(Ebook PDF) A Practical Guide To Advanced Networking 3rd Edition Download
(Ebook PDF) A Practical Guide To Advanced Networking 3rd Edition Download
https://ebooksecure.com/product/ebook-pdf-a-practical-guide-to-
advanced-networking-3rd-edition/
http://ebooksecure.com/product/ebook-pdf-qualitative-psychology-
a-practical-guide-to-research-methods-3rd-edition/
http://ebooksecure.com/product/ebook-pdf-guide-to-networking-
essentials-8th-edition/
http://ebooksecure.com/product/ebook-pdf-guide-to-networking-
essentials-7th-edition/
http://ebooksecure.com/product/ebook-pdf-a-practical-guide-to-
writing-psychology/
(eBook PDF) A Practical Guide to Writing: Psychology
4th Edition
http://ebooksecure.com/product/ebook-pdf-a-practical-guide-to-
writing-psychology-4th-edition/
http://ebooksecure.com/product/ebook-pdf-doing-research-with-
children-a-practical-guide-3rd-edition/
http://ebooksecure.com/product/original-pdf-doing-right-a-
practical-guide-to-ethics-for-medical-trainees-and-
physicians-3rd-edition/
https://ebooksecure.com/download/practical-guide-to-rotational-
moulding-ebook-pdf/
http://ebooksecure.com/product/ebook-pdf-from-inquiry-to-
academic-writing-a-practical-guide-4th-edition/
www.ebook3000.com
CHAPTER 5 CONFIGURING AND MANAGING THE NETWORK
INFRASTRUCTURE 188
Chapter Outline 189
Objectives 189
Key Terms 189
Introduction 190
5-1 DOMAIN NAME AND IP ASSIGNMENT 190
5-2 IP MANAGEMENT WITH DHCP 195
DHCP Data Packets 197
DHCP Deployment 201
5-3 SCALING THE NETWORK WITH NAT AND PAT 204
Configuring NAT 205
5-4 DOMAIN NAME SERVICE (DNS) 209
DNS Tree Hierarchy 210
DNS Resource Records 214
Summary 220
Questions and Problems 220
CONTENTS vii
CHAPTER 7 Network Security 266
Chapter Outline 267
Objectives 267
Key Terms 267
INTRODUCTION 268
7-1 DENIAL OF SERVICE 268
Distributed Denial of Service Attacks (DDoS) 270
7-2 FIREWALLS AND ACCESS LISTS 270
Network Attack Prevention 272
Access Lists 272
7-3 Router Security 279
Router Access 280
Router Services 282
Router Logging and Access-List 283
7-4 Switch Security 285
Switch Port Security 286
Switch Special Features 288
7-5 Wireless Security 289
7-6 VPN Security 292
VPN Tunneling Protocols 293
Configuring a VPN Virtual Interface (Router to Router) 294
Troubleshooting the VPN Tunnel Link 299
Summary 302
Questions and Problems 302
viii CONTENTS
www.ebook3000.com
IPv6: EIGRP 325
IPv6: IS-IS 326
8-6 Troubleshooting IPv6 Connection 327
Summary 329
Questions and Problems 329
CONTENTS ix
9-7 MANAGING THE LINUX SYSTEM 385
Summary 390
Questions and Problems 391
x CONTENTS
www.ebook3000.com
11-4 ANALYZING VoIP DATA PACKETS 442
Analyzing VoIP Telephone Call Data Packets 446
11-5 VoIP SECURITY 449
Summary 452
Questions and Problems 452
Index 472
CONTENTS xi
ABOUT THE AUTHORS
Jeffrey S. Beasley is with the Department of Engineering Technology and Surveying Engineering at New
Mexico State University. He has been teaching with the department since 1988 and is the co-author of Modern
Electronic Communication and Electronic Devices and Circuits, and the author of Networking.
Piyasat Nilkaew is a network engineer with 15 years of experience in network management and consulting,
and has extensive expertise in deploying and integrating multiprotocol and multivendor data, voice, and video
network solutions on limited budgets.
xii
www.ebook3000.com
DEDICATIONS
This book is dedicated to my family, Kim, Damon, and Dana. —Jeff Beasley
This book is dedicated to Jeff Harris and Norma Grijalva. Not only have you given me my networking career, but
you are also my mentors. You inspire me to think outside the box and motivate me to continue improving my
skills. Thank you for giving me the opportunity of a lifetime. I am very grateful. —Piyasat Nilkaew
ACKNOWLEDGMENTS
I am grateful to the many people who have helped with this text. My sincere thanks go to the following technical
consultants:
• Danny Bosch and Matthew Peralta for sharing their expertise with optical networks and unshielded twisted-
pair cabling, and Don Yates for his help with the initial Net-Challenge Software.
• Abel Sanchez, for his review of the Linux Networking chapter.
I also want to thank my many past and present students for their help with this book:
• David Potts, Jonathan Trejo, and Nate Murillo for their work on the Net-Challenge Software. Josiah Jones,
Raul Marquez Jr., Brandon Wise, and Chris Lascano for their help with the Wireshark material. Also,
thanks to Wayne Randall and Iantha Finley Malbon for the chapter reviews.
xiii
ABOUT THE TECHNICAL REVIEWERS
Wayne Randall started working in the Information Technology field in 1994 at Franklin Pierce College (now
Franklin Pierce University) in Rindge, NH, before becoming a Microsoft Certified Trainer and a consultant at
Enterprise Training and Consulting in Nashua, NH.
Wayne acquired his first certification in Windows NT 3.51 in 1994, became an MCSE in NT 4.0 in 1996, was a
Certified Enterasys Network Switching Engineer in 2000, and then worked as a networking and systems consul-
tant from 2001 to 2006 before becoming a director of IT for a privately held company. Wayne currently works for
Bodycote, PLC, as a network engineer/solutions architect. Bodycote has 170 locations across 27 countries with
43 locations in North America. Wayne has taught for Lincoln Education since 2001 and developed curricula for it
since 2011. Mr. Randall holds a BA in American Studies from Franklin Pierce University.
