing 306
WAN Topology 305 Best Paths 307
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents ix
Chapter 10
Connecting Networks and Resources 336
10-1: Small Business and 10-3: WAN Virtualization 355
Consumer-Grade WAN Services 337 Software-Defined WAN (SD-WAN) 356
Digital Subscriber Line (DSL) 337 Software-Defined Branch (SD-Branch) 357
DSL Basics 337 Secure Access Service Edge (SASE) 358
DSL Formats 339 Remember this… 358
Cable Modems 339 Self-check 358
Fiber Internet 341
10-4: Cloud-Supported Technologies 359
Satellite 342
Digital Marketing 359
Cellular Networks 344
Remote Workers 360
Remember this… 346
Edge Computing 361
Self-check 347
Remember this… 362
10-2: Enterprise-Grade WAN Services 347 Self-check 362
Legacy WAN Technologies 347 Summary 363
MPLS 348 Key Terms 365
Ethernet 349 Review Questions 365
Virtual Private Network (VPN) 351 Hands-On Project 10 367
Cloud Connectivity 354 Reflection Discussion 10 369
Remember this… 355 Solutions to Self-Check Questions 370
Self-check 355
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
x Contents
Chapter 11
Network Design and Management 372
11-1: Planning for Changes 373 Simple Network Management
Protocol (SNMP) 388
Project Management 373
NetFlow 389
Application Lifecycle Management (ALM) 374
Creating a Baseline 390
Change Management 376
Remember this… 392
Remember this… 378
Self-check 393
Self-check 378
11-4: Cloud Deployment and
11-2: Analyzing Design 378
Management 393
Network Modeling 378
Cloud Migration 393
Wide Area Connectivity Map 379
Migration Phases 394
Metropolitan Area Connectivity Map 379
Migration Strategies 395
Local Area Connectivity Map 379
Cloud Provisioning and Configuration
Gap Analysis 381 Management 396
Feasibility Studies 381 Automation 396
Capacity Planning 382 Infrastructure as Code (IaC) 398
Testing Environments 383 Automation and Orchestration Tools 399
Remember this… 384 Cloud Monitoring and Optimization 401
Self-check 385 Remember this… 403
11-3: Network Monitoring and Self-check 403
Management 385 Summary 404
Network Monitoring Tools 385 Key Terms 406
Monitoring Network Hardware 385 Review Questions 406
Monitoring Network Traffic 386 Hands-On Project 11 408
Alerts and Logs 387 Reflection Discussion 11 411
Syslog 387 Solutions to Self-Check Questions 412
Chapter 12
Business Principles in IT 414
12-1: People Resources 415 Vendor Documentation 423
Network Administrator Skills and Certifications 415 Request for Information (RFI) 423
Professional Development 416 Statement of Work (SOW) 423
Training Users 418 Service Level Agreement (SLA) 423
Project Evaluations 424
Policies and Procedures 419
Remember this… 425
Remember this… 420
Self-check 425
Self-check 420
12-2: Vendor Relations 420 12-3: Financial Aspects of Cloud 426
CapEx vs. OpEx 426
Vendor Services 421
Tracking Cloud Expenses 427
Support Plans 421
Time to Market 422 Cloud Cost Optimization 428
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents xi
Appendix A
CompTIA Cloud Essentials+ CLO-002 Certification Exam Objectives 449
Domain 1.0 Cloud Concepts—24% Domain 3.0 Management and
of Exam 450 Technical Operations—26% of Exam 453
Domain 2.0 Business Principles of Domain 4.0 Governance, Risk,
Cloud Environments—28% of Exam 451 Compliance, and Security for the
Cloud—22% of Exam 454
Glossary 457
Index 478
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Dedication
In memory of Curt M. White
xii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface
Today’s business world could not function without ❯❯You work in a small company, in which each
data communications and computer networks. Most employee wears many hats. Thus, you may
people cannot make it through an average day with- need to perform some level of network assess-
out encountering or using some form of computer ment, administration, or support.
network. In the past, this field of study occupied the ❯❯You have your own business and need to fully
time of only engineers and technicians, but it now
understand the advantages of using computer
involves business managers, end users, programmers,
networks to support your operations. To
and just about anyone who might use a phone or
optimize those advantages, you should have
computer! Thus, Data Communications & Computer
a good grasp of the basic characteristics of a
Networks: A Business User’s Approach, Ninth Edition
computer network.
maintains a business user’s perspective on this vast
and increasingly significant subject. ❯❯You have a computer at home or at work, and
you simply wish to learn more about computer
In a generic sense, this book serves as an owner’s networks.
manual for the individual computer user. In a world in
❯❯You have realized that, to keep your job skills
which computer networks are involved in nearly every
current and remain a key player in the informa-
facet of business and personal life, it is paramount that
tion technology arena, you must understand
each person understands the basic features, opera-
tions, and limitations of different types of computer how different computer networks work and
networks. This understanding helps people become become familiar with their advantages and
better managers, better employees, and simply better shortcomings.
computer users. As a computer network user, you will
probably not be the one who designs, installs, and
maintains the network. Instead, you will have interac- Audience
tions—either direct or indirect—with the individuals
Data Communications & Computer Networks: A Business
who do. Taking this course should give you a strong
User’s Approach, Ninth Edition is intended for a one-
foundation in computer network concepts, which will
semester course in business data communications for
enable you to work effectively with network admin-
students majoring in business, information systems,
istrators, network installers, and network designers.
management information systems, and other applied
Here are some of the many scenarios in which the
fields of computer science. Computer science depart-
knowledge contained in this book would be particu-
ments will also find the book valuable, particularly if
larly useful:
the students read the Details sections accompanying
❯❯You work for a company and must deal directly most chapters. It is a readable resource for computer
with a network specialist. To better understand network users that draws on examples from business
the specialist and be able to conduct a meaningful environments. In a university setting, this book can
dialog with them, you need a basic understanding be used at practically any level above the first year.
of the many aspects of computer networks.
❯❯You are a manager within a company and
depend on network specialists to provide you
Defining Characteristics of
with recommendations for the company’s net- This Book
work. To ensure that you can make intelligent The major goal of this ninth edition is the same as
decisions regarding network resources, you that of the first edition: to go beyond simply provid-
need to know the basic concepts of data com- ing readers with a handful of new definitions, and
munications and computer networks. instead introduce them to the next level of details
xiii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xiv Preface
found within the fields of computer networks and communications and computer networks. Some of
data communications. This higher level of detail, these topics include:
framed within the context of real-world scenarios,
❯❯Integral coverage of cloud computing,
includes the network technologies and standards
especially from a business perspective
necessary to support computer network systems
and their applications. This book is more than just ❯❯An introduction to many new terms and
an introduction to advanced terminology. It involves concepts such as: IoT (Internet of Things),
introducing concepts that will help the reader achieve 5G (5th generation) cellular, SDN (software-
a more in-depth understanding of the often-complex defined networking), SD-WAN (software-defined
topic of data communications. Hands-on projects wide area networking), data analytics, and AI
provide memorable insights into the concepts, and (artificial intelligence)
pedagogical features help readers assess their own ❯❯The most recent Wi-Fi standards of 802.11ac
learning and progress. It is hoped that once readers and 802.11ax
attain this in-depth understanding, the topic of net-
❯❯Technologies to support remote workers
works and data communications will become engag-
ing in the pursuit of business objectives. To facilitate ❯❯Industry standards for cloud security
this understanding, the book strives to maintain high It is also important to remember the many older tech-
standards in three major areas: readability, a balance nologies still in prevalent use today. Discussions of
between the technical and the practical, and currency. these older technologies can be found, when appro-
priate, in each chapter of this book.
Readability
Great care has been taken to provide the technical Organization
material in as readable a fashion as possible. Each
The organization of Data Communications & Computer
new edition has received a complete rewrite, in which
Networks, Ninth Edition roughly follows that of the
every sentence has been reexamined to convey the
TCP/IP protocol suite, from the physical layer to the
concepts as clearly as possible. Given the nature of
upper layers. In addition, the book has been carefully
this book’s subject matter, the use of terminology is
designed to consist of twelve, well-balanced chapters
unavoidable. However, every effort has been made to
to fit into a typical 15- or 16-week semester (along
present terms in a clear fashion, with minimal use of
with any required exams). The intent was to design
acronyms and even less use of jargon.
a versatile introduction to the study of computer
networks by creating a set of chapters that is cohesive
Balance between the Technical and the but at the same time allows for flexibility in the week-
Practical to-week curriculum. Thus, instructors may choose to
As in the very successful first edition, a major objective emphasize or de-emphasize certain topics, depending
in writing Data Communications & Computer Networks, on the focus of their curriculums.
Ninth Edition was to achieve a balance between the Coverage of CompTIA’s Cloud Essentials+ exam objec-
more technical aspects of data communications tives are deeply integrated into the material so that
and its everyday practical aspects. Throughout each every objective is covered to or beyond the level
chapter, there are sections entitled “Details,” which required by the exam. Students who are taking this
delve into the more specialized aspects of the topic course and who engage in final exam preparation
at hand. Should readers not have time to explore this activities (such as review and practice testing) will be
technical information, they can skip these Details qualified to attempt the CompTIA Cloud Essentials+
sections without missing out on the basic concepts certification exam. This exam sits at the crossroads
of covered topics. of business and technology in cloud computing and
encourages a common language for professionals
Current Technology from both areas of expertise.
Because of the fast pace of change in virtually all Students who have taken other cloud computing
computer-related fields, every attempt has been courses, such as a course that covers CompTIA’s more
made to present the most current trends in data technical Cloud+ exam, can study Chapters 11 and 12
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xv
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xvi Preface
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xvii
Chapter 5, Wired and Wireless Local Area Networks, Chapter 11, Network Design and Management, intro-
explains the evolution of topology and Ethernet stan- duces application lifecycle management, change man-
dards in wired local area networks, emphasizing the agement, and project management. In the context of
role a switch plays in modern networks. The chapter creating or improving networks, the chapter explores
then describes standards used to handle collisions network modeling, gap analysis, feasibility studies,
on wireless networks. capacity planning, and testing environments. A sec-
tion on network monitoring covers monitoring tools
Chapter 6, Network Systems and Software, discusses and the importance of baseline studies. The chapter
various network services and the network operating concludes with new content on cloud deployment and
systems that support them. New content discusses migration concepts, including migration strategies,
how to configure network devices and explains the automation/orchestration, and cloud monitoring.
concept and role of virtualization. The chapter con-
cludes with new content explaining cloud computing Chapter 12, Business Principles in IT, offers new con-
services and pricing strategies. tent addressing a network’s human resources, includ-
ing the need for administrative and training skills in
Chapter 7, The Internet, is devoted to technologies addition to ongoing professional development. The
that make the Internet work. The chapter covers IPv4 next section focuses on relationships with vendors,
and IPv6 protocols and addressing as well as TCP, important vendor documentation, and methods for
UDP, and a brief discussion of MPLS. It also discusses evaluating proposed projects with vendors. New con-
Internet services, such as DNS, SSH, and VoIP, and it tent covers financial aspects of the cloud, including a
presents new content on the IoT (Internet of Things) comparison of CapEx versus OpEx and a discussion of
and data analytics. cloud cost optimization. The final section addresses
business continuity and disaster recovery planning.
