Академический Документы
Профессиональный Документы
Культура Документы
CHAPTER 4
Network Protocols and Routing������������������������������������������������������� 171
TCP/IP Core Protocols����������������������������������������������������������������������������������������� 172
TCP (Transmission Control Protocol)������������������������������������������������������������� 174
UDP (User Datagram Protocol)������������������������������������������������������������������������ 181
IP (Internet Protocol)���������������������������������������������������������������������������������������182
ICMP (Internet Control Message Protocol)�����������������������������������������������������188
ARP (Address Resolution Protocol) on IPv4 Networks���������������������������������� 190
Ethernet��������������������������������������������������������������������������������������������������������� 190
Routers and How They Work����������������������������������������������������������������������������� 195
Multilayer Switches����������������������������������������������������������������������������������������198
Routing Tables������������������������������������������������������������������������������������������������198
Routing Path Types�����������������������������������������������������������������������������������������201
The route Command�������������������������������������������������������������������������������������201
Routing Metrics�����������������������������������������������������������������������������������������������201
Routing Protocols to Determine Best Paths�������������������������������������������������� 202
Interior and Exterior Gateway Protocols������������������������������������������������������� 203
Troubleshooting Route Issues��������������������������������������������������������������������������� 206
Troubleshooting Tools����������������������������������������������������������������������������������� 207
Solving Common Routing Problems�������������������������������������������������������������� 213
Chapter Summary����������������������������������������������������������������������������������������������� 216
Key Terms�������������������������������������������������������������������������������������������������������������� 217
Review Questions������������������������������������������������������������������������������������������������ 218
Hands-On Projects����������������������������������������������������������������������������������������������� 219
CHAPTER 5
Network Cabling����������������������������������������������������������������������������������������� 233
Transmission Basics�������������������������������������������������������������������������������������������� 234
Throughput and Bandwidth���������������������������������������������������������������������������235
Transmission Flaws��������������������������������������������������������������������������������������� 236
Duplex, Half-Duplex, and Simplex��������������������������������������������������������������� 238
Multiplexing��������������������������������������������������������������������������������������������������� 239
Copper Cable�������������������������������������������������������������������������������������������������������� 241
Twisted-Pair Cable����������������������������������������������������������������������������������������� 244
STP (Shielded Twisted Pair)��������������������������������������������������������������������������� 247
UTP (Unshielded Twisted Pair)���������������������������������������������������������������������� 248
Comparing STP and UTP�������������������������������������������������������������������������������� 249
Cable Pinouts������������������������������������������������������������������������������������������������� 249
PoE (Power over Ethernet)����������������������������������������������������������������������������� 259
Ethernet Standards for Twisted-Pair Cable����������������������������������������������������261
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii Table of Contents
CHAPTER 6
Wireless Networking�������������������������������������������������������������������������������� 303
Characteristics of Wireless Transmissions������������������������������������������������������ 304
The Wireless Spectrum���������������������������������������������������������������������������������� 305
Channel Management�����������������������������������������������������������������������������������306
Antennas�������������������������������������������������������������������������������������������������������� 307
Signal Propagation�����������������������������������������������������������������������������������������309
Wireless Standards for the IoT (Internet of Things)�������������������������������������� 312
ZigBee�������������������������������������������������������������������������������������������������������������� 313
Z-Wave������������������������������������������������������������������������������������������������������������314
Bluetooth�������������������������������������������������������������������������������������������������������� 315
ANT1��������������������������������������������������������������������������������������������������������������316
RFID (Radio Frequency Identification)�����������������������������������������������������������318
NFC (Near-Field Communication)����������������������������������������������������������������� 320
Wireless USB��������������������������������������������������������������������������������������������������� 321
IR (Infrared)����������������������������������������������������������������������������������������������������� 321
802.11 WLAN Standards������������������������������������������������������������������������������������� 323
Access Method������������������������������������������������������������������������������������������������325
Association�����������������������������������������������������������������������������������������������������327
IEEE 802.11 Frames����������������������������������������������������������������������������������������� 330
802.11 Innovations������������������������������������������������������������������������������������������ 331
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents ix
CHAPTER 7
Virtualization and Cloud Computing��������������������������������������������� 371
Virtualization�������������������������������������������������������������������������������������������������������� 373
Network Connection Types��������������������������������������������������������������������������� 376
Pros and Cons of Virtualization��������������������������������������������������������������������� 383
NFV (Network Functions Virtualization)������������������������������������������������������� 385
SDN (Software-Defined Networking)������������������������������������������������������������ 386
Cloud Computing������������������������������������������������������������������������������������������������� 389
Cloud Computing Categories��������������������������������������������������������������������������391
Deployment Models�������������������������������������������������������������������������������������� 394
Cloud Connectivity and Security������������������������������������������������������������������� 395
Encryption Protocols������������������������������������������������������������������������������������������� 396
Key Encryption���������������������������������������������������������������������������������������������� 397
IPsec (Internet Protocol Security)������������������������������������������������������������������ 399
SSL (Secure Sockets Layer) and TLS (Transport Layer Security)������������������ 400
Remote Access����������������������������������������������������������������������������������������������������� 403
Point-to-Point Remote Access Protocols������������������������������������������������������ 405
Terminal Emulation���������������������������������������������������������������������������������������406
VPNs (Virtual Private Networks)��������������������������������������������������������������������412