Iantha Finley Malbon’s teaching career has spanned 20 years from middle school to collegiate settings and
is currently a CIS professor at Virginia Union University. She is also an adjunct professor at ECPI University,
having previously served as CIS Department Chair, teaching Cisco routing, networking, and Information Tech-
nology courses. She implemented the Cisco Academy for Hanover Schools and was the CCAI for the Academy.
She earned her master’s degree in Information Systems from Virginia Commonwealth University and bachelor’s
degree in Technology Education from Virginia Tech. She holds numerous certifications including CCNA,
Network+, A+, and Fiber Optic Technician.
xiv
www.ebook3000.com
WE WANT TO HEAR FROM YOU!
As the reader of this book, you are our most important critic and commentator. We value your opinion and want
to know what we’re doing right, what we could do better, what areas you’d like to see us publish in, and any other
words of wisdom you’re willing to pass our way.
As the associate publisher for Pearson IT Certification, I welcome your comments. You can email or write me
directly to let me know what you did or didn’t like about this book—as well as what we can do to make our
books better.
Please note that I cannot help you with technical problems related to the topic of this book. We do have a User
Services group, however, where I will forward specific technical questions related to the book.
When you write, please be sure to include this book’s title and author as well as your name, email address, and
phone number. I will carefully review your comments and share them with the author and editors who worked on
the book.
Email: [email protected]
Mail: Dave Dusthimer
Associate Publisher
Pearson IT Certification
800 East 96th Street
Indianapolis, IN 46240 USA
READER SERVICES
Visit our website and register this book at www.pearsonitcertification.com/register for convenient access to any
updates, downloads, or errata that might be available for this book.
xv
INTRODUCTION
This book looks at advanced computer networking. It first guides readers through network infrastructure design.
The readers are then introduced to configuring static, RIPv2, OSPF, ISIS, EIGRP routing protocols, techniques
for configuring Juniper router, managing the network infrastructure, analyzing network data traffic using
Wireshark, network security, IPv6, Linux networking, Internet routing, and Voice over IP. After covering the
entire text, readers will have gained a solid knowledge base in advanced computer networks.
In my years of teaching, I have observed that technology students prefer to learn “how to swim” after they have
gotten wet and taken in a little water. Then, they are ready for more challenges. Show the students the technology,
how it is used, and why, and they will take the applications of the technology to the next level. Allowing them to
experiment with the technology helps them to develop a greater understanding. This book does just that.
xvi
www.ebook3000.com
Key Pedagogical Features
• Chapter Outline, Key Terms, and Introduction at the beginning of each chapter clearly outline specific goals
for the reader. An example of these features is shown in Figure P-1.
• Understand and identify the difference be- • Understand the steps for configuring the rout- • Operational mode
tween the operational and configuration er’s interface • Configuration mode
modes • Explain how to configure static, RIP, OSPF,
• Understand the basic steps for working in the and IS-IS routing
operational mode • Understand the steps for route redistribution The basic commands used in the operational mode of the JUNOS command-line
interface (CLI) are presented in Section 4-1. In this chapter, you learn about the
{master} prompt and the >, indicating you are now in the operational mode. You
Key Terms also learn about the re0 { and re1 { .. notations that are used to identify the system
configuration for the routing engines 0 and 1. In Section 4-2, the steps for config-
JUNOS Internal Ethernet interface area interface interface uring the router interface are examined. In addition, the commands for displaying
{master} transient interfaces hello-interval seconds the router interface, configuring the hostname, and assigning an IP address to an
re0 { and re1 { .. Inet dead-interval seconds interface are examined. Section 4-3 introduces route configuration featuring static,
Out of Band Management preferred set metric value RIP, OSPF, and IS-IS. Section 4-4 examines route redistribution. Juniper takes a
PIC edit routing-options set protocols isis inter- different approach when it comes to route redistribution. In the JUNOS software,
static face interface there is no redistribute command. Unlike Cisco where a route distribution is done in
multi-services card
edit protocols rip show isis adjancency a routing process, Juniper uses its routing policy to inject routing protocols.
t3/ds3 card
show rip neighbor edit policy-options
at
commit set policy-statement
oc-3
oc-12 commit and- quit top 4-1 OPERATIONAL MODE
show route export
permanent interfaces The operational mode is the first mode encountered after logging in to the Juniper
Management Ethernet show route protocol rip router. This mode allows for the following:
Interface set protocols ospf area
1. Monitoring network connectivity (for example, using the ping command)
2. Troubleshooting the router interface and network connections
3. Entry point for router configuration
The following examples demonstrate the basic commands used in the operational
mode of the JUNOS command-line interface (CLI). The connection to the Juni-
per router demonstrated in this section is being made via an SSH session (secure
telnet); however, a console serial connection can also be made directly with the
Juniper router, and this connection is used to make the initial router interface con-
figurations.
FIGURE P-1
xvii
• Net-Challenge Software provides a simulated, hands-on experience in configuring routers and switches.
Exercises provided in the text (see Figure P-2) and on the CD challenge readers to undertake certain router/
network configuration tasks. The challenges check the students’ ability to enter basic networking commands
and set up router function, such as configuring the interface (Ethernet and Serial) and routing protocols (that
is, static, RIPv2, OSPF, ISIS, EIGRP, BGP, and VLANs). The software has the look and feel of actually being
connected to the router’s and switch console port.
Networking Challenge—OSPF
Use the Net-Challenge Simulator Software included with the text’s companion CD-ROM to demon-
strate that you can configure OSPF for Router A in the campus LAN (the campus LAN is shown in
Figure 3-2 and is displayed by clicking the View Topology button when the software is started). Place
the Net-Challenge CD-ROM in your computer’s drive. Open the Net-Challenge folder and click
NetChallenge V3-2.exe. When the software is running, click the Select Router Challenge button to
open a Select Router Challenge drop-down menu. Select Chapter 3—OSPF. This opens a checkbox
that can be used to verify that you have completed all the tasks:
1. Enter the privileged EXEC mode on the router.
2. Enter the router’s terminal configuration mode: Router(config).
3. Set the hostname to Router A.
4. Configure the FastEthernet0/0 interface with the following:
IP address: 10.10.20.250
Subnet mask: 255.255.255.0
5. Enable the FA0/0 interface.
6. Configure the FastEthernet0/1 interface with the following:
IP address: 10.10.200.1
Subnet mask: 255.255.255.0
7. Enable the FA0/1 interface.
8. Configure the FastEthernet0/2 interface with the following:
IP address: 10.10.100.1
Subnet mask: 255.255.255.0
FIGURE P-2
xviii
www.ebook3000.com
• The textbook features and introduces how to use the Wireshark Network Protocol Analyzer. Examples of us-
ing the software to analyze data traffic are included throughout the text, as shown in Figure P-3.
