Data Communication and Computer Networks A Business Users Approach 9Th Edition Jill West Online Ebook Texxtbook Full Chapter PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

Data Communication and Computer

Networks: A Business User's


Approach, 9th Edition Jill West
Visit to download the full and correct content document:
https://ebookmeta.com/product/data-communication-and-computer-networks-a-busin
ess-users-approach-9th-edition-jill-west/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

CompTIA Network Guide to Networks MindTap Course List


9th Edition West Jill

https://ebookmeta.com/product/comptia-network-guide-to-networks-
mindtap-course-list-9th-edition-west-jill/

Friendship and Technology A Philosophical Approach to


Computer Mediated Communication 1st Edition Tiffany A.
Petricini

https://ebookmeta.com/product/friendship-and-technology-a-
philosophical-approach-to-computer-mediated-communication-1st-
edition-tiffany-a-petricini/

Computer Networks and Inventive Communication


Technologies Proceedings of Third ICCNCT 2020 S. Smys

https://ebookmeta.com/product/computer-networks-and-inventive-
communication-technologies-proceedings-of-third-
iccnct-2020-s-smys/

Computer Networks and Inventive Communication


Technologies Proceedings of Fifth ICCNCT 2022 S. Smys

https://ebookmeta.com/product/computer-networks-and-inventive-
communication-technologies-proceedings-of-fifth-
iccnct-2022-s-smys/
Essential Interviewing: A Programmed Approach to
Effective Communication 9th Edition David R Evans

https://ebookmeta.com/product/essential-interviewing-a-
programmed-approach-to-effective-communication-9th-edition-david-
r-evans/

Computer Networks, Big Data and IoT: Proceedings of


ICCBI 2020 A.Pasumpon Pandian

https://ebookmeta.com/product/computer-networks-big-data-and-iot-
proceedings-of-iccbi-2020-a-pasumpon-pandian/

Computer Networks and Inventive Communication


Technologies Proceedings of Fourth ICCNCT 2021 1st
Edition S. Smys

https://ebookmeta.com/product/computer-networks-and-inventive-
communication-technologies-proceedings-of-fourth-iccnct-2021-1st-
edition-s-smys/

Business Analytics A Data Driven Decision Making


Approach for Business Volume I 1st Edition Amar Sahay

https://ebookmeta.com/product/business-analytics-a-data-driven-
decision-making-approach-for-business-volume-i-1st-edition-amar-
sahay/

Computer Communication Networking and IoT Proceedings


of ICICC 2020 Lecture Notes in Networks and Systems 197
Editors: Bhateja

https://ebookmeta.com/product/computer-communication-networking-
and-iot-proceedings-of-icicc-2020-lecture-notes-in-networks-and-
systems-197-editors-bhateja/
Data Communications
& Computer Networks
A Business User’s Approach
Ninth Edition

Jill West
Curt M. White

Australia • Brazil • Canada • Mexico • Singapore • United Kingdom • United States

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.

Important Notice: Media content referenced within the product description or the product
text may not be available in the eBook version.

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Data Communications & Computer Networks: © 2023, 2016, 2013 Cengage Learning, Inc. ALL RIGHTS RESERVED.
A Business User’s Approach, Ninth Edition
No part of this work covered by the copyright herein may be reproduced
Jill West and Curt M. White
or distributed in any form or by any means, except as permitted by U.S.
copyright law, without the prior written permission of the copyright owner.
SVP, Higher Education Product Management: Erin
Joyner Unless otherwise noted, all content is © Cengage, Inc.
VP, Product Management, Learning Experiences:
Thais Alencar

Product Director: Jason Fremder For product information and technology assistance, contact us at

Product Manager: Natalie Onderdonk Cengage Customer & Sales Support, 1-800-354-9706
or support.cengage.com.
Product Assistant: Tom Benedetto

Content Manager: Arul Joseph Raj, Lumina For permission to use material from this text or product, submit all
Datamatics, Inc. requests online at www.copyright.com.
Digital Delivery Quality Partner: Jim Vaughey

VP, Product Marketing: Jason Sakos


Library of Congress Control Number: 2021925306
IP Analyst: Ann Hoffman

IP Project Manager: Anjali Kambli, Lumina


Datamatics, Inc. ISBN: 978-0-357-50440-6

Production Service: Lumina Datamatics, Inc.


Cengage
Designer: Erin Griffin
200 Pier 4 Boulevard
Cover Image Source: Xuanyu Han/Getty Images Boston, MA 02210
USA

Cengage is a leading provider of customized learning solutions


with employees residing in nearly 40 different countries and sales in more
than 125 countries around the world. Find your local representative at
www.cengage.com.

To learn more about Cengage platforms and services, register or access


your online learning solution, or purchase materials for your course,
visit www.cengage.com.

Notice to the Reader

Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis in connection
with any of the product information contained herein. Publisher does not assume, and expressly disclaims, any obligation to obtain
and include information other than that provided to it by the manufacturer. The reader is expressly warned to consider and adopt
all safety precautions that might be indicated by the activities described herein and to avoid all potential hazards. By following
the instructions contained herein, the reader willingly assumes all risks in connection with such instructions. The publisher makes
no representations or warranties of any kind, including but not limited to, the warranties of fitness for particular purpose or
merchantability, nor are any such representations implied with respect to the material set forth herein, and the publisher takes no
responsibility with respect to such material. The publisher shall not be liable for any special, consequential, or exemplary damages
resulting, in whole or part, from the readers’ use of, or reliance upon, this material.

Printed in the United States of America


Print Number: 01   Print Year: 2022

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Brief Contents
Preface xiii

Chapter 1 Introduction to Data Communications and Computer Networks������������������������������� 1

Chapter 2 Conducted and Radiated Media������������������������������������������������������������������������������������� 37

Chapter 3 Fundamentals of Data and Signals���������������������������������������������������������������������������������� 74

Chapter 4 Frames and Errors����������������������������������������������������������������������������������������������������������� 108

Chapter 5 Wired and Wireless Local Area Networks������������������������������������������������������������������� 141

Chapter 6 Network Systems and Software������������������������������������������������������������������������������������� 175

Chapter 7 The Internet��������������������������������������������������������������������������������������������������������������������� 215

Chapter 8 Risk, Security, and Compliance������������������������������������������������������������������������������������� 255

Chapter 9 Wide Area Networks������������������������������������������������������������������������������������������������������� 303

Chapter 10 Connecting Networks and Resources������������������������������������������������������������������������ 336

Chapter 11 Network Design and Management���������������������������������������������������������������������������� 372

Chapter 12 Business Principles in IT��������������������������������������������������������������������������������������������� 414

Appendix A CompTIA Cloud Essentials+ CLO-002 Certification Exam Objectives�������������� 449


Glossary457
Index478

iii

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents
Chapter 1
Introduction to Data Communications and Computer Networks 1
1-1: The Language of Computer Application Layer 16
Networking 3 Transport Layer 16
Remember this… 4 Network Layer 16
Self-check 4 Data Link Layer 16
Physical Layer 17
1-2: The Big Picture of Networks 5
The OSI Model 17
Remember this… 6
Logical and Physical Connections 18
Self-check 6
The TCP/IP Protocol Suite in Action 19
1-3: Common Network Examples 6 Remember this… 22
The Desktop Computer and the Internet 6 Self-check 22
A Laptop Computer and a Wireless Connection 8
1-5: Cloud Computing 22
Cellular Network 9
Cloud Computing Characteristics 22
Other Common Network Systems 9
Cloud Service Models 24
Sensor Networks 10
Remember this… 26
Business Mainframe Network 11
Self-check 26
Satellite Networks 11
Summary 27
Cloud Networks 11
Key Terms 28
Remember this… 13
Review Questions 29
Self-check 13
Hands-On Project 1 31
1-4: Network Architectures 14
Reflection Discussion 1 33
The TCP/IP Protocol Suite 14
Solutions to Self-Check Questions 34

Chapter 2
Conducted and Radiated Media 37
2-1: Cabling Standards 38 Unshielded and Shielded Twisted Pair 45
Personal Area Network (PAN) Connection Standards 39 Coaxial Cable 47
Universal Serial Bus (USB) 39 Fiber-Optic Cable 48
Thunderbolt 40 Cable Connectors 51
Lightning 41 Twisted Pair Cable Connectors 51
Remember this… 41 Coaxial Connectors 51
Self-check 42 Fiber Connectors 52
Summary of Wired LAN Technologies 53
2-2: Conducted Media 42
Remember this… 54
Twisted Pair Cable 42
Self-check 54
Types of Twisted Pair Cable 43

iv

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents v

2-3: Radiated Media on LANs 54 Cost 63


Wi-Fi 55 Speed 64
Wireless LAN Standards 57 Expandability and Distance 64
Bluetooth 58 Environment 65
Zigbee 59 Security 65
Other Wireless Technologies in a LAN Environment 60 Remember this… 65
Infrared (IR) 60 Self-check 65
Ultra-Wideband (UWB) 61 Summary 66
Near-Field Communication (NFC) 61 Key Terms 67
Summary of Wireless LAN Technologies 62 Review Questions 68
Remember this… 62 Hands-On Project 2 70
Self-check 63 Reflection Discussion 2 71
2-4: Media Selection Criteria 63 Solutions to Self-Check Questions 72

Chapter 3
Fundamentals of Data and Signals 74
3-1: Data and Signals 75 Phase Shift Keying 89
Analog vs. Digital 75 Transmitting Analog Data with Digital Signals 92
Analog Data and Signals 76 Pulse Code Modulation 92
Digital Data and Signals 77 Delta Modulation 94
Fundamentals of Signals 79 Remember this… 96
Remember this… 83 Self-check 97
Self-check 83 3-3: Characters and Codes 97
3-2: Converting Data into Signals 83 ASCII 97

Transmitting Analog Data with Analog Signals 83 Unicode 97

Transmitting Digital Data with Square-Wave Digital Remember this… 99


Signals: Digital Encoding Schemes 84 Self-check 99
Nonreturn to Zero Digital Encoding Schemes 84 Summary 100
Manchester Code Digital Encoding Schemes 85 Key Terms 101
4B/5B Digital Encoding Scheme 86 Review Questions 101
Transmitting Digital Data with Discrete Hands-On Project 3 103
Analog Signals 88
Reflection Discussion 3 105
Amplitude Shift Keying 88
Solutions to Self-Check Questions 106
Frequency Shift Keying 89

Chapter 4
Frames and Errors 108
4-1: Data Link Frames 108 4-2: Noise and Errors 111
Data Link Responsibilities 109 Gaussian Noise 111
Frame Components 109 Impulse Noise 112
Remember this… 110 Crosstalk 113
Self-check 111 Echo 113

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
vi Contents

Jitter 114 4-4: Error Control 122


Attenuation 114 Toss the Frame or Packet 122
Error Prevention 114 Return the Message 122
Remember this… 115 Stop-and-Wait Error Control 122
Self-check 116 Sliding Window Error Control 123
4-3: Error Detection 116 Correct the Error 126

Parity Checks 116 Remember this… 129

Simple Parity 116 Self-check 129


Longitudinal Parity 117 Summary 130
Arithmetic Checksum 118 Key Terms 131
Cyclic Redundancy Check 120 Review Questions 132
Remember this… 121 Hands-On Project 4 134
Self-check 122 Reflection Discussion 4 138
Solutions to Self-Check Questions 139

Chapter 5
Wired and Wireless Local Area Networks 141
5-1: Using LANs 142 Remember this… 158
Putting LANs to Work 143 Self-check 158
Advantages and Disadvantages of LANs 144 5-4: Wired LANs 158
Remember this… 145 Ethernet Standards 158
Self-check 145 Wired Ethernet Frame Format 160
5-2: Evolution of LAN Technologies 145 Remember this… 162
Bus Topology 145 Self-check 163
Star-Wired Bus Topology 147 5-5: Wireless LANs 163
Contention-Based Protocols 148 Wireless CSMA/CA 163
Star Topology 149 CSMA/CA Frame Format 164
Remember this… 150 Remember this… 166
Self-check 150 Self-check 166
5-3: Switches 151 Summary 166
MAC (Medium Access Control) Addresses 151 Key Terms 168
Virtual LANs 154 Review Questions 168
Link Aggregation 155 Hands-On Project 5 170
Spanning Tree Algorithm 156 Reflection Discussion 5 173
Quality of Service 157 Solutions to Self-Check Questions 174

Chapter 6
Network Systems and Software 175
6-1: Network Servers and Software 175 Remember this… 182
RAID Configurations 176 Self-check 182
Storage Types 178 6-2: Server Operating Systems 183
Utilities 179 Unix 183
Software Licensing Models 180 Linux 183

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents vii

Microsoft Windows Server 184 Popular Cloud Platforms 194


Remember this… 187 Service Categories 196
Self-check 187 Pricing Strategies 197
6-3: Network Devices 187 Cloud Storage 198

Command Modes 187 Cloud-Native Storage 198


Storage Optimization 199
Configuring with Commands 188
Cloud-Native Computing 200
Remember this… 189
Containerization 202
Self-check 189
Serverless Computing 203
6-4: Virtualization 190 Remember this… 203
Hypervisors 190 Self-check 204
Advantages and Disadvantages of Virtualization 191 Summary 204
Virtualizing Network Devices 192 Key Terms 206
Software-Defined Networking (SDN) 193 Review Questions 206
Remember this… 194 Hands-On Project 6 208
Self-check 194 Reflection Discussion 6 212
6-5: Cloud Computing 194 Solutions to Self-Check Questions 213

Chapter 7
The Internet 215
7-1: Internet Protocol (IP) 216 Remember this… 233
IP Packets 217 Self-check 233
Internet Protocol Version 4 (IPv4) 218 7-4: Internet Services 233
IPv4 Addresses 219 Email 233
Internet Protocol Version 6 (IPv6) 221 File Transfer Protocol (FTP) 234
IPv6 Addresses 223 Intranets and Extranets 236
Remember this… 223 Remote Login 236
Self-check 223 Telnet 236
7-2: Locating a Resource on the Secure Remote Login Protocols 237
Internet 223 Voice over IP (VoIP) 238
Uniform Resource Locator (URL) 224 Media Streaming 240
Domain Name System (DNS) 225 The Internet of Things (IoT) 240
Dynamic Host Configuration Protocol (DHCP) 225 Data Analytics 242
Network Address Translation (NAT) 226 Remember this… 243
Remember this… 228 Self-check 243
Self-check 228 Summary 244
7-3: Protocols of the Internet 229 Key Terms 245

Transmission Control Protocol (TCP) 229 Review Questions 246

TCP Segment Format 229 Hands-On Project 7 248


User Datagram Protocol (UDP) 230 Reflection Discussion 7 251
Address Resolution Protocol (ARP) 231 Solutions to Self-Check Questions 253
Internet Control Message Protocol (ICMP) 231

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii Contents

Chapter 8
Risk, Security, and Compliance 255
8-1: Network Security Risks 256 DES (Data Encryption Standard) and AES
(Advanced Encryption Standard) 274
Common Vulnerabilities and Attack Types 256
Public Key Cryptography 275
Compromise Users 256
Public Key Infrastructure (PKI) 275
Compromise Software 256
Compromise Availability 256 Technologies That Use Encryption 278
Compromise Accounts 257 Digital Signatures 278
Other Attack Strategies 257 Tunneling Protocols 278
Risk and Security Assessments 259 Remember this… 279
Risk Response 261 Self-check 279
Security Policies 261 8-4: IAM (Identity and Access
Incident Response 261 Management) 279
Remember this… 262 Access Rights 280
Self-check 262 Authentication 280
8-2: Network Security Technologies 262 Hashing 281
Blockchain 284
Physical Security 263
Single Sign-On (SSO) and Federated Identity
Prevention Methods 263
Management (FIM) 284
Detection Methods 263
Authorization 285
Anti-Malware 264
Accounting 285
Proxy Server 264
Remember this… 286
Access Control Lists (ACLs) 265
Self-check 287
Firewalls 265
Firewall Effectiveness 265
8-5: Wireless Security 288
Firewall Functionality in the Cloud 266 Securing Wireless LANs 288
Firewall Limitations 267 Spread Spectrum Technology 288
Intrusion Detection and Prevention Systems 267 Frequency Hopping Spread Spectrum 288
Remember this… 268 Direct Sequence Spread Spectrum 290
Self-check 269 Remember this… 290
Self-check 290
8-3: Data Security Technologies 269
Summary 291
CIA Triad 269
Key Terms 293
Data Security Regulations and Compliance 270
Review Questions 294
Encryption 271
Hands-On Project 8 295
Monoalphabetic Substitution-Based Ciphers 272
Reflection Discussion 8 300
Polyalphabetic Substitution-Based Ciphers 272
Solutions to Self-Check Questions 301
Transposition-Based Ciphers 273

Chapter 9
Wide Area Networks 303
9-1: Networks That Connect LANs 304 Remember this… 306
Campus Area Networks (CANs) 304 Self-check 306
Metropolitan Area Networks (MANs) 304 9-2: Routing 306
WAN Topology 305 Best Paths 307

