Professional Documents
Culture Documents
Ebook Guide To Networking Essentials Mindtap Course List 8Th Edition Tomsho Online PDF All Chapter
Ebook Guide To Networking Essentials Mindtap Course List 8Th Edition Tomsho Online PDF All Chapter
Ebook Guide To Networking Essentials Mindtap Course List 8Th Edition Tomsho Online PDF All Chapter
https://ebookmeta.com/product/a-guide-to-sql-mindtap-course-
list-10th-edition-mark-shellman/
https://ebookmeta.com/product/comptia-network-guide-to-networks-
mindtap-course-list-9th-edition-west-jill/
https://ebookmeta.com/product/networking-essentials-6th-edition-
beasley/
https://ebookmeta.com/product/java-programming-mindtap-course-
list-10th-edition-joyce-farrell/
Marketing (MindTap Course List) 20th Edition William M.
Pride
https://ebookmeta.com/product/marketing-mindtap-course-list-20th-
edition-william-m-pride/
https://ebookmeta.com/product/understanding-human-behavior-a-
guide-for-health-care-professionals-mindtap-course-list-10th-
edition-alyson-honeycutt/
https://ebookmeta.com/product/our-sexuality-mindtap-course-
list-14th-edition-robert-l-crooks/
https://ebookmeta.com/product/essentials-of-economics-8th-
edition-sloman/
https://ebookmeta.com/product/networking-all-in-one-for-
dummies-8th-edition-doug-lowe/
NETWORKING
Eighth Edition
Guide to
Networking
Essentials
Greg Tomsho
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Important Notice: Media content referenced within the product description or the product
text may not be available in the eBook version.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Guide to Networking Essentials © 2020, 2016 Cengage Learning, Inc.
Eighth Edition Unless otherwise noted, all content is © Cengage.
Greg Tomsho
WCN: 02-300
SVP, Higher Education Product Management: ALL RIGHTS RESERVED. No part of this work covered by the
Erin Joyner copyright herein may be reproduced or distributed in any form
VP, Product Management: Mike Schenk or by any means, except as permitted by U.S. copyright law,
without the prior written permission of the copyright owner.
Product Director: Lauren Murphy
Windows® is a registered trademark of Microsoft Corporation.
Product Manager: Amy Savino Microsoft® is a registered trademark of Microsoft Corporation
Product Assistant: Thomas Benedetto in the United States and/or other countries.
Learning Designer: Natalie Onderdonk For permission to use material from this text or product, submit
all requests online at
Vice President, Marketing – Science,
www.cengage.com/permissions.
Technology, & Math: Jason Sakos
Production Service/Composition: SPi Global Cengage products are represented in Canada by Nelson Education, Ltd.
To learn more about Cengage platforms and services, register or access
Art Director: Erin Griffin
your online learning solution, or purchase materials for your course,
Cover Designer: Joseph Villanova visit www.cengage.com.
Cover image: iStockPhoto.com/ivanastar
Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis in connection with any of
the product information contained herein. Publisher does not assume, and expressly disclaims, any obligation to obtain and include informa-
tion other than that provided to it by the manufacturer. The reader is expressly warned to consider and adopt all safety precautions that might
be indicated by the activities described herein and to avoid all potential hazards. By following the instructions contained herein, the reader
willingly assumes all risks in connection with such instructions. The publisher makes no representations or warranties of any kind, including but
not limited to, the warranties of fitness for particular purpose or merchantability, nor are any such representations implied with respect to the
material set forth herein, and the publisher takes no responsibility with respect to such material. The publisher shall not be liable for any special,
consequential, or exemplary damages resulting, in whole or part, from the readers’ use of, or reliance upon, this material.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Brief Contents
introduction������������������������������������������������������������������������������������������ xvii
CHAPTER 1
Introduction to Computer Networks...........................................................1
CHAPTER 2
Network Hardware Essentials��������������������������������������������������������������������59
CHAPTER 3
Network Topologies and Technologies���������������������������������������������������115
CHAPTER 4
Network Media������������������������������������������������������������������������������������������173
CHAPTER 5
Network Protocols�������������������������������������������������������������������������������������223
CHAPTER 6
IP Addressing����������������������������������������������������������������������������������������������285
CHAPTER 7
Network Reference Models and Standards��������������������������������������������345
CHAPTER 8
Network Hardware in Depth��������������������������������������������������������������������373
CHAPTER 9
Introduction to Network Security������������������������������������������������������������431
CHAPTER 10
Wide Area Networking and Cloud Computing���������������������������������������489
CHAPTER 11
Network Operating System Fundamentals��������������������������������������������533
CHAPTER 12
Network Management and Administration�������������������������������������������599
iii
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
iv Brief Contents
CHAPTER 13
The Internet of Things (IoT)��������������������������������������������������������������������� 667
CHAPTER 14
Troubleshooting and Support����������������������������������������������������������������� 721
APPENDIX A
Network Troubleshooting Guide������������������������������������������������������������ 775
APPENDIX B
MTA Exam 98-366 Objectives������������������������������������������������������������������� 781
GLOSSARY�������������������������������������������������������������������������������������������������� 785
INDEX���������������������������������������������������������������������������������������������������������� 807
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents
Introduction����������������������������������������������������������������������������������������� xvii
CHAPTER 1
Introduction to Computer Networks���������������������������������� ..1
An Overview of Computer Concepts�������������������������������������������������������������������� 3
Basic Functions of a Computer�������������������������������������������������������������������������3
Storage Components���������������������������������������������������������������������������������������� 5
Personal Computer Hardware���������������������������������������������������������������������������7
Computer Boot Procedure������������������������������������������������������������������������������� 12
The Fundamentals of Network Communication��������������������������������������������� 15
Network Components�������������������������������������������������������������������������������������� 15
Steps of Network Communication������������������������������������������������������������������ 18
Layers of the Network Communication Process��������������������������������������������� 19
How Two Computers Communicate on a LAN: Some Details����������������������� 20
Network Terms Explained������������������������������������������������������������������������������������ 28
LANs, Internetworks, WANs, and MANs���������������������������������������������������������28
Internet, Intranet, and Extranet����������������������������������������������������������������������32
Packets and Frames�����������������������������������������������������������������������������������������32
Clients and Servers������������������������������������������������������������������������������������������35
Network Models���������������������������������������������������������������������������������������������������� 37
Peer-to-Peer/Workgroup Model����������������������������������������������������������������������37
Server/Domain-Based Model��������������������������������������������������������������������������39
Chapter Summary������������������������������������������������������������������������������������������������� 47
Key Terms���������������������������������������������������������������������������������������������������������������� 48
Review Questions�������������������������������������������������������������������������������������������������� 48
Packet Tracer Labs������������������������������������������������������������������������������������������������� 51
Critical Thinking����������������������������������������������������������������������������������������������������� 57
CHAPTER 2
Network Hardware Essentials���������������������������������������������� 59
Network Repeaters and Hubs����������������������������������������������������������������������������� 61
Multiport Repeaters and Hubs������������������������������������������������������������������������62
Network Switches�������������������������������������������������������������������������������������������������� 65
Basic Switch Operation������������������������������������������������������������������������������������65
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
vi Table of Contents
CHAPTER 3
Network Topologies and Technologies����������������������������������������� 115
Physical Topologies��������������������������������������������������������������������������������������������� 116
Physical Bus Topology������������������������������������������������������������������������������������ 117
Physical Star Topology������������������������������������������������������������������������������������ 119
Physical Ring Topology����������������������������������������������������������������������������������� 121
Point-to-Point Topology��������������������������������������������������������������������������������� 122
Logical Topologies����������������������������������������������������������������������������������������������� 125
Network Technologies���������������������������������������������������������������������������������������� 129
Network Technologies and Media������������������������������������������������������������������130
Ethernet Networks������������������������������������������������������������������������������������������ 131
Ethernet Standards�����������������������������������������������������������������������������������������136
Additional Ethernet Standards�����������������������������������������������������������������������139
802.11 Wi-Fi����������������������������������������������������������������������������������������������������������� 148
Wi-Fi Modes of Operation������������������������������������������������������������������������������148
Wi-Fi Channels and Frequencies������������������������������������������������������������������ 149
Wi-Fi Antennas���������������������������������������������������������������������������������������������� 151
