You are on page 1of 67

Networking Essentials: A CompTIA

Network+ N10-006 Textbook 4th Edition


Beasley
Visit to download the full and correct content document:
https://ebookmass.com/product/networking-essentials-a-comptia-network-n10-006-te
xtbook-4th-edition-beasley/
NETWORKING ESSENTIALS:
FOURTH EDITION
A COMPTIA NETWORK+ N10-006 TEXTBOOK

INSTRUCTOR EDITION

JEFFREY S. BEASLEY AND PIYASAT NILKAEW

Pearson
800 East 96th Street
Indianapolis, Indiana 46240 USA

9780134467160_BOOK.indb i 12/2/15 8:42 AM


NETWORKING ESSENTIALS: FOURTH EDITION ASSOCIATE PUBLISHER
Dave Dusthimer

Copyright © 2016 by Pearson Education, Inc. EXECUTIVE EDITOR


All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, Brett Bartow
or transmitted by any means, electronic, mechanical, photocopying, recording, or other-
wise, without written permission from the publisher. No patent liability is assumed with SENIOR DEVELOPMENT EDITOR
respect to the use of the information contained herein. Although every precaution has been Chris Cleveland
taken in the preparation of this book, the publisher and author assume no responsibility for
errors or omissions. Nor is any liability assumed for damages resulting from the use of the MANAGING EDITOR
information contained herein. Sandra Schroeder
Networking Essentials, Fourth Edition
PROJECT EDITOR
ISBN-13: 978-0-7897-5819-4 Mandie Frank
ISBN-10: 0-7897-5819-9
COPY EDITOR
Instructor’s Guide for Networking Essentials, Fourth Edition
Bart Reed
ISBN-13: 978-0-13-446716-0
ISBN-10: 0-13-446716-7 INDEXER
Ken Johnson
Library of Congress Control Number: 2015955285
Printed in the United States of America PROOFREADER
Jess DeGabriele
First Printing: December 2015
TECHNICAL EDITORS
Trademarks Anthony Sequeria
All terms mentioned in this book that are known to be trademarks or service marks have Dr. Kenneth L Hawkins
been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of
Douglas E. Maume
this information. Use of a term in this book should not be regarded as affecting the validity
of any trademark or service mark.
PEER REVIEWERS
DeAnnia Clements
Warning and Disclaimer
Osman GuzideGene Carwile
Every effort has been made to make this book as complete and as accurate as possible, but
no warranty or fitness is implied. The information provided is on an “as is” basis. The au- Dr. Theodor Richardson
thors and the publisher shall have neither liability nor responsibility to any person or entity
with respect to any loss or damages arising from the information contained in this book or PUBLISHING COORDINATOR
from the use of the CD or programs accompanying it. Vanessa Evans

DESIGNERS
Special Sales
Mark Shirar
For information about buying this title in bulk quantities, or for special sales opportunities Alan Clements
(which may include electronic versions; custom cover designs; and content particular to
your business, training goals, marketing focus, or branding interests), please contact our COMPOSITOR
corporate sales department at corpsales@pearsoned.com or (800) 382-3419. Tricia Bronkella
For government sales inquiries, please contact governmentsales@pearsoned.com.
For questions about sales outside the U.S., please contact international@pearsoned.com.

ii

9780134467160_BOOK.indb ii 12/2/15 8:42 AM


CONTENTS AT A GLANCE
Introduction xxi
1 Introduction to Computer Networks 2
2 Physical Layer Cabling: Twisted Pair 64
3 Physical Layer Cabling: Fiber Optics 126
4 Wireless Networking 168
5 Interconnecting the LANs 218
6 TCP/IP 262
7 Introduction to Router Configuration 318
8 Introduction to Switch Configuration 362
9 Routing Protocols 398
10 Internet Technologies: Out to the Internet 462
11 Troubleshooting 514
12 Network Security 552
13 Cloud Computing and Virtualization 602
14 Codes and Standards 624
Glossary 646
Index 662

iii

9780134467160_BOOK.indb iii 12/2/15 8:42 AM


TABLE OF CONTENTS
Introduction xxi

CHAPTER 1 Introduction to Computer Networks 2


Chapter Outline 3
Objectives 3
Key Terms 3
1-1 Introduction 5
1-2 Network Topologies 7
Section 1-2 Review 12
Test Your Knowledge 12
1-3 The OSI Model 13
Section 1-3 Review 15
Test Your Knowledge 16
1-4 The Ethernet LAN 17
IP Addressing 21
Section 1-4 Review 23
Test Your Knowledge 23
1-5 Home Networking 24
Securing the Home Network 35
IP Addressing in the Home Network 36
Section 1-5 Review 38
Test Your Knowledge 39
1-6 Assembling An Office LAN 40
Section 1-6 Review 45
Test Your Knowledge 46
1-7 Testing and Troubleshooting a LAN 47
Section 1-7 Review 50
Test Your Knowledge 50
Summary 51
Questions and Problems 51
Certification Questions 60

iv CONTENTS

9780134467160_BOOK.indb iv 12/2/15 8:42 AM


CHAPTER 2 Physical Layer Cabling: Twisted Pair 64
Chapter Outline 65
Objectives 65
Key Terms 65
2-1 Introduction 67
2-2 Structured Cabling 68
Horizontal Cabling 72
Section 2-2 Review 74
Test Your Knowledge 75
2-3 Unshielded Twisted-Pair Cable 76
Shielded Twisted-Pair Cable 78
Section 2-3 Review 79
Test Your Knowledge 79
2-4 Terminating CAT6/5E/5 UTP Cables 80
Computer Communication 82
Straight-through and Crossover Patch Cables 84
Section 2-4 Review 92
Test Your Knowledge 93
2-5 Cable Testing and Certification 94
Section 2-5 Review 98
Test Your Knowledge 98
2-6 10 Gigabit Ethernet over Copper 98
Overview 99
Alien Crosstalk 100
Signal Transmission 101
Section 2-6 Review 102
Test Your Knowledge 102
2-7 Troubleshooting Cabling Systems 103
Installation 103
Cable Stretching 104
Cable Failing to Meet Manufacturer Specifications 104
CAT5e Cable Test Examples 105
Section 2-7 Review 111
Test Your Knowledge 111
Summary 113
Questions and Problems 113
Certification Questions 122

CONTENTS v

9780134467160_BOOK.indb v 12/2/15 8:42 AM


CHAPTER 3 Physical Layer Cabling: Fiber Optics 126
Chapter Outline 127
Objectives 127
Key Terms 127
3-1 Introduction 128
3-2 The Nature of Light 131
Graded-Index Fiber 135
Single-Mode Fibers 135
Section 3-2 Review 137
Test Your Knowledge 137
3-3 Fiber Attenuation and Dispersion 137
Attenuation 138
Dispersion 139
Dispersion Compensation 140
Section 3-3 Review 141
Test Your Knowledge 141
3-4 Optical Components 142
Intermediate Components 144
Detectors 144
Fiber Connectorization 146
Section 3-4 Review 147
Test Your Knowledge 148
3-5 Optical Networking 148
Defining Optical Networking 149
Building Distribution 151
Campus Distribution 154
Section 3-5 Review 157
Test Your Knowledge 158
3-6 Safety 159
Section 3-6 Review 160
Test Your Knowledge 160
Summary 161
Questions and Problems 161
Certification Questions 164

vi CONTENTS

9780134467160_BOOK.indb vi 12/2/15 8:42 AM


CHAPTER 4 Wireless Networking 168
Chapter Outline 169
Objectives 169
Key Terms 169
4-1 Introduction 170
4-2 The IEEE 802.11 Wireless LAN Standard 171
Section 4-2 Review 179
Test Your Knowledge 179
4-3 802.11 Wireless Networking 180
Section 4-3 Review 189
Test Your Knowledge 190
4-4 Bluetooth, WiMAX, RFID, and Mobile Communications 190
Bluetooth 190
WiMAX 193
Radio Frequency Identification 194
Section 4-4 Review 198
Test Your Knowledge 199
4-5 Securing Wireless LANS 199
Section 4-5 Review 202
Test Your Knowledge 203
4-6 Configuring a Point-to-Multipoint Wireless LAN: A Case Study 203
1. Antenna Site Survey 204
2. Establishing a Point-to-Point Wireless Link to the Home Network 204
3–4. Configuring the Multipoint Distribution/Conducting an RF Site Survey 206
5. Configuring the Remote Installations 208
Section 4-6 Review 208
Test Your Knowledge 209
Summary 210
Questions and Problems 210
Critical Thinking 215
Certification Questions 216

CHAPTER 5 Interconnecting the LANs 218


Chapter Outline 219
Objectives 219
Key Terms 219
5-1 Introduction 220

CONTENTS vii

9780134467160_BOOK.indb vii 12/2/15 8:42 AM


5-2 The Network Bridge 221
Section 5-2 Review 226
Test Your Knowledge 227
5-3 The Network Switch 228
Hub–Switch Comparison 230
Managed Switches 233
Multilayer Switches 238
Section 5-3 Review 238
Test Your Knowledge 239
5-4 The Router 239
The Router Interface: Cisco 2800 Series 240
The Router Interface—Cisco 2600 Series 241
Section 5-4 Review 244
Test Your Knowledge 244
5-5 Interconnecting LANs with the Router 245
Gateway Address 247
Network Segments 247
Section 5-5 Review 248
Test Your Knowledge 248
5-6 Configuring the Network Interface—Auto-Negotiation 248
Auto-Negotiation Steps 249
Full-Duplex/Half-Duplex 250
Section 5-6 Review 252
Test Your Knowledge 252
Summary 253
Questions and Problems 253
Critical Thinking 258
Certification Questions 259

CHAPTER 6 TCP/IP 262


Chapter Outline 263
Objectives 263
Key Terms 263
6-1 Introduction 264
6-2 The TCP/IP Layers 265
The Application Layer 266
The Transport Layer 268
The Internet Layer 272
The Network Interface Layer 274

viii CONTENTS

9780134467160_BOOK.indb viii 12/2/15 8:42 AM


Section 6-2 Review 275
Test Your Knowledge 276
6-3 Number Conversion 276
Binary-to-Decimal Conversion 276
Decimal-to-Binary Conversion 278
Hexadecimal Numbers 280
Section 6-3 Review 283
Test Your Knowledge 283
6-4 IPv4 Addressing 283
Section 6-4 Review 287
Test Your Knowledge 287
6-5 Subnet Masks 288
Section 6-5 Review 295
Test Your Knowledge 295
6-6 CIDR Blocks 296
Section 6-6 Review 299
Test Your Knowledge 299
6-7 IPv6 Addressing 299
Section 6-7 Review 303
Test Your Knowledge 303
Summary 304
Questions and Problems 304
Critical Thinking 313
Certification Questions 314

CHAPTER 7 Introduction to Router Configuration 318


Chapter Outline 319
Objectives 319
Key Terms 319
7-1 Introduction 320
7-2 Router Fundamentals 321
Layer 3 Networks 323
Section 7-2 Review 328
Test Your Knowledge 329
7-3 The Console Port Connection 329
Configuring the HyperTerminal Software (Windows) 331
Configuring the Z-Term Serial Communications Software (Mac) 333
Section 7-3 Review 335
Test Your Knowledge 335

CONTENTS ix

9780134467160_BOOK.indb ix 12/2/15 8:42 AM


7-4 The Router’s User EXEC Mode (Router>) 336
The User EXEC Mode 336
Router Configuration Challenge: The User EXEC Mode 339
Section 7-4 Review 342
Test Your Knowledge 342
7-5 The Router’s Privileged EXEC Mode (Router#) 342
Hostname 344
Enable Secret 344
Setting the Line Console Passwords 345
Fast Ethernet Interface Configuration 346
Serial Interface Configuration 347
Router Configuration Challenge: The Privileged EXEC Mode 349
Section 7-5 Review 351
Test Your Knowledge 351
Summary 352
Questions and Problems 352
Critical Thinking 357
Certification Questions 359

CHAPTER 8 Introduction to Switch Configuration 362


Chapter Outline 363
Objectives 363
Key Terms 363
8-1 Introduction 364
8-2 Introduction to VLANs 365
Virtual LAN 366
Section 8-2 Review 367
Test Your Knowledge 367
8-3 Introduction to Switch Configuration 368
Hostname 368
Enable Secret 369
Setting the Line Console Passwords 369
Static VLAN Configuration 371
Networking Challenge—Switch Configuration 375
Section 8-3 Review 376
Test Your Knowledge 376
8-4 Spanning-Tree Protocol 377
Section 8-4 Review 379
Test Your Knowledge 379

x CONTENTS

9780134467160_BOOK.indb x 12/2/15 8:42 AM


8-5 Network Management 380
Section 8-5 Review 383
Test Your Knowledge 384
8-6 Power Over Ethernet 385
Section 8-6 Review 387
Test Your Knowledge 387
Summary 389
Questions and Problems 389
Critical Thinking 394
Certification Questions 395