Chapter 8, Risk, Security, and Compliance, addresses
common network vulnerabilities and attack types,
including updated information on ransomware and
phishing emails. The chapter explains network secu- Instructor Resources
rity technologies, from physical security and anti- Additional instructor resources for this product are
malware to firewalls and IDS/IPS. Encryption pro- available online. Instructor assets include an Instruc-
cesses and uses are explained along with an updated tor’s Manual, PowerPoint® slides, and a test bank
discussion of authentication measures. The chapter powered by Cognero®. Sign up or sign in at www.
concludes with a section devoted to wireless security. cengage.com to search for and access this product
and its online resources.
Chapter 9, Wide Area Networks, introduces the basic
terminology and concepts of campus area networks,
metropolitan area networks, and wide area networks.
Routing processes and common routing protocols are Acknowledgments
explored, followed by discussions on multiplexing and This book has been a long time coming. Through
compression in wide area networks. delays, multiple schedule rearrangements, the 2020
quarantines, and team members being promoted to
Chapter 10, Connecting Networks and Resources,
other responsibilities, this edition has now come to
delves into the details of how local networks con-
fruition. I believe this is good timing—as the demand
nect to the Internet. The chapter includes DSL, cable
for cloud skills increases so does the perception of
modems, fiber, satellite, and cellular connections for
cloud as an integral part of IT.
consumer-level services and MPLS, Ethernet, VPN, and
cloud connectivity for enterprise-grade connections. Many people contributed to the production of this
New content on SD-WAN, SD-Branch, and SASE helps book, and many more helped move it along before the
prepare students for the CompTIA Cloud Essentials+ official drafting process began. I’d like to thank Emily
certification exam. And coverage of digital marketing, Pope for her vision of blending this book’s network
edge computing, and supporting remote workers pre- instruction in a business context with CompTIA’s
pares students for working in today’s Internet-based business-centered cloud computing certification.
businesses. I’m grateful for Staci Eckenroth’s high standards in
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xviii Preface
editing the drafts and ensuring inclusive language kids: Winn, Sarah, Daniel, and Zack. Thank you to each
that shows the inherent value of people in all walks of of you for the unique ways you each contribute. And
life. And thank you to Jennifer Ziegler for picking up finally, a special thanks to each of my students—your
the reins of this project from others to see it through. curiosity, struggles, dreams, and hard work fuel my
passion for teaching and for writing. I’m grateful to
The work I do is only possible through the support
play a part in your journey.
and encouragement of my husband, Mike, and our four
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Chapter 1
Introduction to Data
Communications and
Computer Networks
Objectives Introduction
After reading this chapter, Making predications is a difficult task, and predicting the future of
you should be able to: computing is no exception. History is filled with computer-related
• Use common networking predictions so inaccurate that today they are amusing. For example,
terms consider the following predictions:
• Identify basic networking
“I think there is a world market for maybe five computers.”
devices
Thomas Watson, chairman of IBM, 1943
• Describe common types
of networks “I have traveled the length and breadth of this country, and talked
• Describe the purpose of with the best people, and I can assure you that data processing is a
each layer of the TCP/IP fad that won’t last out the year.”
protocol suite and the OSI Editor in charge of business books for Prentice Hall, 1957
model
“There is no reason anyone would want a computer in their home.”
• Explain the significance of
Ken Olsen, president and founder of Digital Equipment Corporation,
cloud computing
1977
Apparently, no matter how famous you are or how influential your posi-
tion, it is very easy to make very bad predictions. Nevertheless, it’s hard
to imagine that anyone can make a prediction worse than any of those
above. Buoyed by this false sense of optimism, consider these forecasts:
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
2 Chapter 1 Introduction to Data Communications and Computer Networks
At some point, a hacker manages to steal your In addition, more people are using satellite-based
banking password and log into your online bank GPS devices in their cars and on smartphones to pro-
account, but the attack is detected and booted from vide driving directions and avoid traffic hotspots. Simi-
your account before any damage is done because lar systems can unlock your car doors if you leave your
he didn’t move his mouse the same way you do. keys in the ignition or can locate your car in a crowded
parking lot by beeping the horn and flashing the
Someday your car battery will be capable of detecting headlights if you cannot remember where you parked.
when the power gets too weak to start the car, and it
will call to inform you that you need a replacement or Even if you didn’t use public transportation today or
a charge. a GPS device in your car to commute to work, school,
or the store, there are many other ways to use a com-
One day you will use an app on your phone to puter network. Businesses can order parts and inventory
request personal transportation. The app will show on demand and build products to customer-designed
you the car’s photo, provide a map of the car’s current specifications electronically, without the need for paper.
location, and you’ll be notified when the car arrives Online retail outlets can track every item you click on or
at your location. However, when you enter the car, purchase. Using this data, they can make recommen-
there will be no driver because the car drives itself. dations of similar products and inform you in the future
when a new product becomes available. ATMs can verify
Someday while driving in a big city, your car will a user’s identity by taking their thumbprint. Plus, many
navigate you to the nearest empty parking spot and employees and students now work from home, relying
allow you to pay the parking fee with your phone. heavily on data networks to access remote resources for
work, school, and socializing.
Do these predictions sound far-fetched and filled with To support current demands for network connectivity,
mysterious technologies that only scientists and engi- cable television continues to expand, offering extensive
neers can understand? They shouldn’t because these programming, pay-per-view options, video recording,
scenarios are happening today with technologies that digital television and music, and (in some markets) gigabit
already exist. What’s more, none of these advances connectivity to the Internet. The telephone system, the
would be possible today were it not for computer net- oldest and most extensive network of communication
works and data communications. devices, continues to become more of a computer network
The world of computer networks and data communica- every day. The most recent “telephone” networks can
tions is a surprisingly vast and increasingly significant now deliver voice, Internet, and television over a single
field of study. Once considered primarily the domain connection. Cellular telephone systems cover virtually
of network engineers and technicians, computer the entire North American continent and include systems
networks now involve business managers, computer that allow users to upload and download data to
programmers, system designers, office managers, and from the Internet, send and receive images, and
home computer users, and everyday citizens. upload or download streaming video such as television
programs, movies, web conferences, and social media
It is virtually impossible for the average person on the
videos. Your smartphone can play music, make phone
street to spend 24 hours without directly or indirectly
calls (even video calls), take pictures, browse the web,
using some form of computer network. Consider all
and let you play games while you wait for the next train,
the ways you might interact with computer networks
class, or appointment.
when you’re literally on the street: Most transportation
systems use extensive communication networks to Welcome to the amazing world of computer net-
monitor the flow of vehicles and trains. Expressways and works! As you can see, it is nearly impossible to not
highways have computerized systems for controlling have used some form of computer network and data
traffic signals and limiting access during peak traffic communication. Because of this growing integration
times. Some major cities are placing the appropriate of computer networks and data communications into
hardware inside city buses and trains so that the precise business and daily life, everyone—particularly those
location of each bus and train is known. This information considering careers in information systems, busi-
enables transportation systems to keep buses evenly ness, or computer science—needs to understand
spaced and more punctual, and it allows riders to know the basic concepts. Armed with this knowledge,
when the next bus or train will arrive. you not only will be better at communicating with network
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-1: The Language of Computer Networking 3
MAN
Section 1-1: The Language CAN
of Computer Networking
LAN
Over the years, numerous terms and definitions relat-
ing to computer networks and data communications
have emerged. To gain insight into the many subfields of PAN
study, and to become familiar with the emphasis of this
textbook, take a moment to examine the more common
terms and their definitions:
❯❯A computer network is an interconnected group of Figure 1-1 Relative sizes of common network types
computers and computing equipment using either
wires or radio waves that can share data and com-
puting resources. There are many other terms you’ll see repeatedly
❯❯Wireless computer networks use different kinds of throughout this course. To put these terms in context,
low energy radiation below the visible light spec- let’s peruse the highlights of the coming chapters. It
helps to think of the progression of these chapters in
trum and can involve broadcast radio, microwaves,
terms of how each chapter relates to a company’s LAN,
or infrared transmissions.
either internal to the LAN or external to it. For example,
❯❯Networks spanning an area of a few centimeters Chapters 2 through 6 concentrate on technologies used
to several meters around an individual are called on LANs. Chapter 7 expands the discussion to see how
PANs (personal area networks). PANs include networks function outside of the LAN environment,
devices such as laptop computers, smartphones, and Chapter 8 covers key security concepts when con-
personal printers, and wireless peripheral devices sidering threats from outside the LAN. As you move
(like a keyboard or speakers) that are typically used away from the LAN, you find that several technologies
by one person at a time. A PAN can also include can connect your network with other networks or with
wearable devices, such as a smartwatch or smart extensions to your own network. You’ll learn about how
glasses, although sometimes these devices are con- WANs work in Chapter 9, and you’ll discover many of
sidered to be part of a BAN (body area network). the more common WAN connection types in Chapter 10.
Let’s take a more detailed look at what you can expect to
❯❯Networks that are a little larger in geographic size—
learn during this course and some of the core vocabulary
spanning a room, a floor within a building, or an
you’ll be using.
entire building—are LANs (local area networks).
Figure 1-1 shows the relative sizes of PANs, LANs, The study of computer networks would be inade-
and other common network types described here. quate without the introduction of two important build-
ing blocks: data and signals. Data is information that
❯❯Collections of local area networks that cover a
has been translated into a form conducive to storage,
campus (such as a college campus or a business cam-
transmission, and calculation. Data communications
pus) are often called CANs (campus area networks).
is the transfer of digital or analog data using digital or
❯❯Networks that serve an area up to roughly analog signals. Analog and digital signals are transmit-
50 kilometers—approximately the area of a typical ted over conducted media or wireless (also called radi-
city—are called MANs (metropolitan area ated) media, both of which are discussed in Chapter 2.
networks). Metropolitan area networks are high- These media are the foundational component of every
speed networks that interconnect businesses with network. Next, Chapter 3 evaluates how data is trans-
other businesses and the Internet. formed into signals that can be transmitted on various
network media.