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents ix

Dynamic Versus Static Routing 308 Orthogonal Frequency Division Multiplexing


Routing Protocols 309 (OFDM) 319
Routing Information Protocol (RIP) 309 Remember this… 319
Open Shortest Path First (OSPF) 311 Self-check 320
Intermediate System to Intermediate 9-4: Compression 320
System (IS-IS) 311
Lossless Compression 320
Enhanced Interior Gateway Routing
Run-Length Encoding 321
Protocol (EIGRP) 311
Lempel-Ziv Technique 321
Border Gateway Protocol (BGP) 311
Lossy Compression 322
Remember this… 312
MP3 (MPEG [Moving Picture Experts
Self-check 312
Group] Audio Layer-3) 322
9-3: Multiplexing 312 JPEG (Joint Photographic Experts Group) 322
Time Division Multiplexing (TDM) 313 MPEG (Moving Picture Experts Group) 325
Synchronous Time Division Multiplexing 313 Remember this… 325
Statistical Time Division Multiplexing 314 Self-check 326
Frequency Division Multiplexing (FDM) 315 Summary 326
Wavelength Division Multiplexing (WDM) 316 Key Terms 328
Wi-Fi Multiplexing 316 Review Questions 329
Cellular Network Multiplexing 318 Hands-On Project 9 330
Global System for Mobile Reflection Discussion 9 334
Communications (GSM) 318 Solutions to Self-Check Questions 335
Code Division Multiplexing (CDM) 318

Chapter 10
Connecting Networks and Resources 336
10-1: Small Business and 10-3: WAN Virtualization 355
Consumer-Grade WAN Services 337 Software-Defined WAN (SD-WAN) 356
Digital Subscriber Line (DSL) 337 Software-Defined Branch (SD-Branch) 357
DSL Basics 337 Secure Access Service Edge (SASE) 358
DSL Formats 339 Remember this… 358
Cable Modems 339 Self-check 358
Fiber Internet 341
10-4: Cloud-Supported Technologies 359
Satellite 342
Digital Marketing 359
Cellular Networks 344
Remote Workers 360
Remember this… 346
Edge Computing 361
Self-check 347
Remember this… 362
10-2: Enterprise-Grade WAN Services 347 Self-check 362
Legacy WAN Technologies 347 Summary 363
MPLS 348 Key Terms 365
Ethernet 349 Review Questions 365
Virtual Private Network (VPN) 351 Hands-On Project 10 367
Cloud Connectivity 354 Reflection Discussion 10 369
Remember this… 355 Solutions to Self-Check Questions 370
Self-check 355

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
x Contents

Chapter 11
Network Design and Management 372
11-1: Planning for Changes 373 Simple Network Management
Protocol (SNMP) 388
Project Management 373
NetFlow 389
Application Lifecycle Management (ALM) 374
Creating a Baseline 390
Change Management 376
Remember this… 392
Remember this… 378
Self-check 393
Self-check 378
11-4: Cloud Deployment and
11-2: Analyzing Design 378
Management 393
Network Modeling 378
Cloud Migration 393
Wide Area Connectivity Map 379
Migration Phases 394
Metropolitan Area Connectivity Map 379
Migration Strategies 395
Local Area Connectivity Map 379
Cloud Provisioning and Configuration
Gap Analysis 381 Management 396
Feasibility Studies 381 Automation 396
Capacity Planning 382 Infrastructure as Code (IaC) 398
Testing Environments 383 Automation and Orchestration Tools 399
Remember this… 384 Cloud Monitoring and Optimization 401
Self-check 385 Remember this… 403
11-3: Network Monitoring and Self-check 403
Management 385 Summary 404
Network Monitoring Tools 385 Key Terms 406
Monitoring Network Hardware 385 Review Questions 406
Monitoring Network Traffic 386 Hands-On Project 11 408
Alerts and Logs 387 Reflection Discussion 11 411
Syslog 387 Solutions to Self-Check Questions 412

Chapter 12
Business Principles in IT 414
12-1: People Resources 415 Vendor Documentation 423
Network Administrator Skills and Certifications 415 Request for Information (RFI) 423
Professional Development 416 Statement of Work (SOW) 423
Training Users 418 Service Level Agreement (SLA) 423
Project Evaluations 424
Policies and Procedures 419
Remember this… 425
Remember this… 420
Self-check 425
Self-check 420
12-2: Vendor Relations 420 12-3: Financial Aspects of Cloud 426
CapEx vs. OpEx 426
Vendor Services 421
Tracking Cloud Expenses 427
Support Plans 421
Time to Market 422 Cloud Cost Optimization 428

Managed Services 422 Instance Pricing Options 429


Vendor Lock-In 422 Data Replication Cost vs. Benefit 430

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents xi

Licensing in the Cloud 430 RTO and RPO 437


Remember this… 431 Remember this… 438
Self-check 432 Self-check 439

12-4: Continuity and Recovery 432 Summary 439


Key Terms 441
Business Continuity 432
Review Questions 442
Disaster Recovery 433
Hands-On Project 12 443
MTBF and MTTR 433
Backups 435 Reflection Discussion 12 446
Solutions to Self-Check Questions 447

Appendix A
CompTIA Cloud Essentials+ CLO-002 Certification Exam Objectives 449
Domain 1.0 Cloud Concepts—24% Domain 3.0 Management and
of Exam 450 Technical Operations—26% of Exam 453
Domain 2.0 Business Principles of Domain 4.0 Governance, Risk,
Cloud Environments—28% of Exam 451 Compliance, and Security for the
Cloud—22% of Exam 454

Glossary 457
Index 478

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Dedication
In memory of Curt M. White

xii

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface
Today’s business world could not function without ❯❯You work in a small company, in which each
data communications and computer networks. Most employee wears many hats. Thus, you may
people cannot make it through an average day with- need to perform some level of network assess-
out encountering or using some form of computer ment, administration, or support.
network. In the past, this field of study occupied the ❯❯You have your own business and need to fully
time of only engineers and technicians, but it now
understand the advantages of using computer
involves business managers, end users, programmers,
networks to support your operations. To
and just about anyone who might use a phone or
optimize those advantages, you should have
computer! Thus, Data Communications & Computer
a good grasp of the basic characteristics of a
Networks: A Business User’s Approach, Ninth Edition
computer network.
maintains a business user’s perspective on this vast
and increasingly significant subject. ❯❯You have a computer at home or at work, and
you simply wish to learn more about computer
In a generic sense, this book serves as an owner’s networks.
manual for the individual computer user. In a world in
❯❯You have realized that, to keep your job skills
which computer networks are involved in nearly every
current and remain a key player in the informa-
facet of business and personal life, it is paramount that
tion technology arena, you must understand
each person understands the basic features, opera-
tions, and limitations of different types of computer how different computer networks work and
networks. This understanding helps people become become familiar with their advantages and
better managers, better employees, and simply better shortcomings.
computer users. As a computer network user, you will
probably not be the one who designs, installs, and
maintains the network. Instead, you will have interac- Audience
tions—either direct or indirect—with the individuals
Data Communications & Computer Networks: A Business
who do. Taking this course should give you a strong
User’s Approach, Ninth Edition is intended for a one-
foundation in computer network concepts, which will
semester course in business data communications for
enable you to work effectively with network admin-
students majoring in business, information systems,
istrators, network installers, and network designers.
management information systems, and other applied
Here are some of the many scenarios in which the
fields of computer science. Computer science depart-
knowledge contained in this book would be particu-
ments will also find the book valuable, particularly if
larly useful:
the students read the Details sections accompanying
❯❯You work for a company and must deal directly most chapters. It is a readable resource for computer
with a network specialist. To better understand network users that draws on examples from business
the specialist and be able to conduct a meaningful environments. In a university setting, this book can
dialog with them, you need a basic understanding be used at practically any level above the first year.
of the many aspects of computer networks.
❯❯You are a manager within a company and
depend on network specialists to provide you
Defining Characteristics of
with recommendations for the company’s net- This Book
work. To ensure that you can make intelligent The major goal of this ninth edition is the same as
decisions regarding network resources, you that of the first edition: to go beyond simply provid-
need to know the basic concepts of data com- ing readers with a handful of new definitions, and
munications and computer networks. instead introduce them to the next level of details

xiii

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xiv Preface

found within the fields of computer networks and communications and computer networks. Some of
data communications. This higher level of detail, these topics include:
framed within the context of real-world scenarios,
❯❯Integral coverage of cloud computing,
includes the network technologies and standards
especially from a business perspective
necessary to support computer network systems
and their applications. This book is more than just ❯❯An introduction to many new terms and
an introduction to advanced terminology. It involves concepts such as: IoT (Internet of Things),
introducing concepts that will help the reader achieve 5G (5th generation) cellular, SDN (software-
a more in-depth understanding of the often-complex defined networking), SD-WAN (software-defined
topic of data communications. Hands-on projects wide area networking), data analytics, and AI
provide memorable insights into the concepts, and (artificial intelligence)
pedagogical features help readers assess their own ❯❯The most recent Wi-Fi standards of 802.11ac
learning and progress. It is hoped that once readers and 802.11ax
attain this in-depth understanding, the topic of net-
❯❯Technologies to support remote workers
works and data communications will become engag-
ing in the pursuit of business objectives. To facilitate ❯❯Industry standards for cloud security
this understanding, the book strives to maintain high It is also important to remember the many older tech-
standards in three major areas: readability, a balance nologies still in prevalent use today. Discussions of
between the technical and the practical, and currency. these older technologies can be found, when appro-
priate, in each chapter of this book.
Readability
Great care has been taken to provide the technical Organization
material in as readable a fashion as possible. Each
The organization of Data Communications & Computer
new edition has received a complete rewrite, in which
Networks, Ninth Edition roughly follows that of the
every sentence has been reexamined to convey the
TCP/IP protocol suite, from the physical layer to the
concepts as clearly as possible. Given the nature of
upper layers. In addition, the book has been carefully
this book’s subject matter, the use of terminology is
designed to consist of twelve, well-balanced chapters
unavoidable. However, every effort has been made to
to fit into a typical 15- or 16-week semester (along
present terms in a clear fashion, with minimal use of
with any required exams). The intent was to design
acronyms and even less use of jargon.
a versatile introduction to the study of computer
networks by creating a set of chapters that is cohesive
Balance between the Technical and the but at the same time allows for flexibility in the week-
Practical to-week curriculum. Thus, instructors may choose to
As in the very successful first edition, a major objective emphasize or de-emphasize certain topics, depending
in writing Data Communications & Computer Networks, on the focus of their curriculums.
Ninth Edition was to achieve a balance between the Coverage of CompTIA’s Cloud Essentials+ exam objec-
more technical aspects of data communications tives are deeply integrated into the material so that
and its everyday practical aspects. Throughout each every objective is covered to or beyond the level
chapter, there are sections entitled “Details,” which required by the exam. Students who are taking this
delve into the more specialized aspects of the topic course and who engage in final exam preparation
at hand. Should readers not have time to explore this activities (such as review and practice testing) will be
technical information, they can skip these Details qualified to attempt the CompTIA Cloud Essentials+
sections without missing out on the basic concepts certification exam. This exam sits at the crossroads
of covered topics. of business and technology in cloud computing and
encourages a common language for professionals
Current Technology from both areas of expertise.

Because of the fast pace of change in virtually all Students who have taken other cloud computing
computer-related fields, every attempt has been courses, such as a course that covers CompTIA’s more
made to present the most current trends in data technical Cloud+ exam, can study Chapters 11 and 12

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xv

in preparation for the Cloud Essentials+ exam. These Details


chapters focus on addressing the business-based
Most chapters contain one or more Details sections,
language and concerns of cloud computing.
which dig deeper into a particular topic. Readers
who are interested in more technical details will find

Features these sections valuable. Since the Details sections are


physically separate from the main text, they can be
To assist readers in better understanding the tech- skipped if the reader does not have time to explore
nical nature of data communications and computer this level of technical detail. Skipping these sections
networks, each chapter contains several significant will not affect the reader’s overall understanding of
features. These features are based on established, a chapter’s material.
well-tested pedagogical techniques as well as some
newer techniques.
CompTIA Cloud Essentials+ Objectives
Mapping
Learning Objectives
Where relevant, covered exam objectives are refer-
The chapter opens with a list of learning objectives that enced within a section to support self-study efforts.
should be accomplished by the end of the chapter. Each All the exam objectives for the CompTIA Cloud
objective is tied to the main sections of the chapter. Essentials+ certification are covered within this book
Readers can use the objectives to grasp the scope and at or beyond the level required by the exam.
intent of the chapter’s content. The objectives also work
in conjunction with the end-of-chapter summary and
review questions, so that readers can assess whether End-of-Chapter Material
they have adequately mastered the material. The end-of-chapter material is designed to help read-
ers review the content of the chapter and assess
Section Reviews whether they have adequately mastered the concepts.
It includes:
Each major section in each chapter concludes with
a brief review of the main points students should ❯❯A bulleted summary that readers can use as a
remember from that section. This frequent review review of the key topics of the chapter and as a
process helps students reflect on the material they’ve study guide.
learned before moving on to the next section. ❯❯A list of the key terms used within the chapter.
❯❯Review questions that readers can use to
Self-Check Questions quickly check whether they understand the
chapter’s key concepts.
Following the section review, self-check questions
❯❯A discussion starter designed to encourage
encourage students to practice recalling the informa-
tion they’ve learned. This practice testing is proven in readers to reflect on what they’ve learned in
learning science research as one of the most effective the chapter and how these topics might affect
methods to retain new information. Answers and daily life, businesses and markets, and work
explanations are provided for students at the end processes in various industries.
of each chapter so they can check themselves and ❯❯A Hands-On Project that gives students
identify gaps in their learning before moving forward. concrete experience with concepts from
the chapter. These projects are carefully
designed to work as effectively for a distance-
Thought Experiments
learning student as for a student in the class-
Thought experiment boxes sprinkled throughout the room. None of the projects require significant
reading invite students to consider a personal or preparation beforehand for the instructor,
business application of the concepts being discussed. hardware beyond a typical workstation or
These activities sometimes require outside research,
laptop, or paid subscriptions to any other
and other times students draw upon their personal
service.
experiences and opinions.

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xvi Preface

Glossary can “get their hands dirty in the cloud” and


discover why IT as an industry is becoming
At the end of the book, you will find a glossary that
cloud-centric.
includes the key terms from each chapter.
❯❯Certification preparation—All exam objectives
for the CompTIA Cloud Essentials+ certification
New to This Edition are covered to or beyond the depth required by
the exam. The CompTIA Cloud Essentials+ cer-
Just as networking technology continues to evolve,
so does learning science and the insights available to tification addresses the crossroads of business
course designers. In the interest of providing you with and technology in cloud computing. Training
the most effective and durable learning experience, for the exam provides experts on both sides
this latest edition is packed with improvements and with a common language to encourage partner-
enriched features. ship and collaboration as companies increas-
ingly migrate to the cloud.
❯❯Fully updated—Content maps completely to
CompTIA’s Cloud Essentials+ CLO-002 exam for
productive exam preparation.
Chapter Descriptions
❯❯“Remember this…” feature—Section-specific
To keep up with new technology in computer networks
learning objectives blend the Cloud Essentials+
and data communications, this Ninth Edition has incor-
exam objectives with the material covered
porated many updates and additions in every chapter,
in each section to help students focus on the as well as some reorganization of sections within
most important points of that section. chapters. Here’s a summary of the major concepts
❯❯Self-check questions—Periodic multiple-choice that can be found in each of the following chapters:
questions placed throughout the readings
help students mentally complete the “learning Chapter 1, Introduction to Data Communications
cycle” as they practice recalling the informa- and Computer Networks, introduces different types
of computer networks, along with many of the major
tion to increase the durability of what they
concepts that will be discussed in the following chap-
learn. With answers and thorough explanations
ters, with an emphasis on the TCP/IP protocol suite
at the end of each chapter, students can check
followed by the OSI model. Cloud computing is intro-
their own learning and assess their progress
duced in this first chapter and is revisited in-depth in
toward mastering each chapter’s objectives.
subsequent chapters.
❯❯Flexible learning environment—New skills-
based projects encourage hands-on exploration Chapter 2, Conducted and Radiated Media, intro-
of chapter concepts. These projects include duces the different types of wired and wireless media
thought-provoking questions that encourage for transmitting data on personal and local area net-
critical thinking and in-depth evaluation of works. Coverage of Wi-Fi, Bluetooth, and wireless IoT
the material. The software tools used in the (Internet of Things) technologies reflects updated
projects are included in Windows or freely standards and evolution of wireless media.
available online, and hardware requirements Chapter 3, Fundamentals of Data and Signals, covers
are kept to a minimum, making these projects basic concepts describing how data is converted to
accessible to more students in a wide variety of signals for transmission on a network. Later chapters
learning environments. build on these concepts so students understand how
❯❯Cloud, virtualization, and emulation tech- to increase network performance and efficiency.
nologies—Projects at the end of each chap-
Chapter 4, Frames and Errors, discusses how a con-
ter challenge readers to explore concepts
nection or interface is created between a computer
and apply skills with real-world tools. Some
and a peripheral device. The chapter explores types
projects employ Cisco’s network simulator,
of noise and the errors they cause, how these errors
Packet Tracer, so learners can practice setting
are detected, and the actions that can take place in
up a network from start to finish. Other pro-
response to errors.
jects guide students in accessing AWS so they