Wi-Fi Access Methods and Operation������������������������������������������������������������ 152
Wi-Fi Signal Characteristics��������������������������������������������������������������������������� 153
Wi-Fi Standards���������������������������������������������������������������������������������������������� 155
Wi-Fi Security������������������������������������������������������������������������������������������������� 157
Token Ring Networks��������������������������������������������������������������������������������������158
Fiber Distributed Data Interface Technology�������������������������������������������������159
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents vii
CHAPTER 4
Network Media�������������������������������������������������������������������������������������������� 173
Wired Networking����������������������������������������������������������������������������������������������� 174
Criteria for Choosing Network Media������������������������������������������������������������ 174
Coaxial Cable���������������������������������������������������������������������������������������������������178
Twisted-Pair Cable������������������������������������������������������������������������������������������178
Structured Cabling: Managing and Installing a UTP Cable Plant�������������������185
Fiber-Optic Cable������������������������������������������������������������������������������������������������� 197
Fiber-Optic Connectors��������������������������������������������������������������������������������� 199
Fiber-Optic Installation���������������������������������������������������������������������������������200
Fiber-Optic Cable Types���������������������������������������������������������������������������������201
Cable-Testing Equipment�������������������������������������������������������������������������������201
Wireless Networking������������������������������������������������������������������������������������������� 202
Wireless Benefits������������������������������������������������������������������������������������������� 203
Types of Wireless Networks�������������������������������������������������������������������������� 204
Wireless LAN Components���������������������������������������������������������������������������� 205
Wireless LAN Transmission�������������������������������������������������������������������������� 205
LAN Media Selection Criteria����������������������������������������������������������������������������� 210
Chapter Summary����������������������������������������������������������������������������������������������� 211
Key Terms�������������������������������������������������������������������������������������������������������������� 212
Review Questions������������������������������������������������������������������������������������������������ 212
Packet Tracer Labs����������������������������������������������������������������������������������������������� 215
Critical Thinking��������������������������������������������������������������������������������������������������� 220
CHAPTER 5
Network Protocols������������������������������������������������������������������������������������ 223
TCP/IP’s Layered Architecture��������������������������������������������������������������������������� 224
Application-Layer Protocols������������������������������������������������������������������������������� 230
HTTP: Protocol of the World Wide Web���������������������������������������������������������� 231
E-Mail Protocols: POP3, IMAP, and SMTP������������������������������������������������������ 231
FTP and TFTP��������������������������������������������������������������������������������������������������232
Server Message Block�������������������������������������������������������������������������������������232
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii Table of Contents
CHAPTER 6
IP Addressing������������������������������������������������������������������������������������������������ 285
IPv4 Addressing���������������������������������������������������������������������������������������������������� 286
Binary Math��������������������������������������������������������������������������������������������������� 287
Ip Address Classes����������������������������������������������������������������������������������������� 292
Private Ip Addresses�������������������������������������������������������������������������������������� 295
Classless Interdomain Routing������������������������������������������������������������������������� 296
Cidr Notation������������������������������������������������������������������������������������������������ 296
Broadcast Domains���������������������������������������������������������������������������������������� 297
Subnetting������������������������������������������������������������������������������������������������������������� 297
Calculating a Subnet Mask���������������������������������������������������������������������������� 298
Supernetting�������������������������������������������������������������������������������������������������� 304
Configuring Ipv4 Addresses������������������������������������������������������������������������������� 306
Configuring Multiple Ip Addresses����������������������������������������������������������������306
Configuring the Default Gateway������������������������������������������������������������������ 308
Ip Configuration Command-Line Tools��������������������������������������������������������� 312
Network Address Translation���������������������������������������������������������������������������� 317
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents ix
CHAPTER 7
Network Reference Models and Standards������������������������������� 345
Introducing the Osi and Ieee 802 Networking Models��������������������������������� 346
Role of a Reference Model����������������������������������������������������������������������������� 347
Structure of the Osi Model���������������������������������������������������������������������������� 349
Application Layer��������������������������������������������������������������������������������������������353
Presentation Layer����������������������������������������������������������������������������������������� 354
Session Layer������������������������������������������������������������������������������������������������� 354
Transport Layer�����������������������������������������������������������������������������������������������355
Network Layer�������������������������������������������������������������������������������������������������357
Data Link Layer���������������������������������������������������������������������������������������������� 358
Physical Layer������������������������������������������������������������������������������������������������ 359
Summary of the Osi Model��������������������������������������������������������������������������� 359
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
x Table of Contents
CHAPTER 8
Network Hardware in Depth�������������������������������������������������������������� 373
Network Switches in Depth������������������������������������������������������������������������������� 374
Switch Port Modes of Operation������������������������������������������������������������������� 376
Creating the Switching Table������������������������������������������������������������������������� 376
Frame Forwarding Methods�������������������������������������������������������������������������� 378
Advanced Switch Features����������������������������������������������������������������������������� 379
Multilayer Switches��������������������������������������������������������������������������������������� 385
Routers in Depth�������������������������������������������������������������������������������������������������� 387
Router Interfaces������������������������������������������������������������������������������������������� 389
Routing Tables������������������������������������������������������������������������������������������������391
Routing Protocols������������������������������������������������������������������������������������������� 393
Access Control Lists��������������������������������������������������������������������������������������� 397
CHAPTER 9
Introduction to Network Security��������������������������������������������������� 431
Network Security Overview and Policies�������������������������������������������������������� 432
Developing a Network Security Policy���������������������������������������������������������� 433
Determining Elements of a Network Security Policy����������������������������������� 433
Understanding Levels of Security����������������������������������������������������������������� 434
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xi
CHAPTER 1 0
Wide Area Networking and Cloud Computing������������������������� 489
Wide Area Network Fundamentals������������������������������������������������������������������ 490
WAN Devices��������������������������������������������������������������������������������������������������491
WAN Connection Methods��������������������������������������������������������������������������������� 494
Circuit-Switched WANs��������������������������������������������������������������������������������� 494
Leased Lines��������������������������������������������������������������������������������������������������� 497
Packet-Switched WANs��������������������������������������������������������������������������������� 499
Ethernet WANs���������������������������������������������������������������������������������������������� 505
WANs over the Internet��������������������������������������������������������������������������������� 505
WAN Equipment�������������������������������������������������������������������������������������������� 507
Wireless WAN Technologies�������������������������������������������������������������������������� 508
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xii Table of Contents
CHAPTER 1 1
Network Operating System Fundamentals������������������������������� 533
Operating System Fundamentals��������������������������������������������������������������������� 534
The File System�����������������������������������������������������������������������������������������������535
Processes and Services���������������������������������������������������������������������������������� 538
The Kernel������������������������������������������������������������������������������������������������������ 540
Client and Server Operating System Overview���������������������������������������������� 551
The Role of a Client Operating System�����������������������������������������������������������552
The Role of a Server Operating System��������������������������������������������������������� 558
Centralized User Account and Computer Management������������������������������� 559
Centralized Storage���������������������������������������������������������������������������������������� 562