CHAPTER 9 Routing Protocols 398


Chapter Outline 399
Objectives 399
Key Terms 399
9-1 Introduction 400
9-2 Static Routing 401
Gateway of Last Resort 408
Configuring Static Routes 408
Networking Challenge: Chapter 9—Static Routes 411
Section 9-2 Review 412
Test Your Knowledge 412
9-3 Dynamic Routing Protocols 413
Section 9-3 Review 414
Test Your Knowledge 415
9-4 Distance Vector Protocols 415
Section 9-4 Review 417
Test Your Knowledge 417
9-5 Configuring RIP and RIPv2 418
Configuring Routes with RIP 420
Configuring Routes with RIP Version 2 425
Networking Challenge—RIP V2 426
Section 9-5 Review 427
Test Your Knowledge 428
9-6 Link State Protocols 428
Section 9-6 Review 431
Test Your Knowledge 431

CONTENTS xi

9780134467160_BOOK.indb xi 12/2/15 8:42 AM


9-7 Configuring the Open Shortest Path First (OSPF) Routing Protocol 432
Networking Challenge: OSPF 437
Section 9-7 Review 437
Test Your Knowledge 438
9-8 Hybrid Protocols: Configuring the Enhanced Interior Gateway Routing Protocol (EIGRP) 438
Configuring Routes with EIGRP 439
Networking Challenge—EIGRP 443
Section 9-8 Review 444
Test Your Knowledge 445
Summary 446
Questions and Problems 446
Critical Thinking 459
Certification Questions 459

CHAPTER 10 Internet Technologies: Out to the Internet 462


Chapter Outline 463
Objectives 463
Key Terms 463
10-1 Introduction 465
10-2 The Line Connection 467
Data Channels 468
Point of Presence 470
Section 10-2 Review 472
Test Your Knowledge 472
10-3 Remote Access 473
Analog Modem Technologies 473
Cable Modems 474
xDSL Modems 474
The Remote Access Server 477
Section 10-3 Review 479
Test Your Knowledge 480
10-4 Metro Ethernet/Carrier Ethernet 480
Ethernet Service Types 482
Service Attributes 483
Section 10-4 Review 484
Test Your Knowledge 484
10-5 Network Services—DHCP and DNS 485
The DHCP Data Packets 487
DHCP Deployment 488

xii CONTENTS

9780134467160_BOOK.indb xii 12/2/15 8:42 AM


Network Services: DNS 489
Internet Domain Name 490
Section 10-5 Review 495
Test Your Knowledge 496
10-6 Internet Routing—BGP 496
Section 10-6 Review 499
Test Your Knowledge 499
10-7 Analyzing Internet Data Traffic 500
Utilization/Errors Strip Chart 501
Network Layer Matrix 501
Network Layer Host Table 502
Frame Size Distribution 502
Section 10-7 Review 503
Test Your Knowledge 504
Summary 505
Questions and Problems 505
Certification Questions 511

CHAPTER 11 Troubleshooting 514


Chapter Outline 515
Objectives 515
Key Terms 515
11-1 Introduction 516
11-2 Analyzing Computer Networks 517
Using Wireshark to Inspect Data Packets 518
Using Wireshark to Capture Packets 521
Section 11-2 Review 522
Test Your Knowledge 523
11-3 Analyzing Computer Networks—FTP Data Packets 523
Section 11-3 Review 524
Test Your Knowledge 524
11-4 Analyzing Campus Network Data Traffic 525
Section 11-4 Review 527
Test Your Knowledge 528
11-5 Troubleshooting the Router Interface 528
Section 11-5 Review 533
Test Your Knowledge 533

CONTENTS xiii

9780134467160_BOOK.indb xiii 12/2/15 8:42 AM


11-6 Troubleshooting the Switch Interface 533
Section 11-6 Review 537
Test Your Knowledge 537
11-7 Troubleshooting Fiber Optics—The OTDR 538
Section 11-7 Review 540
Test Your Knowledge 540
11-8 Troubleshooting Wireless Networks 540
Section 11-8 Review 542
Test Your Knowledge 543
Summary 544
Questions and Problems 544
Certification Questions 549

CHAPTER 12 Network Security 552


Chapter Outline 553
Objectives 553
Key Terms 553
12-1 Introduction 554
12-2 Intrusion (How an Attacker Gains Control of a Network) 556
Social Engineering 556
Section 12-2 Review 563
Test Your Knowledge 564
12-3 Denial of Service 564
Section 12-3 Review 566
Test Your Knowledge 567
12-4 Security Software and Hardware 567
Section 12-4 Review 578
Test Your Knowledge 579
12-5 Introduction to Virtual Private Network 579
Section 12-5 Review 588
Test Your Knowledge 589
12-6 Wireless Security 590
Section 12-6 Review 593
Test Your Knowledge 593
Summary 594
Questions and Problems 594
Critical Thinking 598
Certification Questions 599

xiv CONTENTS

9780134467160_BOOK.indb xiv 12/2/15 8:42 AM


CHAPTER 13 Cloud Computing and Virtualization 602
Chapter Outline 603
Objectives 603
Key Terms 603
13-1 Introduction 604
13-2 Virtualization 604
Setting Up Virtualization on Windows 8/10 607
Section 13-2 Review 616
Test Your Knowledge 616
13-3 Cloud Computing 616
Infrastructure as a Service (IaaS) 618
Platform as a Service (PaaS) 619
Software as a Service (SaaS) 619
Section 13-3 Review 619
Test Your Knowledge 619
Summary 620
Questions and Problems 620
Certification Questions 622

CHAPTER 14 Codes and Standards 624


Chapter Outline 625
Objectives 625
Key Terms 625
14-1 Introduction 626
14-2 Safety Standards and Codes 626
Design and Construction Requirements for Exit Routes (29 CFR 1910.36) 627
Maintenance, Safeguards, and Operational Features for Exit Routes (29 CFR 1910.37) 628
Emergency Action Plans (29 CFR 1910.38) 628
Fire Prevention Plans (29 CFR 1910.39) 629
Portable Fire Extinguishers (29 CFR 1910.157) 629
Fixed Extinguishing Systems (29 CFR 1910.160) 630
Fire Detection Systems (29 CFR 1910.164) 631
Employee Alarm Systems (29 CFR 1910.165) 632
Hazard Communication (29 CFR 1910.1200) 633
HVAC Systems 633
Door Access 633
Section 14-2 Review 634
Test Your Knowledge 634

CONTENTS xv

9780134467160_BOOK.indb xv 12/2/15 8:42 AM


14-3 Industry Regulatory Compliance 634
FERPA 635
FISMA 635
GLBA 635
HIPAA 635
PCI DSS 636
Section 14-3 Review 637
Test Your Knowledge 638
14-4 Business Policies and Procedures 638
Memorandum of Understanding 638
Service Level Agreement 639
Master Service Agreement 639
Statement of Work 639
Acceptable Use Policy 640
Section 14-4 Review 640
Test Your Knowledge 640
Summary 641
Questions and Problems 641
Certification Questions 644

Glossary 646

Index 662

xvi CONTENTS

9780134467160_BOOK.indb xvi 12/2/15 8:42 AM


ABOUT THE AUTHORS
Jeffrey S. Beasley is a professor in the Information and Communications Technology program at New Mexico
State University, where he teaches computer networking and many related topics. He is the author of Networking,
Second Edition, as well as coauthor of Modern Electronic Communication, Ninth Edition, Networking Essentials
3e, and A Practical Guide to Advance Networking.
Piyasat Nilkaew is the director of Telecommunications and Networking at New Mexico State University, with
more than 15 years of experience in network management and consulting. He has extensive expertise in deploy-
ing and integrating multiprotocol and multivendor data, voice, and video network solutions. He is coauthor of
Networking Essentials 3e and A Practical Guide to Advance Networking.

ABOUT THE AUTHOR xvii

9780134467160_BOOK.indb xvii 12/2/15 8:42 AM


DEDICATIONS
This book is dedicated to my family: Kim, Damon, and Dana. —Jeff Beasley

This book is dedicated to my family: June, Ariya, and Atisat. —Piyasat Nilkaew

ACKNOWLEDGMENTS
I am grateful to the many people who have helped with this text. My sincere thanks go to the following technical
consultants:
• Danny Bosch and Matthew Peralta for sharing their expertise with optical networks and unshielded twisted-
pair cabling, Don Yates for his help with the initial Net-Challenge software, and Abel Sanchez for his assis-
tance the newest version of Net-Challenge.
I would also like to thank my many past and present students for their help with this book.
• Kathryn Sager and Joshua Cook for their work on the Net-Challenge software; Adam Segura for his help
with taking pictures of the steps for CAT6 termination; Marc Montez, Carine George-Morris, Brian Morales,
Michael Thomas, Jacob Ulibarri, Scott Leppelman, and Aarin Buskirk for their help with laboratory develop-
ment; and Josiah Jones and Raul Marquez Jr. for their help with the Wireshark material.
• Aaron Shapiro and Aaron Jackson for their help in testing the many network connections presented in the text.
• Paul Bueno and Anthony Bueno for reading through the early draft of the text.

Your efforts are greatly appreciated.


We appreciate the excellent feedback of the following reviewers: Phillip Davis, DelMar College, TX; Thomas D.
Edwards, Carteret Community College, NC; William Hessmiller, Editors & Training Associates; Bill Liu, DeVry
University, CA; and Timothy Staley, DeVry University, TX.
Our thanks to the people at Pearson for making this project possible: Dave Dusthimer, for providing us with the
opportunity to work on the fourth edition of this text, and Vanessa Evans, for helping make this process enjoy-
able. Thanks to Christopher Cleveland, and the all the people at Pearson IT Certification, and also to the many
technical editors for their help with editing the manuscript.
Special thanks to our families for their continued support and patience.
—Jeffrey S. Beasley and Piyasat Nilkaew

xviii ACKNOWLEDGMENTS

9780134467160_BOOK.indb xviii 12/2/15 8:42 AM


ABOUT THE TECHNICAL REVIEWERS
Anthony Sequeria began his IT career in 1994 with IBM in Tampa, Florida. He quickly formed his own com-
puter consultancy, Computer Solutions, and then discovered his true passion—teaching and writing about
Microsoft and Cisco technologies. Anthony has lectured to massive audiences around the world while working
for Mastering Computers. Anthony has never been happier in his career than he is now as a full-time trainer for
CBT Nuggets. He is an avid tennis player, a private pilot, and a semi-professional poker player, and he enjoys
getting beaten up by women and children at the martial arts school he attends with his daughter.
Dr. Kenneth L. Hawkins is the Program Director of Information Technology at the Hampton campus of Bryant
and Stratton College. He earned his doctorate in Education from Nova Southeastern University, a master’s degree
in Computer Science from Boston University, a master’s degree in Education from Old Dominion University, a
master’s degree in Management from Troy State University, and his undergraduate degree in Mathematics from
Michigan Technological University. Dr. Hawkins, a retired military officer, has worked in post-secondary educa-
tion for the past 14 years as department head, campus dean, and faculty for undergraduate and graduate business
and information technology courses at six Tidewater universities. A graduate of the Leadership Institute of the
Virginia Peninsula, he is actively involved both professionally and socially in the community, having served as
district chairman for the Boy Scouts of America, educational administration consultant for a local private school,
board member of two area businesses, member of the international professional society Phi Gamma Sigma, and
member of the Old Point Comfort Yacht Club.
Douglas E. Maume is currently the Lead Instructor for the Computer Networking program at Centura College
Online. He has been conducting new and annual course reviews for both the CN and IT programs since 2006.
He is also an adjunct professor for Centura College, teaching Computer Networking, Information Technology,
and Business Management courses since 2001. Mr. Maume owned his own business called Wish You Were Here,
Personal Postcards, creating digital postcards on location at the Virginia Beach oceanfront. He earned a Bach-
elor’s degree in Graphic Design from Old Dominion University, and an Associate’s in Applied Science degree
in Graphic Design from Tidewater Community College. Mr. Maume is currently Esquire to the District Deputy
Grand Exalted Ruler for Southeast Virginia in the Benevolent and Protective Order of Elks. He has been actively
involved with the Elks since 1999, serving the veterans and youth of the Norfolk community. He is also the Reg-
istrar for the adult men’s league Shipps Corner Soccer Club, and has been playing competitively since 1972.

