Ebook Guide To Networking Essentials Mindtap Course List 8Th Edition Tomsho Online PDF All Chapter

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

Guide to Networking Essentials

(MindTap Course List), 8th Edition


Tomsho
Visit to download the full and correct content document:
https://ebookmeta.com/product/guide-to-networking-essentials-mindtap-course-list-8t
h-edition-tomsho/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

A Guide to SQL MindTap Course List 10th Edition Mark


Shellman

https://ebookmeta.com/product/a-guide-to-sql-mindtap-course-
list-10th-edition-mark-shellman/

CompTIA Network Guide to Networks MindTap Course List


9th Edition West Jill

https://ebookmeta.com/product/comptia-network-guide-to-networks-
mindtap-course-list-9th-edition-west-jill/

Networking Essentials, 6th Edition Beasley

https://ebookmeta.com/product/networking-essentials-6th-edition-
beasley/

Java Programming (MindTap Course List), 10th Edition


Joyce Farrell

https://ebookmeta.com/product/java-programming-mindtap-course-
list-10th-edition-joyce-farrell/
Marketing (MindTap Course List) 20th Edition William M.
Pride

https://ebookmeta.com/product/marketing-mindtap-course-list-20th-
edition-william-m-pride/

Understanding Human Behavior: A Guide for Health Care


Professionals (MindTap Course List) 10th Edition Alyson
Honeycutt

https://ebookmeta.com/product/understanding-human-behavior-a-
guide-for-health-care-professionals-mindtap-course-list-10th-
edition-alyson-honeycutt/

Our Sexuality (MindTap Course List) 14th Edition Robert


L. Crooks

https://ebookmeta.com/product/our-sexuality-mindtap-course-
list-14th-edition-robert-l-crooks/

Essentials of Economics, 8th Edition Sloman

https://ebookmeta.com/product/essentials-of-economics-8th-
edition-sloman/

Networking All-in-One For Dummies, 8th Edition Doug


Lowe

https://ebookmeta.com/product/networking-all-in-one-for-
dummies-8th-edition-doug-lowe/
NETWORKING
Eighth Edition

Guide to
Networking
Essentials

Greg Tomsho

Australia • Brazil • Mexico • Singapore • United Kingdom • United States

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.

Important Notice: Media content referenced within the product description or the product
text may not be available in the eBook version.

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Guide to Networking Essentials © 2020, 2016 Cengage Learning, Inc.
Eighth Edition Unless otherwise noted, all content is © Cengage.
Greg Tomsho
WCN: 02-300
SVP, Higher Education Product Management: ALL RIGHTS RESERVED. No part of this work covered by the
Erin Joyner copyright herein may be reproduced or distributed in any form
VP, Product Management: Mike Schenk or by any means, except as permitted by U.S. copyright law,
without the prior written permission of the copyright owner.
Product Director: Lauren Murphy
Windows® is a registered trademark of Microsoft Corporation.
Product Manager: Amy Savino Microsoft® is a registered trademark of Microsoft Corporation
Product Assistant: Thomas Benedetto in the United States and/or other countries.

Director, Learning Design: Rebecca von


Gillern For product information and technology assistance, contact us at
Cengage Customer & Sales Support, 1-800-354-9706 or
Senior Manager, Learning Design:
Leigh Hefferon ­support.cengage.com.

Learning Designer: Natalie Onderdonk For permission to use material from this text or product, submit
all requests online at
Vice President, Marketing – Science,
www.cengage.com/permissions.
Technology, & Math: Jason Sakos

Senior Marketing Director: Michele McTighe


Library of Congress Control Number: 2019907629
Marketing Manager: Cassie Cloutier
ISBN: 978-0-3571-1828-3
Product Specialist: Mackenzie Paine
Looseleaf ISBN: 978-0-3571-1833-7
Director, Content Creation: Juliet Steiner
Cengage
Senior Manager, Content Creation:
200 Pier 4 Boulevard, Suite 400
Patty Stephan
Boston, MA, 02210
Senior Content Manager: Brooke Greenhouse
USA
Director, Digital Production Services:
Cengage is a leading provider of customized learning solutions with
Krista Kellman
employees residing in nearly 40 different countries and sales in more
Digital Delivery Lead: Jim Vaughey than 125 countries around the world. Find your local representative at
www.cengage.com.
Developmental Editor: Dan Seiter

Production Service/Composition: SPi Global Cengage products are represented in Canada by Nelson Education, Ltd.
To learn more about Cengage platforms and services, register or access
Art Director: Erin Griffin
your online learning solution, or purchase materials for your course,
Cover Designer: Joseph Villanova visit www.cengage.com.
Cover image: iStockPhoto.com/ivanastar

Notice to the Reader

Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis in connection with any of
the product information contained herein. Publisher does not assume, and expressly disclaims, any obligation to obtain and include informa-
tion other than that provided to it by the manufacturer. The reader is expressly warned to consider and adopt all safety precautions that might
be indicated by the activities described herein and to avoid all potential hazards. By following the instructions contained herein, the reader
willingly assumes all risks in connection with such instructions. The publisher makes no representations or warranties of any kind, including but
not limited to, the warranties of fitness for particular purpose or merchantability, nor are any such representations implied with respect to the
material set forth herein, and the publisher takes no responsibility with respect to such material. The publisher shall not be liable for any special,
consequential, or exemplary damages resulting, in whole or part, from the readers’ use of, or reliance upon, this material.

Printed in the United States of America


Print Number: 01   Print Year: 2019

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Brief Contents
introduction������������������������������������������������������������������������������������������ xvii

CHAPTER 1
Introduction to Computer Networks...........................................................1

CHAPTER 2
Network Hardware Essentials��������������������������������������������������������������������59

CHAPTER 3
Network Topologies and Technologies���������������������������������������������������115

CHAPTER 4
Network Media������������������������������������������������������������������������������������������173

CHAPTER 5
Network Protocols�������������������������������������������������������������������������������������223

CHAPTER 6
IP Addressing����������������������������������������������������������������������������������������������285

CHAPTER 7
Network Reference Models and Standards��������������������������������������������345

CHAPTER 8
Network Hardware in Depth��������������������������������������������������������������������373

CHAPTER 9
Introduction to Network Security������������������������������������������������������������431

CHAPTER 10
Wide Area Networking and Cloud Computing���������������������������������������489

CHAPTER 11
Network Operating System Fundamentals��������������������������������������������533

CHAPTER 12
Network Management and Administration�������������������������������������������599

iii

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
iv Brief Contents

CHAPTER 13
The Internet of Things (IoT)��������������������������������������������������������������������� 667

CHAPTER 14
Troubleshooting and Support����������������������������������������������������������������� 721

APPENDIX A
Network Troubleshooting Guide������������������������������������������������������������ 775

APPENDIX B
MTA Exam 98-366 Objectives������������������������������������������������������������������� 781

GLOSSARY�������������������������������������������������������������������������������������������������� 785

INDEX���������������������������������������������������������������������������������������������������������� 807

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents
Introduction����������������������������������������������������������������������������������������� xvii

CHAPTER 1
Introduction to Computer Networks���������������������������������� ..1
An Overview of Computer Concepts�������������������������������������������������������������������� 3
Basic Functions of a Computer�������������������������������������������������������������������������3
Storage Components���������������������������������������������������������������������������������������� 5
Personal Computer Hardware���������������������������������������������������������������������������7
Computer Boot Procedure������������������������������������������������������������������������������� 12
The Fundamentals of Network Communication��������������������������������������������� 15
Network Components�������������������������������������������������������������������������������������� 15
Steps of Network Communication������������������������������������������������������������������ 18
Layers of the Network Communication Process��������������������������������������������� 19
How Two Computers Communicate on a LAN: Some Details����������������������� 20
Network Terms Explained������������������������������������������������������������������������������������ 28
LANs, Internetworks, WANs, and MANs���������������������������������������������������������28
Internet, Intranet, and Extranet����������������������������������������������������������������������32
Packets and Frames�����������������������������������������������������������������������������������������32
Clients and Servers������������������������������������������������������������������������������������������35
Network Models���������������������������������������������������������������������������������������������������� 37
Peer-to-Peer/Workgroup Model����������������������������������������������������������������������37
Server/Domain-Based Model��������������������������������������������������������������������������39
Chapter Summary������������������������������������������������������������������������������������������������� 47
Key Terms���������������������������������������������������������������������������������������������������������������� 48
Review Questions�������������������������������������������������������������������������������������������������� 48
Packet Tracer Labs������������������������������������������������������������������������������������������������� 51
Critical Thinking����������������������������������������������������������������������������������������������������� 57

CHAPTER 2
Network Hardware Essentials���������������������������������������������� 59
Network Repeaters and Hubs����������������������������������������������������������������������������� 61
Multiport Repeaters and Hubs������������������������������������������������������������������������62
Network Switches�������������������������������������������������������������������������������������������������� 65
Basic Switch Operation������������������������������������������������������������������������������������65

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
vi Table of Contents

Wireless Access Points������������������������������������������������������������������������������������������ 74


Basic AP Operation������������������������������������������������������������������������������������������ 75
Network Interface Cards�������������������������������������������������������������������������������������� 76
NIC Basics�������������������������������������������������������������������������������������������������������� 77
Selecting a NIC�������������������������������������������������������������������������������������������������80
NIC Drivers�������������������������������������������������������������������������������������������������������80
Wireless NICs��������������������������������������������������������������������������������������������������� 82
Routers�������������������������������������������������������������������������������������������������������������������� 84
Routers Connect LANs�������������������������������������������������������������������������������������86
Routers Create Broadcast Domains����������������������������������������������������������������� 88
Routers Work with IP Addresses and Routing Tables�������������������������������������89
Chapter Summary������������������������������������������������������������������������������������������������� 95
Key Terms���������������������������������������������������������������������������������������������������������������� 96
Review Questions�������������������������������������������������������������������������������������������������� 97
Packet Tracer Labs����������������������������������������������������������������������������������������������� 100
Critical Thinking��������������������������������������������������������������������������������������������������� 112

CHAPTER 3
Network Topologies and Technologies����������������������������������������� 115
Physical Topologies��������������������������������������������������������������������������������������������� 116
Physical Bus Topology������������������������������������������������������������������������������������ 117
Physical Star Topology������������������������������������������������������������������������������������ 119
Physical Ring Topology����������������������������������������������������������������������������������� 121
Point-to-Point Topology��������������������������������������������������������������������������������� 122
Logical Topologies����������������������������������������������������������������������������������������������� 125
Network Technologies���������������������������������������������������������������������������������������� 129
Network Technologies and Media������������������������������������������������������������������130
Ethernet Networks������������������������������������������������������������������������������������������ 131
Ethernet Standards�����������������������������������������������������������������������������������������136
Additional Ethernet Standards�����������������������������������������������������������������������139
802.11 Wi-Fi����������������������������������������������������������������������������������������������������������� 148
Wi-Fi Modes of Operation������������������������������������������������������������������������������148
Wi-Fi Channels and Frequencies������������������������������������������������������������������ 149
Wi-Fi Antennas���������������������������������������������������������������������������������������������� 151
Wi-Fi Access Methods and Operation������������������������������������������������������������ 152
Wi-Fi Signal Characteristics��������������������������������������������������������������������������� 153
Wi-Fi Standards���������������������������������������������������������������������������������������������� 155
Wi-Fi Security������������������������������������������������������������������������������������������������� 157
Token Ring Networks��������������������������������������������������������������������������������������158
Fiber Distributed Data Interface Technology�������������������������������������������������159

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents vii

Chapter Summary����������������������������������������������������������������������������������������������� 159


Key Terms�������������������������������������������������������������������������������������������������������������� 160
Review Questions������������������������������������������������������������������������������������������������ 161
Packet Tracer Labs����������������������������������������������������������������������������������������������� 163
Critical Thinking��������������������������������������������������������������������������������������������������� 168

CHAPTER 4
Network Media�������������������������������������������������������������������������������������������� 173
Wired Networking����������������������������������������������������������������������������������������������� 174
Criteria for Choosing Network Media������������������������������������������������������������ 174
Coaxial Cable���������������������������������������������������������������������������������������������������178
Twisted-Pair Cable������������������������������������������������������������������������������������������178
Structured Cabling: Managing and Installing a UTP Cable Plant�������������������185
Fiber-Optic Cable������������������������������������������������������������������������������������������������� 197
Fiber-Optic Connectors��������������������������������������������������������������������������������� 199
Fiber-Optic Installation���������������������������������������������������������������������������������200
Fiber-Optic Cable Types���������������������������������������������������������������������������������201
Cable-Testing Equipment�������������������������������������������������������������������������������201
Wireless Networking������������������������������������������������������������������������������������������� 202
Wireless Benefits������������������������������������������������������������������������������������������� 203
Types of Wireless Networks�������������������������������������������������������������������������� 204
Wireless LAN Components���������������������������������������������������������������������������� 205
Wireless LAN Transmission�������������������������������������������������������������������������� 205
LAN Media Selection Criteria����������������������������������������������������������������������������� 210
Chapter Summary����������������������������������������������������������������������������������������������� 211
Key Terms�������������������������������������������������������������������������������������������������������������� 212
Review Questions������������������������������������������������������������������������������������������������ 212
Packet Tracer Labs����������������������������������������������������������������������������������������������� 215
Critical Thinking��������������������������������������������������������������������������������������������������� 220

