100% found this document useful (1 vote)
75 views62 pages

Exam 98 366 MTA Networking Fundamentals 2nd Edition Microsoft Official Academic Course 2024 scribd download

MTA

Uploaded by

ramselgitana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
75 views62 pages

Exam 98 366 MTA Networking Fundamentals 2nd Edition Microsoft Official Academic Course 2024 scribd download

MTA

Uploaded by

ramselgitana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

Download the full version of the textbook now at textbookfull.

com

Exam 98 366 MTA Networking Fundamentals 2nd


Edition Microsoft Official Academic Course

https://textbookfull.com/product/exam-98-366-mta-
networking-fundamentals-2nd-edition-microsoft-
official-academic-course/

Explore and download more textbook at https://textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Exam Ref AZ 900 Microsoft Azure Fundamentals 2nd Edition


Jim Cheshire

https://textbookfull.com/product/exam-ref-az-900-microsoft-azure-
fundamentals-2nd-edition-jim-cheshire/

textbookfull.com

Exam Ref Pl 900 Microsoft Power Platform Fundamentals


Craig Zacker

https://textbookfull.com/product/exam-ref-pl-900-microsoft-power-
platform-fundamentals-craig-zacker/

textbookfull.com

Microsoft Certified Azure Fundamentals Study Guide Exam AZ


900 1st Edition James Boyce

https://textbookfull.com/product/microsoft-certified-azure-
fundamentals-study-guide-exam-az-900-1st-edition-james-boyce/

textbookfull.com

Functional Python Programming: Use a functional approach


to write succinct, expressive, and efficient Python code,
3rd Edition Lott
https://textbookfull.com/product/functional-python-programming-use-a-
functional-approach-to-write-succinct-expressive-and-efficient-python-
code-3rd-edition-lott/
textbookfull.com
Delhi Darshan The History and Monuments of India s Capital
First Edition Giles Tillotson

https://textbookfull.com/product/delhi-darshan-the-history-and-
monuments-of-india-s-capital-first-edition-giles-tillotson/

textbookfull.com

Britain and the Arctic 1st Edition Duncan Depledge (Auth.)

https://textbookfull.com/product/britain-and-the-arctic-1st-edition-
duncan-depledge-auth/

textbookfull.com

G is for BDSM Checklist 7 1st Edition Lila Dubois

https://textbookfull.com/product/g-is-for-bdsm-checklist-7-1st-
edition-lila-dubois/

textbookfull.com

Bloody Rosary Academy: Year Two (The Supernatural Vampire


Fae Chronicles #2) 1st Edition Avery Song & Veronica Agnus
[Song
https://textbookfull.com/product/bloody-rosary-academy-year-two-the-
supernatural-vampire-fae-chronicles-2-1st-edition-avery-song-veronica-
agnus-song/
textbookfull.com

Give Me Liberty An American History 6th Edition Eric Foner

https://textbookfull.com/product/give-me-liberty-an-american-
history-6th-edition-eric-foner/

textbookfull.com
Old Philadelphia houses on Society Hill 1750 1840 First
Rowman & Littlefield Edition Maicher

https://textbookfull.com/product/old-philadelphia-houses-on-society-
hill-1750-1840-first-rowman-littlefield-edition-maicher/

textbookfull.com
Microsoft® Official Academic Course

Networking Fundamentals,
Exam 98-366
VP & PUBLISHER Barry Pruett
SENIOR EXECUTIVE EDITOR Jim Minatel
MICROSOFT PRODUCT MANAGER Microsoft Learning
SENIOR EDITORIAL ASSISTANT Devon Lewis
TECHNICAL EDITOR Ron Handlon
CHANNEL MARKETING MANAGER Michele Szczesniak
CONTENT MANAGEMENT DIRECTOR Lisa Wojcik
CONTENT MANAGER Nichole Urban
PRODUCTION COORDINATOR Nicole Repasky
PRODUCTION EDITOR Umamaheswari Gnanamani
COVER DESIGNER Tom Nery

COVER PHOTO: © shutterstock/wavebreakmedia

Copyright © 2017 by John Wiley & Sons, Inc. All rights reserved.

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under
Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the
Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center,
Inc. 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher
for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street,
Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008. To order books or for customer service, please call
1-800-CALL WILEY (225-5945).

Microsoft, Active Directory, AppLocker, Bing, BitLocker, Hyper-V, Internet Explorer, Microsoft Intune, Microsoft
Office 365, SQL Server, Visual Studio, Windows Azure, Windows, Windows PowerShell, and Windows Server are
either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Other product and company names mentioned herein may be the trademarks of their respective owners.

The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events
depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail
address, logo, person, place, or event is intended or should be inferred.

The book expresses the author’s views and opinions. The information contained in this book is provided without
any express, statutory, or implied warranties. Neither the authors, John Wiley & Sons, Inc., Microsoft Corporation,
nor their resellers or distributors will be held liable for any damages caused or alleged to be caused either directly or
indirectly by this book.

ISBN: 9781119428824 (PBK)


ISBN: 9781119428848 (EVAL)
Preface

Welcome to the Microsoft Official Academic Course (MOAC) program for Networking
Fundamentals. MOAC represents the collaboration between Microsoft Learning and John
Wiley & Sons, Inc. publishing company. Microsoft and Wiley teamed up to produce a series
of textbooks that deliver compelling and innovative teaching solutions to instructors and
superior learning experiences for students. Infused and informed by in-depth knowledge from
the creators of Microsoft products, and crafted by a publisher known worldwide for the ped-
agogical quality of its products, these textbooks maximize skills transfer in minimum time.
Students are challenged to reach their potential by using their new technical skills as highly
productive members of the workforce.
Because this knowledge base comes directly from Microsoft, creator of the Microsoft
Certified IT Professional (MCITP), Microsoft Certified Technology Specialist (MCTS),
and Microsoft Certified Professional (MCP) exams (see the Microsoft Learning website at
https://www.microsoft.com/learning), you are sure to receive the topical coverage that is most
relevant to students’ personal and professional success. Microsoft’s direct participation not
only assures you that MOAC textbook content is accurate and current; it also means that
students will receive the best instruction possible to enable their success on certification exams
and in the workplace.