VPN Tunneling Protocols������������������������������������������������������������������������������� 416
Remote Access Policies�����������������������������������������������������������������������������������418
Chapter Summary����������������������������������������������������������������������������������������������� 418
Key Terms�������������������������������������������������������������������������������������������������������������� 421
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
x Table of Contents
CHAPTER 8
Subnets and VLANs����������������������������������������������������������������������������������� 435
Network Segmentation�������������������������������������������������������������������������������������� 436
Subnets������������������������������������������������������������������������������������������������������������������ 438
How Subnet Masks Work������������������������������������������������������������������������������440
CIDR (Classless Interdomain Routing)����������������������������������������������������������444
IPv4 Subnet Calculations�������������������������������������������������������������������������������444
Subnet Mask Tables��������������������������������������������������������������������������������������� 450
Subnetting Questions on Exams������������������������������������������������������������������� 452
Implement Subnets��������������������������������������������������������������������������������������� 455
VLSM (Variable Length Subnet Mask)����������������������������������������������������������� 457
Subnets in IPv6����������������������������������������������������������������������������������������������460
VLANs (Virtual Local Area Networks)��������������������������������������������������������������� 462
Managed Switches����������������������������������������������������������������������������������������� 464
Switch Ports and Trunks�������������������������������������������������������������������������������� 467
VLANs and Subnets��������������������������������������������������������������������������������������� 469
Types of VLANs��������������������������������������������������������������������������������������������� 470
View Configured VLANs���������������������������������������������������������������������������������471
Troubleshoot and Secure VLANs������������������������������������������������������������������� 473
Chapter Summary����������������������������������������������������������������������������������������������� 474
Key Terms�������������������������������������������������������������������������������������������������������������� 475
Review Questions������������������������������������������������������������������������������������������������ 476
Hands-On Projects����������������������������������������������������������������������������������������������� 477
CHAPTER 9
Network Risk Management����������������������������������������������������������������� 497
Security Risks������������������������������������������������������������������������������������������������������� 499
People Risks��������������������������������������������������������������������������������������������������� 501
Technology Risks������������������������������������������������������������������������������������������� 503
Malware Risks������������������������������������������������������������������������������������������������ 508
Security Assessment������������������������������������������������������������������������������������������� 511
Scanning Tools������������������������������������������������������������������������������������������������ 512
Honeypots and Honeynets�����������������������������������������������������������������������������514
Physical Security�������������������������������������������������������������������������������������������������� 515
Prevention Methods��������������������������������������������������������������������������������������� 515
Detection Methods�����������������������������������������������������������������������������������������518
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xi
CHAPTER 10
Security in Network Design����������������������������������������������������������������� 553
Network Security Devices���������������������������������������������������������������������������������� 554
Proxy Servers��������������������������������������������������������������������������������������������������555
ACLs (Access Control Lists) on Network Devices�������������������������������������������557
Firewalls��������������������������������������������������������������������������������������������������������� 559
IDS (Intrusion Detection System)������������������������������������������������������������������ 566
IPS (Intrusion Prevention System)���������������������������������������������������������������� 568
SIEM (Security Information and Event Management)��������������������������������� 569
Switch Management������������������������������������������������������������������������������������������� 570
Switch Path Management������������������������������������������������������������������������������� 571
Switch Port Security����������������������������������������������������������������������������������������574
AAA (Authentication, Authorization, and Accounting)��������������������������������� 575
Authentication����������������������������������������������������������������������������������������������� 576
Authorization������������������������������������������������������������������������������������������������� 580
Accounting����������������������������������������������������������������������������������������������������� 582
NAC (Network Access Control) Solutions������������������������������������������������������ 583
Access Control Technologies����������������������������������������������������������������������������� 584
Directory Services������������������������������������������������������������������������������������������ 584
Kerberos��������������������������������������������������������������������������������������������������������� 586
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xii Table of Contents
CHAPTER 11
Network Performance and Recovery�������������������������������������������� 615
Collecting Network Data������������������������������������������������������������������������������������ 617
Monitoring Tools��������������������������������������������������������������������������������������������617
System and Event Logs���������������������������������������������������������������������������������� 622
SNMP Logs����������������������������������������������������������������������������������������������������� 625
Performance Baselines���������������������������������������������������������������������������������� 629
Managing Network Traffic��������������������������������������������������������������������������������� 631
Traffic Management����������������������������������������������������������������������������������������631
QoS (Quality of Service) Assurance��������������������������������������������������������������� 633
Network Availability�������������������������������������������������������������������������������������������� 635
Fault Tolerance���������������������������������������������������������������������������������������������� 637
Data Backup and Storage������������������������������������������������������������������������������� 645
Power Management��������������������������������������������������������������������������������������� 653
Response and Recovery������������������������������������������������������������������������������������� 659
Incident Response Policies����������������������������������������������������������������������������660
Disaster Recovery Planning��������������������������������������������������������������������������� 661
Disaster Recovery Contingencies������������������������������������������������������������������ 662
Data Preservation������������������������������������������������������������������������������������������ 663