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xvii

Chapter 5, Wired and Wireless Local Area Networks, Chapter 11, Network Design and Management, intro-
explains the evolution of topology and Ethernet stan- duces application lifecycle management, change man-
dards in wired local area networks, emphasizing the agement, and project management. In the context of
role a switch plays in modern networks. The chapter creating or improving networks, the chapter explores
then describes standards used to handle collisions network modeling, gap analysis, feasibility studies,
on wireless networks. capacity planning, and testing environments. A sec-
tion on network monitoring covers monitoring tools
Chapter 6, Network Systems and Software, discusses and the importance of baseline studies. The chapter
various network services and the network operating concludes with new content on cloud deployment and
systems that support them. New content discusses migration concepts, including migration strategies,
how to configure network devices and explains the automation/orchestration, and cloud monitoring.
concept and role of virtualization. The chapter con-
cludes with new content explaining cloud computing Chapter 12, Business Principles in IT, offers new con-
services and pricing strategies. tent addressing a network’s human resources, includ-
ing the need for administrative and training skills in
Chapter 7, The Internet, is devoted to technologies addition to ongoing professional development. The
that make the Internet work. The chapter covers IPv4 next section focuses on relationships with vendors,
and IPv6 protocols and addressing as well as TCP, important vendor documentation, and methods for
UDP, and a brief discussion of MPLS. It also discusses evaluating proposed projects with vendors. New con-
Internet services, such as DNS, SSH, and VoIP, and it tent covers financial aspects of the cloud, including a
presents new content on the IoT (Internet of Things) comparison of CapEx versus OpEx and a discussion of
and data analytics. cloud cost optimization. The final section addresses
business continuity and disaster recovery planning.
Chapter 8, Risk, Security, and Compliance, addresses
common network vulnerabilities and attack types,
including updated information on ransomware and
phishing emails. The chapter explains network secu- Instructor Resources
rity technologies, from physical security and anti- Additional instructor resources for this product are
malware to firewalls and IDS/IPS. Encryption pro- available online. Instructor assets include an Instruc-
cesses and uses are explained along with an updated tor’s Manual, PowerPoint® slides, and a test bank
discussion of authentication measures. The chapter powered by Cognero®. Sign up or sign in at www.
concludes with a section devoted to wireless security. cengage.com to search for and access this product
and its online resources.
Chapter 9, Wide Area Networks, introduces the basic
terminology and concepts of campus area networks,
metropolitan area networks, and wide area networks.
Routing processes and common routing protocols are Acknowledgments
explored, followed by discussions on multiplexing and This book has been a long time coming. Through
compression in wide area networks. delays, multiple schedule rearrangements, the 2020
quarantines, and team members being promoted to
Chapter 10, Connecting Networks and Resources,
other responsibilities, this edition has now come to
delves into the details of how local networks con-
fruition. I believe this is good timing—as the demand
nect to the Internet. The chapter includes DSL, cable
for cloud skills increases so does the perception of
modems, fiber, satellite, and cellular connections for
cloud as an integral part of IT.
consumer-level services and MPLS, Ethernet, VPN, and
cloud connectivity for enterprise-grade connections. Many people contributed to the production of this
New content on SD-WAN, SD-Branch, and SASE helps book, and many more helped move it along before the
prepare students for the CompTIA Cloud Essentials+ official drafting process began. I’d like to thank Emily
certification exam. And coverage of digital marketing, Pope for her vision of blending this book’s network
edge computing, and supporting remote workers pre- instruction in a business context with CompTIA’s
pares students for working in today’s Internet-based business-centered cloud computing certification.
businesses. I’m grateful for Staci Eckenroth’s high standards in

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xviii Preface

editing the drafts and ensuring inclusive language kids: Winn, Sarah, Daniel, and Zack. Thank you to each
that shows the inherent value of people in all walks of of you for the unique ways you each contribute. And
life. And thank you to Jennifer Ziegler for picking up finally, a special thanks to each of my students—your
the reins of this project from others to see it through. curiosity, struggles, dreams, and hard work fuel my
passion for teaching and for writing. I’m grateful to
The work I do is only possible through the support
play a part in your journey.
and encouragement of my husband, Mike, and our four

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Chapter 1

Introduction to Data
Communications and
Computer Networks
Objectives Introduction
After reading this chapter, Making predications is a difficult task, and predicting the future of
you should be able to: computing is no exception. History is filled with computer-related
• Use common networking predictions so inaccurate that today they are amusing. For example,
terms consider the following predictions:
• Identify basic networking
“I think there is a world market for maybe five computers.”
devices
Thomas Watson, chairman of IBM, 1943
• Describe common types
of networks “I have traveled the length and breadth of this country, and talked
• Describe the purpose of with the best people, and I can assure you that data processing is a
each layer of the TCP/IP fad that won’t last out the year.”
protocol suite and the OSI Editor in charge of business books for Prentice Hall, 1957
model
“There is no reason anyone would want a computer in their home.”
• Explain the significance of
Ken Olsen, president and founder of Digital Equipment Corporation,
cloud computing
1977

Apparently, no matter how famous you are or how influential your posi-
tion, it is very easy to make very bad predictions. Nevertheless, it’s hard
to imagine that anyone can make a prediction worse than any of those
above. Buoyed by this false sense of optimism, consider these forecasts:

Someday your home’s heating and cooling system will automatically


turn off when it detects you leaving home, turn on when it detects
you’re heading back, adjust its settings according to your daily activi-
ties and current energy prices, and shut down completely if it detects
smoke in the house.

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
2 Chapter 1 Introduction to Data Communications and Computer Networks

At some point, a hacker manages to steal your In addition, more people are using satellite-based
banking password and log into your online bank GPS devices in their cars and on smartphones to pro-
account, but the attack is detected and booted from vide driving directions and avoid traffic hotspots. Simi-
your account before any damage is done because lar systems can unlock your car doors if you leave your
he didn’t move his mouse the same way you do. keys in the ignition or can locate your car in a crowded
parking lot by beeping the horn and flashing the
Someday your car battery will be capable of detecting headlights if you cannot remember where you parked.
when the power gets too weak to start the car, and it
will call to inform you that you need a replacement or Even if you didn’t use public transportation today or
a charge. a GPS device in your car to commute to work, school,
or the store, there are many other ways to use a com-
One day you will use an app on your phone to puter network. Businesses can order parts and inventory
request personal transportation. The app will show on demand and build products to customer-designed
you the car’s photo, provide a map of the car’s current specifications electronically, without the need for paper.
location, and you’ll be notified when the car arrives Online retail outlets can track every item you click on or
at your location. However, when you enter the car, purchase. Using this data, they can make recommen-
there will be no driver because the car drives itself. dations of similar products and inform you in the future
when a new product becomes available. ATMs can verify
Someday while driving in a big city, your car will a user’s identity by taking their thumbprint. Plus, many
navigate you to the nearest empty parking spot and employees and students now work from home, relying
allow you to pay the parking fee with your phone. heavily on data networks to access remote resources for
work, school, and socializing.
Do these predictions sound far-fetched and filled with To support current demands for network connectivity,
mysterious technologies that only scientists and engi- cable television continues to expand, offering extensive
neers can understand? They shouldn’t because these programming, pay-per-view options, video recording,
scenarios are happening today with technologies that digital television and music, and (in some markets) gigabit
already exist. What’s more, none of these advances connectivity to the Internet. The telephone system, the
would be possible today were it not for computer net- oldest and most extensive network of communication
works and data communications. devices, continues to become more of a computer network
The world of computer networks and data communica- every day. The most recent “telephone” networks can
tions is a surprisingly vast and increasingly significant now deliver voice, Internet, and television over a single
field of study. Once considered primarily the domain connection. Cellular telephone systems cover virtually
of network engineers and technicians, computer the entire North American continent and include systems
networks now involve business managers, computer that allow users to upload and download data to
programmers, system designers, office managers, and from the Internet, send and receive images, and
home computer users, and everyday citizens. upload or download streaming video such as television
programs, movies, web conferences, and social media
It is virtually impossible for the average person on the
videos. Your smartphone can play music, make phone
street to spend 24 hours without directly or indirectly
calls (even video calls), take pictures, browse the web,
using some form of computer network. Consider all
and let you play games while you wait for the next train,
the ways you might interact with computer networks
class, or appointment.
when you’re literally on the street: Most transportation
systems use extensive communication networks to Welcome to the amazing world of computer net-
monitor the flow of vehicles and trains. Expressways and works! As you can see, it is nearly impossible to not
highways have computerized systems for controlling have used some form of computer network and data
traffic signals and limiting access during peak traffic communication. Because of this growing integration
times. Some major cities are placing the appropriate of computer networks and data communications into
hardware inside city buses and trains so that the precise business and daily life, everyone—particularly those
location of each bus and train is known. This information considering careers in information systems, busi-
enables transportation systems to keep buses evenly ness, or computer science—needs to understand
spaced and more punctual, and it allows riders to know the basic concepts. Armed with this knowledge,
when the next bus or train will arrive. you not only will be better at communicating with network

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-1: The Language of Computer Networking 3

specialists and engineers, but also will become better


students, managers, and employees. WAN

MAN
Section 1-1: The Language CAN
of Computer Networking
LAN
Over the years, numerous terms and definitions relat-
ing to computer networks and data communications
have emerged. To gain insight into the many subfields of PAN
study, and to become familiar with the emphasis of this
textbook, take a moment to examine the more common
terms and their definitions:

❯❯A computer network is an interconnected group of Figure 1-1 Relative sizes of common network types
computers and computing equipment using either
wires or radio waves that can share data and com-
puting resources. There are many other terms you’ll see repeatedly
❯❯Wireless computer networks use different kinds of throughout this course. To put these terms in context,
low energy radiation below the visible light spec- let’s peruse the highlights of the coming chapters. It
helps to think of the progression of these chapters in
trum and can involve broadcast radio, microwaves,
terms of how each chapter relates to a company’s LAN,
or infrared transmissions.
either internal to the LAN or external to it. For example,
❯❯Networks spanning an area of a few centimeters Chapters 2 through 6 concentrate on technologies used
to several meters around an individual are called on LANs. Chapter 7 expands the discussion to see how
PANs (personal area networks). PANs include networks function outside of the LAN environment,
devices such as laptop computers, smartphones, and Chapter 8 covers key security concepts when con-
personal printers, and wireless peripheral devices sidering threats from outside the LAN. As you move
(like a keyboard or speakers) that are typically used away from the LAN, you find that several technologies
by one person at a time. A PAN can also include can connect your network with other networks or with
wearable devices, such as a smartwatch or smart extensions to your own network. You’ll learn about how
glasses, although sometimes these devices are con- WANs work in Chapter 9, and you’ll discover many of
sidered to be part of a BAN (body area network). the more common WAN connection types in Chapter 10.
Let’s take a more detailed look at what you can expect to
❯❯Networks that are a little larger in geographic size—
learn during this course and some of the core vocabulary
spanning a room, a floor within a building, or an
you’ll be using.
entire building—are LANs (local area networks).
Figure 1-1 shows the relative sizes of PANs, LANs, The study of computer networks would be inade-
and other common network types described here. quate without the introduction of two important build-
ing blocks: data and signals. Data is information that
❯❯Collections of local area networks that cover a
has been translated into a form conducive to storage,
campus (such as a college campus or a business cam-
transmission, and calculation. Data communications
pus) are often called CANs (campus area networks).
is the transfer of digital or analog data using digital or
❯❯Networks that serve an area up to roughly analog signals. Analog and digital signals are transmit-
50 kilometers—approximately the area of a typical ted over conducted media or wireless (also called radi-
city—are called MANs (metropolitan area ated) media, both of which are discussed in Chapter 2.
networks). Metropolitan area networks are high- These media are the foundational component of every
speed networks that interconnect businesses with network. Next, Chapter 3 evaluates how data is trans-
other businesses and the Internet. formed into signals that can be transmitted on various
network media.
❯❯Large networks encompassing parts of states,
multiple states, countries, and the world are WANs Signals transmitted on a network must be formatted
(wide area networks). according to certain sets of rules, called protocols, a

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
4 Chapter 1 Introduction to Data Communications and Computer Networks

topic covered in Chapter 4. When the signals transmitted refer to a particular service, such as SaaS (Software as a
between computing devices are corrupted and errors Service) or NaaS (Networking as a Service). Very often
result, error detection and error control are necessary. “the cloud” simply refers to the Internet or to some
These topics are also discussed in detail in Chapter 4. other remote network. When a company places data or
applications on some website on the Internet and allows
Many kinds of devices are needed to support network
people to access them, you might say the application is
-based communications, such as switches and routers.
cloud-based. One of the more visible examples of cloud
Chapter 5 describes the different ways these networking
computing is storing one’s music and files at a remote
devices (i.e., devices used to support the network) can
location on the Internet rather than on a local device.
be arranged to allow networked devices (i.e., devices
Major corporations such as Amazon and Apple allow
using the network) to talk to each other. Then Chapter 6
users to store personal data and recent media purchases
evaluates the services and software used to manage
on their clouds. Companies such as Microsoft and
the network, such as a NOS (network operating sys-
Google (as well as many others) offer cloud-based appli-
tem), and Chapter 7 shows how you can connect your
cations (called web apps) such as word processors
network to other networks using specialized networking
and spreadsheets. The actual code that runs the web
protocols that enable communication across the Inter-
app does not exist on the user’s computer but runs on
net. As you open your network to the world, you need
the cloud provider’s servers and is typically accessed
to keep it safe. Chapter 8 surveys common risks to your
across the Internet through the user’s browser. This
network and network security best practices that pro-
way, users don’t have to download and install the appli-
tect your network and your data when you’re connected
cation to an individual machine. You will examine cloud
to the Internet.
concepts in more detail throughout this course and
Because sending only one signal over a medium at one time specifically from a business perspective in Chapter 12.
can be an inefficient way to use the transmission medium,
many systems perform multiplexing. Multiplexing
is the transmission of multiple signals on one medium, Cloud Essentials+ Exam Tip
which is necessary with high-traffic connections like
those that make up the Internet. For a medium to trans- This course covers all the objectives for the CompTIA
mit multiple signals simultaneously, the signals must be Cloud Essentials+ CLO-002 certification. Look for
altered so that they do not interfere with one another. these Cloud Essentials+ Exam Tips to indicate which
Compression is another technique that can maximize objectives are addressed in a section.
the amount of data sent over a medium. Compression
involves squeezing data into a smaller package, thus
reducing the amount of time (as well as storage space) Remember this…
needed to transmit the data. Multiplexing and com-
pression are covered in Chapter 9. Next, Chapter 10 ❯❯Networks are often categorized according to their
shows how these techniques are used in different WAN size and the types of devices connected to them.
technologies that connect your local network to the
❯❯The study of data communications includes digital
Internet and other remote networks.
and analog signals that can be transmitted over
Network management is the design, installation, and conducted or wireless (radiated) media.
support of a network and its hardware and software.
❯❯Cloud computing often relies on the Internet in some
Chapter 11 discusses many of the basic concepts nec-
way for access to resources at a remote location.
essary to properly support the design and improvement
of network hardware and software, as well as the more
common management techniques used to optimize a
network’s performance.
Self-check
1. You plug your new printer into a USB port on
A very common expression you may have heard is
your computer. What kind of network supports
something like “back up your photos and documents to
this connection?
the cloud” or “the application is in the cloud.” The key
a. CAN
concept here is cloud and the way this term is currently
used. Similar words or phrases that are commonly used b. LAN
today are cloud computing or Anything as a Service c. WAN
(XaaS), where the X can be replaced with other letters to d. PAN

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-2: The Big Picture of Networks 5

2. You connect your home network to your ❯❯Servers—The computers that store network
Internet provider using a single fiber cable. software and shared or private user files
What technology allows you to download and
❯❯Switches—The collection points for the wires that
upload data over this connection at the same
interconnect the workstations on a LAN
time?
a. Network management ❯❯Routers—The connecting devices between LANs
b. Multiplexing and WANs, such as the Internet

c. Compression There are also many types of wide area networks.


d. Cloud computing Although many different technologies are used to support
WANs, all WANs include the following components:
Check your answers at the end of this chapter.
❯❯Nodes—Devices connected to the network, including
endpoint devices (such as servers) and networking

Section 1-2: The Big devices (such as routers) that make the decisions
about where to route a piece of data
Picture of Networks ❯❯Connecting media—Some type of wired or wireless
high-speed transmission infrastructure (such as
If you could create one picture that tries to give an over-
view of a typical computer network, what might this pic- cables or radio signals) that connects one node to
ture include? Figure 1-2 shows one possibility. Note that another
this figure shows two wide area networks (WAN 1 and ❯❯A subnetwork—Collection of nodes and transmis-
WAN 2), two local area networks (LAN 1 and LAN 2), and sion media working together in a cohesive unit
a personal area network. Although a full description of
To see how LANs and WANs work together, consider
the different components constituting wide area and local
User A (in the upper-left corner of Figure 1-2), who
area networks is not necessary quite yet, it is import-
wishes to retrieve a web page from the web server
ant to note that most LANs often include the following
shown in the lower-right corner. To do this, User A’s
hardware:
computer must have both the necessary hardware and
❯❯Workstations—Personal computers (such as software required to communicate with the first WAN it
desktops, laptops, or tablets) or smartphones encounters, WAN 1 (User A’s Internet service provider).