■■ The Microsoft Official Academic Course Program


The Microsoft Official Academic Course series is a complete program for instructors and insti-
tutions to prepare and deliver great courses on Microsoft software technologies. With MOAC,
we recognize that, because of the rapid pace of change in the technology and curriculum devel-
oped by Microsoft, there is an ongoing set of needs beyond classroom instruction tools for an
instructor to be ready to teach the course. The MOAC program endeavors to provide solutions
for all these needs in a systematic manner in order to ensure a successful and rewarding course
experience for both instructor and student—technical and curriculum training for instructor
readiness with new software releases; the software itself for student use at home for building
hands-on skills, assessment, and validation of skill development; and a great set of tools for
delivering instruction in the classroom and lab. All are important to the smooth delivery of an
interesting course on Microsoft software, and all are provided with the MOAC program. We
think about the model below as a gauge for ensuring that we completely support you in your
goal of teaching a great course. As you evaluate your instructional materials options, you may
wish to use the model for comparison purposes with available products.

iii
Illustrated Book Tour

■■ Pedagogical Features
The MOAC textbook for Networking Fundamentals is designed to cover all the learning
objectives for MTA exam 98-366, which are referred to as its “objective domain.” The
Microsoft Technology Associate (MTA) exam objectives are highlighted throughout the
textbook. Many pedagogical features have been developed specifically for Microsoft Official
Academic Course programs.
Presenting the extensive procedural information and technical concepts woven throughout the
textbook raises challenges for the student and instructor alike. The Illustrated Book Tour that
follows provides a guide to the rich features contributing to Microsoft Official Academic Course
program’s pedagogical plan. Following is a list of key features in each lesson designed to pre-
pare students for success as they continue in their IT education, on the certification exams,
and in the workplace:
• Each lesson begins with an Objective Domain Matrix. More than a standard list of
learning objectives, the matrix correlates each software skill covered in the lesson to the
specific exam objective domain.
• Concise and frequent Step-by-Step instructions teach students new features and pro-
vide an opportunity for hands-on practice. Numbered steps give detailed, step-by-step
instructions to help students learn software skills.
• Illustrations: Screen images provide visual feedback as students work through the exer-
cises. The images reinforce key concepts, provide visual clues about the steps, and allow
students to check their progress.
• Key Terms: Important technical vocabulary terms are listed at the beginning of the
lesson. When these terms are used later in the lesson, they appear in bold italic type and
are defined.
• Engaging point-of-use Reader Aids, located throughout the lessons, tell students why
this topic is relevant (The Bottom Line) and provide students with helpful hints (Take
Note). Reader Aids also provide additional relevant or background information that adds
value to the lesson.
• Certification Ready features throughout the text signal students where a specific
certification objective is covered. They provide students with a chance to check their
understanding of that particular MTA objective and, if necessary, review the section of
the lesson where it is covered. MOAC offers complete preparation for MTA certification.
• End-of-Lesson Questions: The Knowledge Assessment section provides a variety of
multiple-choice, true-false, matching, and fill-in-the-blank questions.
• End-of-Lesson Exercises: Business case scenarios and Workplace Ready exercises are
projects that test students’ ability to apply what they’ve learned in the lesson.

iv
Illustrated Book Tour | v

■■ Lesson Features

Understanding Local L E SSON 1


Area Networking

O B J E C T I V E D O M A I N M AT R I X
Objective Domain Matrix
Skill/ConCept exam objeCtive objeCtive number
Examining Local Area Networks, Understand local area networks (LANs) 1.2
Devices, and Data Transfer
Understand switches 2.1
Identifying Network Topologies and Understand network topologies and 1.5
Standards access methods

KEY TERMS
broadcast frame P2P
Carrier Sense Multiple Access
with Collision Avoidance
(CSMA/CA)
full-duplex
half-duplex
peer-to-peer
perimeter network Key Terms
host print server
Carrier Sense Multiple Access
hub ring topology
with Collision Detected
(CSMA/CD) IEEE 802.3 RJ-45
centralized computing IP address serial data transfer 2 | Lesson 1
client/server local area network (LAN) star topology
computer telephony integration mesh topology switch
messaging server transceive
Local area networks are used by just about every organization, and today many homes
CTI-based server have them as well. This lesson refers to a fictitious company named Proseware, Inc., that
data transfer rate multiport repeater unicast wants to implement a new LAN in a brand‐new office, which will serve approximately
database server multistation access unit (MAU) virtual LAN (VLAN) 20 users. The company requires an extremely quick network that can transfer many
demilitarized zone (DMZ) network adapter web server different types of data. They want the most cost‐effective layout without losing speed
network controller Windows 10
or efficiency! The network engineer’s job responsibilities include selecting the right
distributive computing equipment, making sure it is all compatible, and getting it installed on time. The network
Ethernet network documentation wireless access point (WAP) engineer should have a thorough understanding of technologies, such as Ethernet and
file server network operating system (NOS) wireless local area network switching, because she will be critical in designing and implementing the network. This
network topology (WLAN) lesson covers all of the concepts necessary so you can be confident installing the network
that this company desires. As we progress through this book, we will build on this scenario
and add lots more networking technologies to the infrastructure.

■ Examining Local Area Networks, Devices, and Data Transfer


1
Simply stated, a network is two or more computers that exchange data. A local area

Bottom Line network (LAN) is a group of these computers that are confined to a small geographic
area, usually one building. Setting up a LAN requires computers with network adapters,
central connecting devices to connect those computers together, and a numbering scheme

Reader Aid
THE BOTTOM LINE
(such as IP addresses) to differentiate one computer from the next. It can also include
servers, some type of protective device such as a firewall, and connections to perimeter
networks that are adjacent to the LAN.

Defining the LAN

As mentioned, a LAN requires computers with network adapters, central connecting


devices, and some type of medium to tie it altogether, be it cabled or wireless

Certification connections. These must be connected together in some way to facilitate the transfer
of data. It is important to define how they are connected together, as well as how they
actually transmit data.

Ready Alert CERTIFICATION READY


We mentioned that a network is used to exchange data. But what are the real reasons that an
What is a local area
organization will desire (or need) a network? They can be organized into four categories:
network (LAN)? • Sharing: The sharing of files, databases, and media
Objective 1.2
• Communication: The methods of communication, such as email, instant messaging,
and faxing
• Organization: The ability to centralize data and make it more accessible and efficient
• $$$: The ability for the network to provide cost savings and/or increase productivity
Some would place security in this list of categories, but, unfortunately, as you will find, many

Take Note Reader Aid networks, devices, and operating systems are insecure when they are fresh out of the box. Just
having a network doesn’t ensure security. In fact, many steps must be taken to implement a
secure network.
To understand local area networks (LANs) better, it helps to write out the structure of the
LAN—to document it. Network documentation is any information that helps describe,
define, and otherwise explain how computers are connected in a physical and logical way. For
example, the physical connection could be cables, and the logical connection could be the
various IP addresses used by the devices on the network.