Chapter Summary����������������������������������������������������������������������������������������������� 665
Key Terms�������������������������������������������������������������������������������������������������������������� 667
Review Questions������������������������������������������������������������������������������������������������ 668
Hands-On Projects����������������������������������������������������������������������������������������������� 669
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xiii
CHAPTER 12
Wide Area Networks�������������������������������������������������������������������������������� 677
WAN Essentials����������������������������������������������������������������������������������������������������� 679
Data Transfer Methods����������������������������������������������������������������������������������680
Troubleshooting an Internet Connection������������������������������������������������������ 684
Layer 1 WAN Technologies��������������������������������������������������������������������������������� 686
PSTN (Public Switched Telephone Network)������������������������������������������������� 689
DSL (Digital Subscriber Line)������������������������������������������������������������������������� 694
Cable Broadband�������������������������������������������������������������������������������������������� 698
Metro (Metropolitan) Ethernet�����������������������������������������������������������������������701
T-Carriers������������������������������������������������������������������������������������������������������� 702
SONET (Synchronous Optical Network)��������������������������������������������������������706
Layer 2 WAN Technologies��������������������������������������������������������������������������������� 709
Frame Relay��������������������������������������������������������������������������������������������������� 710
ATM (Asynchronous Transfer Mode)������������������������������������������������������������� 711
MPLS (Multiprotocol Label Switching)�����������������������������������������������������������712
Wireless WANs������������������������������������������������������������������������������������������������������ 714
Cellular������������������������������������������������������������������������������������������������������������714
Satellite����������������������������������������������������������������������������������������������������������� 717
Chapter Summary����������������������������������������������������������������������������������������������� 720
Key Terms�������������������������������������������������������������������������������������������������������������� 722
Review Questions������������������������������������������������������������������������������������������������ 723
Hands-On Projects����������������������������������������������������������������������������������������������� 724
appendix a
CompTIA Network1 N10-007 Certification Exam
Objectives.........................................�������������������������������������������735
appendix b
Visual Guide to Connectors�����������������������������������������������������753
appendix c
CompTIA Network1 Practice Exam���������������������������������������757
GLOSSARY������������������������������������������������������������������������������������������������������������ 781
INDEX��������������������������������������������������������������������������������������������������������������������� 817
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface
Knowing how to install, configure, and troubleshoot a computer
network is a highly marketable and exciting skill. This book first
introduces the fundamental building blocks that form a modern
network, such as hardware, topologies, and protocols, along
with an introduction to the OSI model. It then provides in-depth
coverage of the most important concepts in contemporary net-
working, such as TCP/IP, Ethernet, wireless transmission, virtual
networks, cloud computing, segmentation, security, and trou-
bleshooting. After reading this book and completing the end-of-
chapter exercises, you will be prepared to select the network
design, hardware, and software that best fits your environment.
You will also have the skills to build a network from scratch
and maintain, upgrade, troubleshoot, and manage an existing
network. Finally, you will be well-prepared to pass CompTIA’s
Network+ N10-007 certification exam.
This book explains technical concepts logically and in a
clear, approachable style. In addition, concepts are reinforced by
real-world examples of networking issues from a professional’s
standpoint. Each chapter opens with an “On the Job” story
from a network engineer, technician, or administrator. These
real-world examples, along with Applying Concepts activities,
Hands-On Projects, and Capstone Projects in each chapter, make
this text a practical learning tool. The numerous tables and color
illustrations, along with the glossary, appendices, and study
questions, make the text a valuable reference for any network-
ing professional.
Intended Audience
This text is intended to serve the needs of students and profes-
sionals who are interested in mastering fundamental, vendor-
independent networking concepts. No previous network-
ing experience is necessary to begin learning from this text,
although knowledge of basic computer principles is helpful.
Those seeking to pass CompTIA’s Network+ certification exam
will find the text’s content, approach, and numerous study ques-
tions especially helpful. For more information on CompTIA®
Network+ certification, visit CompTIA’s website at comptia.org.
xv
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xvi Preface
The text’s pedagogical features are designed to provide a truly interactive learn-
ing experience, preparing you for the challenges of the highly dynamic networking
industry. In addition to the information presented in the text, each chapter includes
Applying Concepts activities and Hands-On Projects that guide you through software
and hardware configuration in a step-by-step fashion. At the end of each chapter, you
will also find Capstone Projects that place you in the role of network admin, requiring
you to apply concepts presented in the chapter in various virtualized and emulated
environments.
Chapter Descriptions
The following list summarizes the topics covered in each chapter of this book:
Chapter 1, “Introduction to Networking,” begins by answering the question “What
is a network?” Next, it presents the fundamental types of networks and describes the
devices and topologies that create a network. This chapter also introduces the OSI
model, best practices for safety when working with networks, and the seven-step
troubleshooting model.
Chapter 2, “Network Infrastructure and Documentation,” begins with a tour
through a campus network’s data rooms, from the ISP’s entry point through to the
users’ endpoints. The chapter introduces best practices for managing network and
cabling equipment, and explains issues related to managing the environment in which
networking equipment operates. This chapter also describes characteristics of network
documentation, and explains how to create a network diagram that can be used in net-
work troubleshooting. It ends with a discussion on how to create and follow appropri-
ate change management procedures in an enterprise network environment.
Chapter 3, “Addressing on Networks,” describes addressing standards used by
devices on a network at various layers of the OSI model, including MAC addresses at
the Data Link layer, IP addresses at the Network layer, and ports and sockets at the
Transport layer. It also explains how host names and domain names work. The chapter
concludes with an introduction to commands used in troubleshooting networks.
Chapter 4, “Network Protocols and Routing,” describes the functions of the core
TCP/IP protocols, including the common IPv4 and IPv6 routing protocols. The chapter
explores in-depth how routers work and how various internal and external gateway
protocols select and manage routes between networks. It also explains multiple TCP/IP
utilities used for network discovery and troubleshooting.