FTP Filtering
The following example demonstrates the process by which Wireshark filtering can
be used to isolate File Transfer Protocol (FTP) out of a large list of packets. This
can be useful for several reasons. You can use filtering rules to help us find user-
names and passwords being used to connect to the FTP servers as well as get an
idea of the kind of data that is being transferred.
Start this exercise by opening the capture file 5-A.cap in Wireshark. This is not a
huge file, but it’s a little difficult to sort through all of it just by looking. Click
Expression and scroll down until you reach FTP—File Transfer Protocol (FTP).
Click OK and the Filter for FTP is now displayed, as shown in Figure 6-30.
Click Apply, and the packet list is thinned out to 15 total packets relating to the
FTP protocol, as shown in Figure 6-31. From this, we are able to view the username
and password used to establish the FTP connection. In this case, the username and
passwords are listed in plaintext, as well as the file that was accessed. Most times, a
secure version of FTP (SFTP) will be used and this information will be encrypted.
This same rule can also be applied by using the right-click method as previously
shown.
Find a packet that is using the FTP protocol (for example, packet 44). Navigate to
the datagram field and select the FTP row. Right click -> Apply as Filter -> Se-
lected. This will generate the same results provided in Figure 6-32 that are used for
the FTP filter.
FIGURE P-3
xix
• Numerous worked-out examples are included in every chapter to reinforce key concepts and aid in subject
mastery, as shown in Figure P-4.
10.10.200.0 NET
LAN A LAN B
192.168.10.0 NET
LAN A LAN B
must be a
“10” network
10.10.20.0 NET 10.10.10.0 NET
(b)
FIGURE 2-11 An example of (a) a contiguous network and (b) a discontiguous network
FIGURE 11-15 The exchange of voice packets (code 41) between the two IP phones
VoIP VoIP
Next, enter the router’s configuration mode [Router(config)#] and input the com- Phone Phone
Hub
mand router rip to use the RIP routing protocol. The next step is to specify the Phone (# 1006) Phone (# 2010)
network that uses RIP for routing. These two steps are shown here: 00:e0:bb:1c:07:0a
Dial 62 – for accessing
00:e0:bb:1c:06:87
Router(config-router)#network 10.0.0.0
192.168.10.5
Protocol Analyzer
FIGURE 11-16 The test setup for the VoIP telephone call
FIGURE P-4
xx
www.ebook3000.com
• Key Terms and their definitions are highlighted in the margins to foster inquisitiveness and ensure retention.
This is illustrated in Figure P-5.
OSPF sends small “Hello” packets at regular time intervals to adjacent routers to
Hello Packets
verify that the link between two routers is active and the routers are communicat-
Used in the OSPF ing. If a router fails to respond to a Hello it is assumed that the link or possibly the
protocol to verify
router is down. The OSPF Hello packet captured with a network protocol analyzer
that the links are still
communicating.
is discussed in Section 3-5.
Areas OSPF uses the concept of areas to partition a large network into smaller networks.
The partition of a large
The advantage of this is that the routers have to calculate routes only for their area.
OSPF network into If a route goes down in a given area, only the routers in that area have to calculate
smaller OSPF networks. new routes. Any number between 0 and 4,294,967,295 (232 – 1) can be used; how-
ever, area 0 is reserved for the root area, which is the backbone for the network.
Backbone The backbone is the primary path for data traffic to and from destinations and
The primary path for sources in the campus network. All areas must connect to area 0, and area 0 cannot
data traffic to and from be split. The area numbers can also be expressed in IP notation—for example, area
destinations and sources
0 could be 0.0.0.0—or you can specify an area as 192.168.25.0 or in subnet nota-
in the campus network.
tion. Hence, the need for the large upper-area number (232 – 1) = 255.255.255.255
when converted to a decimal number.
OSPF allows the use of variable length subnet masks (VLSM), which enable dif-
Variable Length ferent size subnets in the network to better meet the needs of the network and more
Subnet Masks (VLSM) efficiently use the network’s limited IP address space. For example, point-to-point
Enables the use of inter-router links don’t need a large block of addresses assigned to them. Figure 3-1
subnet masks to better
illustrates an example of an inter-router link.
fit the needs of the
network, thereby
minimizing the waste FA0/0 FA0/1
of IP addresses when 10.10.250.1 10.10.250.2
interconnecting subnets.
10.10.250.0 Network address
10.10.250.3 Broadcast address
10.10.25.0 Subnet
FIGURE 3-1 An inter-router link subnetted to provide for two host IP addresses, a network
address, and a broadcast address
FIGURE P-5
xxi
• Extensive Summaries, Questions, and Problems, as well as Critical Thinking Questions, are found at the end
of each chapter, as shown in Figure P-6.