Server and Network Fault Tolerance������������������������������������������������������������� 564
Additional Server Features���������������������������������������������������������������������������� 565
Operating System Virtualization����������������������������������������������������������������������� 565
Hosted Virtualization������������������������������������������������������������������������������������� 568
Bare-Metal Virtualization�������������������������������������������������������������������������������575
Installing an OS���������������������������������������������������������������������������������������������������� 583
Planning for and Installing Windows Server������������������������������������������������ 583
Planning for and Installing Linux����������������������������������������������������������������� 587
Chapter Summary����������������������������������������������������������������������������������������������� 591
Key Terms�������������������������������������������������������������������������������������������������������������� 592
Review Questions������������������������������������������������������������������������������������������������ 592
Critical Thinking��������������������������������������������������������������������������������������������������� 595
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xiii
CHAPTER 1 2
Network Management and Administration����������������������������� 599
Managing User and Group Accounts��������������������������������������������������������������� 600
Account and Password Conventions������������������������������������������������������������� 601
Working with Accounts in Windows������������������������������������������������������������602
Working with Accounts in Linux������������������������������������������������������������������� 611
CHAPTER 1 3
The Internet of Things (IoT)����������������������������������������������������������������� 667
Introduction to the Internet of Things������������������������������������������������������������ 668
IoT Use Cases�������������������������������������������������������������������������������������������������669
IoT Technologies���������������������������������������������������������������������������������������������671
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xiv Table of Contents
CHAPTER 1 4
Troubleshooting and Support������������������������������������������������������������ 721
Documenting Your Network������������������������������������������������������������������������������ 722
Change Management��������������������������������������������������������������������������������������723
Documentation and Troubleshooting����������������������������������������������������������� 724
Documentation and IT Staffing��������������������������������������������������������������������� 724
Documentation and Standards Compliance������������������������������������������������� 724
Documentation and Technical Support���������������������������������������������������������725
Documentation and Network Security����������������������������������������������������������725
What Should Be Documented?���������������������������������������������������������������������� 726
The Problem-Solving Process���������������������������������������������������������������������������� 728
Step 1: Determine the Problem Definition and Scope����������������������������������� 730
Step 2: Gather Information����������������������������������������������������������������������������� 731
Step 3: Consider Possible Causes��������������������������������������������������������������������733
Step 4: Devise a Solution������������������������������������������������������������������������������� 734
Step 5: Implement the Solution��������������������������������������������������������������������� 734
Step 6: Test the Solution�������������������������������������������������������������������������������� 736
Step 7: Document the Solution�����������������������������������������������������������������������737
Step 8: Devise Preventive Measures���������������������������������������������������������������737
Approaches to Network Troubleshooting������������������������������������������������������� 738
Trial and Error������������������������������������������������������������������������������������������������ 738
Solving by Example��������������������������������������������������������������������������������������� 740
The Replacement Method������������������������������������������������������������������������������ 742
Step by Step with the OSI Model������������������������������������������������������������������� 742
Making Use of Problem-Solving Resources���������������������������������������������������� 744
Experience������������������������������������������������������������������������������������������������������745
The Internet��������������������������������������������������������������������������������������������������� 746
Network Documentation������������������������������������������������������������������������������� 748
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xv
appendix a
Network Troubleshooting Guide............................................775
appendix b
MTA Exam 98-366 Objectives���������������������������������������������������781
GLOSSARY������������������������������������������������������������������������������������������������������������ 785
INDEX��������������������������������������������������������������������������������������������������������������������� 807
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction
Guide to Networking Essentials, Eighth Edition, serves the needs
of students, instructors, aspiring information technology profes-
sionals, and others who are interested in learning more about
networking technologies but might have little or no background
in this subject matter. This book’s extensive and broad coverage
of computer networking technologies and network operating
systems gives you a solid networking background to pursue a
number of certifications, including MTA Networking Fundamen-
tals, Network+, CCENT, CCNA, MCSA, and Security+. The eighth
edition maps to the MTA 98-366 Networking Fundamentals cer-
tification, and many instructors also use the book for Network+
and CCENT test preparation. With the extensive use of tables
that compare important properties of networking technologies,
this book also makes an excellent reference.
The eighth edition builds on the strengths of the seventh
edition, giving you easy-to-understand explanations of often
difficult concepts and a solid grounding in topics such as rout-
ing, switching, IP addressing, and virtualization. Many students
are learning computer concepts at the same time they’re learn-
ing about networking, so the first chapter includes a refresher
on computer components and terminology. This new edi-
tion covers the latest networking technologies and operating
systems, including new Ethernet and Wi-Fi standards, cloud
computing, Windows 10, Windows Server 2019, and recent Linux
distributions. In keeping with the latest trends in network-
ing, this edition includes an all-new chapter on the Internet of
Things (IoT), including use cases, network technologies, com-
mon IoT devices, and hands-on projects.
All-new Packet Tracer labs in this book use network simula-
tion software, so many of the labs that use physical equipment
such as switches and routers can be completed in a virtual
environment. Challenge labs give you an opportunity to apply
what you have learned from the chapter material and hands-on
projects in a format that might require additional research and
skills. For case projects, you use your knowledge and critical
thinking skills to devise solutions to networking problems.
The simulations in previous editions of Guide to Network-
ing Essentials are deprecated and are no longer offered as a
xvii
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xviii Introduction
ownload from Cengage. However, the author has made them available on his Web
d
site for readers who still want to use them. These simulations with audio narrations
give you an innovative tool to help you grasp difficult networking concepts. They cover
topics ranging from basic LAN communication to Network Address Translation (NAT)
and Internet e-mail operation. Drag-and-drop exercises reinforce concepts of the OSI
model and network frame formats. These simulations are written in Flash, so Flash
must be enabled in your browser. You can access the simulations on the author’s Web
site at http://books.tomsho.com/sims.
Intended Audience
Guide to Networking Essentials, Eighth Edition, is intended for people who are getting
started in computer networking and want to gain a solid understanding of a broad
range of networking technologies. This book is ideal for would-be information technol-
ogy professionals who want to pursue certifications in a variety of computer net-
working fields as well as professionals in a managerial role who want a firm grasp of
networking technology concepts. To understand the material in this book, you should
have a background in basic computer concepts and experience using the Windows
operating system. This book is ideal for use in a classroom or an instructor-led training
environment and is also an effective learning tool for individual self-paced training.
Chapter Descriptions
Here’s a summary of the topics covered in each chapter of this book:
• Chapter 1, “Introduction to Computer Networks,” introduces many of the computer
and networking terms and technologies discussed in detail in later chapters.
• In Chapter 2, “Network Hardware Essentials,” you learn about the basic
operation of hubs, switches, access points, network interface cards, and routers.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction xix
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xx Introduction
Features
To help you understand networking concepts thoroughly, this book incorporates many
features designed to enhance your learning experience:
• Chapter objectives—Each chapter begins with a detailed list of the concepts to
be mastered. This list is a quick reference to the chapter’s contents and a useful
study aid.
• A requirements table—At the beginning of each chapter is a table listing the
hands-on projects along with their requirements and estimated time of
completion.
• Hands-on projects—Although understanding the theory behind networking
technology is important, nothing can improve on real-world experience. Projects
are interspersed throughout each chapter to give you hands-on experience.
• Screen captures, illustrations, and tables—Numerous screen captures and
illustrations of concepts help you visualize network setups, theories, and
architectures and see how to use tools. In addition, tables summarize details in
an at-a-glance format and give you comparisons of both practical and theoretical
information; they can be used for a quick review. Because most school labs use
Windows OSs, these products have been used for most screenshots and hands-
on projects.