ABOUT THE TECHNICAL REVIEWERS xix

9780134467160_BOOK.indb xix 12/2/15 8:42 AM


WE WANT TO HEAR FROM YOU!
As the reader of this book, you are our most important critic and commentator. We value your opinion and want
to know what we’re doing right, what we could do better, what areas you’d like to see us publish in, and any other
words of wisdom you’re willing to pass our way.
We welcome your comments. You can email or write to let us know what you did or didn’t like about this book—
as well as what we can do to make our books better.
Please note that we cannot help you with technical problems related to the topic of this book.
When you write, please be sure to include this book’s title and author as well as your name and email address. We
will carefully review your comments and share them with the author and editors who worked on the book.
Email: feedback@pearsonitcertification.com
Mail: Pearson IT Certification
ATTN: Reader Feedback
800 East 96th Street
Indianapolis, IN 46240 USA

READER SERVICES
Register your copy of Networking Essentials at www.pearsonitcertification.com for convenient access to
downloads, updates, and corrections as they become available. To start the registration process, go to www.
pearsonitcertification.com/register and log in or create an account*. Enter the product ISBN, 9780789758194, and
click Submit. Once the process is complete, you will find any available bonus content under Registered Products.
*Be sure to check the box that you would like to hear from us in order to receive exclusive discounts on future
editions of this product.

xx READER SERVICES

9780134467160_BOOK.indb xx 12/2/15 8:42 AM


INTRODUCTION
This book provides a look at computer networking from the point of view of the network administrator. It guides
readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router
configuration; TCP/IP networks; routing protocols; local, campus, and wide area network configuration; network
security; wireless networking; optical networks; Voice over IP; the network server; and Linux networking. After
covering the entire text, readers will have gained a solid knowledge base in computer networks.
In our years of teaching, we have observed that technology students prefer to learn “how to swim” after they have
gotten wet and taken in a little water. Then they are ready for more challenges. Show the students the technology,
how it is used, and why, and they will take the applications of the technology to the next level. Allowing them to
experiment with the technology helps them to develop a greater understanding. This book does just that.

ORGANIZATION OF THE TEXT


Thoroughly updated to reflect the latest version of CompTIA’s Network+ exam, Networking Essentials, 4th
Edition, is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of
a working network administrator, it requires absolutely no experience with either network concepts or day-to-day
network management. This first volume has been revised and reorganized around the needs of introductory net-
working students, and assumes no previous knowledge. Throughout the text, the students will gain an apprecia-
tion of how basic computer networks and related hardware are interconnected to form a network. This involves
understanding the concepts of twisted-pair cable, fiber optics, interconnecting LANs, configuring TCP/IP, subnet
masking, basic router configuration, switch configuration and management, wireless networking, and network
security.

INTRODUCTION xxi

9780134467160_BOOK.indb xxi 12/2/15 8:42 AM


Key Pedagogical Features
• Chapter Outline, Network+ Objectives, Key Terms, and Introduction at the beginning of each chapter clearly
outline specific goals for the reader. An example of these features is shown in Figure P-1.

Introduction: Chapter openers


Chapter Outline Chapter Objectives clearly outline specific goals

Chapter Outline The main objective of this chapter is to introduce the use of the Cisco IOS
(Internetwork Operating System) software for configuring routers. Cisco IOS
7-1 Introduction 7-5 The Router’s Privileged EXEC Mode is the operating software used to configure all Cisco routers. It includes a
7-2 Router Fundamentals (Router#)
command line interface (CLI) for inputting instructions to configure the
7-3 The Console Port Connection Summary Cisco router interface. There are many choices for routers in the market;
7-4 The Router’s User EXEC Mode Questions and Problems however, Cisco routers have set the standard. Also, Cisco certifications such
(Router>) as the Cisco Certified Network Associate (CCNA); the Cisco Certified Network
Professional (CCNP); and the professional benchmark for internetworking
Objectives expertise, the Cisco Certified Internetwork Expert (CCIE), base their testing
on the applicant’s ability to configure, troubleshoot, and analyze local area
• Describe the purpose of a router • Define the functional difference with the networks (LANs) that incorporate Cisco routers and switches.
• Describe the purpose of a gateway router’s user and privileged EXEC modes

• Describe the steps (software and hardware) • Be able to enter basic router configuration
for connecting to a router’s console port modes

• Describe the Cisco IOS command structure • Demonstrate that you can enable and disable 7-1 INTRODUCTION
certain router interfaces
• Define the function of the command-line An introduction to routers is presented in this chapter. The chapter first presents
• Describe what information is contained in Cisco IOS a review of router fundamentals, followed by an introduction to the hardware and
interface
the running-configuration file Cisco Internet Operating software needed to establish a router console connection. The concepts for access-
System, the operating
ing the router’s user and privileged modes are examined in section 7.5. Section 7.5
software used in all Cisco
includes a Networking Challenge using the software that comes with the Net-
Key Terms routers
Challenge CDROM. The instructor will be able to test the students’ knowledge of
Cisco IOS RS-232 privileged mode Command Line router configuration using this software.
Interface (CLI)
command line interface DB-9 enable An overview of router fundamentals is presented in section 7-2. Some of the router
The interface type used
(CLI) DB-25 Router# concepts and terminology presented in Chapter 4, “Wireless Networking,” are reex-
for inputting commands
CCNA console cable configure terminal (conf t) and configuring devices amined, in particular the following:
CCNP COM1, COM2, ... Router(config)# such as routers
• The concepts of interconnecting LANs with routers
CCIE rollover cable Router(config-line)# CCNA • The concept of a network segment
broadcast domain hostname Router(config-if)# Cisco Certified Network
flat network Associate • Data flow through a routed network
user EXEC mode no shutdown (no shut)
routed network user mode show ip interface brief CCNP
The procedure for configuring a router through the router’s console port is pre-
layer 3 network ? (sh ip int brief) Cisco Certified Network
sented in section 7-3. The discussion includes an overview of configuring a com-
default gateway address show flash DCE Professional
puter’s serial communication software and selecting the proper cable and hardware
next hop address show version DTE CCIE for connecting the console port to a computer. Sections 7-4 and 7-5 introduce the
subnet, NET router uptime Cisco Certified steps for accessing and programming the router interface. The user EXEC mode
Internetwork Expert is examined in section 7-4, and the privileged EXEC mode in section 7-5. These
sections teach the student how to work with the Cisco IOS command structure and
how to access many of the configuration layers in the Cisco IOS. Sections 7-4 and
7-5 also include networking challenges using the Net-Challenge software included
with the accompanying companion CD-ROM. These challenges enable students to
test their ability to access and program a router’s interface. The simulator software
was developed specifically for this text and emulates programming the interface
of a Cisco router. The console port connection is emulated with the software, and
although the simulator doesn’t emulate all the router programming modes or opera-
tional features, it does emulate the functions presented in the text.

319 320 CHAPTER 7: INTRODUCTION TO ROUTER CONFIGURATION

Key Terms for this Chapter

FIGURE P-1

xxii INTRODUCTION

9780134467160_BOOK.indb xxii 12/2/15 8:42 AM


• Net-Challenge Software provides a simulated, hands-on experience in configuring routers and switches.
Exercises provided in the text (see Figure P-2) and on the CD-ROM challenge readers to undertake certain
router/network configuration tasks. The challenges check the students’ ability to enter basic networking com-
mands and to set up router functions, such as configuring the interface (Ethernet and Serial) and routing pro-
tocols (that is, RIP and static). The software has the look and feel of actually being connected to the router’s
console port.

Net-Challenge exercises are found Exercises challenge readers


throughout the text where applicable to undertake certain tasks

The status of the serial interfaces can be checked using the sh ip int brief command Connection to each router is provided by clicking one of the three router buttons
as demonstrated here: shown previously in Figure 7-17. An arrow is pointing to the buttons used to es-
Router# sh ip int brief tablish a console connection. Clicking a button connects the selected router to a
Interface IP-Address OK? Method Status Protocol terminal console session, enabling the simulated console terminal access to all three
FastEthernet0 10.10.20.250 YES manual up up routers. The routers are marked with their default hostnames of Router A, Router
FastEthernet1 10.10.200.1 YES manual up up B, and Router C. This challenge tests your ability to use router commands in the
FastEthernet2 10.10.100.1 YES manual up up privileged EXEC mode, also called the enable mode. Click the Net-ChallengeV4.
Serial0 10.10.128.1 YES manual up up exe file to start the software. Next, click the Select Challenge button to open a list
Serial1 10.10.64.1 YES manual up up of challenges available with the software. Select the Chapter 7 - Privileged EXEC
Mode challenge to open a check box screen. Each challenge will be checked when
the task has been successfully completed:
Router Configuration Challenge: The Privileged EXEC Mode
1. Make sure you are connected to Router A by clicking the appropriate selection
Use the Net-Challenge software included with the companion CD-ROM to com-
button.
plete this exercise. Place the CD-ROM in your computer’s drive. The software is
located in the NetChallenge folder on the CD-ROM. Open the folder and click the 2. Demonstrate that you can enter the router’s privileged EXEC mode. The router
Net-ChallengeV4.exe file. The program will open on your desktop with the screen screen should display Router#. The password is Chile.
shown previously in Figure 7-15. The Net-Challenge software is based on a three-
3. Place the router in the terminal configuration mode [Router(config)#].
router campus network setting. The topology for the network can be viewed by
clicking the View Topology button. The network topology used in the software is 4. Use the hostname command to change the router hostname to RouterA.
shown in Figure 7-20. The software allows the user to configure each of the three
5. Set the enable secret for the router to Chile.
routers and to configure the network interface for computers in the LANs attached
to each router. Clicking one of the router symbols in the topology will enable you to 6. Set the vty password to ConCarne.
view the IP address for the router required for the configuration.
7. Configure the three FastEthernet interfaces on RouterA as follows:
FastEthernet0/0 (fa0/0) 10.10.20.250 255.255.255.0
FastEthernet0/1 (fa0/1) 10.10.200.1 255.255.255.0
FastEthernet0/2 (fa0/2) 10.10.100.1 255.255.255.0

8. Enable each of the router FastEthernet interfaces using the no shut command.
9. Use the sh ip interface brief (sh ip int brief) command to verify that the
interfaces have been configured and are functioning. For this challenge, the
interfaces on Router B and Router C have already been configured.
10. Configure the serial interfaces on the router. Serial interface 0/0 is the DCE.
The clock rate should be set to 56000. (use clock rate 56000) The IP addresses
and subnet masks are as follows:
Serial 0/0 10.10.128.1 255.255.255.0
Serial 0/1 10.10.64.1 255.255.255.0

11. Use the sh ip int brief command to verify that the serial interfaces are properly
configured. For this challenge, the interfaces on Router B and Router C have
already been configured.
12. Use the ping command to verify that you have a network connection for the
following interfaces:

RouterA FA0/1 (10.10.200.1) to RouterB FA0/2 (10.10.200.2)


FIGURE 7-20 The network topology for Net-Challenge. The arrows indicate where to click RouterA FA0/2 (10.10.100.1) to RouterC FA0/2 (10.10.100.2)
to display the router IP address configurations.

7-5: THE ROUTER’S PRIVILEGED EXEC MODE (ROUTER#) 349 350 CHAPTER 7: INTRODUCTION TO ROUTER CONFIGURATION

FIGURE P-2

INTRODUCTION xxiii

9780134467160_BOOK.indb xxiii 12/2/15 8:42 AM


• The textbook features and introduces how to use the Wireshark Network Protocol Analyzer. Examples of us-
ing the software to analyze data traffic are included throughout the text. Numerous worked-out examples are
included in every chapter to reinforce key concepts and aid in subject mastery, as shown in Figure P-3.

Examples using the Wireshark


protocol analyzer are included
throughout the text where applicable

FIGURE 11-4 The echo reply from computer 2.

Using Wireshark to Capture Packets


The first exercise with the Wireshark software demonstrated how to use the proto-
col analyzer to inspect captured packets. In most cases, the user will want to cap-
ture data packets from her own network. The following steps describe how to use
the software to capture packets.
1. In Windows, click Start > Programs > Wireshark > and select Wireshark to
start the program.
2. To capture packets on an operating network, you first need to select the in-
terfaces in which you would like to obtain the capture (see Figure 11-5). You
can do this by going to Capture > Interfaces. After selecting your interfaces,
click Start to start capturing as shown in Figure 11-6. You can also get to the
interface list by clicking on Interface List from the Wireshark home screen.
3. To examine the packets, stop the simulation by clicking Capture > Stop. Re-
member, there must be some activity on your network for packets to be trans-
ferred. You might see little traffic activity if your network is in the lab and there
is limited network activity. You can always use the ping command to generate
some network data activity if needed.

To open a saved capture file, click File > Open or click Open from the Wireshark
home screen.
To change capture options, click Capture > Options to change the options to your
preferred settings.

11-2: ANALYZING COMPUTER NETWORKS 521

FIGURE P-3

xxiv INTRODUCTION

9780134467160_BOOK.indb xxiv 12/2/15 8:42 AM


• Key Terms and their definitions are highlighted in the margins to foster inquisitiveness and ensure retention.
Illustrations and photos are used throughout to aid in understanding the concepts discussed. This is illustrated
in Figure P-4.