SUMMARY 62. OSPF multicasts are sent out as what class of address?
a. Class A
This chapter presented examples of configuring routing protocols. The network
challenge exercises provided the opportunity for the student to test her or his con- b. Class B
figuration skill prior to actually configuring a real router. The student should be c. Class C
able to configure and verify operation of the following protocols:
d. Class D
Static
RIP/RIPv2 e. Class E
OSPF 63. OSPF Hello packets are sent out every
ISIS a. 30 seconds
EIGRP
b. 90 seconds
Additionally, this chapter examined the steps for route redistribution. The last sec- c. 10 seconds
tion examined the OSPF Hello packets.
d. None of these answers are correct
64. The Router ID (RID) in OSPF Hello packets is chosen from
QUESTIONS AND PROBLEMS a. Loopback addresses
b. OSPF 16P_Router
Section 3-1
c. Highest IP address on an interface
1. OSPF is (select all that apply)
d. a and c
a. Open Shortest Path First routing protocol
e. b and c
b. An open protocol
c. Developed specifically for TCP/IP networks Critical Thinking
d. Developed specifically for IPX networks 65. You are configuring a router connection to a remote network. What protocol
would you select if there is only one network route to the remote network?
e. A distance vector protocol Explain why you selected the protocol.
f. A dynamic routing protocol 66. You are configuring the routing protocols for a small network. What routing
g. A link state protocol protocol would you select and why?
h. A high consumer of bandwidth 67. Router A and Router B are connected and both are running OSPF protocol. The
following is a sample configuration from Router A:
2. In OSPF, route updates are sent in the form of
interface FastEthernet0/0
a. Link state advertisements ip address 10.10.3.1 255.255.255.252
duplex auto
b. Exchanging routing tables every 30 seconds
speed auto
c. Exchanging routing tables every 90 seconds !
interface FastEthernet0/1
d. IETF packets ip address 10.100.1.1 255.255.255.0
3. The OSPF routing protocol uses these to verify that a link between two routers duplex auto
is active and the routers are communicating speed auto
!
a. LSAs ip route 172.16.0.0 255.255.0.0 Null 0
!
b. Hello packets router ospf 200
c. ARP messages network 10.0.0.0 0.255.255.255 area 0
d. Ping
FIGURE P-6
xxii
www.ebook3000.com
• An extensive Glossary is found at the end of this book and offers quick, accessible definitions to key terms
and acronyms, as well as an exhaustive Index (see Figure P-7).
6to4 Prefix A technique that enables IPv6 hosts to Area 0 In OSPF, this is the root area and is the back- Address field (show ip eigrp neighbors command), 125
Numbers
communicate over the IPv4 Internet. bone for the network. administration (Linux), 389
3DES (Triple Data Encryption Standard), ESP, 301 Is system-config- * command, 385
802.1Q This standard defines a system of VLAN tag- Area ID Analogous to OSPF area number, and it is
6to4 prefix (IPv6 addresses), 314 security, 387
ging for Ethernet frames. used by L2 routers.
802.1Q, 18, 24-26 system-config- [tool-name] command, 385
2001:DB8::/32 Prefix This IPv6 address prefix is Areas The partition of a large OSPF network into 2001, DB8::/32 prefix and IPv6 router configuration, 324 system-config-date command, 386
reserved for documentation. This is recommended by smaller OSPF networks. system-config-network command, 388
RFC3849 to reduce the likelihood of conflict and administration commands (Linux)
confusion when using the IPv6 address in examples,
ARIN American Registry for Internet Numbers. Symbols
Allocates Internet Protocol resources, develops df command, 363
books, documentation, or even in test environments. ? (question mark), JUNOS operating system, 161
consensus-based policies, and facilitates the advance- df -kh command, 364
.int Intergovernmental domain registries is used for ment of the Internet through information and educa- history command, 364
registering organizations established by international tional outreach.
treaties between or among national governments.
A kill [PID] command, 361
ARP Address Resolution Protocol, used to map an IP kill -9 [PID] command, 361
{master} The prompt indicating you are in the address to its MAC address. AAA (Authentication, Authorization, and Accounting), 281 man command, 358-359
master routing engine mode on a Juniper router. ABR (area border routers), 112 mount command, 358, 362
arp –a The command used to view the ARP cache. access layer, 6 ps command, 358-361
A Record (Address Record) This maps a hostname to access-list 100 deny udp any any eq 161 command, ACL
ARP Broadcast Used to inform everyone on the shutdown command, 358, 364
an IP address. configuration, 273
network that it now is the owner of the IP address. shutdown -h now command, 364
AAA Authentication, Authorization, and Accounting. access-list 100 deny udp any any eq snmp command, ACL su command, 358, 362
ARP Reply A network protocol where the MAC configuration, 274
ABR Area border routers. address is returned. Tab key shortcut, 364
access-list permit ip any any command, ACL configura-
umount command, 364
Access Layer Where the networking devices in a LAN AS Autonomous System. These numbers are used by tion, 274
up arrow shortcut, 364
connect together. various routing protocols and are a collection of accounting (security), 281
advertise_connected policies, Juniper router route redis-
connected Internet Protocol (IP) routing prefixes. ACK (Acknowledgment) packets, TCP three-way hand-
Access Lists (ACL) A basic form of firewall protec- tribution, 179
Autonomous systems separate organizational networks. shakes, 230
tion used to tell a networking device who and what are advertise_isis policies, Juniper router route redistribu-
ACL (Access Lists), 270-272. See also filter lists
allowed to enter or exit a network. ASN Autonomous systems number is used to distin- tion, 179
access-list 100 deny udp any any eq 161 command, 273
guish separate networks and to prevent routing loops. advertise_rip policies, Juniper router route redistribu-
ACK Acknowledgment packet. access-list 100 deny udp any any eq snmp command, 274 tion, 179
at Asynchronous Transmission Mode (ATM) connec- access-list permit ip any any command, 274 advertise_static policies, Juniper router route redistribu-
address-family ipv6 The command used to
tion for a Juniper router. configure terminal command, 273 tion, 180
specify that IPv6 is specified.
edge routers, 273-275 advertising networks, 75
ATM Asynchronous transfer mode.