❯❯Large networks encompassing parts of states,
multiple states, countries, and the world are WANs Signals transmitted on a network must be formatted
(wide area networks). according to certain sets of rules, called protocols, a
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
4 Chapter 1 Introduction to Data Communications and Computer Networks
topic covered in Chapter 4. When the signals transmitted refer to a particular service, such as SaaS (Software as a
between computing devices are corrupted and errors Service) or NaaS (Networking as a Service). Very often
result, error detection and error control are necessary. “the cloud” simply refers to the Internet or to some
These topics are also discussed in detail in Chapter 4. other remote network. When a company places data or
applications on some website on the Internet and allows
Many kinds of devices are needed to support network
people to access them, you might say the application is
-based communications, such as switches and routers.
cloud-based. One of the more visible examples of cloud
Chapter 5 describes the different ways these networking
computing is storing one’s music and files at a remote
devices (i.e., devices used to support the network) can
location on the Internet rather than on a local device.
be arranged to allow networked devices (i.e., devices
Major corporations such as Amazon and Apple allow
using the network) to talk to each other. Then Chapter 6
users to store personal data and recent media purchases
evaluates the services and software used to manage
on their clouds. Companies such as Microsoft and
the network, such as a NOS (network operating sys-
Google (as well as many others) offer cloud-based appli-
tem), and Chapter 7 shows how you can connect your
cations (called web apps) such as word processors
network to other networks using specialized networking
and spreadsheets. The actual code that runs the web
protocols that enable communication across the Inter-
app does not exist on the user’s computer but runs on
net. As you open your network to the world, you need
the cloud provider’s servers and is typically accessed
to keep it safe. Chapter 8 surveys common risks to your
across the Internet through the user’s browser. This
network and network security best practices that pro-
way, users don’t have to download and install the appli-
tect your network and your data when you’re connected
cation to an individual machine. You will examine cloud
to the Internet.
concepts in more detail throughout this course and
Because sending only one signal over a medium at one time specifically from a business perspective in Chapter 12.
can be an inefficient way to use the transmission medium,
many systems perform multiplexing. Multiplexing
is the transmission of multiple signals on one medium, Cloud Essentials+ Exam Tip
which is necessary with high-traffic connections like
those that make up the Internet. For a medium to trans- This course covers all the objectives for the CompTIA
mit multiple signals simultaneously, the signals must be Cloud Essentials+ CLO-002 certification. Look for
altered so that they do not interfere with one another. these Cloud Essentials+ Exam Tips to indicate which
Compression is another technique that can maximize objectives are addressed in a section.
the amount of data sent over a medium. Compression
involves squeezing data into a smaller package, thus
reducing the amount of time (as well as storage space) Remember this…
needed to transmit the data. Multiplexing and com-
pression are covered in Chapter 9. Next, Chapter 10 ❯❯Networks are often categorized according to their
shows how these techniques are used in different WAN size and the types of devices connected to them.
technologies that connect your local network to the
❯❯The study of data communications includes digital
Internet and other remote networks.
and analog signals that can be transmitted over
Network management is the design, installation, and conducted or wireless (radiated) media.
support of a network and its hardware and software.
❯❯Cloud computing often relies on the Internet in some
Chapter 11 discusses many of the basic concepts nec-
way for access to resources at a remote location.
essary to properly support the design and improvement
of network hardware and software, as well as the more
common management techniques used to optimize a
network’s performance.
Self-check
1. You plug your new printer into a USB port on
A very common expression you may have heard is
your computer. What kind of network supports
something like “back up your photos and documents to
this connection?
the cloud” or “the application is in the cloud.” The key
a. CAN
concept here is cloud and the way this term is currently
used. Similar words or phrases that are commonly used b. LAN
today are cloud computing or Anything as a Service c. WAN
(XaaS), where the X can be replaced with other letters to d. PAN
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-2: The Big Picture of Networks 5
2. You connect your home network to your ❯❯Servers—The computers that store network
Internet provider using a single fiber cable. software and shared or private user files
What technology allows you to download and
❯❯Switches—The collection points for the wires that
upload data over this connection at the same
interconnect the workstations on a LAN
time?
a. Network management ❯❯Routers—The connecting devices between LANs
b. Multiplexing and WANs, such as the Internet
Section 1-2: The Big devices (such as routers) that make the decisions
about where to route a piece of data
Picture of Networks ❯❯Connecting media—Some type of wired or wireless
high-speed transmission infrastructure (such as
If you could create one picture that tries to give an over-
view of a typical computer network, what might this pic- cables or radio signals) that connects one node to
ture include? Figure 1-2 shows one possibility. Note that another
this figure shows two wide area networks (WAN 1 and ❯❯A subnetwork—Collection of nodes and transmis-
WAN 2), two local area networks (LAN 1 and LAN 2), and sion media working together in a cohesive unit
a personal area network. Although a full description of
To see how LANs and WANs work together, consider
the different components constituting wide area and local
User A (in the upper-left corner of Figure 1-2), who
area networks is not necessary quite yet, it is import-
wishes to retrieve a web page from the web server
ant to note that most LANs often include the following
shown in the lower-right corner. To do this, User A’s
hardware:
computer must have both the necessary hardware and
❯❯Workstations—Personal computers (such as software required to communicate with the first WAN it
desktops, laptops, or tablets) or smartphones encounters, WAN 1 (User A’s Internet service provider).
WAN 1 WAN 2
Modem Routers
User A
Routers
Cellular tower
LAN 1 LAN 2
Switch
PAN 1
Workstations Web
Bluetooth
server
headphones
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
6 Chapter 1 Introduction to Data Communications and Computer Networks
Assuming that User A’s computer is connected to this 4. You need to make some changes to a file stored
WAN through a DSL telephone line, User A needs some on your office’s network. On which device is the
type of modem. Furthermore, if this WAN is part of the file located?
Internet, User A’s computer requires software that speaks a. Router
the language of the Internet: TCP/IP (Transmission b. Server
Control Protocol/Internet Protocol).
c. Workstation
Notice that no direct connection exists between WAN 1, d. Switch
where User A resides, and LAN 2, where the web server
Check your answers at the end of this chapter.
resides. To ensure that User A’s web page request reaches
its intended receiver (the web server), User A’s software
attaches the appropriate address information that WAN 1
needs to send User A’s request to the router that connects Section 1-3: Common
WAN 1 to LAN 1. Once the request is on LAN 1, the node
connecting LAN 1 and LAN 2 uses address information to
Network Examples
pass the request to LAN 2. Additional address information The introduction of this chapter described a few appli-
then routes User A’s web page request to the web server, cations of computer networks and data communications
whose software accepts the request. in everyday life. Think about the basic communications
Under normal traffic and conditions, this procedure networks that you might encounter on any typical day
might take only a fraction of a second. When you begin to while at school, at work, or living life in general. This will
understand all the steps involved and the great number help you see how extensively you rely on data commu-
of transformations that a simple web page request must nications and computer networks. In Figure 1-3, Katrina
undergo, the fact that it takes only a fraction of a second is sitting at a desk at her college library. On the desk are
to deliver is amazing. two computers: a desktop PC (provided by the school)
and her personal laptop. She is holding her smartphone.
Try to identify each of the communications networks
Remember this… that Katrina might encounter in this scenario.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-3: Common Network Examples 7
Metal
conduit
Cables Cables
Workstations
LAN
collection
point
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
8 Chapter 1 Introduction to Data Communications and Computer Networks
To communicate with the Internet using a DSL or cable to how far the wireless signals can travel and how fast
modem connection, a user’s computer must connect to they can carry data.
another device already communicating with the Internet.
Because both wireless and wired LANs are standard in
The easiest way to establish this connection is through
business, academic, and many home environments, it
the services of an ISP (Internet service provider). In this
should come as no surprise that having just one LAN is
case, the user’s computer needs to have the necessary
not going to get the job done. Many organizations need
software to communicate with the Internet. The Internet
the services of multiple LANs, and it may be necessary
“talks” only in TCP/IP, so computers must have software
for these networks to communicate with each other. For
that supports the TCP and IP protocols. Once the user’s
example, the school that Katrina attends may want the
computer is talking TCP/IP, a connection to the Inter-
LAN that supports its chemistry department to share
net can be established. Figure 1-5 shows a typical home an expensive color laser printer with its biology depart-
computer-to-Internet connection. ment’s LAN. Fortunately, it is possible to connect two
LANs so that they can share peripherals (such as the
printer) as well as software and files. Depending on the
A Laptop Computer and a situation, you might use a switch or a router to connect
Wireless Connection two or more LANs or segments of LANs.
Back at the library, Katrina also has her laptop sitting In some cases, it may be more important to prevent data
on the desk. Many laptops do not connect to a network from flowing between LANs than to allow data to flow from
using a fixed wire but instead connect via a wireless con- one network to another. For instance, some businesses
nection. This type of network connection continues to have political reasons for supporting multiple networks—
grow in popularity. A user working with a laptop, tablet, each division may want its own network to run as it wishes.
or even a smartphone uses wireless communications Additionally, there may be security reasons for limiting
(often called Wi-Fi) to send and receive data to and from traffic flow between networks; or allowing data destined for
a wireless access point (also called a wireless router). one network to traverse other networks simply may generate
This access point is usually connected to a wired LAN too much network traffic. The switches that connect LANs
and basically serves as the “bridge” between the wire- can help manage these types of services as well. For exam-
less user device and the wired network. As you’ll see in ple, the switch can filter out traffic not intended for the
later chapters, there are different data communication neighboring network, thus minimizing the overall amount
protocols for wireless and wired LANs. While the flexi- of traffic flow. This process of separating network traffic
bility of not having to physically cable your device to a is called segmentation. Figure 1-6 provides an example
wall jack is nice, you’ll see there are also limitations as of two LANs connected by two switches.
Modem
Router
Route
Modems
Internet
High-speed Router
line
Internet Service Provider
Figure 1-5 A computer sending data over a DSL line to an Internet service provider
and onto the Internet
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-3: Common Network Examples 9
LAN A
Switch 1
Switch 2
LAN B
For a more precise view, examine Figure 1-7. When a user The three sample networks you just viewed—a desktop
talks into their smartphone, sends a text message or email, computer connected to the Internet via a wired LAN, a
or interacts with a website, the data is transmitted across laptop computer connected to the Internet via a wireless
the cellular network to a telephone company building. The LAN, and a cellular network—are only a few of the many
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
10 Chapter 1 Introduction to Data Communications and Computer Networks
Smartphone
Land-based
telephone line
Telephone
company
Wireless
transmission
tower
examples of communication networks. Others that you in the traffic signal control box at the side of the road.
will examine in more detail in later chapters include If this traffic signal control box is connected to a
sensor networks, business mainframe networks, satellite larger traffic control system, the sensor is connected
networks, and cloud networks. to a LAN.