8 | Lesson 1

6. Click the Advanced tab. If you click the Speed & Duplex option, you can then
change the value, as shown in Figure 1‑8.

Figure 1-8 MOAC MTA 98-366 (412366)_c01.indd 2 6/22/2017 4:26:12 PM

Link speed of the network


adapter

Screen Images
TAKE NOTE *

A network adapter is
only as fast as the
network it connects to!

Full-duplex means that the network card can send and receive data simulta-
neously. In the Speed and Duplex drop‐down menu, you can select various speeds ,
including 10 Mbps, 100 Mbps, and 1 Gbps. You can also select half‐duplex, which
means that the network adapter can send and receive data, but not at the same
time. Full‐duplex is the superior connection, as long as your central connecting
device supports it. A full‐duplex connection can transceive (transmit and receive)
twice as much information per second compared with a half‐duplex connection. So,
to meet the requirements of the original scenario, you would probably want your
client computers to connect at 1 Gbps as well as utilize full‐duplex negotiations.
You can tell that a card is active because the Link Status field on the physical
device shows a green light. You can also open the device Status window (Open
Network and Sharing Center, and clink the adapter link) to see the current speed
of the adapter such as 1 Gbps, its media state, how long it has been up and the
current activity.
7. Finally, every network adapter will have a logical name. By default, the net‑
work adapter is known as Ethernet, although you can change the name if you so
desire. Ethernet will have its own Properties page and a status page. Let’s view
these now:
a. Right‐click the Network icon on the far right of the taskbar and choose Open
Network and Sharing Center. The Network and Sharing Center window opens.
An alternate way to access the Network and Sharing Center is to right‐click
Start and choose Control Panel. Then, navigate to Network and Internet >
Network and Sharing Center.
b. Click the Change adapter settings link. The Network Connections window
opens. (Navigation to this window is slightly different in other versions of Win‑
dows.)
c. In this window, right‐click the Ethernet icon and choose Properties. The Ether‑
net Properties dialog box opens, as shown in Figure 1‑9.
vi | Illustrated Book Tour

Understanding Local Area Networking | 11

house number and the street you live on, an IP address identifies your computer number and
the network it lives on. A common example of an IP address is 192.168.1.1.
Now, every IP address is broken down into two parts: the network portion, in this case
192.168.1, which is the network your computer is a member of, and the host portion, which
is the individual number of your computer, differentiating your computer from any others on
the network. In this case, it’s .1. How do we know this? The subnet mask tells us.
The subnet mask is a group of four numbers that define what IP network the computer is a
member of. All of the 255s in a subnet mask collectively refer to the network portion, while
the 0s refer to the host portion. This is illustrated in Table 1‑1. This table shows a typical
Class C IP address and the default corresponding subnet mask. If you were to configure the
IP address of a Windows computer as 192.168.1.1, Windows would automatically default to
a subnet mask of 255.255.255.0. If any other computers would like to communicate with
yours, they need to be configured with the same network number; however, every computer
on the same network needs to have a different host number or an IP conflict might ensue.
Of course, as a talented administrator, you’ll learn how to avoid IP conflicts—and you’ll learn
some tips on how to do so in Lessons 4 and 5.

Table 1-1
An IP Address and Type of Address firsT ocTeT second ocTeT Third ocTeT fourTh ocTeT

Easy-to-Read Tables
Corresponding Subnet Mask
IP address 192 168 1 1

Subnet mask 255 255 255 0

IP addresses are actually 32‐bit dotted‐decimal numbers. If you were to convert an IP


address’s decimal numbers to binary, you’d have a total of 32 bits. It is considered dotted
because each number is separated by a dot. Altogether, they contain four numbers, each of
which is a byte or octet. For example, 192 is an octet and its binary equivalent is 11000000,
which is 8 bits. 168 is also an octet, its binary equivalent is 10101000, and so on. Adding all
four octets together equals 32 bits.
IP addresses are usually applied to your network adapter, but can be applied to other devices,
such as switches, routers, and so on. It’s the fact that the device or computer has an IP address
that makes it a host. Let’s configure IP on our Windows 10 host now. Remember that other
Windows computers will be configured in a very similar way.

CONFIGURE IP ADDRESSES
GET READY. To configure IP addresses, perform the following steps.
1. Access the Ethernet Properties dialog box.
2. Click Internet Protocol Version 4 and then click the Properties button. The Inter‑
net Protocol Version 4 Properties dialog box opens. Write down the current settings
(if there are any) so that you can return the computer to these settings at the
end of the exercise.
3. By default, the Obtain an IP address automatically and Obtain DNS server address
automatically radio buttons are enabled, as shown in Figure 1‑11. That means that Understanding Local Area Networking | 11
the network adapter will attempt to get all its IP information from a DHCP server
or other device like a SOHO (Small Office/Home Office) four‐port router. However,
we want to configure the adapter statically, so let’s continue on! house number and the street you live on, an IP address identifies your computer number and
the network it lives on. A common example of an IP address is 192.168.1.1.
Now, every IP address is broken down into two parts: the network portion, in this case
192.168.1, which is the network your computer is a member of, and the host portion, which
is the individual number of your computer, differentiating your computer from any others on
the network. In this case, it’s .1. How do we know this? The subnet mask tells us.
The subnet mask is a group of four numbers that define what IP network the computer is a
member of. All of the 255s in a subnet mask collectively refer to the network portion, while
the 0s refer to the host portion. This is illustrated in Table 1‑1. This table shows a typical
Class C IP address and the default corresponding subnet mask. If you were to configure the
IP address of a Windows computer as 192.168.1.1, Windows would automatically default to
a subnet mask of 255.255.255.0. If any other computers would like to communicate with
yours, they need to be configured with the same network number; however, every computer
on the same network needs to have a different host number or an IP conflict might ensue.
Of course, as a talented administrator, you’ll learn how to avoid IP conflicts—and you’ll learn
some tips on how to do so in Lessons 4 and 5.

