You are on page 1of 61

Data Communications and Networking

5th Edition
Visit to download the full and correct content document:
https://ebookmass.com/product/data-communications-and-networking-5th-edition/
FIFTH EDITION FIFTH EDITION

Data Communications
Data Communications
The fifth edition of Behrouz Forouzan’s Data Communications and Networking
presents a comprehensive and accessible approach to data communications and
networking that has made this book a favorite with students and professionals alike.
More than 830 figures and 150 tables accompany the text and provide a visual

AND Networking
and intuitive opportunity for understanding the material. This unique approach
minimizes the need for heavy math content, allowing normally complicated
topics to unfold graphically and visually rather than through the presentation
of complex formulas.

The new edition has been reorganized to showcase recent developments in the

AND Networking
field and minimize or eliminate coverage of deprecated topics. In addition to the
updated material included in each chapter, the text now features a chapter on the
peer-to-peer paradigm, a full chapter on quality of service (QoS), additional
coverage of forward error correction, coverage of WiMAX, and material on socket-
interface programming in Java. The end-of-chapter material has also been
significantly enhanced and now includes more than 630 questions, 600 problems,
many lab assignments, programming assignments, and online applets that allow
students to see problems and protocols in action.

Technologies related to data communications and networking are among the

MD DALIM 1176217 01/07/12 CYAN MAG YELO BLACK


fastest growing in our culture today, and there is no better guide to this rapidly
expanding field than Behrouz Forouzan, an author whose visual, student-friendly
approach has become a hallmark in computer science instruction.

Be sure to visit the book website at http://www.mhhe.com/forouzan for student


quizzes, animated PPT lecture slides, applets, programs, student and instructor
solutions, and more.

FOROUZAN

BEHROUZ A. FOROUZAN
BRIEF CONTENTS
Preface xxix

Trade Mark xxxviii


PART I: Overview 1
Chapter 1 Introduction 3
Chapter 2 Network Models 31
PART II: Physical Layer 51
Chapter 3 Introduction to Physical Layer 53
Chapter 4 Digital Transmission 95
Chapter 5 Analog Transmission 135
Chapter 6 Bandwidth Utilization: Multiplexing and Spectrum
Spreading 155
Chapter 7 Transmission Media 185
Chapter 8 Switching 207
PART III: Data-Link Layer 235
Chapter 9 Introduction to Data-Link Layer 237
Chapter 10 Error Detection and Correction 257
Chapter 11 Data Link Control (DLC) 293
Chapter 12 Media Access Control (MAC) 325
Chapter 13 Wired LANs: Ethernet 361
Chapter 14 Other Wired Networks 387
Chapter 15 Wireless LANs 435
Chapter 16 Other Wireless Networks 465
Chapter 17 Connecting Devices and Virtual LANs 493
PART IV: Network Layer 509
Chapter 18 Introduction to Network Layer 511
Chapter 19 Network-Layer Protocols 561

vii
viii BRIEF CONTENTS

Chapter 20 Unicast Routing 595


Chapter 21 Multicast Routing 639
Chapter 22 Next Generation IP 665
PART V: Transport Layer 689
Chapter 23 Introduction to Transport Layer 691
Chapter 24 Transport-Layer Protocols 735
PART VI: Application Layer 815
Chapter 25 Introduction to Application Layer 817
Chapter 26 Standard Client-Server Protocols 871
Chapter 27 Network Management 929
Chapter 28 Multimedia 961
Chapter 29 Peer-to-Peer Paradigm 1023
PART VII: Topics Related to All Layers 1051
Chapter 30 Quality of Service 1053
Chapter 31 Cryptography and Network Security 1077
Chapter 32 Internet Security 1123
Appendices A-H available online at
http://www.mhhe.com/forouzan
Appendices
Appendix A Unicode
Appendix B Positional Numbering System
Appendix C HTML, CSS, XML, and XSL
Appendix D A Touch of Probability
Appendix E Mathematical Review
Appendix F 8B/6T Code
Appendix G Miscellaneous Information
Appendix H Telephone History
Glossary 1157
References 1193
Index 1199
CONTENTS
Preface xxix
Trade Mark xxxviii
PART I: Overview 1
Chapter 1 Introduction 3
1.1 DATA COMMUNICATIONS 4
1.1.1 Components 4
1.1.2 Data Representation 5
1.1.3 Data Flow 6
1.2 NETWORKS 7
1.2.1 Network Criteria 7
1.2.2 Physical Structures 8
1.3 NETWORK TYPES 13
1.3.1 Local Area Network 13
1.3.2 Wide Area Network 14
1.3.3 Switching 15
1.3.4 The Internet 17
1.3.5 Accessing the Internet 18
1.4 INTERNET HISTORY 19
1.4.1 Early History 19
1.4.2 Birth of the Internet 20
1.4.3 Internet Today 22
1.5 STANDARDS AND ADMINISTRATION 22
1.5.1 Internet Standards 22
1.5.2 Internet Administration 24
1.6 END-CHAPTER MATERIALS 25
1.6.1 Recommended Reading 25
1.6.2 Key Terms 25
1.6.3 Summary 26
1.7 PRACTICE SET 27
1.7.1 Quizzes 27
1.7.2 Questions 27
1.7.3 Problems 28
1.8 SIMULATION EXPERIMENTS 28
1.8.1 Applets 28
1.8.2 Lab Assignments 28

Chapter 2 Network Models 31


2.1 PROTOCOL LAYERING 32
2.1.1 Scenarios 32
2.1.2 Principles of Protocol Layering 34
2.1.3 Logical Connections 35
ix
x CONTENTS

2.2 TCP/IP PROTOCOL SUITE 35


2.2.1 Layered Architecture 35
2.2.2 Layers in the TCP/IP Protocol Suite 37
2.2.3 Description of Each Layer 38
2.2.4 Encapsulation and Decapsulation 41
2.2.5 Addressing 42
2.2.6 Multiplexing and Demultiplexing 43
2.3 THE OSI MODEL 44
2.3.1 OSI versus TCP/IP 45
2.3.2 Lack of OSI Model’s Success 45
2.4 END-CHAPTER MATERIALS 46
2.4.1 Recommended Reading 46
2.4.2 Key Terms 46
2.4.3 Summary 46
2.5 PRACTICE SET 47
2.5.1 Quizzes 47
2.5.2 Questions 47
2.5.3 Problems 48

PART II: Physical Layer 51


Chapter 3 Introduction to Physical Layer 53
3.1 DATA AND SIGNALS 54
3.1.1 Analog and Digital Data 55
3.1.2 Analog and Digital Signals 55
3.1.3 Periodic and Nonperiodic 56
3.2 PERIODIC ANALOG SIGNALS 56
3.2.1 Sine Wave 56
3.2.2 Phase 59
3.2.3 Wavelength 61
3.2.4 Time and Frequency Domains 61
3.2.5 Composite Signals 63
3.2.6 Bandwidth 65
3.3 DIGITAL SIGNALS 68
3.3.1 Bit Rate 69
3.3.2 Bit Length 69
3.3.3 Digital Signal as a Composite Analog Signal 70
3.3.4 Transmission of Digital Signals 70
3.4 TRANSMISSION IMPAIRMENT 76
3.4.1 Attenuation 77
3.4.2 Distortion 79
3.4.3 Noise 79
3.5 DATA RATE LIMITS 81
3.5.1 Noiseless Channel: Nyquist Bit Rate 81
3.5.2 Noisy Channel: Shannon Capacity 82
3.5.3 Using Both Limits 83
CONTENTS xi

3.6 PERFORMANCE 84
3.6.1 Bandwidth 84
3.6.2 Throughput 85
3.6.3 Latency (Delay) 85
3.6.4 Bandwidth-Delay Product 87
3.6.5 Jitter 88
3.7 END-CHAPTER MATERIALS 89
3.7.1 Recommended Reading 89
3.7.2 Key Terms 89
3.7.3 Summary 89
3.8 PRACTICE SET 90
3.8.1 Quizzes 90
3.8.2 Questions 90
3.8.3 Problems 91
3.9 SIMULATION EXPERIMENTS 94
3.9.1 Applets 94

Chapter 4 Digital Transmission 95


4.1 DIGITAL-TO-DIGITAL CONVERSION 96
4.1.1 Line Coding 96
4.1.2 Line Coding Schemes 100
4.1.3 Block Coding 109
4.1.4 Scrambling 113
4.2 ANALOG-TO-DIGITAL CONVERSION 115
4.2.1 Pulse Code Modulation (PCM) 115
4.2.2 Delta Modulation (DM) 123
4.3 TRANSMISSION MODES 125
4.3.1 Parallel Transmission 125
4.3.2 Serial Transmission 126
4.4 END-CHAPTER MATERIALS 129
4.4.1 Recommended Reading 129
4.4.2 Key Terms 130
4.4.3 Summary 130
4.5 PRACTICE SET 131
4.5.1 Quizzes 131
4.5.2 Questions 131
4.5.3 Problems 131
4.6 SIMULATION EXPERIMENTS 134
4.6.1 Applets 134

Chapter 5 Analog Transmission 135


5.1 DIGITAL-TO-ANALOG CONVERSION 136
5.1.1 Aspects of Digital-to-Analog Conversion 137
5.1.2 Amplitude Shift Keying 138
5.1.3 Frequency Shift Keying 140
5.1.4 Phase Shift Keying 142
5.1.5 Quadrature Amplitude Modulation 146
xii CONTENTS

5.2 ANALOG-TO-ANALOG CONVERSION 147


5.2.1 Amplitude Modulation (AM) 147
5.2.2 Frequency Modulation (FM) 148
5.2.3 Phase Modulation (PM) 149
5.3 END-CHAPTER MATERIALS 151
5.3.1 Recommended Reading 151
5.3.2 Key Terms 151
5.3.3 Summary 151
5.4 PRACTICE SET 152
5.4.1 Quizzes 152
5.4.2 Questions 152
5.4.3 Problems 153
5.5 SIMULATION EXPERIMENTS 154
5.5.1 Applets 154

Chapter 6 Bandwidth Utilization: Multiplexing and Spectrum


Spreading 155
6.1 MULTIPLEXING 156
6.1.1 Frequency-Division Multiplexing 157
6.1.2 Wavelength-Division Multiplexing 162
6.1.3 Time-Division Multiplexing 163
6.2 SPREAD SPECTRUM 175
6.2.1 Frequency Hopping Spread Spectrum 176
6.2.2 Direct Sequence Spread Spectrum 178
6.3 END-CHAPTER MATERIALS 180
6.3.1 Recommended Reading 180
6.3.2 Key Terms 180
6.3.3 Summary 180
6.4 PRACTICE SET 181
6.4.1 Quizzes 181
6.4.2 Questions 181
6.4.3 Problems 182
6.5 SIMULATION EXPERIMENTS 184
6.5.1 Applets 184

Chapter 7 Transmission Media 185


7.1 INTRODUCTION 186
7.2 GUIDED MEDIA 187
7.2.1 Twisted-Pair Cable 187
7.2.2 Coaxial Cable 190
7.2.3 Fiber-Optic Cable 192
7.3 UNGUIDED MEDIA: WIRELESS 197
7.3.1 Radio Waves 199
7.3.2 Microwaves 200
7.3.3 Infrared 201
CONTENTS xiii

7.4 END-CHAPTER MATERIALS 202


7.4.1 Recommended Reading 202
7.4.2 Key Terms 202
7.4.3 Summary 203
7.5 PRACTICE SET 203
7.5.1 Quizzes 203
7.5.2 Questions 203
7.5.3 Problems 204