• Packet Tracer labs—Using Packet Tracer, readers can perform labs using virtual
network hardware. These labs are written to mirror the hands-on projects
whenever possible so labs can still be done even when the physical hardware is
not available.
• Chapter summary—Each chapter ends with a summary of the concepts
introduced in the chapter. These summaries are a helpful way to recap the
material covered in the chapter.
• Key terms—All terms introduced with bold text are gathered together in a Key
Terms list at the end of each chapter. This list gives you an easy way to check
your understanding of important terms and is a useful reference.
• Review questions—The end-of-chapter assessment begins with review questions
that reinforce the concepts and techniques covered in each chapter. Answering
these questions helps ensure that you have mastered important topics.
• Critical Thinking sections—The end-of-chapter Critical Thinking section gives you
more opportunities for hands-on practice with challenge labs, which enable you
to use the knowledge you’ve gained from reading the chapter and performing
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction xxi
Tip
Tips offer extra information on resources, how to solve problems, and t ime-saving shortcuts.
Note
Notes present additional helpful material related to the subject being d
iscussed.
Caution
The Caution icon identifies important information about potential mistakes or hazards.
Hands-On Projects
Each hands-on project in this book is preceded by this banner.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxii Introduction
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction xxiii
Acknowledgments
I would like to thank the team at Cengage for this opportunity to improve and expand
on the seventh edition of this book. This team includes Kristin McNary, Product Team
Manager; Brooke Greenhouse, Senior Content Developer; and Danielle Shaw, Technical
Editor, for verifying technical content and testing projects and labs for accuracy. Thanks
especially to my development editor, Dan Seiter, for his excellent guidance in creating
a polished product. Additional praise and special thanks go to my beautiful wife, Julie;
our daughters, Camille and Sophia; and our son, Michael. They all deserve medals for
their patience and support while going husbandless and fatherless during the develop-
ment of this book.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxiv Introduction
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction xxv
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1
Introduction to
Computer Networks
After reading this chapter and completing the exercises, you will
be able to:
Describe basic computer components and operations
In only a few decades, computer networks have evolved from being a complex
technology accessible to only the most tech-savvy users to being part of most people’s
everyday lives. Computer networks can be found in almost every business, school,
and home. Their use is available to anyone with a mobile device or computer and a
network connection, but installation and upkeep of all but the smallest networks still
require considerable know-how. This chapter starts you on the path toward acquiring
the skills to manage a large corporate network or simply configure a home network
with a wireless router.
This chapter begins by discussing the computer and its role in a network to give
you a foundation for the topics in this book. Next, you examine the components of
a network and the fundamentals of communication between computers. Many new
terms are introduced and defined, and the varied types of networks and network
servers you might encounter are described.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
2 CHAPTER 1 Introduction to Computer Networks
Time
Hands-on project Requirements required Notes
Hands-On Project 1-1: Examining a Net-XX 10 minutes A Windows 10 computer
Computer’s Boot Procedure configured as described in
“Before You Begin”
The ability to access the
firmware setup screen
Hands-On Project 1-2: Upgrading Net-XX, a NIC, a 30 minutes A lab computer set up as
a Stand-alone Computer to a patch cable, and described in “Before You
Networked Computer a hub or switch Begin”
Hands-On Project 1-3: Viewing Net-XX 10 minutes
Network Software Layers
Hands-On Project 1-4: Using Net-XX 15 minutes
ipconfig, ping, and arp
Hands-On Project 1-5: Exploring Net-XX 15 minutes
Peer-to-Peer Networking
Hands-On Project 1-6: Creating a Net-XX 15 minutes
Shared Folder
Hands-On Project 1-7: Transferring a Net-XX 15 minutes A share named NetDocs on
Document to Another Computer the instructor’s computer
(Net-Instr)
Hands-On Project 1-8: Looking A computer with 20 minutes Internet access
Up Computer and Networking Internet access
Acronyms
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 3
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
4 CHAPTER 1 Introduction to Computer Networks
network cards have rudimentary processors that perform actions on incoming and
outgoing data to help supplement the computer’s main CPU.
Input Components
Before a computer can do any processing, it requires input, commonly from user-
controlled devices, such as keyboards, microphones, Webcams, and scanners. External
interfaces, such as serial, FireWire, and USB ports, can also be used to get input from
external devices.
Input is also generated by storage devices, such as hard disks and CDs/DVDs
that store programs and data files containing computer instructions and data. For
example, a spreadsheet program, such as Microsoft Excel, might contain instructions
for the CPU to calculate formulas for adding the values of two columns of data and
a spreadsheet file called MyBudget.xls containing the numbers and formulas the
spreadsheet program should use. Both the program (Microsoft Excel) and the data
file (MyBudget.xls) are used as input to the CPU, which then processes the program
instructions and data.
A spreadsheet program normally starts when a user double-clicks the spreadsheet
program icon or the icon representing the spreadsheet data file. These actions
are instigated by user input. Sometimes, however, your computer seems to start
performing actions without user input. For example, you might have noticed that
your hard drive sometimes shows activity without any obvious action from you to
initiate it. Or, a notification might pop up on your screen reminding you of a calendar
event. However, inputs to a computer can include timers that cause programs to run
periodically and data arriving from network cards, for example, that cause a program
or process to run. So, although it sometimes seems as though your computer has a
mind of its own, computers don’t actually do anything without first getting input to jolt
them into action.
Processing Components
A computer’s main processing component is the CPU, which executes instructions
from computer programs, such as word-processing programs and Web browsers. It
also runs the instructions making up the OS, which provides a user interface and the
environment in which applications run. Aside from the CPU, computers usually include
ancillary processors associated with input/output (I/O) devices, such as graphics cards.
These processors are often referred to as “onboard processors.” The processor on a
graphics card, called a “graphics processing unit (GPU),” takes a high-level graphics
instruction, such as “draw a circle,” and performs the calculations needed to draw the
circle on a display device. With an onboard GPU, the main CPU doesn’t have to handle
many of the complex calculations graphical applications require, thereby improving
overall system performance. Other devices, such as network interface cards and disk
controller cards, might also include onboard processors.
CPUs are usually composed of two or more processors, called cores, in one
package. A multicore CPU is like a person with two brains. With only one brain, you
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 5
could add four numbers, but you would probably do it in three sequential summing
operations: Add the first number to the second number, take the first sum and add it
to the third number, and add that sum to the fourth number to arrive at the final sum.
If you had two brains, you’d still need three summing operations, but two could be
done simultaneously: The first brain adds the first two numbers while the second brain
is adding the third and fourth numbers; then the second brain gives its results to the
first brain, and the first brain sums the results of the first two summing operations. So,
multicore CPUs enable computers to carry out multiple instructions simultaneously,
which results in better overall performance when running demanding applications.
Output Components
Output components include monitors and printers, but they also include storage
devices, network cards, and sound cards, to name a few. The external interfaces
mentioned previously as input components can be used as output components, too.
For example, a disk drive connected to a USB port allows reading files from the disk
(input) and writing files to the disk (output).
Storage Components
Storage components are a major part of a computer’s configuration. Generally
speaking, the more storage a computer has, the better the performance is. As you saw
in the previous section, most storage components are both input and output devices,
allowing data to be saved (output) and then accessed again later (input). When most
people think of storage, they think of disk drives, CD/DVD drives, and USB or flash
drives. However, there are two main categories of storage: short-term storage and
long-term storage.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
6 CHAPTER 1 Introduction to Computer Networks
of a second). So, if the disk drive must be used to supplement RAM while running
an application, that application, and indeed the entire computer, slows down
precipitously.