Robot arm
Wiring to
LAN Sensors
Wiring to
LAN
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-3: Common Network Examples 11
Finally, don’t forget all the sensor systems in people’s results from the mainframe. Because the terminal does not
homes and vehicles. Home appliances, such as washing possess a lot of computing power, it’s considered “dumb”
machines, dryers, and dishwashers, include sensors and relies on the mainframe computer to control the
to monitor water and air temperatures as well as water sending and receiving of data to and from each terminal.
levels. Modern vehicles contain a myriad of sensors, This requires special types of protocols.
monitoring fuel mixtures, oxygen levels, proximity
Business mainframe networks are still being used for
detection, and wheel rotations (to trigger anti-lock
inquiry/response applications, interactive applications,
brakes and anti-skid controls). Sensors and controllers
and data-entry applications. One example is the system
have also been added to appliances such as refrigera-
that your bank might use to record ATM transactions
tors and thermostats so users can control these devices
from thousands of locations, as seen in Figure 1-9.
remotely through apps on their smartphones or through
smart speakers. These speaker devices provide voice
interaction with a digital assistant, such as Siri, Alexa, or Satellite Networks
Google. Smart appliances and other smart devices are
part of the IoT (Internet of Things). While there is some Satellite networks are continuously evolving technologies
debate on exactly what is included in the IoT, this text- used in a variety of applications. If the distance between
book will refer to IoT specifically as devices that would two networks is great and running a wire between them
not normally be considered computing devices (like would be difficult, if not impossible, satellite transmission
kitchen appliances or door locks) but are connected to systems can be an effective way to connect the two net-
the Internet to allow for remote and/or voice activated works or computer systems. Examples of these applica-
control. tions include digital satellite TV, meteorology, intelligence
operations, mobile maritime telephony, GPS navigation
systems, worldwide mobile telephone systems, and video
Business Mainframe Network conferencing. Figure 1-10 shows a diagram of a typical
Another fairly common network system is the business satellite system. You will examine these networks in more
mainframe network. Many businesses still use mainframe detail in Chapter 10.
computers to support their day-to-day operations. To
“connect” to a mainframe, a user employs hardware and
software that makes their computer act as a computer
Cloud Networks
terminal. A computer terminal, or terminal, consists of Cloud networks connect resources that are said to
essentially a keyboard and screen with no large hard reside “in the cloud.” In reality, the cloud is essentially
drives, no gigabytes of memory, and little, if any, processing remote access to virtualized resources hosted in a
power. Computer terminals are used for entering data into a software-defined environment. Let’s break this down
system, such as a mainframe computer, and then displaying a little. Virtualization means that software is used
Computer
terminal
Cable connecting
to mainframe
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
12 Chapter 1 Introduction to Data Communications and Computer Networks
Satellite
Home
Television Business
company Satellite
dish
Homes
to replicate the functions of hardware. For example, A cloud network relies on a similar type of virtualiza-
suppose you have a Windows computer like the one tion. A cloud hypervisor runs on top of a large collection
in Figure 1-11. You install virtualization software called of datacenter hardware, such as servers, routers,
a hypervisor on the Windows computer, and then you switches, and other devices. However, none of those
create a virtual machine (VM) in the hypervisor that physical devices are accessed directly by the cloud
functions as its own computer in a virtual environment. customer. The hypervisor abstracts the cloud network
It needs its own OS (operating system), like Windows, or functions away from the physical devices so the cus-
you can install a different OS, such as Linux. Figure 1-11 tomer only interacts with virtual resources, such as a vir-
shows a Linux VM on the right where it’s running on tual server. The cloud customer can create a new server
the Windows host computer. The hypervisor makes the VM, a process which is called “spinning up” a VM. From
Linux VM think it’s the only computer running on the the customer’s perspective, they’re creating a new server
available hardware. The hypervisor allocates hardware that might run Linux or Windows or some other operat-
resources to both the Linux VM and the Windows host. ing system. But the server is not an actual computer in
Hypervisor
Virtual
machine
running a
Source: Oracle Corporation
different OS
Source: Canonical Ltd.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-3: Common Network Examples 13
a rack—it’s a virtual machine running in the hypervisor. ❯❯Protocols define the rules used by devices to
The cloud network can run many other virtualized communicate with each other over a network.
resources in the hypervisor, such as routing services
❯❯Routers and switches can be used to connect
or file storage services. You’ll learn more about these
devices across multiple LANs or segment traffic for
service types later in this chapter.
security or traffic management purposes.
Three primary types of cloud computing are as follows:
❯❯Smartphones often rely on cellular networks to
❯❯Public cloud—These virtualized resources are
connect to the Internet and to provide calling and
hosted by a CSP (cloud service provider) at a
texting services.
remote location. While access control restrictions
can protect these resources from unauthorized ❯❯Other kinds of networks include sensor networks,
access, the hosting services can be used by anyone. wireless networks that use satellite technologies,
For example, you might have files saved in a cloud and cloud networks that rely on virtualization.
storage service and only you can access them.
However, thousands of other customers might
use the same cloud storage service, and their files Self-check
might be stored on the same physical server where
5. What kind of protocols support addressing and
your files are stored. communication over the Internet?
❯❯Private cloud—These virtualized resources are a. DSL
hosted by the owner of the resources either in b. TCP/IP
its own datacenter or at a remote location. The c. LAN
resources and the hosting services can only be
d. PC
accessed by the owner.
6. You’re setting up a small office network with a
❯❯Hybrid cloud—In a hybrid cloud, virtualized few desktop computers and a file server. You
resources at a remote location and physical or vir- want to make sure only certain network users
tual resources in the local datacenter are connected have access to the file server. What device
and interact at a functional level that is invisible will you need to configure to segment the
to users. For example, you might sign into your network?
computer at your desk, you open an application, a. Switch
and then you create and save a file. However, the b. Cell phone tower
application might be running on a server in your c. Mainframe
company’s datacenter, and the file might be stored
d. Router
on a cloud-based server.
7. Your school hosts its own cloud to pro-
Cloud resources are collectively referred to as cloud vide students with virtual desktops. These
computing, as you read earlier in this chapter. You’ll desktops give students access to expensive
learn more about cloud computing throughout this software that most students couldn’t afford
textbook. to purchase on their own. Your school also
stores student files in a cloud service that
requires an Internet connection for students
Remember this… to access their files, even when they’re on
campus. What kind of cloud architecture is
❯❯Many kinds of networks exist, depending on the
your school using?
connection technologies used, the types of commu-
a. Public
nications the network supports, and the kinds of
b. Enterprise
devices connected to the network.
c. Hybrid
❯❯A client/server system provides client computers
d. Private
with a variety of services, such as a database, a
web page, email, files, or printing. Check your answers at the end of this chapter.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
14 Chapter 1 Introduction to Data Communications and Computer Networks
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-4: Network Architectures 15
The number of layers in the suite is not static. In fact, A common network application is email. An email com-
some books present the TCP/IP protocol suite as four munication that sends and accepts the message, “Blake,
layers, while others present it as five. Even then, differ- how about lunch? Najma,” has many steps. Let’s look at a
ent sources use different names for each of the layers. simple analogy, as illustrated in Figure 1-13, to understand
This textbook defines five layers, as shown in Figure 1-12: how the layers of the TCP/IP protocol suite work together
application, transport, network, data link, and physical. to support this email message. Think of each layer of the
TCP/IP suite as a worker. Each worker has its own job
Note that the layers do not specify precise protocols
function, and Figure 1-13 shows how these workers coop-
or exact services. In other words, the TCP/IP protocol
erate to create a single package for transmission. Using
suite does not tell you, for example, what kind of wire or
the TCP/IP protocol suite, the steps might look like the
what kind of connector to use to connect the devices of
following:
a network. That choice is left to the designer or imple-
menter of the system. Instead, the suite simply says that ❯❯The email “application worker” prompts the user to
if you specify a type of wire or a specific connector, you enter a message and specify an intended receiver. The
do that in a particular layer. In addition, each layer of application worker would create the appropriate data
the TCP/IP protocol suite provides a service for the next package with message contents and addresses, and
layer. For example, the transport layer makes sure the send it to a “transport worker,” who is responsible for
data received at the very end of a transmission is exactly providing overall transport integrity.
the same as the data originally transmitted, but it relies
❯❯The transport worker might establish a connection
upon the network layer to find the best path for the data
with the intended receiver, monitor the flow
to take from one point to the next within the network.
between sender and receiver, and perform the
With each layer performing its designated function, the
necessary operations to recover lost data in case
layers work together to allow an application to send its
data over a network of computers. some data disappears or becomes unreadable.
❯❯The network worker would then take the data
package from the transport worker and might add
Application routing information so that the data package can
Transport find its way through the network.
❯❯Next to get the data package would be the data link
Network
worker, who would insert error-checking informa-
Data link tion and prepare the data package for transmission.
Message
with
Message
transport
information
Application Transport
User worker worker
Figure 1-13 Several kinds of workers perform their job duties at each layer in the model
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
16 Chapter 1 Introduction to Data Communications and Computer Networks
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-4: Network Architectures 17
layer performs its operations at every stop (node) along both this architecture and the OSI model. Many books
the path. This is also the last layer before the data is and articles, when describing a product or a protocol,
handed off for transmission across the medium. often refer to the OSI model with a statement such as,
“This product is compliant with OSI layer x.” If you do
not become familiar with the various layers of the OSI
All Things Considered model and the TCP/IP protocol suite, you will struggle to
understand more advanced concepts in the future.