Chapter 8 Switching 207


8.1 INTRODUCTION 208
8.1.1 Three Methods of Switching 208
8.1.2 Switching and TCP/IP Layers 209
8.2 CIRCUIT-SWITCHED NETWORKS 209
8.2.1 Three Phases 211
8.2.2 Efficiency 212
8.2.3 Delay 213
8.3 PACKET SWITCHING 213
8.3.1 Datagram Networks 214
8.3.2 Virtual-Circuit Networks 216
8.4 STRUCTURE OF A SWITCH 222
8.4.1 Structure of Circuit Switches 222
8.4.2 Structure of Packet Switches 226
8.5 END-CHAPTER MATERIALS 230
8.5.1 Recommended Reading 230
8.5.2 Key terms 230
8.5.3 Summary 230
8.6 PRACTICE SET 231
8.6.1 Quizzes 231
8.6.2 Questions 231
8.6.3 Problems 231
8.7 SIMULATION EXPERIMENTS 234
8.7.1 Applets 234

PART III: Data-Link Layer 235


Chapter 9 Introduction to Data-Link Layer 237
9.1 INTRODUCTION 238
9.1.1 Nodes and Links 239
9.1.2 Services 239
9.1.3 Two Categories of Links 241
9.1.4 Two Sublayers 242
9.2 LINK-LAYER ADDRESSING 242
9.2.1 Three Types of addresses 244
9.2.2 Address Resolution Protocol (ARP) 245
9.2.3 An Example of Communication 248
xiv CONTENTS

9.3 END-CHAPTER MATERIALS 252


9.3.1 Recommended Reading 252
9.3.2 Key Terms 252
9.3.3 Summary 252
9.4 PRACTICE SET 253
9.4.1 Quizzes 253
9.4.2 Questions 253
9.4.3 Problems 254

Chapter 10 Error Detection and Correction 257


10.1 INTRODUCTION 258
10.1.1 Types of Errors 258
10.1.2 Redundancy 258
10.1.3 Detection versus Correction 258
10.1.4 Coding 259
10.2 BLOCK CODING 259
10.2.1 Error Detection 259
10.3 CYCLIC CODES 264
10.3.1 Cyclic Redundancy Check 264
10.3.2 Polynomials 267
10.3.3 Cyclic Code Encoder Using Polynomials 269
10.3.4 Cyclic Code Analysis 270
10.3.5 Advantages of Cyclic Codes 274
10.3.6 Other Cyclic Codes 274
10.3.7 Hardware Implementation 274
10.4 CHECKSUM 277
10.4.1 Concept 278
10.4.2 Other Approaches to the Checksum 281
10.5 FORWARD ERROR CORRECTION 282
10.5.1 Using Hamming Distance 283
10.5.2 Using XOR 283
10.5.3 Chunk Interleaving 283
10.5.4 Combining Hamming Distance and Interleaving 284
10.5.5 Compounding High- and Low-Resolution Packets 284
10.6 END-CHAPTER MATERIALS 285
10.6.1 Recommended Reading 285
10.6.2 Key Terms 286
10.6.3 Summary 286
10.7 PRACTICE SET 287
10.7.1 Quizzes 287
10.7.2 Questions 287
10.7.3 Problems 288
10.8 SIMULATION EXPERIMENTS 292
10.8.1 Applets 292
10.9 PROGRAMMING ASSIGNMENTS 292
CONTENTS xv

Chapter 11 Data Link Control (DLC) 293


11.1 DLC SERVICES 294
11.1.1 Framing 294
11.1.2 Flow and Error Control 297
11.1.3 Connectionless and Connection-Oriented 298
11.2 DATA-LINK LAYER PROTOCOLS 299
11.2.1 Simple Protocol 300
11.2.2 Stop-and-Wait Protocol 301
11.2.3 Piggybacking 304
11.3 HDLC 304
11.3.1 Configurations and Transfer Modes 305
11.3.2 Framing 305
11.4 POINT-TO-POINT PROTOCOL (PPP) 309
11.4.1 Services 309
11.4.2 Framing 310
11.4.3 Transition Phases 311
11.4.4 Multiplexing 312
11.5 END-CHAPTER MATERIALS 319
11.5.1 Recommended Reading 319
11.5.2 Key Terms 319
11.5.3 Summary 319
11.6 PRACTICE SET 320
11.6.1 Quizzes 320
11.6.2 Questions 320
11.6.3 Problems 321
11.7 SIMULATION EXPERIMENTS 323
11.7.1 Applets 323
11.8 PROGRAMMING ASSIGNMENTS 323
Chapter 12 Media Access Control (MAC) 325
12.1 RANDOM ACCESS 326
12.1.1 ALOHA 326
12.1.2 CSMA 331
12.1.3 CSMA/CD 334
12.1.4 CSMA/CA 338
12.2 CONTROLLED ACCESS 341
12.2.1 Reservation 341
12.2.2 Polling 342
12.2.3 Token Passing 343
12.3 CHANNELIZATION 344
12.3.1 FDMA 344
12.3.2 TDMA 346
12.3.3 CDMA 347
12.4 END-CHAPTER MATERIALS 352
12.4.1 Recommended Reading 352
12.4.2 Key Terms 353
12.4.3 Summary 353
xvi CONTENTS

12.5 PRACTICE SET 354


12.5.1 Quizzes 354
12.5.2 Questions 354
12.5.3 Problems 356
12.6 SIMULATION EXPERIMENTS 360
12.6.1 Applets 360
12.7 PROGRAMMING ASSIGNMENTS 360
Chapter 13 Wired LANs: Ethernet 361
13.1 ETHERNET PROTOCOL 362
13.1.1 IEEE Project 802 362
13.1.2 Ethernet Evolution 363
13.2 STANDARD ETHERNET 364
13.2.1 Characteristics 364
13.2.2 Addressing 366
13.2.3 Access Method 368
13.2.4 Efficiency of Standard Ethernet 370
13.2.5 Implementation 370
13.2.6 Changes in the Standard 373
13.3 FAST ETHERNET (100 MBPS) 376
13.3.1 Access Method 377
13.3.2 Physical Layer 377
13.4 GIGABIT ETHERNET 379
13.4.1 MAC Sublayer 380
13.4.2 Physical Layer 381
13.5 10 GIGABIT ETHERNET 382
13.5.1 Implementation 382
13.6 END-CHAPTER MATERIALS 383
13.6.1 Recommended Reading 383
13.6.2 Key Terms 383
13.6.3 Summary 383
13.7 PRACTICE SET 384
13.7.1 Quizzes 384
13.7.2 Questions 384
13.7.3 Problems 385
13.8 SIMULATION EXPERIMENTS 385
13.8.1 Applets 385
13.8.2 Lab Assignments 386

Chapter 14 Other Wired Networks 387


14.1 TELEPHONE NETWORKS 388
14.1.1 Major Components 388
14.1.2 LATAs 388
14.1.3 Signaling 390
14.1.4 Services Provided by Telephone Networks 393
14.1.5 Dial-Up Service 394
14.1.6 Digital Subscriber Line (DSL) 396
CONTENTS xvii

14.2 CABLE NETWORKS 397


14.2.1 Traditional Cable Networks 397
14.2.2 Hybrid Fiber-Coaxial (HFC) Network 398
14.2.3 Cable TV for Data Transfer 399
14.3 SONET 400
14.3.1 Architecture 401
14.3.2 SONET Layers 403
14.3.3 SONET Frames 404
14.3.4 STS Multiplexing 412
14.3.5 SONET Networks 415
14.3.6 Virtual Tributaries 420
14.4 ATM 421
14.4.1 Design Goals 422
14.4.2 Problems 422
14.4.3 Architecture 425
14.5 END-CHAPTER MATERIALS 429
14.5.1 Recommended Reading 429
14.5.2 Key Terms 430
14.5.3 Summary 431
14.6 PRACTICE SET 432
14.6.1 Quizzes 432
14.6.2 Questions 432
14.6.3 Problems 433

Chapter 15 Wireless LANs 435


15.1 INTRODUCTION 436
15.1.1 Architectural Comparison 436
15.1.2 Characteristics 438
15.1.3 Access Control 438
15.2 IEEE 802.11 PROJECT 439
15.2.1 Architecture 440
15.2.2 MAC Sublayer 441
15.2.3 Addressing Mechanism 446
15.2.4 Physical Layer 448
15.3 BLUETOOTH 451
15.3.1 Architecture 451
15.3.2 Bluetooth Layers 452
15.4 END-CHAPTER MATERIALS 458
15.4.1 Further Reading 458
15.4.2 Key Terms 458
15.4.3 Summary 458
15.5 PRACTICE SET 459
15.5.1 Quizzes 459
15.5.2 Questions 459
15.5.3 Problems 460
15.6 SIMULATION EXPERIMENTS 463
15.6.1 Applets 463
15.6.2 Lab Assignments 463
xviii CONTENTS

Chapter 16 Other Wireless Networks 465


16.1 WiMAX 466
16.1.1 Services 466
16.1.2 IEEE Project 802.16 467
16.1.3 Layers in Project 802.16 467
16.2 CELLULAR TELEPHONY 470
16.2.1 Operation 471
16.2.2 First Generation (1G) 473
16.2.3 Second Generation (2G) 474
16.2.4 Third Generation (3G) 480
16.2.5 Fourth Generation (4G) 482
16.3 SATELLITE NETWORKS 483
16.3.1 Operation 483
16.3.2 GEO Satellites 485
16.3.3 MEO Satellites 485
16.3.4 LEO Satellites 488
16.4 END-CHAPTER MATERIALS 489
16.4.1 Recommended Reading 489
16.4.2 Key Terms 490
16.4.3 Summary 490
16.5 PRACTICE SET 491
16.5.1 Quizzes 491
16.5.2 Questions 491
16.5.3 Problems 491

Chapter 17 Connecting Devices and Virtual LANs 493


17.1 CONNECTING DEVICES 494
17.1.1 Hubs 494
17.1.2 Link-Layer Switches 495
17.1.3 Routers 501
17.2 VIRTUAL LANS 502
17.2.1 Membership 504
17.2.2 Configuration 504
17.2.3 Communication between Switches 505
17.2.4 Advantages 506
17.3 END-CHAPTER MATERIALS 506
17.3.1 Recommended Reading 506
17.3.2 Key Terms 506
17.3.3 Summary 506
17.4 PRACTICE SET 507
17.4.1 Quizzes 507
17.4.2 Questions 507
17.4.3 Problems 507
CONTENTS xix

PART IV: Network Layer 509


Chapter 18 Introduction to Network Layer 511
18.1 NETWORK-LAYER SERVICES 512
18.1.1 Packetizing 513
18.1.2 Routing and Forwarding 513
18.1.3 Other Services 514
18.2 PACKET SWITCHING 516
18.2.1 Datagram Approach: Connectionless Service 516
18.2.2 Virtual-Circuit Approach: Connection-Oriented Service 517
18.3 NETWORK-LAYER PERFORMANCE 522
18.3.1 Delay 522
18.3.2 Throughput 523
18.3.3 Packet Loss 525
18.3.4 Congestion Control 525
18.4 IPV4 ADDRESSES 528
18.4.1 Address Space 529
18.4.2 Classful Addressing 530
18.4.3 Classless Addressing 532
18.4.4 Dynamic Host Configuration Protocol (DHCP) 539
18.4.5 Network Address Resolution (NAT) 543
18.5 FORWARDING OF IP PACKETS 546
18.5.1 Forwarding Based on Destination Address 547
18.5.2 Forwarding Based on Label 553
18.5.3 Routers as Packet Switches 555
18.6 END-CHAPTER MATERIALS 556
18.6.1 Recommended Reading 556
18.6.2 Key Terms 556
18.6.3 Summary 556
18.7 PRACTICE SET 557
18.7.1 Quizzes 557
18.7.2 Questions 557
18.7.3 Problems 558
18.8 SIMULATION EXPERIMENTS 560
18.8.1 Applets 560
18.9 PROGRAMMING ASSIGNMENT 560
Chapter 19 Network-Layer Protocols 561
19.1 INTERNET PROTOCOL (IP) 562
19.1.1 Datagram Format 563
19.1.2 Fragmentation 567
19.1.3 Options 572
19.1.4 Security of IPv4 Datagrams 573
19.2 ICMPv4 574
19.2.1 MESSAGES 575
19.2.2 Debugging Tools 578
19.2.3 ICMP Checksum 580
xx CONTENTS