WAN 1 WAN 2
Modem Routers
User A

Routers
Cellular tower

LAN 1 LAN 2
Switch
PAN 1

Workstations Web
Bluetooth
server
headphones

Figure 1-2 An overall view of the interconnection between different types of


networks

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
6 Chapter 1 Introduction to Data Communications and Computer Networks

Assuming that User A’s computer is connected to this 4. You need to make some changes to a file stored
WAN through a DSL telephone line, User A needs some on your office’s network. On which device is the
type of modem. Furthermore, if this WAN is part of the file located?
Internet, User A’s computer requires software that speaks a. Router
the language of the Internet: TCP/IP (Transmission b. Server
Control Protocol/Internet Protocol).
c. Workstation
Notice that no direct connection exists between WAN 1, d. Switch
where User A resides, and LAN 2, where the web server
Check your answers at the end of this chapter.
resides. To ensure that User A’s web page request reaches
its intended receiver (the web server), User A’s software
attaches the appropriate address information that WAN 1
needs to send User A’s request to the router that connects Section 1-3: Common
WAN 1 to LAN 1. Once the request is on LAN 1, the node
connecting LAN 1 and LAN 2 uses address information to
Network Examples
pass the request to LAN 2. Additional address information The introduction of this chapter described a few appli-
then routes User A’s web page request to the web server, cations of computer networks and data communications
whose software accepts the request. in everyday life. Think about the basic communications
Under normal traffic and conditions, this procedure networks that you might encounter on any typical day
might take only a fraction of a second. When you begin to while at school, at work, or living life in general. This will
understand all the steps involved and the great number help you see how extensively you rely on data commu-
of transformations that a simple web page request must nications and computer networks. In Figure 1-3, Katrina
undergo, the fact that it takes only a fraction of a second is sitting at a desk at her college library. On the desk are
to deliver is amazing. two computers: a desktop PC (provided by the school)
and her personal laptop. She is holding her smartphone.
Try to identify each of the communications networks
Remember this… that Katrina might encounter in this scenario.

❯❯LANs connect devices to each other using switches


and connect to other networks using routers. The Desktop Computer and the
❯❯WANs connect networks to each other using routing Internet
devices and are organized into groups of nodes The desktop computer sitting on Katrina’s desk is
called subnetworks. “connected” to the Internet via a cable at the back.
❯❯Specialized hardware and software are required for (“Connected” was placed in quotations because, as
a workstation to communicate over a network such this book will hopefully demonstrate, it is an intricate
as the Internet. process to enable a device to communicate with other
devices across the Internet and involves much more
❯❯Addressing information is used to route information than simply plugging a cable into the computer’s Internet
across a network. port.) This is perhaps the most common network
connection today and is found in virtually every business,
every academic environment, and in many homes. The
Self-check desktop computer—which is commonly known as the
3. You plug your laptop into your local network’s personal computer, PC, microcomputer, or workstation,
router and use your browser to visit a website. and could also be a laptop or notebook—began to
What type of device allows your router to emerge in the late 1970s and early 1980s.
communicate with your Internet provider’s
In a business or education environment, the Ethernet
network?
cable plugging the desktop into a wall jack travels
a. Switch
through the walls to some collection point, such as a
b. Modem network switch. This network switch, as you will learn
c. Server in Chapter 5, is part of a local area network. This LAN
d. Subnetwork is possibly connected to other LANs, but eventually

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-3: Common Network Examples 7

Desktop a request for a web page from a web server, a request


computer for a file from a file server, or a request to retrieve an
Katrina
Katrina’s email message from an email server. If the requested
smartphone data is stored locally, the request travels across the
local system to a local server. If the requested data
is stored remotely, the request travels across the
local system and then onto an external network, such
LAN as the Internet, to a remote server that contains a
connection
potentially large repository of data and/or applica-
tions. The remote server fills the request and returns
the results to the client, displaying the results on the
Laptop computer
client’s monitor. If users wish to print documents on
with wireless connection
a high-quality network printer, the LAN contains the
network software necessary (a print server) to route
their print requests to the appropriate printer. If users
wish to access their email, the LAN provides a fast,
stable connection between user workstations and the
Figure 1-3 Katrina sitting at a desk at school, email server. If a user wishes to access the Internet,
surrounded by networks and their connections the LAN provides an effective gateway to the out-
side world. Figure 1-4 shows a diagram of this type of
connects to a router. From the router, there is some form desktop-to-Internet connection.
of high-speed connection to a site which specializes in
Earlier, you met Katrina studying at her school library.
high-speed connections to the Internet.
What about connecting her personal computer to the
The LAN, as you’ll see in Chapter 6, is an excellent tool Internet when she studies at home? Many years ago,
for providing a connection to the Internet, as well as most home users connected their computer to the Inter-
to other networks, software, and peripheral devices. net via a dial-up telephone line and a modem. Today,
In the business and education world, this network is most home users either connect to the Internet using
called an enterprise network or a corporate network. DSL (digital subscriber line) or a cable modem service,
The connection between workstations and the Inter- which is connected to a home router. DSL and cable
net in an enterprise network is handled by a client/ modems can achieve much higher connection speeds
server system. In a client/server system, a user at a (or data transfer rates) than dial-up connections, which
computer, called the client machine, issues a request are rarely used anymore. The home router functions
for some form of data or service. This could be a as both a router and a switch, and it allows multiple
request for a database record from a database server, devices to connect to the Internet at one time.

Metal
conduit

Cables Cables
Workstations
LAN
collection
point

Figure 1-4 A desktop computer (or microcomputer) at a business or school


connected from the user’s desk to the company’s local area network

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
8 Chapter 1 Introduction to Data Communications and Computer Networks

To communicate with the Internet using a DSL or cable to how far the wireless signals can travel and how fast
modem connection, a user’s computer must connect to they can carry data.
another device already communicating with the Internet.
Because both wireless and wired LANs are standard in
The easiest way to establish this connection is through
business, academic, and many home environments, it
the services of an ISP (Internet service provider). In this
should come as no surprise that having just one LAN is
case, the user’s computer needs to have the necessary
not going to get the job done. Many organizations need
software to communicate with the Internet. The Internet
the services of multiple LANs, and it may be necessary
“talks” only in TCP/IP, so computers must have software
for these networks to communicate with each other. For
that supports the TCP and IP protocols. Once the user’s
example, the school that Katrina attends may want the
computer is talking TCP/IP, a connection to the Inter-
LAN that supports its chemistry department to share
net can be established. Figure 1-5 shows a typical home an expensive color laser printer with its biology depart-
computer-to-Internet connection. ment’s LAN. Fortunately, it is possible to connect two
LANs so that they can share peripherals (such as the
printer) as well as software and files. Depending on the
A Laptop Computer and a situation, you might use a switch or a router to connect
Wireless Connection two or more LANs or segments of LANs.
Back at the library, Katrina also has her laptop sitting In some cases, it may be more important to prevent data
on the desk. Many laptops do not connect to a network from flowing between LANs than to allow data to flow from
using a fixed wire but instead connect via a wireless con- one network to another. For instance, some businesses
nection. This type of network connection continues to have political reasons for supporting multiple networks—
grow in popularity. A user working with a laptop, tablet, each division may want its own network to run as it wishes.
or even a smartphone uses wireless communications Additionally, there may be security reasons for limiting
(often called Wi-Fi) to send and receive data to and from traffic flow between networks; or allowing data destined for
a wireless access point (also called a wireless router). one network to traverse other networks simply may generate
This access point is usually connected to a wired LAN too much network traffic. The switches that connect LANs
and basically serves as the “bridge” between the wire- can help manage these types of services as well. For exam-
less user device and the wired network. As you’ll see in ple, the switch can filter out traffic not intended for the
later chapters, there are different data communication neighboring network, thus minimizing the overall amount
protocols for wireless and wired LANs. While the flexi- of traffic flow. This process of separating network traffic
bility of not having to physically cable your device to a is called segmentation. Figure 1-6 provides an example
wall jack is nice, you’ll see there are also limitations as of two LANs connected by two switches.

Modem
Router
Route

Modems

Internet
High-speed Router
line
Internet Service Provider

Figure 1-5 A computer sending data over a DSL line to an Internet service provider
and onto the Internet

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-3: Common Network Examples 9

LAN A

Switch 1

Switch 2

LAN B

Figure 1-6 Two local area networks connected by switches

Cellular Network telephone company then transfers the smartphone’s data


over the public telephone network or through another
While sitting in the library, Katrina can connect her high-speed connection onto the Internet.
smartphone to the Internet using Wi-Fi, but what if she
needs to access her school email or assignments in a
place where there is no Wi-Fi signal available? In this
case, she can instead use a cell phone network, or cel-
All Things Considered
lular network.
Thought Experiment
One of the most explosive areas of growth in recent
You’ve just taken a picture of your best friend with
years has been cell phone systems. Originally, cell
your smartphone. You decide to email it to a mutual
phones could only perform voice calls, but now your
friend across the country. List all the different networks
smartphone can send text messages, download pictures
possibly involved in this operation.
and videos from the Internet, stream music and video,
and take high resolution photos and videos. The pro-
cessing power built into modern smartphones rivals the
mainframe computers of generations ago. Other Common Network
The network infrastructure that is needed to support Systems
modern smartphones has also increased in dramatic
fashion. Large numbers of cell towers cover the face
of North America and elsewhere throughout the globe.
These cell towers are tied together into some form of
Cloud Essentials+ Exam Tip
network, allowing a user to send a text message all the This section discusses cloud deployment models,
way around the world. The data encoding technolo- which is required by
gies that support smartphones continue to increase in
•• Part of Objective 1.1: Explain cloud principles.
complexity so that users can access these networks at
ever-increasing speeds.

For a more precise view, examine Figure 1-7. When a user The three sample networks you just viewed—a desktop
talks into their smartphone, sends a text message or email, computer connected to the Internet via a wired LAN, a
or interacts with a website, the data is transmitted across laptop computer connected to the Internet via a wireless
the cellular network to a telephone company building. The LAN, and a cellular network—are only a few of the many

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
10 Chapter 1 Introduction to Data Communications and Computer Networks

Smartphone

Land-based
telephone line

Telephone
company
Wireless
transmission
tower

Figure 1-7 An example of a user with a smartphone transmitting and


receiving data

examples of communication networks. Others that you in the traffic signal control box at the side of the road.
will examine in more detail in later chapters include If this traffic signal control box is connected to a
sensor networks, business mainframe networks, satellite larger traffic control system, the sensor is connected
networks, and cloud networks. to a LAN.

Another example of a sensor network is found within man-


Sensor Networks ufacturing environments. Assembly lines, robotic control
Sensor networks are often found in industrial and real- devices, oven temperature controls, moisture detection
world settings. In this type of network, the action of a or water level controls, and chemical analysis equip-
person or object triggers a sensor that is connected ment, often use sensors connected to data-gathering
to a network. For example, in many left-turn lanes, a computers that control movements and operations,
separate left-turn signal will appear if and only if one sound alarms, and compute experimental or quality
or more vehicles enter in the left-turn lane. A sensor control results. These sensors are often interconnected
embedded in the roadway detects the movement of a via one or more LANs. Figure 1-8 shows a diagram of a
vehicle in the lane and triggers the left-turn mechanism typical sensor network in a manufacturing environment.

Robot arm

Wiring to
LAN Sensors

Wiring to
LAN

Figure 1-8 Automobiles move down an assembly line and trigger


a sensor

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-3: Common Network Examples 11

Finally, don’t forget all the sensor systems in people’s results from the mainframe. Because the terminal does not
homes and vehicles. Home appliances, such as washing possess a lot of computing power, it’s considered “dumb”
machines, dryers, and dishwashers, include sensors and relies on the mainframe computer to control the
to monitor water and air temperatures as well as water sending and receiving of data to and from each terminal.
levels. Modern vehicles contain a myriad of sensors, This requires special types of protocols.
monitoring fuel mixtures, oxygen levels, proximity
Business mainframe networks are still being used for
detection, and wheel rotations (to trigger anti-lock
inquiry/response applications, interactive applications,
brakes and anti-skid controls). Sensors and controllers
and data-entry applications. One example is the system
have also been added to appliances such as refrigera-
that your bank might use to record ATM transactions
tors and thermostats so users can control these devices
from thousands of locations, as seen in Figure 1-9.
remotely through apps on their smartphones or through
smart speakers. These speaker devices provide voice
interaction with a digital assistant, such as Siri, Alexa, or Satellite Networks
Google. Smart appliances and other smart devices are
part of the IoT (Internet of Things). While there is some Satellite networks are continuously evolving technologies
debate on exactly what is included in the IoT, this text- used in a variety of applications. If the distance between
book will refer to IoT specifically as devices that would two networks is great and running a wire between them
not normally be considered computing devices (like would be difficult, if not impossible, satellite transmission
kitchen appliances or door locks) but are connected to systems can be an effective way to connect the two net-
the Internet to allow for remote and/or voice activated works or computer systems. Examples of these applica-
control. tions include digital satellite TV, meteorology, intelligence
operations, mobile maritime telephony, GPS navigation
systems, worldwide mobile telephone systems, and video
Business Mainframe Network conferencing. Figure 1-10 shows a diagram of a typical
Another fairly common network system is the business satellite system. You will examine these networks in more
mainframe network. Many businesses still use mainframe detail in Chapter 10.
computers to support their day-to-day operations. To
“connect” to a mainframe, a user employs hardware and
software that makes their computer act as a computer
Cloud Networks
terminal. A computer terminal, or terminal, consists of Cloud networks connect resources that are said to
essentially a keyboard and screen with no large hard reside “in the cloud.” In reality, the cloud is essentially
drives, no gigabytes of memory, and little, if any, processing remote access to virtualized resources hosted in a
power. Computer terminals are used for entering data into a software-defined environment. Let’s break this down
system, such as a mainframe computer, and then displaying a little. Virtualization means that software is used

Computer
terminal

Cable connecting
to mainframe

Figure 1-9 Using an ATM terminal (or thin-client workstation) to


perform a financial transaction

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
12 Chapter 1 Introduction to Data Communications and Computer Networks

Satellite

Home

Television Business
company Satellite
dish

Homes

Figure 1-10 Example of a television company using a satellite system


to broadcast television services into homes and businesses

to replicate the functions of hardware. For example, A cloud network relies on a similar type of virtualiza-
suppose you have a Windows computer like the one tion. A cloud hypervisor runs on top of a large collection
in Figure 1-11. You install virtualization software called of datacenter hardware, such as servers, routers,
a hypervisor on the Windows computer, and then you switches, and other devices. However, none of those
create a virtual machine (VM) in the hypervisor that physical devices are accessed directly by the cloud
functions as its own computer in a virtual environment. customer. The hypervisor abstracts the cloud network
It needs its own OS (operating system), like Windows, or functions away from the physical devices so the cus-
you can install a different OS, such as Linux. Figure 1-11 tomer only interacts with virtual resources, such as a vir-
shows a Linux VM on the right where it’s running on tual server. The cloud customer can create a new server
the Windows host computer. The hypervisor makes the VM, a process which is called “spinning up” a VM. From
Linux VM think it’s the only computer running on the the customer’s perspective, they’re creating a new server
available hardware. The hypervisor allocates hardware that might run Linux or Windows or some other operat-
resources to both the Linux VM and the Windows host. ing system. But the server is not an actual computer in

Hypervisor

Virtual
machine
running a
Source: Oracle Corporation

different OS
Source: Canonical Ltd.