Administrative Distance (AD) A number assigned to extended ACL, 273 AES (Advance Encryption Standard)
a protocol or route to declare its reliability. Authoritative Name Server A name server that is false TCP headers, 278 ESP, 301
authorized and configured to answer DNS queries for a hosts, 277
Advertise The sharing of route information. WPA2, 291
particular domain or zone. ip access-group 100 out command, 274 AF33 (Assured Forwarding class 3), VoIP class maps, 441
AES Advance Encryption Standard. A 128-bit block
Automatic Private IP Addressing (APIPA) A IP addresses, stopping data traffic from, 277-278 AH (Authentication Headers), troubleshooting VPN tun-
data encryption technique.
self-assigned IP address in the range of 169.254.1.0– permit ip any any command, 274-276 nels, 300
AF33 Assured Forwarding class 3. Created to ensure 169.254.254.255. placement of, 274 allow-snmp term (filter lists), 279
the VoIP signaling or handshake. remote data hosts, stopping data traffic from, 277 AMI (alternate mark inversion), 38
autonomous-system [AS_Number] This command
AH Authentication Header. A security protocol used is used in JUNOS to define the BGP AS for the router. router logging, 283-285 anycast IPv6 addresses, 314
by IPsec that guarantees the authenticity of the IP show access-list 100 command, 274 AP (access points), NSEL and IS-IS, 113
B8ZS Bipolar 8 zero substitution. A data encoding show access-list command, 275-276 APIPA (Automatic Private IP Addressing), 196
packets.
format developed to improve data transmission over T1 SMB, 273-275 Area ID, IS-IS, 112
AMI Alternate mark inversion. A fundamental line circuits.
standard ACL, 273 areas (OSPF), 102, 105
coding scheme developed for transmission over T1
Backbone The primary path for data traffic to and UDP, 276 A records (Address records), DNS, 214, 218-219
circuits.
from destinations and sources in the campus network. AD (Administrative Distance), 71 ARIN (American Registry for Internet Numbers), IP ad-
Anycast Address Obtained from a list of addresses. address family ipv6 command, IPv6 Internet routing via dress assignments, 191
Backup Designated Router (BDR) The router or
BGP4+, 413
routers with lower priority.
457 473
FIGURE P-7
xxiii
Accompanying CD-ROM
The CD-ROM packaged with the text includes the captured data packets used in the text. It also includes the
Net-Challenge Software, which was developed specifically for this text.
Instructor Resources
The Instructor’s Manual to accompany A Practical Guide to Advanced Networking, (ISBN: 978-0-132-88303-0)
provides the entire book in PDF format along with instructor notes for each section within each chapter, recom-
mending key concepts that should be covered in each chapter. Solutions to all Chapter Questions and Problems
sections are also included. In addition, the instructor can also access 13 lab and lab-related exercises and a test
bank with which to generate quizzes on the material found within the student edition of the book.
xxiv
www.ebook3000.com
Discovering Diverse Content Through
Random Scribd Documents
157 Lun Yü, xii. 22. Mencius, vii. 1. 45. Douglas, Confucianism
and Taouism, pp. 108, 205.
159 Thâi-Shang, 3.
162 Stobæus, Florilegium, xl. 7, vol. ii. 80. Cf. Natorp, Die Ethika
des Demokritos, p. 117, n. 41.
164 Ibid. vi. 12, 63, 72, 98. Epictetus, Dissertationes, iii. 24. 66.
Stobæus, xlv. 28, vol. ii. 252.
165 Zeller, Socrates and the Socratic Schools, p. 326 sq. Idem,
Stoics, Epicureans, and Sceptics, p. 327.
169 Marcus Aurelius, Commentarii, iv. 4. Cf. ibid. vi. 44, and ix.
9; Cicero, De legibus, i. 7 (23); Epictetus, Dissertationes, i. 13. 3.
But the Roman ideal of patriotism, with its utter disregard for
foreign nations,172 was not opposed by philosophy alone: it met with
an even more formidable antagonist in the new religion. The
Christian and the Stoic rejected it on different grounds: whilst the
Stoic felt himself as a citizen of the world, the Christian felt himself
as a citizen of heaven, to whom this planet was only a place of exile.
Christianity was not hostile to the State.173 At the very time when
Nero committed his worst atrocities, St. Paul declared that there is
no power but of God, and that whosoever resists the power resists
the ordinance of God and shall be condemned;174 and Tertullian says
that all Christians send up their prayers for the life of the emperors,
for their ministers, for magistrates, for the good of the State and the
peace of the Empire.175 But the emperor should be obeyed only so
long as his commands do not conflict with the law of God—a
Christian ought rather to suffer like Daniel in the lions’ den than sin
against his religion;176 and nothing is more entirely foreign to him
than affairs of State.177 Indeed, in the whole Roman Empire there
were no men who so entirely lacked patriotism as the early
Christians. They had no affection for Judea, they soon forgot Galilee,
they cared nothing for the glory of Greece and Rome.178 When the
judges asked them which was their country they said in answer, “I
am a Christian.”179 And long after Christianity had become the
religion of the Empire, St. Augustine declared that it matters not, in
respect of this short and transitory life, under whose dominion a
mortal man lives, if only he be not compelled to acts of impiety or
injustice.180 Later on, when the Church grew into a political power
independent of the State, she became a positive enemy of national
interests. In the seventeenth century a Jesuit general called
patriotism “a plague and the most certain death of Christian love.”181
172 Cf. Lactantius, Divinæ Institutiones, vi. (‘De vero cultu’), 6
(Migne, Patrologiæ cursus, vi. 655).
With the fall of the Roman Empire patriotism died out in Europe,
and remained extinct for centuries. It was a feeling hardly
compatible either with the migratory life of the Teutonic tribes or
with the feudal system, which grew up wherever they fixed their
residence. The knights, it is true, were not destitute of the natural
affection for home. When Aliaumes is mortally wounded by Géri li
Sors he exclaims, “Holy Virgin, I shall never more see Saint-Quentin
nor Néèle”;182 and the troubadour Bernard de Ventadour touchingly
sings, “Quan la doussa aura venta—Deves nostre païs,—M’es veiaire
que senta—Odor de Paradis.”183 But to a man of the Middle Ages
“his country” meant little more than the neighbourhood in which he
lived.184 Kingdoms existed, but no nations. The first duty of a vassal
was to be loyal to his lord;185 but no national spirit bound together
the various barons of one country. A man might be the vassal of the
king of France and of the king of England at the same time; and
often, from caprice, passion, or sordid interest, the barons sold their
services to the enemies of the kingdom. The character of his
knighthood was also perpetually pressing the knight to a course of
conduct distinct from all national objects.186 The cause of a
distressed lady was in many instances preferable to that of the
country to which he belonged—as when the Captal de Bouche,
though an English subject, did not hesitate to unite his troops with
those of the Compte de Foix to relieve the ladies in a French town,
where they were besieged and threatened with violence by the
insurgent peasantry.187 When a knight’s duties towards his country
are mentioned in the rules of Chivalry they are spoken of as duties
towards his lord:—“The wicked knight,” it is said, “that aids not his
earthly lord and natural country against another prince, is a knight
without office.”188 Far from being, as M. Gautier asserts,189 the
object of an express command in the code of Chivalry, true
patriotism had there no place at all. It was not known as an ideal,
still less did it exist as a reality, among either knights or commoners.