On current desktop computers, the amount of RAM installed is usually 4 GB or
more. More is generally better, but the amount of RAM you actually need depends
on how you use your computer. If you usually have only one or two typical business
applications open at once, 2 GB might be enough. However, if you run complex
graphics applications or games or have several applications open simultaneously,
you’ll likely benefit from having more RAM.
Long-Term Storage
Long-term storage maintains its data even when there’s no power. Examples include
hard disks, CDs/DVDs, solid-state drives (SSDs), and USB flash drives as well as
other types of removable media. Long-term storage is used to store document and
multimedia files as well as the files that make up applications and the OS. The
amount of storage a computer needs depends on the type and quantity of files to be
stored. In general, office documents, such as word-processing files, spreadsheets,
and presentations, require comparatively little space. Multimedia files—pictures,
music files, and videos—require much more space. Long-term storage is plentiful and
extremely inexpensive. Hard drive specifications are in hundreds of gigabytes, with
multi-terabyte (a terabyte is 1000 GB) drives quite commonplace. More details about
hard disks are discussed later in “Personal Computer Hardware.”
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 7
simply divide by 8; for example, 100 Mbps would be about 12.5 MBps. Conversely, to
convert bytes to bits, multiply by 8. All of the prefixes used to express large numbers
of bits or bytes can be confusing, so Table 1-2 is given as a reference. Notice that each
prefix increases the previous prefix by a factor of 1000; for example, 1 megabyte is
equal to 1000 kilobytes.
Prefix Value
Kilo (K) Thousand (103 )
Mega (M) Million (106 )
Giga (G) Billion (109 )
Tera (T) Trillion (1012 )
Peta (P) Quadrillion (1015 )
Exa (E) Quintillion (1018 )
Zeta (Z) Sextillion (1021 )
Yotta (Y) Septillion (1024 )
Note
Table 1-2 isn’t exactly right because computers do everything in binary, including how they
count. So, a kilobyte is actually 1024 or 210 bytes. A megabyte is 1000 kilobytes, which is
actually 1,048,576 bytes, but it’s much easier for us humans to work with round numbers like
million and billion. So, when estimating storage capacity, we round 100 GB to 100 billion bytes
instead of the more difficult 107,374,182,400 bytes.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
8 CHAPTER 1 Introduction to Computer Networks
CPU socket
RAM slots
IDE
connector
All data that goes into or comes out of a computer goes through the motherboard
because all storage and I/O devices are connected to the motherboard, as is the CPU,
which processes data going in and coming out of a computer.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 9
Component Description
CPU socket The CPU is installed in this socket.
PCI Express bus Used to add functionality to a PC by adding expansion cards that have a
expansion slots Peripheral Component Interconnect Express (PCIe) connector. The larger slots
are suitable for high-performance expansion cards, such as graphics cards and
disk controllers. The smaller slots are best suited to sound cards and network
interface cards.
PCI bus This older expansion card standard is rarely found on new computers.
expansion slots
RAM slots Slots for installing RAM on the motherboard.
Chipset with The chipset consists of two chips referred to as the Northbridge and the
heat sinks Southbridge. These chips control data transfers between memory, expansion
slots, I/O devices, and the CPU. The heat sink sits on top of the chipset to
prevent it from overheating.
SATA connectors Used for connecting hard drives and CD/DVD drives that use the Serial AT
Attachment (SATA) specification.
IDE connector Used for connecting Integrated Drive Electronics (IDE) hard drives and
CD/DVD-ROM drives. This older standard is rarely found on new computers.
Main power This connector is where the motherboard receives power from the system
connector power supply.
bus types come and go, it’s safe to say that replacements for an older bus design will
almost certainly be faster than their predecessor.
In a computer, there are buses between the CPU and RAM, between the CPU and disk
drives, and between the CPU and expansion slots, among others. For the purposes of this
book, you’re most interested in the bus connecting expansion slots to the motherboard
because you usually connect a network interface card (NIC) into one of these slots. NIC
installation and expansion slot bus types are discussed in Chapter 2. What you need to
know now is that not all motherboards come with all types of expansion slots, and the
faster and busier your computer is, the faster its bus type needs to be.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
10 CHAPTER 1 Introduction to Computer Networks
the better the hard drive performance is. When a file is requested to be written or read, its
location is determined, and then the read/write heads are moved over the corresponding
spot on the platter. After the platter spins to the file’s starting location, the read/write
heads are activated to read or write the data. The average amount of time platters take
to spin into position is called the “rotational delay” or “latency.” The amount of time
required to move read/write heads to the correct place is the seek time, and the time it
takes to read or write data is the transfer time. The average amount of time between the
request to read or write data and the time the action is performed is the access time.
Note
The terms used to measure hard drive performance aren’t universal among manufacturers,
but the terms used in the preceding paragraph represent most specifications.
Actuator arm
Magnetic
platters
Read/write
heads
Hard disks store the documents you use with your computer as well as the
applications that open these documents. In addition, the hard disk stores the OS your
computer loads when it boots. As mentioned, the hard disk acts as an input device
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 11
when files are read. When the computer boots, the OS files are read from the disk, and
instructions in these files are processed by the CPU. However, the files don’t go directly
from the hard disk to the CPU; first, they’re transferred to short-term storage (RAM).
Solid-State Drives
Solid-state drives are used in place of hard drives in many systems because of their
speed and reliability. An SSD uses a type of storage called “flash memory” that
contains no moving parts and has faster access times than a mechanical hard drive.
SSDs are more expensive than hard drives when you compare the price per gigabyte of
storage, but their price continues to fall. SSDs are most often used in mobile devices
(such as laptops, smartphones, and tablets) but are also found on high-performance
desktops and servers, often supplementing, rather than replacing, hard drive storage.
RAM Fundamentals
RAM, the main short-term storage component on a computer, consists of capacitors
to store data and transistors to control access to data. Capacitors require power to
maintain the bits they store. Because RAM requires continuous power to store data, it’s
referred to as “volatile memory.”
RAM has no moving parts, so as mentioned, accessing data in RAM is much faster
than accessing data on a hard drive—there’s no seek time or rotational delay. Because
RAM is so much faster than a hard drive, any information the CPU processes should be
in RAM. If data the CPU requires is located on the hard drive, it’s loaded into RAM first,
which takes considerable time. Therefore, the more RAM your system has, the more
likely it is that all the data needed by running programs can be stored in RAM, making
the system perform much faster.
Note
While SSDs have no moving parts, they are still considerably slower than RAM, so SSDs will
not replace RAM in a system any time soon.
Firmware Fundamentals
A key component of every computer is its firmware. Firmware is a computer program
stored in nonvolatile memory, such as ROM or flash memory. Firmware is located on
the motherboard and is executed when the computer is first powered on. Nonvolatile
memory is a type of storage that maintains its data after power is removed. The
firmware on most PCs is called the basic input/output system (BIOS) or Unified
Extensible Firmware Interface (UEFI). A main function of the BIOS or UEFI is to tell
the CPU to perform certain tasks when power is first applied to the computer, including
initializing motherboard hardware, performing a power-on self-test (POST), and
beginning the boot procedure.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
12 CHAPTER 1 Introduction to Computer Networks
These steps apply to almost every type of computer, including very small
computing devices, such as smartphones and tablets. Probably the biggest difference
between computers is what occurs in the last step. OS services are programs that are
part of the OS rather than applications a user starts. The services an OS starts can vary
greatly, depending on which OS is loaded and how it’s configured. The number and
type of services started on a system are what, at least in part, account for the time it
takes a system to boot completely. Examples of common OS services include the user
interface, the file system, and, of course, networking services.
Note
The projects in this book involving a Windows client OS use Windows 10 Education Edition.