Figure 1-11 A Linux VM running in a hypervisor on a Windows computer

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-3: Common Network Examples 13

a rack—it’s a virtual machine running in the hypervisor. ❯❯Protocols define the rules used by devices to
The cloud network can run many other virtualized communicate with each other over a network.
resources in the hypervisor, such as routing services
❯❯Routers and switches can be used to connect
or file storage services. You’ll learn more about these
devices across multiple LANs or segment traffic for
service types later in this chapter.
security or traffic management purposes.
Three primary types of cloud computing are as follows:
❯❯Smartphones often rely on cellular networks to
❯❯Public cloud—These virtualized resources are
connect to the Internet and to provide calling and
hosted by a CSP (cloud service provider) at a
texting services.
remote location. While access control restrictions
can protect these resources from unauthorized ❯❯Other kinds of networks include sensor networks,
access, the hosting services can be used by anyone. wireless networks that use satellite technologies,
For example, you might have files saved in a cloud and cloud networks that rely on virtualization.
storage service and only you can access them.
However, thousands of other customers might
use the same cloud storage service, and their files Self-check
might be stored on the same physical server where
5. What kind of protocols support addressing and
your files are stored. communication over the Internet?
❯❯Private cloud—These virtualized resources are a. DSL
hosted by the owner of the resources either in b. TCP/IP
its own datacenter or at a remote location. The c. LAN
resources and the hosting services can only be
d. PC
accessed by the owner.
6. You’re setting up a small office network with a
❯❯Hybrid cloud—In a hybrid cloud, virtualized few desktop computers and a file server. You
resources at a remote location and physical or vir- want to make sure only certain network users
tual resources in the local datacenter are connected have access to the file server. What device
and interact at a functional level that is invisible will you need to configure to segment the
to users. For example, you might sign into your network?
computer at your desk, you open an application, a. Switch
and then you create and save a file. However, the b. Cell phone tower
application might be running on a server in your c. Mainframe
company’s datacenter, and the file might be stored
d. Router
on a cloud-based server.
7. Your school hosts its own cloud to pro-
Cloud resources are collectively referred to as cloud vide students with virtual desktops. These
computing, as you read earlier in this chapter. You’ll desktops give students access to expensive
learn more about cloud computing throughout this software that most students couldn’t afford
textbook. to purchase on their own. Your school also
stores student files in a cloud service that
requires an Internet connection for students
Remember this… to access their files, even when they’re on
campus. What kind of cloud architecture is
❯❯Many kinds of networks exist, depending on the
your school using?
connection technologies used, the types of commu-
a. Public
nications the network supports, and the kinds of
b. Enterprise
devices connected to the network.
c. Hybrid
❯❯A client/server system provides client computers
d. Private
with a variety of services, such as a database, a
web page, email, files, or printing. Check your answers at the end of this chapter.

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
14 Chapter 1 Introduction to Data Communications and Computer Networks

Section 1-4: Network computer network must work together to produce a


product.
Architectures Second, does the choice of one piece depend on the
Now that you know the different types of networks, you choice of another piece? To make the pieces as modular
need a framework to understand how all the various as possible, you do not want the selection of one piece
components of a network interoperate. When some- to constrain the options for another piece. For exam-
one uses a computer network to perform a task, many ple, if you create a network and originally plan to use
pieces come together to assist in the operation. A one type of wiring but later change your mind and use
network architecture, or communications model, places a different type of wiring, will that decision affect your
the appropriate network pieces in layers. The layers choice of word processor? Such an interaction would
define a model for the functions or services that need seem highly unlikely. In contrast, can the choice of wir-
to be performed. Each layer in the model defines what ing affect the options for the protocol that checks for
services either the hardware or software (or both) errors in the data sent over the wires? The answer to
provides. The two most common architectures known this question is not as obvious.
today are the TCP/IP protocol suite and the OSI (Open To keep the pieces of a computer network work-
Systems Interconnection) model. The TCP/IP protocol ing together harmoniously, and to allow modularity
suite is a working model (currently used on the Internet), between the pieces, national and international orga-
while the OSI model (originally designed to be a working nizations developed network architectures, which are
model) has been relegated to a theoretical model. You cohesive layers of protocols defining a set of commu-
will learn about these two architectures in more detail nication services. Consider the following noncomputer
throughout the rest of this section. But first you should example. Most organizations that produce some type of
know a bit more about the components of a network product or perform a service have a division of labor.
and how a network architecture helps organize those Office assistants do the administrative work, accoun-
components. tants keep the books, laborers perform manual duties,
Consider that a typical computer network within a busi- scientists design products, engineers test the products,
ness contains the following components that must inter- and managers control operations. Rarely is one person
act in various ways: capable of performing all these duties. Large software
applications operate the same way. Different procedures
❯❯Wires
perform different tasks, and the whole system would
❯❯Printed circuit boards not function without the proper operation of each of its
parts. Computer network applications are no exception.
❯❯Wiring connectors and jacks
As the size of the applications grows, the need for a divi-
❯❯Computers sion of labor becomes increasingly important. Computer
❯❯Centrally located wiring concentrators
network applications also have a similar delineation
of job functions. This delineation is the network archi-
❯❯Storage drives tecture. Now you’re ready to examine the two network
❯❯Computer applications such as word processors, architectures or models in more detail: the TCP/IP pro-
email programs, and software for accounting, tocol suite, followed by the OSI model.
marketing, and ecommerce
❯❯Computer software that supports the transfer of The TCP/IP Protocol Suite
data, checks for errors when the data is transferred,
The TCP/IP protocol suite was created by a group of
allows access to the network, and protects user
computer scientists to support a new type of network
transactions from unauthorized viewing
(the ARPANET) being installed across the United States
This large number of network components and their in the 1960s and 1970s. The goal was to create an open
possible interactions inspires two questions. First, how architecture that would allow virtually all networks to
do all these pieces work together harmoniously? You inter-communicate. The design was based on several
do not want two pieces performing the same function, layers in which the user would connect at the upper-
or no pieces performing a necessary function. Like the most layer and would be isolated from the details of the
elements of a well-oiled machine, all components of a electrical signals found at the lowest layer.

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-4: Network Architectures 15

The number of layers in the suite is not static. In fact, A common network application is email. An email com-
some books present the TCP/IP protocol suite as four munication that sends and accepts the message, “Blake,
layers, while others present it as five. Even then, differ- how about lunch? Najma,” has many steps. Let’s look at a
ent sources use different names for each of the layers. simple analogy, as illustrated in Figure 1-13, to understand
This textbook defines five layers, as shown in Figure 1-12: how the layers of the TCP/IP protocol suite work together
application, transport, network, data link, and physical. to support this email message. Think of each layer of the
TCP/IP suite as a worker. Each worker has its own job
Note that the layers do not specify precise protocols
function, and Figure 1-13 shows how these workers coop-
or exact services. In other words, the TCP/IP protocol
erate to create a single package for transmission. Using
suite does not tell you, for example, what kind of wire or
the TCP/IP protocol suite, the steps might look like the
what kind of connector to use to connect the devices of
following:
a network. That choice is left to the designer or imple-
menter of the system. Instead, the suite simply says that ❯❯The email “application worker” prompts the user to
if you specify a type of wire or a specific connector, you enter a message and specify an intended receiver. The
do that in a particular layer. In addition, each layer of application worker would create the appropriate data
the TCP/IP protocol suite provides a service for the next package with message contents and addresses, and
layer. For example, the transport layer makes sure the send it to a “transport worker,” who is responsible for
data received at the very end of a transmission is exactly providing overall transport integrity.
the same as the data originally transmitted, but it relies
❯❯The transport worker might establish a connection
upon the network layer to find the best path for the data
with the intended receiver, monitor the flow
to take from one point to the next within the network.
between sender and receiver, and perform the
With each layer performing its designated function, the
necessary operations to recover lost data in case
layers work together to allow an application to send its
data over a network of computers. some data disappears or becomes unreadable.
❯❯The network worker would then take the data
package from the transport worker and might add
Application routing information so that the data package can
Transport find its way through the network.
❯❯Next to get the data package would be the data link
Network
worker, who would insert error-checking informa-
Data link tion and prepare the data package for transmission.

Physical ❯❯Finally, the physical worker would transmit the data


package over some form of wire or through the air
Figure 1-12 The five layers of the TCP/IP protocol suite using radio waves.

Message
with
Message
transport
information
Application Transport
User worker worker

Message Message with


with transport
transport information, 10110111...
information and network address,
Network network address Data link and error- Physical
worker worker checking data worker

Figure 1-13 Several kinds of workers perform their job duties at each layer in the model

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
16 Chapter 1 Introduction to Data Communications and Computer Networks

Application Layer between the endpoints of a network connection. In


other words, these layers perform their operations only
Now that you understand the big picture, let’s examine
at the beginning point and ending point of the network
each layer in more detail. The top layer of the TCP/IP
connection. The remaining three layers of the TCP/IP
protocol suite, the application layer, supports appli-
protocol suite—the network, data link, and physical
cations and might in some cases include additional
layers—are not end-to-end layers. They perform their
services such as encryption or compression. Note that
operations at each node (or device) along the network
user applications, such as a browser or word process-
path, not just at the endpoints.
ing application, don’t reside in the application layer
themselves. These applications rely directly on support
provided by protocols that function within the applica- Network Layer
tion layer. The TCP/IP application layer includes several
TCP/IP’s network layer, sometimes called the Internet
frequently used protocols:
layer or IP layer, is used to transfer data within and
❯❯HTTP (Hypertext Transfer Protocol) allows web between networks. IP (Internet Protocol) is the software
browsers and servers to send and receive web pages. that prepares a packet of data so that it can move from
one network to another on the Internet or within a set
❯❯SMTP (Simple Mail Transfer Protocol) allows users
of corporate networks. As this layer sends the packet
to send and receive email.
from node to node, it generates the network addressing
❯❯FTP (File Transfer Protocol) transfers files from one necessary for the system to recognize the next intended
computer system to another. receiver. IPv4 (version 4) uses a 32-bit IP address, while
❯❯SSH (Secure Shell) allows a remote user to securely IPv6 uses a 128-bit IP address. To choose a path through
log in to another computer system. the network, the network layer determines routing infor-
mation and applies it to each packet or group of packets.
❯❯SNMP (Simple Network Management Protocol)
allows the numerous elements within a computer
network to be managed from a single point. Data Link Layer
The next lower layer of the TCP/IP protocol suite is
the data link layer, which is also sometimes referred to
Transport Layer
as the network access layer or the link layer. Where
The TCP/IP transport layer commonly uses TCP (Trans- the network layer deals with passing packets across
mission Control Protocol) to maintain an error-free end- the Internet, the data link layer is the layer that gets the
to-end connection. To maintain this connection, TCP data from the user workstation to the router connected
includes error control information in case one packet to the Internet. In most cases, the connection that gets
from a sequence of packets does not arrive at the final the data from the user workstation to the Internet is a
destination, and packet sequencing information so that LAN. Thus, the data link layer prepares a frame, or data
all the packets can be sorted into the proper order as packet, for transmission from the user workstation to
they’re received. The transport layer performs end- a router sitting between the LAN and the Internet. This
to-end error control and end-to-end flow control, which frame contains an identifier that signals the beginning
ensures that the rate of transmitted packets does not and end of the frame, as well as spaces for control infor-
overwhelm the device at the receiving end. This means mation and address information. In addition, the data
the transport layer is not in use while the data packet link layer can incorporate some form of error detection
is hopping from point to point within the network—it is software. If an error occurs during transmission, the
used only at the two endpoints of the connection. data link layer is responsible for error control, which it
does by informing the sender of the error. The data link
TCP is not the only possible protocol found at the TCP/IP
layer might also perform flow control. In a large network
transport layer. UDP (User Datagram Protocol) is an alter-
where the data hops from node to node as it makes its
native also used, though less frequently, in the TCP/IP
way across the network, flow control ensures that one
protocol suite. UDP does not provide the same kind of
node does not overwhelm the next node with too much
error control that TCP does and is most often used with
data. Note that these data link operations are quite
streaming data, such as music or videos.
similar to some of the transport layer operations. The
The two layers described so far are called end-to-end primary difference is that the transport layer performs
layers. They are responsible for the data transmitted its operations only at the endpoints, while the data link

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-4: Network Architectures 17

layer performs its operations at every stop (node) along both this architecture and the OSI model. Many books
the path. This is also the last layer before the data is and articles, when describing a product or a protocol,
handed off for transmission across the medium. often refer to the OSI model with a statement such as,
“This product is compliant with OSI layer x.” If you do
not become familiar with the various layers of the OSI
All Things Considered model and the TCP/IP protocol suite, you will struggle to
understand more advanced concepts in the future.
Thought Experiment
The OSI model defines seven layers, as shown in
If the data link layer provides error checking and
Figure 1-14. Note further the relationship between the
the transport layer provides error checking, isn’t this
five layers of the TCP/IP protocol suite and the seven
redundant? Why or why not? Explain your answer.
layers of the OSI model. As you examine descriptions of
each of the OSI layers next, consider how their functions
Physical Layer compare to the corresponding TCP/IP layer:

The bottom-most layer in the TCP/IP protocol suite ❯❯The top layer in the OSI model is the application
(according to the layers as defined in this discussion) layer, which provides protocols to support applica-
is the physical layer. The physical layer is where the tions using the network. Notice again that these pro-
actual transmission of data occurs. As noted earlier, this tocols provide a support function—they are not the
transmission can be over a physical wire, or it can be applications themselves, which do not reside on the
a radio signal transmitted through the air. To perform network model. This OSI layer is similar to the appli-
this transmission of bits, the physical layer handles cation layer in the TCP/IP protocol suite.
voltage levels, plug and connector dimensions, pin con-
❯❯The next layer in the OSI model, the presentation
figurations, and other electrical and mechanical issues.
layer, performs a series of miscellaneous functions
Furthermore, because the digital or analog data is
necessary for presenting the data package properly
encoded or modulated onto a digital or analog signal at
to the sender or receiver. For example, the pre-
this point in the process, the physical layer also deter-
mines the encoding or modulation technique to be used sentation layer might perform ASCII-to-non-ASCII
in the network. Note that some people combine the data character conversions, encryption and decryption
link layer and physical layer into one layer. of secure documents, and the compression of data
into smaller units. There is no separate presentation
Having distinctly defined layers enables you to “pull out” layer in the TCP/IP protocol suite, as these functions
a technology used at one layer and insert an equivalent are wrapped into the TCP/IP application layer.
technology into that layer without affecting the other
layers. For example, assume a network was designed for ❯❯The session layer is another layer that does not
copper-based wire. Later, the system owners decide to exist separately in the TCP/IP protocol suite and
replace the copper-based wire with fiber-optic cable. is responsible for establishing sessions between
Even though a change is being made at the physical layer, users. It also can support token management, a
it should not be necessary to make any changes at any service that controls which user’s computer talks
other layers. In reality, however, a few relationships exist during the current session by passing a software
between the layers of a communication system that cannot
be ignored. For example, if the physical organization of a
LAN is changed (say from a wired network to a wireless net- OSI model TCP/IP protocol suite
work), it is likely that the frame description at the data link Application
Presentation Application
layer also will need to be changed. (You will examine this
phenomenon in Chapter 4.) The TCP/IP protocol suite rec- Session
ognizes these relationships and merges many of the ser- Transport Transport
vices of the physical and data link layers into one layer. Network Network
Data Link Data link

The OSI Model Physical Physical

Although the TCP/IP protocol suite is the model of choice Figure 1-14 The seven layers of the OSI model
for almost all installed networks, it is important to study compared to the five layers of the TCP/IP protocol suite

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
18 Chapter 1 Introduction to Data Communications and Computer Networks

token back and forth. Additionally, the session Logical


layer establishes synchronization points, which are connections
Application Application
backup points used in case of errors or failures. For
Transport Transport
example, while transmitting a large document such
Network Network
as an ebook, the session layer might insert a syn-
Data link Data link
chronization point at the end of each chapter. If an
error occurs during transmission, both sender and Physical Physical
Physical
receiver can back up to the last synchronization Sender connection Receiver
point (to the beginning of a previously transmitted
Figure 1-15 Sender and receiver communicating
chapter) and start retransmission from there. Many
using the TCP/IP protocol suite
network applications do not include a specific ses-
sion layer and do not use tokens to manage a con-
versation. If they do, the “token” is inserted by the
and data link layers. No data flows over these dashed
application layer, or possibly the transport layer,
lines. Each dashed line indicates a logical connec-
instead of the session layer. Likewise, if network
tion. A logical connection is a nonphysical connection
applications use synchronization points, these between sender and receiver that allows an exchange of
points often are inserted by the application layer. commands and responses. The sender’s and receiver’s
❯❯The fourth layer in the OSI model, the transport transport layers, for example, share a set of commands
layer, operates in the same way as the transport used to perform transport-type functions, but the actual
layer of the TCP/IP protocol suite. It ensures that the information or data must be passed through the lower
data packet arriving at the final destination is identi- layers of the sender and receiver, as there is no direct
cal to the data packet that left the originating station. connection between the two transport layers. Without
a logical connection, the sender and receiver would
❯❯The network layer of the OSI model is similar to the not be able to coordinate their functions. The physical
network layer of the TCP/IP protocol suite and is connection is the only direct connection between
responsible for getting the data packets from router sender and receiver, and is at the physical layer, where
to router through the network. actual 1s and 0s—the digital content of the message—
❯❯The data link layer, similar to TCP/IP’s data link layer, are transmitted over wires or airwaves.
is responsible for taking data from the network layer For an example of logical and physical connections,
and transforming it into a frame. It also handles consider what happens when you want to buy a house.
addressing between devices within a LAN. Typically, you won’t call homeowners directly. You’ll
❯❯The bottom layer in the OSI model—the physical first contact a real estate agent, who will show you
layer—handles the transmission of bits over a several houses. Once you pick your favorite, you still
communications channel. This layer is essentially won’t communicate directly with the homeowner—
identical to the physical layer of the TCP/IP your real estate agent will call the homeowner’s agent.
To negotiate the sales price, you and the homeowner
protocol suite.
will communicate through your respective agents as
representatives of the best interests for each party.