19.3 MOBILE IP 581


19.3.1 Addressing 581
19.3.2 Agents 583
19.3.3 Three Phases 584
19.3.4 Inefficiency in Mobile IP 589
19.4 END-CHAPTER MATERIALS 591
19.4.1 Recommended Reading 591
19.4.2 Key Terms 591
19.4.3 Summary 591
19.5 PRACTICE SET 592
19.5.1 Quizzes 592
19.5.2 Questions 592
19.5.3 Problems 593
19.6 SIMULATION EXPERIMENTS 594
19.6.1 Applets 594
19.6.2 Lab Assignments 594

Chapter 20 Unicast Routing 595


20.1 INTRODUCTION 596
20.1.1 General Idea 596
20.1.2 Least-Cost Routing 596
20.2 ROUTING ALGORITHMS 598
20.2.1 Distance-Vector Routing 598
20.2.2 Link-State Routing 604
20.2.3 Path-Vector Routing 606
20.3 UNICAST ROUTING PROTOCOLS 611
20.3.1 Internet Structure 611
20.3.2 Routing Information Protocol (RIP) 613
20.3.3 Open Shortest Path First (OSPF) 618
20.3.4 Border Gateway Protocol Version 4 (BGP4) 623
20.4 END-CHAPTER MATERIALS 631
20.4.1 Recommended Reading 631
20.4.2 Key Terms 631
20.4.3 Summary 632
20.5 PRACTICE SET 632
20.5.1 Quizzes 632
20.5.2 Questions 632
20.5.3 Problems 634
20.6 SIMULATION EXPERIMENTS 637
20.6.1 Applets 637
20.7 PROGRAMMING ASSIGNMENT 637
Chapter 21 Multicast Routing 639
21.1 INTRODUCTION 640
21.1.1 Unicasting 640
21.1.2 Multicasting 640
21.1.3 Broadcasting 643
CONTENTS xxi

21.2 MULTICASTING BASICS 643


21.2.1 Multicast Addresses 643
21.2.2 Delivery at Data-Link Layer 645
21.2.3 Collecting Information about Groups 647
21.2.4 Multicast Forwarding 648
21.2.5 Two Approaches to Multicasting 649
21.3 INTRADOMAIN MULTICAST PROTOCOLS 650
21.3.1 Multicast Distance Vector (DVMRP) 651
21.3.2 Multicast Link State (MOSPF) 653
21.3.3 Protocol Independent Multicast (PIM) 654
21.4 INTERDOMAIN MULTICAST PROTOCOLS 657
21.5 IGMP 658
21.5.1 Messages 658
21.5.2 Propagation of Membership Information 659
21.5.3 Encapsulation 660
21.6 END-CHAPTER MATERIALS 660
21.6.1 Recommended Reading 660
21.6.2 Key Terms 660
21.6.3 Summary 660
21.7 PRACTICE SET 661
21.7.1 Quizzes 661
21.7.2 Questions 661
21.7.3 Problems 662
21.8 SIMULATION EXPERIMENTS 663
21.8.1 Applets 663

Chapter 22 Next Generation IP 665


22.1 IPv6 ADDRESSING 666
22.1.1 Representation 666
22.1.2 Address Space 667
22.1.3 Address Space Allocation 668
22.1.4 Autoconfiguration 672
22.1.5 Renumbering 673
22.2 THE IPv6 PROTOCOL 674
22.2.1 Packet Format 674
22.2.2 Extension Header 677
22.3 THE ICMPv6 PROTOCOL 679
22.3.1 Error-Reporting Messages 679
22.3.2 Informational Messages 680
22.3.3 Neighbor-Discovery Messages 681
22.3.4 Group Membership Messages 682
22.4 TRANSITION FROM IPv4 TO IPv6 682
22.4.1 Strategies 683
22.4.2 Use of IP Addresses 684
22.5 END-CHAPTER MATERIALS 684
22.5.1 Recommended Reading 684
22.5.2 Key Terms 685
22.5.3 Summary 685
xxii CONTENTS

22.6 PRACTICE SET 685


22.6.1 Quizzes 685
22.6.2 Questions 685
22.6.3 Problems 686
22.7 SIMULATION EXPERIMENTS 688
22.7.1 Applets 688

PART V: Transport Layer 689


Chapter 23 Introduction to Transport Layer 691
23.1 INTRODUCTION 692
23.1.1 Transport-Layer Services 693
23.1.2 Connectionless and Connection-Oriented Protocols 703
23.2 TRANSPORT-LAYER PROTOCOLS 707
23.2.1 Simple Protocol 707
23.2.2 Stop-and-Wait Protocol 708
23.2.3 Go-Back-N Protocol (GBN) 713
23.2.4 Selective-Repeat Protocol 720
23.2.5 Bidirectional Protocols: Piggybacking 726
23.3 END-CHAPTER MATERIALS 727
23.3.1 Recommended Reading 727
23.3.2 Key Terms 727
23.3.3 Summary 728
23.4 PRACTICE SET 728
23.4.1 Quizzes 728
23.4.2 Questions 728
23.4.3 Problems 729
23.5 SIMULATION EXPERIMENTS 733
23.5.1 Applets 733
23.6 PROGRAMMING ASSIGNMENT 733
Chapter 24 Transport-Layer Protocols 735
24.1 INTRODUCTION 736
24.1.1 Services 736
24.1.2 Port Numbers 736
24.2 USER DATAGRAM PROTOCOL 737
24.2.1 User Datagram 737
24.2.2 UDP Services 738
24.2.3 UDP Applications 741
24.3 TRANSMISSION CONTROL PROTOCOL 743
24.3.1 TCP Services 743
24.3.2 TCP Features 746
24.3.3 Segment 748
24.3.4 A TCP Connection 750
24.3.5 State Transition Diagram 756
24.3.6 Windows in TCP 760
24.3.7 Flow Control 762
24.3.8 Error Control 768
24.3.9 TCP Congestion Control 777
CONTENTS xxiii

24.3.10 TCP Timers 786


24.3.11 Options 790
24.4 SCTP 791
24.4.1 SCTP Services 791
24.4.2 SCTP Features 792
24.4.3 Packet Format 794
24.4.4 An SCTP Association 796
24.4.5 Flow Control 799
24.4.6 Error Control 801
24.5 END-CHAPTER MATERIALS 805
24.5.1 Recommended Reading 805
24.5.2 Key Terms 805
24.5.3 Summary 805
24.6 PRACTICE SET 806
24.6.1 Quizzes 806
24.6.2 Questions 806
24.6.3 Problems 809

PART VI: Application Layer 815


Chapter 25 Introduction to Application Layer 817
25.1 INTRODUCTION 818
25.1.1 Providing Services 819
25.1.2 Application-Layer Paradigms 820
25.2 CLIENT-SERVER PROGRAMMING 823
25.2.1 Application Programming Interface 823
25.2.2 Using Services of the Transport Layer 827
25.2.3 Iterative Communication Using UDP 828
25.2.4 Iterative Communication Using TCP 830
25.2.5 Concurrent Communication 832
25.3 ITERATIVE PROGRAMMING IN C 833
25.3.1 General Issues 833
25.3.2 Iterative Programming Using UDP 834
25.3.3 Iterative Programming Using TCP 837
25.4 ITERATIVE PROGRAMMING IN JAVA 842
25.4.1 Addresses and Ports 843
25.4.2 Iterative Programming Using UDP 846
25.4.3 Iterative Programming Using TCP 857
25.5 END-CHAPTER MATERIALS 865
25.5.1 Recommended Reading 865
25.5.2 Key Terms 866
25.5.3 Summary 866
25.6 PRACTICE SET 866
25.6.1 Quizzes 866
25.6.2 Questions 866
25.6.3 Problems 869
25.7 SIMULATION EXPERIMENTS 869
25.7.1 Applets 869
25.8 PROGRAMMING ASSIGNMENT 870
xxiv CONTENTS

Chapter 26 Standard Client-Server Protocols 871


26.1 WORLD WIDE WEB AND HTTP 872
26.1.1 World Wide Web 872
26.1.2 HyperText Transfer Protocol (HTTP) 876
26.2 FTP 887
26.2.1 Two Connections 888
26.2.2 Control Connection 888
26.2.3 Data Connection 889
26.2.4 Security for FTP 891
26.3 ELECTRONIC MAIL 891
26.3.1 Architecture 892
26.3.2 Web-Based Mail 903
26.3.3 E-Mail Security 904
26.4 TELNET 904
26.4.1 Local versus Remote Logging 905
26.5 SECURE SHELL (SSH) 907
26.5.1 Components 907
26.5.2 Applications 908
26.6 DOMAIN NAME SYSTEM (DNS) 910
26.6.1 Name Space 911
26.6.2 DNS in the Internet 915
26.6.3 Resolution 916
26.6.4 Caching 918
26.6.5 Resource Records 918
26.6.6 DNS Messages 919
26.6.7 Registrars 920
26.6.8 DDNS 920
26.6.9 Security of DNS 921
26.7 END-CHAPTER MATERIALS 921
26.7.1 Recommended Reading 921
26.7.2 Key Terms 922
26.7.3 Summary 922
26.8 PRACTICE SET 923
26.8.1 Quizzes 923
26.8.2 Questions 923
26.8.3 Problems 924
26.9 SIMULATION EXPERIMENTS 927
26.9.1 Applets 927
26.9.2 Lab Assignments 927

Chapter 27 Network Management 929


27.1 INTRODUCTION 930
27.1.1 Configuration Management 930
27.1.2 Fault Management 932
27.1.3 Performance Management 933
27.1.4 Security Management 933
27.1.5 Accounting Management 934
27.2 SNMP 934
27.2.1 Managers and Agents 935
CONTENTS xxv

27.2.2 Management Components 935


27.2.3 An Overview 937
27.2.4 SMI 938
27.2.5 MIB 942
27.2.6 SNMP 944
27.3 ASN.1 951
27.3.1 Language Basics 951
27.3.2 Data Types 952
27.3.3 Encoding 955
27.4 END-CHAPTER MATERIALS 955
27.4.1 Recommended Reading 955
27.4.2 Key Terms 956
27.4.3 Summary 956
27.5 PRACTICE SET 956
27.5.1 Quizzes 956
27.5.2 Questions 956
27.5.3 Problems 958