Thought Experiment
The OSI model defines seven layers, as shown in
If the data link layer provides error checking and
Figure 1-14. Note further the relationship between the
the transport layer provides error checking, isn’t this
five layers of the TCP/IP protocol suite and the seven
redundant? Why or why not? Explain your answer.
layers of the OSI model. As you examine descriptions of
each of the OSI layers next, consider how their functions
Physical Layer compare to the corresponding TCP/IP layer:
The bottom-most layer in the TCP/IP protocol suite ❯❯The top layer in the OSI model is the application
(according to the layers as defined in this discussion) layer, which provides protocols to support applica-
is the physical layer. The physical layer is where the tions using the network. Notice again that these pro-
actual transmission of data occurs. As noted earlier, this tocols provide a support function—they are not the
transmission can be over a physical wire, or it can be applications themselves, which do not reside on the
a radio signal transmitted through the air. To perform network model. This OSI layer is similar to the appli-
this transmission of bits, the physical layer handles cation layer in the TCP/IP protocol suite.
voltage levels, plug and connector dimensions, pin con-
❯❯The next layer in the OSI model, the presentation
figurations, and other electrical and mechanical issues.
layer, performs a series of miscellaneous functions
Furthermore, because the digital or analog data is
necessary for presenting the data package properly
encoded or modulated onto a digital or analog signal at
to the sender or receiver. For example, the pre-
this point in the process, the physical layer also deter-
mines the encoding or modulation technique to be used sentation layer might perform ASCII-to-non-ASCII
in the network. Note that some people combine the data character conversions, encryption and decryption
link layer and physical layer into one layer. of secure documents, and the compression of data
into smaller units. There is no separate presentation
Having distinctly defined layers enables you to “pull out” layer in the TCP/IP protocol suite, as these functions
a technology used at one layer and insert an equivalent are wrapped into the TCP/IP application layer.
technology into that layer without affecting the other
layers. For example, assume a network was designed for ❯❯The session layer is another layer that does not
copper-based wire. Later, the system owners decide to exist separately in the TCP/IP protocol suite and
replace the copper-based wire with fiber-optic cable. is responsible for establishing sessions between
Even though a change is being made at the physical layer, users. It also can support token management, a
it should not be necessary to make any changes at any service that controls which user’s computer talks
other layers. In reality, however, a few relationships exist during the current session by passing a software
between the layers of a communication system that cannot
be ignored. For example, if the physical organization of a
LAN is changed (say from a wired network to a wireless net- OSI model TCP/IP protocol suite
work), it is likely that the frame description at the data link Application
Presentation Application
layer also will need to be changed. (You will examine this
phenomenon in Chapter 4.) The TCP/IP protocol suite rec- Session
ognizes these relationships and merges many of the ser- Transport Transport
vices of the physical and data link layers into one layer. Network Network
Data Link Data link
Although the TCP/IP protocol suite is the model of choice Figure 1-14 The seven layers of the OSI model
for almost all installed networks, it is important to study compared to the five layers of the TCP/IP protocol suite
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
18 Chapter 1 Introduction to Data Communications and Computer Networks
Logical and Physical Figure 1-16 shows how this communication relies on
layers of people and technology to send messages back
Connections and forth during the negotiation.
An important concept to understand with regard to the
Note that the data did not flow directly between you
layers of a communication model is the lines of com-
and the homeowner; nor are the real estate agents
munication between a sender and a receiver. Consider
likely to see each other face-to-face for the majority of
Figure 1-15, which shows the sender and receiver using
these communications. Instead, the data had to flow
a network application designed on the TCP/IP protocol
down to the physical layer (in this case, the agents’
suite.
smartphones) and then back up the other side. At
Notice the dashed lines between the sender’s and receiv- each layer in the process, information that might be
er’s application layers, transport layers, network layers, useful to the “peer” layer on the other side was added
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-4: Network Architectures 19
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
20 Chapter 1 Introduction to Data Communications and Computer Networks
User
Web browser application
Get web page
Transport layer
TCP Get Local router
header web page
Network layer
Network layer
IP TCP Get
IP TCP Get header header web page
header header web page
Get
web page Web
page
Transport layer
TCP Get
Remote router header web page
Remote LAN
Figure 1-17 Path of a web page request as it flows from browser to Internet web server and back
It is interesting to note that, as a packet of data flows down error control, flow control, and network addressing. The
through a model and passes through each layer of the sys- addition of control information to a packet as it moves
tem, the data packet grows in size. This growth is attribut- through the layers is called encapsulation. Note also that,
able to the fact that each layer adds more information to as the packet moves up through the layers, the data packet
the original data. Some of this layer-added information is shrinks in size as each layer removes the header it needs
needed by the nodes in the data packet’s path, and some is to perform its job. Once the job is complete, the header
required by the data packet’s final destination. This infor- information is discarded and the smaller packet is handed
mation aids in providing services such as error detection, to the next highest layer.
Network models, like communications protocols, com- revised and improved. An Internet standard is a tested
puter hardware, and application software, continue to specification that is both useful and adhered to by users
evolve daily. The TCP/IP protocol suite is a good example who work with the Internet. Consider the path a proposal
of a large set of protocols and standards constantly being must follow on the way to becoming an Internet standard.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-4: Network Architectures 21
All Internet standards start as an Internet draft, which is a pre- ❯❯ Associated with ISOC is the IAB (Internet Architecture
liminary work in progress. One or more internal Internet com- Board), which is the technical advisor to ISOC. Under
mittees work on a draft, improving it until it is in an acceptable the IAB are two major committees:
form. When Internet authorities feel the draft is ready for the
❯ The IETF (Internet Engineering Task Force) man-
public, it is published as an RFC (Request for Comment), a
ages the working groups that create and support
document open to all interested parties. The RFC is assigned
functions such as Internet protocols, security, user
a number, and it enters its first phase: proposed standard. A
services, operations, routing, and network
proposed standard is a proposal that is stable, of interest to
management.
the Internet community, and fairly well understood. The spec-
ification is tested and implemented by different groups, and ❯ The IRTF (Internet Research Task Force) manages the
the results are published. If the proposal passes at least two working groups that focus on the long-range goals
independent and interoperable implementations, the pro- of the Internet, such as architecture, technology,
posed standard is elevated to draft standard. If, after feedback applications, and protocols.
from test implementations is considered, the draft standard
experiences no further problems, the proposal is finally ele- Internet committees are not the only groups that create pro-
vated to Internet standard. tocols or approve standards for computer networks, data
If, however, the proposed standard is deemed inappropriate communications, and telecommunications. Another organi-
at any point along the way, it becomes an historic RFC and zation that creates and approves network standards is the
is kept for historical perspective. (Internet standards that ISO (International Organization for Standardization),
are replaced or superseded also become historic.) An RFC which is a multinational group composed of volunteers from
also can be categorized as experimental or informational. In the standards-making committees of various governments
these cases, the RFC in question probably was not meant to throughout the world. ISO is involved in developing stan-
be an Internet standard, but it was created either for experi- dards in the field of information technology and created the
mental reasons or to provide information. Figure 1-18 shows OSI (Open Systems Interconnection) model for a network
the levels of progression for an RFC. architecture.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
22 Chapter 1 Introduction to Data Communications and Computer Networks
❯❯IEEE (Institute of Electrical and Electronics electronics, and radio. Of particular interest is the
Engineers)—The largest professional engineering work IEEE has performed on standardizing local area
society in the world, IEEE strives to promote the networks.
standardization of the fields of electrical engineering,
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-5: Cloud Computing 23
To begin, you need a solid understanding of what advertising campaign. With traditional computing,
characteristics define cloud computing and distinguish you would have to purchase additional servers
these technologies from more traditional options. NIST many months ahead of time, and then spend hours
(National Institute of Standards and Technology) and installing and configuring the servers in preparation
similar organizations refer to the following characteris- for a temporary traffic spike. After the campaign,
tics to differentiate cloud computing from other types of the servers would no longer be needed, thereby
IT resources: wasting a lot of money. Elastic cloud resources can
❯❯Scalability refers to the ability of resources to be be temporarily increased only for the few days you
adjusted over time in response to changing needs. need them, and then decreased as the traffic
Scalable resources can be increased or decreased volume declines.
either vertically or horizontally. For example, sup- ❯❯Pay-as-you-go means the customer only pays for
pose a new doctor’s office buys one server to hold the resources they use. For example, when the
their patient database. As their customer base customer no longer needs extra servers to handle
grows, the database will continue to increase in increased traffic from the weekend advertising
size. Figure 1-19 illustrates two options for how to campaign, those extra servers are terminated and
handle the growing demand. Vertical scaling would no longer accrue charges. The cloud customer
add more resources to the server, such as storage does not have to pay for resources they’re not
and memory, to increase its capacity, while hori- using.
zontal scaling would add more servers to help host
❯❯Self-service resources can be increased, decreased,
the database. With physical servers, this scaling
or otherwise altered by the customer without hav-
up or scaling out is time-consuming and costly;
ing to involve the cloud service provider. In many
cloud services are designed with scalability as a
cases, the customer can configure these processes
primary feature that can be performed quickly and
to happen automatically.
even automatically, with little to no interruption in
service. ❯❯Broad network access refers to a customer’s
ability to access and configure cloud resources
❯❯Elasticity means that resources can be increased or
from any Internet-connected computer. In other
decreased quickly in response to changing needs,
words, a technician or administrator does not
and in many cases, these shifts can be configured
have to be onsite at the cloud datacenter to make
to occur automatically. Suppose you anticipate a
changes to their company’s cloud resources. A
huge increase in website traffic during a weekend
company’s IT team can access and control their
cloud resources from home, from the company’s
own location, or from anywhere else where they
have Internet access.
Scale up
Note
Access to a customer’s cloud console can be restricted
to one or more specific locations based on IP address.
However, this is a security measure, not a limitation of
cloud capabilities.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
24 Chapter 1 Introduction to Data Communications and Computer Networks
(“six nines”). For example, if a service is down (SPOFs), such as a network connection or a server,
for less than 5.26 minutes per year, that service are duplicated. If one of these resources goes
is said to have 99.999%, or five nines, availability. down, the other can take over and keep the system
HA is achieved by providing redundancy within a functioning.
system, which means that single points of failure
Note
Various cloud services and ISPs offer three nines, four nines, five nines, or better availability, depending on what’s
defined in their SLAs (Service-Level Agreements), which is a legally binding contract or part of a contract that defines
certain aspects of a service. When shopping for cloud services, examine the SLA carefully so you’ll know what parts of a
service are guaranteed to be available.
However, be aware there’s a difference between availability (the ability to access a resource) and durability (the
resource’s ongoing existence). For example, AWS lists its storage service, S3, at 99.999999999% durability (that’s 11
nines!), but S3’s availability is 99.99% for its Standard storage class. Why the discrepancy?
That 11 nines durability means you could store 10,000,000 objects in S3 and expect to lose one of those objects every
10,000 years on average (okay, not bad). This is because S3 stores each object on multiple devices in multiple, physical
datacenters. The four nines availability means that, each year on average, there should only be 52.6 minutes when you
can’t get to your objects in S3—this is also pretty good, considering you can relax in knowing that your stored data isn’t
lost during that 52 minutes, even if you can’t get to it for a bit.
Similar terms include reliability, which refers to how well a resource functions without errors, and resiliency, which
refers to a resource’s ability to recover from errors even if it becomes unavailable during the outage.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-5: Cloud Computing 25
❯❯IaaS (Infrastructure-as-a-Service), pronounced i-as, The progression of these categories reveals the fact that
requires the most technical skill for configuring cloud customers and cloud providers each take part of
cloud resources. While the customer cannot access the responsibility for managing and configuring cloud
the underlying hardware, IaaS allows the cloud cus- resources. As you can see in Figure 1-22, the placement
tomer to perform deep configurations to the cloud of that dividing line determining who is responsible for
environment where they can most closely replicate what varies with the type of cloud service. In fact, this is
a physical datacenter in the cloud, complete one of the points that must be carefully studied and under-
stood by cloud professionals for each service they use. It’s
with virtual servers, firewalls, routers, and load
important for cloud customers to know and consider what
balancers.
kinds of management tasks they must perform on their
Notice that each of these categories varies on the type cloud services, what security precautions they must take,
of person who would use a solution from that category. and what kinds of customization changes they can make.