Chapter 5, “Network Cabling,” discusses basic data transmission concepts, includ-
ing throughput, bandwidth, multiplexing, and common transmission flaws. Next, it
describes copper cables, fiber-optic cables, and Ethernet standards, comparing the
benefits and limitations of different networking media. The chapter then concludes
with an examination of common cable problems and the tools used for troubleshoot-
ing those problems.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xvii
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xviii Preface
The three appendices at the end of this book serve as references for the networking
professional:
Appendix A, “CompTIA Network+ N10-007 Certification Exam Objectives,” pro-
vides a complete list of the latest CompTIA Network+ certification exam objectives,
including the percentage of the exam’s content that each domain represents and which
chapters and sections in the text cover material associated with each objective.
Appendix B, “Visual Guide to Connectors,” provides a visual connector reference chart
for quick identification of connectors and receptacles used in contemporary networking.
Appendix C, “CompTIA Network+ Practice Exam,” offers a practice exam contain-
ing 100 questions similar in content and presentation to the multiple-choice questions
you will find on CompTIA’s Network+ examination.
Features
To aid you in fully understanding networking concepts, this text includes many fea-
tures designed to enhance your learning experience.
• O n the Job stories—Each chapter begins with a real-world story giving context for
the technology and concepts presented, providing insight into a variety of mod-
ern computing environments from the various perspectives of many different
professionals in the IT industry.
• Chapter Objectives—Each chapter lists the concepts to be mastered within that
chapter. This list serves as a quick reference to the chapter’s contents and a use-
ful study aid.
• Applying Concepts activities—Embedded within each chapter are activities with
step-by-step instructions to help you apply concepts as you learn them.
• Colorful illustrations, photos, tables, and bullet lists—Numerous full-color illustra-
tions and photos of network media, protocol behavior, hardware, topology, soft-
ware screens, peripherals, and components help you visualize common network
elements, theories, and concepts. In addition, the many tables and bulleted lists
provide details and comparisons of both practical and theoretical information.
• OSI layer icons—These icons provide visual reinforcement of the link between
concepts and the relevant layers of the OSI model. A thorough understanding
of where concepts sit on the OSI model makes managing and troubleshooting
networks more effective and efficient.
• CompTIA Network+ Exam Tips and Notes—Each chapter’s content is supplement-
ed with Note features that provide additional insight and understanding, while
CompTIA Network+ Exam Tips guide you in your preparations for taking the
CompTIA Network+ certification exam.
• Legacy Networking features—Older technology covered by the CompTIA Net-
work+ exam provides historical reference to current technology.
• Key Terms and Glossary—Highlighted key terms emphasize the core concepts of
networking and are defined in the convenient Glossary.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xix
• Capstone Projects at the end of each chapter challenge you to explore concepts
and apply skills with real-world tools. Many Capstone Projects employ Cisco’s
network simulator, Packet Tracer, so you can practice setting up a network from
start to finish, including device configuration, subnetting, and extensive use of
the command line.
• Supplemental steps in many projects guide you in creating a customized wiki to
document information learned and projects completed. The final project gives
tips for organizing this wiki as a way to display your new skills for job interviews.
Note
The Note icon draws your attention to helpful material related to the subject being
described.
7 APPLICATION
OSI model icons highlight the specific layer(s) of the OSI model
6 PRESENTATION
being discussed, and indicate when the layers of interest change 5 SESSION
throughout the chapter. 4 TRANSPORT
3 NETWORK
2 DATA LINK
1 PHYSICAL
Hands-On Projects
Each Hands-On Project in this book is preceded by a description of the project. Hands-On
Projects help you understand the theory behind networking with activities using the latest
network software and hardware.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xxi
Capstone Projects
Capstone Projects are more in-depth assignments that require a higher level of concept
application. They challenge you to demonstrate a solid understanding and application
of skills required for the CompTIA Network+ exam and a career in networking.
Certification
ach main section of a chapter begins with a list of all relevant CompTIA Network+
E
objectives covered in that section. This unique feature highlights the important
information at a glance and helps you better anticipate how deeply you need to
understand the concepts covered.
Instructor’s Materials
The instructor’s materials provide everything you need for your course in one place.
This collection of book-specific lecture and class tools is available online. Please visit
login.cengage.com and log in to access instructor-specific resources on the Instructor
Companion Site, which includes the Instructor’s Manual, Solutions Manual, test cre-
ation tools, PowerPoint Presentations, Syllabus, and figure files.
• Electronic Instructor’s Manual. The Instructor’s Manual that accompanies
this textbook provides additional instructional materials to assist in class
preparation, including suggestions for lecture topics.
• Solutions Manual. The instructor’s resources include solutions to all
end-of-chapter material, including review questions and projects.
• Cengage Testing Powered by Cognero. This flexible, online system allows you to
do the following:
❍❍ Author, edit, and manage test bank content from multiple Cengage solutions.
❍❍ Create multiple test versions in an instant.
Deliver tests from your LMS, your classroom, or wherever you want.
❍❍
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxii Preface
MindTap
MindTap for West/Andrews/Dean’s Network+ Guide to Networks, Eighth Edition is
a personalized, fully online digital learning platform of content, assignments, and
services that engages students and encourages them to think critically, while allowing
you to easily set your course through simple customization options. MindTap is
designed to help students master the skills they need in today’s workforce. Research
shows employers need critical thinkers, troubleshooters, and creative problem solvers
to stay relevant in our fast paced, technology-driven world.