Key terms are


highlighted in the
text and defined
in the margin

If data is being sent from PC-A to PC-D, the data is first sent to the access point
and then relayed to PC-D. Data sent from a wireless client to a client in the wired
LAN also passes through the access point. The users (clients) in the wireless LAN
can communicate with other members of the network as long as a link is estab-
lished with the access point. For example, data traffic from PC-A to PC-E will first
pass through the access point and then to PC-E in the wired LAN.
The problem with the Basic Service Set is that mobile users can travel outside the
Extended Service Set radio range of a station’s wireless link with one access point. One solution is to add
(ESS) multiple access points to the network. Multiple access points extend the range of
The use of multiple mobility of a wireless client in the LAN. This arrangement is called an Extended
access points to extend
Service Set (ESS). An example is provided in Figure 4-3. The mobile computer will
user mobility
establish an authorized connection with the access point that has the strongest sig-
Hand-off nal level (for example, AP-1). As the user moves, the signal strength of the signal
When the user’s from AP-1 will decrease. At some point, the signal strength from AP-2 will exceed
computer establishes an AP-1, and the wireless bridge will establish a new connection with AP-2. This is
association with another called a hand-off. This is an automatic process for the wireless client adapter in
access point 802.11, and the term used to describe this is roaming.
Roaming Network access in 802.11 uses a technique called carrier sense multiple access/
The term used to collision avoidance (CSMA/CA). In CSMA/CA, the client station listens for other us-
describe a user’s’ ability ers of the wireless network. If the channel is quiet (no data transmission), the client
to maintain network
station can transmit. If the channel is busy, the station(s) must wait until transmis-
connectivity as he moves
sion stops. Each client station uses a unique random back-off time. This technique
through the workplace
prevents client stations from trying to gain access to the wireless channel as soon
CSMA/CA as it becomes quiet. Currently four physical layer technologies are being used in
Carrier sense multiple 802.11 wireless networking. These are direct sequence spread spectrum (DSSS),
access/collision frequency hopping spread spectrum (FHSS), infrared, and orthogonal frequency
avoidance division multiplexing (OFDM). DSSS is used in 802.11b/g/n wireless networks,
and OFDM is used in 802.11a, 802.11g, and 802.11n. Note that 802.11g/n use both
DSSS and OFDM technology .

Laptop
Computer

AP-1 AP-3

AP-2

FIGURE 4-3 An example of an Extended Service Set used for increased user mobility.

174 CHAPTER 4: WIRELESS NETWORKING

FIGURE P-4

INTRODUCTION xxv

9780134467160_BOOK.indb xxv 12/2/15 8:42 AM


• Extensive Summaries, Questions and Problems, Critical Thinking, as well as Network+-specific Certification
Questions are found at the end of each chapter, as shown in Figure P-5

Summary of Questions and problems Critical Thinking questions and problems


key concepts are organized by section further develop analytical skills

Section 4-6
SUMMARY 39. What type of wireless connection is used to connect the home network to a
This chapter presented an overview of wireless networking. The fundamental con- multipoint distribution site?
cept and sample networks were also presented. The vendors of wireless networking Point-to-point
equipment have made them easy to integrate into existing networks, but the reader
must understand that the key objective of the network administrator is to provide a 40. Use the Internet to find a source of omnidirectional and directional antennas for
fast, reliable, and secure computer network. Carelessly integrating wireless com- each of the following standards.
ponents into the network can easily compromise this objective. Students should a. 802.11b
understand the following from reading this chapter:
b. 802.11a
• The operating characteristics of the 802.11 wireless networks
c. 802.11g
• The purpose of access points, wireless LAN adapters, and wireless bridges
• How to perform a basic site survey on a building d. 802.11n
• How to configure the network for user mobility Prepare a list of three manufacturers for each antenna type. Include cost figures.
• How to plan multipoint wireless distribution There are many sources for wireless network antennas. Expect the students to
come up with many possible solutions.
A final note: The new wireless networking technologies have greatly simplified
planning and installation. Anytime you are working with RF there is a chance of
unexpected interference and noise. A well-planned RF installation requires a study
of all known interference and a search for any possible interference. An RF study
CRITICAL THINKING
will also include signal path studies that enable the user to prepare a well-thought- 41. A wireless network receiving site is experiencing occasional loss of signal due
out plan and allow an excellent prediction of received signal level. The bottom line to interference. Discuss the steps you would take to correct this problem.
is to obtain support for conducting an RF study.
The options for solving this problem vary depending on the location of the network
receive site. If this is an indoor site, an additional access point may be required.
The antenna for an outdoor site might need to be aligned or replaced with a more
QUESTIONS AND PROBLEMS directional antenna. You also might be able to reduce impacts of RF interference by
changing the access point channel. For example, most microwave ovens emit RF
Section 4-2 signals in the upper third of the 2.4GHz band. As a result, you can generally avoid
microwave oven interference by tuning nearby access points to channels 1 or 6.
1. List two advantages of wireless networking.
42. Prepare a memo to your supervisor explaining why it is important to run encryp-
User mobility tion on your wireless network.
Cost effective media for areas too costly to wire The student should report that it is easy for data to be viewed over an unen-
2. What are the three areas defined for the IEEE 802.11 standard? crypted wireless network. The student could say something about the fact that
sensitive information about personnel or the company is being broadcast to the
The physical layer public if encryption is not used.
The MAC layer 43. Your company has a suite in a business complex. Another company in the suite
Wireless management protocols and services next to you has a wireless 802.11b network with an SSID of “Company A.” You
can pick up their signal from your suite. Your company would like to put up its
3. What is an ad hoc network? own wireless network with two access points. Discuss how you would set up
A term used to describe an independent network these two access points so that your company can obtain optimal performance.

4. What is the purpose of an Extended Service Set? It is important to determine which of the 802.11b channels the SSID “Company
A” is using. Then, we can deploy the wireless access points using different
Uses multiple access points to extend user mobility nonoverlapping channels. This will help eliminate interferences. Also, it is
important to do a site survey within your own suite. We want to place the two
wireless access points in such a way that their radio signals provide overlapping
coverage for the entire suite and their signal will be minimally reflected by the
obstacles within the suite.

210 CHAPTER 4: WIRELESS NETWORKING CRITICAL THINKING 215

FIGURE P-5

xxvi INTRODUCTION

9780134467160_BOOK.indb xxvi 12/2/15 8:42 AM


• An extensive Glossary is found at the end of the book and offers quick, accessible definitions to key terms
and acronyms, as well as an exhaustive Index (see Figure P-6).

Complete Glossary of terms and Exhaustive Index provides


acronyms provide quick reference quick reference

? The help command that can be used at any prompt AH Authentication Header Numbers administrative distance and routing protocols, 414
in the command line interface for the Cisco IOS administratively down (routers), 531
Alien Crosstalk (AXT) Unwanted signal coupling
software 3DES (Triple Data Encryption Standard), 582 administrators (network), isolating errors, 14
from one permanent link to another
3G/4G, WLAN, 198 ADSL (Asymmetric DSL), 475-476
“Hello” Packets Used in the OSPF protocol to verify
Anycast Address Is obtained from a list of addresses 6to4 Prefix (IPv6 addresses), 302 advertising networks, 418
that the links are still communicating
APIPA Automatic Private IP Addressing 8P8C connectors. See RJ-45 modular plugs AES (Advanced Encryption Standard), 582, 592
10GBASE-T 10GB over twisted-pair copper 10GBASE-T cables, 78 aging time (MAC addresses), 234, 237
Application Layer Interacts with application pro- 10GBASE-T Ethernet over copper, 99 AH (Authentication Headers), 582
3G/4G 3G (third generation) was developed to
grams that incorporate a communication component 29 CFR 1910 (Code of Federal Regulations)
provide broadband network wireless services. The alarms
such as your Internet browser and email
standard defining 3G wireless is called international 29 CFR 1910.36, exit route design/construction alarm systems, 632
mobile communications, or IMT 2000. 4G (fourth gen- Area 0 In OSPF, this is the root area and is the back- requirements, 627 CSU/DSU, 470
eration) is the successor to 3G technology and provides bone for the network. 29 CFR 1910.37, exit route maintenance, safeguards, analog modems
download speeds of 100Mbps. operational features, 628
Areas The partition of a large OSPF network into connections, 473
29 CFR 1910.38, Emergency Action Plans (EAP), 628-629
6to4 Prefix A technique that enables IPv6 hosts to smaller OSPF networks ports, Cisco 2600 series routers, 242
29 CFR 1910.39, Fire Prevention Plans (FPP), 629
communicate over the IPv4 Internet analysis stage (forensics examinations), 577
ARIN American Registry for Internet Numbers 29 CFR 1910.157, portable fire extinguishers, 629-630
antennas
AAAA (Quad-A) Record The DNS record for IPv6 29 CFR 1910.160, fixed fire extinguishing systems,
ARP Cache Temporary storage of MAC addresses spatial diversity, 181
630-631
Absorption Light interaction with the atomic struc- recently contacted WLAN, 181-182, 204-208
29 CFR 1910.164, fire detection systems, 631-632
ture of the fiber material; also involves the conversion antivirus software, 567
ARP Reply A network protocol where the MAC ad- 29 CFR 1910.165, employee alarm systems, 632
of optical power to heat anycast IPv6 addresses, 301
dress is returned 29 CFR 1910.1200, hazard communication, 633
Acceptable Use Policy (AUP) Defines the con- AP (Access Points)
ARP Table Another name for the ARP cache 802.11 wireless networks. See WLAN
straints and practices the user must agree to in order to ESS, 174
802.11a (Wireless-A) standard, 25
have access to the network. ARP Address Resolution Protocol home networks, 30
802.11ac (Wireless-AC) standard, 25
loss of association, 188
Access Lists (ACLs) A basic form of firewall ARP Address Resolution Protocol, used to map an IP 802.11b (Wireless-B) standard, 25
SSID, 181
protection address to its MAC address 802.11g (Wireless-G) standard, 25
WLAN, 173, 181-182, 188
802.11n (Wireless-N) standard, 25
Access Point A transceiver used to interconnect a ARPAnet Advanced Research Projects Agency APIPA (Automatic Private IP Addressing), 485
wireless and a wired LAN network appearance of home networks, 33
ACK Acknowledgement packet AS Autonomous systems A Application layer
OSI model, 14
Ad Hoc Another term used to describe an indepen- ASN Autonomous systems number A records
TCP/IP, 266-268
dent network dynamic updates, 492
Association Indicates that the destination address is Area 0 (OSPF protocol), 434
manual updates, 491
Address Resolution Protocol (ARP) Used to map an for a networking device connected to one of the ports areas (OSPF protocol), 429
AAAA (quad-A) records, 495
IP address to its MAC address on the bridge ARIN (American Registry for Internet Numbers), 287
absorption (attenuation), 138
Administratively Down Indicates that the router in- Asymmetric Operation Describes the modem opera- ARP (Address Resolution Protocol), 272, 519
access (networks)
terface has been shut off by the administrator tion when the data transfer rates to and from the ser- caches, 223-225
controlling, workplace safety, 633
vice provider differ replies, 519
ADSL (Asymmetric DSL) A service providing up to home access, 33
tables, 223
1.544Mbps from the user to the service provider and Attenuation (Insertion Loss) The amount of loss in public access, 33
ARPAnet (Advanced Research Projects Agency), TCP/IP
up to 8Mbps back to the user from the service provider the signal strength as it propagates down a wire or fiber access points. See AP
development, 264
strand ACK (Acknowledgement) packets, 268, 271
Advertise The sharing of route information AS (Autonomous Systems), 498
ACL (Access Lists), 574
Auto-negotiation Protocol used by interconnected ASN (Auonomous System Numbers), 498-499
AES Advance Encryption Standard ACR (Attenuation-to-Crosstalk Ratio), 97
electronic devices to negotiate a link speed associations, 223
AES Advanced Encryption Standard active status (RFID tags), 195
Backbone Main fiber distribution. The primary path assymetric operation, V.92/V.90 analog modem standard,
adapter addresses. See MAC addresses 473
Aging Time The length of time a MAC address re- for data traffic to and from destinations and sources in adaptive cut-through switching, 237 attenuation (insertion loss), cabling, 94-95
mains assigned to a port the campus network ad hoc networks. See BSS ACR (Attenuation-to-Crosstalk Ratio), 97

647 663

FIGURE P-6

INTRODUCTION xxvii

9780134467160_BOOK.indb xxvii 12/2/15 8:42 AM


Accompanying CD-ROM
The CD-ROM packaged with the text includes the captured data packets used in the text. It also includes the Net-
Challenge Software, which was developed specifically for this text. The CD-ROM also includes sample videos
on the topic of network virtualization from the CompTIA Network+ N10-006 Complete Video Course. See the
special offer for a discount on the full version of this product in the sleeve in the back of the book.

xxviii INTRODUCTION

9780134467160_BOOK.indb xxviii 12/2/15 8:42 AM


9780134467160_BOOK.indb xxix 12/2/15 8:42 AM
INTRODUCTION
1
CHAPTER
TO COMPUTER
NETWORKS

9780134467160_BOOK.indb 2 12/2/15 8:42 AM


Chapter Outline
1-1 Introduction 1-6 Assembling an Office LAN
1-2 Network Topologies 1-7 Testing and Troubleshooting a LAN
1-3 The OSI Model Summary
1-4 The Ethernet LAN Questions and Problems
1-5 Home Networking

Objectives
• Explain the various LAN topologies • Describe the purpose of the MAC address on
• Define the function of a networking protocol a networking device