Chapter 28 Multimedia 961


28.1 COMPRESSION 962
28.1.1 Lossless Compression 962
28.1.2 Lossy Compression 972
28.2 MULTIMEDIA DATA 978
28.2.1 Text 978
28.2.2 Image 978
28.2.3 Video 982
28.2.4 Audio 984
28.3 MULTIMEDIA IN THE INTERNET 986
28.3.1 Streaming Stored Audio/Video 986
28.3.2 Streaming Live Audio/Video 989
28.3.3 Real-Time Interactive Audio/Video 990
28.4 REAL-TIME INTERACTIVE PROTOCOLS 995
28.4.1 Rationale for New Protocols 996
28.4.2 RTP 999
28.4.3 RTCP 1001
28.4.4 Session Initialization Protocol (SIP) 1005
28.4.5 H.323 1012
28.5 END-CHAPTER MATERIALS 1014
28.5.1 Recommended Reading 1014
28.5.2 Key Terms 1015
28.5.3 Summary 1015
28.6 PRACTICE SET 1016
28.6.1 Quizzes 1016
28.6.2 Questions 1016
28.6.3 Problems 1018
28.7 SIMULATION EXPERIMENTS 1021
28.7.1 Applets 1021
28.7.2 Lab Assignments 1021
28.8 PROGRAMMING ASSIGNMENTS 1022
xxvi CONTENTS

Chapter 29 Peer-to-Peer Paradigm 1023


29.1 INTRODUCTION 1024
29.1.1 P2P Networks 1024
29.1.2 Distributed Hash Table (DHT) 1026
29.2 CHORD 1029
29.2.1 Identifier Space 1029
29.2.2 Finger Table 1029
29.2.3 Interface 1030
29.2.4 Applications 1036
29.3 PASTRY 1036
29.3.1 Identifier Space 1036
29.3.2 Routing 1037
29.3.3 Application 1041
29.4 KADEMLIA 1041
29.4.1 Identifier Space 1041
29.4.2 Routing Table 1041
29.4.3 K-Buckets 1044
29.5 BITTORRENT 1045
29.5.1 BitTorrent with a Tracker 1045
29.5.2 Trackerless BitTorrent 1046
29.6 END-CHAPTER MATERIALS 1047
29.6.1 Recommended Reading 1047
29.6.2 Key Terms 1047
29.6.3 Summary 1047
29.7 PRACTICE SET 1048
29.7.1 Quizzes 1048
29.7.2 Questions 1048
29.7.3 Problems 1048

PART VII: Topics Related to All Layers 1051


Chapter 30 Quality of Service 1053
30.1 DATA-FLOW CHARACTERISTICS 1054
30.1.1 Definitions 1054
30.1.2 Sensitivity of Applications 1054
30.1.3 Flow Classes 1055
30.2 FLOW CONTROL TO IMPROVE QOS 1055
30.2.1 Scheduling 1056
30.2.2 Traffic Shaping or Policing 1058
30.2.3 Resource Reservation 1061
30.2.4 Admission Control 1062
30.3 INTEGRATED SERVICES (INTSERV) 1062
30.3.1 Flow Specification 1062
30.3.2 Admission 1063
30.3.3 Service Classes 1063
30.3.4 Resource Reservation Protocol (RSVP) 1063
30.3.5 Problems with Integrated Services 1065
30.4 DIFFERENTIATED SERVICES (DFFSERV) 1066
30.4.1 DS Field 1066
CONTENTS xxvii

30.4.2 Per-Hop Behavior 1067


30.4.3 Traffic Conditioners 1067
30.5 END-CHAPTER MATERIALS 1068
30.5.1 Recommended Reading 1068
30.5.2 Key Terms 1068
30.5.3 Summary 1068
30.6 PRACTICE SET 1069
30.6.1 Quizzes 1069
30.6.2 Questions 1069
30.6.3 Problems 1070
30.7 SIMULATION EXPERIMENTS 1075
30.7.1 Applets 1075
30.8 PROGRAMMING ASSIGNMENTS 1075
Chapter 31 Cryptography and Network Security 1077
31.1 INTRODUCTION 1078
31.1.1 Security Goals 1078
31.1.2 Attacks 1079
31.1.3 Services and Techniques 1081
31.2 CONFIDENTIALITY 1081
31.2.1 Symmetric-Key Ciphers 1081
31.2.2 Asymmetric-Key Ciphers 1092
31.3 OTHER ASPECTS OF SECURITY 1097
31.3.1 Message Integrity 1097
31.3.2 Message Authentication 1099
31.3.3 Digital Signature 1100
31.3.4 Entity Authentication 1105
31.3.5 Key Management 1108
31.4 END-CHAPTER MATERIALS 1114
31.4.1 Recommended Reading 1114
31.4.2 Key Terms 1114
31.4.3 Summary 1114
31.5 PRACTICE SET 1115
31.5.1 Quizzes 1115
31.5.2 Questions 1115
31.5.3 Problems 1117
31.6 SIMULATION EXPERIMENTS 1121
31.6.1 Applets 1121
31.7 PROGRAMMING ASSIGNMENTS 1122
Chapter 32 Internet Security 1123
32.1 NETWORK-LAYER SECURITY 1124
32.1.1 Two Modes 1124
32.1.2 Two Security Protocols 1126
32.1.3 Services Provided by IPSec 1129
32.1.4 Security Association 1130
32.1.5 Internet Key Exchange (IKE) 1132
32.1.6 Virtual Private Network (VPN) 1133
xxviii CONTENTS

32.2 TRANSPORT-LAYER SECURITY 1134


32.2.1 SSL Architecture 1135
32.2.2 Four Protocols 1138
32.3 APPLICATION-LAYER SECURITY 1140
32.3.1 E-mail Security 1141
32.3.2 Pretty Good Privacy (PGP) 1142
32.3.3 S/MIME 1147
32.4 FIREWALLS 1151
32.4.1 Packet-Filter Firewall 1152
32.4.2 Proxy Firewall 1152
32.5 END-CHAPTER MATERIALS 1153
32.5.1 Recommended Reading 1153
32.5.2 Key Terms 1154
32.5.3 Summary 1154
32.6 PRACTICE SET 1154
32.6.1 Quizzes 1154
32.6.2 Questions 1155
32.6.3 Problems 1155
32.7 SIMULATION EXPERIMENTS 1156
32.7.1 Applets 1156
32.7.2 Lab Assignments 1156
Appendices A-H available online at
http://www.mhhe.com/forouzan
Appendices
Appendix A Unicode
Appendix B Positional Numbering System
Appendix C HTML, CSS, XML, and XSL
Appendix D A Touch of Probability
Appendix E Mathematical Review
Appendix F 8B/6T Code
Appendix G Miscellaneous Information
Appendix H Telephone History
Glossary 1157
References 1193
Index 1199
P R E FAC E

T echnologies related to data communication and networking may be the fastest


growing in our culture today. The appearance of some new social networking
applications every year is a testimony to this claim. People use the Internet more and
more every day. They use the Internet for research, shopping, airline reservations,
checking the latest news and weather, and so on.
In this Internet-oriented society, specialists need be trained to run and manage
the Internet, part of the Internet, or an organization’s network that is connected to
the Internet. This book is designed to help students understand the basics of data
communications and networking in general and the protocols used in the Internet in
particular.

Features
Although the main goal of the book is to teach the principles of networking, it is
designed to teach these principles using the following goals:
Protocol Layering
The book is designed to teach the principles of networking by using the protocol lay-
ering of the Internet and the TCP/IP protocol suite. Some of the networking princi-
ples may have been duplicated in some of these layers, but with their own special
details. Teaching these principles using protocol layering is beneficial because these
principles are repeated and better understood in relation to each layer. For example,
although addressing is an issue that is applied to four layers of the TCP/IP suite, each
layer uses a different addressing format for different purposes. In addition, address-
ing has a different domain in each layer. Another example is framing and
packetizing , which is repeated in several layers, but each layer treats the principle
differently.
Bottom-Up Approach
This book uses a bottom-up approach. Each layer in the TCP/IP protocol suite is built
on the services provided by the layer below. We learn how bits are moving at the physi-
cal layer before learning how some programs exchange messages at the application
layer.

Changes in the Fifth Edition


I have made several categories of changes in this edition.
Changes in the Organization
Although the book is still made of seven parts, the contents and order of chapters have
been changed. Some chapters have been combined, some have been moved, some are

xxix
xxx PREFACE

new. Sometimes part of a chapter is eliminated because the topic is deprecated. The fol-
lowing shows the relationship between chapters in the fourth and fifth editions.

I III IV VI
01 01 09 09 18 25 25

02 02 10 10 19 19 26 26

11 11 20 20 27 27
II
03 03 12 12 21 21 28 28

04 04 13 13 22 22 29 29

05 05 VII
14 14 V
06 06 30 30
15 15 23 23

07 07 31 31
16 16 24 24

08 08 32 32
17 17
Legend
18
Old New Combine Part

❑ Some chapters have been combined into one chapter. Chapters 9, 17, and 18 are
combined into one chapter because some topics in each chapter have been depre-
cated. Chapters 19 and 21 are combined into Chapter 18. Chapters 25, 26, and 27
are also combined into one chapter because the topics are related to each other.
Chapters 30 and 31 are also combined because they cover the same issue.
❑ Some chapters have been split into two chapters because of content augmentation.
For example, Chapter 22 is split into Chapters 20 and 21.
❑ Some chapters have been first combined, but then split for better organization. For
example, Chapters 23 and 24 are first combined and then split into two chapters
again.
❑ Some chapters have been moved to better fit in the organization of the book. Chap-
ter 15 now becomes Chapter 17. Chapters 28 and 29 now become Chapters 27
and 28.
❑ Some chapters have been moved to fit better in the sequence. For example,
Chapter 15 has become Chapter 17 to cover more topics.
❑ Some chapters are new. Chapter 9 is an introduction to the data-link layer. Chapter 25
is an introduction to the application layer and includes socket-interface program-
ming in C and Java. Chapter 30 is almost new. It covers QoS, which was part of
other chapters in the previous edition.
PREFACE xxxi

New and Augmented Materials


Although the contents of each chapter have been updated, some new materials have
also been added to this edition:
❑ Peer-to-Peer paradigm has been added as a new chapter (Chapter 29).
❑ Quality of service (QoS) has been augmented and added as a new chapter
(Chapter 30).
❑ Chapter 10 is augmented to include the forward error correction.
❑ WiMAX, as the wireless access network, has been added to Chapter 16.
❑ The coverage of the transport-layer protocol has been augmented (Chapter 23).
❑ Socket-interface programming in Java has been added to Chapter 25.
❑ Chapter 28, on multimedia, has been totally revised and augmented.
❑ Contents of unicast and multicast routing (Chapters 20 and 21) have gone through
a major change and have been augmented.
❑ The next generation IP is augmented and now belongs to Chapter 22.

Changes in the End-Chapter Materials


The end-chapter materials have gone through a major change:
❑ The practice set is augmented; it has many new problems in some appropriate
chapters.
❑ Lab assignments have been added to some chapters to allow students to see some
data in motion.
❑ Some applets have been posted on the book website to allow students to see some
problems and protocols in action.
❑ Some programming assignments allow the students to write some programs to
solve problems.

Extra Materials
Some extra materials, which could not be fit in the contents and volume of the book,
have been posted on the book website for further study.

New Organization
This edition is divided into seven parts, which reflects the structure of the Internet model.