Figure 1-20 shows how each of these service models This reality is complicated by the fact that each cloud
varies in the type of user the service is targeted to, and service provider handles the division of labor a little differ-
Figure 1-21 shows the different levels of technical skill ently. For this reason, cloud professionals often specialize
required for each service model. in one or a handful of cloud providers and service types.
SaaS Users
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Another random document with
no related content on Scribd:
“Trevor has a good deal on his hands,” she reminded herself
however, “and of course he will know it does not matter if he misses
one dance with me. We have two still—one other waltz.”
So the face was still sweet and unruffled, the eyes guiltless of
reproach, when, at the very end of the waltz—when the last notes of
the inviting Zuleika were dying away—the laggard partner made his
appearance. He looked flushed and discomposed, and evidently
conscious that he deserved a scolding.
“I am so sorry, so very sorry,” he began. “I was coming here to
look for you, but I hadn’t got rid of my last partner, and the music
began before I expected, and we found ourselves regularly hemmed
in. We took a turn to get clear, and then I had to get Ge—, my
partner, an ice, and now it is too late!”
“Never mind,” said Cicely brightly. “What does it matter? I have
kept two others for you.”
Trevor looked at her with a curious mixture of expressions in his
face. “My dear old Cit,” he said, reverting to a pet name of long ago,
“you are awfully sweet-tempered.” Then a frown gathered over his
face. Whose soft voice had whispered in his ear a minute before?
—“Do not please tell my cousin you were just now dancing with me.
It might—it might vex her. She thinks sometimes I forget too much I
am but a stranger. I would not that she should think I knew this was
the waltz you should dance with her.”
Cicely did not see the frown. She only heard the pleasant words.
“Am I?” she said. “I don’t know that it is true, but any way I like you to
think so. By the bye, how is Geneviève getting on? I have not seen
her for ever so long.”
“Oh! she’s all right. She’s had any number of partners,” replied Mr.
Fawcett hastily, as he ran off to fulfil his next engagement—this time
probably with some less long-suffering damsel than Miss Methvyn. In
the doorway he almost knocked over a small man, quietly making his
way in. “I beg your pardon,” he exclaimed. “Ah! Hayle, is it you? Why
are you so late?”
“I could not come earlier,” replied Mr. Hayle. “Is Miss Methvyn
here?”
“Yes, in the little drawing-room,” said Trevor, as he disappeared.
Mr. Hayle peered about till he caught sight of Cicely.
“How late you are, Mr. Hayle!” she exclaimed. “I suppose you
don’t care about balls though.”
“Not much. I have hardly any experience of them. But I could not
come earlier to-night. I have been at Notcotts till half an hour ago,”
he answered.
“Is anything wrong there?”
“No,—this is the evening I have fixed for my class there. That is
what I wanted to ask you about. We are rather at a loss for some
books. Would you mind letting me look over again some of those you
offered me before?”
“Certainly,” said Cicely, “you can have any of them you like.”
Then Mr. Hayle proceeded to relate to her, as he had got into the
habit of doing, the small chronicle of his difficulties, hopes, and fears.
Cicely listened with interest—she had found it quite possible to like
and respect the boy-faced clergyman, and there was plenty of
common ground on which they could meet without jarring. But half
an hour before, she could not have listened without impatience to the
history of the Notcott’s night-school, the shortcomings of the choir,
the ever-increasing necessity for the renovation of Lingthurst church.
Whence had the sunshine come again? Trevor had called her his
“dear old Cit; it was all nonsense and fancy” about his being
changed.
Mr. Hayle did not dance, but he escorted Miss Methvyn in to
supper instead. Then he had to resign his charge to the partner to
whom she was engaged for the next dance.
It happened to be Mr. Dangerfield. The poor young man could talk
of nothing but Geneviève.
“She’s so awfully pretty,” he said. “What a pity she can’t speak
English. I didn’t know she was your cousin till just now, when one of
the officers from Haverstock asked me if I couldn’t get him an
introduction to Miss Methvyn; and being such old friends, of course I
said yes. And we were steering away towards you, you know, when
he holla’ed out to me to stop, and I found out it was your cousin he
meant. He said the Miss Methvyn who was engaged to Fawcett, so
of course I thought it was all right. She—your cousin I mean—was
dancing with Fawcett at the time, so Captain Burnett had made the
mistake. Fawcett put it all right, but I couldn’t catch your cousin’s
name—Castle, isn’t it? only that doesn’t sound like a French name.”
“Casalis,” corrected Cicely, smiling. She had known young
Dangerfield all her life, and had rather liked him for his unaffected
good nature, and been tolerant of his matter of-fact prosiness. This
evening however, long before her dance with him was over, she
began to think he must surely have grown heavier and more stupid
than of old. Could he find nothing else to talk about than Geneviève
and that absurd mistake of Captain Burnett’s?
But even the slowest of dances “wears through” at last. Cicely’s
next engagement was to one of the aforesaid officers from
Haverstock—a quiet man—who danced little but talked sensibly, and
did not seem, like every one else this evening, to have had his head
turned by Miss Casalis. And when his dance was over, Cicely began
to feel tired in earnest. She sat down in the corner where she had
been before, resolving not to dance any more—“at least,” she said to
herself, “not unless Trevor very much wants to make up for the waltz
we missed. I wonder what has become of him? I did not see him
dancing the last at all. And Geneviève? She is engaged to Fred
Dangerfield again for this one, I think he told me. No, there he is,
talking to Miss Falconer. Where can Geneviève be?”
Her speculations were interrupted by Mr. Hayle, who, with great
satisfaction, had spied her out again in her retreat.
“I don’t think I remembered to ask you how Colonel Methvyn is,”
he began, as he came up to her.
“Not very well, thank you,” said Cicely, “indeed, I was not much
inclined to leave him to come here to-night—but—I hardly liked to
stay away. My cousin has had very little amusement since she has
been with us. I came greatly on her account.”
“Then you yourself don’t care for balls and dancing?” said Mr.
Hayle eagerly.
Cicely smiled. “Oh! yes I do,” she answered. “When I am light-
hearted about other things, I enjoy them very much.”
Mr. Hayle made no reply.
“Have you seen my cousin lately?” Cicely went on, “I can’t think
what has become of her.”
“If you mean Miss Casalis, I saw her just now with Mr. Fawcett. I
think they were going to dance,” said Mr. Hayle.
“Oh!” said Cicely, and then relapsed into silence.
“Don’t you think it is rather too hot here,” said Mr. Hayle, “would
you not like to find a seat where there is a little more air?”
“It is hot,” said Cicely, rising as she spoke; “yes, I think I should
like to go into one of the other rooms. I want to find Geneviève—it
must be getting late. Will you take me, Mr. Hayle?” she added with a
smile.
They made a little tour of the rooms; dancing in the ball-room was
still going on vigorously, but no Geneviève, no Trevor, were to be
seen.
“I dare say they are in the supper-room,” said Mr. Hayle. “I saw
several people there still, a few minutes ago. Suppose we look for a
nice cool place in the conservatory, Miss Methvyn; this way—ah!
yes, over there among the ferns there is a charming corner. Now, if
you will stay here, I will get you an ice and look for Miss Casalis on
the way.”
The poor little man seemed quite pleased to find himself of use.
Cicely thanked him and established herself comfortably in the nook
he had discovered. It was at the further end of the fernery, into which
opened the great dining-room, to-night metamorphosed into a ball-
room. Cicely looked round her admiringly. She had always coveted
the Lingthurst fernery; in the hottest summer day it seemed cool and
fresh—there were greens of every shade to rest the eye, an
incessant, soothing murmur of trickling water to please the ear; and
to-night the soft lights of the many-coloured lamps, hung here and
there among the climbing plants which hid the walls, made the whole
into a veritable fairy-land.
Cicely leant her head back and shut her eyes. “The music sounds
far nicer here than in the ball-room,” she said to herself; “it is almost
too loud in there. I shall go to sleep if Mr. Hayle doesn’t come soon. I
don’t want an ice in the least, but it would have been a shame to
refuse it; he was so pleased with the idea. Ah, there he is!”
Steps were approaching her, but they were not Mr. Hayle’s.
Where she sat, some great stands of tall tropical ferns concealed her
from the view of any one coming to wards her; but not realising this,
it never occurred to her to move when first the sound of voices fell
upon her ear. Well known, familiar voices they proved to be, but the
words they uttered deprived the girl for the moment of all power or
vitality.
“I tell you I will do anything—anything to make you believe me—
anything to free myself from this horrible hypocrisy. I can stand it no
longer. The words were spoken low, but with a sort of suppressed
fierceness; the voice was Trevor’s. Then came a sound of half-
smothered weeping, some broken reply of which Cicely could not
catch the meaning—then Trevor’s voice again.
“Not care for you? Good God! what will you say next? I wish I did
not care for you. I wish we had never seen each other. Not care for
you, you say, when I am breaking my word for you, trampling my
honour under foot! I only hope that is the worst of what I am doing,
Geneviève. I only hope what you tell me is true, that in her heart of
hearts Cicely does not care for me except as a brother. If I thought
otherwise! No, even for you, Geneviève, I could not do it.”
“But it is true—it is, it is,” broke in the girl’s voice. “I know it is, I
have always known it. She does not care as I do—oh, no! Trevor, I
shall die if I have to lose you.”
“Hush,” said Trevor, “there is some one behind us. Come this
way.”
He led her close to where Cicely was sitting, then through a small
doorway in the wall leading into a passage used by the gardeners;
as the two passed her, the skirt of Geneviève’s dress almost brushed
against Cicely’s, but thanks to the subdued light and to their own
absorption, she remained unperceived.
She had sat perfectly still—motionless, as if suddenly turned into
stone. It had required no effort on her part to remain so, for now
even that they were gone—out of sight and hearing—she moved not
so much as a muscle of her whole body; afterwards, on looking
back, it seemed to herself that she had almost for a time ceased to
breathe. She was stunned into a species of unconsciousness, and
how long she might have remained thus it would be impossible to
say, had not Mr. Hayle made his appearance with the ice he had
gone in search of.
“Here is the ice. I had to wait some time—” he was beginning, but
broke off in alarm. “What is the matter?” he exclaimed, “you look so
dreadfully pale, Miss Methvyn.”