Other editions of Windows 10 can be used.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 13
Description: In this project, you examine the computer boot procedure from beginning to end,
using a Windows computer. You also examine the firmware setup utility and view the configura-
tion that specifies which devices the firmware should search for an OS. Because the firmware
varies among computers, your instructor might have to assist with the keystrokes you enter to
run the setup utility and view the boot order menu. This project uses a virtual machine and the
setup utility in VMware Workstation. If you aren’t using virtual machines for the projects in this
book, the setup utility on most computers is similar.
Caution
Your computer must be turned off before you begin this project. Read the first step
carefully before turning on the computer, as you need to act quickly to enter the
setup utility.
1. Turn on your computer. Watch the screen carefully for a message telling you what key
to press to activate the setup utility. On many systems, this key is F1, F2, or Delete. If you
don’t press the key in time, the OS boots normally. If this happens, shut down the com-
puter and try again.
2. When you have entered the setup utility, your screen might look similar to Figure 1-3, but
many setup screens look different. Before continuing, write down the steps of the boot pro-
cedure, listed earlier under “Computer Boot Procedure,” that have taken place to this point:
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
14 CHAPTER 1 Introduction to Computer Networks
3. Navigate the setup utility until you find the boot order menu (see Figure 1-4). You can
change the order in which the firmware looks for boot devices or exclude a device from
the boot order. The firmware boots from the first device in which it finds an OS. You
might need to change the boot order if, for example, you have an OS installed on the
hard drive but want to boot from an installation CD/DVD to install a new OS. In this case,
you move the CD/DVD device to the first entry in the boot order.
4. For now, you can leave the boot order unchanged. To quit the setup utility, press the
correct key (usually specified at the bottom of the screen). In Figure 1-4, you press
Esc to exit without saving changes or F10 to save the changes before exiting. In either
case, when you exit, the computer restarts. Press the key for exiting without saving
changes.
5. Write the final steps of the boot procedure that occurred as Windows started:
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 15
Network Components
Imagine a computer with no networking components—no networking hardware or
software. It’s hard to imagine in this age of seemingly everything being connected.
However, not too long ago, when you bought a computer, its main purpose was to run
applications such as word-processing and spreadsheet programs, not Web browsers
and e-mail. In fact, a computer had neither the hardware nor the software needed for
browsers and e-mail. These computers were called stand-alone computers. If you
wanted to network this type of computer, you had to add these required components:
• Network interface card—A NIC is an add-on card that’s plugged into a
motherboard expansion slot and provides a connection between the computer
and the network. Most computers have a NIC built into the motherboard, so no
additional card is necessary. NICs are discussed in more detail in Chapter 2.
• Network medium—A cable that plugs into the NIC makes the connection
between a computer and the rest of the network. In networks with just two
computers, the other end of the cable can plug into the second computer’s NIC.
More likely, the other end of the cable plugs into an interconnecting device that
accommodates several computer connections. Network media can also be the
air waves, as in wireless networks. In this case, the connection is between the
antenna on the NIC and the antenna on another NIC or interconnecting device.
Network media are discussed in more detail in Chapter 4.
• Interconnecting device—Although this component isn’t always necessary
because two computers can be connected directly with a cable and small
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
16 CHAPTER 1 Introduction to Computer Networks
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 17
Note
The term “NIC device driver” is often shortened to simply “NIC driver,” which is the term used
throughout this book.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Another random document with
no related content on Scribd:
How we came to some gates and deep passes difficult to travel, and we went 158
up to the gates, at which the kingdom begins which is named Xoa
CAP. LXVI.
How the Prester John went to the burial of Janes Ichee of the monastery of
Brilibanos, and of the election of another Ichee, who was a Moor 161
CAP. LXVII.
How we travelled for three days through plains, and of the curing of infirmities
and of the sight of the people 163
CAP. LXVIII.
How a great lord of title was given to us as a guard, and of the tent which he
sent us 165
CAP. LXIX.
How the ambassador, and we with him, were summoned by order of the
Prester, and of the order in which we went, and of his state 166
CAP. LXX.
Of the theft which was done to us when the baggage was moved, and of the
provisions which the Prester sent us, and of the conversation the friar had
with us 170
CAP. LXXI.
How the Prester moved away with his court, and how the friar told the
ambassador to trade if he wished, and how the ambassador went to the
court 172
CAP. LXXII.
Of the Franks who are in the country of the Prester, and how they arrived
here, and how they advised us to give the pepper and goods which we
brought 174
CAP. LXXIII.
How they told the ambassador that the grandees of the court were
counselling the Prester not to let him return, and how he ordered him to
change his tent, and asked for a cross, and how he sent to summon the
ambassador 177
CAP. LXXIV.
How the ambassador having been summoned by the Prester, he did not hear 180
him in person
CAP. LXXV.
How the ambassador was summoned another time, and he took the letters
he had brought, and how we asked leave to say mass 184
CAP. LXXVI.
Of the questions which were put to the ambassador by order of Prester John,
and of the dress which he gave to a page, and also whether we brought
with us the means of making wafers 187
CAP. LXXVII.
How the Prester John sent to call me, the priest Francisco Alvarez, and to
take to him wafers and vestments, and of the questions which he asked
me 188
CAP. LXXVIII.
Of the robbery which took place at the ambassador’s, and of the complaint
made respecting it to Prester John, and how we were robbed, and how
Prester John sent a tent for a church 194
CAP. LXXIX.
How the Prester sent to call the ambassador, and of the questions he put to
him, and how he sent to beg for the swords which he had, and some
pantaloons, and how they were sent 195
CAP. LXXX.
How Prester John sent certain horses to the ambassador for them to
skirmish, and how they did it, and of a chalice which the Prester sent him,
and of questions which were put, and of the robbery in the tent 197
CAP. LXXXI.
How the Prester sent to show a horse to the ambassador, and how he
ordered the great men of his Court to come and hear our mass, and how
the Prester sent to call me, and what he asked me 199
CAP. LXXXII.
How the Ambassador was summoned, and how he presented the letters
which he had brought to Prester John, and of his age and state 202
CAP. LXXXIII.
How I was summoned, and of the questions which they put to me respecting 205
the lives of St. Jerome, St. Dominick, and St. Francis
CAP. LXXXIV.
How the lives of the said Saints were taken to him, and how he had them
translated into his language, and of the satisfaction they felt at our mass,
and how Prester John sent for us and clothed us 209
CAP. LXXXV.
Of the sudden start which Prester John made for another place, and of the
way in which they dealt with the ambassador respecting his baggage, and
of the discord there was, and of the visit the Prester sent 212
CAP. LXXXVI.
How the Prester was informed of the quarrels of the Portuguese, and
entreated them to be friends, and what more passed, and of the wrestling
match and the baptism we did here 214
CAP. LXXXVII.
Of the number of men, horse and foot, who go with the Prester when he
travels 217
CAP. LXXXVIII.
Of the churches at Court, and how they travel, and how the altar stones are
reverenced, and how Prester John shows himself to the people each year 219
CAP. LXXXIX.
How Prester John sent to call me to say mass for him on Christmas-day, and
of confession and communion 220
CAP. XC.
How the Prester gave leave to go to the ambassador and the others, and
ordered me to remain alone with the interpreter, and of the questions about
Church matters, and how we all sang compline, and how Prester John
departed that night 224
CAP. XCI.
How the Prester went to lodge at the church of St. George, and ordered it to
be shown to the people of the embassy, and after certain questions
ordered me to be shown some rich umbrellas 228
CAP. XCII.
Of the travelling of Prester John, and the manner of his state when he is on 231
the road
CAP. XCIII.