MindTap helps you achieve this with assignments and activities that provide
hands-on practice, real-life relevance, and certification test prep. Students are guided
through assignments that help them master basic knowledge and understanding
before moving on to more challenging problems.
The live virtual machine labs provide real-life application and practice as well
as more advanced learning. Students work in a live environment via the Cloud
with real servers and networks that they can explore. Traditional labs using school
computers, networks, hardware, and other tools are included as interactive PDF files.
These traditional labs tackle hands-on skills, troubleshooting, critical thinking, and
strategies for designing and implementing new and upgraded networks in real-life
environments. The IQ certification testprep engine allows students to quiz themselves
on specific exam domains, and the pre- and post-course assessments measure exactly
how much they have learned. Readings, lab simulations, capstone projects, and
whiteboard videos support the lecture, while “In the News” assignments encourage
students to stay informed of current developments in the networking and IT industries.
MindTap is designed around learning objectives and provides the analytics and
reporting to easily see where the class stands in terms of progress, engagement, and
completion rates. Use the content and learning path as is or pick and choose how our
materials will wrap around yours.
Students can access eBook content in the MindTap Reader, which offers
highlighting, note-taking, search and audio (students can listen to text), as well as
mobile access. Learn more at http://www.cengage.com/mindtap/.
Instant Access Code: (ISBN: 9781337569415)
Printed Access Code: (ISBN: 9781337569422)
Bloom’s Taxonomy
Bloom’s Taxonomy is an industry-standard classification system used to help identify
the level of ability that learners need to demonstrate proficiency. It is often used to
classify educational learning objectives into different levels of complexity. Bloom’s
Taxonomy reflects the “cognitive process dimension.” This represents a continuum of
increasing cognitive complexity, from remember (lowest level) to create (highest level).
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xxiii
There are six categories in Bloom’s Taxonomy as seen in Figure A. In all instances,
the level of coverage for each domain in Network+ Guide to Networks, Eighth Edition
meets or exceeds the Bloom’s Taxonomy level indicated by CompTIA for that objective.
See Appendix A for more detail.
Bloom’s Taxonomy
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxiv Preface
Certifications
Different levels of education are required for the many jobs in the IT industry. While
the level of education and type of training required varies from employer to employer,
the need for qualified technicians remains a constant. As technology changes and ad-
vances in the industry evolve, many employers prefer candidates who already have the
skills to implement these new technologies. Traditional degrees and diplomas do not
identify the skills that a job applicant possesses. Companies are relying increasingly
on technical certifications to adequately identify the quality and skill qualifications of
a job applicant, and these certifications can offer job seekers a competitive edge over
their competition.
Certifications fall into one of two categories:
• Vendor-neutral certifications are those that test for the skills and knowledge
required in specific industry job roles and do not subscribe to a vendor’s specific
technology solutions. Some examples of vendor-neutral certifications include
all of the CompTIA certifications (comptia.org), Project Management Institute’s
certifications (pmi.org), and ISACA’s certifications (isaca.org).
• Vendor-specific certifications validate the skills and knowledge necessary to
be successful while utilizing a specific vendor’s technology solution. Some
examples of vendor-specific certifications include those offered by Microsoft
(microsoft.com), Red Hat (redhat.com), Oracle (education.oracle.com), and Cisco
(learningnetwork.cisco.com).
As employers struggle to fill open IT positions with qualified candidates, certifica-
tions are a means of validating the skill sets necessary to be successful within orga-
nizations. In most careers, salary and compensation are determined by experience
and education, but in the IT field, the number and type of certifications an employee
earns also determine salary and wage increases. For example, according to CompTIA,
the U.S. Department of Defense and companies such as Apple, Cisco, Dell, HP, and
Intel recommend or require their networking technicians attain CompTIA Network+
certification. Global Knowledge Training reports that certified IT staff earn, on average,
$8,400 or 11.7 percent more than non-certified IT staff. According to the same report,
nearly two-thirds of IT professionals in networking reported pursuing additional train-
ing in 2016 for the purpose of obtaining additional certifications.
Certification provides job applicants with more than just a competitive edge over
their noncertified counterparts competing for the same IT positions. Some institutions
of higher education grant college credit to students who successfully pass certification
exams, moving them further along in their degree programs. Certification also gives
individuals who are interested in careers in the military the ability to move into higher
positions more quickly.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xxv
Becoming a
CompTIA Certified
IT Professional is Easy
It’s also the best way to reach greater
professional opportunities and rewards.
© 2015 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such programs are
operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names
mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written consent
of CompTIA2019
Copyright Properties,
CengageLLC. Printed in theAll
Learning. U.S.Rights
02190-Nov2015
Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxvi Preface
Career Planning
Finding a career that fits a person’s personality, skill set, and lifestyle is challenging and
fulfilling, but can often be difficult. What are the steps individuals should take to find
that dream career? Is IT interesting to you? Chances are, if you are reading this book,
this question has already been answered. What is it about IT that you like? The world
of work options in the IT industry is vast. Some questions to ask yourself: Are you a
person who likes to work alone, or do you like to work in a group? Do you like speaking
directly with customers, or do you prefer to stay behind the scenes? Does your lifestyle
encourage a lot of travel, or do you need to stay in one location? All these factors influ-
ence your job decisions. Inventory assessments are a good first step to learning more
about yourself, your interests, work values, and abilities. A variety of websites can offer
assistance with career planning and assessments.