CHAPTER 5
Network Protocols������������������������������������������������������������������������������������ 223
TCP/IP’s Layered Architecture��������������������������������������������������������������������������� 224
Application-Layer Protocols������������������������������������������������������������������������������� 230
HTTP: Protocol of the World Wide Web���������������������������������������������������������� 231
E-Mail Protocols: POP3, IMAP, and SMTP������������������������������������������������������ 231
FTP and TFTP��������������������������������������������������������������������������������������������������232
Server Message Block�������������������������������������������������������������������������������������232

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii Table of Contents

Remote Desktop Protocol�������������������������������������������������������������������������������232


Telnet and SSH������������������������������������������������������������������������������������������������233
Simple Network Management Protocol���������������������������������������������������������233
Dynamic Host Configuration Protocol�����������������������������������������������������������233
Domain Name System������������������������������������������������������������������������������������237

Transport-Layer Protocols��������������������������������������������������������������������������������� 247


Role of the Transport Layer��������������������������������������������������������������������������� 247
TCP: The Reliable Transport Layer����������������������������������������������������������������� 250

Internetwork-Layer Protocols��������������������������������������������������������������������������� 252


Defines and Verifies IP Addresses������������������������������������������������������������������252
Routes Packets through an Internetwork�������������������������������������������������������253
Resolves MAC Addresses from IP Addresses�������������������������������������������������253
Delivers Packets Efficiently�����������������������������������������������������������������������������253
Protocols at the Internetwork Layer�������������������������������������������������������������� 254
Network Access-Layer Protocols���������������������������������������������������������������������� 263
Chapter Summary����������������������������������������������������������������������������������������������� 267
Key Terms�������������������������������������������������������������������������������������������������������������� 267
Review Questions������������������������������������������������������������������������������������������������ 268
Packet Tracer Labs����������������������������������������������������������������������������������������������� 270
Critical Thinking��������������������������������������������������������������������������������������������������� 281

CHAPTER 6
IP Addressing������������������������������������������������������������������������������������������������ 285
IPv4 Addressing���������������������������������������������������������������������������������������������������� 286
Binary Math��������������������������������������������������������������������������������������������������� 287
Ip Address Classes����������������������������������������������������������������������������������������� 292
Private Ip Addresses�������������������������������������������������������������������������������������� 295
Classless Interdomain Routing������������������������������������������������������������������������� 296
Cidr Notation������������������������������������������������������������������������������������������������ 296
Broadcast Domains���������������������������������������������������������������������������������������� 297
Subnetting������������������������������������������������������������������������������������������������������������� 297
Calculating a Subnet Mask���������������������������������������������������������������������������� 298
Supernetting�������������������������������������������������������������������������������������������������� 304
Configuring Ipv4 Addresses������������������������������������������������������������������������������� 306
Configuring Multiple Ip Addresses����������������������������������������������������������������306
Configuring the Default Gateway������������������������������������������������������������������ 308
Ip Configuration Command-Line Tools��������������������������������������������������������� 312
Network Address Translation���������������������������������������������������������������������������� 317

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents ix

Internet Protocol Version 6�������������������������������������������������������������������������������� 319


Ipv6 Overview������������������������������������������������������������������������������������������������ 320
Ipv6 Address Structure���������������������������������������������������������������������������������� 320

Ipv6 Address Types���������������������������������������������������������������������������������������������� 322


IPv6 Unicast Addresses����������������������������������������������������������������������������������323
Multicast Addresses����������������������������������������������������������������������������������������327
Anycast Addresses����������������������������������������������������������������������������������������� 328

IPv6 Autoconfiguration��������������������������������������������������������������������������������������� 328


Autoconfiguration on Windows Hosts���������������������������������������������������������� 329

Transitioning from IPv4 to IPv6������������������������������������������������������������������������� 329


Dual IP Layer Architecture����������������������������������������������������������������������������� 330
IPv6-over-IPv4 Tunneling����������������������������������������������������������������������������� 330
Intra-Site Automatic Tunnel Addressing Protocol����������������������������������������� 331
6to4 Tunneling������������������������������������������������������������������������������������������������332
Teredo Tunneling��������������������������������������������������������������������������������������������332
Chapter Summary����������������������������������������������������������������������������������������������� 334
Key Terms�������������������������������������������������������������������������������������������������������������� 335
Review Questions������������������������������������������������������������������������������������������������ 336
Packet Tracer Labs����������������������������������������������������������������������������������������������� 339
Critical Thinking��������������������������������������������������������������������������������������������������� 341

CHAPTER 7
Network Reference Models and Standards������������������������������� 345
Introducing the Osi and Ieee 802 Networking Models��������������������������������� 346
Role of a Reference Model����������������������������������������������������������������������������� 347
Structure of the Osi Model���������������������������������������������������������������������������� 349
Application Layer��������������������������������������������������������������������������������������������353
Presentation Layer����������������������������������������������������������������������������������������� 354
Session Layer������������������������������������������������������������������������������������������������� 354
Transport Layer�����������������������������������������������������������������������������������������������355
Network Layer�������������������������������������������������������������������������������������������������357
Data Link Layer���������������������������������������������������������������������������������������������� 358
Physical Layer������������������������������������������������������������������������������������������������ 359
Summary of the Osi Model��������������������������������������������������������������������������� 359

Ieee 802 Networking Standards������������������������������������������������������������������������ 361


Ieee 802 Specifications����������������������������������������������������������������������������������361
Ieee 802 Extensions to the Osi Reference Model���������������������������������������� 363

Chapter Summary����������������������������������������������������������������������������������������������� 368

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
x Table of Contents

Key Terms�������������������������������������������������������������������������������������������������������������� 368


Review Questions������������������������������������������������������������������������������������������������ 369
Packet Tracer Labs����������������������������������������������������������������������������������������������� 370
Critical Thinking��������������������������������������������������������������������������������������������������� 371

CHAPTER 8
Network Hardware in Depth�������������������������������������������������������������� 373
Network Switches in Depth������������������������������������������������������������������������������� 374
Switch Port Modes of Operation������������������������������������������������������������������� 376
Creating the Switching Table������������������������������������������������������������������������� 376
Frame Forwarding Methods�������������������������������������������������������������������������� 378
Advanced Switch Features����������������������������������������������������������������������������� 379
Multilayer Switches��������������������������������������������������������������������������������������� 385
Routers in Depth�������������������������������������������������������������������������������������������������� 387
Router Interfaces������������������������������������������������������������������������������������������� 389
Routing Tables������������������������������������������������������������������������������������������������391
Routing Protocols������������������������������������������������������������������������������������������� 393
Access Control Lists��������������������������������������������������������������������������������������� 397

Wireless Access Points in Depth����������������������������������������������������������������������� 400


Basic Wireless Settings��������������������������������������������������������������������������������� 400
Wireless Security Options����������������������������������������������������������������������������� 402
Advanced Wireless Settings���������������������������������������������������������������������������404

Network Interface Cards in Depth������������������������������������������������������������������� 404


PC Bus Options����������������������������������������������������������������������������������������������404
Advanced Features of NICs���������������������������������������������������������������������������� 407

Chapter Summary����������������������������������������������������������������������������������������������� 409


Key Terms�������������������������������������������������������������������������������������������������������������� 410
Review Questions������������������������������������������������������������������������������������������������ 411
Packet Tracer Labs����������������������������������������������������������������������������������������������� 413
Critical Thinking��������������������������������������������������������������������������������������������������� 422

CHAPTER 9
Introduction to Network Security��������������������������������������������������� 431
Network Security Overview and Policies�������������������������������������������������������� 432
Developing a Network Security Policy���������������������������������������������������������� 433
Determining Elements of a Network Security Policy����������������������������������� 433
Understanding Levels of Security����������������������������������������������������������������� 434

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xi

Securing Physical Access to the Network������������������������������������������������������� 436


Physical Security Best Practices��������������������������������������������������������������������� 437

Securing Access to Network Data�������������������������������������������������������������������� 439


Setting Up Authentication and Authorization���������������������������������������������� 439
Securing Data with Encryption��������������������������������������������������������������������� 447
Securing Communication with Virtual Private Networks����������������������������449
Securing Wireless Networks�������������������������������������������������������������������������� 452

Network Security Devices���������������������������������������������������������������������������������� 454


Protecting Networks with Firewalls�������������������������������������������������������������� 455
Using Intrusion Detection and Prevention Systems������������������������������������� 457

Protecting a Network from Malware��������������������������������������������������������������� 463


Viruses����������������������������������������������������������������������������������������������������������� 463
Worms������������������������������������������������������������������������������������������������������������ 464
Other Forms of Malware�������������������������������������������������������������������������������� 464
Spyware and Spam���������������������������������������������������������������������������������������� 465
Malware Protection���������������������������������������������������������������������������������������� 466
Using an Attacker’s Tools to Stop Network Attacks�������������������������������������� 469
Discovering Network Resources�������������������������������������������������������������������� 469
Gaining Access to Network Resources���������������������������������������������������������� 473
Disabling Network Resources������������������������������������������������������������������������ 474
Chapter Summary����������������������������������������������������������������������������������������������� 477
Key Terms�������������������������������������������������������������������������������������������������������������� 478
Review Questions������������������������������������������������������������������������������������������������ 479
Packet Tracer Labs����������������������������������������������������������������������������������������������� 481
Critical Thinking��������������������������������������������������������������������������������������������������� 484

CHAPTER 1 0
Wide Area Networking and Cloud Computing������������������������� 489
Wide Area Network Fundamentals������������������������������������������������������������������ 490
WAN Devices��������������������������������������������������������������������������������������������������491
WAN Connection Methods��������������������������������������������������������������������������������� 494
Circuit-Switched WANs��������������������������������������������������������������������������������� 494
Leased Lines��������������������������������������������������������������������������������������������������� 497
Packet-Switched WANs��������������������������������������������������������������������������������� 499
Ethernet WANs���������������������������������������������������������������������������������������������� 505
WANs over the Internet��������������������������������������������������������������������������������� 505
WAN Equipment�������������������������������������������������������������������������������������������� 507
Wireless WAN Technologies�������������������������������������������������������������������������� 508

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xii Table of Contents

Remote Access Networking������������������������������������������������������������������������������� 510


Making a VPN Connection in Windows��������������������������������������������������������� 511
Making a Dial-Up Connection������������������������������������������������������������������������ 512
Remote Access Networking via the Web�������������������������������������������������������� 513
Cloud Computing������������������������������������������������������������������������������������������������� 517
Software as a Service��������������������������������������������������������������������������������������518
Platform as a Service��������������������������������������������������������������������������������������518
Infrastructure as a Service������������������������������������������������������������������������������519
Private Cloud versus Public Cloud������������������������������������������������������������������519
Chapter Summary����������������������������������������������������������������������������������������������� 520
Key Terms�������������������������������������������������������������������������������������������������������������� 520
Review Questions������������������������������������������������������������������������������������������������ 521
Packet Tracer Labs����������������������������������������������������������������������������������������������� 523
Critical Thinking��������������������������������������������������������������������������������������������������� 531

CHAPTER 1 1
Network Operating System Fundamentals������������������������������� 533
Operating System Fundamentals��������������������������������������������������������������������� 534
The File System�����������������������������������������������������������������������������������������������535
Processes and Services���������������������������������������������������������������������������������� 538
The Kernel������������������������������������������������������������������������������������������������������ 540
Client and Server Operating System Overview���������������������������������������������� 551
The Role of a Client Operating System�����������������������������������������������������������552
The Role of a Server Operating System��������������������������������������������������������� 558
Centralized User Account and Computer Management������������������������������� 559
Centralized Storage���������������������������������������������������������������������������������������� 562
Server and Network Fault Tolerance������������������������������������������������������������� 564
Additional Server Features���������������������������������������������������������������������������� 565
Operating System Virtualization����������������������������������������������������������������������� 565
Hosted Virtualization������������������������������������������������������������������������������������� 568
Bare-Metal Virtualization�������������������������������������������������������������������������������575
Installing an OS���������������������������������������������������������������������������������������������������� 583
Planning for and Installing Windows Server������������������������������������������������ 583
Planning for and Installing Linux����������������������������������������������������������������� 587
Chapter Summary����������������������������������������������������������������������������������������������� 591
Key Terms�������������������������������������������������������������������������������������������������������������� 592
Review Questions������������������������������������������������������������������������������������������������ 592
Critical Thinking��������������������������������������������������������������������������������������������������� 595

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xiii

CHAPTER 1 2
Network Management and Administration����������������������������� 599
Managing User and Group Accounts��������������������������������������������������������������� 600
Account and Password Conventions������������������������������������������������������������� 601
Working with Accounts in Windows������������������������������������������������������������602
Working with Accounts in Linux������������������������������������������������������������������� 611