Part One: Overview


The first part gives a general overview of data communications and networking. Chap-
ter 1 covers introductory concepts needed for the rest of the book. Chapter 2 introduces
the Internet model.
Part Two: Physical Layer
The second part is a discussion of the physical layer of the Internet model. It is made of
six chapters. Chapters 3 to 6 discuss telecommunication aspects of the physical layer.
xxxii PREFACE

Chapter 7 introduces the transmission media, which, although not part of the physical
layer, is controlled by it. Chapter 8 is devoted to switching, which can be used in sev-
eral layers.
Part Three: Data-Link Layer
The third part is devoted to the discussion of the data-link layer of the Internet model. It
is made of nine chapters. Chapter 9 introduces the data-link layer. Chapter 10 covers
error detection and correction, which can also be used in some other layers. Chapters 11
and 12 discuss issues related to two sublayers in the data-link layer. Chapters 13 and 14
discuss wired networks. Chapters 15 and 16 discuss wireless networks. Chapter 17
shows how networks can be combined to create larger or virtual networks.
Part Four: Network Layer
The fourth part is devoted to the discussion of the network layer of the Internet model.
Chapter 18 introduces this layer and discusses the network-layer addressing. Chapter 19
discusses the protocols in the current version. Chapters 20 and 21 are devoted to rout-
ing (unicast and multicast). Chapter 22 introduces the next generation protocol.
Part Five: Transport Layer
The fifth part is devoted to the discussion of the transport layer of the Internet model.
Chapter 23 gives an overview of the transport layer and discusses the services and
duties of this layer. Chapter 24 discusses the transport-layer protocols in the Internet:
UDP, TCP, and SCTP.
Part Six: Application Layer
Chapter 25 introduces the application layer and discusses some network programming
in both C and Java. Chapter 26 discusses most of the standard client-server program-
ming in the Internet. Chapter 27 discusses network management. Chapter 28 is devoted
to the multimedia, an issue which is very hot today. Finally, Chapter 29 is an introduc-
tion to the peer-to-peer paradigm, a trend which is on the rise in the today’s Internet.

Part Seven: Topics Related to All Layers


The last part of the book discusses the issues that belong to some or all layers.
Chapter 30 discusses the quality of service. Chapters 31 and 32 discuss security.

Appendices
The appendices (available online at http://www.mhhe.com/forouzan) are intended to
provide a quick reference or review of materials needed to understand the concepts dis-
cussed in the book. There are eight appendices that can be used by the students for ref-
erence and study:
❑ Appendix A: Unicode
❑ Appendix B: Positional Numbering System
❑ Appendix C: HTML,CSS, XML, and XSL
❑ Appendix D: A Touch of Probability
❑ Appendix E: Mathematical Review
PREFACE xxxiii

❑ Appendix F: 8B/6T Code


❑ Appendix G: Miscellaneous Information
❑ Appendix H: Telephone History
References
The book contains a list of references for further reading.
Glossary and Acronyms
The book contains an extensive glossary and a list of acronyms for finding the corre-
sponding term quickly.

Pedagogy
Several pedagogical features of this text are designed to make it particularly easy for
students to understand data communication and networking.
Visual Approach
The book presents highly technical subject matter without complex formulas by using a
balance of text and figures. More than 830 figures accompanying the text provide a
visual and intuitive opportunity for understanding the material. Figures are particularly
important in explaining networking concepts. For many students, these concepts are
more easily grasped visually than verbally.

Highlighted Points
I have repeated important concepts in boxes for quick reference and immediate
attention.

Examples and Applications


Whenever appropriate, I have included examples that illustrate the concepts introduced
in the text. Also, I have added some real-life applications throughout each chapter to
motivate students.

End-of-Chapter Materials
Each chapter ends with a set of materials that includes the following:
Key Terms
The new terms used in each chapter are listed at the end of the chapter and their defini-
tions are included in the glossary.
Recommended Reading
This section gives a brief list of references relative to the chapter. The references can be
used to quickly find the corresponding literature in the reference section at the end of
the book.
Summary
Each chapter ends with a summary of the material covered by that chapter. The sum-
mary glues the important materials together to be seen in one shot.
xxxiv PREFACE

Practice Set
Each chapter includes a practice set designed to reinforce salient concepts and
encourage students to apply them. It consists of three parts: quizzes, questions, and
problems.

Quizzes
Quizzes, which are posted on the book website, provide quick concept checking. Stu-
dents can take these quizzes to check their understanding of the materials. The feed-
back to the students’ responses is given immediately.

Questions
This section contains simple questions about the concepts discussed in the book.
Answers to the odd-numbered questions are posted on the book website to be checked
by the student. There are more than 630 questions at the ends of chapters.

Problems
This section contains more difficult problems that need a deeper understanding of the
materials discussed in the chapter. I strongly recommend that the student try to solve all
of these problems. Answers to the odd-numbered problems are also posted on the book
website to be checked by the student. There are more than 600 problems at the ends of
chapters.

Simulation Experiments
Network concepts and the flow and contents of the packets can be better understood if
they can be analyzed in action. Some chapters include a section to help students exper-
iment with these. This section is divided into two parts: applets and lab assignments.

Applets
Java applets are interactive experiments that are created by the authors and posted on
the website. Some of these applets are used to better understand the solutions to some
problems; others are used to better understand the network concepts in action.

Lab Assignments
Some chapters include lab assignments that use Wireshark simulation software. The
instructions for downloading and using Wireshark are given in Chapter 1. In some other
chapters, there are a few lab assignments that can be used to practice sending and
receiving packets and analyzing their contents.

Programming Assignments
Some chapters also include programming assignments. Writing a program about a
process or procedure clarifies many subtleties and helps the student better understand
the concept behind the process. Although the student can write and test programs in
any computer language she or he is comfortable with, the solutions are given in Java
language at the book website for the use of professors.
Another random document with
no related content on Scribd:
DANCE ON STILTS AT THE GIRLS’ UNYAGO, NIUCHI

Newala, too, suffers from the distance of its water-supply—at least


the Newala of to-day does; there was once another Newala in a lovely
valley at the foot of the plateau. I visited it and found scarcely a trace
of houses, only a Christian cemetery, with the graves of several
missionaries and their converts, remaining as a monument of its
former glories. But the surroundings are wonderfully beautiful. A
thick grove of splendid mango-trees closes in the weather-worn
crosses and headstones; behind them, combining the useful and the
agreeable, is a whole plantation of lemon-trees covered with ripe
fruit; not the small African kind, but a much larger and also juicier
imported variety, which drops into the hands of the passing traveller,
without calling for any exertion on his part. Old Newala is now under
the jurisdiction of the native pastor, Daudi, at Chingulungulu, who,
as I am on very friendly terms with him, allows me, as a matter of
course, the use of this lemon-grove during my stay at Newala.
FEET MUTILATED BY THE RAVAGES OF THE “JIGGER”
(Sarcopsylla penetrans)

The water-supply of New Newala is in the bottom of the valley,


some 1,600 feet lower down. The way is not only long and fatiguing,
but the water, when we get it, is thoroughly bad. We are suffering not
only from this, but from the fact that the arrangements at Newala are
nothing short of luxurious. We have a separate kitchen—a hut built
against the boma palisade on the right of the baraza, the interior of
which is not visible from our usual position. Our two cooks were not
long in finding this out, and they consequently do—or rather neglect
to do—what they please. In any case they do not seem to be very
particular about the boiling of our drinking-water—at least I can
attribute to no other cause certain attacks of a dysenteric nature,
from which both Knudsen and I have suffered for some time. If a
man like Omari has to be left unwatched for a moment, he is capable
of anything. Besides this complaint, we are inconvenienced by the
state of our nails, which have become as hard as glass, and crack on
the slightest provocation, and I have the additional infliction of
pimples all over me. As if all this were not enough, we have also, for
the last week been waging war against the jigger, who has found his
Eldorado in the hot sand of the Makonde plateau. Our men are seen
all day long—whenever their chronic colds and the dysentery likewise
raging among them permit—occupied in removing this scourge of
Africa from their feet and trying to prevent the disastrous
consequences of its presence. It is quite common to see natives of
this place with one or two toes missing; many have lost all their toes,
or even the whole front part of the foot, so that a well-formed leg
ends in a shapeless stump. These ravages are caused by the female of
Sarcopsylla penetrans, which bores its way under the skin and there
develops an egg-sac the size of a pea. In all books on the subject, it is
stated that one’s attention is called to the presence of this parasite by
an intolerable itching. This agrees very well with my experience, so
far as the softer parts of the sole, the spaces between and under the
toes, and the side of the foot are concerned, but if the creature
penetrates through the harder parts of the heel or ball of the foot, it
may escape even the most careful search till it has reached maturity.
Then there is no time to be lost, if the horrible ulceration, of which
we see cases by the dozen every day, is to be prevented. It is much
easier, by the way, to discover the insect on the white skin of a
European than on that of a native, on which the dark speck scarcely
shows. The four or five jiggers which, in spite of the fact that I
constantly wore high laced boots, chose my feet to settle in, were
taken out for me by the all-accomplished Knudsen, after which I
thought it advisable to wash out the cavities with corrosive
sublimate. The natives have a different sort of disinfectant—they fill
the hole with scraped roots. In a tiny Makua village on the slope of
the plateau south of Newala, we saw an old woman who had filled all
the spaces under her toe-nails with powdered roots by way of
prophylactic treatment. What will be the result, if any, who can say?
The rest of the many trifling ills which trouble our existence are
really more comic than serious. In the absence of anything else to
smoke, Knudsen and I at last opened a box of cigars procured from
the Indian store-keeper at Lindi, and tried them, with the most
distressing results. Whether they contain opium or some other
narcotic, neither of us can say, but after the tenth puff we were both
“off,” three-quarters stupefied and unspeakably wretched. Slowly we
recovered—and what happened next? Half-an-hour later we were
once more smoking these poisonous concoctions—so insatiable is the
craving for tobacco in the tropics.
Even my present attacks of fever scarcely deserve to be taken
seriously. I have had no less than three here at Newala, all of which
have run their course in an incredibly short time. In the early
afternoon, I am busy with my old natives, asking questions and
making notes. The strong midday coffee has stimulated my spirits to
an extraordinary degree, the brain is active and vigorous, and work
progresses rapidly, while a pleasant warmth pervades the whole
body. Suddenly this gives place to a violent chill, forcing me to put on
my overcoat, though it is only half-past three and the afternoon sun
is at its hottest. Now the brain no longer works with such acuteness
and logical precision; more especially does it fail me in trying to
establish the syntax of the difficult Makua language on which I have
ventured, as if I had not enough to do without it. Under the
circumstances it seems advisable to take my temperature, and I do
so, to save trouble, without leaving my seat, and while going on with
my work. On examination, I find it to be 101·48°. My tutors are
abruptly dismissed and my bed set up in the baraza; a few minutes
later I am in it and treating myself internally with hot water and
lemon-juice.
Three hours later, the thermometer marks nearly 104°, and I make
them carry me back into the tent, bed and all, as I am now perspiring
heavily, and exposure to the cold wind just beginning to blow might
mean a fatal chill. I lie still for a little while, and then find, to my
great relief, that the temperature is not rising, but rather falling. This
is about 7.30 p.m. At 8 p.m. I find, to my unbounded astonishment,
that it has fallen below 98·6°, and I feel perfectly well. I read for an
hour or two, and could very well enjoy a smoke, if I had the
wherewithal—Indian cigars being out of the question.
Having no medical training, I am at a loss to account for this state
of things. It is impossible that these transitory attacks of high fever
should be malarial; it seems more probable that they are due to a
kind of sunstroke. On consulting my note-book, I become more and
more inclined to think this is the case, for these attacks regularly
follow extreme fatigue and long exposure to strong sunshine. They at
least have the advantage of being only short interruptions to my
work, as on the following morning I am always quite fresh and fit.
My treasure of a cook is suffering from an enormous hydrocele which
makes it difficult for him to get up, and Moritz is obliged to keep in
the dark on account of his inflamed eyes. Knudsen’s cook, a raw boy
from somewhere in the bush, knows still less of cooking than Omari;
consequently Nils Knudsen himself has been promoted to the vacant
post. Finding that we had come to the end of our supplies, he began
by sending to Chingulungulu for the four sucking-pigs which we had
bought from Matola and temporarily left in his charge; and when
they came up, neatly packed in a large crate, he callously slaughtered
the biggest of them. The first joint we were thoughtless enough to
entrust for roasting to Knudsen’s mshenzi cook, and it was
consequently uneatable; but we made the rest of the animal into a
jelly which we ate with great relish after weeks of underfeeding,
consuming incredible helpings of it at both midday and evening
meals. The only drawback is a certain want of variety in the tinned
vegetables. Dr. Jäger, to whom the Geographical Commission
entrusted the provisioning of the expeditions—mine as well as his
own—because he had more time on his hands than the rest of us,
seems to have laid in a huge stock of Teltow turnips,[46] an article of
food which is all very well for occasional use, but which quickly palls
when set before one every day; and we seem to have no other tins
left. There is no help for it—we must put up with the turnips; but I
am certain that, once I am home again, I shall not touch them for ten
years to come.
Amid all these minor evils, which, after all, go to make up the
genuine flavour of Africa, there is at least one cheering touch:
Knudsen has, with the dexterity of a skilled mechanic, repaired my 9
× 12 cm. camera, at least so far that I can use it with a little care.
How, in the absence of finger-nails, he was able to accomplish such a
ticklish piece of work, having no tool but a clumsy screw-driver for
taking to pieces and putting together again the complicated
mechanism of the instantaneous shutter, is still a mystery to me; but
he did it successfully. The loss of his finger-nails shows him in a light
contrasting curiously enough with the intelligence evinced by the
above operation; though, after all, it is scarcely surprising after his
ten years’ residence in the bush. One day, at Lindi, he had occasion
to wash a dog, which must have been in need of very thorough
cleansing, for the bottle handed to our friend for the purpose had an
extremely strong smell. Having performed his task in the most
conscientious manner, he perceived with some surprise that the dog
did not appear much the better for it, and was further surprised by
finding his own nails ulcerating away in the course of the next few
days. “How was I to know that carbolic acid has to be diluted?” he
mutters indignantly, from time to time, with a troubled gaze at his
mutilated finger-tips.
Since we came to Newala we have been making excursions in all
directions through the surrounding country, in accordance with old
habit, and also because the akida Sefu did not get together the tribal
elders from whom I wanted information so speedily as he had
promised. There is, however, no harm done, as, even if seen only
from the outside, the country and people are interesting enough.
The Makonde plateau is like a large rectangular table rounded off
at the corners. Measured from the Indian Ocean to Newala, it is
about seventy-five miles long, and between the Rovuma and the
Lukuledi it averages fifty miles in breadth, so that its superficial area
is about two-thirds of that of the kingdom of Saxony. The surface,
however, is not level, but uniformly inclined from its south-western
edge to the ocean. From the upper edge, on which Newala lies, the
eye ranges for many miles east and north-east, without encountering
any obstacle, over the Makonde bush. It is a green sea, from which
here and there thick clouds of smoke rise, to show that it, too, is
inhabited by men who carry on their tillage like so many other
primitive peoples, by cutting down and burning the bush, and
manuring with the ashes. Even in the radiant light of a tropical day
such a fire is a grand sight.
Much less effective is the impression produced just now by the
great western plain as seen from the edge of the plateau. As often as
time permits, I stroll along this edge, sometimes in one direction,
sometimes in another, in the hope of finding the air clear enough to
let me enjoy the view; but I have always been disappointed.
Wherever one looks, clouds of smoke rise from the burning bush,
and the air is full of smoke and vapour. It is a pity, for under more
favourable circumstances the panorama of the whole country up to
the distant Majeje hills must be truly magnificent. It is of little use
taking photographs now, and an outline sketch gives a very poor idea
of the scenery. In one of these excursions I went out of my way to
make a personal attempt on the Makonde bush. The present edge of
the plateau is the result of a far-reaching process of destruction
through erosion and denudation. The Makonde strata are
everywhere cut into by ravines, which, though short, are hundreds of
yards in depth. In consequence of the loose stratification of these
beds, not only are the walls of these ravines nearly vertical, but their
upper end is closed by an equally steep escarpment, so that the
western edge of the Makonde plateau is hemmed in by a series of
deep, basin-like valleys. In order to get from one side of such a ravine
to the other, I cut my way through the bush with a dozen of my men.
It was a very open part, with more grass than scrub, but even so the
short stretch of less than two hundred yards was very hard work; at
the end of it the men’s calicoes were in rags and they themselves
bleeding from hundreds of scratches, while even our strong khaki
suits had not escaped scatheless.