Domain % of Examination
Domain 1.0 Networking Concepts 23%
Domain 2.0 Infrastructure 18%
Domain 3.0 Network Operations 17%
Domain 4.0 Network Security 20%
Domain 5.0 Network Troubleshooting and Tools 22%
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xxvii
currently teaches at Georgia Northwestern Technical College, and she has over a decade’s
experience working with Jean Andrews in textbook and digital content development, co-
authoring Network+ Guide to Networks, Eighth Edition, A+ Guide to IT Technical Support,
Ninth Edition, and the Lab Manual for A+ Guide to Hardware, Ninth Edition. Jill and her
husband Mike live in northwest Georgia where they homeschool their four children.
Jean Andrews has more than 30 years of experience in the computer industry,
including more than 13 years in the college classroom. She has worked in a variety of
businesses and corporations designing, writing, and supporting application software;
managing a PC repair help desk; and troubleshooting wide area networks. She has
written numerous books on software, hardware, and the Internet, including the best-
selling A+ Guide to IT Technical Support, Ninth Edition, A+ Guide to Hardware, Ninth
Edition, and A+ Guide to Software, Ninth Edition. She lives in northern Georgia.
Tamara Dean has worked in the field of networking for nearly 20 years, most re-
cently as a networking consultant, and before that, as the manager of Internet services
and data center operations for a regional ISP. She has managed LANs at the University
of Wisconsin and at a pharmaceutical firm, worked as a telecommunications analyst
for the FCC, and cofounded a local radio station. Well published in networking, Ms.
Dean also authored Guide to Telecommunications Technology for Cengage Learning.
Acknowledgments
It’s stunning to see how many people contribute to the creation of a textbook.
We’re privileged and humbled to work with an amazing team of folks who consis-
tently demonstrate professionalism and excellence. First, thank you to Ann Shaffer,
Developmental Editor, for smoothing out awkward phrases, encouraging us through
long nights and intense deadlines, and suggesting good movies to look forward to after
the book is finished. Thank you to Michelle Ruelos Cannistraci, Senior Content De-
veloper, for steady and attentive leadership. Thank you to Brooke Greenhouse, Senior
Content Project Manager, for your flexibility and commitment to excellence. Thank you
to Amy Savino, Associate Product Manager, for your enthusiastic vision and support.
Thank you to all of the following for your attention to detail, resourceful solutions, and
creative ideas: Kristin McNary, Product Team Manager; Jake Toth, Product Assistant;
and Cassie Cloutier, Associate Marketing Manager. A special thanks to John Freitas,
Technical Editor, for your careful review of the entire manuscript.
Many more people contributed time, expertise, and advice during the course of
this revision. Every contribution has made this book better than it would have been
without your help. Thank you to Jeffrey Johnson, Georgia Northwestern Technical
College, for the enlightening tour and computer geek chit-chat. Thank you to Robert
Wilson, McCallie School, for the continued tours, stories, and insights. And thanks
to all the amazing instructors who have attended our Network+ training sessions
and shared their thoughts, creativity, ideas, and concerns. Thank you to each of the
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxviii Preface
reviewers who, driven by your dedication to high-quality education for your students,
contributed a great deal of expertise, constantly challenging us to higher levels of
insight, accuracy, and clarity. Specifically, thank you to:
To the instructors and learners who use this book, we invite and encourage you to
send suggestions or corrections for future editions. Please write to us at jillwestauthor@
gmail.com. We never ignore a good idea! And to instructors, if you have ideas that help
make a class in CompTIA Network+ preparation a success, please share your ideas with
other instructors!
Dedication
This book is dedicated to the covenant of God with man on earth.
Jill West
Jean Andrews, Ph.D.
I’d like to say a personal thank you to my kiddos, Jessica, Sarah, Daniel, and Zack:
Thank you for your patience and your hugs and kisses during the long work hours. To
my husband, Mike: You mean the world to me. This is your accomplishment, too.
Jill West
Cisco’s Packet Tracer is now available free to the public. Instructions for download-
ing and installing Packet Tracer are given in the first Packet Tracer project in Chapter 6.
Abbreviated instructions are also repeated here for convenience, as some instructors
might want to preview the emulator:
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1
Introduction
to Networking
After reading this chapter and completing the exercises,
you will be able to:
Distinguish between client-server and peer-to-peer networks
Explain best practices for safety when working with networks and
computers
On the Job
I work as a contractor for an organization that uses specialized software to project an image
on three screens for a weekly event. The computer is connected to a multimedia transmitter
that communicates with receivers connected to each projector. In addition, the projectors
are connected via twisted-pair cables and a router so they can be turned on/off from the
computer. The configuration had been working well for several years.
Then suddenly one of the screens began to flicker randomly. I checked the software
preferences, display settings, and cable connections. Everything appeared to be correct. The
next week, the random flicker appeared more frequently. Again, I checked the software and
cabling. The following week, the random flicker persisted and the frequency increased. I had
to turn off the projector because the flicker was so distracting.
1
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
2 CHAPTER 1 Introduction to Networking
I contacted the company that installed the video system and asked them to perform
some hardware troubleshooting. They checked each receiver and transmitter. In addition to
checking the software, they connected an I-Pad directly to the problematic projector. After
testing several videos, they determined that the projector’s HDMI port had gone bad. The
projector had to be replaced. Once the new projector was installed, the flickering problem
was no longer an issue.
Angela Watkins
Instructor, Computer and Engineering Technology
Spartanburg Community College
Network Models
Certification
1.5 C
ompare and contrast the characteristics of network topologies,
types, and technologies.