Storage and File System Management������������������������������������������������������������ 618


Volumes and Partitions��������������������������������������������������������������������������������� 619
The FAT File System���������������������������������������������������������������������������������������620
The NTFS File System�������������������������������������������������������������������������������������621
The Linux File System����������������������������������������������������������������������������������� 627

Working with Shared Files and Printers���������������������������������������������������������� 632


Sharing Files and Printers in Windows��������������������������������������������������������� 633
Sharing Files and Printers in Linux��������������������������������������������������������������� 639

Monitoring System Reliability and Performance������������������������������������������� 641


Event Viewer�������������������������������������������������������������������������������������������������� 641
Performance Monitor������������������������������������������������������������������������������������ 643
Enhancing Network Performance����������������������������������������������������������������� 645
Network Performance Monitoring���������������������������������������������������������������� 647

Backup and Fault Tolerance������������������������������������������������������������������������������ 651


Windows Backup������������������������������������������������������������������������������������������� 652
Protecting Data with Fault Tolerance������������������������������������������������������������ 653
Chapter Summary����������������������������������������������������������������������������������������������� 659
Key Terms�������������������������������������������������������������������������������������������������������������� 661
Review Questions������������������������������������������������������������������������������������������������ 661
Critical Thinking��������������������������������������������������������������������������������������������������� 664

CHAPTER 1 3
The Internet of Things (IoT)����������������������������������������������������������������� 667
Introduction to the Internet of Things������������������������������������������������������������ 668
IoT Use Cases�������������������������������������������������������������������������������������������������669
IoT Technologies���������������������������������������������������������������������������������������������671

IoT Networking����������������������������������������������������������������������������������������������������� 675


IoT Networking Technologies Overview������������������������������������������������������� 676
Commercial and Industrial IoT Devices����������������������������������������������������������� 679
A Sampler of Home Automation IoT Devices����������������������������������������������� 679
Industrial IoT Devices������������������������������������������������������������������������������������ 683

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xiv Table of Contents

DIY IoT�������������������������������������������������������������������������������������������������������������������� 686


Getting Started with IoT�������������������������������������������������������������������������������� 687
Tools for IoT��������������������������������������������������������������������������������������������������� 691
IoT Software Development���������������������������������������������������������������������������� 692
Chapter Summary����������������������������������������������������������������������������������������������� 706
Key Terms�������������������������������������������������������������������������������������������������������������� 708
Review Questions������������������������������������������������������������������������������������������������ 708
Packet Tracer Labs����������������������������������������������������������������������������������������������� 710
Critical Thinking��������������������������������������������������������������������������������������������������� 717

CHAPTER 1 4
Troubleshooting and Support������������������������������������������������������������ 721
Documenting Your Network������������������������������������������������������������������������������ 722
Change Management��������������������������������������������������������������������������������������723
Documentation and Troubleshooting����������������������������������������������������������� 724
Documentation and IT Staffing��������������������������������������������������������������������� 724
Documentation and Standards Compliance������������������������������������������������� 724
Documentation and Technical Support���������������������������������������������������������725
Documentation and Network Security����������������������������������������������������������725
What Should Be Documented?���������������������������������������������������������������������� 726
The Problem-Solving Process���������������������������������������������������������������������������� 728
Step 1: Determine the Problem Definition and Scope����������������������������������� 730
Step 2: Gather Information����������������������������������������������������������������������������� 731
Step 3: Consider Possible Causes��������������������������������������������������������������������733
Step 4: Devise a Solution������������������������������������������������������������������������������� 734
Step 5: Implement the Solution��������������������������������������������������������������������� 734
Step 6: Test the Solution�������������������������������������������������������������������������������� 736
Step 7: Document the Solution�����������������������������������������������������������������������737
Step 8: Devise Preventive Measures���������������������������������������������������������������737
Approaches to Network Troubleshooting������������������������������������������������������� 738
Trial and Error������������������������������������������������������������������������������������������������ 738
Solving by Example��������������������������������������������������������������������������������������� 740
The Replacement Method������������������������������������������������������������������������������ 742
Step by Step with the OSI Model������������������������������������������������������������������� 742
Making Use of Problem-Solving Resources���������������������������������������������������� 744
Experience������������������������������������������������������������������������������������������������������745
The Internet��������������������������������������������������������������������������������������������������� 746
Network Documentation������������������������������������������������������������������������������� 748

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xv

Network Troubleshooting Tools������������������������������������������������������������������������ 751


Using ping and tracert������������������������������������������������������������������������������ 751
Network Monitors������������������������������������������������������������������������������������������755
Protocol Analyzers������������������������������������������������������������������������������������������755
Time-Domain Reflectometers����������������������������������������������������������������������� 756
Basic Cable Testers����������������������������������������������������������������������������������������� 756
Advanced Cable Testers����������������������������������������������������������������������������������757
Additional Tools����������������������������������������������������������������������������������������������757
Common Troubleshooting Situations�������������������������������������������������������������� 762
Cabling and Related Components����������������������������������������������������������������� 762
Power Fluctuations���������������������������������������������������������������������������������������� 763
Upgrades�������������������������������������������������������������������������������������������������������� 763
Poor Network Performance��������������������������������������������������������������������������� 763
Disaster Recovery������������������������������������������������������������������������������������������������ 764
Backing Up Network Data������������������������������������������������������������������������������ 764
Backup Types������������������������������������������������������������������������������������������������� 765
Business Continuity��������������������������������������������������������������������������������������� 767
Chapter Summary����������������������������������������������������������������������������������������������� 768
Key Terms�������������������������������������������������������������������������������������������������������������� 768
Review Questions������������������������������������������������������������������������������������������������ 769
Critical Thinking��������������������������������������������������������������������������������������������������� 771

appendix a
Network Troubleshooting Guide............................................775

appendix b
MTA Exam 98-366 Objectives���������������������������������������������������781

GLOSSARY������������������������������������������������������������������������������������������������������������ 785
INDEX��������������������������������������������������������������������������������������������������������������������� 807

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction
Guide to Networking Essentials, Eighth Edition, serves the needs
of students, instructors, aspiring information technology profes-
sionals, and others who are interested in learning more about
networking technologies but might have little or no background
in this subject matter. This book’s extensive and broad coverage
of computer networking technologies and network operating
systems gives you a solid networking background to pursue a
number of certifications, including MTA Networking Fundamen-
tals, Network+, CCENT, CCNA, MCSA, and Security+. The eighth
edition maps to the MTA 98-366 Networking Fundamentals cer-
tification, and many instructors also use the book for Network+
and CCENT test preparation. With the extensive use of tables
that compare important properties of networking technologies,
this book also makes an excellent reference.
The eighth edition builds on the strengths of the seventh
edition, giving you easy-to-understand explanations of often
difficult concepts and a solid grounding in topics such as rout-
ing, switching, IP addressing, and virtualization. Many students
are learning computer concepts at the same time they’re learn-
ing about networking, so the first chapter includes a refresher
on computer components and terminology. This new edi-
tion covers the latest networking technologies and operating
systems, including new Ethernet and Wi-Fi standards, cloud
computing, Windows 10, Windows Server 2019, and recent Linux
distributions. In keeping with the latest trends in network-
ing, this edition includes an all-new chapter on the Internet of
Things (IoT), including use cases, network technologies, com-
mon IoT devices, and hands-on projects.
All-new Packet Tracer labs in this book use network simula-
tion software, so many of the labs that use physical equipment
such as switches and routers can be completed in a virtual
environment. Challenge labs give you an opportunity to apply
what you have learned from the chapter material and hands-on
projects in a format that might require additional research and
skills. For case projects, you use your knowledge and critical
thinking skills to devise solutions to networking problems.
The simulations in previous editions of Guide to Network-
ing Essentials are deprecated and are no longer offered as a

xvii

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xviii Introduction

­ ownload from Cengage. However, the author has made them available on his Web
d
site for readers who still want to use them. These simulations with audio narrations
give you an innovative tool to help you grasp difficult networking concepts. They cover
topics ranging from basic LAN communication to Network Address Translation (NAT)
and Internet e-mail operation. Drag-and-drop exercises reinforce concepts of the OSI
model and network frame formats. These simulations are written in Flash, so Flash
must be enabled in your browser. You can access the simulations on the author’s Web
site at http://books.tomsho.com/sims.

Intended Audience
Guide to Networking Essentials, Eighth Edition, is intended for people who are getting
started in computer networking and want to gain a solid understanding of a broad
range of networking technologies. This book is ideal for would-be information technol-
ogy professionals who want to pursue certifications in a variety of computer net-
working fields as well as professionals in a managerial role who want a firm grasp of
networking technology concepts. To understand the material in this book, you should
have a background in basic computer concepts and experience using the Windows
operating system. This book is ideal for use in a classroom or an instructor-led training
environment and is also an effective learning tool for individual self-paced training.

Coping with Change on the Web


Sooner or later, all the specifics on Web-based resources mentioned in this book will
become outdated or be replaced by newer information. In some cases, entering a URL
shown in this book might lead to an updated URL; in other cases, it will lead nowhere,
resulting in the dreaded error message “Server not found.”
When that happens, please don’t give up! There’s always a way to find what you
want on the Web, if you’re willing to invest some time and energy. Most large or com-
plex Web sites offer a search engine. As long as you can get to the site itself, you can
probably use its search engine to help you find what you need. In addition, try using
general search tools, such as www.google.com or www.bing.com, to find related infor-
mation. The bottom line is if you can’t find something where the book says it should
be, start looking around. It’s likely to be somewhere!

Chapter Descriptions
Here’s a summary of the topics covered in each chapter of this book:
• Chapter 1, “Introduction to Computer Networks,” introduces many of the computer
and networking terms and technologies discussed in detail in later chapters.
• In Chapter 2, “Network Hardware Essentials,” you learn about the basic
operation of hubs, switches, access points, network interface cards, and routers.

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction xix

• Chapter 3, “Network Topologies and Technologies,” discusses logical and


physical topologies and the LAN technologies that use them.
• Chapter 4, “Network Media,” covers the cables and connectors required to
connect network devices, including structured cabling techniques, and describes
wireless networking.
• In Chapter 5, “Network Protocols,” you learn about the purpose and operation
of network protocols, focusing on the TCP/IP protocol suite. Special emphasis is
given to the TCP/IP layered model and the protocols that work at each layer.
• In Chapter 6, “IP Addressing,” you learn about IPv4 addressing, including
address classes, public and private addresses, subnetting, and Network Address
Translation. New, expanded coverage on IPv6 addressing and operation has been
added to reflect the growing importance of this protocol.
• Chapter 7, “Network Reference Models and Standards,” discusses the OSI model’s
seven-layer architecture and gives you an overview of the IEEE 802 networking
standards.
• Chapter 8, “Network Hardware in Depth,” delves into the hardware components
of networks discussed in Chapter 2, giving you more in-depth coverage of each
type of device.
• In Chapter 9, “Introduction to Network Security,” you learn about network
security policies, securing access to equipment and data, network security
devices (such as firewalls and intrusion detection systems), and malware.
• In Chapter 10, “Wide Area Networking and Cloud Computing,” you learn how to
use WAN technologies, such as frame relay and SONET, to create networks that
can extend across your town or across the country. In addition, you’re introduced
to remote access protocols and cloud computing concepts, such as IaaS and PaaS.
• In Chapter 11, “Network Operating System Fundamentals,” you learn about
network operating system features and the most common types of services
provided by server OSs. This chapter also covers virtualization and using virtual
machines in data centers and on the desktop. Finally, you learn how to plan for
an OS installation and perform postinstallation tasks.
• Chapter 12, “Network Management and Administration,” discusses everyday
tasks that network and server administrators perform, including working with
user and group accounts, creating and managing file shares, monitoring system
performance and reliability, and using fault-tolerance and backup solutions.
• Chapter 13, “The Internet of Things,” introduces this burgeoning field of
information technology. You’ll learn about IoT use cases, IoT networking,
industrial and commercial IoT devices, and how to get started in IoT yourself.
• Chapter 14, “Troubleshooting and Support,” discusses what you can do to prevent
network downtime, data loss, and system failures. In addition, you learn about
the problem-solving process, several different approaches to solving network
problems, the tools for troubleshooting networks, and disaster recovery procedures.

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xx Introduction

• Appendix A, “Network Troubleshooting Guide,” summarizes advice on how to


recognize, isolate, and diagnose trouble on a network, whether it’s related to
media, hardware, or software.
• Appendix B, “MTA Exam 98-366 Objectives,” provides a summary of the MTA
98-366 mapping provided throughout the book.