NATIVE PATH THROUGH THE MAKONDE BUSH, NEAR


MAHUTA

I see increasing reason to believe that the view formed some time
back as to the origin of the Makonde bush is the correct one. I have
no doubt that it is not a natural product, but the result of human
occupation. Those parts of the high country where man—as a very
slight amount of practice enables the eye to perceive at once—has not
yet penetrated with axe and hoe, are still occupied by a splendid
timber forest quite able to sustain a comparison with our mixed
forests in Germany. But wherever man has once built his hut or tilled
his field, this horrible bush springs up. Every phase of this process
may be seen in the course of a couple of hours’ walk along the main
road. From the bush to right or left, one hears the sound of the axe—
not from one spot only, but from several directions at once. A few
steps further on, we can see what is taking place. The brush has been
cut down and piled up in heaps to the height of a yard or more,
between which the trunks of the large trees stand up like the last
pillars of a magnificent ruined building. These, too, present a
melancholy spectacle: the destructive Makonde have ringed them—
cut a broad strip of bark all round to ensure their dying off—and also
piled up pyramids of brush round them. Father and son, mother and
son-in-law, are chopping away perseveringly in the background—too
busy, almost, to look round at the white stranger, who usually excites
so much interest. If you pass by the same place a week later, the piles
of brushwood have disappeared and a thick layer of ashes has taken
the place of the green forest. The large trees stretch their
smouldering trunks and branches in dumb accusation to heaven—if
they have not already fallen and been more or less reduced to ashes,
perhaps only showing as a white stripe on the dark ground.
This work of destruction is carried out by the Makonde alike on the
virgin forest and on the bush which has sprung up on sites already
cultivated and deserted. In the second case they are saved the trouble
of burning the large trees, these being entirely absent in the
secondary bush.
After burning this piece of forest ground and loosening it with the
hoe, the native sows his corn and plants his vegetables. All over the
country, he goes in for bed-culture, which requires, and, in fact,
receives, the most careful attention. Weeds are nowhere tolerated in
the south of German East Africa. The crops may fail on the plains,
where droughts are frequent, but never on the plateau with its
abundant rains and heavy dews. Its fortunate inhabitants even have
the satisfaction of seeing the proud Wayao and Wamakua working
for them as labourers, driven by hunger to serve where they were
accustomed to rule.
But the light, sandy soil is soon exhausted, and would yield no
harvest the second year if cultivated twice running. This fact has
been familiar to the native for ages; consequently he provides in
time, and, while his crop is growing, prepares the next plot with axe
and firebrand. Next year he plants this with his various crops and
lets the first piece lie fallow. For a short time it remains waste and
desolate; then nature steps in to repair the destruction wrought by
man; a thousand new growths spring out of the exhausted soil, and
even the old stumps put forth fresh shoots. Next year the new growth
is up to one’s knees, and in a few years more it is that terrible,
impenetrable bush, which maintains its position till the black
occupier of the land has made the round of all the available sites and
come back to his starting point.
The Makonde are, body and soul, so to speak, one with this bush.
According to my Yao informants, indeed, their name means nothing
else but “bush people.” Their own tradition says that they have been
settled up here for a very long time, but to my surprise they laid great
stress on an original immigration. Their old homes were in the
south-east, near Mikindani and the mouth of the Rovuma, whence
their peaceful forefathers were driven by the continual raids of the
Sakalavas from Madagascar and the warlike Shirazis[47] of the coast,
to take refuge on the almost inaccessible plateau. I have studied
African ethnology for twenty years, but the fact that changes of
population in this apparently quiet and peaceable corner of the earth
could have been occasioned by outside enterprises taking place on
the high seas, was completely new to me. It is, no doubt, however,
correct.
The charming tribal legend of the Makonde—besides informing us
of other interesting matters—explains why they have to live in the
thickest of the bush and a long way from the edge of the plateau,
instead of making their permanent homes beside the purling brooks
and springs of the low country.
“The place where the tribe originated is Mahuta, on the southern
side of the plateau towards the Rovuma, where of old time there was
nothing but thick bush. Out of this bush came a man who never
washed himself or shaved his head, and who ate and drank but little.
He went out and made a human figure from the wood of a tree
growing in the open country, which he took home to his abode in the
bush and there set it upright. In the night this image came to life and
was a woman. The man and woman went down together to the
Rovuma to wash themselves. Here the woman gave birth to a still-
born child. They left that place and passed over the high land into the
valley of the Mbemkuru, where the woman had another child, which
was also born dead. Then they returned to the high bush country of
Mahuta, where the third child was born, which lived and grew up. In
course of time, the couple had many more children, and called
themselves Wamatanda. These were the ancestral stock of the
Makonde, also called Wamakonde,[48] i.e., aborigines. Their
forefather, the man from the bush, gave his children the command to
bury their dead upright, in memory of the mother of their race who
was cut out of wood and awoke to life when standing upright. He also
warned them against settling in the valleys and near large streams,
for sickness and death dwelt there. They were to make it a rule to
have their huts at least an hour’s walk from the nearest watering-
place; then their children would thrive and escape illness.”
The explanation of the name Makonde given by my informants is
somewhat different from that contained in the above legend, which I
extract from a little book (small, but packed with information), by
Pater Adams, entitled Lindi und sein Hinterland. Otherwise, my
results agree exactly with the statements of the legend. Washing?
Hapana—there is no such thing. Why should they do so? As it is, the
supply of water scarcely suffices for cooking and drinking; other
people do not wash, so why should the Makonde distinguish himself
by such needless eccentricity? As for shaving the head, the short,
woolly crop scarcely needs it,[49] so the second ancestral precept is
likewise easy enough to follow. Beyond this, however, there is
nothing ridiculous in the ancestor’s advice. I have obtained from
various local artists a fairly large number of figures carved in wood,
ranging from fifteen to twenty-three inches in height, and
representing women belonging to the great group of the Mavia,
Makonde, and Matambwe tribes. The carving is remarkably well
done and renders the female type with great accuracy, especially the
keloid ornamentation, to be described later on. As to the object and
meaning of their works the sculptors either could or (more probably)
would tell me nothing, and I was forced to content myself with the
scanty information vouchsafed by one man, who said that the figures
were merely intended to represent the nembo—the artificial
deformations of pelele, ear-discs, and keloids. The legend recorded
by Pater Adams places these figures in a new light. They must surely
be more than mere dolls; and we may even venture to assume that
they are—though the majority of present-day Makonde are probably
unaware of the fact—representations of the tribal ancestress.
The references in the legend to the descent from Mahuta to the
Rovuma, and to a journey across the highlands into the Mbekuru
valley, undoubtedly indicate the previous history of the tribe, the
travels of the ancestral pair typifying the migrations of their
descendants. The descent to the neighbouring Rovuma valley, with
its extraordinary fertility and great abundance of game, is intelligible
at a glance—but the crossing of the Lukuledi depression, the ascent
to the Rondo Plateau and the descent to the Mbemkuru, also lie
within the bounds of probability, for all these districts have exactly
the same character as the extreme south. Now, however, comes a
point of especial interest for our bacteriological age. The primitive
Makonde did not enjoy their lives in the marshy river-valleys.
Disease raged among them, and many died. It was only after they
had returned to their original home near Mahuta, that the health
conditions of these people improved. We are very apt to think of the
African as a stupid person whose ignorance of nature is only equalled
by his fear of it, and who looks on all mishaps as caused by evil
spirits and malignant natural powers. It is much more correct to
assume in this case that the people very early learnt to distinguish
districts infested with malaria from those where it is absent.
This knowledge is crystallized in the
ancestral warning against settling in the
valleys and near the great waters, the
dwelling-places of disease and death. At the
same time, for security against the hostile
Mavia south of the Rovuma, it was enacted
that every settlement must be not less than a
certain distance from the southern edge of the
plateau. Such in fact is their mode of life at the
present day. It is not such a bad one, and
certainly they are both safer and more
comfortable than the Makua, the recent
intruders from the south, who have made USUAL METHOD OF
good their footing on the western edge of the CLOSING HUT-DOOR
plateau, extending over a fairly wide belt of
country. Neither Makua nor Makonde show in their dwellings
anything of the size and comeliness of the Yao houses in the plain,
especially at Masasi, Chingulungulu and Zuza’s. Jumbe Chauro, a
Makonde hamlet not far from Newala, on the road to Mahuta, is the
most important settlement of the tribe I have yet seen, and has fairly
spacious huts. But how slovenly is their construction compared with
the palatial residences of the elephant-hunters living in the plain.
The roofs are still more untidy than in the general run of huts during
the dry season, the walls show here and there the scanty beginnings
or the lamentable remains of the mud plastering, and the interior is a
veritable dog-kennel; dirt, dust and disorder everywhere. A few huts
only show any attempt at division into rooms, and this consists
merely of very roughly-made bamboo partitions. In one point alone
have I noticed any indication of progress—in the method of fastening
the door. Houses all over the south are secured in a simple but
ingenious manner. The door consists of a set of stout pieces of wood
or bamboo, tied with bark-string to two cross-pieces, and moving in
two grooves round one of the door-posts, so as to open inwards. If
the owner wishes to leave home, he takes two logs as thick as a man’s
upper arm and about a yard long. One of these is placed obliquely
against the middle of the door from the inside, so as to form an angle
of from 60° to 75° with the ground. He then places the second piece
horizontally across the first, pressing it downward with all his might.
It is kept in place by two strong posts planted in the ground a few
inches inside the door. This fastening is absolutely safe, but of course
cannot be applied to both doors at once, otherwise how could the
owner leave or enter his house? I have not yet succeeded in finding
out how the back door is fastened.