• Describe CSMA/CD for the Ethernet • Discuss how to determine the MAC address
protocol for a computer

• Describe the structure of the Ethernet frame • Discuss the fundamentals of IP addressing

• Define the function of the network interface • Discuss the issues of configuring a home
card network
• Discuss the issue of assembling an office LAN

Key Terms
local area network (LAN) network layer private addresses
protocol transport layer intranet
topology session layer IP internetwork
Token Ring topology presentation layer TCP/IP
token passing application layer wired network
IEEE CSMA/CD wireless network
deterministic frame Wi-Fi
Token Ring hub network interface card wireless router
bus topology (NIC) range extender
ThinNet MAC address hotspots
star topology organizationally unique Service Set Identifier
hub identifier (OUI) (SSID)
multiport repeater Ethernet, physical, hard- firewall protection
ware, or adapter address Stateful Packet Inspection
broadcast
ipconfig /all (SPI)
switch
IANA virtual private network
ports
IP address (VPN)
mesh topology
network number Network Address
OSI
host number Translation (NAT)
OSI model
host address overloading
physical layer
ISP
data link layer

9780134467160_BOOK.indb 3 12/2/15 8:42 AM


Port Address Translation ports link pulses
(PAT) crossover ping
CAT6 (category 6) straight-through Internet Control Message
RJ-45 uplink port Protocol (ICMP)
Mbps link light ipconfig
numerics link integrity test

4 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

9780134467160_BOOK.indb 4 12/2/15 8:42 AM


1-1 INTRODUCTION
Each day, computer users use their computers for browsing the Internet,
sending and retrieving email, scheduling meetings, sharing files, preparing
reports, exchanging images, downloading music, and maybe checking the
current price of an auction item on the Internet. All this requires computers
to access multiple networks and share their resources. The multiple networks
required to accomplish this are the local area network (LAN), the enterprise
network, the campus area network (CAN), the metropolitan area network
(MAN), Metro Ethernet, the personal area network (PAN), and the wide area
network (WAN).
This text introduces the essentials for implementing modern computer net-
works. Each chapter steps you through the various modern networking tech-
nologies. The accompanying CD-ROM comes with the Net-Challenge simulator
software developed specifically for this text. This software provides the reader
with invaluable insight into the inner workings of computer networking and
with the experience of configuring the router and switch for use in the com-
puter networks.

The ease of connecting to the Internet and the dramatic decrease in computer
systems’ cost has led to an explosion in their usage. Organizations such as corpo- Local Area Network
rations, colleges, and government agencies have acquired large numbers of single- (LAN)
user computer systems. These systems might be dedicated to word processing, Network of users that
share computer resources
scientific computation, process control, or might be general-purpose computers that
in a limited area
perform many tasks. This has generated a need to interconnect these locally dis-
tributed computer networks. Interconnection allows users to exchange information
(data) with other network members. It also allows resource sharing of expensive
equipment such as file servers and high-quality graphics printers or access to more
powerful computers for tasks too complicated for the local computer to process.
The network commonly used to accomplish this interconnection is called a local
area network (LAN), which is a network of users that share computer resources in a
limited area.
Table 1-1 outlines the CompTIA Network+ objectives and identifies the chapter
section that covers each objective. At the end of each chapter section you will find a
review with comments of the Network+ objectives presented in that section. These
comments are provided to help reinforce the reader’s understanding of a particu-
lar Network+ objective. The chapter review also includes “Test Your Knowledge”
questions to aid in the understanding of key concepts before the reader advances
to the next section of the chapter. The end of the chapter includes a complete set of
questions as well as sample certification type questions.

1-1: INTRODUCTION 5

9780134467160_BOOK.indb 5 12/2/15 8:42 AM


TABLE 1-1 Chapter 1 CompTIA Network+ Objectives

Domain/ Domain/Objective Description Section Where


Objective Objective Is
Number Covered
1.0 Networking Architecture
1.1 Explain the functions and applications of various 1-5
network devices
1.2 Compare and contrast the use of networking services 1-5
and applications
1.3 Install and configure the following networking 1-5
services/applications
1.4 Explain the characteristics and benefits of various WAN 1-1
technologies
1.5 Install and properly terminate various cable types and 1-6
connectors using appropriate tools
1.6 Differentiate between common network topologies 1-2
1.7 Differentiate between network infrastructure 1-1, 1-5, 1-6
implementations
1.8 Given a scenario, implement and configure the 1-4, 1-5
appropriate networking addressing schema
1.12 Given a set of requirements, implement a basic 1-1, 1-2
network
2.0 Network Operations
2.4 Explain the importance of implementing network 1-5
segmentation
2.6 Given a scenario, configure a switch using proper 1-4, 1-5
features
2.7 Install and configure a wireless LAN infrastructure and 1-5
implement the appropriate technologies in support of
wireless-capable devices
3.0 Network Media and Topologies
3.2 Compare and contrast network vulnerabilities and 1-5
threats
3.3 Given a scenario, implement network-hardening 1,4 1-5
techniques
4.0 Troubleshooting
4.1 Given a scenario, implement the following network 1-3, 1-5, 1-7
troubleshooting methodology
4.2 Given a scenario, analyze and interpret the output of 1-4, 1-7
troubleshooting tools

6 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

9780134467160_BOOK.indb 6 12/2/15 8:42 AM


Domain/ Domain/Objective Description Section Where
Objective Objective Is
Number Covered
5.0 Industry Standards, Practices, and Network Theory
5.1 Analyze a scenario and determine the corresponding 1-3
OSI layers
5.2 Explain the basics of network theory and concepts 1-4
5.3 Given a scenario, deploy the appropriate wireless 1-5
standard
5.4 Given a scenario, deploy the appropriate wired 1-5, 1-6
connectivity standard
5.8 Explain the basics of change management procedures 1-6
5.9 Compare and contrast the following ports and 1-3
protocols

Protocol
Set of rules established
for users to exchange
information
1-2 NETWORK TOPOLOGIES Topology
The networking topologies commonly used in computer networks are presented Architecture of a network
in this chapter. It is important that the student understand the structure of the star Token Ring Topology
topology. The students should also have an understanding of Token Ring and bus
A network topology
topologies even though these are seldom used anymore. configured in a logical
Local area networks are defined in terms of the protocol and the topology used for ring that complements
accessing the network. The networking protocol is the set of rules established for the token passing
users to exchange information. The topology is the network architecture used to protocol
interconnect the networking equipment. The most common architectures for LANs Token Passing
are the ring, bus, and star, as illustrated in Figure 1-1. A technique where an
electrical token circulates
Figure 1-2 shows an example of a LAN configured using the Token Ring topology.
around a network—
In this topology, a “token” (shown as a T) is placed in the data channel and circu- control of the token
lates around the ring, hence the name Token Ring. If a user wants to transmit, the enables the user to gain
computer waits until it has control of the token. This technique is called token pass- access to the network
ing and is based on the IEEE 802.5 Token-Ring Network standard. A Token Ring
network is a deterministic network, meaning each station connected to the network IEEE
is ensured access for transmission of its messages at regular or fixed time intervals. Institute of Electrical
and Electronics
Engineers, one of the
major standards-setting
bodies for technological
development
Deterministic
Access to the network is
provided at fixed time
intervals

1-2: NETWORK TOPOLOGIES 7

9780134467160_BOOK.indb 7 12/2/15 8:42 AM


(a) Star network (b) Ring network

(c) Bus network

FIGURE 1-1 Network topologies. (From Modern Electronic Communication 9/e, by G.


M. Miller & J. S. Beasley, 2008 Copyright © 2008 Pearson Education, Inc. Reprinted by
permission of Pearson Education, Inc., Upper Saddle River, NJ.)

Workstation

Laptop computer

Plotter

T
Token ring

Power Mac
PC

Laser printer
PC

PC
The passing of the token

FIGURE 1-2 The Token Ring network topology.

8 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

9780134467160_BOOK.indb 8 12/2/15 8:42 AM


One disadvantage of the Token Ring system is that if an error changes the token
pattern, it can cause the token to stop circulating. Additionally, ring networks Token Ring Hub
rely on each system to relay the data to the next user. A failed station can cause A hub that manages the
data traffic to cease. Another disadvantage of the Token Ring network is from the passing of the token in a
Token Ring network
troubleshooting and maintenance point of view. The Token Ring path must be
temporarily broken (path interrupted) if a computer or any device connected to the
network is to be removed or added to the network. This results in downtime for
the network. A fix to this is to attach all the computers to a central Token Ring hub.
Such a device manages the passing of the token rather than relying on individual
computers to pass it, which improves the reliability of the network. It is impor-
tant to note that the Token Ring network has become a “legacy” now in computer
networking. Ethernet technology has replaced this in almost all modern computer
networks.
Figure 1-3 illustrates a bus topology. In a bus system, the computers share the me-
Bus Topology
dia (coaxial cable) for data transmission. In this topology, a coaxial cable (called
The computers share the
ThinNet) is looped through each networking device to facilitate data transfer.
media (coaxial cable) for
data transmission
1 2 3

PC Laptop computer Power Mac

50 1 Ethernet 50 1

4
Laser printer
PC

Traffic

FIGURE 1-3 The bus topology.

In a bus topology, all LAN data traffic is carried over a common coaxial cable link.
Referring to Figure 1-3, if computer 1 is printing a large file, the line of communi-
cations will be between computer 1 and the printer. However, in a bus system, all
networking devices will see computer 1’s data traffic to the printer and the other de-
vices will have to wait for pauses in transmission or until it is complete before they
can initiate their own transmission. If more than one computer’s data is placed on
the network at the same time, the data will be corrupted and will have to be retrans-
mitted. This means that the use of a shared coaxial cable in a bus topology prevents
data transmission from being very bandwidth-efficient. This is one reason, but not Star Topology
the only reason, why bus topologies are seldom used in modern computer networks.
The most common
The star topology, shown in Figure 1-4, is the most common networking topology networking topology
in today’s LANs. Twisted-pair cables (see Chapter 2, “Physical Layer Cabling: in today’s LANs where
Twisted Pair”) with modular plugs are used to connect the computers and other all networking devices
connect to a central
networking devices. At the center of a star network is either a switch or a hub.
switch or hub
This connects the network devices and facilitates the transfer of data. For example,

1-2: NETWORK TOPOLOGIES 9

9780134467160_BOOK.indb 9 12/2/15 8:42 AM


if computer 1 wants to send data to the network laser printer, the hub or switch
Hub provides the network connection. If a hub is used, computer 1’s data is sent to the
Broadcasts the data it hub, which then forwards it to the printer. However, a hub is a multiport repeater,
receives to all devices meaning the data it receives is broadcast and seen by all devices connected to its
connected to its ports ports. Therefore, the hub will broadcast computer 1’s data traffic to all networking
Multiport Repeater devices interconnected in the star network. The data traffic path for this is shown
Another name for a hub in the solid black arrowed lines going to all networking devices in Figure 1-4. This
is similar to the bus topology in that all data traffic on the LAN is being seen by all
Broadcast
computers. The fact that the hub broadcasts all data traffic to the devices connected
Transmission of data to its network ports makes these devices of limited use in large networks.
by a hub to all devices
connected to its ports

Workstation

Laptop Computer Plotter

T
Token Ring

Mac
PC

Laser Printer PC

PC

The Passing of the Token

FIGURE 1-4 The star topology.

To minimize unnecessary data traffic and isolate sections of the network, a switch
Switch can be used at the center of a star network, as shown in Figure 1-4. Networking
Forwards a frame it devices such as computers each has a hardware or physical address. (This concept
receives directly out the
is fully detailed in section 1-4.) A switch stores the hardware or physical address
port associated with its
for each device connected to its ports. The storage of the address enables the switch
destination address

10 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

9780134467160_BOOK.indb 10 12/2/15 8:42 AM


to directly connect two communicating devices without broadcasting the data to all
devices connected to its ports. Ports
The physical input/
For example, if a switch is used instead of a hub, the data from computer 1 is trans- output interfaces to the
mitted directly to the printer and the other computers do not see the data traffic. networking hardware
The traffic path for the switched network is shown in the dotted lines in Figure 1-4.
The use of a switched connection greatly improves the efficiency of the available
bandwidth. It also permits additional devices in the LAN to simultaneously com-
municate with each other without tying up network resources. For example, while
computer 1 is printing a large file, computers 5 and 6 can communicate with each
other, as shown in the dashed line in Figure 1-4. For troubleshooting and mainte-
nance, individual computers can be removed without negatively affecting the net-
work in a star or extended star topology. Also the upgrade from a hub to a switched
topology can be accomplished without requiring a change in the cable infrastruc-
ture and therefore at minimal downtime and expense.
Another topology is the mesh topology, shown in Figure 1-5. In this topology,
all networking devices are directly connected to each other. This provides for Mesh Topology
full redundancy in the network data paths but at a cost. The additional data paths All networking devices
increase the cabling costs and the networking hardware cost (for example, expense are directly connected to
each other
of multiple network ports for each device connected to the network). Not only that,
but the mesh design adds more complexity. This topology can be suitable for high-
reliability applications but can be too costly for general networking applications.