Logical and Physical Figure 1-16 shows how this communication relies on
layers of people and technology to send messages back
Connections and forth during the negotiation.
An important concept to understand with regard to the
Note that the data did not flow directly between you
layers of a communication model is the lines of com-
and the homeowner; nor are the real estate agents
munication between a sender and a receiver. Consider
likely to see each other face-to-face for the majority of
Figure 1-15, which shows the sender and receiver using
these communications. Instead, the data had to flow
a network application designed on the TCP/IP protocol
down to the physical layer (in this case, the agents’
suite.
smartphones) and then back up the other side. At
Notice the dashed lines between the sender’s and receiv- each layer in the process, information that might be
er’s application layers, transport layers, network layers, useful to the “peer” layer on the other side was added

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-4: Network Architectures 19

with end-to-end error control and end-to-end flow con-


Home buyer Home owner
trol, and it provides the transport-layer address of the
receiving application on the web server (which likely is
running several applications, and so each application
Real estate agent Real estate agent has its own address called a port).

The enlarged packet is now sent to the network layer,


where IP adds its header. The information contained
Smartphone Smartphone within the IP header assists the IP software on the
receiving end, and it assists the IP software at each
Figure 1-16 Flow of data through the layers of intermediate node (router) during the data’s progress
bureaucracy through the Internet. This assistance includes providing
the Internet address of the web server that contains the
requested web page.
(such as information about the house’s address or
information about the other agent’s phone number). The packet is now given to the data link layer. Because
While this example illustrates the concept of layered the user’s computer is connected to a LAN, the appro-
communications, it is a bit overly simplified. There- priate LAN headers are added. Note that sometimes,
fore, let’s examine a more realistic example in which a in addition to headers, control information is added to
person using a web browser requests a web page from the end of the data packet as a trailer. One of the most
somewhere on the Internet. important pieces of information included in the data
link header is the address of the device (the router) that
connects the LAN to the Internet.
All Things Considered Eventually, the binary 1s and 0s of the data packet are
transmitted across the user’s LAN via the physical
Thought Experiment layer, where they encounter a router. The router serves
Recall a job you have had or still have. Was a chain of as the gateway to the Internet. The router removes the
command in place for getting tasks done? If so, draw data link header and trailer. The information in the IP
that chain of command on paper or using a drawing header is examined, and the router determines that the
app. How does this chain of command compare to data packet must go out to the Internet. New data link
either the OSI model or the TCP/IP protocol suite? header information, which is necessary for the data
packet to traverse the Internet to the next router, is
applied, and the binary 1s and 0s of the data packet are
The TCP/IP Protocol Suite in placed onto the WAN connection.

Action As the data packet moves across the Internet, it will


A more detailed and more challenging example of a request eventually arrive at the router connected to the LAN
for a service moving through the layers of a communica- that contains the desired web server. This remote
tions model will help make the involved concepts clearer. router removes the WAN information, sees that the
Consider Figure 1-17, in which a user browsing the Internet packet must be placed on its LAN, and inserts the LAN
on a personal computer requests a web page to be down- header and trailer information. The packet is placed
loaded and then displayed on their screen. onto the LAN; using the address information in the data
link header, it travels to the computer holding the web
Beginning in the upper-left corner of the figure, the server application. As the data packet moves up the
process is initiated when the user clicks a link on the layers of the web server’s computer, the data link, IP,
current web page. In response, the browser software and TCP headers are removed. The web server appli-
(the application) creates a Get web page command cation receives the Get web page command, retrieves
that is given to the browser’s transport layer, TCP. the requested web page, and creates a new data packet
TCP adds a variety of header information to be used with the requested information. This new data packet
by the TCP software on the receiving end. Added to now moves down the layers and back through the rout-
the front of the packet, this information will be used to ers to the user’s network and workstation. Finally, the
control the transfer of data. This information assists web page is displayed on the user’s monitor.

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
20 Chapter 1 Introduction to Data Communications and Computer Networks

User
Web browser application
Get web page

Transport layer
TCP Get Local router
header web page
Network layer
Network layer
IP TCP Get
IP TCP Get header header web page
header header web page

Data link layer Data link layer Data link layer


Data IP TCP Get Data Data IP TCP Get Data Data IP TCP Get
link header header header web page link trailer link header header header web page link trailer link header header header web page

Local LAN WAN

Web server application

Get
web page Web
page

Transport layer
TCP Get
Remote router header web page

Network layer Network layer


IP TCP Get IP TCP Get
header header web page layer layer web page

Data link layer Data link layer Data link layer


Data IP TCP Get Data IP TCP Get Data Data IP TCP Get Data
web web web
link header header header page link header header header page link trailer link header header header page link trailer

Remote LAN

Figure 1-17 Path of a web page request as it flows from browser to Internet web server and back

It is interesting to note that, as a packet of data flows down error control, flow control, and network addressing. The
through a model and passes through each layer of the sys- addition of control information to a packet as it moves
tem, the data packet grows in size. This growth is attribut- through the layers is called encapsulation. Note also that,
able to the fact that each layer adds more information to as the packet moves up through the layers, the data packet
the original data. Some of this layer-added information is shrinks in size as each layer removes the header it needs
needed by the nodes in the data packet’s path, and some is to perform its job. Once the job is complete, the header
required by the data packet’s final destination. This infor- information is discarded and the smaller packet is handed
mation aids in providing services such as error detection, to the next highest layer.

Details The Internet’s Request for Comment (RFC)

Network models, like communications protocols, com- revised and improved. An Internet standard is a tested
puter hardware, and application software, continue to specification that is both useful and adhered to by users
evolve daily. The TCP/IP protocol suite is a good example who work with the Internet. Consider the path a proposal
of a large set of protocols and standards constantly being must follow on the way to becoming an Internet standard.

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-4: Network Architectures 21

All Internet standards start as an Internet draft, which is a pre- ❯❯ Associated with ISOC is the IAB (Internet Architecture
liminary work in progress. One or more internal Internet com- Board), which is the technical advisor to ISOC. Under
mittees work on a draft, improving it until it is in an acceptable the IAB are two major committees:
form. When Internet authorities feel the draft is ready for the
❯ The IETF (Internet Engineering Task Force) man-
public, it is published as an RFC (Request for Comment), a
ages the working groups that create and support
document open to all interested parties. The RFC is assigned
functions such as Internet protocols, security, user
a number, and it enters its first phase: proposed standard. A
services, operations, routing, and network
proposed standard is a proposal that is stable, of interest to
management.
the Internet community, and fairly well understood. The spec-
ification is tested and implemented by different groups, and ❯ The IRTF (Internet Research Task Force) manages the
the results are published. If the proposal passes at least two working groups that focus on the long-range goals
independent and interoperable implementations, the pro- of the Internet, such as architecture, technology,
posed standard is elevated to draft standard. If, after feedback applications, and protocols.
from test implementations is considered, the draft standard
experiences no further problems, the proposal is finally ele- Internet committees are not the only groups that create pro-
vated to Internet standard. tocols or approve standards for computer networks, data
If, however, the proposed standard is deemed inappropriate communications, and telecommunications. Another organi-
at any point along the way, it becomes an historic RFC and zation that creates and approves network standards is the
is kept for historical perspective. (Internet standards that ISO (International Organization for Standardization),
are replaced or superseded also become historic.) An RFC which is a multinational group composed of volunteers from
also can be categorized as experimental or informational. In the standards-making committees of various governments
these cases, the RFC in question probably was not meant to throughout the world. ISO is involved in developing stan-
be an Internet standard, but it was created either for experi- dards in the field of information technology and created the
mental reasons or to provide information. Figure 1-18 shows OSI (Open Systems Interconnection) model for a network
the levels of progression for an RFC. architecture.

It is possible to obtain a printed listing of each RFC. See the


IETF’s (Internet Engineering Task Force) website at ietf.org/
rfc/ for the best way to access RFCs. Note
The Internet is managed by the work of several committees, The shortened name for the International Organiza-
as described next: tion for Standardization, ISO, is derived from a Greek
word meaning equal and is not an acronym of the
❯❯ The topmost committee is the ISOC (Internet Society).
longer name.
ISOC is a nonprofit, international committee that pro-
vides support for the entire Internet standards-making
process.
Other standards-making organizations include the following:

❯❯ ANSI (American National Standards Institute)—A


Historic
private, nonprofit organization not associated with
the U.S. government, ANSI strives to support the U.S.
Internet standard
economy and protect the interests of the public by
encouraging the adoption of various standards.
Draft standard
Defeated ❯❯ ITU-T (International Telecommunication Union-Tele-
standard communication Standardization Sector)—For-
Proposed standard Defeated
standard merly the Consultative Committee on International
Telegraphy and Telephony (CCITT), ITU-T is devoted
Internet draft to the research and creation of standards for tele-
communications in general, and telephone and data
systems in particular.
Figure 1-18 Levels of progression as an RFC moves
toward becoming a standard

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
22 Chapter 1 Introduction to Data Communications and Computer Networks

❯❯IEEE (Institute of Electrical and Electronics electronics, and radio. Of particular interest is the
Engineers)—The largest professional engineering work IEEE has performed on standardizing local area
society in the world, IEEE strives to promote the networks.
standardization of the fields of electrical engineering,

Remember this… 10. A rat chews through a cable connecting two


switches on your network. What layer of the OSI
❯❯Networks rely on a modular design based on vari- model has been compromised?
ous levels of functionality so that changes can be a. Application
made at one layer without greatly affecting any b. Transport
other layer. c. Network
❯❯The TCP/IP protocol suite defines four or five d. Physical
layers, the names of which can vary depending on
Check your answers at the end of this chapter.
the source. This text labels five layers: application,
transport, network, data link, and physical.
❯❯The OSI model defines seven layers: application, Section 1-5: Cloud
presentation, session, transport, network, data link,
and physical.
Computing
❯❯A logical connection identifies a conversation
Throughout this course, you’ll learn about cloud comput-
ing systems in the context of networking and data com-
between the sender and receiver at each layer of
munications. While cloud computing is a relatively recent
communication, while a physical connection shows
technological innovation, it’s touching nearly every area of
a direct connection between sender and receiver
IT and, in many ways, revolutionizing the way datacenters
at the layer where actual 1s and 0s are transmitted
and networks function. Why is this the case? Essentially,
over wires or airwaves.
cloud computing provides a new way of running a compa-
❯❯A message moves up and down the TCP/IP layers ny’s IT resources. Cloud computing relies on the abstrac-
as it interacts with each protocol to carry informa- tion of compute, network, security, and storage functions
tion from one hop to the next across one or more away from the underlying physical hardware in ways that
networks. give network admins and other IT professionals almost
unlimited resources at affordable prices. Let’s start to
break this concept down into bite-size pieces so you can
Self-check see the significance of what cloud computing offers.

8. Which of these protocols do network admins


use to help them identify problems on a Cloud Computing
network? Characteristics
a. HTTP
b. SMTP
c. FTP Cloud Essentials+ Exam Tip
d. SNMP This section discusses cloud characteristics, which is
9. Which OSI layer provides address information required by
for a message to travel from a workstation to a •• Part of Objective 1.1: Explain cloud principles.
router?
•• Part of Objective 1.4: Summarize important
a. Physical
aspects of cloud design.
b. Data link
•• Part of Objective 2.4: Identify the benefits or
c. Network
solutions of utilizing cloud services.
d. Transport

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-5: Cloud Computing 23

To begin, you need a solid understanding of what advertising campaign. With traditional computing,
characteristics define cloud computing and distinguish you would have to purchase additional servers
these technologies from more traditional options. NIST many months ahead of time, and then spend hours
(National Institute of Standards and Technology) and installing and configuring the servers in preparation
similar organizations refer to the following characteris- for a temporary traffic spike. After the campaign,
tics to differentiate cloud computing from other types of the servers would no longer be needed, thereby
IT resources: wasting a lot of money. Elastic cloud resources can
❯❯Scalability refers to the ability of resources to be be temporarily increased only for the few days you
adjusted over time in response to changing needs. need them, and then decreased as the traffic
Scalable resources can be increased or decreased volume declines.
either vertically or horizontally. For example, sup- ❯❯Pay-as-you-go means the customer only pays for
pose a new doctor’s office buys one server to hold the resources they use. For example, when the
their patient database. As their customer base customer no longer needs extra servers to handle
grows, the database will continue to increase in increased traffic from the weekend advertising
size. Figure 1-19 illustrates two options for how to campaign, those extra servers are terminated and
handle the growing demand. Vertical scaling would no longer accrue charges. The cloud customer
add more resources to the server, such as storage does not have to pay for resources they’re not
and memory, to increase its capacity, while hori- using.
zontal scaling would add more servers to help host
❯❯Self-service resources can be increased, decreased,
the database. With physical servers, this scaling
or otherwise altered by the customer without hav-
up or scaling out is time-consuming and costly;
ing to involve the cloud service provider. In many
cloud services are designed with scalability as a
cases, the customer can configure these processes
primary feature that can be performed quickly and
to happen automatically.
even automatically, with little to no interruption in
service. ❯❯Broad network access refers to a customer’s
ability to access and configure cloud resources
❯❯Elasticity means that resources can be increased or
from any Internet-connected computer. In other
decreased quickly in response to changing needs,
words, a technician or administrator does not
and in many cases, these shifts can be configured
have to be onsite at the cloud datacenter to make
to occur automatically. Suppose you anticipate a
changes to their company’s cloud resources. A
huge increase in website traffic during a weekend
company’s IT team can access and control their
cloud resources from home, from the company’s
own location, or from anywhere else where they
have Internet access.

Scale up

Note
Access to a customer’s cloud console can be restricted
to one or more specific locations based on IP address.
However, this is a security measure, not a limitation of
cloud capabilities.

Scale out ❯❯Availability refers to a cloud resource’s ability


to withstand losses or outages while minimizing
disruption of service. High availability (HA) is the
expectation that a service will be accessible for
Figure 1-19 Resources can be scaled vertically by a certain percentage of time over the course of a
increasing an existing resource’s capacity or horizon- year or a month and is usually listed by the number
tally by increasing the number of resources available of 9s, such as 99.9% (“three nines”) or 99.9999%

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
24 Chapter 1 Introduction to Data Communications and Computer Networks

(“six nines”). For example, if a service is down (SPOFs), such as a network connection or a server,
for less than 5.26 minutes per year, that service are duplicated. If one of these resources goes
is said to have 99.999%, or five nines, availability. down, the other can take over and keep the system
HA is achieved by providing redundancy within a functioning.
system, which means that single points of failure

Note
Various cloud services and ISPs offer three nines, four nines, five nines, or better availability, depending on what’s
defined in their SLAs (Service-Level Agreements), which is a legally binding contract or part of a contract that defines
certain aspects of a service. When shopping for cloud services, examine the SLA carefully so you’ll know what parts of a
service are guaranteed to be available.

However, be aware there’s a difference between availability (the ability to access a resource) and durability (the
resource’s ongoing existence). For example, AWS lists its storage service, S3, at 99.999999999% durability (that’s 11
nines!), but S3’s availability is 99.99% for its Standard storage class. Why the discrepancy?

That 11 nines durability means you could store 10,000,000 objects in S3 and expect to lose one of those objects every
10,000 years on average (okay, not bad). This is because S3 stores each object on multiple devices in multiple, physical
datacenters. The four nines availability means that, each year on average, there should only be 52.6 minutes when you
can’t get to your objects in S3—this is also pretty good, considering you can relax in knowing that your stored data isn’t
lost during that 52 minutes, even if you can’t get to it for a bit.

Similar terms include reliability, which refers to how well a resource functions without errors, and resiliency, which
refers to a resource’s ability to recover from errors even if it becomes unavailable during the outage.