A topology describes how the parts of a whole work together. When studying
networking, you need to understand both the physical topology and the logical
topology of a network:
• physical topology—Mostly refers to a network’s hardware and how computers,
other devices, and cables fit together to form the physical network.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1 Introduction to Networking 3
1. Search for information about the NOS and write down a short description based on
your findings.
2. Search for images of screenshots for the NOS. What are some major elements that you
notice on these screens?
3. Find one or two introductory videos for each NOS and watch the videos. What are some
similarities between the NOSes? What are some of the differences?
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
4 CHAPTER 1 Introduction to Networking
macOS
Scanner
Network printer
Figure 1-1 In a peer-to-peer network, no computer has more
authority than another; each computer controls its own resources, and
communicates directly with other computers
Note
When looking at the diagrams in Figure 1-1 and later in Figure 1-2, keep in mind that the
connecting lines describe the logical arrangement or topology of the group of computers, as
opposed to the physical arrangement. The physical arrangement in both diagrams may be the
same, but the method the OSes use to logically connect differs.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Another random document with
no related content on Scribd:
DANCE ON STILTS AT THE GIRLS’ UNYAGO, NIUCHI
I see increasing reason to believe that the view formed some time
back as to the origin of the Makonde bush is the correct one. I have
no doubt that it is not a natural product, but the result of human
occupation. Those parts of the high country where man—as a very
slight amount of practice enables the eye to perceive at once—has not
yet penetrated with axe and hoe, are still occupied by a splendid
timber forest quite able to sustain a comparison with our mixed
forests in Germany. But wherever man has once built his hut or tilled
his field, this horrible bush springs up. Every phase of this process
may be seen in the course of a couple of hours’ walk along the main
road. From the bush to right or left, one hears the sound of the axe—
not from one spot only, but from several directions at once. A few
steps further on, we can see what is taking place. The brush has been
cut down and piled up in heaps to the height of a yard or more,
between which the trunks of the large trees stand up like the last
pillars of a magnificent ruined building. These, too, present a
melancholy spectacle: the destructive Makonde have ringed them—
cut a broad strip of bark all round to ensure their dying off—and also
piled up pyramids of brush round them. Father and son, mother and
son-in-law, are chopping away perseveringly in the background—too
busy, almost, to look round at the white stranger, who usually excites
so much interest. If you pass by the same place a week later, the piles
of brushwood have disappeared and a thick layer of ashes has taken
the place of the green forest. The large trees stretch their
smouldering trunks and branches in dumb accusation to heaven—if
they have not already fallen and been more or less reduced to ashes,
perhaps only showing as a white stripe on the dark ground.
This work of destruction is carried out by the Makonde alike on the
virgin forest and on the bush which has sprung up on sites already
cultivated and deserted. In the second case they are saved the trouble
of burning the large trees, these being entirely absent in the
secondary bush.
After burning this piece of forest ground and loosening it with the
hoe, the native sows his corn and plants his vegetables. All over the
country, he goes in for bed-culture, which requires, and, in fact,
receives, the most careful attention. Weeds are nowhere tolerated in
the south of German East Africa. The crops may fail on the plains,
where droughts are frequent, but never on the plateau with its
abundant rains and heavy dews. Its fortunate inhabitants even have
the satisfaction of seeing the proud Wayao and Wamakua working
for them as labourers, driven by hunger to serve where they were
accustomed to rule.
But the light, sandy soil is soon exhausted, and would yield no
harvest the second year if cultivated twice running. This fact has
been familiar to the native for ages; consequently he provides in
time, and, while his crop is growing, prepares the next plot with axe
and firebrand. Next year he plants this with his various crops and
lets the first piece lie fallow. For a short time it remains waste and
desolate; then nature steps in to repair the destruction wrought by
man; a thousand new growths spring out of the exhausted soil, and
even the old stumps put forth fresh shoots. Next year the new growth
is up to one’s knees, and in a few years more it is that terrible,
impenetrable bush, which maintains its position till the black
occupier of the land has made the round of all the available sites and
come back to his starting point.
The Makonde are, body and soul, so to speak, one with this bush.
According to my Yao informants, indeed, their name means nothing
else but “bush people.” Their own tradition says that they have been
settled up here for a very long time, but to my surprise they laid great
stress on an original immigration. Their old homes were in the
south-east, near Mikindani and the mouth of the Rovuma, whence
their peaceful forefathers were driven by the continual raids of the
Sakalavas from Madagascar and the warlike Shirazis[47] of the coast,
to take refuge on the almost inaccessible plateau. I have studied
African ethnology for twenty years, but the fact that changes of
population in this apparently quiet and peaceable corner of the earth
could have been occasioned by outside enterprises taking place on
the high seas, was completely new to me. It is, no doubt, however,
correct.
The charming tribal legend of the Makonde—besides informing us
of other interesting matters—explains why they have to live in the
thickest of the bush and a long way from the edge of the plateau,
instead of making their permanent homes beside the purling brooks
and springs of the low country.
“The place where the tribe originated is Mahuta, on the southern
side of the plateau towards the Rovuma, where of old time there was
nothing but thick bush. Out of this bush came a man who never
washed himself or shaved his head, and who ate and drank but little.