MAKONDE LOCK AND KEY AT JUMBE CHAURO


This is the general way of closing a house. The Makonde at Jumbe
Chauro, however, have a much more complicated, solid and original
one. Here, too, the door is as already described, except that there is
only one post on the inside, standing by itself about six inches from
one side of the doorway. Opposite this post is a hole in the wall just
large enough to admit a man’s arm. The door is closed inside by a
large wooden bolt passing through a hole in this post and pressing
with its free end against the door. The other end has three holes into
which fit three pegs running in vertical grooves inside the post. The
door is opened with a wooden key about a foot long, somewhat
curved and sloped off at the butt; the other end has three pegs
corresponding to the holes, in the bolt, so that, when it is thrust
through the hole in the wall and inserted into the rectangular
opening in the post, the pegs can be lifted and the bolt drawn out.[50]

MODE OF INSERTING THE KEY

With no small pride first one householder and then a second


showed me on the spot the action of this greatest invention of the
Makonde Highlands. To both with an admiring exclamation of
“Vizuri sana!” (“Very fine!”). I expressed the wish to take back these
marvels with me to Ulaya, to show the Wazungu what clever fellows
the Makonde are. Scarcely five minutes after my return to camp at
Newala, the two men came up sweating under the weight of two
heavy logs which they laid down at my feet, handing over at the same
time the keys of the fallen fortress. Arguing, logically enough, that if
the key was wanted, the lock would be wanted with it, they had taken
their axes and chopped down the posts—as it never occurred to them
to dig them out of the ground and so bring them intact. Thus I have
two badly damaged specimens, and the owners, instead of praise,
come in for a blowing-up.
The Makua huts in the environs of Newala are especially
miserable; their more than slovenly construction reminds one of the
temporary erections of the Makua at Hatia’s, though the people here
have not been concerned in a war. It must therefore be due to
congenital idleness, or else to the absence of a powerful chief. Even
the baraza at Mlipa’s, a short hour’s walk south-east of Newala,
shares in this general neglect. While public buildings in this country
are usually looked after more or less carefully, this is in evident
danger of being blown over by the first strong easterly gale. The only
attractive object in this whole district is the grave of the late chief
Mlipa. I visited it in the morning, while the sun was still trying with
partial success to break through the rolling mists, and the circular
grove of tall euphorbias, which, with a broken pot, is all that marks
the old king’s resting-place, impressed one with a touch of pathos.
Even my very materially-minded carriers seemed to feel something
of the sort, for instead of their usual ribald songs, they chanted
solemnly, as we marched on through the dense green of the Makonde
bush:—
“We shall arrive with the great master; we stand in a row and have
no fear about getting our food and our money from the Serkali (the
Government). We are not afraid; we are going along with the great
master, the lion; we are going down to the coast and back.”
With regard to the characteristic features of the various tribes here
on the western edge of the plateau, I can arrive at no other
conclusion than the one already come to in the plain, viz., that it is
impossible for anyone but a trained anthropologist to assign any
given individual at once to his proper tribe. In fact, I think that even
an anthropological specialist, after the most careful examination,
might find it a difficult task to decide. The whole congeries of peoples
collected in the region bounded on the west by the great Central
African rift, Tanganyika and Nyasa, and on the east by the Indian
Ocean, are closely related to each other—some of their languages are
only distinguished from one another as dialects of the same speech,
and no doubt all the tribes present the same shape of skull and
structure of skeleton. Thus, surely, there can be no very striking
differences in outward appearance.
Even did such exist, I should have no time
to concern myself with them, for day after day,
I have to see or hear, as the case may be—in
any case to grasp and record—an
extraordinary number of ethnographic
phenomena. I am almost disposed to think it
fortunate that some departments of inquiry, at
least, are barred by external circumstances.
Chief among these is the subject of iron-
working. We are apt to think of Africa as a
country where iron ore is everywhere, so to
speak, to be picked up by the roadside, and
where it would be quite surprising if the
inhabitants had not learnt to smelt the
material ready to their hand. In fact, the
knowledge of this art ranges all over the
continent, from the Kabyles in the north to the
Kafirs in the south. Here between the Rovuma
and the Lukuledi the conditions are not so
favourable. According to the statements of the
Makonde, neither ironstone nor any other
form of iron ore is known to them. They have
not therefore advanced to the art of smelting
the metal, but have hitherto bought all their
THE ANCESTRESS OF
THE MAKONDE
iron implements from neighbouring tribes.
Even in the plain the inhabitants are not much
better off. Only one man now living is said to
understand the art of smelting iron. This old fundi lives close to
Huwe, that isolated, steep-sided block of granite which rises out of
the green solitude between Masasi and Chingulungulu, and whose
jagged and splintered top meets the traveller’s eye everywhere. While
still at Masasi I wished to see this man at work, but was told that,
frightened by the rising, he had retired across the Rovuma, though
he would soon return. All subsequent inquiries as to whether the
fundi had come back met with the genuine African answer, “Bado”
(“Not yet”).
BRAZIER

Some consolation was afforded me by a brassfounder, whom I


came across in the bush near Akundonde’s. This man is the favourite
of women, and therefore no doubt of the gods; he welds the glittering
brass rods purchased at the coast into those massive, heavy rings
which, on the wrists and ankles of the local fair ones, continually give
me fresh food for admiration. Like every decent master-craftsman he
had all his tools with him, consisting of a pair of bellows, three
crucibles and a hammer—nothing more, apparently. He was quite
willing to show his skill, and in a twinkling had fixed his bellows on
the ground. They are simply two goat-skins, taken off whole, the four
legs being closed by knots, while the upper opening, intended to
admit the air, is kept stretched by two pieces of wood. At the lower
end of the skin a smaller opening is left into which a wooden tube is
stuck. The fundi has quickly borrowed a heap of wood-embers from
the nearest hut; he then fixes the free ends of the two tubes into an
earthen pipe, and clamps them to the ground by means of a bent
piece of wood. Now he fills one of his small clay crucibles, the dross
on which shows that they have been long in use, with the yellow
material, places it in the midst of the embers, which, at present are
only faintly glimmering, and begins his work. In quick alternation
the smith’s two hands move up and down with the open ends of the
bellows; as he raises his hand he holds the slit wide open, so as to let
the air enter the skin bag unhindered. In pressing it down he closes
the bag, and the air puffs through the bamboo tube and clay pipe into
the fire, which quickly burns up. The smith, however, does not keep
on with this work, but beckons to another man, who relieves him at
the bellows, while he takes some more tools out of a large skin pouch
carried on his back. I look on in wonder as, with a smooth round
stick about the thickness of a finger, he bores a few vertical holes into
the clean sand of the soil. This should not be difficult, yet the man
seems to be taking great pains over it. Then he fastens down to the
ground, with a couple of wooden clamps, a neat little trough made by
splitting a joint of bamboo in half, so that the ends are closed by the
two knots. At last the yellow metal has attained the right consistency,
and the fundi lifts the crucible from the fire by means of two sticks
split at the end to serve as tongs. A short swift turn to the left—a
tilting of the crucible—and the molten brass, hissing and giving forth
clouds of smoke, flows first into the bamboo mould and then into the
holes in the ground.
The technique of this backwoods craftsman may not be very far
advanced, but it cannot be denied that he knows how to obtain an
adequate result by the simplest means. The ladies of highest rank in
this country—that is to say, those who can afford it, wear two kinds
of these massive brass rings, one cylindrical, the other semicircular
in section. The latter are cast in the most ingenious way in the
bamboo mould, the former in the circular hole in the sand. It is quite
a simple matter for the fundi to fit these bars to the limbs of his fair
customers; with a few light strokes of his hammer he bends the
pliable brass round arm or ankle without further inconvenience to
the wearer.
SHAPING THE POT