Table 1-1
An IP Address and Type of Address firsT ocTeT second ocTeT Third ocTeT fourTh ocTeT
Corresponding Subnet Mask
IP address 192 168 1 1

Subnet mask 255 255 255 0

IP addresses are actually 32‐bit dotted‐decimal numbers. If you were to convert an IP


address’s decimal numbers to binary, you’d have a total of 32 bits. It is considered dotted
because each number is separated by a dot. Altogether, they contain four numbers, each of
which is a byte or octet. For example, 192 is an octet and its binary equivalent is 11000000,
which is 8 bits. 168 is also an octet, its binary equivalent is 10101000, and so on. Adding all
four octets together equals 32 bits.
IP addresses are usually applied to your network adapter, but can be applied to other devices,
such as switches, routers, and so on. It’s the fact that the device or computer has an IP address
that makes it a host. Let’s configure IP on our Windows 10 host now. Remember that other
Windows computers will be configured in a very similar way.

Step by Step CONFIGURE IP ADDRESSES


GET READY. To configure IP addresses, perform the following steps.
1. Access the Ethernet Properties dialog box.
2. Click Internet Protocol Version 4 and then click the Properties button. The Inter‑
net Protocol Version 4 Properties dialog box opens. Write down the current settings
(if there are any) so that you can return the computer to these settings at the
end of the exercise.
3. By default, the Obtain an IP address automatically and Obtain DNS server address
automatically radio buttons are enabled, as shown in Figure 1‑11. That means that
the network adapter will attempt to get all its IP information from a DHCP server
or other device like a SOHO (Small Office/Home Office) four‐port router. However,
we want to configure the adapter statically, so let’s continue on!

26 | Lesson 1

to increase the speed of torrent downloads. It is estimated that between 20% and 35% of the
data transfers on the Internet involve torrents. Another benefit of the BitTorrent client is that
you can line up a large number of downloads from one torrent location (or multiple loca-
tions), and just let your computer download them while you do other things. A file is seeded
(stored) on one or more computers. Then, as clients (peers) download that file (or portions of
the file), they are automatically set up to distribute the file (or portions of the file). This way,
more and more computers are added to the “swarm,” making the availability of the file much
greater. Computers are set up to automatically distribute the file; it’s the default setting, but
you can turn off seeding/distribution in your client. You could also block it at your firewall.
Instead of a server hosting the file, a server simply tracks and coordinates the distribution of
files. The actual torrent starts with an initial small file (called a torrent file) that you download,
which contains information about the files to be downloaded. The reason the whole process is
called a torrent is because it usually begins with a small file that starts the download. One of
the differences is that when downloading a torrent, there is more than one TCP connection
(could be quite a few) to different machines in the P2P network. Contrast this to a single file
download from a web server where only one TCP connection is made. This is controlled in a
pseudorandom fashion by the tracking server to ensure availability of data. Another difference
is that most web servers will put a cap on the number of concurrent downloads you can do,
but not so with the torrent client program. The average person uses a BitTorrent client to
download movies, MP3s, and other media. Sometimes, these are distributed with the consent
of the owner; other times (and quite often), they are illegally seeded and distributed—as well
as downloaded! An example of legitimate usage is the World of Warcraft game. The owners of
the game use the Blizzard BitTorrent to distribute just about everything involved in the game.
Newer games for the PS3 and other consoles are doing the same type of thing. D‐Link and
other network equipment companies are embracing torrent technology as well.

S K I L L S U M M A RY
Skill Summary
In thIs lesson, you learned:
• A network is two or more computers that exchange data. A local area network (LAN) is a
group of these computers that are confined to a small geographic area, usually one building.
• The network adapter, also known as a network interface card (NIC), is the device that
enables the sending and receiving of data to and from your computer. Today, multiple
devices can connect to each other and communicate using a switch.
• Internet Protocol (IP) is the part of TCP/IP that, among other things, governs IP addresses.
The IP address is the cornerstone of networking. It defines the computer or host you are
working on.
• A wireless local area network (WLAN) has many advantages, the most standout of which
is the ability to roam. A person with a laptop, handheld computer or PDA, or other like
device can work from anywhere.
• Network topologies define the physical connections of hosts in a computer network. There
are several types of physical topologies, including bus, ring, star, mesh, and tree.
• Today’s computing is known as distributive computing and is used for both client/server
and peer‐to‐peer networks. This means that every device or workstation has its own
processing power.
• The client/server model is an architecture that distributes applications between servers, such
as Windows Server 2016, and client computers, such as Windows 8/8.1 or Windows 10.
• Peer‐to‐peer networking, first and foremost, means that each computer is treated as an
equal. This means each computer has the equal ability to serve data and to access data,
just like any other computer on the network. Before servers became popular in PC‐based
computer networks, each PC had the ability to store data.
Illustrated Book Tour | vii

Defining Networks with the OSI Model | 51

■ Business Case Scenarios


Scenario 2-1: Installing the Appropriate Switch
Business Case Scenarios
Proseware, Inc., requires you to install a 24‐port switch that directs TCP/IP traffic to logical
addresses on the network. Which kind of switch allows you to do this, and which kind of
addresses will the traffic be directed to? Also, which layer of the OSI model are you working
with here?

Scenario 2-2: Defining the IP Address and Ports Used by Destination


Servers 6 | Lesson 1

A coworker’s computer seems to be connecting to various computers on the Internet on its


own. The computer gets pop‐up advertisements and other pop‐ups out of the blue. Which This particular network adapter is a PCI card, but again, network adapters come in
command syntax is used to analyze which IP addresses and ports the computer is connecting many different forms. However, notice the port on the card. This is known as an
to? And which layers of the OSI model do the IP addresses and ports correspond to? RJ-45 port, and is where the RJ‐45 plug at the end of the network cable connects.
This is the most common type of network adapter port, allowing the adapter to
Scenario 2-3: Ensuring a Newly Created Email Account’s Logon connect to most of today’s wired networks.
Is Encrypted 2. Look for the network adapter on your computer. If the computer only uses a
wireless network adapter, look for an antenna on the card. Laptops have an
Your IT director wants you to create an email account to use on the company website. He internal antenna, but you can usually find out if you are connected wirelessly by
wants the email address to be free and wants proof that when a person logs on to the email
account, the password is encrypted. Which services, applications, and tools can you utilize to
looking at the wireless LED.
accomplish this? And which layers of the OSI model are being used for the logon? 3. Examine Figure 1‑5. This is a typical patch cable that connects to an RJ‐45 port.