FIGURE 1-5 The mesh topology.

1-2: NETWORK TOPOLOGIES 11

9780134467160_BOOK.indb 11 12/2/15 8:42 AM


Section 1-2 Review
This section has covered the following Network+ Exam objectives.
1.6 Differentiate between common network topologies
This section presented the star, ring, bus, and mesh network topologies. You
should be able to identify each topology and understand how data travels in
each network topology. You should also have a basic understanding of the differ-
ence between a topology and protocol.
1.12 Given a set of requirements, implement a basic network
This section also introduced some basic networking hardware, such as the hub
and switch. Make sure you have a basic understanding of each device. You
should also have developed an understanding that data from a hub is replicated
out all ports. This means that the information is seen by all networking devices
connected to its ports. You should also know that a switch will filter unicast
frames out of the appropriate ports, unlike a hub.

Test Your Knowledge


1. What is the most common network topology today?
a. Star
b. Hub
c. Ring
d. Mesh
2. A hub is also called a multiport repeater.
a. True
b. False
3. The term deterministic means
a. Access to the network is provided at random time intervals.
b. Access to the network is provided using CSMA/CD.
c. Access to the network is provided at fixed time intervals.
d. None of these answers is correct.
4. A protocol defines the network architecture used to interconnect the net-
working equipment.
a. True
b. False

12 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

9780134467160_BOOK.indb 12 12/2/15 8:42 AM


1-3 THE OSI MODEL
The sections examines the seven layers of the OSI model. The student should
memorize all seven layers and know the function of each layer. The student should
refer to Table 1-1 for a summary of the OSI layers and a short description of the
function.
An open systems interconnect (OSI) reference model was developed by the In-
ternational Organization for Standardization in 1984 to enable different types OSI
of networks to be linked together. The model contains seven layers, as shown in Open system interconnect
Figure 1-6. These layers describe networking functions from the physical network OSI Model
interface to the software applications interfaces. The intent of the OSI model is The seven layers
to provide a framework for networking that ensures compatibility in the network describing network
hardware and software and to accelerate the development of new networking tech- functions
nologies. A discussion of the OSI model follows as well as a summary of the seven
layers outlined in Table 1-2.

7. Application

6. Presentation

5. Session

4.Transport

3. Network

2. Data link

1. Physical

FIGURE 1-6 The seven layers of the OSI reference model.

TABLE 1-2 Summary of the OSI Layers

Layer Function Examples


7. Application Support for applications HTTP, FTP, SMTP (email)
6. Presentation Protocol conversion, data translation ASCII, JPEG
5. Session Establishes, manages, and NFS, SQL
terminates sessions
4. Transport Ensures error-free packets TCP, UDP
3. Network Provides routing decisions IP, IPX
2. Data link Provides for the flow of data MAC addresses
1. Physical Signals and media NICs, twisted-pair cable, fiber

1-3: THE OSI MODEL 13

9780134467160_BOOK.indb 13 12/2/15 8:42 AM


1. Physical layer: Provides the electrical and mechanical connection to the net-
Physical Layer work. Examples of technologies working in this layer are Electronic Industries
Provides the electrical Alliance/Telecommunications Industry Association (EIA/TIA) related tech-
and mechanical connec-
nologies, UTP, fiber, and network interface cards (NICs).
tion to the network
2. Data link layer: Handles error recovery, flow control (synchronization), and
Data Link Layer
sequencing (which terminals are sending and which are receiving). It is con-
Handles error
sidered the “media access control layer” and is where Media Access Control
recovery, flow control
(synchronization), and (MAC) addressing is defined. The Ethernet 802.3 standard is defined in this
sequencing area, which is why the MAC address is sometimes called the Ethernet address.

Network Layer 3. Network layer: Accepts outgoing messages and combines messages or seg-
Accepts outgoing ments into packets, adding a header that includes routing information. It acts as
messages and combines the network controller. Examples of protocols working in this layer are Internet
messages or segments Protocol (IP) and Internetwork Packet Exchange (IPX).
into packets, adding a
4. Transport layer: Is concerned with message integrity between source and des-
header that includes
routing information tination. It also segments/reassembles (the packets) and handles flow control.
Examples of protocols working in this layer are Transmission Control Protocol
Transport Layer (TCP) and User Datagram Protocol (UDP).
Is concerned with
message integrity 5. Session layer: Provides the control functions necessary to establish, manage,
between source and and terminate the connections as required to satisfy the user request. Examples
destination of technologies working in this layer are Network File System (NFS) and
Structured Query Language (SQL).
Session Layer
Provides the control 6. Presentation layer: Accepts and structures the messages for the application.
functions necessary It translates the message from one code to another if necessary. This layer is
to establish, manage, responsible for data compression and encryption. Examples of technologies
and terminate the working in this layer are American Standard Code for Information Interchange
connections (ASCII) and Joint Photographic Experts Group (JPEG).
Presentation Layer 7. Application layer: Interacts with application programs that incorporate a com-
Accepts and structures munication component such as your Internet browser and email. This layer is
the messages for the responsible for logging the message in, interpreting the request, and determin-
application
ing what information is needed to support the request. Examples are Hypertext
Application Layer Transfer Protocol (HTTP) for web browsing, File Transfer Protocol (FTP)
Interacts with for transferring files, and Simple Mail Transfer Protocol (SMTP) for email
application programs transmission.
that incorporate
a communication
component such as your
Note
Internet browser and
email Network administrators often describe networking problems by layer number. For example, a
physical link problem is described as a layer 1 problem; a router problem is layer 3; and so on.

The network administrator needs to have a good understanding of all seven layers
of the OSI model. Knowledge of the layers can help to isolate the network problem.
There are three basic steps in the process of isolating the network problem:
• Is the connection to the machine down? (layer 1)
• Is the network down? (layer 3)
• Is a service on a specific machine down? (layer 7)

14 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

9780134467160_BOOK.indb 14 12/2/15 8:42 AM


The network administrator uses the OSI model to troubleshoot network problems
by verifying functionality of each layer. In many cases, troubleshooting the network
problem requires the network administrator to isolate at which layer the network
problem occurs.
For example, assume that a network is having problems accessing an email server
that uses SMTP—a layer 7 application. The first troubleshooting step for the net-
work administrator is to ping the IP address of the email server (layer 3 test). A
“ping” to an IP address can be used to check quickly that there is a network con-
nection. (Note: The ping command is discussed in detail in section 1-7, “Testing
and Troubleshooting a LAN.”) A “reply from” response for the ping indicates the
connection to the server is up. A “request timed out” response indicates the network
connection is down. This could be due to a cabling problem (layer 1) or a problem
with a switch (layer 2) or a router (layer 3), or the email server could be completely
down (layer 7). In the case of “request timed out,” the network administrator will
have to go directly to the telecommunications closet or the machine to troubleshoot
the problem. In this case, the administrator should first check for layer 1 (physical
layer) problems. Many times this just requires verifying that a network cable is con-
nected. Cables do get knocked loose or break.

Section 1-3 Review


This section has covered the following Network+ Exam objectives.
4.1 Given a scenario, implement the following network troubleshooting
methodology
The network administrator needs to have a good understanding of all seven lay-
ers of the OSI model. Knowledge of the layers can help to isolate the network
problem. Remember, there are three basic steps in the process of isolating the
network problem:
1. Is the connection to the machine down? (layer 1)
2. Is the network down? (layer 3)
3. Is a service on a specific machine down? (layer 7)
5.1 Analyze a scenario and determine the corresponding OSI layers
The OSI layers have been presented in this section. Develop some method to
remember the name, the function, and examples of the seven layers of the OSI
model. A good overview of this is presented in Table 1-2. This provides a good
start for understanding how the OSI model relates to applications, devices, and
protocols.
5.9 Compare and contrast the following ports and protocols
This chapter presented several protocols such as HTTP, TCP, and UDP and how
they fit into the OSI model.

1-3: THE OSI MODEL 15

9780134467160_BOOK.indb 15 12/2/15 8:42 AM


Test Your Knowledge
1. TCP functions at which layer of the OSI model?
a. Layer 4
b. Layer 2
c. Layer 3
d. Layer 5
e. Layer 7
2. HTTP functions at which layer of the OSI model?
a. Layer 6
b. Layer 5
c. Layer 4
d. Layer 7
e. All of these answers are correct.
3. IP is an example of a protocol that operates in which layer of the OSI model?
a. Layer 7
b. Layer 6
c. Layer 5
d. Layer 2
e. None of these answers is correct.
4. The NIC operates at which layer of the OSI model?
a. Layer 1
b. Layer 3
c. Layer 5
d. Layer 7
e. All of these answers are correct.
5. The network address is another name for a layer 4 address.
a. True
b. False

16 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

9780134467160_BOOK.indb 16 12/2/15 8:42 AM


Another random document with
no related content on Scribd:
This was one of the remarks that Miss Laura Dancer subsequently
wished she had not made.
Miss West murmured her thanks, and shook her head. And the
girls, seeing that she evidently wished to be by herself—and, after
begging her with one breath to “come and have tea at the rectory”—
pranced down to the lych gate on their high-heeled shoes, followed
more leisurely by the rector.
And at last Madeline was alone. But how could she kneel on the
turf and press her lips to the cold marble and drop her bitter tears
over her lost darling with other eyes upon her? How could she tell
that the windows in yonder rectory did not overlook every corner and
every grave? She laid the lilies on the turf, and stood at the foot of
the new little mound for half an hour, kissed the name upon the
cross, gathered a few blades of grass, and then went away.
The Miss Dancers, who had a fair share of their mother Eve’s
curiosity, had been vainly laying their heads together to discover
what had brought Miss West to Monk’s Norton church; and over the
tea-table they had been telling their aunt and uncle what a very
important personage Miss West was in the eyes of society—how
wealthy, how run after, how beautiful, and what a catch she would be
for some young man if she could be caught! But she was so difficult
to please. She was so cold; she froze her admirers if they ever got
further than asking for dances.
“All heiresses are said to be handsome, no matter what their
looks. She is no beauty, poor thing! She looks as if she is dying. How
can any one admire lantern jaws, sunken eyes, and a pale face?
Give me round rosy cheeks.” And the rector glanced significantly at
his two nieces, who were not slow to accept the compliment.
“Oh, aunty, she is shockingly changed since I saw her last,” said
Laura. “She really was pretty; every one said so—even other
women. She had an immense reputation as a beauty; and when she
came into a ballroom nobody else was looked at.”
“Well, my lasses,” said the rector, rising and brushing the crumbs
of cake from his knees, “the world’s idea of beauty must have altered
very much since I was a young man; or else your friend has altered
greatly. Believe me, she would not be looked at now.”
So saying, he went off to his study, presumably to write his Sunday
sermon—perhaps to read the newspaper.
His nieces put on their hats again, and went out and had a game
of tennis. Tennis between sisters is a little slow; and after a time
Laura said—
“Look here, Dolly, supposing we go up to the churchyard and see
where she has left those flowers. There would be no harm in that,
would there?”
Her sister warmly agreed to the suggestion, and the two set forth
on their quest with eager alacrity.
They discovered the object of their walk without any difficulty; for
the lovely white lilies were quite a prominent object on the green turf.
Miss West had laid them upon the new grave—the child’s grave.
How strange!
CHAPTER XL.
A FORLORN HOPE.