Cloud Service Models cloud environment. SaaS solutions tend to be highly


scalable and require little to no understanding of
the underlying architecture. SaaS applications also
Cloud Essentials+ Exam Tip can be accessed from almost any kind of computer
or mobile device. If you’ve used Google Docs or
This section discusses cloud service models, which is
Dropbox, you’ve used SaaS. These cloud-based
required by
applications offer some level of configurability for
•• Part of Objective 1.1: Explain cloud principles.
the user or the administrator but provide no access
to the underlying hardware, software, or virtualized
Now that you’ve read about the characteristics that resources supporting the application.
are common to all cloud deployments, you’re ready ❯❯PaaS (Platform-as-a-Service), pronounced pass,
to learn about ways to differentiate various types of
requires more technical skill and often serves
cloud services. You can think about each cloud ser-
professional or hobbyist application developers
vice as a building block where you select the types of
or website developers. PaaS allows some under-
blocks that you need for your structure and connect
lying configurability, but developers can mostly
them to work together. It helps to first think about
focus on their development work without having
these services in high-level categories, as described
to devote time to managing a network infrastruc-
next:
ture. Imagine if you could develop an application
❯❯SaaS (Software-as-a-Service), pronounced sass, is without having to manage and update a server’s
the type of cloud service most users are familiar with operating system. This is one of the primary
and provides access to an application that runs in the advantages of PaaS.

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 1-5: Cloud Computing 25

❯❯IaaS (Infrastructure-as-a-Service), pronounced i-as, The progression of these categories reveals the fact that
requires the most technical skill for configuring cloud customers and cloud providers each take part of
cloud resources. While the customer cannot access the responsibility for managing and configuring cloud
the underlying hardware, IaaS allows the cloud cus- resources. As you can see in Figure 1-22, the placement
tomer to perform deep configurations to the cloud of that dividing line determining who is responsible for
environment where they can most closely replicate what varies with the type of cloud service. In fact, this is
a physical datacenter in the cloud, complete one of the points that must be carefully studied and under-
stood by cloud professionals for each service they use. It’s
with virtual servers, firewalls, routers, and load
important for cloud customers to know and consider what
balancers.
kinds of management tasks they must perform on their
Notice that each of these categories varies on the type cloud services, what security precautions they must take,
of person who would use a solution from that category. and what kinds of customization changes they can make.
Figure 1-20 shows how each of these service models This reality is complicated by the fact that each cloud
varies in the type of user the service is targeted to, and service provider handles the division of labor a little differ-
Figure 1-21 shows the different levels of technical skill ently. For this reason, cloud professionals often specialize
required for each service model. in one or a handful of cloud providers and service types.

SaaS Users

PaaS Application developers

IaaS Network architects

Figure 1-20 SaaS services are more immediately acces-


sible to a wide market of users than other categories of
cloud services

SaaS Email, social media, online games, CRM

PaaS Web-hosted databases, web servers

IaaS Cloud storage, web-hosted VMs

Figure 1-21 IaaS customers must understand more


about configuring their cloud infrastructure—and they have
more control—than do SaaS customers

Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Another random document with
no related content on Scribd:
“Trevor has a good deal on his hands,” she reminded herself
however, “and of course he will know it does not matter if he misses
one dance with me. We have two still—one other waltz.”
So the face was still sweet and unruffled, the eyes guiltless of
reproach, when, at the very end of the waltz—when the last notes of
the inviting Zuleika were dying away—the laggard partner made his
appearance. He looked flushed and discomposed, and evidently
conscious that he deserved a scolding.
“I am so sorry, so very sorry,” he began. “I was coming here to
look for you, but I hadn’t got rid of my last partner, and the music
began before I expected, and we found ourselves regularly hemmed
in. We took a turn to get clear, and then I had to get Ge—, my
partner, an ice, and now it is too late!”
“Never mind,” said Cicely brightly. “What does it matter? I have
kept two others for you.”
Trevor looked at her with a curious mixture of expressions in his
face. “My dear old Cit,” he said, reverting to a pet name of long ago,
“you are awfully sweet-tempered.” Then a frown gathered over his
face. Whose soft voice had whispered in his ear a minute before?
—“Do not please tell my cousin you were just now dancing with me.
It might—it might vex her. She thinks sometimes I forget too much I
am but a stranger. I would not that she should think I knew this was
the waltz you should dance with her.”
Cicely did not see the frown. She only heard the pleasant words.
“Am I?” she said. “I don’t know that it is true, but any way I like you to
think so. By the bye, how is Geneviève getting on? I have not seen
her for ever so long.”
“Oh! she’s all right. She’s had any number of partners,” replied Mr.
Fawcett hastily, as he ran off to fulfil his next engagement—this time
probably with some less long-suffering damsel than Miss Methvyn. In
the doorway he almost knocked over a small man, quietly making his
way in. “I beg your pardon,” he exclaimed. “Ah! Hayle, is it you? Why
are you so late?”
“I could not come earlier,” replied Mr. Hayle. “Is Miss Methvyn
here?”
“Yes, in the little drawing-room,” said Trevor, as he disappeared.
Mr. Hayle peered about till he caught sight of Cicely.
“How late you are, Mr. Hayle!” she exclaimed. “I suppose you
don’t care about balls though.”
“Not much. I have hardly any experience of them. But I could not
come earlier to-night. I have been at Notcotts till half an hour ago,”
he answered.
“Is anything wrong there?”
“No,—this is the evening I have fixed for my class there. That is
what I wanted to ask you about. We are rather at a loss for some
books. Would you mind letting me look over again some of those you
offered me before?”
“Certainly,” said Cicely, “you can have any of them you like.”
Then Mr. Hayle proceeded to relate to her, as he had got into the
habit of doing, the small chronicle of his difficulties, hopes, and fears.
Cicely listened with interest—she had found it quite possible to like
and respect the boy-faced clergyman, and there was plenty of
common ground on which they could meet without jarring. But half
an hour before, she could not have listened without impatience to the
history of the Notcott’s night-school, the shortcomings of the choir,
the ever-increasing necessity for the renovation of Lingthurst church.
Whence had the sunshine come again? Trevor had called her his
“dear old Cit; it was all nonsense and fancy” about his being
changed.
Mr. Hayle did not dance, but he escorted Miss Methvyn in to
supper instead. Then he had to resign his charge to the partner to
whom she was engaged for the next dance.
It happened to be Mr. Dangerfield. The poor young man could talk
of nothing but Geneviève.
“She’s so awfully pretty,” he said. “What a pity she can’t speak
English. I didn’t know she was your cousin till just now, when one of
the officers from Haverstock asked me if I couldn’t get him an
introduction to Miss Methvyn; and being such old friends, of course I
said yes. And we were steering away towards you, you know, when
he holla’ed out to me to stop, and I found out it was your cousin he
meant. He said the Miss Methvyn who was engaged to Fawcett, so
of course I thought it was all right. She—your cousin I mean—was
dancing with Fawcett at the time, so Captain Burnett had made the
mistake. Fawcett put it all right, but I couldn’t catch your cousin’s
name—Castle, isn’t it? only that doesn’t sound like a French name.”
“Casalis,” corrected Cicely, smiling. She had known young
Dangerfield all her life, and had rather liked him for his unaffected
good nature, and been tolerant of his matter of-fact prosiness. This
evening however, long before her dance with him was over, she
began to think he must surely have grown heavier and more stupid
than of old. Could he find nothing else to talk about than Geneviève
and that absurd mistake of Captain Burnett’s?
But even the slowest of dances “wears through” at last. Cicely’s
next engagement was to one of the aforesaid officers from
Haverstock—a quiet man—who danced little but talked sensibly, and
did not seem, like every one else this evening, to have had his head
turned by Miss Casalis. And when his dance was over, Cicely began
to feel tired in earnest. She sat down in the corner where she had
been before, resolving not to dance any more—“at least,” she said to
herself, “not unless Trevor very much wants to make up for the waltz
we missed. I wonder what has become of him? I did not see him
dancing the last at all. And Geneviève? She is engaged to Fred
Dangerfield again for this one, I think he told me. No, there he is,
talking to Miss Falconer. Where can Geneviève be?”
Her speculations were interrupted by Mr. Hayle, who, with great
satisfaction, had spied her out again in her retreat.
“I don’t think I remembered to ask you how Colonel Methvyn is,”
he began, as he came up to her.
“Not very well, thank you,” said Cicely, “indeed, I was not much
inclined to leave him to come here to-night—but—I hardly liked to
stay away. My cousin has had very little amusement since she has
been with us. I came greatly on her account.”
“Then you yourself don’t care for balls and dancing?” said Mr.
Hayle eagerly.
Cicely smiled. “Oh! yes I do,” she answered. “When I am light-
hearted about other things, I enjoy them very much.”
Mr. Hayle made no reply.
“Have you seen my cousin lately?” Cicely went on, “I can’t think
what has become of her.”
“If you mean Miss Casalis, I saw her just now with Mr. Fawcett. I
think they were going to dance,” said Mr. Hayle.
“Oh!” said Cicely, and then relapsed into silence.
“Don’t you think it is rather too hot here,” said Mr. Hayle, “would
you not like to find a seat where there is a little more air?”
“It is hot,” said Cicely, rising as she spoke; “yes, I think I should
like to go into one of the other rooms. I want to find Geneviève—it
must be getting late. Will you take me, Mr. Hayle?” she added with a
smile.
They made a little tour of the rooms; dancing in the ball-room was
still going on vigorously, but no Geneviève, no Trevor, were to be
seen.
“I dare say they are in the supper-room,” said Mr. Hayle. “I saw
several people there still, a few minutes ago. Suppose we look for a
nice cool place in the conservatory, Miss Methvyn; this way—ah!
yes, over there among the ferns there is a charming corner. Now, if
you will stay here, I will get you an ice and look for Miss Casalis on
the way.”
The poor little man seemed quite pleased to find himself of use.
Cicely thanked him and established herself comfortably in the nook
he had discovered. It was at the further end of the fernery, into which
opened the great dining-room, to-night metamorphosed into a ball-
room. Cicely looked round her admiringly. She had always coveted
the Lingthurst fernery; in the hottest summer day it seemed cool and
fresh—there were greens of every shade to rest the eye, an
incessant, soothing murmur of trickling water to please the ear; and
to-night the soft lights of the many-coloured lamps, hung here and
there among the climbing plants which hid the walls, made the whole
into a veritable fairy-land.
Cicely leant her head back and shut her eyes. “The music sounds
far nicer here than in the ball-room,” she said to herself; “it is almost
too loud in there. I shall go to sleep if Mr. Hayle doesn’t come soon. I
don’t want an ice in the least, but it would have been a shame to
refuse it; he was so pleased with the idea. Ah, there he is!”
Steps were approaching her, but they were not Mr. Hayle’s.
Where she sat, some great stands of tall tropical ferns concealed her
from the view of any one coming to wards her; but not realising this,
it never occurred to her to move when first the sound of voices fell
upon her ear. Well known, familiar voices they proved to be, but the
words they uttered deprived the girl for the moment of all power or
vitality.
“I tell you I will do anything—anything to make you believe me—
anything to free myself from this horrible hypocrisy. I can stand it no
longer. The words were spoken low, but with a sort of suppressed
fierceness; the voice was Trevor’s. Then came a sound of half-
smothered weeping, some broken reply of which Cicely could not
catch the meaning—then Trevor’s voice again.
“Not care for you? Good God! what will you say next? I wish I did
not care for you. I wish we had never seen each other. Not care for
you, you say, when I am breaking my word for you, trampling my
honour under foot! I only hope that is the worst of what I am doing,
Geneviève. I only hope what you tell me is true, that in her heart of
hearts Cicely does not care for me except as a brother. If I thought
otherwise! No, even for you, Geneviève, I could not do it.”
“But it is true—it is, it is,” broke in the girl’s voice. “I know it is, I
have always known it. She does not care as I do—oh, no! Trevor, I
shall die if I have to lose you.”
“Hush,” said Trevor, “there is some one behind us. Come this
way.”
He led her close to where Cicely was sitting, then through a small
doorway in the wall leading into a passage used by the gardeners;
as the two passed her, the skirt of Geneviève’s dress almost brushed
against Cicely’s, but thanks to the subdued light and to their own
absorption, she remained unperceived.
She had sat perfectly still—motionless, as if suddenly turned into
stone. It had required no effort on her part to remain so, for now
even that they were gone—out of sight and hearing—she moved not
so much as a muscle of her whole body; afterwards, on looking
back, it seemed to herself that she had almost for a time ceased to
breathe. She was stunned into a species of unconsciousness, and
how long she might have remained thus it would be impossible to
say, had not Mr. Hayle made his appearance with the ice he had
gone in search of.
“Here is the ice. I had to wait some time—” he was beginning, but
broke off in alarm. “What is the matter?” he exclaimed, “you look so
dreadfully pale, Miss Methvyn.”
“I have got a chill, I think,” said Cicely shivering, and attempting to
smile. She was surprised to find that she could speak; for the last
few minutes a sort of dreamy, almost pleasant feeling of death, or
dying, had been stealing over her. Now she awoke to a faint
consciousness of pain; like the unfortunate traveller in the Alps, who
beseeches to be allowed to sleep, even though the sleep should be
unto death, she shrank from coming to life again. “I have got a little
chill, I think,” she repeated. “I should just like to stay here quietly.”
She leant her head back again among the graceful nestling ferns
—their delicate fronds caressing her colourless cheeks and brushing
the coils of her bright fair hair; she closed her eyes, and for a
moment Mr. Hayle thought she had fainted. Perhaps in a sense she
had—at least she was conscious of nothing more till he was again
beside her, this time with a glass of wine.
“Drink this, Miss Methvyn,” he said.
“No, thank you,” she replied, turning her head away.
“But you really must,” he insisted. “The sort of chill you have had
may make you ill if you don’t take this. Think how frightened Mrs.
Methvyn will be if you go home looking like a ghost.”
Mr. Hayle was not wanting in discrimination and common sense.
He had met Mr. Fawcett and Miss Casalis on his way to fetch the ice;
he was not without a shrewd suspicion as to the nature of the “chill”
which the girl beside him had received. His mention of her mother
roused Cicely a little. She took the glass and drank some of the
wine.
“Thank you very much,” she said to her companion. “I am all right
again now. Must we go back to the drawing-room? Oh! I do so want
to go home,” she exclaimed wearily. “It is late now, is it not? I wonder
if Geneviève—”
“Would you like me to find out if Miss Casalis is ready to go now?”
interrupted Mr. Hayle.
“Yes please, I wish you would,” said Cicely. The mention of her
cousin’s name had driven back from her cheeks such faint colour as
had begun to return to them. Mr. Hayle’s suspicions were confirmed.
“Do I look very dilapidated?” continued Cicely, smiling and
smoothing back the ruffled hair from her temples. “I should not like
Lady Frederica to think I was ill. I have felt very dull and tired all the
evening. You know my father has not been well; we have been
anxious about him, and anxiety is very tiring.”
“Yes,” said Mr. Hayle, “nothing more so. You need not go back to
the drawing room, Miss Methvyn. We can go round by the passage
behind the dining-room, and you can wait in the study while I find
your cousin.”
He was turning towards the door through which Trevor and
Geneviève had disappeared.
“Not that way,” exclaimed Cicely sharply.
Mr. Hayle glanced at her. “It is much better than having to go
through the ball room,” he said composedly. Cicely made no further
objections.
The next quarter of an hour was a dream to her. She sat in Sir
Thomas’s little study waiting for Geneviève for about ten minutes,
clearly conscious of one sensation only an unspeakable horror of
meeting Trevor Fawcett face to face and alone. But this she was
spared. How Mr. Hayle managed it she never knew; but in a few
minutes he reappeared with Geneviève alone.
Then Cicely remembered a vision of Parker and wraps, a hasty
progress across the hall, still escorted by the young clergyman, a
glimpse through open doors of the still crowded drawing-rooms, a
sound of music in the distance—then she seemed to awake to find
herself in the carriage, with Parker’s anxious face opposite, dimly
discernible in the uncertain light of the flickering lamps, with some
one else beside her; some one whose face she dreaded to see,
whose voice she shrank from hearing.
But all the way home Geneviève never spoke.
CHAPTER II.
AFTER THE BALL.

“Ye banks and braes o’ bonnie Doon,


How can ye bloom sae fresh and fair;
How can ye chant, ye little birds,
And I sae weary, fu’ o’ care!
Ye’ll break my heart, ye warbling birds
That wanton through the flow’ry thorn;
Ye mind me o’ departed joys,
Departed never to return.”