Scenario 2-4: Creating a Permanent ARP Table Entry


Figure 1-5
Your IT director’s computer sleeps after 10 minutes. She wants to be able to “wake up” her Photo of a typical patch cable
desktop computer from a remote system, for example from her laptop. To do this, you first
need to create a static entry in your boss’s laptop’s ARP table. In addition, this entry needs to
be re‐created every time the laptop reboots. The desktop computer’s IP address is 10.50.249.38
and its MAC address is 00‐03‐FF‐A5‐55‐16. Which command syntax should you use to do
this? How will you make this command execute every time the computer boots? Which layer of
the OSI model is this scenario referencing?

T Workplace Ready
Photos
Analyzing an FTP Connection
The File Transfer Protocol is probably the most commonly used protocol when it comes to
file transfer (quite an appropriate name!). However, it can be insecure. Some FTP servers use
the standard port 21 for all data transfers. It is better to use port 21 for the initial connec-
tion, and then use dynamically assigned ports for subsequent data transfers. Also, some FTP
implementations send the user password as cleartext; this is not desirable. Passwords should
be complex, and authentication should be encrypted if possible. Also, more secure FTP pro-
grams should be utilized. For example, Pure‐FTPd (http://www.pureftpd.org) could be uti-
lized on the server side and FileZilla (http://filezilla‐project.org) could be incorporated on the
client side.

The type of cable is known as twisted pair. It has an RJ‐45 plug on the end,
which is molded so it can only connect one way to the RJ‐45 port. It also has
a tab that locks it in place. The RJ‐45 plug is slightly larger than a telephone
cable’s RJ‐11 plug, but looks very similar. Another difference is that the phone
plug usually has four wires, whereas the RJ‐45 plug has eight.
4. Identify the cable that connects your computer to the network. Disconnect the
cable (finish any downloads from the Internet if in progress first) and view the
connector. If you are connected via a cable, attempt to identify what device is
connected to the other end of the cable, such as a hub, switch, or router.
5. Now let’s access the operating system and look at the properties of a network
adapter. For this example, we are using a Windows 10 client computer with a
Realtek PCIe network adapter. However, older versions of Windows have almost
identical window and dialog box names, and the navigation to those windows is
similar as well.

Knowledge
Assessment

Understanding Local Area Networking | 27


Download Reader Aid
■ Knowledge Assessment
Multiple Choice
Select the correct answer for each of the following questions.
Understanding Local Area Networking | 3
1. Which of the following regenerates the signal and broadcasts the signal to every com-
puter connected to it?
In the following exercises, you will:
a. Hub D O WN LOA D
b. Switch • Examine typical LAN network documentation.
c. Router You can download a
• View the type of network adapter in a computer, inspect the type of connection that the
d. Firewall free trial of Visio from
network adapter makes to the network, and view its Properties page.
the Microsoft website.
2. Which of the following is not a central connecting device? A link is provided on • Define how information is sent across the LAN.
a. Hub the companion • Configure IP addresses on hosts.
b. Switch website.
The ability to document networks is an important skill for network administrators. The doc‑
c. SOHO router umentation phase occurs before networks are built and whenever changes or additions are
d. Windows 10 client made to the network. Microsoft Visio is a common tool used for network documentation;
3. When installing a network adapter to a computer so that it can be connected to a net- Figures 1‐1 to 1‐3 were developed using Visio.
work that uses twisted‐pair cabling, which type of port must be used by the network
adapter? EXAMINE LAN NETWORK DOCUMENTATION
a. RJ‐11
b. RJ‐45 GET READY. To examine LAN network documentation, perform the following steps.
c. RG‐58 1. Examine Figure 1‑1, which shows a basic example of a LAN.
d. Fiber optic
4. In Windows 10, which of the following should be used to access the properties of a net- Figure 1-1
work adapter? Basic LAN documentation
a. Device Manager
b. Ping
c. Advanced Firewall Server PC
d. Task Manager
5. When connecting a computer’s network adapter to a switch—with the desire for the
connection to be able to send and receive data simultaneously—which type of connec-
tion is required? Hub

a. Half‐duplex
b. Full‐duplex
c. Simplex
d. 100 Mbps
Laptop Mac
6. When connecting a computer at a rate of 100,000,000 bits per second, which of the fol-
lowing should be the speed of the network adapter being installed?
a. 10 Mbps CERTIFICATION READY You will notice that in the center of the diagram is a hub, also known as a mul-
b. 100 MB/s What are the capabilities tiport repeater. This is the most basic of central connecting devices (CCDs); it
c. 100 Mbps of hubs as compared to connects each of the computers, known as hosts, to each other by way of copper‐
d. 1,000 Mbps switches? based cables. When a host needs to send data, it first sends that data to the
Objective 2.1 hub, where it is amplified and broadcast to the rest of the network. Broadcasting
7. When connecting to a router that has the IP address 192.168.1.100 on a standard, means that the data is sent out to every host on the network. Of course, only
default Class C network using the subnet mask 255.255.255.0, which of the following is the intended recipient keeps the data; the rest of the hosts discard it. Although
a valid IP address for the network adapter? this is a bit wasteful, it was the standard for a long time. Today, however, switch‑
TAKE NOTE *
a. 192.168.0.1 ing technology, which is more efficient, is the standard. You’ll learn more about
b. 192.168.1.1 Today, a hub is consid‑ switching technology later in this lesson.
c. 192.168.100.1 ered a legacy hardware In the figure, several hosts connect to the hub, including:
d. 192.168.1.100 device that is largely
obsolete. Hubs have • A server, used to centralize data and share it with (or serve it to) other computers on
been replaced by net‑ the network.
work switches, which • A PC (personal computer) usually acts as a client on the network, most likely get‑
are discussed later in ting its information from the server. The PC can also store information locally.
this section and can be • A Mac (Macintosh) computer, which is another type of client computer; once again,
found in very old instal‑ this computer can store information locally, or get it from the server.
lations or specialized
• A laptop, which could be a PC or a Mac, is meant for portability. However, it can
applications.
also store and access data the same way the other computers do.

MOAC MTA 98-366 (412366)_c01.indd 3 6/22/2017 4:26:12 PM


Conventions and Features
Used in This Book

This book uses particular fonts, symbols, and heading conventions to highlight important
information or to call your attention to special steps. For more information about the features
in each lesson, refer to the Illustrated Book Tour section.

Convention Meaning
This feature provides a brief summary of the material to be
covered in the section that follows.
CERTIFICATION READY This feature signals the point in the text where a specific
certification objective is covered. It provides you with a
chance to check your understanding of that particular MTA
objective and, if necessary, review the section of the lesson
where it is covered.
Reader aids appear in shaded boxes found in your text. Take
Note provides helpful hints related to particular tasks or topics.
Download provides information on where to download use-
ful software.