He went out and made a human figure from the wood of a tree
growing in the open country, which he took home to his abode in the
bush and there set it upright. In the night this image came to life and
was a woman. The man and woman went down together to the
Rovuma to wash themselves. Here the woman gave birth to a still-
born child. They left that place and passed over the high land into the
valley of the Mbemkuru, where the woman had another child, which
was also born dead. Then they returned to the high bush country of
Mahuta, where the third child was born, which lived and grew up. In
course of time, the couple had many more children, and called
themselves Wamatanda. These were the ancestral stock of the
Makonde, also called Wamakonde,[48] i.e., aborigines. Their
forefather, the man from the bush, gave his children the command to
bury their dead upright, in memory of the mother of their race who
was cut out of wood and awoke to life when standing upright. He also
warned them against settling in the valleys and near large streams,
for sickness and death dwelt there. They were to make it a rule to
have their huts at least an hour’s walk from the nearest watering-
place; then their children would thrive and escape illness.”
The explanation of the name Makonde given by my informants is
somewhat different from that contained in the above legend, which I
extract from a little book (small, but packed with information), by
Pater Adams, entitled Lindi und sein Hinterland. Otherwise, my
results agree exactly with the statements of the legend. Washing?
Hapana—there is no such thing. Why should they do so? As it is, the
supply of water scarcely suffices for cooking and drinking; other
people do not wash, so why should the Makonde distinguish himself
by such needless eccentricity? As for shaving the head, the short,
woolly crop scarcely needs it,[49] so the second ancestral precept is
likewise easy enough to follow. Beyond this, however, there is
nothing ridiculous in the ancestor’s advice. I have obtained from
various local artists a fairly large number of figures carved in wood,
ranging from fifteen to twenty-three inches in height, and
representing women belonging to the great group of the Mavia,
Makonde, and Matambwe tribes. The carving is remarkably well
done and renders the female type with great accuracy, especially the
keloid ornamentation, to be described later on. As to the object and
meaning of their works the sculptors either could or (more probably)
would tell me nothing, and I was forced to content myself with the
scanty information vouchsafed by one man, who said that the figures
were merely intended to represent the nembo—the artificial
deformations of pelele, ear-discs, and keloids. The legend recorded
by Pater Adams places these figures in a new light. They must surely
be more than mere dolls; and we may even venture to assume that
they are—though the majority of present-day Makonde are probably
unaware of the fact—representations of the tribal ancestress.
The references in the legend to the descent from Mahuta to the
Rovuma, and to a journey across the highlands into the Mbekuru
valley, undoubtedly indicate the previous history of the tribe, the
travels of the ancestral pair typifying the migrations of their
descendants. The descent to the neighbouring Rovuma valley, with
its extraordinary fertility and great abundance of game, is intelligible
at a glance—but the crossing of the Lukuledi depression, the ascent
to the Rondo Plateau and the descent to the Mbemkuru, also lie
within the bounds of probability, for all these districts have exactly
the same character as the extreme south. Now, however, comes a
point of especial interest for our bacteriological age. The primitive
Makonde did not enjoy their lives in the marshy river-valleys.
Disease raged among them, and many died. It was only after they
had returned to their original home near Mahuta, that the health
conditions of these people improved. We are very apt to think of the
African as a stupid person whose ignorance of nature is only equalled
by his fear of it, and who looks on all mishaps as caused by evil
spirits and malignant natural powers. It is much more correct to
assume in this case that the people very early learnt to distinguish
districts infested with malaria from those where it is absent.
This knowledge is crystallized in the
ancestral warning against settling in the
valleys and near the great waters, the
dwelling-places of disease and death. At the
same time, for security against the hostile
Mavia south of the Rovuma, it was enacted
that every settlement must be not less than a
certain distance from the southern edge of the
plateau. Such in fact is their mode of life at the
present day. It is not such a bad one, and
certainly they are both safer and more
comfortable than the Makua, the recent
intruders from the south, who have made USUAL METHOD OF
good their footing on the western edge of the CLOSING HUT-DOOR
plateau, extending over a fairly wide belt of
country. Neither Makua nor Makonde show in their dwellings
anything of the size and comeliness of the Yao houses in the plain,
especially at Masasi, Chingulungulu and Zuza’s. Jumbe Chauro, a
Makonde hamlet not far from Newala, on the road to Mahuta, is the
most important settlement of the tribe I have yet seen, and has fairly
spacious huts. But how slovenly is their construction compared with
the palatial residences of the elephant-hunters living in the plain.
The roofs are still more untidy than in the general run of huts during
the dry season, the walls show here and there the scanty beginnings
or the lamentable remains of the mud plastering, and the interior is a
veritable dog-kennel; dirt, dust and disorder everywhere. A few huts
only show any attempt at division into rooms, and this consists
merely of very roughly-made bamboo partitions. In one point alone
have I noticed any indication of progress—in the method of fastening
the door. Houses all over the south are secured in a simple but
ingenious manner. The door consists of a set of stout pieces of wood
or bamboo, tied with bark-string to two cross-pieces, and moving in
two grooves round one of the door-posts, so as to open inwards. If
the owner wishes to leave home, he takes two logs as thick as a man’s
upper arm and about a yard long. One of these is placed obliquely
against the middle of the door from the inside, so as to form an angle
of from 60° to 75° with the ground. He then places the second piece
horizontally across the first, pressing it downward with all his might.
It is kept in place by two strong posts planted in the ground a few
inches inside the door. This fastening is absolutely safe, but of course
cannot be applied to both doors at once, otherwise how could the
owner leave or enter his house? I have not yet succeeded in finding
out how the back door is fastened.