SMOOTHING WITH MAIZE-COB

CUTTING THE EDGE


FINISHING THE BOTTOM

LAST SMOOTHING BEFORE


BURNING

FIRING THE BRUSH-PILE


LIGHTING THE FARTHER SIDE OF
THE PILE

TURNING THE RED-HOT VESSEL

NYASA WOMAN MAKING POTS AT MASASI


Pottery is an art which must always and everywhere excite the
interest of the student, just because it is so intimately connected with
the development of human culture, and because its relics are one of
the principal factors in the reconstruction of our own condition in
prehistoric times. I shall always remember with pleasure the two or
three afternoons at Masasi when Salim Matola’s mother, a slightly-
built, graceful, pleasant-looking woman, explained to me with
touching patience, by means of concrete illustrations, the ceramic art
of her people. The only implements for this primitive process were a
lump of clay in her left hand, and in the right a calabash containing
the following valuables: the fragment of a maize-cob stripped of all
its grains, a smooth, oval pebble, about the size of a pigeon’s egg, a
few chips of gourd-shell, a bamboo splinter about the length of one’s
hand, a small shell, and a bunch of some herb resembling spinach.
Nothing more. The woman scraped with the
shell a round, shallow hole in the soft, fine
sand of the soil, and, when an active young
girl had filled the calabash with water for her,
she began to knead the clay. As if by magic it
gradually assumed the shape of a rough but
already well-shaped vessel, which only wanted
a little touching up with the instruments
before mentioned. I looked out with the
MAKUA WOMAN closest attention for any indication of the use
MAKING A POT. of the potter’s wheel, in however rudimentary
SHOWS THE a form, but no—hapana (there is none). The
BEGINNINGS OF THE embryo pot stood firmly in its little
POTTER’S WHEEL
depression, and the woman walked round it in
a stooping posture, whether she was removing
small stones or similar foreign bodies with the maize-cob, smoothing
the inner or outer surface with the splinter of bamboo, or later, after
letting it dry for a day, pricking in the ornamentation with a pointed
bit of gourd-shell, or working out the bottom, or cutting the edge
with a sharp bamboo knife, or giving the last touches to the finished
vessel. This occupation of the women is infinitely toilsome, but it is
without doubt an accurate reproduction of the process in use among
our ancestors of the Neolithic and Bronze ages.
There is no doubt that the invention of pottery, an item in human
progress whose importance cannot be over-estimated, is due to
women. Rough, coarse and unfeeling, the men of the horde range
over the countryside. When the united cunning of the hunters has
succeeded in killing the game; not one of them thinks of carrying
home the spoil. A bright fire, kindled by a vigorous wielding of the
drill, is crackling beside them; the animal has been cleaned and cut
up secundum artem, and, after a slight singeing, will soon disappear
under their sharp teeth; no one all this time giving a single thought
to wife or child.
To what shifts, on the other hand, the primitive wife, and still more
the primitive mother, was put! Not even prehistoric stomachs could
endure an unvarying diet of raw food. Something or other suggested
the beneficial effect of hot water on the majority of approved but
indigestible dishes. Perhaps a neighbour had tried holding the hard
roots or tubers over the fire in a calabash filled with water—or maybe
an ostrich-egg-shell, or a hastily improvised vessel of bark. They
became much softer and more palatable than they had previously
been; but, unfortunately, the vessel could not stand the fire and got
charred on the outside. That can be remedied, thought our
ancestress, and plastered a layer of wet clay round a similar vessel.
This is an improvement; the cooking utensil remains uninjured, but
the heat of the fire has shrunk it, so that it is loose in its shell. The
next step is to detach it, so, with a firm grip and a jerk, shell and
kernel are separated, and pottery is invented. Perhaps, however, the
discovery which led to an intelligent use of the burnt-clay shell, was
made in a slightly different way. Ostrich-eggs and calabashes are not
to be found in every part of the world, but everywhere mankind has
arrived at the art of making baskets out of pliant materials, such as
bark, bast, strips of palm-leaf, supple twigs, etc. Our inventor has no
water-tight vessel provided by nature. “Never mind, let us line the
basket with clay.” This answers the purpose, but alas! the basket gets
burnt over the blazing fire, the woman watches the process of
cooking with increasing uneasiness, fearing a leak, but no leak
appears. The food, done to a turn, is eaten with peculiar relish; and
the cooking-vessel is examined, half in curiosity, half in satisfaction
at the result. The plastic clay is now hard as stone, and at the same
time looks exceedingly well, for the neat plaiting of the burnt basket
is traced all over it in a pretty pattern. Thus, simultaneously with
pottery, its ornamentation was invented.
Primitive woman has another claim to respect. It was the man,
roving abroad, who invented the art of producing fire at will, but the
woman, unable to imitate him in this, has been a Vestal from the
earliest times. Nothing gives so much trouble as the keeping alight of
the smouldering brand, and, above all, when all the men are absent
from the camp. Heavy rain-clouds gather, already the first large
drops are falling, the first gusts of the storm rage over the plain. The
little flame, a greater anxiety to the woman than her own children,
flickers unsteadily in the blast. What is to be done? A sudden thought
occurs to her, and in an instant she has constructed a primitive hut
out of strips of bark, to protect the flame against rain and wind.
This, or something very like it, was the way in which the principle
of the house was discovered; and even the most hardened misogynist
cannot fairly refuse a woman the credit of it. The protection of the
hearth-fire from the weather is the germ from which the human
dwelling was evolved. Men had little, if any share, in this forward
step, and that only at a late stage. Even at the present day, the
plastering of the housewall with clay and the manufacture of pottery
are exclusively the women’s business. These are two very significant
survivals. Our European kitchen-garden, too, is originally a woman’s
invention, and the hoe, the primitive instrument of agriculture, is,
characteristically enough, still used in this department. But the
noblest achievement which we owe to the other sex is unquestionably
the art of cookery. Roasting alone—the oldest process—is one for
which men took the hint (a very obvious one) from nature. It must
have been suggested by the scorched carcase of some animal
overtaken by the destructive forest-fires. But boiling—the process of
improving organic substances by the help of water heated to boiling-
point—is a much later discovery. It is so recent that it has not even
yet penetrated to all parts of the world. The Polynesians understand
how to steam food, that is, to cook it, neatly wrapped in leaves, in a
hole in the earth between hot stones, the air being excluded, and
(sometimes) a few drops of water sprinkled on the stones; but they
do not understand boiling.
To come back from this digression, we find that the slender Nyasa
woman has, after once more carefully examining the finished pot,
put it aside in the shade to dry. On the following day she sends me
word by her son, Salim Matola, who is always on hand, that she is
going to do the burning, and, on coming out of my house, I find her
already hard at work. She has spread on the ground a layer of very
dry sticks, about as thick as one’s thumb, has laid the pot (now of a
yellowish-grey colour) on them, and is piling brushwood round it.
My faithful Pesa mbili, the mnyampara, who has been standing by,
most obligingly, with a lighted stick, now hands it to her. Both of
them, blowing steadily, light the pile on the lee side, and, when the
flame begins to catch, on the weather side also. Soon the whole is in a
blaze, but the dry fuel is quickly consumed and the fire dies down, so
that we see the red-hot vessel rising from the ashes. The woman
turns it continually with a long stick, sometimes one way and
sometimes another, so that it may be evenly heated all over. In
twenty minutes she rolls it out of the ash-heap, takes up the bundle
of spinach, which has been lying for two days in a jar of water, and
sprinkles the red-hot clay with it. The places where the drops fall are
marked by black spots on the uniform reddish-brown surface. With a
sigh of relief, and with visible satisfaction, the woman rises to an
erect position; she is standing just in a line between me and the fire,
from which a cloud of smoke is just rising: I press the ball of my
camera, the shutter clicks—the apotheosis is achieved! Like a
priestess, representative of her inventive sex, the graceful woman
stands: at her feet the hearth-fire she has given us beside her the
invention she has devised for us, in the background the home she has
built for us.
At Newala, also, I have had the manufacture of pottery carried on
in my presence. Technically the process is better than that already
described, for here we find the beginnings of the potter’s wheel,
which does not seem to exist in the plains; at least I have seen
nothing of the sort. The artist, a frightfully stupid Makua woman, did
not make a depression in the ground to receive the pot she was about
to shape, but used instead a large potsherd. Otherwise, she went to
work in much the same way as Salim’s mother, except that she saved
herself the trouble of walking round and round her work by squatting
at her ease and letting the pot and potsherd rotate round her; this is
surely the first step towards a machine. But it does not follow that
the pot was improved by the process. It is true that it was beautifully
rounded and presented a very creditable appearance when finished,
but the numerous large and small vessels which I have seen, and, in
part, collected, in the “less advanced” districts, are no less so. We
moderns imagine that instruments of precision are necessary to
produce excellent results. Go to the prehistoric collections of our
museums and look at the pots, urns and bowls of our ancestors in the
dim ages of the past, and you will at once perceive your error.
MAKING LONGITUDINAL CUT IN
BARK

DRAWING THE BARK OFF THE LOG

REMOVING THE OUTER BARK


BEATING THE BARK

WORKING THE BARK-CLOTH AFTER BEATING, TO MAKE IT


SOFT

MANUFACTURE OF BARK-CLOTH AT NEWALA


To-day, nearly the whole population of German East Africa is
clothed in imported calico. This was not always the case; even now in
some parts of the north dressed skins are still the prevailing wear,
and in the north-western districts—east and north of Lake
Tanganyika—lies a zone where bark-cloth has not yet been
superseded. Probably not many generations have passed since such
bark fabrics and kilts of skins were the only clothing even in the
south. Even to-day, large quantities of this bright-red or drab
material are still to be found; but if we wish to see it, we must look in
the granaries and on the drying stages inside the native huts, where
it serves less ambitious uses as wrappings for those seeds and fruits
which require to be packed with special care. The salt produced at
Masasi, too, is packed for transport to a distance in large sheets of
bark-cloth. Wherever I found it in any degree possible, I studied the
process of making this cloth. The native requisitioned for the
purpose arrived, carrying a log between two and three yards long and
as thick as his thigh, and nothing else except a curiously-shaped
mallet and the usual long, sharp and pointed knife which all men and
boys wear in a belt at their backs without a sheath—horribile dictu!
[51]
Silently he squats down before me, and with two rapid cuts has
drawn a couple of circles round the log some two yards apart, and
slits the bark lengthwise between them with the point of his knife.
With evident care, he then scrapes off the outer rind all round the
log, so that in a quarter of an hour the inner red layer of the bark
shows up brightly-coloured between the two untouched ends. With
some trouble and much caution, he now loosens the bark at one end,
and opens the cylinder. He then stands up, takes hold of the free
edge with both hands, and turning it inside out, slowly but steadily
pulls it off in one piece. Now comes the troublesome work of
scraping all superfluous particles of outer bark from the outside of
the long, narrow piece of material, while the inner side is carefully
scrutinised for defective spots. At last it is ready for beating. Having
signalled to a friend, who immediately places a bowl of water beside
him, the artificer damps his sheet of bark all over, seizes his mallet,
lays one end of the stuff on the smoothest spot of the log, and
hammers away slowly but continuously. “Very simple!” I think to
myself. “Why, I could do that, too!”—but I am forced to change my
opinions a little later on; for the beating is quite an art, if the fabric is
not to be beaten to pieces. To prevent the breaking of the fibres, the
stuff is several times folded across, so as to interpose several
thicknesses between the mallet and the block. At last the required
state is reached, and the fundi seizes the sheet, still folded, by both
ends, and wrings it out, or calls an assistant to take one end while he
holds the other. The cloth produced in this way is not nearly so fine
and uniform in texture as the famous Uganda bark-cloth, but it is
quite soft, and, above all, cheap.
Now, too, I examine the mallet. My craftsman has been using the
simpler but better form of this implement, a conical block of some
hard wood, its base—the striking surface—being scored across and
across with more or less deeply-cut grooves, and the handle stuck
into a hole in the middle. The other and earlier form of mallet is
shaped in the same way, but the head is fastened by an ingenious
network of bark strips into the split bamboo serving as a handle. The
observation so often made, that ancient customs persist longest in
connection with religious ceremonies and in the life of children, here
finds confirmation. As we shall soon see, bark-cloth is still worn
during the unyago,[52] having been prepared with special solemn
ceremonies; and many a mother, if she has no other garment handy,
will still put her little one into a kilt of bark-cloth, which, after all,
looks better, besides being more in keeping with its African
surroundings, than the ridiculous bit of print from Ulaya.
MAKUA WOMEN

You might also like