MORE INFORMATION These notes provide pointers to information discussed else-


where in the textbook or describe interesting features of
Windows Server that are not directly addressed in the current
topic or exercise.
Alt+Tab A plus sign (+) between two key names means that you must
press both keys at the same time.
Example Key terms appear in bold italic.

viii
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
Instructor Support Program

The Microsoft Official Academic Course programs are accompanied by a rich array of resources
that incorporate the extensive textbook visuals to form a pedagogically cohesive package.
These resources provide all the materials instructors need to deploy and deliver their courses.
Resources available online for download include:
• The Instructor’s Guide contains solutions to all the textbook exercises, chapter sum-
maries, and lecture notes. Instructor Guides are available from the Instructor’s Book
Companion site (http://www.wiley.com/college/microsoft).
• The Test Bank contains hundreds of questions in multiple-choice, true-false, short
answer, and essay formats, and is available to download from the Instructor’s Book
Companion site (http://www.wiley.com/college/microsoft). A complete answer key is
provided.
• A complete set of PowerPoint presentations and images are available on the Instructor’s
Book Companion site (http://www.wiley.com/college/microsoft) to enhance classroom
presentations. Approximately 50 PowerPoint slides are provided for each lesson. Tailored
to the text’s topical coverage and Objective Domain Matrix, these presentations are
designed to convey key concepts addressed in the text. All images from the text are on
the Instructor’s Book Companion site (http://www.wiley.com/college/microsoft). You
can incorporate them into your PowerPoint presentations, or create your own overhead
transparencies and handouts. By using these visuals in class discussions, you can help
focus students’ attention on key elements of technologies covered and help them under-
stand how to use it effectively in the workplace.

ix
Student Support Program

■■ About the Microsoft Technology Associate (MTA)


Certification
Preparing Tomorrow’s Technology Workforce

Technology plays a role in virtually every business around the world. Possessing the
fundamental knowledge of how technology works and understanding its impact on today’s
academic and workplace environment is increasingly important—particularly for students
interested in exploring professions involving technology. That’s why Microsoft created the
Microsoft Technology Associate (MTA) certification—a new entry-level credential that
validates fundamental technology knowledge among students seeking to build a career in
technology.
The Microsoft Technology Associate (MTA) certification is the ideal and preferred path to
Microsoft’s world-renowned technology certification programs, such as Microsoft Certified
Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP). MTA is
positioned to become the premier credential for individuals seeking to explore and pursue a
career in technology, or augment related pursuits such as business or any other field where
technology is pervasive.

MTA Candidate Profile

The MTA certification program is designed specifically for secondary and post-secondary stu-
dents interested in exploring academic and career options in a technology field. It offers stu-
dents a certification in basic IT and development. As the new recommended entry point for
Microsoft technology certifications, MTA is designed especially for students new to IT and
software development. It is available exclusively in educational settings and easily integrates
into the curricula of existing computer classes.

MTA Empowers Educators and Motivates Students

MTA provides a new standard for measuring and validating fundamental technology
knowledge right in the classroom while keeping your budget and teaching resources intact.
MTA helps institutions stand out as innovative providers of high-demand industry creden-
tials and is easily deployed with a simple, convenient, and affordable suite of entry-level

x
Student Support Program | xi

technology certification exams. MTA enables students to explore career paths in technology
without requiring a big investment of time and resources, while providing a career foundation
and the confidence to succeed in advanced studies and future vocational endeavors.
In addition to giving students an entry-level Microsoft certification, MTA is designed to be a
stepping stone to other, more advanced Microsoft technology certifications, like the Microsoft
Certified Technology Specialist (MCTS) certification.
Acknowledgments

■■ MOAC MTA Technology Fundamentals Reviewers


We’d like to thank the many reviewers who pored over the manuscript and provided invaluable feedback in the service of
quality instructional materials:

Yuke Wang, University of Texas at Dallas David Koppy, Baker College


Palaniappan Vairavan, Bellevue College Sharon Moran, Hillsborough Community College
Harold “Buz” Lamson, ITT Technical Institute Keith Hoell, Briarcliffe College and Queens
Colin Archibald, Valencia Community College College—CUNY
Catherine Bradfield, DeVry University Online Mark Hufnagel, Lee County School District
Robert Nelson, Blinn College Rachelle Hall, Glendale Community College
Kalpana Viswanathan, Bellevue College Scott Elliott, Christie Digital Systems, Inc.
Bob Becker, Vatterott College Gralan Gilliam, Kaplan
Carol Torkko, Bellevue College Steve Strom, Butler Community College
Bharat Kandel, Missouri Tech John Crowley, Bucks County Community College
Linda Cohen, Forsyth Technical Community College Margaret Leary, Northern Virginia Community College
Candice Lambert, Metro Technology Centers Sue Miner, Lehigh Carbon Community College
Susan Mahon, Collin College Gary Rollinson, Cabrillo College
Mark Aruda, Hillsborough Community College Al Kelly, University of Advancing Technology
Claude Russo, Brevard Community College Katherine James, Seneca College

xii
Brief Contents

1 Understanding Local Area Networking 1


2 Defining Networks with the OSI Model 30
3 Understanding Wired and Wireless Networks 53
4 Understanding Internet Protocol 72
5 Implementing TCP/IP in the Command Line 104
6 Working with Networking Services 139
7 Understanding Wide Area Networks 159
8 Defining Network Infrastructures and Network Security 179