How the Prester went to the church of Macham Selasem, and of the
procession and reception that they gave him, and what passed between
His Highness and me respecting the reception 233
CAP. XCIV.
Of the fashion and things of this church of the Trinity, and how the Prester
sent to tell the ambassador to go and see the church of his mother, and of
the things which happened in it 236
CAP. XCV.
How Prester John sent to tell those of the embassy and the Franks to go and
see his baptism, and of the representation which the Franks made for him,
and how he ordered that I should be present at the baptism, and of the
fashion of the tank, and how he desired the Portuguese to swim, and gave
them a banquet 240
CAP. XCVI.
How I went with an interpreter to visit the Abima Mark, and how I was
questioned about circumcision, and how the Abima celebrates the holy
orders 245
CAP. XCVII.
How the Prester questioned me about the ceremony of holy orders, and also
how I went to the lesser orders which they call zagonais, and what sort of
people are ordained 248
CAP. XCVIII.
How long a time the Prester’s country was without an Abima, and for what
cause and where they go to seek them, and of the state of the Abima, and
how he goes when he rides 253
CAP. XCIX.
Of the assembly of clergy, which took place in the church of Macham
Selasem when they consecrated it, and of the translation of the King
Nahum, father of this Prester, and of a small church there is there 256
CAP. C.
Of the conversation which the ambassador had with the Prester about 258
carpets, and how the Prester ordered for us an evening’s entertainment
and banquet
CAP. CI.
How the Prester sent to call the ambassador and those that were with him,
and of what passed in the great church 261
CAP. CII.
How the ambassador and all the Franks went to visit the Abima, and of what
passed there 263
CAP. CIII.
How Pero de Covilham, Portuguese, is in the country of the Prester, and how
he came there, and why he was sent 265
CAP. CIV.
How Prester John determined to write to the King and to the Captain-major,
and how he behaved with the ambassador and with the Franks who were
in his country, and of the decision as to departure 270
CAP. CV.
How the Prester sent to the ambassador thirty ounces of gold, and fifty for
those that came with him, and a crown and letters for the King of Portugal,
and letters for the Captain-major, and how we left the Court and of the road
we took 273
CAP. CVI.
Of what happened in the town of Manadeley with the Moors 277
CAP. CVII.
How two great gentlemen from the Court came to us to make friendship
between us, and committed us to the captain-major 279
CAP. CVIII.
How they took us on the road to the Court, and how they brought us back to
this country 283
CAP. CIX.
In what time and day Lent begins in the country of Prester John, and of the
great fast and abstinence of the friars, and how at night they put
themselves in the tank 284
CAP. CX.
Of the fast of Lent in the country of Prester John, and of the office of Palms 289
and of the Holy Week
CAP. CXI.
How we kept a Lent at the Court of the Prester, and we kept it in the country
of Gorage, and they ordered us to say mass, and how we did not say it 293
CAP. CXII.
How Don Luis de Meneses wrote to the ambassador to depart, and how they
did not find him at Court, and how the King Don Manuel had died 298
CAP. CXIII.
Of the battle which the Prester had with the King of Adel, and how he
defeated Captain Mahomed 304
CAP. CXIV.
How the Prester sent us a map of the world which we had brought him, for us
to translate the writing into Abyssinian, and what more passed, and of the
letters for the Pope 311
CAP. CXV.
How in the letters of Don Luis it was said that we should require justice for
certain men of his who had been killed, and the Prester sent there the
Chief Justice of the Court, and Zagazabo, in company of Don Rodrigo to
Portugal 314
CAP. CXVI.
How Zagazabo the ambassador returned to the Court, and I with him, for
business which concerned him, and how they flogged the Chief Justice
and two friars, and why 317
CAP. CXVII.
How, after the death of Queen Helena, the great Betudete went to collect the
dues of her kingdom, and what they were, and how the Queen of Adea
came to ask assistance, and what people came with her on mules 321
CAP. CXVIII.
How assistance was given to the Queen of Adea, and how the Prester
ordered the great Betudete to be arrested, and why, and how he became
free, and also he ordered other lords to be arrested 325
CAP. CXIX.
How the Tigrimahom was killed, and the other Betudete deposed, also 329
Abdenago from his lordship, and the ambassador was provided for, and
Prester John went in person to the kingdom of Adea
CAP. CXX.
Of the manner in which the Prester encamps with his Court 331
CAP. CXXI.
Of the tent of justice and method of it, and how they hear the parties 333
CAP. CXXII.
Which speaks of the manner of the prison 335
CAP. CXXIII.
Where the dwellings of the Chief Justices are situated, and the site of the
market place, and who are the merchants and hucksters 336
CAP. CXXIV.
How the lords and gentlemen and all other people pitch their tents, according
to their regulations 337
CAP. CXXV.
Of the manner in which the lords and gentlemen come to the Court, and go
about it, and depart from it 338
CAP. CXXVI.
How those who go to and come from the wars approach the Prester more
closely, and of the maintenance they get 340
CAP. CXXVII.
Of the manner in which they carry the Prester’s property when he travels,
and of the brocades and silks which he sent to Jerusalem, and of the great
treasury 340
CAP. CXXVIII.
How three hundred and odd friars departed from Barua in pilgrimage to
Jerusalem, and how they killed them 342
CAP. CXXIX.
Of the countries and kingdoms which are on the frontiers of Prester John 345
CAP. CXXX.
Of the kingdom of Adel, and how the king is esteemed as a saint amongst 346
the Moors
CAP. CXXXI.
Of the kingdom of Adea, where it begins and where it ends 346
CAP. CXXII.
Of the lordships of Ganze and Gamu, and of the kingdom of Gorage 347
CAP. CXXXIII.
Of the kingdom of Damute, and of the much gold there is in it, and how it is
collected, and to the south of this are the Amazons, if they are there 347
CAP. CXXXIV.
Of the lordships of the Cafates, who they say had been Jews, and how they
are warriors 349
CAP. CXXXV.
Of the kingdom of Gojame which belonged to Queen Helena, where the river
Nile rises, and of the much gold there is there 350
CAP. CXXXVI.
Of the kingdom of Bagamidri, which is said to be very large, and how silver is
found in its mountains 351
CAP. CXXXVII.
Of some lordships which are called of the Nubians, who had been Christians,
and of the number of churches which are in the country which they border
upon 351
CAP. CXXXVIII.
Of the officials that Solomon ordained for his son that he had of the Queen
Sabba when he sent him to Ethiopia; and how they still draw honour from
these offices 353
CAP. CXXXIX.
How the ambassador of Prester John took possession of his lordship, and
the Prester gave him a title of all of it, and we departed to the sea 354
CAP. CXL.
How the Portuguese came for us, and who was the captain 356
CAP. CXLI.
How the Barnagais made ready, and we travelled with him on the road to the
sea 360
_______________________
In this Part is related the Journey which was made from the country of the Prester John to
Portugal.
CAP. I.
Of how we departed from the port and island of Masua until arriving at Ormuz 364
CAP. II.
Of the translation of the letter which Prester John sent to Diego Lopez, and
which was given to Lopo Vaz de Sampayo 368
CAP. III.
Of the voyage we made from Ormuz to India, as far as Cochim 374
CAP. IV.
Of the voyage we made from Cananor to Lisbon, and of what happened to us
by the way 378
CAP. V.
Of the journey we made from Lisbon to Coimbra, and how we remained at
Çarnache 382
CAP. VI.
How we departed from Çarnache on the way to Coimbra, and the reception
that was made, and how the embassage was given, and of the welcome
which the King our Sovereign gave us 385
CAP. VII.
Of the translation of the letter which the Prester sent to Don Manuel 389
CAP. VIII.