The hurried expedition to the Holt Farm, and subsequent visit to


Monk’s Norton, had not agreed with Miss West. She had a most
mysterious relapse, inexplicable alike to her father and her medical
adviser.
The former had left her comparatively better, ere starting for a long
day in London. Little did he guess that the invalid had followed him
by the next train, had given Josephine a holiday, had travelled into
Hampshire, and gone through more mental and bodily stress than
would exhaust a woman in robust health, had returned but an hour
before him in a prostrate condition—and had subsequently kept her
room for days.
“I cannot account for it,” the doctor said. “Great physical debility.
But, besides this, there is some mental trouble.”
“Impossible!” rejoined Mr. West, emphatically.
“At any rate she must be roused, or I cannot answer for the
consequences. She has no wish to get well. She won’t take the
trouble to live. I think, if you could manage to get her on board ship,
a sea voyage might have a good effect.”
Yes, that would be the very thing, and fall in with Mr. West’s plans.
A trip to Australia.
“How about a trip out to Sydney?”
“Yes; and the sooner you can get her off the better. Her illness is
more mental than physical. She will perhaps recover amid totally
strange surroundings, and where there is nothing to recall whatever
is preying on her mind.”
“Preying on—stuff and nonsense—preying on a goose’s mind!”
cried Mr. West, irascibly.
“I dare say whatever preyed upon a goose’s mind would have a
scanty meal,” said the physician rather stiffly.
“But she has never had a care in her life!”
“Umph!” rejoined the other doubtfully. “No love affairs?”
“Not one.”
“Well, I won’t conceal from you that she is in a most critical state.
Take her abroad at once; you have given up your town house, you
tell me; you have no anchor, no ties. You should start immediately,
and be sure you humour her, and coax her into the trip, for it is only
right to tell you that it’s just touch and go!”
This was terrible news to Mr. West. His daughter had lost her
looks, her spirits, her health; was he to lose her altogether? He broke
the news of a sea voyage to her rather timidly that same evening.
She listened to his eager schemes, his glowing word-paintings, his
prophecy of a jolly good time, with a dull vacant eye, and totally
indifferent air.
“Yes, if he wished—whatever he pleased,” she assented languidly.
It was all the same, she reflected, where she died, on land or sea.
But to one item she dissented—she objected to the proffered
company of Mrs. Leach.
“This was just a sick girl’s whim!” said Mr. West to himself, and he
would not argue out the matter at present; but he was secretly
resolved that the charming widow should be one of the party. She
had written him such heart-broken letters about Madeline from
Scarborough (but she had not seen Madeline since her illness had
been pronounced infectious). There was no fear now, and the doctor
had said that a cheerful lady companion, whom the invalid liked, and
who would share her cabin and look after her and cheer her, was
essential. Who so suitable as Mrs. Leach? He would pay her return
passage and all expenses; and when Madeline had retired, he sat
down and penned an eager letter to her to that effect.
In two days Mrs. Leach was at Brighton, with a quantity of luggage
—boxes, bags—and in a fascinating cloak and hat, had rushed into
the hand-shake of her dear Mr. West. She was looking remarkably
brilliant. Oh, what a contrast to his poor emaciated child, who
increased her forlorn appearance by wearing a black dress! She did
not give Mrs. Leach a particularly cordial reception.
“She does not care to see any one,” explained Mr. West
apologetically, when he and his enchantress sat vis-à-vis over
dessert. “She takes no interest in anything on earth—it’s mental, the
doctors say,” touching his forehead. “She has had not only
diphtheria, but some sort of shock. She sits moping and weeping all
day; she never opens a book, never opens her lips; she never listens
to half that is said to her; she won’t eat, she can’t sleep, and she
insists on wearing black. I can’t understand it.”
But Mrs. Leach could; she saw it all. Whoever the man was in the
background of Madeline’s life, he was dead. Either that, or he had
deceived her, and, as a result, she was almost crazy with grief. And
what a wreck!
Mrs. Leach took everything firmly in her grasp at once; she was
unusually active and busy. They were to sail in ten days, and there
was Madeline’s outfit; but here no interference was permitted.
Madeline selected her own wardrobe—a few black gowns. However,
on the other hand, Mrs. Leach looked well after Madeline’s
correspondence; all letters were brought first to her. She did not wish
Mr. West’s sharp eyes to notice the swarms of bills which pursued
her, and she passed all his and his daughter’s letters in review ere
they were laid upon the breakfast or afternoon tea-table. Madeline
never appeared until the afternoon, and exhibited no interest in the
daily post; she was, however, pleased to see Lady Rachel and her
brother, who came down from town, ere their departure to Scotland,
expressly to wish her a bon voyage and a speedy return. They were
really quite affected when they beheld what was neither more nor
less than the spectre of Madeline West—the gay and radiant girl of
last season!
They had brought her books, flowers, her favourite Fuller’s sweets,
many scraps of news, and, under the influence of their infectious
spirits, she cheered up temporarily. Mrs. Leach, however, despite the
coldness of Lady Rachel and surliness of Lord Tony, remained of the
company, acting as a sort of female warder; and there was no really
free intercourse. In spite of broad hints, she stuck most
pertinaciously to her seat and her silk sock, throwing in observations
every now and then. Certainly she was thick-skinned.
At last Lady Rachel said boldly—
“Now, Madeline, take me to your room, my dear.”
Madeline rose with an effort.
“Oh, my dearest, you must not go into the draught on any account!
I’ll take Lady Rachel to mine.”
“No, thank you, Mrs. Leach; I rather wish to have Miss West to
myself for a little, and I dare say she can wrap up if the draughts are
so much keener now than at any other time of the day,” and Lady
Rachel carried her point.
“I wanted to speak to you alone, Maddie,” she said as she closed
the door, “and that odious, thick-skinned, alligator of a woman never
gave me a chance! She knows that I loathe her, and might put you
on your guard.”
“I am on my guard. I know her, I think, even better than you do.”
“And you don’t like her?”
“No, I don’t trust her.”
“I should hope not. She is a regular sort of society adventuress; a
notorious evil-speaker, liar, and slanderer; always poking into
secrets, and levying genteel blackmail. I had such an account of her
from Mrs. Berthon lately. I never liked her—never; but I was not up to
all her history. Her father was a coal merchant, and a man of very
low origin—she is a nobody. Major Leach was caught; he thought
she had a quantity of money. That is always her bait—display, dress,
diamonds. His family no longer speak to her, though she quotes
them on all occasions, and gives them as reference to hotels and
banks, and lets them in. She owes my dressmaker six hundred
pounds, and she has put her off with the excuse that she is going to
marry an immensely rich man!”
“Really! who can it be?” indifferently.
“Can’t you guess, you dear blind bat?”
“Not my father?”
“Well, I hope not. You must rouse yourself and interfere; elderly
men are so easily made fools of. Is it true that she is going with you
to Sydney, or is it just a piece of gossip?”
“Yes, it is quite true.”
“Then you must stop it; you really must, unless you wish to have
her as a stepmother. She will be engaged before you are at Gib. I
think I can see her in smart board-ship frocks, very pleasant, very
helpless; your father, an idle man, waiting on her assiduously, and
carrying her wraps and books; you below, hors de combat. Oh, she
will not lose her opportunity, and she sticks at nothing.”
“I’m afraid I can’t stop her!”
“I tell you you must. I wish I was going with you instead.”
“Oh, how I wish you were!”
“But I can’t; my plans are cut and dried by Mr. J. I shall write to you
often, dear, and expect to see you back in six months, or at least
twelve, looking quite yourself; now, promise me.”
Madeline, whose spirits were running down and a reaction setting
in, made no answer, save tears.
Lady Rachel’s warning sank into fruitful soil. Madeline plucked up
sufficient energy to urge her father to relieve her of her incubus.
“I should much prefer being alone; I should indeed.”
“Pooh, pooh, my dear!” recalling her doctor’s advice, and thinking
what an agreeable shipmate he was providing, not only for Madeline,
but himself. “Nonsense; it’s all settled, passages booked. No change
possible.”
“I shall be far happier without her.”
“Oh, rubbish! You are just weak now, and fanciful. Mrs. Leach is
devoted to you.”
“I doubt it; and, father, let me tell you a secret. I don’t like her. I am
sure she is not sincere. She is not straight.”
“Come, come; she is as sincere as most women. I wonder who
has been putting these notions into your head—Lady Rachel, eh?
Mrs. Leach gave me a hint. Lady Rachel is all very well, and very
pleasant; but a bit rapid, you know.”
“Whatever she does is open and above-board,” protested
Madeline warmly.
“I’m not so sure of that, my dear. Mrs. Leach knows a few things
that would never stand the light, and her ladyship is aware of this,
and that’s why she hates our good friend, and wants to set you
against her.”
Madeline, weak and miserable, could not argue. She was
powerless against the attractive widow. She, poor hollow-eyed
wreck, was no fitting opponent for the fascinating Flora, whose
battery of beauty and smiles was most effective, and had captivated
Madeline’s susceptible parent. Her influence was far more powerful
than Madeline’s, on the question of what was for the benefit of the
invalid, and the invalid saw that it was useless to prolong the secret
struggle, and succumbed to her fate.
Laurence Wynne had not come across Mr. West for a
considerable time; but he knew that the Wests were at Brighton, and
that Miss West was almost convalescent. It was the end of October,
London was filling, and he was lunching at his club, with one or two
acquaintances at the same table, when one of them said—
“Hullo! there’s old West. I must go and have a word with him
presently. He looks rather down; not half as smart and perky as last
year.”
“He has lost a good deal of money!” observed the other.
“Yes; but not as much as is supposed. He is an uncommonly
shrewd old boy, and knows when to save himself; but he can’t save
himself from his present trouble. He is going to lose his daughter?”
“His what?” put in Wynne, quickly.
“Daughter. Surely you’ve heard of the lovely Miss West? She was
the rage for two seasons. She got diphtheria in the summer, and
——”
“Yes, yes; I know,” impatiently.
“Well, he took her down to Brighton, and she had a bad relapse of
some kind. I was there on Saturday last, and I saw her. Her carriage
had stopped at a shop I was coming out of. I give you my honour I
had to look at her three times before I was sure of her; she has lost
every particle of colour and flesh and beauty. She might be thirty-
five, and gives one the idea of a person who had seen a ghost, and
never got over it. Yes”—in answer to the expression of his listeners’
eyes—“it’s rather awful. She used to be so pretty; now she has death
in her face.”
“Are you in earnest, Ruscombe?”
“Why, of course I am. Old West is in a deadly funk, and taking her
off to Australia, as a sort of forlorn hope. But he will never get her
there alive.”
“Who says so?” he asked sharply.
“I thought you did not know her, man! The doctor who attends her
happens to be my brother-in-law; and, of course, we are all
interested in the beauty. He has a very poor opinion——Oh, are you
off? The fellow is mad. He hasn’t touched a morsel. What the
dickens!—Oh, ho! Now, what does that mean—he is button-holing
the old squatter himself?”
“No, Wynne, not seen you for ages,” Mr. West was saying. “I never
come to the club. No spirits for anything. My daughter is ill—got a
sort of relapse. The doctors say that she has some trouble on her
mind—must have had a shock. Extraordinary case! She has never
had a care in her life!”
Mr. Wynne made no answer, and looked down.
“She can’t get up any strength, and—and takes no notice of
anything, does not want to recover, and is just fading away!”
“Ah, that’s bad! I suppose you have the best advice that is
possible?”
What a nice, kind fellow Wynne was! When one was in trouble he
quite took it to heart too; he appeared—or was it the bad light—
actually grave and anxious.
“I’m taking her to Sydney, to try the effect of the sea and change;
it’s just a chance—a last chance.”
“And when do you start?” he asked, taking out his handkerchief
and wiping his brow.
“The day after to-morrow, in the Victoria. We go from Tilbury
Docks; as she couldn’t stand the journey across, and, in fact, the
more sea the better. A lady friend is very kindly coming as her
companion, just for the trip; but Madeline and I will not return to
England for a year or two. I’ll see how her native climate will suit
her.”
“Yes; I hope sincerely that it will,” said Wynne. There was an
atmosphere of sympathy in his vicinity that had the effect of
compelling confidences.
“I think the London racketing knocked her up, and I’m never going
to have a town house again. When I come back, I shall buy some
ancient historical mansion, the seat of some old family that have died
out, and restore it. That is, of course, if Madeline——” He left his
listener to fill in the sentence.
“Yes,” rather absently.
“I dare say you’ll be married and settled by the time I see you
again.”
“I am not likely to marry,” he returned quietly.
“Oh yes, yes; I forgot—a widower, eh? And how’s the child? I
always forgot to ask?”
“The child is dead,” he answered gravely.
“Dear me, that’s a pity; children are a terrible anxiety, as I know!
Well, I hope to come across you again, Wynne.”
“I think it very likely that we shall meet again, and very shortly, for I
am going out to Australia myself, almost immediately.”
“No! Oh, I’m delighted to hear it! Law business, of course, with an
immense fee, eh?”
“On most important business, at any rate. And now I’ll say good-
bye for the present, for I have a great deal to do before I start.”
“And I’ve been jawing away about my family affairs and taking up
your precious time! I’m awfully sorry. I say, I wish you could manage
to come out with us in the Victoria. Could you?”
“I’ll do my best.” And he hurried off to wire to Fenchurch Street to
secure a berth.
CHAPTER XLI.
“LAURENCE!”