Appendix 202
Index 203

| xiii
Contents

Lesson 1: Understanding Local Area Lesson 3: Understanding Wired


Networking 1 and Wireless Networks 53
Objective Domain Matrix 1 Objective Domain Matrix 53
Key Terms 1 Key Terms 53
Examining Local Area Networks, Recognizing Wired Networks and Media Types 54
Devices, and Data Transfer 2 Identifying and Working with Twisted-Pair Cables 54
Defining the LAN 2 Identifying and Working with Fiber-Optic Cable 60
Identifying Types of LANs 14 Understanding Wireless Networks 62
Getting to Know Perimeter Networks 16 Identifying Wireless Devices 62
Identifying Network Topologies and Standards 18 Identifying Wireless Networking Standards 64
Identifying Network Topologies 18 Skill Summary 68
Defining Ethernet Standards 20
Knowledge Assessment 68
Identifying the Differences Between Client/Server
and Peer-to-Peer 23 Business Case Scenarios 70
Skill Summary 26 Workplace Ready 71
Knowledge Assessment 27
Business Case Scenarios 28 Lesson 4: Understanding Internet
Workplace Ready 29 Protocol 72
Objective Domain Matrix 72
Lesson 2: Defining Networks Key Terms 72
with the OSI Model 30 Working With IPv4 73
Categorizing IPv4 Addresses 73
Objective Domain Matrix 30 Default Gateways and DNS Servers 80
Key Terms 30 Defining Advanced IPv4 Concepts 82
Understanding OSI Basics 31 Working With IPv6 91
Defining the OSI Model Layers 31 Understanding IPv6 91
Defining the Communications Subnetwork 33 Configuring IPv6 93
Understanding Layer 2 Switching 36 Skill Summary 98
Understanding Layer 3 Switching 39 Knowledge Assessment 99
Understanding Characteristics of Switches 39
Business Case Scenarios 102
Defining the Upper OSI Layers 40
Workplace Ready 103
Defining the Transport Layer 40
Defining the Session Layer 43
Defining the Presentation Layer 44 Lesson 5: Implementing TCP/IP in the
Defining the Application Layer 45
Reviewing the OSI Layers 46
Command Line 104
Defining the TCP/IP Model 47
Objective Domain Matrix 104
Skill Summary 48
Key Terms 104
Knowledge Assessment 49
Using Basic TCP/IP Commands 105
Business Case Scenarios 51
Working with the Command Prompt Window 105
Workplace Ready 51 Using ipconfig and ping 107

xiv |
Contents | xv

Working with Advanced TCP/IP Commands 115 Defining Packet Switching 164
Using netstat and nbtstat 115 Defining T-Carriers 171
Using tracert and pathping 118 Defining Other WAN Technologies and Internet
Using nslookup 120 Connectivity 172
Using ftp and telnet 121 Skill Summary 174
Using Windows PowerShell 122
Knowledge Assessment 175
Using net 127
Business Case Scenarios 177
Skill Summary 129
Workplace Ready 178
Knowledge Assessment 130
Business Case Scenarios 136
Workplace Ready 138 Lesson 8: Defining Network
Infrastructures and
Lesson 6: Working with Networking Network Security 179
Services 139 Objective Domain Matrix 179
Key Terms 179
Objective Domain Matrix 139
Understanding Networks Outside the LAN 180
Key Terms 139 Defining the Internet 180
Setting Up Common Networking Services 140 Defining Intranets and Extranets 181
Working with the Dynamic Host Configuration Protocol Configuring VPN Connections
(DHCP) 141 and Authentication 181
Introducing Remote Administration 145 Selecting Types of VPN Protocols 182
Defining More Networking Services 148 Selecting Authentication for VPN Connections 185
Defining RRAS 148 Creating a VPN Connection Using the Create a VPN
Defining IPsec 150 Connection Wizard 185
Defining Name Resolution Techniques 151 Creating a VPN Connection Using Windows 10
Defining DNS 152 Settings 188
Defining WINS 153 Using Connection Manager (CM) and the Connection
Manager Administration Kit (CMAK) 189
Skill Summary 154
Understanding Security Devices and Zones 190
Knowledge Assessment 155 Defining Firewalls and Other Perimeter Security
Business Case Scenarios 157 Devices 190
Workplace Ready 158 Redefining the DMZ 193
Putting It All Together 194
Skill Summary 196
Lesson 7: Understanding Wide Area Knowledge Assessment 196
Networks 159 Business Case Scenarios 199
Workplace Ready 200
Objective Domain Matrix 159
Key Terms 159
Understanding Routing 160
Identifying Static and Dynamic Routing 160 Appendix 202
Understanding Quality of Service (QoS) 163
Index 203
Defining Common WAN Technologies
and Connections 164
Understanding Local LE S S O N 1
Area Networking

O B J E C T I V E D O M A I N M AT R I X

Skill/Concept Exam Objective Objective Number


Examining Local Area Networks, Understand local area networks (LANs) 1.2
Devices, and Data Transfer
Understand switches 2.1
Identifying Network Topologies and Understand network topologies and 1.5
Standards access methods

KEY TERMS
broadcast frame P2P
Carrier Sense Multiple Access full-duplex peer-to-peer
with Collision Avoidance half-duplex perimeter network
(CSMA/CA)
host print server
Carrier Sense Multiple Access
hub ring topology
with Collision Detection
(CSMA/CD) IEEE 802.3 RJ-45

centralized computing IP address serial data transfer

client/server local area network (LAN) star topology

computer telephony integration mesh topology switch

CTI-based server messaging server transceive

data transfer rate multiport repeater unicast

database server multistation access unit (MAU) virtual LAN (VLAN)

demilitarized zone (DMZ) network adapter web server

distributive computing network controller Windows 10

Ethernet network documentation wireless access point (WAP)

file server network operating system (NOS) wireless local area network
network topology (WLAN)

1
2 | Lesson 1

Local area networks are used by just about every organization, and today many homes
have them as well. This lesson refers to a fictitious company named Proseware, Inc., that
wants to implement a new LAN in a brand-new office, which will serve approximately
20 users. The company requires an extremely quick network that can transfer many
different types of data. They want the most cost-effective layout without losing speed
or efficiency! The network engineer’s job responsibilities include selecting the right
equipment, making sure it is all compatible, and getting it installed on time. The network
engineer should have a thorough understanding of technologies, such as Ethernet and
switching, because she will be critical in designing and implementing the network. This
lesson covers all of the concepts necessary so you can be confident installing the network
that this company desires. As we progress through this book, we will build on this scenario
and add lots more networking technologies to the infrastructure.

■■ Examining Local Area Networks, Devices, and Data Transfer

Simply stated, a network is two or more computers that exchange data. A local area
network (LAN) is a group of these computers that are confined to a small geographic
area, usually one building. Setting up a LAN requires computers with network adapters,
THE BOTTOM LINE
central connecting devices to connect those computers together, and a numbering scheme
(such as IP addresses) to differentiate one computer from the next. It can also include
servers, some type of protective device such as a firewall, and connections to perimeter
networks that are adjacent to the LAN.

Defining the LAN

As mentioned, a LAN requires computers with network adapters, central connecting


devices, and some type of medium to tie it altogether, be it cabled or wireless
connections. These must be connected together in some way to facilitate the transfer
of data. It is important to define how they are connected together, as well as how they
actually transmit data.