Translation of the letter of Prester John to the King Don Joam our Sovereign 396
CAP. IX.
Of certain questions which the Archbishop of Braga put to Francisco Alvarez,
and the answers which he gave 401
ERRATA AND NOTES.
Page 36, line 22, for “Rodrigro”, read “Rodrigo”.
„ 84 note, “mancal”. “Baton ferré des deux bouts”.—
Roquette’s Dict.
„ 151, line 18, for “sleeep”, read “sleep”.
„ 178, line 28, “a crucifix painted on it”, or perhaps, “a painted
crucifix on it”.
„ 186, note. See Grove’s Dictionary of Music for a note on the
Monochord.
„ 199, note. “Alaqueca, laqueca, pierre des Indes qui arrête le
flux de sang.”—Roquette’s Dict.
„ 228, line 25, for “Bruncaliam”, read “Brancaliam”.
„ 241. Col. Meadows Taylor describes a similar miracle play
represented at Aurungabad by the Portuguese monks.—Story of my
Life, p. 39.
„ 295, line 2, for “pesons”, read “persons”.
„ 324, last line, for “littlo”, read “little”.
„ 325, “cap. cxvii”, read “cxviii”.
„ 344, line 33, “Cosme, Damiano”, or the church of Saints
Cosmo and Damian, martyrs united in the Calendar under 27th
September.
„ 408, note, “Tahu.” This is the Tau-cross or T-shaped crutch
emblem of St. Anthony, so called from the name of the letter in the
Greek alphabet.
PROLOGUE TO THE KING OUR SOVEREIGN.
Cap. iv.—How the Captain General and the Barnagais saw each other,
and how it was arranged that Rodrigo de Lima should go with
Mattheus to Prester John.
On Tuesday, the seventeenth day of the said month of April, the
Barnagais came to the town of Arquiquo, and sent a message to the
Governor of his having come. As it seemed likely to the governor
that he would come to speak to him on the beach, he ordered a tent
to be pitched and stuffs to be arranged in the best manner possible,
and ordered seats to be made for sitting on. When all was done, a
message arrived that the Barnagais would not come there: then the
same day Antonio de Saldanha went to this town of Arquiquo to
speak to the Barnagais, and he brought a message and agreement
that they should meet and see one another midway, and so we all
got ready to go with the governor: some by sea and some by land,
as far as half way where they were to see one another. There the
Governor ordered his tents to be pitched and seats to be made. The
Barnagais coming first would not come to the place where the tents
were spread and the seats made. The Captain General having
landed, and learned that the Barnagais would not come to the tents,
ordered them to go with the seats and leave the tents; but still he
would not stir with his people to where the seats were placed. The
Captain General again sent Antonio de Saldanha and the
ambassador Mattheus to him: then they agreed that both should
approach each other, that is, the Captain General and the Barnagais.
So they did, and they saw each other and spoke in a very wide plain,
seated on the ground upon carpets. Among many other things that
they talked of, the principal one was that both gave thanks to God for
their meeting, the Barnagais saying that they had it written in their
books, that Christians from distant lands were to come to that port to
join with the people of Prester John, and that they would make a well
of water, and that there would be no more Moors there: and since
God fulfilled this, that they should affirm and swear friendship. They
then took a cross which was there for that purpose, and the
Barnagais took it in his hand, and said that he swore on that sign of
the cross, and on that on which our Lord Jesus Christ suffered, in the
name of Prester John and in his own, that he would always favour
and help to favour and assist the men and affairs of the king of
Portugal and his captains who came to this port, or to other lands
where they might be able to give them assistance and favour, and
also that he would take the ambassador Mattheus into his safe
keeping, and likewise other ambassadors and people, if the Captain
General should wish to send them through the kingdoms and
lordships of Prester John. The Captain General swore in like manner
to do the same for the affairs of Prester John and the Barnagais,
wherever he might meet with them, and that the other captains and
lords of the kingdom of Portugal would act likewise. The Captain
General gave to the Barnagais arms, clothes, and rich stuffs: and the
Barnagais gave the Captain General a horse and a mule, both of
great price. So they took leave of each other very joyful and
contented, the Captain General to the ships, and the Barnagais to
Arquiquo.[5] The Barnagais brought with him quite two hundred
horsemen, and more than two thousand men on foot. When our
gentlemen and captains saw this novelty which God had so
provided, and how a path was opened for aggrandising the holy
Catholic faith, where they had small hopes of finding such; because
they all held Mattheus to be false and a liar, so that there were
grounds for putting him on shore and leaving him alone; many then
clamoured and asked favour of the Governor, each man for himself
to be allowed to go with Mattheus on an embassy to Prester John,
and here they all affirmed by what they saw that Mattheus was a true
ambassador. Since many asked for it, it was given to Don Rodrigo
de Lima; then the Captain General settled who were to go with him.
We were the following: First, Don Rodrigo de Lima, Jorge d’Abreu,
Lopo da Gama, Joam Escolar, clerk of the embassy, Joam
Gonzalvez, its interpreter and factor, Manoel de Mares, player of
organs, Pero Lopez, mestre Joam, Gaspar Pereira, Estevan
Palharte, both servants of Don Rodrigo; Joam Fernandez, Lazaro
d’Andrade, painter, Alonzo Mendez, and I, unworthy priest,
Francisco Alvarez.[6] These went in company with Don Rodrigo; the
Captain General here said, in the presence of all: Don Rodrigo, I do
not send the father Francisco Alvarez with you, but I send you with
him, and do not do anything without his advice. There went with
Mattheus three Portuguese, one was named Magalhaēs, another
Alvarenga, another Diogo Fernandez.
Cap. v.—Of the goods which the Captain sent to Prester John.
They then prepared the present which was to be sent to the
Prester: not such as the King our Sovereign had sent by Duarte
Galvan, because that had been dispersed in Cochim by Lopo
Soarez: and what we now brought was poor enough, and we took for
excuse that the goods which we brought had been lost in the ship St.
Antonio, which was lost near Dara in the mouth of the straits. These
were the goods which we took to Prester John: first, a gold sword
with a rich hilt, four pieces of tapestry, some rich cuirasses, a helmet
and two swivel guns, four chambers, some balls, two barrels of
powder, a map of the world, some organs. With these we set out
from the ships to Arquiquo, where we went to present ourselves to
the Barnagais. Thence we went to rest about two crossbow shots
distance above the town, in a plain at the foot of a mountain. There
they soon sent us a cow, and bread and wine of the country. We
waited there because they had to send to us, or give us from the
country, riding horses and camels for the baggage. This day was
Friday, and because in this country they keep Saturday and Sunday,
Saturday for the old law and Sunday for the new, therefore we
remained thus both the two days. In these days the ambassador
Mattheus settled with Don Rodrigo and with all of us, that we should
not go with the Barnagais because he was a great lord, and that we
should do much better to go to the monastery of Bisam: and that
from that place we should get a better equipment than from the
Barnagais. Don Rodrigo, doing this at his wish, sent to tell the
Barnagais that we were not going with him, and that we were going
to Bisam. And the Barnagais, not grieving on this account, went
away and left us. And because our equipment had to be made by his
order, they gave us eight horses and no more, and thirty camels for
the baggage. So we remained discontented, knowing the mistake we
were making in leaving Barnagais to please Mattheus.
Cap. vi.—Of the day that we departed and the fleet went out of the
port, and where we went to keep the feast, and of a gentleman
who came to us.
We departed from this plain close to the town of Arquiquo, on
Monday the thirtieth of April. On this day, as soon as we lost sight of
the sea, and those of the sea lost sight of us, the fleet went out of the