“I have got a chill, I think,” said Cicely shivering, and attempting to
smile. She was surprised to find that she could speak; for the last
few minutes a sort of dreamy, almost pleasant feeling of death, or
dying, had been stealing over her. Now she awoke to a faint
consciousness of pain; like the unfortunate traveller in the Alps, who
beseeches to be allowed to sleep, even though the sleep should be
unto death, she shrank from coming to life again. “I have got a little
chill, I think,” she repeated. “I should just like to stay here quietly.”
She leant her head back again among the graceful nestling ferns
—their delicate fronds caressing her colourless cheeks and brushing
the coils of her bright fair hair; she closed her eyes, and for a
moment Mr. Hayle thought she had fainted. Perhaps in a sense she
had—at least she was conscious of nothing more till he was again
beside her, this time with a glass of wine.
“Drink this, Miss Methvyn,” he said.
“No, thank you,” she replied, turning her head away.
“But you really must,” he insisted. “The sort of chill you have had
may make you ill if you don’t take this. Think how frightened Mrs.
Methvyn will be if you go home looking like a ghost.”
Mr. Hayle was not wanting in discrimination and common sense.
He had met Mr. Fawcett and Miss Casalis on his way to fetch the ice;
he was not without a shrewd suspicion as to the nature of the “chill”
which the girl beside him had received. His mention of her mother
roused Cicely a little. She took the glass and drank some of the
wine.
“Thank you very much,” she said to her companion. “I am all right
again now. Must we go back to the drawing-room? Oh! I do so want
to go home,” she exclaimed wearily. “It is late now, is it not? I wonder
if Geneviève—”
“Would you like me to find out if Miss Casalis is ready to go now?”
interrupted Mr. Hayle.
“Yes please, I wish you would,” said Cicely. The mention of her
cousin’s name had driven back from her cheeks such faint colour as
had begun to return to them. Mr. Hayle’s suspicions were confirmed.
“Do I look very dilapidated?” continued Cicely, smiling and
smoothing back the ruffled hair from her temples. “I should not like
Lady Frederica to think I was ill. I have felt very dull and tired all the
evening. You know my father has not been well; we have been
anxious about him, and anxiety is very tiring.”
“Yes,” said Mr. Hayle, “nothing more so. You need not go back to
the drawing room, Miss Methvyn. We can go round by the passage
behind the dining-room, and you can wait in the study while I find
your cousin.”
He was turning towards the door through which Trevor and
Geneviève had disappeared.
“Not that way,” exclaimed Cicely sharply.
Mr. Hayle glanced at her. “It is much better than having to go
through the ball room,” he said composedly. Cicely made no further
objections.
The next quarter of an hour was a dream to her. She sat in Sir
Thomas’s little study waiting for Geneviève for about ten minutes,
clearly conscious of one sensation only an unspeakable horror of
meeting Trevor Fawcett face to face and alone. But this she was
spared. How Mr. Hayle managed it she never knew; but in a few
minutes he reappeared with Geneviève alone.
Then Cicely remembered a vision of Parker and wraps, a hasty
progress across the hall, still escorted by the young clergyman, a
glimpse through open doors of the still crowded drawing-rooms, a
sound of music in the distance—then she seemed to awake to find
herself in the carriage, with Parker’s anxious face opposite, dimly
discernible in the uncertain light of the flickering lamps, with some
one else beside her; some one whose face she dreaded to see,
whose voice she shrank from hearing.
But all the way home Geneviève never spoke.
CHAPTER II.
AFTER THE BALL.
IT was a very dark night. The full moon, whose services had been
reckoned upon to light the guests to and from the Lingthurst ball,
was not in an obliging humour. She had gone to bed again in the
clouds so early, and the curtains behind which she had hidden
herself were so thick, that, for all the use she had been of, she might
as well not have risen at all. It was so dark that the cautious old
Greystone coachman thought it necessary to drive extra slowly; it
seemed to Cicely that hours, if not whole days, or nights rather, had
passed, when at last they turned in at the Abbey gates.
Not that she cared. She was not eager to be home now—what
comfort could meet her there?—anywhere? What was anything in
life to her now? What was life itself? A horrible mockery, a delusion,
a sham from beginning to end. There was no goodness, no loyalty,
no truth. All these things she had once—long ago it seemed already
—believed in so firmly, that till now she had never realised how
largely such faith had formed a part of her existence, or how frightful
could be the results of its destruction. Already she had tasted the
bitterest drop of the bitter cup; she had been deceived by her
nearest and dearest—by the one of all the world who should have
been true to her.
“If even he had trusted me,” she moaned, “if he had come and
told me all, I could have borne it. I am not beautiful as she is, I could
have forgiven him; I could have believed that this new love had come
upon him unawares, and that he had fought against it. If he had
trusted me!”
To Geneviève, to her share in the whole, Cicely, in this first chaos
of misery and indignation somehow hardly gave a thought. She
shrank from her, it is true. She was thankful that Geneviève’s silence
prevented the necessity of addressing her, but whatever Geneviève
had done, however great her portion of responsibility, she was only
Geneviève—a new-comer, a comparative stranger. False-hearted,
scheming, unscrupulous she might be—in a sense it did not seem to
matter; for her conduct there was at least the possibility of the
excuse of ignorance and inexperience,—there was not the
aggravation of a broken vow, of life-long affection trampled under
foot.
Over and over again during the three quarters of an hour’s drive
from Lingthurst these bitter thoughts chased each other round
Cicely’s excited brain. The practical results of her discovery, the
explanation she must come to with Trevor, what she must say to her
parents, how they would look upon Geneviève—all these points she
as yet forgot to consider. Extreme misery makes even the best of us
selfish for the time. In Cicely’s nature there was no lack of
magnanimity, but the first instinct of the victim is not to heap coals of
fire upon the head of him whose hand has dealt the cruel blow.
Forgiveness, sincere and generous, would come in due time; but not
yet. It was no small injury which Cicely Methvyn had received; that it
would leave a life-long scar there could be no doubt: would the
wound ever heal? was the question at present. Could the faith, once
shattered so cruelly, ever again be made whole?
“If I live to be a hundred I can never endure greater suffering than
that of this evening,” thought Cicely, as the carriage stopped at last
and the cousins got out. That her present suffering could be
increased—even, in a sense, overwhelmed by an anguish of a totally
different nature—she would have maintained to be all but
impossible. At twenty we are apt to be over hasty in declaring that
we have already drunk of misery to the very dregs.
The hall-door was opened quickly. The light streaming out into the
darkness dazzled Cicely’s eyes for the instant; she did not notice
who it was that was standing just inside, evidently awaiting her. She
was passing on, followed by Geneviève and the maid, when a slight
exclamation from the latter startled her, and almost at the same
moment the sound of her own name caused her to stop short.
“Miss Methvyn,” said a voice, which at first in her bewilderment
she failed to recognise, “Miss Methvyn, will you wait a moment.”
Cicely turned; there before her stood the man from whom but a
few hours before she had parted, as he said, for ever. What was he
doing here again? What had brought him to Greystone in the middle
of the night? Once, only once before had he been there at so
unseasonable an hour. Cicely shuddered as she recalled that once
before. He saw the shudder, even then, through the great unselfish
pity which was softening his voice and shining out of his grave eyes;
he caught the involuntary movement and groaned in his heart.
“It is hard, very hard upon me to have to break it to her,” he said
to himself. “I, that am already repulsive to her. What can I say to
soothe or comfort? Why did they not send for Mr. Fawcett?”
Cicely stood still. Her pale face had little colour to lose; but what
there was faded out of it utterly as she gazed, in but half-conscious
terror, at Mr. Guildford. Quick as lightning the thought flashed
through her mind, “I had forgotten about papa—I had actually
forgotten about papa!” Aloud she only said, in a voice that even to
herself sounded unnaturally hard and cold, “What is it, Mr. Guildford?
What is it you have to tell me. If it is—any thing wrong, why did you
not send for me before?”
“I have not been here very long,” began Mr. Guildford with a sort
of apology in his manner very new to him. “It was by Mrs. Methvyn’s
wish I waited here to see you when you first came in. We should
have sent for you at once, an hour ago that is to say, if—if it had
been any use.”
“What do you mean?” said Cicely fiercely.
Mr. Guildford glanced round him with a silent appeal. “Will no one
help me?” his look seemed to say. Parker had disappeared, but
Geneviève was still standing close behind Cicely, and to her his eyes
travelled. She understood him, but instead of responding to his
unspoken request, she covered her face with her hands, uttered a
smothered cry, and rushed away.
“Little fool,” muttered Mr. Guildford, between his teeth.
But Cicely did not seem to have observed her cousin’s
defalcation. She stood there, still in the same attitude, before Mr.
Guildford, and still there was an approach to fierceness in her tone,
as she repeated her inquiry. “What do you mean? Tell me what you
mean.”
Then the young man gathered up his courage.
“I mean,” he said slowly, speaking with an effort which he did not
attempt to conceal, “I mean that even if you had been sent for the
very moment Colonel Methvyn was taken ill, it would have been no
use. He was utterly unconscious from the first he never spoke again
—from the very commencement of the attack there was nothing
whatever to be done; not all the doctors in Europe could have
restored him to consciousness, or prolonged his life, for five minutes.
And, I think,” he added, speaking still more slowly and reluctantly, “I
think it was better so.”
Cicely had kept her eyes fixed upon him while he spoke; they
seemed to drag the unwilling words out of him by the intensity of
their gaze, something in their expression made him instinctively
conscious that any attempt at softening what he had to tell, any
common-place expressions of sympathy and regret would have been
utterly futile; the girl could not have taken in their meaning. Now,
when he left off speaking, the strain seemed to slacken; the terrible
stony stare left her eyes; she threw out her hands like a child in
terror—as if for protection and support. “You mean,” she said, “oh! I
know what you mean—but you mustn’t say it. Why didn’t you do
anything? Why didn’t you come sooner? I can’t, indeed I can’t bear
it.”
What could he do—what could he say? The relentless summons
had gone forth—Cicely Methvyn was fatherless. It was very hard
upon him!
“I would have given ten years of my life to save him for you, if he
could have been saved. I would have cut off my right hand rather
than have been the one to tell you. I cannot bear to see you suffer,”
he broke out passionately. Then he turned away from her, in despair,
ashamed of his want of self-control, heart-broken that he could say
nothing to comfort her.
The sight of his distress awoke the unselfishness that seldom
slumbered long in Cicely’s heart.
“Forgive me,” she exclaimed, “forgive me. I didn’t know what I
was saying. I will try to bear it, indeed I will. I know nothing could
have been done, if you say so. Tell me about it—tell me how it was—
but must I not go to mamma?”