Features
To help you understand networking concepts thoroughly, this book incorporates many
features designed to enhance your learning experience:
• Chapter objectives—Each chapter begins with a detailed list of the concepts to
be mastered. This list is a quick reference to the chapter’s contents and a useful
study aid.
• A requirements table—At the beginning of each chapter is a table listing the
hands-on projects along with their requirements and estimated time of
completion.
• Hands-on projects—Although understanding the theory behind networking
technology is important, nothing can improve on real-world experience. Projects
are interspersed throughout each chapter to give you hands-on experience.
• Screen captures, illustrations, and tables—Numerous screen captures and
illustrations of concepts help you visualize network setups, theories, and
architectures and see how to use tools. In addition, tables summarize details in
an at-a-glance format and give you comparisons of both practical and theoretical
information; they can be used for a quick review. Because most school labs use
Windows OSs, these products have been used for most screenshots and hands-
on projects.
• Packet Tracer labs—Using Packet Tracer, readers can perform labs using virtual
network hardware. These labs are written to mirror the hands-on projects
whenever possible so labs can still be done even when the physical hardware is
not available.
• Chapter summary—Each chapter ends with a summary of the concepts
introduced in the chapter. These summaries are a helpful way to recap the
material covered in the chapter.
• Key terms—All terms introduced with bold text are gathered together in a Key
Terms list at the end of each chapter. This list gives you an easy way to check
your understanding of important terms and is a useful reference.
• Review questions—The end-of-chapter assessment begins with review questions
that reinforce the concepts and techniques covered in each chapter. Answering
these questions helps ensure that you have mastered important topics.
• Critical Thinking sections—The end-of-chapter Critical Thinking section gives you
more opportunities for hands-on practice with challenge labs, which enable you
to use the knowledge you’ve gained from reading the chapter and performing

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction xxi

hands-on projects to solve more complex problems without step-by-step


instructions. This section also includes case projects that ask you to evaluate a
scenario and decide on a course of action to propose a solution. These valuable
tools help you sharpen decision-making, critical thinking, and troubleshooting
skills—all important aspects of network administration.

Text and Graphics Conventions


Additional information and exercises have been added to this book to help you better
understand what’s being discussed in the chapter. Icons and banners throughout the
book alert you to these additional materials:

Tip
Tips offer extra information on resources, how to solve problems, and t­ ime-saving shortcuts.

Note
Notes present additional helpful material related to the subject being d
­ iscussed.

Caution
The Caution icon identifies important information about potential mistakes or hazards.

Hands-On Projects
Each hands-on project in this book is preceded by this banner.

Packet Tracer Labs


 he Packet Tracer Labs banner marks the beginning of the Packet Tracer Labs section at the
T
end of most chapters.

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxii Introduction

Instructor Companion Site


Everything you need for your course is in one place! This collection of book-specific
lecture and class tools is available online via www.cengage.com/login. Access and
download PowerPoint presentations, images, the Instructor’s Manual, and more. In
addition, the author maintains a Web site at http://books.tomsho.com with lab notes,
errata, additional exercises, the latest lab setup guide, and hints and tips for teaching
with this book.
• Electronic Instructor’s Manual—The Instructor’s Manual that accompanies this
book includes additional instructional material to assist in class preparation,
including suggestions for classroom activities, discussion topics, and additional
quiz questions.
• Solutions Manual—The instructor’s resources include solutions to all end-of-
chapter material, including review questions and case projects.
• Cengage Learning Testing Powered by Cognero—This flexible, online system
allows you to do the following:
❍❍ Author, edit, and manage test bank content from multiple Cengage solutions.
❍❍ Create multiple test versions in an instant.
Deliver tests from your LMS, your classroom, or wherever you want.
❍❍

• PowerPoint presentations—This book comes with Microsoft PowerPoint slides for


each chapter. They’re included as a teaching aid for classroom presentation, to
make available to students on the network for chapter review, or to be printed
for classroom distribution. Instructors, please feel free to add your own slides for
additional topics you introduce to the class.
• Figure files—All the figures and tables in the book are reproduced in bitmap
format. Similar to the PowerPoint presentations, they’re included as a teaching
aid for classroom presentation, to make available to students for review, or to be
printed for classroom distribution.

Contact the Author


I would like to hear from you. Please e-mail me at NetEss@tomsho.com with any
problems, questions, suggestions, or corrections. I even accept compliments! This book
has staying power, so I wouldn’t be surprised to see a ninth edition in the future. Your
comments and suggestions are invaluable for shaping the next edition’s content. In
addition, please visit my Web site at http://books.tomsho.com, where you can find lab
notes, errata, and other information related to this book and my other titles. You can
also submit comments and suggestions.

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction xxiii

Acknowledgments
I would like to thank the team at Cengage for this opportunity to improve and expand
on the seventh edition of this book. This team includes Kristin McNary, Product Team
Manager; Brooke Greenhouse, Senior Content Developer; and Danielle Shaw, Technical
Editor, for verifying technical content and testing projects and labs for accuracy. Thanks
especially to my development editor, Dan Seiter, for his excellent guidance in creating
a polished product. Additional praise and special thanks go to my beautiful wife, Julie;
our daughters, Camille and Sophia; and our son, Michael. They all deserve medals for
their patience and support while going husbandless and fatherless during the develop-
ment of this book.

Before You Begin


The importance of a solid lab environment can’t be overstated. This book contains
hands-on projects that require a variety of network equipment and software. Most of
the hands-on projects use a PC with Windows 10 installed. Using virtualization can
simplify the lab environment. For example, you can use VMware Workstation, Virtu-
alBox, Hyper-V, and other products to install Windows and Linux in a virtual machine,
regardless of the OS running on your physical computer. The following section lists
the requirements and gives you ideas for how to best configure your lab environment.

Lab Setup Guide


Both the hands-on projects and challenge labs have setup requirements. Some labs
require two or three computers, called “lab computers,” that you connect to hubs
and routers to create small test networks. Lab computers use Windows 10 (but earlier
versions can be substituted) and should be physical computers that have easy access
to power, a NIC, and other ports. Many other labs simply require a computer that’s
connected to a network in a classroom setting, with access to the Internet. Students
must have administrator access to these computers, and the use of virtual machines
is recommended. An instructor computer is also required for some labs. The instruc-
tor computer can also be set up as a virtual machine and must be accessible to student
computers on the network.

Student Computers (Net-XX)


• Use of virtual machines recommended
• Windows 10 Enterprise or Education Edition recommended

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxiv Introduction

• Computer name: Net-XX (replacing XX with a student number, such as 01 or 02)


• Administrator account: NetAdmin with the password Password01 set to never
expire
• Workgroup name: NetEss
• Memory: 1 GB required, 2 GB or more recommended
• Hard disk 1: 60 GB or more (Windows installed on this drive); a second NTFS-
formatted partition assigned drive letter D is preferable but not required
• Hard disk 2: Unallocated 60 GB or more
• IP address via DHCP server or static if required on your network
• Wireshark installed (a free protocol analyzer from www.wireshark.org)
• Internet access
In addition, students will install Packet Tracer, a network simulator, on their
c­ omputers. Packet Tracer Lab 1-1 provides instructions for installing Packet Tracer.
Packet Tracer may be preinstalled on the student computers, but students will need a
Cisco Netacad account in order to get full functionality from Packet Tracer.
The author has provided Packet Tracer files to help students perform the Packet
Tracer labs. These files are available for download from cengage.com.

Instructor Computer (Net-Instr)


• Same requirements as Net-XX except for the following:
• Computer name: Net-Instr
• No second hard disk required
• Create a shared folder named NetDocs, giving the NetAdmin user Read and
Change sharing permissions and Modify NTFS permissions. You access this
share by using \\net-instr\netdocs in Chapter 1.

Lab Computers (Three Computers Minimum)


• Windows 10 Enterprise or Education Edition
• Computer names: Computer1, Computer2, Computer3
• Administrator account: NetAdmin with the password Password01 set to never
expire
• Workgroup name: NetEss
• Memory: 1 GB required, 2 GB or more recommended
• Hard disk 1: 60 GB or more (Windows installed on this drive)
• IP address: Set to use DHCP, but no DHCP server should be present, so APIPA
addresses are assigned
• Wireshark installed (a free protocol analyzer from www.wireshark.org)
• No Internet access

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction xxv

Network Equipment for Lab Computers (for Each Group of Three


Computers)
• Two 10/100 hubs
• Two 10/100 switches
• One WAP 802.11 b/g/n SSID NetEss; open security
• 802.11 b/g/n NICs (USB Wi-Fi NICs are ideal)
• Five patch cables and one crossover cable

Additional Supplies and Tools


• RJ-45 crimping tool
• Punchdown tool
• Cable stripper
• Cat 5e or higher cable
• Cat 5e or higher patch panel
• RJ-45 plugs (at least four per student)
• A Cisco switch with Cisco IOS for configuring VLANs (for Challenge Lab 8-3)
• A Cisco router with CISCO IOS (for Challenge Lab 8-4)
• Network diagram software, such as Visio, or online diagramming software such
as www.gliffy.com
• A Fedora Linux Live DVD or ISO file or an Ubuntu Linux DVD or ISO file
• Windows Server 2019 ISO file (downloaded from the Microsoft evaluation center)
for Hands-On Project 11-9
• A shared printer (optional)
• NetInfo and Simple Server Monitor (downloaded and installed by students or the
instructor)
• VMware Workstation Player (downloaded and installed by students or the
instructor)
You can find additional lab setup instructions and videos on the author’s Web
site at http://books.tomsho.com. Click the menu item “Networking Essentials 8th
­Edition.” You can also find videos by the author on YouTube at www.youtube.com/
user/­gtomshobooks. More information is available on the author’s Amazon page at
www.amazon.com/author/gregtomsho, his Facebook page at www.facebook.com/­
gtomshobooks, and Twitter (@gtomshobooks).

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1
Introduction to
Computer Networks
After reading this chapter and completing the exercises, you will
be able to:
Describe basic computer components and operations

Explain the fundamentals of network communication

Define common networking terms

Compare different network models

In only a few decades, computer networks have evolved from being a complex
technology accessible to only the most tech-savvy users to being part of most people’s
everyday lives. Computer networks can be found in almost every business, school,
and home. Their use is available to anyone with a mobile device or computer and a
network connection, but installation and upkeep of all but the smallest networks still
require considerable know-how. This chapter starts you on the path toward acquiring
the skills to manage a large corporate network or simply configure a home network
with a wireless router.
This chapter begins by discussing the computer and its role in a network to give
you a foundation for the topics in this book. Next, you examine the components of
a network and the fundamentals of communication between computers. Many new
terms are introduced and defined, and the varied types of networks and network
servers you might encounter are described.

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
2 CHAPTER 1 Introduction to Computer Networks

About the Hands-On Activities


The hands-on projects in this book require setting up your lab environment so that it’s
ready to go, so make sure you read and follow the step-by-step instructions in the “Before
You Begin” section of the Introduction, which help you set up your lab for all projects in
this book.
The hands-on projects in this book contain information about how networks work that’s
best understood by hands-on experience. If you can’t do some of the projects, you should at
least read through each one to make sure you don’t miss important information. Table 1-1
summarizes what you need for the hands-on projects in this chapter.

Table 1-1 Hands-on project requirements

Time
Hands-on project Requirements required Notes
Hands-On Project 1-1: Examining a Net-XX 10 minutes A Windows 10 computer
Computer’s Boot Procedure configured as described in
“Before You Begin”
The ability to access the
firmware setup screen
Hands-On Project 1-2: Upgrading Net-XX, a NIC, a 30 minutes A lab computer set up as
a Stand-alone Computer to a patch cable, and described in “Before You
Networked Computer a hub or switch Begin”
Hands-On Project 1-3: Viewing Net-XX 10 minutes
Network Software Layers
Hands-On Project 1-4: Using Net-XX 15 minutes
ipconfig, ping, and arp
Hands-On Project 1-5: Exploring Net-XX 15 minutes
Peer-to-Peer Networking
Hands-On Project 1-6: Creating a Net-XX 15 minutes
Shared Folder
Hands-On Project 1-7: Transferring a Net-XX 15 minutes A share named NetDocs on
Document to Another Computer the instructor’s computer
(Net-Instr)
Hands-On Project 1-8: Looking A computer with 20 minutes Internet access
Up Computer and Networking Internet access
Acronyms

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 3

An Overview of Computer Concepts


At the heart of a computer network is the computer. Networks were created to
facilitate communication between computing devices, which ultimately facilitates
communication between people. So, to better understand networks, how they
work, and how to support them, you must have a solid understanding of computer
operations. In fact, most of the devices you encounter when working with a network
involve a computer. The most obvious are network servers and workstations that run
operating systems, such as Windows, Linux, UNIX, and Mac OS X. Not as obvious
are devices such as routers and switches, which move network data from computer
to computer and network to network. These complex devices are also computers,
although they’re specialized computers for performing specific tasks. Other types of
nontraditional computers include smartphones, smart watches, home assistants like
Amazon Echo and Google Home, and smart “things” such as appliances, thermostats,
and even lamps, which are collectively referred to as Internet of Things (IoT) devices.
The next sections discuss the basic functions of a computer and its associated
components, along with computer hardware, the boot procedure, and the basic
functions of an operating system (OS). Networking is the focus of this book, but
your grasp of the fundamentals of computer components and operations helps you
understand networking components and operations.