IT was a very dark night. The full moon, whose services had been
reckoned upon to light the guests to and from the Lingthurst ball,
was not in an obliging humour. She had gone to bed again in the
clouds so early, and the curtains behind which she had hidden
herself were so thick, that, for all the use she had been of, she might
as well not have risen at all. It was so dark that the cautious old
Greystone coachman thought it necessary to drive extra slowly; it
seemed to Cicely that hours, if not whole days, or nights rather, had
passed, when at last they turned in at the Abbey gates.
Not that she cared. She was not eager to be home now—what
comfort could meet her there?—anywhere? What was anything in
life to her now? What was life itself? A horrible mockery, a delusion,
a sham from beginning to end. There was no goodness, no loyalty,
no truth. All these things she had once—long ago it seemed already
—believed in so firmly, that till now she had never realised how
largely such faith had formed a part of her existence, or how frightful
could be the results of its destruction. Already she had tasted the
bitterest drop of the bitter cup; she had been deceived by her
nearest and dearest—by the one of all the world who should have
been true to her.
“If even he had trusted me,” she moaned, “if he had come and
told me all, I could have borne it. I am not beautiful as she is, I could
have forgiven him; I could have believed that this new love had come
upon him unawares, and that he had fought against it. If he had
trusted me!”
To Geneviève, to her share in the whole, Cicely, in this first chaos
of misery and indignation somehow hardly gave a thought. She
shrank from her, it is true. She was thankful that Geneviève’s silence
prevented the necessity of addressing her, but whatever Geneviève
had done, however great her portion of responsibility, she was only
Geneviève—a new-comer, a comparative stranger. False-hearted,
scheming, unscrupulous she might be—in a sense it did not seem to
matter; for her conduct there was at least the possibility of the
excuse of ignorance and inexperience,—there was not the
aggravation of a broken vow, of life-long affection trampled under
foot.
Over and over again during the three quarters of an hour’s drive
from Lingthurst these bitter thoughts chased each other round
Cicely’s excited brain. The practical results of her discovery, the
explanation she must come to with Trevor, what she must say to her
parents, how they would look upon Geneviève—all these points she
as yet forgot to consider. Extreme misery makes even the best of us
selfish for the time. In Cicely’s nature there was no lack of
magnanimity, but the first instinct of the victim is not to heap coals of
fire upon the head of him whose hand has dealt the cruel blow.
Forgiveness, sincere and generous, would come in due time; but not
yet. It was no small injury which Cicely Methvyn had received; that it
would leave a life-long scar there could be no doubt: would the
wound ever heal? was the question at present. Could the faith, once
shattered so cruelly, ever again be made whole?
“If I live to be a hundred I can never endure greater suffering than
that of this evening,” thought Cicely, as the carriage stopped at last
and the cousins got out. That her present suffering could be
increased—even, in a sense, overwhelmed by an anguish of a totally
different nature—she would have maintained to be all but
impossible. At twenty we are apt to be over hasty in declaring that
we have already drunk of misery to the very dregs.
The hall-door was opened quickly. The light streaming out into the
darkness dazzled Cicely’s eyes for the instant; she did not notice
who it was that was standing just inside, evidently awaiting her. She
was passing on, followed by Geneviève and the maid, when a slight
exclamation from the latter startled her, and almost at the same
moment the sound of her own name caused her to stop short.
“Miss Methvyn,” said a voice, which at first in her bewilderment
she failed to recognise, “Miss Methvyn, will you wait a moment.”
Cicely turned; there before her stood the man from whom but a
few hours before she had parted, as he said, for ever. What was he
doing here again? What had brought him to Greystone in the middle
of the night? Once, only once before had he been there at so
unseasonable an hour. Cicely shuddered as she recalled that once
before. He saw the shudder, even then, through the great unselfish
pity which was softening his voice and shining out of his grave eyes;
he caught the involuntary movement and groaned in his heart.
“It is hard, very hard upon me to have to break it to her,” he said
to himself. “I, that am already repulsive to her. What can I say to
soothe or comfort? Why did they not send for Mr. Fawcett?”
Cicely stood still. Her pale face had little colour to lose; but what
there was faded out of it utterly as she gazed, in but half-conscious
terror, at Mr. Guildford. Quick as lightning the thought flashed
through her mind, “I had forgotten about papa—I had actually
forgotten about papa!” Aloud she only said, in a voice that even to
herself sounded unnaturally hard and cold, “What is it, Mr. Guildford?
What is it you have to tell me. If it is—any thing wrong, why did you
not send for me before?”
“I have not been here very long,” began Mr. Guildford with a sort
of apology in his manner very new to him. “It was by Mrs. Methvyn’s
wish I waited here to see you when you first came in. We should
have sent for you at once, an hour ago that is to say, if—if it had
been any use.”
“What do you mean?” said Cicely fiercely.
Mr. Guildford glanced round him with a silent appeal. “Will no one
help me?” his look seemed to say. Parker had disappeared, but
Geneviève was still standing close behind Cicely, and to her his eyes
travelled. She understood him, but instead of responding to his
unspoken request, she covered her face with her hands, uttered a
smothered cry, and rushed away.
“Little fool,” muttered Mr. Guildford, between his teeth.
But Cicely did not seem to have observed her cousin’s
defalcation. She stood there, still in the same attitude, before Mr.
Guildford, and still there was an approach to fierceness in her tone,
as she repeated her inquiry. “What do you mean? Tell me what you
mean.”
Then the young man gathered up his courage.
“I mean,” he said slowly, speaking with an effort which he did not
attempt to conceal, “I mean that even if you had been sent for the
very moment Colonel Methvyn was taken ill, it would have been no
use. He was utterly unconscious from the first he never spoke again
—from the very commencement of the attack there was nothing
whatever to be done; not all the doctors in Europe could have
restored him to consciousness, or prolonged his life, for five minutes.
And, I think,” he added, speaking still more slowly and reluctantly, “I
think it was better so.”
Cicely had kept her eyes fixed upon him while he spoke; they
seemed to drag the unwilling words out of him by the intensity of
their gaze, something in their expression made him instinctively
conscious that any attempt at softening what he had to tell, any
common-place expressions of sympathy and regret would have been
utterly futile; the girl could not have taken in their meaning. Now,
when he left off speaking, the strain seemed to slacken; the terrible
stony stare left her eyes; she threw out her hands like a child in
terror—as if for protection and support. “You mean,” she said, “oh! I
know what you mean—but you mustn’t say it. Why didn’t you do
anything? Why didn’t you come sooner? I can’t, indeed I can’t bear
it.”
What could he do—what could he say? The relentless summons
had gone forth—Cicely Methvyn was fatherless. It was very hard
upon him!
“I would have given ten years of my life to save him for you, if he
could have been saved. I would have cut off my right hand rather
than have been the one to tell you. I cannot bear to see you suffer,”
he broke out passionately. Then he turned away from her, in despair,
ashamed of his want of self-control, heart-broken that he could say
nothing to comfort her.
The sight of his distress awoke the unselfishness that seldom
slumbered long in Cicely’s heart.
“Forgive me,” she exclaimed, “forgive me. I didn’t know what I
was saying. I will try to bear it, indeed I will. I know nothing could
have been done, if you say so. Tell me about it—tell me how it was—
but must I not go to mamma?”
Mr. Guildford shook his head. “No, not yet,” he said, “she was
very much excited. I was a little alarmed about her, and gave her
something to soothe her. I think she has fallen asleep. I promised to
wait here to meet you, and that seemed to satisfy her.”
Then he told her all he knew. He had been sent for about ten
o’clock, but, by the time he reached Greystone, even Mrs. Methvyn
had seen that his coming would be of no avail; the life had all but
flickered out already. “It was as I always feared it would be,” said Mr.
Guildford, hesitating again. “I always dreaded the effect of any great
shock.”
He looked at Cicely inquiringly. Had she anticipated anything of
the kind; was she in the least acquainted with the nature of the
shock, which for some time must have been impending?
“A great shock,” she repeated, “what great shock? He did not
know—”
She stopped short. With lightning-like rapidity her mind flew back
to the events of that evening—could her father have come to the
knowledge of what she had discovered? But almost before she had
time to dismiss the idea as wild and improbable in the last degree,
Mr. Guildford’s next words put it altogether to flight.
“It was some news that came in a telegram this evening, that—
that brought on this attack,” he said reluctantly, not feeling sure of his
ground with Cicely, but judging it wisest to put her in possession at
once of all that there was to tell. By the expression of her face, he
saw at once that she did not in the least know to what he referred.
“What was the telegram about? Did you see it?” she demanded.
He hesitated again. “You had better tell me,” said Cicely, “that is,
unless mamma did not want me to know.”
“Oh! no; Mrs. Methvyn wished me to tell you everything. The
telegram was about the failure of some company in which Colonel
Methvyn had largely invested. It told him of a great loss of property.”
“And was that all?” said Cicely. “As if that would have mattered!
Oh! Mr. Guildford, why should he have taken that to heart so?”
“It was only natural that he should do so,” said Mr. Guildford.
There was no necessity at present for telling her how great he
suspected the extent of the calamity to be, and indeed just now the
loss of a few hundred pounds or of a quarter of a million would have
been looked upon by Cicely as matters of equal indifference. “It was
only natural he should have felt it as he did,” he repeated. “That is
why I think, perhaps, it is best his consciousness never returned. He
would only have awakened to distress and anxiety, and at the very
best his life could only have been prolonged for a few hours.”
“But he would have known us, he could have said good-bye; we
could have told him how little we cared about the loss of the money,”
cried Cicely. “Oh! I cannot think it is better never to have seen him
again—I cannot.”
For the first time the tears came into her eyes. She sat down and
cried unrestrainedly, refusing to be comforted.
Mr. Guildford left her. He was anxious to know if Mrs. Methvyn
was asleep. On the staircase he met the housekeeper.
“Miss Cicely is in the hall—alone,” he said. “She knows. I have
told her. Do you think you can get her to go to bed?”
Poor Mrs. Moore’s eyes were streaming. She could not speak, but
she nodded her head and set off in the direction of the hall, so Mr.
Guildford felt that his task was accomplished.
Cicely went to bed, and, strange as it may seem, to sleep. She
was only twenty; she had never been really ill in her life, and sorrow
was unfamiliar to her; there were vigour and vitality enough in her to
stand a much more prolonged attack from adversity, though, as she
laid her head on her pillow, she said to herself that but for her mother
she would pray never to wake again.
“It could not be wrong,” she thought. “Except mother nobody
wants me. Amiel has her husband, but poor mamma has only me
now.” And the thought seemed a something to cling to; it made the
idea of living on, notwithstanding the wreck of her future, endurable,
if nothing more. So Cicely slept.
Who does not know the awful agony of the first waking after some
overwhelming sorrow has befallen us? The shuddering glimmer of
recollection that something has happened, the frantic clutch at the
blessed unconsciousness of the sleep that is leaving us, the wild
refusal to recall the truth! And, oh! the unutterable loathing at life, at
existence even when at last we realize the whole and find that
another day has dawned, that the heartless sunshine is over the
world again, that we ourselves must eat and drink and clothe
ourselves, and live! If we could see that our individual misery made
its mark, if the birds would only leave off singing, if the flowers would
all wither, if a veil could be drawn over the sun, would it seem quite
so bad?
“No,” thought Cicely, “if the trees and the flowers and all the living
things seemed to care, I think I could endure it. But they don’t—they
don’t! The world is brighter than ever this morning, though the
brightness has died out of my life for ever.”
She was standing by the open window in her room. She had
forgotten that the blinds should be drawn down, and was gazing with
reproachful appreciation at the beauty of the autumn morning.
Yesterday it would have filled her with delight, to-day its very
perfection repelled and wounded her. Even Nature, with whose
varying moods she had been ever so ready to sympathize, whose
face she had learnt to know so well, had played her false. “Why is it
so fine to-day?” she said to herself; “why is it not cloudy and raining?
Why should it ever be anything else, there must always have been,
there always must be, thousands of people to whom the sunshine is
as dreadful as it is to-day to me.”
She turned wearily away, and began to think what she had to do.
She had been with her mother already this morning, and poor Mrs.
Methvyn had clung to her in a way that was pitiful to see.
“You won’t leave me just yet, my darling,” her mother had
whispered, and Cicely felt thankful that she could give her the
assurance she asked for, without at present adding to her sorrows by
explaining the real state of the case. And this reflection led to
another. Her father had at least been spared the knowledge of
Trevor’s faithlessness.
“Yes,” thought Cicely, “I can be thankful for that.”
Then suddenly she recollected what Mr. Guildford had told her of
the news contained in the fatal telegram. Her mother had not alluded
to it. “We will talk about everything afterwards. Not yet,” she had said
to Cicely. What could “everything” mean? Could it be that the loss of
property, the tidings of which had, she reflected with a shudder,
actually killed her father; could it be that this loss was something
very great? For herself she did not care; but when she thought of her
delicate mother, a vague apprehension for the first time made itself
felt. She wished that she had asked Mr. Guildford to tell her more;
from his manner she fancied he was in possession of fuller details
than he had mentioned to her; but for this it was now too late. Mr.
Guildford had gone back to Sothernbay; the chances were that she
would not see him again, as in all probability he would now hasten
his departure from the neighbourhood.
“He need not have asked me to release him from his promise,”
she said to herself with a sort of sorrowful bitterness.
There came a knock at the door. It was Parker.
“If you please, Miss Cicely,” she began timidly, “Miss Casalis has
been asking how you are. She would be so pleased if you would let
her come and sit with you, or do anythink; anythink she says she
would be so pleased to do.”
“Tell her there is nothing whatever she can do to help me, or my
mother. And for to-day, at least, Parker, I wish to be left quite alone.”
The cold tone was discouraging, but the pale wan face and poor
swollen eyes, moved Parker to another effort.
“Miss Casalis do seem very miserable,” she said insinuatingly. “I
should not have thought she was a young lady as would have taken
it to heart so. I don’t think she closed a eye last night. I do wish, Miss
Cicely, my dear, you would let her come and sit with you. She’s
wandering about like a ghost. She seems as if she could settle to
nothing.”
Parker’s conscience was pricked by the sight of Geneviève’s
distress. She felt that she had done her injustice. Only the evening
before, she had been far from amiably disposed to the girl, whose
fresh loveliness had won the universal admiration which, according
to the old servant’s way of thinking, belonged of right to “her own
young lady,” and any appearance of indifference or carelessness
would have confirmed her prejudice. But that Geneviève was in real
distress, no one could doubt. “She must have a tender heart, for all
her flighty, foreign ways,” thought Parker, and she waited with some
anxiety for the result of her second appeal.
“I am sorry for her,” said Cicely slowly. The thought of the
miserable little figure wandering about alone in the desolate rooms
downstairs, the remembrance of Geneviève’s great brown, velvety
eyes with the tears in them, moved her in spite of herself. “I am very
sorry for her,” she repeated with a quiver in her voice. “I dare say she
is very unhappy, but, Parker, I really cannot see her. I don’t want to
see any one—not even, remember, Parker, not even Mr. Fawcett if
he calls to-day.”
Parker gazed at her young lady in astonishment. “Not Mr. Trevor!”
she exclaimed under her breath.
“No; I wish to seeno one,” repeated Cicely.
“There is never any telling how trouble will change people,”
thought the old servant philosophically. “Poor Miss Cicely doesn’t
hardly know how she feels yet; we must let her have her own way for
awhile.”
She was leaving the room when Cicely called her back. “On
second thoughts,” she said, speaking with an effort, “you may tell
Miss Casalis that if she likes to come up here in half an hour or so, I
will ask her to write some letters for me.”
Parker departed in triumph. Half an hour later Geneviève, pale,
worn-looking, with great black circles under her eyes, and dressed in
the plain black gown in which she had travelled from Hivèritz, crept
into the room; Cicely looked at her and her heart melted.
“Will you write these letters for me, Geneviève?” she said,
pointing to a slip of paper on which she had written down some
addresses. “I can easily tell you what to say. Mother asked me to see
about her mourning—and I think you had better write home to-day to
tell your mother what has happened.”
Her lips quivered, she turned her head away. Geneviève threw
her arms round her.
“Oh! Cicely, dear Cicely, I do love you. I do. I am so sorry, oh! I am
so sorry. Oh, Cicely, I wish I had never come here!”
Cicely disengaged herself gently, very gently, from her cousin’s
embrace.
“I am glad you are sorry for our sorrow, Geneviève,” she said
quietly, “even though it is impossible you should understand all we—I
—am feeling.”
Geneviève looked up at her with a puzzled air. “I thought you
were colder than you are,” she said. “Perhaps I have mistaken you
altogether. I—I don’t know what to do. Shall I go home—to Hivèritz
to-day, this afternoon? You would never hear of me again. Would
you like me to go?”
“What do you mean, Geneviève?” asked Cicely sternly. “Why
should I wish you to go? Do you know any reason why I should?”
Geneviève grew scarlet. In her excitement and confusion of
thought, she had almost persuaded herself that Cicely must suspect
her secret, or that, if this were not so, that she must confess it. But
now that the opportunity offered, her natural cowardice returned and
tied her tongue. “I do not know what I mean,” she said. “I thought,
perhaps, now that you are sad, I should be a trouble to you.”
Cicely looked at her. “You have no reason to think so,” she said
coldly. But she did not press Geneviève to explain herself further. “I
shall say what I have to say to Trevor, and to him alone,” she
resolved.
Geneviève had begun to cry again. “I am so unhappy, so very
unhappy,” she said miserably.
“I am sorry for you,” said Cicely kindly.
“You would not be if you knew the whole, why I am so unhappy,”
sobbed Geneviève.
“Yes, I should be. If I thought even that your unhappiness was of
your own causing, that you deserved it,” said Cicely impressively,
“still I should be sorry for you—more sorry, perhaps.”

You might also like