Mr. Guildford shook his head. “No, not yet,” he said, “she was
very much excited. I was a little alarmed about her, and gave her
something to soothe her. I think she has fallen asleep. I promised to
wait here to meet you, and that seemed to satisfy her.”
Then he told her all he knew. He had been sent for about ten
o’clock, but, by the time he reached Greystone, even Mrs. Methvyn
had seen that his coming would be of no avail; the life had all but
flickered out already. “It was as I always feared it would be,” said Mr.
Guildford, hesitating again. “I always dreaded the effect of any great
shock.”
He looked at Cicely inquiringly. Had she anticipated anything of
the kind; was she in the least acquainted with the nature of the
shock, which for some time must have been impending?
“A great shock,” she repeated, “what great shock? He did not
know—”
She stopped short. With lightning-like rapidity her mind flew back
to the events of that evening—could her father have come to the
knowledge of what she had discovered? But almost before she had
time to dismiss the idea as wild and improbable in the last degree,
Mr. Guildford’s next words put it altogether to flight.
“It was some news that came in a telegram this evening, that—
that brought on this attack,” he said reluctantly, not feeling sure of his
ground with Cicely, but judging it wisest to put her in possession at
once of all that there was to tell. By the expression of her face, he
saw at once that she did not in the least know to what he referred.
“What was the telegram about? Did you see it?” she demanded.
He hesitated again. “You had better tell me,” said Cicely, “that is,
unless mamma did not want me to know.”
“Oh! no; Mrs. Methvyn wished me to tell you everything. The
telegram was about the failure of some company in which Colonel
Methvyn had largely invested. It told him of a great loss of property.”
“And was that all?” said Cicely. “As if that would have mattered!
Oh! Mr. Guildford, why should he have taken that to heart so?”
“It was only natural that he should do so,” said Mr. Guildford.
There was no necessity at present for telling her how great he
suspected the extent of the calamity to be, and indeed just now the
loss of a few hundred pounds or of a quarter of a million would have
been looked upon by Cicely as matters of equal indifference. “It was
only natural he should have felt it as he did,” he repeated. “That is
why I think, perhaps, it is best his consciousness never returned. He
would only have awakened to distress and anxiety, and at the very
best his life could only have been prolonged for a few hours.”
“But he would have known us, he could have said good-bye; we
could have told him how little we cared about the loss of the money,”
cried Cicely. “Oh! I cannot think it is better never to have seen him
again—I cannot.”
For the first time the tears came into her eyes. She sat down and
cried unrestrainedly, refusing to be comforted.
Mr. Guildford left her. He was anxious to know if Mrs. Methvyn
was asleep. On the staircase he met the housekeeper.
“Miss Cicely is in the hall—alone,” he said. “She knows. I have
told her. Do you think you can get her to go to bed?”
Poor Mrs. Moore’s eyes were streaming. She could not speak, but
she nodded her head and set off in the direction of the hall, so Mr.
Guildford felt that his task was accomplished.
Cicely went to bed, and, strange as it may seem, to sleep. She
was only twenty; she had never been really ill in her life, and sorrow
was unfamiliar to her; there were vigour and vitality enough in her to
stand a much more prolonged attack from adversity, though, as she
laid her head on her pillow, she said to herself that but for her mother
she would pray never to wake again.
“It could not be wrong,” she thought. “Except mother nobody
wants me. Amiel has her husband, but poor mamma has only me
now.” And the thought seemed a something to cling to; it made the
idea of living on, notwithstanding the wreck of her future, endurable,
if nothing more. So Cicely slept.
Who does not know the awful agony of the first waking after some
overwhelming sorrow has befallen us? The shuddering glimmer of
recollection that something has happened, the frantic clutch at the
blessed unconsciousness of the sleep that is leaving us, the wild
refusal to recall the truth! And, oh! the unutterable loathing at life, at
existence even when at last we realize the whole and find that
another day has dawned, that the heartless sunshine is over the
world again, that we ourselves must eat and drink and clothe
ourselves, and live! If we could see that our individual misery made
its mark, if the birds would only leave off singing, if the flowers would
all wither, if a veil could be drawn over the sun, would it seem quite
so bad?
“No,” thought Cicely, “if the trees and the flowers and all the living
things seemed to care, I think I could endure it. But they don’t—they
don’t! The world is brighter than ever this morning, though the
brightness has died out of my life for ever.”
She was standing by the open window in her room. She had
forgotten that the blinds should be drawn down, and was gazing with
reproachful appreciation at the beauty of the autumn morning.
Yesterday it would have filled her with delight, to-day its very
perfection repelled and wounded her. Even Nature, with whose
varying moods she had been ever so ready to sympathize, whose
face she had learnt to know so well, had played her false. “Why is it
so fine to-day?” she said to herself; “why is it not cloudy and raining?
Why should it ever be anything else, there must always have been,
there always must be, thousands of people to whom the sunshine is
as dreadful as it is to-day to me.”
She turned wearily away, and began to think what she had to do.
She had been with her mother already this morning, and poor Mrs.
Methvyn had clung to her in a way that was pitiful to see.
“You won’t leave me just yet, my darling,” her mother had
whispered, and Cicely felt thankful that she could give her the
assurance she asked for, without at present adding to her sorrows by
explaining the real state of the case. And this reflection led to
another. Her father had at least been spared the knowledge of
Trevor’s faithlessness.
“Yes,” thought Cicely, “I can be thankful for that.”
Then suddenly she recollected what Mr. Guildford had told her of
the news contained in the fatal telegram. Her mother had not alluded
to it. “We will talk about everything afterwards. Not yet,” she had said
to Cicely. What could “everything” mean? Could it be that the loss of
property, the tidings of which had, she reflected with a shudder,
actually killed her father; could it be that this loss was something
very great? For herself she did not care; but when she thought of her
delicate mother, a vague apprehension for the first time made itself
felt. She wished that she had asked Mr. Guildford to tell her more;
from his manner she fancied he was in possession of fuller details
than he had mentioned to her; but for this it was now too late. Mr.
Guildford had gone back to Sothernbay; the chances were that she
would not see him again, as in all probability he would now hasten
his departure from the neighbourhood.
“He need not have asked me to release him from his promise,”
she said to herself with a sort of sorrowful bitterness.
There came a knock at the door. It was Parker.
“If you please, Miss Cicely,” she began timidly, “Miss Casalis has
been asking how you are. She would be so pleased if you would let
her come and sit with you, or do anythink; anythink she says she
would be so pleased to do.”
“Tell her there is nothing whatever she can do to help me, or my
mother. And for to-day, at least, Parker, I wish to be left quite alone.”
The cold tone was discouraging, but the pale wan face and poor
swollen eyes, moved Parker to another effort.
“Miss Casalis do seem very miserable,” she said insinuatingly. “I
should not have thought she was a young lady as would have taken
it to heart so. I don’t think she closed a eye last night. I do wish, Miss
Cicely, my dear, you would let her come and sit with you. She’s
wandering about like a ghost. She seems as if she could settle to
nothing.”
Parker’s conscience was pricked by the sight of Geneviève’s
distress. She felt that she had done her injustice. Only the evening
before, she had been far from amiably disposed to the girl, whose
fresh loveliness had won the universal admiration which, according
to the old servant’s way of thinking, belonged of right to “her own
young lady,” and any appearance of indifference or carelessness
would have confirmed her prejudice. But that Geneviève was in real
distress, no one could doubt. “She must have a tender heart, for all
her flighty, foreign ways,” thought Parker, and she waited with some
anxiety for the result of her second appeal.
“I am sorry for her,” said Cicely slowly. The thought of the
miserable little figure wandering about alone in the desolate rooms
downstairs, the remembrance of Geneviève’s great brown, velvety
eyes with the tears in them, moved her in spite of herself. “I am very
sorry for her,” she repeated with a quiver in her voice. “I dare say she
is very unhappy, but, Parker, I really cannot see her. I don’t want to
see any one—not even, remember, Parker, not even Mr. Fawcett if
he calls to-day.”
Parker gazed at her young lady in astonishment. “Not Mr. Trevor!”
she exclaimed under her breath.
“No; I wish to seeno one,” repeated Cicely.
“There is never any telling how trouble will change people,”
thought the old servant philosophically. “Poor Miss Cicely doesn’t
hardly know how she feels yet; we must let her have her own way for
awhile.”
She was leaving the room when Cicely called her back. “On
second thoughts,” she said, speaking with an effort, “you may tell
Miss Casalis that if she likes to come up here in half an hour or so, I
will ask her to write some letters for me.”
Parker departed in triumph. Half an hour later Geneviève, pale,
worn-looking, with great black circles under her eyes, and dressed in
the plain black gown in which she had travelled from Hivèritz, crept
into the room; Cicely looked at her and her heart melted.
“Will you write these letters for me, Geneviève?” she said,
pointing to a slip of paper on which she had written down some
addresses. “I can easily tell you what to say. Mother asked me to see
about her mourning—and I think you had better write home to-day to
tell your mother what has happened.”
Her lips quivered, she turned her head away. Geneviève threw
her arms round her.
“Oh! Cicely, dear Cicely, I do love you. I do. I am so sorry, oh! I am
so sorry. Oh, Cicely, I wish I had never come here!”
Cicely disengaged herself gently, very gently, from her cousin’s
embrace.
“I am glad you are sorry for our sorrow, Geneviève,” she said
quietly, “even though it is impossible you should understand all we—I
—am feeling.”
Geneviève looked up at her with a puzzled air. “I thought you
were colder than you are,” she said. “Perhaps I have mistaken you
altogether. I—I don’t know what to do. Shall I go home—to Hivèritz
to-day, this afternoon? You would never hear of me again. Would
you like me to go?”
“What do you mean, Geneviève?” asked Cicely sternly. “Why
should I wish you to go? Do you know any reason why I should?”
Geneviève grew scarlet. In her excitement and confusion of
thought, she had almost persuaded herself that Cicely must suspect
her secret, or that, if this were not so, that she must confess it. But
now that the opportunity offered, her natural cowardice returned and
tied her tongue. “I do not know what I mean,” she said. “I thought,
perhaps, now that you are sad, I should be a trouble to you.”
Cicely looked at her. “You have no reason to think so,” she said
coldly. But she did not press Geneviève to explain herself further. “I
shall say what I have to say to Trevor, and to him alone,” she
resolved.
Geneviève had begun to cry again. “I am so unhappy, so very
unhappy,” she said miserably.
“I am sorry for you,” said Cicely kindly.
“You would not be if you knew the whole, why I am so unhappy,”
sobbed Geneviève.
“Yes, I should be. If I thought even that your unhappiness was of
your own causing, that you deserved it,” said Cicely impressively,
“still I should be sorry for you—more sorry, perhaps.”