Basic Functions of a Computer


A computer’s functions and features can be broken down into the three basic tasks all
computers perform: input, processing, and output. Information is input to a computer
from a device such as a keyboard or from a storage device such as a hard drive; the
central processing unit (CPU) processes the information, and then output is usually
created. The following example illustrates this process:
• Input—A user running a word-processing program types the letter A on the
keyboard, which results in sending a code representing the letter A to the
computer.
• Processing—The computer’s CPU determines what letter was typed by looking up
the keyboard code in a table.
• Output—The CPU sends instructions to the graphics card to display the letter A,
which is then sent to the computer monitor.
Some components of computers are designed to perform only one of these three
functions; others are designed to perform two or all three functions. For example, a
standard keyboard and mouse perform input functions, and storage devices, such as
hard drives, perform both input (when files are read from the drive) and output (when
files are written to the drive). Network cards can perform all three functions. A network
card is an output device when data is sent from the computer to the network and an
input device when data comes from the network to the computer. In addition, many

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
4 CHAPTER 1 Introduction to Computer Networks

network cards have rudimentary processors that perform actions on incoming and
outgoing data to help supplement the computer’s main CPU.

Input Components
Before a computer can do any processing, it requires input, commonly from user-
controlled devices, such as keyboards, microphones, Webcams, and scanners. External
interfaces, such as serial, FireWire, and USB ports, can also be used to get input from
external devices.
Input is also generated by storage devices, such as hard disks and CDs/DVDs
that store programs and data files containing computer instructions and data. For
example, a spreadsheet program, such as Microsoft Excel, might contain instructions
for the CPU to calculate formulas for adding the values of two columns of data and
a spreadsheet file called MyBudget.xls containing the numbers and formulas the
spreadsheet program should use. Both the program (Microsoft Excel) and the data
file (MyBudget.xls) are used as input to the CPU, which then processes the program
instructions and data.
A spreadsheet program normally starts when a user double-clicks the spreadsheet
program icon or the icon representing the spreadsheet data file. These actions
are instigated by user input. Sometimes, however, your computer seems to start
performing actions without user input. For example, you might have noticed that
your hard drive sometimes shows activity without any obvious action from you to
initiate it. Or, a notification might pop up on your screen reminding you of a calendar
event. However, inputs to a computer can include timers that cause programs to run
periodically and data arriving from network cards, for example, that cause a program
or process to run. So, although it sometimes seems as though your computer has a
mind of its own, computers don’t actually do anything without first getting input to jolt
them into action.

Processing Components
A computer’s main processing component is the CPU, which executes instructions
from computer programs, such as word-processing programs and Web browsers. It
also runs the instructions making up the OS, which provides a user interface and the
environment in which applications run. Aside from the CPU, computers usually include
ancillary processors associated with input/output (I/O) devices, such as graphics cards.
These processors are often referred to as “onboard processors.” The processor on a
graphics card, called a “graphics processing unit (GPU),” takes a high-level graphics
instruction, such as “draw a circle,” and performs the calculations needed to draw the
circle on a display device. With an onboard GPU, the main CPU doesn’t have to handle
many of the complex calculations graphical applications require, thereby improving
overall system performance. Other devices, such as network interface cards and disk
controller cards, might also include onboard processors.
CPUs are usually composed of two or more processors, called cores, in one
package. A multicore CPU is like a person with two brains. With only one brain, you

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 5

could add four numbers, but you would probably do it in three sequential summing
operations: Add the first number to the second number, take the first sum and add it
to the third number, and add that sum to the fourth number to arrive at the final sum.
If you had two brains, you’d still need three summing operations, but two could be
done simultaneously: The first brain adds the first two numbers while the second brain
is adding the third and fourth numbers; then the second brain gives its results to the
first brain, and the first brain sums the results of the first two summing operations. So,
multicore CPUs enable computers to carry out multiple instructions simultaneously,
which results in better overall performance when running demanding applications.

Output Components
Output components include monitors and printers, but they also include storage
devices, network cards, and sound cards, to name a few. The external interfaces
mentioned previously as input components can be used as output components, too.
For example, a disk drive connected to a USB port allows reading files from the disk
(input) and writing files to the disk (output).

Storage Components
Storage components are a major part of a computer’s configuration. Generally
speaking, the more storage a computer has, the better the performance is. As you saw
in the previous section, most storage components are both input and output devices,
allowing data to be saved (output) and then accessed again later (input). When most
people think of storage, they think of disk drives, CD/DVD drives, and USB or flash
drives. However, there are two main categories of storage: short-term storage and
long-term storage.

RAM: Short-Term Storage


Short-term storage is the random access memory (RAM) on a computer. RAM is short-
term storage because when power to the computer is turned off, RAM’s contents are
gone, just as though you erased a whiteboard. When power is restored, RAM has no
data stored until the CPU begins to write data to it.
The amount of RAM, or memory, in a computer is crucial to the computer’s
capability to operate efficiently. RAM is also referred to as “working storage.”
Everything the CPU is currently processing must be available in RAM, including
program instructions and the data the current application requires. So, to run a
spreadsheet program, there must be enough RAM to load both the spreadsheet
program and the data in the spreadsheet. If there’s not enough available memory, the
spreadsheet program won’t run, or the computer uses the disk drive to supplement
RAM temporarily.
Neither option is desirable. The reason temporary use of the disk drive isn’t
optimal is because RAM is thousands of times faster than the fastest disk drives.
The time required to access data in RAM is measured in nanoseconds (billionths of a
second), but access to data on a disk drive is measured in milliseconds (thousandths

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
6 CHAPTER 1 Introduction to Computer Networks

of a second). So, if the disk drive must be used to supplement RAM while running
an application, that application, and indeed the entire computer, slows down
precipitously.
On current desktop computers, the amount of RAM installed is usually 4 GB or
more. More is generally better, but the amount of RAM you actually need depends
on how you use your computer. If you usually have only one or two typical business
applications open at once, 2 GB might be enough. However, if you run complex
graphics applications or games or have several applications open simultaneously,
you’ll likely benefit from having more RAM.

Long-Term Storage
Long-term storage maintains its data even when there’s no power. Examples include
hard disks, CDs/DVDs, solid-state drives (SSDs), and USB flash drives as well as
other types of removable media. Long-term storage is used to store document and
multimedia files as well as the files that make up applications and the OS. The
amount of storage a computer needs depends on the type and quantity of files to be
stored. In general, office documents, such as word-processing files, spreadsheets,
and presentations, require comparatively little space. Multimedia files—pictures,
music files, and videos—require much more space. Long-term storage is plentiful and
extremely inexpensive. Hard drive specifications are in hundreds of gigabytes, with
multi-terabyte (a terabyte is 1000 GB) drives quite commonplace. More details about
hard disks are discussed later in “Personal Computer Hardware.”

Data Is Stored in Bits


Whether storage is long term or short term, data on a computer is stored and processed
as binary digits (“bits,” for short). A bit holds a 1 or 0 value, which makes representing
bits with electrical pulses easy. For example, a pulse of 5 volts of electricity can
represent a 1 bit, and a pulse of 0 volts (or the absence of a pulse) can represent a 0 bit.
Bits can also be stored as pulses of light, as with fiber-optic cable: A 1 bit is represented
by the presence of light and a 0 bit as the absence of light.
Data in a computer, such as the letters in a word-processing document or the
music played from an MP3 music file, is represented by collections of 8 bits, called a
byte. You can look at each byte as a printable character in a document. For example, a
single byte from an MP3 file plays about 1/17 thousandth of a second of music. To put it
another way, one second of MP3 music takes more than 17,000 bytes.

Bits, Bytes, Megabytes, and Beyond


Some types of computer information are expressed in bits and others are expressed in
bytes. For example, when we talk about how fast a network connection is, the speed
is usually expressed in bits, as in 100 million bits per second or 100 Mbps. When we
talk about how much data a hard disk can store, the capacity is expressed in bytes, as
in 100 billion bytes or 100 GB. Notice that when expressing bits, a lowercase b is used,
but when expressing bytes, an uppercase B is used. If you want to convert bits to bytes,

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 7

simply divide by 8; for example, 100 Mbps would be about 12.5 MBps. Conversely, to
convert bytes to bits, multiply by 8. All of the prefixes used to express large numbers
of bits or bytes can be confusing, so Table 1-2 is given as a reference. Notice that each
prefix increases the previous prefix by a factor of 1000; for example, 1 megabyte is
equal to 1000 kilobytes.

Table 1-2 Prefixes used for expressing bits and bytes

Prefix Value
Kilo (K) Thousand (103 )
Mega (M) Million (106 )
Giga (G) Billion (109 )
Tera (T) Trillion (1012 )
Peta (P) Quadrillion (1015 )
Exa (E) Quintillion (1018 )
Zeta (Z) Sextillion (1021 )
Yotta (Y) Septillion (1024 )

Note
Table 1-2 isn’t exactly right because computers do everything in binary, including how they
count. So, a kilobyte is actually 1024 or 210 bytes. A megabyte is 1000 kilobytes, which is
actually 1,048,576 bytes, but it’s much easier for us humans to work with round numbers like
million and billion. So, when estimating storage capacity, we round 100 GB to 100 billion bytes
instead of the more difficult 107,374,182,400 bytes.

Personal Computer Hardware


Most people are familiar with personal computer (PC) hardware. Other types of
computers, such as minicomputers and mainframes, are usually locked away in a
heavily air-conditioned room and privy only to the eyes of IT staff. The basic hardware
used to build a PC or a mainframe differs only in the details. This section describes four
major PC components housed in a computer case:
• Motherboard
• Storage device
• RAM
• Firmware

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
8 CHAPTER 1 Introduction to Computer Networks

The Motherboard and Its Components


The motherboard is the nerve center of a computer, much like the spinal cord is the
nerve center of the human body. It’s a network of wires and controlling circuits that
connects all computer components, including the CPU, RAM, disk drives, and I/O
devices, such as network interface cards. Some key components of a motherboard are
labeled in Figure 1-1 and explained in Table 1-3.

PCI bus PCI Express bus


expansion slots expansion slots

CPU socket

RAM slots
IDE
connector

SATA Chipset Main power


connectors with heat sinks connector
Figure 1-1 A PC motherboard

All data that goes into or comes out of a computer goes through the motherboard
because all storage and I/O devices are connected to the motherboard, as is the CPU,
which processes data going in and coming out of a computer.

Computer Bus Fundamentals


Table 1-3 mentions PCI Express bus expansion slots as a component of a motherboard.
A bus is a collection of wires carrying data from one place to another on the computer.
There are many bus designs and formats, each for a particular purpose. Although

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 9

Table 1-3 Key components of a motherboard

Component Description
CPU socket The CPU is installed in this socket.
PCI Express bus Used to add functionality to a PC by adding expansion cards that have a
expansion slots Peripheral Component Interconnect Express (PCIe) connector. The larger slots
are suitable for high-performance expansion cards, such as graphics cards and
disk controllers. The smaller slots are best suited to sound cards and network
interface cards.
PCI bus This older expansion card standard is rarely found on new computers.
expansion slots
RAM slots Slots for installing RAM on the motherboard.
Chipset with The chipset consists of two chips referred to as the Northbridge and the
heat sinks Southbridge. These chips control data transfers between memory, expansion
slots, I/O devices, and the CPU. The heat sink sits on top of the chipset to
prevent it from overheating.
SATA connectors Used for connecting hard drives and CD/DVD drives that use the Serial AT
Attachment (SATA) specification.
IDE connector Used for connecting Integrated Drive Electronics (IDE) hard drives and
CD/DVD-ROM drives. This older standard is rarely found on new computers.
Main power This connector is where the motherboard receives power from the system
connector power supply.

bus types come and go, it’s safe to say that replacements for an older bus design will
almost certainly be faster than their predecessor.
In a computer, there are buses between the CPU and RAM, between the CPU and disk
drives, and between the CPU and expansion slots, among others. For the purposes of this
book, you’re most interested in the bus connecting expansion slots to the motherboard
because you usually connect a network interface card (NIC) into one of these slots. NIC
installation and expansion slot bus types are discussed in Chapter 2. What you need to
know now is that not all motherboards come with all types of expansion slots, and the
faster and busier your computer is, the faster its bus type needs to be.

Storage Device Fundamentals


Most desktop computers and laptops are likely to come with a hard drive as their
primary long-term storage component. Hard drives consist of magnetic disks, called
“platters,” that store data in the form of magnetic pulses. These magnetic pulses are
maintained even when power is turned off. Each pulse represents a single bit of data.
The platters spin at extremely fast speeds, with some faster disks having rotational
speeds of 15,000 revolutions per minute (rpm). A read/write head is attached to an
actuator arm that moves across the spinning platters in response to commands from the
computer to read or write a file (see Figure 1-2). Generally, the faster the rotational speed,

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
10 CHAPTER 1 Introduction to Computer Networks

the better the hard drive performance is. When a file is requested to be written or read, its
location is determined, and then the read/write heads are moved over the corresponding
spot on the platter. After the platter spins to the file’s starting location, the read/write
heads are activated to read or write the data. The average amount of time platters take
to spin into position is called the “rotational delay” or “latency.” The amount of time
required to move read/write heads to the correct place is the seek time, and the time it
takes to read or write data is the transfer time. The average amount of time between the
request to read or write data and the time the action is performed is the access time.