As a duke of Orleans could bind himself by a fraternity of arms and
alliance to a duke of Lancaster,190 so English merchants were in the
habit of supplying nations at war against England with provisions
bought at English fairs, and weapons wrought by English hands.191
If, as M. Gaston Paris maintains, a deep feeling of national union had
inspired the Chanson de Roland,192 it is a strange, yet undeniable,
fact that no distinct trace of this feeling displayed itself in the
mediæval history of France before the English wars.
182 Li Romans de Raoul de Cambrai, 210, p. 185.
184 See Cibrario, Della economia politica del medio eve, i. 263;
de Crozals, Histoire de la civilization, ii. 287.
204 See Strauss, Der alte und der neue Glaube, p. 259 sq.
Ever since, the racial feeling has been the most vigorous force in
European patriotism, and has gradually become a true danger to
humanity. Beginning as a protest against the dominion of one race
over another, this feeling led to a condemnation of every state which
included different races, and finally developed into the complete
doctrine that state and nationality should so far as possible be
coextensive.208 According to this theory the dominant nationality
cannot admit the inferior nationalities dwelling within the boundaries
of the state to an equality with itself, because, if it did, the state
would cease to be national, and this would be contrary to the
principle of its existence; or the weaker nationalities are compelled
to change their language, institutions, and individuality, so as to be
absorbed in the dominant race. And not only does the leading
nationality assert its superiority in relation to all others within the
body politic, but it also wants to assert itself at the expense of
foreign nations and races. To the nationalist all this is true
patriotism; love of country often stands for a feeling which has been
well described as love of more country.209 But at the same time
opposite ideals are at work. The fervour of nineteenth century
nationalism has not been able to quench the cosmopolitan spirit. In
spite of loud appeals made to racial instincts and the sense of
national solidarity, the idea has been gaining ground that the aims of
a nation must not conflict with the interests of humanity at large;
that our love of country should be controlled by other countries’ right
to prosper and to develop their own individuality; and that the
oppression of weaker nationalities inside the state and
aggressiveness towards foreign nations, being mainly the outcome
of vainglory and greed, are inconsistent with the aspirations of a
good patriot, as well as of a good man.
208 Ibid. p. 13 sq.
In various animal species the young are cared for not only by the
mother, but by the father as well. This is the general rule among
birds: whilst the hatching of the eggs and the chief part of the
rearing-duties belong to the mother, the father acts as a protector,
and provides food for the family. Among most of the mammals, on
the other hand, the connections between the sexes are restricted to
the time of the rut, hence the father may not even see his young.
But there are also some mammalian species in which male and
female remain together even after the birth of the offspring and the
father defends his family against enemies.12 Among the
Quadrumana this seems to be the rule.13 All the best authorities
agree that the Gorilla and the Chimpanzee live in families. When the
female is pregnant the male builds a rude nest in a tree, where she
is delivered; and he spends the night crouching at the foot of the
tree, protecting the female and their young one, which are in the
nest above, from the nocturnal attacks of leopards. Passing from the
highest monkeys to the savage and barbarous races of men, we
meet with the same phenomenon. In the human race the family
consisting of father, mother, and offspring is probably a universal
institution, whether founded on a monogamous, polygynous, or
polyandrous marriage. And, as among the lower animals having the
same habit, whilst the immediate care of the children chiefly belongs
to the mother, the father is the guardian of the family.14
12 Westermarck, History of Human Marriage, p. 11 sq.
13 Ibid. p. 12 sqq.
The parental feelings originally only last as long as the young are
unable to shift for themselves—the paternal feeling possibly less. As
Mr. Fiske observes, “where the infancy is very short, the parental
feeling, though intense while it lasts, presently disappears, and the
offspring cease to be distinguished from strangers of the same
species. And in general the duration of the feelings which insure the
protection of the offspring is determined by the duration of the
infancy.”25 Among certain savages parental love is still said to be
restricted to the age of helplessness. We are told that the affection
of a Fuegian mother for her child gradually decreases in proportion
as the child grows older, and ceases entirely when it reaches the age
of seven or eight; thenceforth the parents in no way meddle with the
affairs of their son, who may leave them if he likes.26 When the
parental feelings became more complex, through the association of
other feelings, as those of property and pride, they naturally tended
to extend themselves beyond the limits of infancy and childhood. But
the chief cause of this extension seems to lie in the same
circumstances as made man a gregarious animal. Where the grown-
up children continued to stay with their parents, parental affection
naturally tended to be prolonged, not only by the infusion into it of
new elements, but by the direct influence of close living together. It
was, moreover, extended to more distant descendants. The same
stimuli as call forth kindly emotions towards a person’s own children
evoke similar emotions towards his grand- and great-grandchildren.
25 Fiske, op. cit. ii. 343.
But man finally overcame this obstacle. “He has,” to quote Darwin,
“invented and is able to use various weapons, tools, traps, &c., with
which he defends himself, kills or catches prey, and otherwise
obtains food. He has made rafts or canoes for fishing or crossing
over to neighbouring fertile islands. He has discovered the art of
making fire, by which hard and stringy roots can be rendered
digestible, and poisonous roots or herbs innocuous.”35 In short, man
gradually found out new ways of earning his living and more and
more emancipated himself from direct dependence on surrounding
nature. The chief obstacle to a gregarious life was by this means
surmounted, and the advantages of such a life were considerable.
Living together in larger groups, men could resist the dangers of life
and defend themselves much better than when solitary—all the more
so as the physical strength of man, and especially savage man, is
comparatively slight. The extension of the small family group may
have taken place in two different ways: either by adhesion, or by
natural growth and cohesion. In other words, new elements whether
other family groups or single individuals may have united with it
from without, or the children, instead of separating from their
parents, may have remained with them and increased the group by
forming new families themselves. There can be little doubt that the
latter was the normal mode of extension. When gregariousness
became an advantage to man, he would feel inclined to remain with
those with whom he was living even after the family had fulfilled its
object—the preservation of the helpless offspring. And he would be
induced to do so not only from egoistic considerations, but by an
instinct which, owing to its usefulness, would gradually develop,
practically within the limits of kinship—the gregarious instinct.