The Victoria was a crowded ship. There was a large contingent of


Australian passengers, also many Anglo-Indians who changed at
Aden, and a number of society swallows who were bound for Italy
and Egypt. Madeline and Mrs. Leach shared a four-berthed cabin,
and enjoyed the luxury of two spare berths, which served as holdalls
for their belongings. Mrs. Leach had innumerable parcels, bags,
boxes, books, a jewel-case, a tea-basket. She busied herself ere
starting, in fixing up her affairs, and annexed fully three-quarters of
the available space. Madeline was tired, and put on a tea-gown and
lay in her berth languidly watching her partner making her toilette,
arranging her hair, her dress, her rings, ere sallying forth to dinner
and conquest. She looked remarkably handsome, prosperous, and
triumphant as she turned to the wretched girl in the berth, and
surveyed her exhaustively. She had adopted a curious way of staring
at her the last few days—a gaze of polite, half-veiled insolence—that
was distinctly irritating.
“Well, dear Madeline”—the steamer had left the docks, and was
steadily throbbing down the Thames—“so we are off, you see, and I
am of the party—no thanks to you. Oh, I know all about it, dearest,
and I know what you would little guess.”
“What?”
“Ah, no matter,” with a meaning smile.
“No, I suppose it is no matter,” wearily. Nothing mattered, she was
so tired—oh, so tired. She wished she was dead, and she slowly
closed her eyes on her companion.
Mrs. Leach gazed at her in amazement. What she knew did matter
very much. It was all very fine for Madeline to close her eyes, and
waive away a subject. She would discover that she, Flora Leach,
had her in her power—she held her in the hollow of her hand. Luck—
she called it—had dealt her an ace of trumps! People were settling
into their places as Mrs. Leach entered, and there was the usual
confusion in the saloon—incidental to starting. Mr. West had secured
a capital seat, and he and Mrs. Leach dined happily together—and
were generally taken for man and wife. The dinner and wine was
good, the motion almost nil, a mere slight shaking, and the widow
enjoyed herself vastly. Madeline was rather tired, she said;
Josephine was looking after her. A little soup was all she would take.
Should she tell him now? No, the situation was too public, he would
probably shout and make a scene. She would wait for a day or two,
until they had their two deck chairs comfortably drawn up side by
side, under the lee of a cabin, and when the dusk had come and the
stars were out, she would whisper into his ear his daughter’s secret.
When Mrs. Leach retired to her cabin that night, Madeline was
asleep. How pale and wan her face, how thin her hands, she might
be dead—she wished she were. Then she took her bag out of the
bottom berth—she occupied a top one by preference—and
searching in its pockets, got out a letter-case, extracted a letter, and
sat down to read it. It was pleasant reading, to judge by her
expression, and she went over it no less than twice. The motion of
the steamer was not so agreeable; in fact, it was becoming more
remarkable every moment. The things on hooks were getting lively
and beginning to swing. She crushed the note hastily into its
envelope, thrust it into her bag and began to undress as quickly as
possible.
The next morning they were off Dover and the Victoria was rolling
considerably. Mrs. Leach was wretchedly squeamish. She attempted
to rise, she dressed with less than her usual elaboration, and
staggered out into the saloon. Alas! she was too bold; the smell of
fried fish was her undoing, and routed her with great slaughter. She
lay in her berth all day, and all the next day. Also Madeline; but she
was not a prey to Neptune—only so tired—so tired of life, and
everything.
Late in the afternoon, a bustling, talkative stewardess came in
and, willy-nilly, got her up, helped her to dress, put a long cloak
about her, and assisted her upon deck about dusk.
“The air will do you good, miss. You are no more sea-sick than I
am. If you stop in that stuffy cabin, you’ll be real bad, and the
gentleman said as I was to fetch you, if you could stand. There’s a
nice long chair, and cushions and rug, all waiting for you in a
sheltered place.”
And in this chair she soon found herself, whilst her father fussed
round and wrapped her up. The weather was certainly boisterous,
the waves broke over occasionally with a long and vicious swish; but
the air was strong and invigorating, and the pallid girl leant back and
drank it eagerly.
“There are a whole lot of people on board you know, Maddie,” said
Mr. West, sinking into a seat beside her.
“Are there? I am sorry to hear it,” she answered querulously.
“Oh, I say; come, come! and all so anxious to see you again.”
“See me again!” with a weary little laugh, “they won’t know me
when they do see me.”
“There is Lady Stiff-Staff going out to Bombay with her daughters,
and Captain Vansittart, and Miss De Ville, who was at school with
you.”
“Oh, I can’t bear her!” was the petulant reply.
He was about to add, “and Mr. Wynne,” but she could not bear him
either, nor dare he mention that it was Mr. Wynne who had urged
him to get Miss West on deck, at all costs, if she was not sea-sick;
Mr. Wynne who had helped to find a stray corner, and brought up
cushions and rugs (Mr. Wynne who had secretly tipped the
stewardess a sovereign). He was a nice, warm-hearted fellow. He
was glad he was on board (Wynne was a whist player), he liked him.
A pity Maddie had such a prejudice against him.
Mr. West talked on, asked for poor Mrs. Leach. “Josephine, I hear,
is dead,” he remarked, “or says she’s dead. It’s a mercy you are a
good sailor. This bit of a breeze is nothing. Wait till you see how it
blows off the Lewin! And I dare say, once we are round Finisterre, it
will be a mill-pond. Now I’m dying to smoke, and as I know you can’t
stand it, I’ll go for a bit. Shall I ask Lady De la Crême to come and sit
here in my place, and amuse you—eh?”
“Oh no—no. I don’t want any one, I’m going down soon.”
She remained for some time in a half-dreamy state, watching the
sea, the flying wrack of clouds, the somewhat faint and timid young
moon, which occasionally peeped forth. Her eyes had become
accustomed to the dim light, when she was rather surprised, and
annoyed, to see a tall man approach and coolly seat himself in her
father’s chair—which was drawn up alongside, and almost touching
hers. Presently he spoke.
“Madeline,” he whispered, leaning towards her.
“Laurence! Not Laurence?” she exclaimed faintly.
“Yes—I hope you are better?”
“No.” A long pause, and then, in a dead dull tone, she added, “I
hope I am going to die.”
“What is the matter with you?”
“They call it by some long Latin name; but you and I know what it
is.”
“Your father is still in the dark?”
“Yes, it is scarcely worth while to tell him now; no need to worry
him for nothing. When I am dead you will forgive me, Laurence, and
—and think less hardly of me?”
“You are not dead, or going to die, and I prefer to forgive you when
you are alive.”
“And will you—but no, you won’t—you cannot—why should you? I
don’t expect it,” she said in hurried gasps. “What can I do now to
atone?”
“Get better, get quite well, and I will forgive you everything.”
She laughed, a queer little hollow laugh, and then said—
“How strange that you should be on board. Are you going to
Egypt?”
“No—to Sydney.”
“Why? Have you friends there, or business?”
“Both; urgent affairs, and I expect to meet friends. Your father says
he is delighted that I am a fellow-passenger. He likes me.”
“How—how extraordinary!”
“Yes; you do not flatter me. But at least it is fortunate——Well,
now, you will have to go down. It is getting rather chilly.”
“Oh no, no; I like being here. And the cabin is stuffy, and Mrs.
Leach is so—so—such a wretched sailor.”
“Then, I am truly sorry for you. But you really must go. I’ll
guarantee to take you below quite safely.”
“No, no. Papa will——”
“It’s as much as he can do to keep his legs, much less steer
another. But, if you prefer it, I’ll call the stewardess.”
“No; never mind”—rising and staggering, and putting a mere
skeleton hand on his; and, as he supported her tremulous steps, he
realized how fearfully weak she was.
They got downstairs safely, and, as she paused, breathless, for a
moment under the great electric light, they looked into one another’s
faces for the first time since that June morning.
It was all that Wynne could do to repress an exclamation of horror,
as a white, hollow-cheeked spectre raised her sunken, hopeless-
looking eyes to his. Even the doctor’s brother-in-law had not
prepared him for this.
“Stewardess,” he said, as soon as he could control his voice, “take
great care of this lady. Make her eat. Get her some supper at once—
some hot soup and a glass of Burgundy. You must have something
to eat before you turn in.”
“Oh no; I could not,” she protested feebly. “I don’t want anything.”
“Oh yes you do; and you will be sure to come up early to-morrow.
I’ll come and fetch you about eleven o’clock, weather permitting.”
And he walked off, and went on deck to a distant part of the ship,
and leant over the bulwarks alone.
His old feeling for Madeline had come to life. That wasted form,
those tragic eyes had touched him—cut him to the heart. Yes; she
looked as if she was about to follow the child. If she had been to
blame, he himself was not guiltless. He had upbraided her too
bitterly; he had left her to bear her grief alone; he had not made
sufficient allowance for her youth, her natural craving for the
pleasures and delights of girls of her age. The domestic yoke had
been laid upon her childish shoulders, and what a cruel weight it had
proved! Why should he have been astonished that she should be
glad to slip her neck from under it for a year or two! She had no
girlhood. She was endowed with a gay, happy, sun-loving
temperament. He should not have left the telling of their secret in her
hands; he should have spoken to Mr. West himself. He would do so
now, within the next few days. If Madeline was going to die, she
should leave the world as Mrs. Wynne! But, whether she was to live
or die, she should have his incessant care.
Day by day Madeline appeared on deck, and day by day gained
some steady but scarcely perceptible improvement. Mr. Wynne took
much of her father’s attendance off his hands, and left him free to
smoke and gossip and play whist. He arranged her pillows and rugs
in her chair; saw that it was sheltered; talked to her when she was
inclined to talk; told her everything that was likely to amuse her;
brought up, or caused to appear at frequent intervals, soup, grapes,
champagne, tea, arrowroot, and used all his persuasions to induce
her to partake of them. He had an unlimited supply of magazines,
books, and picture-papers, which he read to her when she was
disposed to listen; and, when she had looked them over,
occasionally she fell asleep; and he sat beside her, contemplating
her white and death-like appearance with a countenance to match.
However, every sleep, every smile, was an inch on the road to
recovery. Mr. West was extremely obliged to him for his kind
attentions to his daughter. He himself was very fond of Madeline,
and, naturally most anxious about his only child. But he confessed
that he did not understand sick people, and was no hand at nursing.
He felt doubly grateful to Wynne for his assiduity, and the politeness
and interest with which he listened to his own discourse.
He talked to Wynne confidentially—chiefly about finance. He had
lost some money lately—a good deal more than he liked. But he
never put his eggs into one basket, and had a fair amount in sound
English securities.
Wynne was a steady—well—friend. Mr. West had recently
experienced (and resented) a certain palpable change in the social
temperature. He was no longer flattered, deferred to—or even
listened to—as formerly. He was credited with the loss of most of his
fortune—every one knew he had shares in the “Tom and Jerry” Bank
—and his daughter with the loss of her beauty.
“The Wests didn’t amount to much now,” to quote an American
lady. This conviction made Mr. West extremely wroth. People thought
he was played-out. Whoever was particularly civil to him now he took
to his heart, and kept there.
One evening Laurence made his way into the smoke-room, and
stood looking on at the termination of a rather hard-fought rubber.
His father-in-law was playing. He was, moreover, holding good
cards, and in a state of high jubilation. His partner was Lord de la
Crême. Could this trim, rather jaunty little man, holding the cards he
was about to deal, and laughing a loud, rather forced laugh at one of
his lordship’s good things—i.e. a very middling joke—be a terrible
domestic autocrat? Who would believe it? But Laurence looked
below the surface. That quick, fiery little eye, now beaming so
brightly, told a tale that he could read. It spoke of choler, obstinacy,
of restless ambition, self-seeking, and fury. Madeline, doubtless,
knew the capabilities of that eye, and feared it.
When the whist party had dissolved, and people were gone to their
berths, Mr. West—who was always prepared to sit up—and Wynne
were alone.
“I suppose Madeline went below long ago? You have been looking
after her as usual?”
“Yes, I took her down.”
“That’s all right”—pausing. “Then play a game of écarté. There’s
another half-hour yet before lights-out.”
“No, thanks. The fact is”—seating himself opposite, and squaring
his arms on the table—“I want to have a few words with you.”
“With me? Certainly, certainly”—with a momentary glance of
surprise. “About those investments?”
“No; it’s a more personal matter. You”—hesitating for a second
—“have seemed to like me, Mr. West.”
“Seemed! Why, I don’t know a single young fellow that I like as
well. You are clever, you are good company, you are making yourself
a name. I only wish I had a son like you!”
CHAPTER XLII.
WON ALREADY.

“Then, what would you think of taking me for a son-in-law?” said


Mr. Wynne, fixing his dark eyes steadily on the little man opposite to
him, who was busily shuffling the cards.
“Eh!” was his only reply for quite a long time—an “eh!” incredulous,
indignant, and yet not wholly combative—a long, sonorous
exclamation. “Personally I like you, Wynne—could not like you
better; but”—and he paused—“Madeline is my only child; she is
remarkably handsome—was, I should say for the present—and
created quite a sensation in town. You are a very good fellow, and a
gentleman, but don’t be offended if I confess that I am looking higher
for her. I expect the man she marries to place a coronet on her head,
and you must admit that she will grace it!”
Laurence Wynne said nothing, merely nodded his assent, and his
companion—who loved the sound of his own voice—resumed
volubly.
“Besides, Wynne, you are a widower! And she does not like you;
it’s all very well when she is ill and helpless, and tolerates you; it’s
truest kindness to tell you—and, indeed, you must see it yourself!
You have no idea the iceberg she can be. I often wonder who she is
waiting for, or what she expects?”
“Look here, Mr. West, I can quite understand your views. Mad—I
mean Miss West—would, of course, grace a coronet, as you say, but
let me tell you that we Wynnes, of Rivals Wynne, have bluer blood in
our veins than any of the mushroom titles of the last two hundred
years. You will see, if you look in Burke, that we were at home before
the Normans came over. We were Saxons, and still a power in the
land. Our family title is extinct; but it only wants money to restore it. I
have relations who—like some relations—turned away their faces

You might also like