Note
The terms used to measure hard drive performance aren’t universal among manufacturers,
but the terms used in the preceding paragraph represent most specifications.

Actuator arm

Magnetic
platters

Read/write
heads

Figure 1-2 Inside a hard drive


Courtesy of © 2010 Western Digital Technologies, Inc.

Hard disks store the documents you use with your computer as well as the
applications that open these documents. In addition, the hard disk stores the OS your
computer loads when it boots. As mentioned, the hard disk acts as an input device

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 11

when files are read. When the computer boots, the OS files are read from the disk, and
instructions in these files are processed by the CPU. However, the files don’t go directly
from the hard disk to the CPU; first, they’re transferred to short-term storage (RAM).

Solid-State Drives
Solid-state drives are used in place of hard drives in many systems because of their
speed and reliability. An SSD uses a type of storage called “flash memory” that
contains no moving parts and has faster access times than a mechanical hard drive.
SSDs are more expensive than hard drives when you compare the price per gigabyte of
storage, but their price continues to fall. SSDs are most often used in mobile devices
(such as laptops, smartphones, and tablets) but are also found on high-performance
desktops and servers, often supplementing, rather than replacing, hard drive storage.

RAM Fundamentals
RAM, the main short-term storage component on a computer, consists of capacitors
to store data and transistors to control access to data. Capacitors require power to
maintain the bits they store. Because RAM requires continuous power to store data, it’s
referred to as “volatile memory.”
RAM has no moving parts, so as mentioned, accessing data in RAM is much faster
than accessing data on a hard drive—there’s no seek time or rotational delay. Because
RAM is so much faster than a hard drive, any information the CPU processes should be
in RAM. If data the CPU requires is located on the hard drive, it’s loaded into RAM first,
which takes considerable time. Therefore, the more RAM your system has, the more
likely it is that all the data needed by running programs can be stored in RAM, making
the system perform much faster.

Note
While SSDs have no moving parts, they are still considerably slower than RAM, so SSDs will
not replace RAM in a system any time soon.

Firmware Fundamentals
A key component of every computer is its firmware. Firmware is a computer program
stored in nonvolatile memory, such as ROM or flash memory. Firmware is located on
the motherboard and is executed when the computer is first powered on. Nonvolatile
memory is a type of storage that maintains its data after power is removed. The
firmware on most PCs is called the basic input/output system (BIOS) or Unified
Extensible Firmware Interface (UEFI). A main function of the BIOS or UEFI is to tell
the CPU to perform certain tasks when power is first applied to the computer, including
initializing motherboard hardware, performing a power-on self-test (POST), and
beginning the boot procedure.

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
12 CHAPTER 1 Introduction to Computer Networks

Because of the complexity of motherboards, configuring some hardware


components and tuning performance parameters are often necessary. When a
computer begins to boot, the firmware program offers the user an opportunity to run
the setup utility to perform this configuration. The configuration data the user enters
is stored in complementary metal oxide semiconductor (CMOS) memory. It holds
information such as possible boot devices, the status of hardware devices, and perhaps
a system password, if needed. CMOS is a type of low-power memory that requires only
a small battery to maintain its data.

Computer Boot Procedure


To take a computer from a powered-off state to running an OS, such as Windows or
Linux, the following steps must take place:

1. Power is applied to the motherboard.


2. The CPU starts.
3. The CPU carries out the firmware startup routines, including the POST.
4. Boot devices, as specified in the firmware configuration, are searched for an OS.
5. The OS is loaded into RAM.
6. OS services are started.

These steps apply to almost every type of computer, including very small
computing devices, such as smartphones and tablets. Probably the biggest difference
between computers is what occurs in the last step. OS services are programs that are
part of the OS rather than applications a user starts. The services an OS starts can vary
greatly, depending on which OS is loaded and how it’s configured. The number and
type of services started on a system are what, at least in part, account for the time it
takes a system to boot completely. Examples of common OS services include the user
interface, the file system, and, of course, networking services.

Note
The projects in this book involving a Windows client OS use Windows 10 Education Edition.
Other editions of Windows 10 can be used.

Hands-On Project 1-1: Examining a Computer’s Boot Procedure


Time Required: 10 minutes
Objective: Examine the computer boot procedure and firmware setup utility.
Required Tools and Equipment: Net-XX (a Windows computer configured as described in the
“Before You Begin” section of the Introduction of this book)

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 13

Description: In this project, you examine the computer boot procedure from beginning to end,
using a Windows computer. You also examine the firmware setup utility and view the configura-
tion that specifies which devices the firmware should search for an OS. Because the firmware
varies among computers, your instructor might have to assist with the keystrokes you enter to
run the setup utility and view the boot order menu. This project uses a virtual machine and the
setup utility in VMware Workstation. If you aren’t using virtual machines for the projects in this
book, the setup utility on most computers is similar.

Caution
Your computer must be turned off before you begin this project. Read the first step
carefully before turning on the computer, as you need to act quickly to enter the
setup utility.

1. Turn on your computer. Watch the screen carefully for a message telling you what key
to press to activate the setup utility. On many systems, this key is F1, F2, or Delete. If you
don’t press the key in time, the OS boots normally. If this happens, shut down the com-
puter and try again.
2. When you have entered the setup utility, your screen might look similar to Figure 1-3, but
many setup screens look different. Before continuing, write down the steps of the boot pro-
cedure, listed earlier under “Computer Boot Procedure,” that have taken place to this point:

Figure 1-3 The setup utility


Source: Phoenix Technologies, Ltd

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
14 CHAPTER 1 Introduction to Computer Networks

3. Navigate the setup utility until you find the boot order menu (see Figure 1-4). You can
change the order in which the firmware looks for boot devices or exclude a device from
the boot order. The firmware boots from the first device in which it finds an OS. You
might need to change the boot order if, for example, you have an OS installed on the
hard drive but want to boot from an installation CD/DVD to install a new OS. In this case,
you move the CD/DVD device to the first entry in the boot order.

Figure 1-4 The boot order menu


Source: Phoenix Technologies, Ltd

4. For now, you can leave the boot order unchanged. To quit the setup utility, press the
­correct key (usually specified at the bottom of the screen). In Figure 1-4, you press
Esc to exit without saving changes or F10 to save the changes before exiting. In either
case, when you exit, the computer restarts. Press the key for exiting without saving
changes.
5. Write the final steps of the boot procedure that occurred as Windows started:

6. Shut down the computer for the next project.

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 15

The Fundamentals of Network Communication


A computer network consists of two or more computers connected by some kind of
transmission medium, such as a cable or air waves. After they’re connected, correctly
configured computers can communicate with one another. The primary motivation
for networking was the need for people to share resources, such as printers and hard
drives, to share information such as word-processing files, and to communicate by
using applications such as e-mail. These motivations remain, especially for businesses,
but another motivating factor for both businesses and homes is to “get online”—to
access the Internet. The Internet, with its wealth of information, disinformation, fun,
and games, has had a tremendous impact on how and why networks are used. Indeed,
many of the networking technologies used now that you learn about in this book were
developed as a result of the Internet.
You might know how to use a network already; in particular, you probably
know how to use programs that access the Internet, such as smartphone apps, Web
browsers, and e-mail programs. To understand how networks work, however, you
need to learn about the underlying technologies and processes used when you open a
program that accesses the network. A good place to start is with the components that
make a stand-alone computer a networked computer.

Network Components
Imagine a computer with no networking components—no networking hardware or
software. It’s hard to imagine in this age of seemingly everything being connected.
However, not too long ago, when you bought a computer, its main purpose was to run
applications such as word-processing and spreadsheet programs, not Web browsers
and e-mail. In fact, a computer had neither the hardware nor the software needed for
browsers and e-mail. These computers were called stand-alone computers. If you
wanted to network this type of computer, you had to add these required components:
• Network interface card—A NIC is an add-on card that’s plugged into a
motherboard expansion slot and provides a connection between the computer
and the network. Most computers have a NIC built into the motherboard, so no
additional card is necessary. NICs are discussed in more detail in Chapter 2.
• Network medium—A cable that plugs into the NIC makes the connection
between a computer and the rest of the network. In networks with just two
computers, the other end of the cable can plug into the second computer’s NIC.
More likely, the other end of the cable plugs into an interconnecting device that
accommodates several computer connections. Network media can also be the
air waves, as in wireless networks. In this case, the connection is between the
antenna on the NIC and the antenna on another NIC or interconnecting device.
Network media are discussed in more detail in Chapter 4.
• Interconnecting device—Although this component isn’t always necessary
because two computers can be connected directly with a cable and small

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
16 CHAPTER 1 Introduction to Computer Networks

wireless networks can be configured without an interconnecting device, most


networks include one or several of these components. They allow computers
to communicate on a network without having to be connected directly to one
another. They include switches, hubs, routers, and wireless access points, as
discussed in Chapters 2 and 8. A small network connected to a switch is shown
in Figure 1-5.

Figure 1-5 A network of computers connected to


a switch

The previous list of components satisfies the hardware components needed to


make a stand-alone computer a networked computer. The computer must also have
the necessary software to interact with network hardware and communicate with
other computers on the network. Network software transforms a stand-alone OS
into a network OS. It’s the software that allows a word-processing program to open a
document on a server or knows how to request a Web page or send an e-mail. It’s also
the software that communicates between the OS and the network hardware. Network
software can be divided into the following categories:
• Network clients and servers—Network client software requests information
that’s stored on another network computer or device. Network server
software allows a computer to share its resources by fielding resource requests
generated by network clients. Network client software can be an integral part
of well-known applications, such as Web browsers and e-mail programs. A
Web browser, for example, sends a request for a Web page to a Web server.
Network client software can also run in the background, usually installed as

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Computer Networks 17

a networking service. In this case, it enables programs without built-in client


software to access shared network resources on other computers. For example,
Client for Microsoft Networks, which is installed automatically in Windows,
allows a word-processing program to open a file that’s shared on another
Windows computer or print to a printer attached to another Windows computer.
In this setup, the server software called File and Printer Sharing for Microsoft
Networks receives the request from the client and provides access to the shared
file or printer.
• Protocols—When clients and servers need to send information on the network,
they must pass it to network protocols, which define the rules and formats a
computer must use when sending information across the network. A network
protocol can be likened to a human language. Just as two people who want
to communicate must speak the same language, two computers that want to
communicate must use the same protocol. An example of a network protocol is
TCP/IP. Network protocols do all the behind-the-scenes tasks required to make
networking work and handle most of the complexity in networking; they’re
discussed in depth in Chapter 5.

Note
The term “NIC device driver” is often shortened to simply “NIC driver,” which is the term used
throughout this book.

• NIC driver—After a network protocol has formatted a message correctly, it hands


the data off to the NIC driver for transmission onto the network. NIC drivers
receive data from protocols and then forward this data to the physical NIC,
which transmits data onto the medium. The reverse is also true. When data
arrives at the NIC from the medium, the NIC hands it off to the NIC driver, which
then hands it off to network protocols. Every NIC installed in a computer must
have an associated device driver installed in the OS. The device driver software
manages the details of communicating with the NIC hardware to send and
receive data to and from network media.
Figure 1-6 shows the Windows representation of a network connection. In the
properties of the network connection, you can identify a network client and server,
protocols, and the NIC driver. Each of these software components plays a role in the
steps of network communication, as described in the next section.

Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Another random document with
no related content on Scribd:
How we came to some gates and deep passes difficult to travel, and we went 158
up to the gates, at which the kingdom begins which is named Xoa

CAP. LXVI.
How the Prester John went to the burial of Janes Ichee of the monastery of
Brilibanos, and of the election of another Ichee, who was a Moor 161

CAP. LXVII.
How we travelled for three days through plains, and of the curing of infirmities
and of the sight of the people 163

CAP. LXVIII.
How a great lord of title was given to us as a guard, and of the tent which he
sent us 165

CAP. LXIX.
How the ambassador, and we with him, were summoned by order of the
Prester, and of the order in which we went, and of his state 166

CAP. LXX.
Of the theft which was done to us when the baggage was moved, and of the
provisions which the Prester sent us, and of the conversation the friar had
with us 170

CAP. LXXI.
How the Prester moved away with his court, and how the friar told the
ambassador to trade if he wished, and how the ambassador went to the
court 172

CAP. LXXII.
Of the Franks who are in the country of the Prester, and how they arrived
here, and how they advised us to give the pepper and goods which we
brought 174

CAP. LXXIII.
How they told the ambassador that the grandees of the court were
counselling the Prester not to let him return, and how he ordered him to
change his tent, and asked for a cross, and how he sent to summon the
ambassador 177

CAP. LXXIV.
How the ambassador having been summoned by the Prester, he did not hear 180
him in person

CAP. LXXV.
How the ambassador was summoned another time, and he took the letters
he had brought, and how we asked leave to say mass 184

CAP. LXXVI.
Of the questions which were put to the ambassador by order of Prester John,
and of the dress which he gave to a page, and also whether we brought
with us the means of making wafers 187

CAP. LXXVII.
How the Prester John sent to call me, the priest Francisco Alvarez, and to
take to him wafers and vestments, and of the questions which he asked
me 188

CAP. LXXVIII.
Of the robbery which took place at the ambassador’s, and of the complaint
made respecting it to Prester John, and how we were robbed, and how
Prester John sent a tent for a church 194

CAP. LXXIX.
How the Prester sent to call the ambassador, and of the questions he put to
him, and how he sent to beg for the swords which he had, and some
pantaloons, and how they were sent 195

CAP. LXXX.
How Prester John sent certain horses to the ambassador for them to
skirmish, and how they did it, and of a chalice which the Prester sent him,
and of questions which were put, and of the robbery in the tent 197

CAP. LXXXI.
How the Prester sent to show a horse to the ambassador, and how he
ordered the great men of his Court to come and hear our mass, and how
the Prester sent to call me, and what he asked me 199

CAP. LXXXII.
How the Ambassador was summoned, and how he presented the letters
which he had brought to Prester John, and of his age and state 202

CAP. LXXXIII.
How I was summoned, and of the questions which they put to me respecting 205
the lives of St. Jerome, St. Dominick, and St. Francis

CAP. LXXXIV.
How the lives of the said Saints were taken to him, and how he had them
translated into his language, and of the satisfaction they felt at our mass,
and how Prester John sent for us and clothed us 209

CAP. LXXXV.
Of the sudden start which Prester John made for another place, and of the
way in which they dealt with the ambassador respecting his baggage, and
of the discord there was, and of the visit the Prester sent 212

CAP. LXXXVI.
How the Prester was informed of the quarrels of the Portuguese, and
entreated them to be friends, and what more passed, and of the wrestling
match and the baptism we did here 214

CAP. LXXXVII.
Of the number of men, horse and foot, who go with the Prester when he
travels 217

CAP. LXXXVIII.
Of the churches at Court, and how they travel, and how the altar stones are
reverenced, and how Prester John shows himself to the people each year 219

CAP. LXXXIX.
How Prester John sent to call me to say mass for him on Christmas-day, and
of confession and communion 220

CAP. XC.
How the Prester gave leave to go to the ambassador and the others, and
ordered me to remain alone with the interpreter, and of the questions about
Church matters, and how we all sang compline, and how Prester John
departed that night 224

CAP. XCI.
How the Prester went to lodge at the church of St. George, and ordered it to
be shown to the people of the embassy, and after certain questions
ordered me to be shown some rich umbrellas 228

CAP. XCII.
Of the travelling of Prester John, and the manner of his state when he is on 231
the road

CAP. XCIII.
How the Prester went to the church of Macham Selasem, and of the
procession and reception that they gave him, and what passed between
His Highness and me respecting the reception 233

CAP. XCIV.
Of the fashion and things of this church of the Trinity, and how the Prester
sent to tell the ambassador to go and see the church of his mother, and of
the things which happened in it 236

CAP. XCV.
How Prester John sent to tell those of the embassy and the Franks to go and
see his baptism, and of the representation which the Franks made for him,
and how he ordered that I should be present at the baptism, and of the
fashion of the tank, and how he desired the Portuguese to swim, and gave
them a banquet 240

CAP. XCVI.
How I went with an interpreter to visit the Abima Mark, and how I was
questioned about circumcision, and how the Abima celebrates the holy
orders 245

CAP. XCVII.
How the Prester questioned me about the ceremony of holy orders, and also
how I went to the lesser orders which they call zagonais, and what sort of
people are ordained 248

CAP. XCVIII.
How long a time the Prester’s country was without an Abima, and for what
cause and where they go to seek them, and of the state of the Abima, and
how he goes when he rides 253

CAP. XCIX.
Of the assembly of clergy, which took place in the church of Macham
Selasem when they consecrated it, and of the translation of the King
Nahum, father of this Prester, and of a small church there is there 256

CAP. C.
Of the conversation which the ambassador had with the Prester about 258
carpets, and how the Prester ordered for us an evening’s entertainment
and banquet

CAP. CI.
How the Prester sent to call the ambassador and those that were with him,
and of what passed in the great church 261

CAP. CII.
How the ambassador and all the Franks went to visit the Abima, and of what
passed there 263

CAP. CIII.
How Pero de Covilham, Portuguese, is in the country of the Prester, and how
he came there, and why he was sent 265

CAP. CIV.
How Prester John determined to write to the King and to the Captain-major,
and how he behaved with the ambassador and with the Franks who were
in his country, and of the decision as to departure 270

CAP. CV.
How the Prester sent to the ambassador thirty ounces of gold, and fifty for
those that came with him, and a crown and letters for the King of Portugal,
and letters for the Captain-major, and how we left the Court and of the road
we took 273

CAP. CVI.
Of what happened in the town of Manadeley with the Moors 277

CAP. CVII.
How two great gentlemen from the Court came to us to make friendship
between us, and committed us to the captain-major 279

CAP. CVIII.
How they took us on the road to the Court, and how they brought us back to
this country 283

CAP. CIX.
In what time and day Lent begins in the country of Prester John, and of the
great fast and abstinence of the friars, and how at night they put
themselves in the tank 284

CAP. CX.
Of the fast of Lent in the country of Prester John, and of the office of Palms 289
and of the Holy Week

CAP. CXI.
How we kept a Lent at the Court of the Prester, and we kept it in the country
of Gorage, and they ordered us to say mass, and how we did not say it 293

CAP. CXII.
How Don Luis de Meneses wrote to the ambassador to depart, and how they
did not find him at Court, and how the King Don Manuel had died 298

CAP. CXIII.
Of the battle which the Prester had with the King of Adel, and how he
defeated Captain Mahomed 304

CAP. CXIV.
How the Prester sent us a map of the world which we had brought him, for us
to translate the writing into Abyssinian, and what more passed, and of the
letters for the Pope 311

CAP. CXV.
How in the letters of Don Luis it was said that we should require justice for
certain men of his who had been killed, and the Prester sent there the
Chief Justice of the Court, and Zagazabo, in company of Don Rodrigo to
Portugal 314

CAP. CXVI.
How Zagazabo the ambassador returned to the Court, and I with him, for
business which concerned him, and how they flogged the Chief Justice
and two friars, and why 317

CAP. CXVII.
How, after the death of Queen Helena, the great Betudete went to collect the
dues of her kingdom, and what they were, and how the Queen of Adea
came to ask assistance, and what people came with her on mules 321

CAP. CXVIII.
How assistance was given to the Queen of Adea, and how the Prester
ordered the great Betudete to be arrested, and why, and how he became
free, and also he ordered other lords to be arrested 325

CAP. CXIX.
How the Tigrimahom was killed, and the other Betudete deposed, also 329
Abdenago from his lordship, and the ambassador was provided for, and
Prester John went in person to the kingdom of Adea

CAP. CXX.
Of the manner in which the Prester encamps with his Court 331

CAP. CXXI.
Of the tent of justice and method of it, and how they hear the parties 333

CAP. CXXII.
Which speaks of the manner of the prison 335

CAP. CXXIII.
Where the dwellings of the Chief Justices are situated, and the site of the
market place, and who are the merchants and hucksters 336

CAP. CXXIV.
How the lords and gentlemen and all other people pitch their tents, according
to their regulations 337

CAP. CXXV.
Of the manner in which the lords and gentlemen come to the Court, and go
about it, and depart from it 338

CAP. CXXVI.
How those who go to and come from the wars approach the Prester more
closely, and of the maintenance they get 340

CAP. CXXVII.
Of the manner in which they carry the Prester’s property when he travels,
and of the brocades and silks which he sent to Jerusalem, and of the great
treasury 340

CAP. CXXVIII.
How three hundred and odd friars departed from Barua in pilgrimage to
Jerusalem, and how they killed them 342

CAP. CXXIX.
Of the countries and kingdoms which are on the frontiers of Prester John 345

CAP. CXXX.
Of the kingdom of Adel, and how the king is esteemed as a saint amongst 346
the Moors

CAP. CXXXI.
Of the kingdom of Adea, where it begins and where it ends 346

CAP. CXXII.
Of the lordships of Ganze and Gamu, and of the kingdom of Gorage 347

CAP. CXXXIII.
Of the kingdom of Damute, and of the much gold there is in it, and how it is
collected, and to the south of this are the Amazons, if they are there 347

CAP. CXXXIV.
Of the lordships of the Cafates, who they say had been Jews, and how they
are warriors 349

CAP. CXXXV.
Of the kingdom of Gojame which belonged to Queen Helena, where the river
Nile rises, and of the much gold there is there 350

CAP. CXXXVI.
Of the kingdom of Bagamidri, which is said to be very large, and how silver is
found in its mountains 351

CAP. CXXXVII.
Of some lordships which are called of the Nubians, who had been Christians,
and of the number of churches which are in the country which they border
upon 351

CAP. CXXXVIII.
Of the officials that Solomon ordained for his son that he had of the Queen
Sabba when he sent him to Ethiopia; and how they still draw honour from
these offices 353

CAP. CXXXIX.
How the ambassador of Prester John took possession of his lordship, and
the Prester gave him a title of all of it, and we departed to the sea 354

CAP. CXL.
How the Portuguese came for us, and who was the captain 356
CAP. CXLI.
How the Barnagais made ready, and we travelled with him on the road to the
sea 360

_______________________

In this Part is related the Journey which was made from the country of the Prester John to
Portugal.

CAP. I.
Of how we departed from the port and island of Masua until arriving at Ormuz 364

CAP. II.
Of the translation of the letter which Prester John sent to Diego Lopez, and
which was given to Lopo Vaz de Sampayo 368

CAP. III.
Of the voyage we made from Ormuz to India, as far as Cochim 374

CAP. IV.
Of the voyage we made from Cananor to Lisbon, and of what happened to us
by the way 378

CAP. V.
Of the journey we made from Lisbon to Coimbra, and how we remained at
Çarnache 382

CAP. VI.
How we departed from Çarnache on the way to Coimbra, and the reception
that was made, and how the embassage was given, and of the welcome
which the King our Sovereign gave us 385

CAP. VII.
Of the translation of the letter which the Prester sent to Don Manuel 389

CAP. VIII.
Translation of the letter of Prester John to the King Don Joam our Sovereign 396

CAP. IX.
Of certain questions which the Archbishop of Braga put to Francisco Alvarez,
and the answers which he gave 401
ERRATA AND NOTES.
Page 36, line 22, for “Rodrigro”, read “Rodrigo”.
„ 84 note, “mancal”. “Baton ferré des deux bouts”.—
Roquette’s Dict.
„ 151, line 18, for “sleeep”, read “sleep”.
„ 178, line 28, “a crucifix painted on it”, or perhaps, “a painted
crucifix on it”.
„ 186, note. See Grove’s Dictionary of Music for a note on the
Monochord.
„ 199, note. “Alaqueca, laqueca, pierre des Indes qui arrête le
flux de sang.”—Roquette’s Dict.
„ 228, line 25, for “Bruncaliam”, read “Brancaliam”.
„ 241. Col. Meadows Taylor describes a similar miracle play
represented at Aurungabad by the Portuguese monks.—Story of my
Life, p. 39.
„ 295, line 2, for “pesons”, read “persons”.
„ 324, last line, for “littlo”, read “little”.
„ 325, “cap. cxvii”, read “cxviii”.
„ 344, line 33, “Cosme, Damiano”, or the church of Saints
Cosmo and Damian, martyrs united in the Calendar under 27th
September.
„ 408, note, “Tahu.” This is the Tau-cross or T-shaped crutch
emblem of St. Anthony, so called from the name of the letter in the
Greek alphabet.
PROLOGUE TO THE KING OUR SOVEREIGN.

Very high and very powerful Prince,


Perchance your Highness may judge me to be as ignorant as
over bold, since with such weak knowledge, and little capacity, I
have desired to offer to you my poor works: but the love which I bear
to your service excuses my error, because I have done it with such
strenuous daring, as in truth I would do other greater things, if the
favour of your Highness should also oblige me as in this work of
Prester John of the Indies. Because, besides that the Bishop of
Lamego incited me to this, your Highness bade me print it, saying
that you would receive much satisfaction from it, which was a great
favour to me; I give for it great thanks to God, because with this
commencement others came to me with hope of a good end,
blessed ends I hope. And if, my Lord, you keep this in your
remembrance, I well believe that with a royal mind you will so accept
the little, as you will bestow much. For a poor man passing by one
day where his King travelled, brought him a little water with both his
hands, saying: drink my Lord, for the heat is great. He accepted it
gaily from him, not looking to the small quality of that service, but
only to the good will with which he offered it. Therefore, though in
this same manner I offer to your Highness this small service of the
book of Prester John, receive with content its usefulness; for in it are
related many notable things; the truth of which is as much shown in
the deeds as in the words. Because it is a very important thing for a
Prince to recall to memory the examples of profitable lives that have
passed away, for a lesson to the living. And as, my Lord, always
since I have been yours my desire has been directed to your service
in order to derive some fruit by it, even though power may have been
wanting to me, good will has not failed: with this I went to Paris to
seek for printing types of official letters and other things fitting for
printing, which are no less of the best quality than those of Italy,
France, and Germany, where this art most flourishes, as your
Highness may see by the work which I have established in this city,
with no small satisfaction, because it seemed to me that your
Highness took pleasure in it, as has been shewn by the favours
which you have done to me, and which I hope you will do. Thus, with
this confidence, I took this little opportunity of Prester John, which
(as the poets say) is not the less to be praised on this account. May
your Highness receive with a royal and benignant mind this small
service, the first fruits of my small capacity, which may bring profit
and recreation from the labours which your great and arduous affairs
bring with them. And if your Highness should find in this book any
words that do not please you, remember that the men there abroad
are lords of the words, and that Princes are lords of deeds and of
fortune.
The treatise commences with the entry into the country of Prester
John.