35 Darwin, Descent of Man, p. 48 sq.
But the members of the group do not merely take pleasure in each
other’s company. Associated animals very frequently display a feeling
of affection for each other—defend each other, help each other in
distress and danger, perform various other services for each other.37
Considering that the very object of the gregarious instinct is the
preservation of the species, I think we are obliged to regard the
mutual affection of associated animals as a development of this
instinct. With the pleasure they take in each other’s company is
intimately connected kindliness towards its cause, the companion
himself. In this explanation of social affection I believe no further
step can be made. Professor Bain asks why a more lively feeling
should grow up towards a fellow-being than towards an inanimate
source of pleasure; and to account for this he suggests, curiously
enough, “the primary and independent pleasure of the animal
embrace”38—although embrace even as an outward expression of
affection plays a very insignificant part in the social relations of
gregarious animals. It might as well be asked why there should be a
more lively feeling towards a sentient creature which inflicts pain
than towards an inanimate cause of pain. Both cases call for a
similar explanation. The animal distinguishes between a living being
and a lifeless thing, and affection proper, like anger proper, is
according to its very nature felt towards the former only. The object
of anger is normally an enemy, the object of social affection is
normally a friend. Social affection is not only greatly increased by
reciprocity of feeling, but could never have come into existence
without such reciprocity. The being to which an animal attaches itself
is conceived of as kindly disposed towards it; hence among wild
animals social affection is found only in connection with the
gregarious instinct, which is reciprocal in nature.
37 Darwin, op. cit. p. 100 sqq. Kropotkin, Mutual Aid, ch. i. sq.
Among men the members of the same social unit are tied to each
other with various bonds of a distinctly human character—the same
customs, laws, institutions, magic or religious ceremonies and
beliefs, or notions of a common descent. As men generally are fond
of that to which they are used or which is their own, they are also
naturally apt to have likings for other individuals whose habits or
ideas are similar to theirs. The intensity and extensiveness of social
affection thus in the first place depend upon the coherence and size
of the social aggregate, and its development must consequently be
studied in connection with the evolution of such aggregates.
This evolution is largely influenced by economic conditions.
Savages who know neither cattle-rearing nor agriculture, but subsist
on what nature gives them—game, fish, fruit, roots, and so forth—
mostly live in single families consisting of parents and children, or in
larger family groups including in addition a few other individuals
closely allied.39 But even among these savages the isolation of the
families is not complete. Persons of the same stock inhabiting
neighbouring districts hold friendly relations with one another, and
unite for the purpose of common defence. When the younger
branches of a family are obliged to disperse in search of food, at
least some of them remain in the neighbourhood of the parent
family, preserve their language, and never quite lose the idea of
belonging to one and the same social group. And in some cases we
find that people in the hunting or fishing stage actually live in larger
communities, and have a well-developed social organisation. This is
the case with many or most of the Australian aborigines. Though in
Australia, also, isolated families are often met with,40 the rule seems
to be that the blacks live in hordes. Thus the Arunta of Central
Australia are distributed in a large number of small local groups,
each of which occupies a given area of country and has its own
headman.41 Every family, consisting of a man and one or more wives
and children, has a separate lean-to of shrubs;42 but clusters of
these shelters are always found in spots where food is more or less
easily obtainable,43 and the members of each group are bound
together by a strong “local feeling.”44 The local influence makes itself
felt even outside the horde. “Without belonging to the same group,”
say Messrs. Spencer and Gillen, “men who inhabit localities close to
one another are more closely associated than men living at a
distance from one another, and, as a matter of fact, this local bond is
strongly marked…. Groups which are contiguous locally are
constantly meeting to perform ceremonies.”45 At the time when the
series of initiation ceremonies called the Engwura are performed,
men and women gather together from all parts of the tribe, councils
of the elder men are held day by day, the old traditions of the tribe
are repeated and discussed, and “it is by means of meetings such as
this, that a knowledge of the unwritten history of the tribe and of its
leading members is passed on from generation to generation.”46 Nay,
even members of different tribes often have friendly intercourse with
each other; in Central Australia, when two tribes come into contact
with one another on the border-land of their respective territories,
the same amicable feelings as prevail within the tribe are maintained
between the members of the two.47 Now it seems extremely
probable that Australian blacks are so much more sociable than most
other hunting people because the food-supply of their country is
naturally more plentiful, or, partly thanks to their boomerangs, more
easily attainable. A Central Australian native is, as a general rule,
well nourished; “kangaroo, rock-wallabies, emus, and other forms of
game are not scarce, and often fall a prey to his spear and
boomerang, while smaller animals, such as rats and lizards, are
constantly caught without any difficulty by the women.”48
Circumstances of an economic character also account for the
gregariousness of the various peoples on the north-west coast of
North America who are neither pastoral nor agricultural—the
Thlinkets, Haidas, Nootkas, and others. On the shore of the sea or
some river they have permanent houses, each of which is inhabited
by a number of families;49 the houses are grouped in villages, some
of which are very populous;50 and though the tribal bond is not
conspicuous for its strength, there are councils which discuss and
decide all important questions concerning the tribe.51 The territory
inhabited by these peoples, with its bays, sounds, and rivers,
supplies them with food in abundance; “its enormous wealth of fish
allows its inhabitants to enjoy a pampered existence.”52
39 Westermarck, op. cit. p. 43 sqq. Hildebrand, Recht und Sitte,
p. 1 sqq.