Cap. i.—How Diogo Lopez de Sequeira succeeded to the government


of India after Lopo Soarez, who was governor before him, and
how he brought Mattheus to the port of Maçua.
I say that I came with Duarte Galvan, may God keep him, and
this is the truth, and he died in Camaran, an island of the Red sea,
and his embassy ceased in the time when Lopo Soarez was Captain
General and Governor of the Indies, as I have already written at
length, and here I omit to write it as it is not necessary: I shall write
that which is necessary. I say that Diogo Lopez de Sequeira
succeeding to the government of India after Lopo Soarez, he set to
work to do that which Lopo Soarez had not completed, that is to
bring Mattheus the ambassador, who went to Portugal as
ambassador of Prester John, to the port of Maçua, which is near to
Arquiquo, port and country of Prester John. And he fitted out his
large and handsome fleet, and we set sail for the said Red sea, and
arrived at the said island of Maçua on Monday of the Octave of
Easter, the seventh day of April of the year fifteen hundred and
twenty, which we found empty, because for about five or six days
they had had news of us. The main land is about two crossbow
shots, more or less, from the island, and to it the Moors of the island
had carried off their goods for safety: this mainland belongs to
Prester John. The fleet having come to anchor between the island
and the mainland, on the following Tuesday there came to us from
the town of Arquiquo a Christian and a Moor: the Christian said that
the town of Arquiquo belonged to Christians, and to a lord who was
called Barnagais, a subject of Prester John, and that the Moors of
this island of Maçua and town of Arquiquo, whenever Turks or
Roumys who do them injury came to this port, all fled to the
mountains and carried off such of their property as they could carry,
and now they had not chosen to fly because they had heard that we
were Christians. Hearing this the great captain gave thanks to God
for the news, and name of Christians which he had met with, and
which greatly favoured Mattheus, who came rather unfavourably:
and he ordered a rich garment to be given to the Christian, and to
the Moor he showed great favour, and told them that they had done
what they ought in not stirring from the town of Arquiquo, since it
belonged to Christians, and the Prester, as they said, and that his
coming was only for the service and friendship of the Prester John
and all his people, and that they might go in peace and be in
security.

Cap. ii.—How the Captain of Arquiquo came to visit the Captain


General, and also some Friars of Bisam.
The following day, Wednesday of the Octave, the captain of the
said town of Arquiquo came to speak to the Captain General, and he
brought him a present of four cows: and the Captain General
received him with much show and honour, and gave him rich stuffs,
and learned from him more details about the Christianity of the
country, and how he was already summoned by the Barnagais, the
lord of that country, to go there. This captain came in this manner: he
brought a very good horse, and he wore a cloak over a rich Moorish
shirt, and with him there were thirty horsemen, and quite two
hundred men on foot. After the long and agreeable conversation
which they held by interpreters, the Captain General speaking Arabic
well, the captain of Arquiquo went away with his people much
pleased, as it appeared from what they said. At a distance of seven
or eight leagues from this town of Arquiquo, in a very high mountain,
there is a very noble monastery of friars, which Mattheus talked of a
great deal, and which is called Bisan.[3] The friars had news of us,
and on Thursday after the Octave there came to us seven friars of
the said monastery. The Captain General went out to receive them
on the beach with all his people with much pleasure and rejoicing,
and likewise the friars showed that they felt much pleasure. They
said that for a long time they had been looking forward for Christians,
because they had prophecies written in their books, which said that
Christians were to come to this port, and that they would open a well
in it, and that when this well was opened there would be no more
Moors there. They talked of many other things in similar fitting
conversations, the ambassador Mattheus being present at all; and
the said friars did great honour to Mattheus, kissing his hand and
shoulder, because such is their custom, and he also was much
delighted with them. These friars said that they kept eight days after
the feast of Easter, and that during that time they did not go on a
journey or do any other service, but that as soon as they heard say
that Christians were in the port, a thing they so much desired, they
had begged leave of their superior to come and make this journey in
the service of God; and also that news of our arrival had been taken
to the Barnagais; but that he would not leave his house except after
the eight days after Easter had passed. The conversation with these
friars and their reception having been concluded, the Captain
General returned to his galleon with his captains, and the friars with
him. These friars were received on board with the cross and priests
with surplices, giving them the cross to kiss, which they did with
great reverence. They were treated with many conserves which the
Captain General ordered to be given them, and much conversation
passed with them of joy and pleasure over a matter so much desired
on both parts. The said friars departed and went to sleep at
Arquiquo.

Cap. iii.—How the Captain General ordered mass to be said in the


chief mosque of Maçua, and ordered it to be named St. Mary of
the Conception, and how he sent to see the things of the
Monastery of Bisam.
On Friday after the Octave of Easter, the thirteenth day of the
said month of April, very early in the morning, the said friars returned
to the beach, and they sent for them with honour; and the governor
with his captains passed over with the friars to the island of Maçua,
and he ordered mass to be said in the principal mosque, in honour of
the five wounds, as it was Friday. At the end of the mass the Captain
General said that the mosque should be named St. Mary of the
Conception: from that time forward we said mass every day in the
said mosque. At the end of that mass, on betaking ourselves to the
ships, some of the friars went with Mattheus, others with the Captain
General: to all cloths were given for their clothes, that is to say, stuffs
of coarse cotton, for that is the stuff which they wear; they also gave
them pieces of silk for the monastery, and some pictures and bells
for the same monastery. These friars all carried crosses in their
hands, for such is their custom, and the laymen wore small crosses
of black wood at their necks. Our people in general bought those
crosses which the laymen wore, and brought them with them,
because they were novelties to which we were not accustomed.
Whilst these friars were going about amongst us, the Captain
General ordered a man named Fernan Diaz, who knew Arabic, to go
and see the monastery; and for greater authority, and for the matter
to be better known for it to be written to the King our sovereign, he
sent besides the said Fernan Diaz, the licentiate Pero Gomez
Teixeira, auditor of the Indies. These each for their own part said that
it was a great and good thing, because we ought to give great thanks
and praise to the Lord for that we had come from such distant lands
and seas, through so many enemies of our faith, and that we here
fell in with Christians with a monastery and houses of prayer where
God was served. The said auditor brought from the monastery a
parchment book written in their writing,[4] to send to the King our
sovereign.

Cap. iv.—How the Captain General and the Barnagais saw each other,
and how it was arranged that Rodrigo de Lima should go with
Mattheus to Prester John.
On Tuesday, the seventeenth day of the said month of April, the
Barnagais came to the town of Arquiquo, and sent a message to the
Governor of his having come. As it seemed likely to the governor
that he would come to speak to him on the beach, he ordered a tent
to be pitched and stuffs to be arranged in the best manner possible,
and ordered seats to be made for sitting on. When all was done, a
message arrived that the Barnagais would not come there: then the
same day Antonio de Saldanha went to this town of Arquiquo to
speak to the Barnagais, and he brought a message and agreement
that they should meet and see one another midway, and so we all
got ready to go with the governor: some by sea and some by land,
as far as half way where they were to see one another. There the
Governor ordered his tents to be pitched and seats to be made. The
Barnagais coming first would not come to the place where the tents
were spread and the seats made. The Captain General having
landed, and learned that the Barnagais would not come to the tents,
ordered them to go with the seats and leave the tents; but still he
would not stir with his people to where the seats were placed. The
Captain General again sent Antonio de Saldanha and the
ambassador Mattheus to him: then they agreed that both should
approach each other, that is, the Captain General and the Barnagais.
So they did, and they saw each other and spoke in a very wide plain,
seated on the ground upon carpets. Among many other things that
they talked of, the principal one was that both gave thanks to God for
their meeting, the Barnagais saying that they had it written in their
books, that Christians from distant lands were to come to that port to
join with the people of Prester John, and that they would make a well
of water, and that there would be no more Moors there: and since
God fulfilled this, that they should affirm and swear friendship. They
then took a cross which was there for that purpose, and the
Barnagais took it in his hand, and said that he swore on that sign of
the cross, and on that on which our Lord Jesus Christ suffered, in the
name of Prester John and in his own, that he would always favour
and help to favour and assist the men and affairs of the king of
Portugal and his captains who came to this port, or to other lands
where they might be able to give them assistance and favour, and
also that he would take the ambassador Mattheus into his safe
keeping, and likewise other ambassadors and people, if the Captain
General should wish to send them through the kingdoms and
lordships of Prester John. The Captain General swore in like manner
to do the same for the affairs of Prester John and the Barnagais,
wherever he might meet with them, and that the other captains and
lords of the kingdom of Portugal would act likewise. The Captain
General gave to the Barnagais arms, clothes, and rich stuffs: and the
Barnagais gave the Captain General a horse and a mule, both of
great price. So they took leave of each other very joyful and
contented, the Captain General to the ships, and the Barnagais to
Arquiquo.[5] The Barnagais brought with him quite two hundred
horsemen, and more than two thousand men on foot. When our
gentlemen and captains saw this novelty which God had so
provided, and how a path was opened for aggrandising the holy
Catholic faith, where they had small hopes of finding such; because
they all held Mattheus to be false and a liar, so that there were
grounds for putting him on shore and leaving him alone; many then
clamoured and asked favour of the Governor, each man for himself
to be allowed to go with Mattheus on an embassy to Prester John,
and here they all affirmed by what they saw that Mattheus was a true
ambassador. Since many asked for it, it was given to Don Rodrigo
de Lima; then the Captain General settled who were to go with him.
We were the following: First, Don Rodrigo de Lima, Jorge d’Abreu,
Lopo da Gama, Joam Escolar, clerk of the embassy, Joam
Gonzalvez, its interpreter and factor, Manoel de Mares, player of
organs, Pero Lopez, mestre Joam, Gaspar Pereira, Estevan
Palharte, both servants of Don Rodrigo; Joam Fernandez, Lazaro
d’Andrade, painter, Alonzo Mendez, and I, unworthy priest,
Francisco Alvarez.[6] These went in company with Don Rodrigo; the
Captain General here said, in the presence of all: Don Rodrigo, I do
not send the father Francisco Alvarez with you, but I send you with
him, and do not do anything without his advice. There went with
Mattheus three Portuguese, one was named Magalhaēs, another
Alvarenga, another Diogo Fernandez.

Cap. v.—Of the goods which the Captain sent to Prester John.
They then prepared the present which was to be sent to the
Prester: not such as the King our Sovereign had sent by Duarte
Galvan, because that had been dispersed in Cochim by Lopo
Soarez: and what we now brought was poor enough, and we took for
excuse that the goods which we brought had been lost in the ship St.
Antonio, which was lost near Dara in the mouth of the straits. These
were the goods which we took to Prester John: first, a gold sword
with a rich hilt, four pieces of tapestry, some rich cuirasses, a helmet
and two swivel guns, four chambers, some balls, two barrels of
powder, a map of the world, some organs. With these we set out
from the ships to Arquiquo, where we went to present ourselves to
the Barnagais. Thence we went to rest about two crossbow shots
distance above the town, in a plain at the foot of a mountain. There
they soon sent us a cow, and bread and wine of the country. We
waited there because they had to send to us, or give us from the
country, riding horses and camels for the baggage. This day was
Friday, and because in this country they keep Saturday and Sunday,
Saturday for the old law and Sunday for the new, therefore we
remained thus both the two days. In these days the ambassador
Mattheus settled with Don Rodrigo and with all of us, that we should
not go with the Barnagais because he was a great lord, and that we
should do much better to go to the monastery of Bisam: and that
from that place we should get a better equipment than from the
Barnagais. Don Rodrigo, doing this at his wish, sent to tell the
Barnagais that we were not going with him, and that we were going
to Bisam. And the Barnagais, not grieving on this account, went
away and left us. And because our equipment had to be made by his
order, they gave us eight horses and no more, and thirty camels for
the baggage. So we remained discontented, knowing the mistake we
were making in leaving Barnagais to please Mattheus.

Cap. vi.—Of the day that we departed and the fleet went out of the
port, and where we went to keep the feast, and of a gentleman
who came to us.
We departed from this plain close to the town of Arquiquo, on
Monday the thirtieth of April. On this day, as soon as we lost sight of
the sea, and those of the sea lost sight of us, the fleet went out of the

You might also like