42 Ibid. p. 18.
43 Ibid. p. 31.
44 Ibid. p. 544.
45 Ibid. p. 14.
But living together is not the only factor which, among savages,
establishes a social unit. Such a unit may be based not only on local
proximity, but on marriage or a common descent; it may consist not
only of persons who live together in the same district, but of persons
who are of the same family, or who are, or consider themselves to
be, of the same kin. These different modes of organisation often, in
a large measure, coincide. The family is a social unit made up of
persons who are either married or related by blood, and at the same
time, in normal cases, live together. The tribe is a social unit, though
often a very incoherent one,55 consisting of persons who inhabit the
same district and also, at least in many cases, regard themselves as
descendants of some common ancestor. The clan, which is
essentially a body of kindred having a common name, may likewise
on the whole coincide with the population of a certain territory, with
the members of one or more hordes or villages. This is the case
where the husband takes his wife to his own community and descent
is reckoned through the father, or where he goes to live in his wife’s
community and descent is reckoned through the mother. But
frequently the system of maternal descent is combined with the
custom of the husband taking his wife to his own home, and this, in
connection with the rule of clan-exogamy, occasions a great
discrepancy between the horde and the clan. The local group is then
by no means a group of clansmen; the children, live in their father’s
community, but belong to their mother’s clan, whilst the next
generation of children within the community must belong to another
clan.56
55 See Cunow, Die Verwandtschafts-Organisationen der
Australneger, p. 121, n. 1.
56 Cf. Giddings, Principles of Sociology, p. 259.
Kinship certainly gives rise to special rights and duties, but when
unsupported by local proximity it loses much of its social force.
Among the Australian natives, for instance, the clan rules seem
generally to be concerned with little or nothing else than marriage,
sexual intercourse, and, perhaps, blood-revenge.57 “The object of
caste” (clan), says Mr. Curr, “is not to create or define a bond of
union, but to secure the absence of any blood relationship between
persons proposed to marry. So far from being a bond of friendship,
no Black ever hesitates to kill one of another tribe because he
happens to bear the same caste- (clan-) name as himself.”58 It
appears that the system of descent itself is largely influenced by
local connections.59 Sir E. B. Tylor has found by means of his
statistical method that the number of coincidences between peoples
among whom the husband lives with the wife’s family and peoples
who reckon kinship through the mother only, is proportionally large,
and that the full maternal system never appears among peoples
whose exclusive custom is for the husband to take his wife to his
own home;60 and I have myself drawn attention to the fact that
where the two customs, the woman receiving her husband in her
own hut and the man taking his wife to his, occur side by side
among the same people, descent in the former case is traced
through the mother, in the latter through the father.61 Nay, even
where kinship constitutes a tie between persons belonging to
different local groups, its social force is ultimately derived not merely
from the idea of a common origin, but from near relatives’ habit of
living together. Men became gregarious by remaining in the circle
where they were born; if, instead of keeping together with their
kindred, they had preferred to isolate themselves or to unite with
strangers, there would certainly be no blood-bond at all. The mutual
attachment and the social rights and duties which resulted from this
gregarious condition were associated with the relation in which
members of the group stood to one another—the relation of kinship
as expressed by a common name,—and these associations might
last even after the local tie was broken. By means of the name
former connections were kept up. Even we ourselves are generally
more disposed to count kin with distant relatives who have our own
surname than with relatives who have a different name; and still
greater is the influence which language in this respect exercises on
the mind of a savage, to whom a person’s name is part of his
personality. The derivative origin of the social force in kinship
accounts for its formal character, when personal intercourse is
wanting; it may enjoin duties, but hardly inspires much affection. If
in modern society much less importance is attached to kinship than
at earlier stages of civilisation, this is largely due to the fact that
relatives, except the nearest, have little communication with each
other. And if, as Aristotle observes, friendship between kinsfolk varies
according to the degree of relationship,62 it does so in the first
instance on account of the varying intimacy of their mutual
intercourse.
57 Cunow, op. cit. pp. 97, 136. Dr. Stirling says (Report of the
Horn Expedition to Central Australia, ‘Anthropology,’ p. 43) that
the laws arising out of the “class” (clan) divisions “have
extraordinary force and are, in general, implicitly obeyed whether
in respect of actual marriage, illicit connections, or social
relations”; but I find no further reference to these “social
relations.”
A very different explanation of the social influence of kinship has been given
by Mr. Hartland. He connects it with primitive superstition. A clan, he says, “is
regarded as an unity, literally and not metaphorically one body, the individual
members of which are as truly portions as the fingers or the legs are portions
of the external, visible body of each of them.” Now, a severed limb or lock of
hair is believed by the savage to remain in some invisible but real union with
the body whereof it once, in outward appearance also, formed a part, and any
injury done to it is supposed to affect the organism to which it belonged. “The
individual member of a clan was in exactly the same position as a lock of hair
cut from the head, or an amputated limb. He had no separate significance, no
value apart from his kin…. Injury inflicted on him was inflicted on, and was
felt by, the whole kin, just as an injury inflicted on the severed lock or limb
was felt by the bulk.”63 Mr. Hartland insists upon a literal interpretation of his
words;64 and this implies that the members of a clan are in their behaviour
influenced by the idea that what happens to one of them reacts upon all.
In support of his theory Mr. Hartland makes reference to the belief of some
savages, that charms may be made from dead bodies against the surviving
relatives of the deceased,65 and to certain rites of healing in which, besides
the patient himself, “other members of his tribe, presumably kinsmen,” take
part.66 But the former belief is a superstition connected with the wonder of
death, from which no conclusion must be drawn as to relations between the
living; and in the ceremonies of healing the medicine-man plays a much more
prominent part than the other bystanders—whose relationship to the patient,
besides, is so little marked that Mr. Hartland only presumes them to be
kindred. He further observes that in the wide-spread custom of the Couvade
we meet with the idea that the child, being a part of the father, is liable to be
affected by various acts committed by him.67 And from Sir J. G. Frazer’s
‘Golden Bough’ might be quoted many instances of a belief in some
mysterious bond of sympathy knitting together absent friends and relations—
especially at critical times of life—which has, in particular, led to rules
regulating the conduct of persons left at home while a party of their friends is
out fishing or hunting or on the war path.68 But all these rules are taboo
restrictions of a definite and altogether special kind, generally, it seems,
referring to members of the same family, and frequently to wives in their
husbands’ absence. In order to make his hypothesis acceptable, Mr. Hartland
ought to have produced a fair number of facts proving that the members of
the same clan really are believed to be connected with each other in such a