We mentioned that a network is used to exchange data. But what are the real reasons that an
CERTIFICATION READY
What is a local area
organization will desire (or need) a network? They can be organized into four categories:
network (LAN)? • Sharing: The sharing of files, databases, and media
Objective 1.2
• Communication: The methods of communication, such as email, instant messaging,
and faxing
• Organization: The ability to centralize data and make it more accessible and efficient
• $$$: The ability for the network to provide cost savings and/or increase productivity
Some would place security in this list of categories, but, unfortunately, as you will find, many
networks, devices, and operating systems are insecure when they are fresh out of the box. Just
having a network doesn’t ensure security. In fact, many steps must be taken to implement a
secure network.
To understand local area networks (LANs) better, it helps to write out the structure of the
LAN—to document it. Network documentation is any information that helps describe,
define, and otherwise explain how computers are connected in a physical and logical way. For
example, the physical connection could be cables, and the logical connection could be the
various IP addresses used by the devices on the network.
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
   Understanding Local Area Networking | 3

In the following exercises, you will:


DOWNLOAD
• Examine typical LAN network documentation.
You can download a
• View the type of network adapter in a computer, inspect the type of connection that the
free trial of Visio from
network adapter makes to the network, and view its Properties page.
the Microsoft website.
A link is provided on • Define how information is sent across the LAN.
the ­companion • Configure IP addresses on hosts.
website.
The ability to document networks is an important skill for network administrators. The doc-
umentation phase occurs before networks are built and whenever changes or additions are
made to the network. Microsoft Visio is a common tool used for network documentation;
Figures 1-1 to 1-3 were developed using Visio.

EXAMINE LAN NETWORK DOCUMENTATION


GET READY. To examine LAN network documentation, perform the following steps.
1. Examine Figure 1‑1, which shows a basic example of a LAN.

Figure 1-1
Basic LAN documentation

Server PC

Hub

Laptop Mac

CERTIFICATION READY You will notice that in the center of the diagram is a hub, also known as a
What are the capabilities multiport repeater. This is the most basic of central connecting devices (CCDs); it
of hubs as compared to connects each of the computers, known as hosts, to each other by way of copper-
switches? based cables. When a host needs to send data, it first sends that data to the
Objective 2.1 hub, where it is amplified and broadcast to the rest of the network. Broadcasting
means that the data is sent out to every host on the network. Of course, only
the intended recipient keeps the data; the rest of the hosts discard it. Although
TAKE NOTE *
this is a bit wasteful, it was the standard for a long time. Today, however, switch‑
ing technology, which is more efficient, is the standard. You’ll learn more about
Today, a hub is consid- switching technology later in this lesson.
ered a legacy hardware In the figure, several hosts connect to the hub, including:
device that is largely
obsolete. Hubs have • A server, used to centralize data and share it with (or serve it to) other com‑
been replaced by net- puters on the network.
work switches, which • A PC (personal computer) usually acts as a client on the network, most likely
are discussed later in getting its information from the server. The PC can also store information locally.
this section and can be • A Mac (Macintosh) computer, which is another type of client computer; once
found in very old instal- again, this computer can store information locally, or get it from the server.
lations or specialized
• A laptop, which could be a PC or a Mac, is meant for portability. However, it
applications.
can also store and access data the same way the other computers do.
4 | Lesson 1

TAKE NOTE * 2. Examine your own network and record your results. Use Visio, if possible; other‑
wise, draw out your own network documentation on paper. Whether you are at
If you are using home or at a school or business, chances are that you are connected to a LAN. Try
Microsoft Visio, uti- to identify any hosts on the network (PCs, laptops, servers, etc.). Then, identify
lize the Basic Network the central connecting device that ties everything together. This could be a basic
Diagram template. This hub, a switch, or a router or multifunction network device.
can be accessed in the
Network section when 3. Examine Figure 1‑2. This is an intermediate example of a LAN.
starting a new document.

Figure 1-2
Intermediate LAN
documentation

Server
Internet

Router

Laptop PC

In Figure 1‑2, the hub is replaced with a basic four-port router; these are also
referred to as SOHO (Small Office/Home Office) routers. The router acts as a central
connecting device, connecting the hosts together, but also has a special communica‑
tions link to the internet, allowing the hosts to send and receive data to and from
computers on the internet. That communications link between the router and the
internet is where the LAN ends. So, the PC, laptop, server, and router are part of the
LAN. Anything else beyond the router is considered to be outside of the LAN.
4. Examine your own LAN again. If possible, identify any routers and connections to
the internet (or other networks). Add these to your written, or Visio, documentation.
5. Examine Figure 1‑3. This is a slightly more advanced example of a LAN.

Figure 1-3
Advanced LAN documentation Switch
   Understanding Local Area Networking | 5

In Figure 1‑3, more central connecting devices are added. Instead of connecting hundreds of
devices to a single central connecting device, you can break up the network in a hierarchical
fashion. For example, on the left side of the figure are two PCs and one server connected to
a hub. Let’s say that these represent 24 computers, and that each other group of computers
connected to a hub also represents 24 computers. Instead of connecting all the computers to
a single, central connecting device, which might not be able to physically support all of the
hosts, the groups of 24 hosts are connected to their own hub. Then, the hubs are all daisy-
chained to a switch at the top of the figure. The switch will most likely be a powerful (and
expensive) device, in order to support all of the computers that ultimately connect to it. You
can regard the individual hubs as devices that allow connectivity for single departments in a
company, or individual classrooms in a school. The master switch at the top of the hierarchi-
cal tree connects everything together; however, it also acts as a single point of failure, which
is addressed in Lesson 2. As you can guess, this type of network architecture is the kind we
will need to use to accomplish the goals laid out in the scenario at the beginning of this
lesson.

The network adapter, also known as a network interface card (NIC), is the device that
enables the sending and receiving of data to and from your computer. It might be integrated
into the motherboard or it might act as a separate device that connects to a PCI slot, or per-
haps connects to a PC Card slot or USB port. It connects to the network by way of cable
(wired) or by air (wireless). It has its own basic CPU to process transmitted data and a ROM
chip to store information about itself. Network adapters also have a software component
known as a driver, defining how the card will interact with the operating system; this usually
includes a Properties page that can be accessed in the operating system, enabling the user to
configure the adapter as he sees fit.

VIEW THE NETWORK ADAPTER


GET READY. To view the network adapter, perform the following steps.
1. Examine Figure 1‑4, which shows a typical network adapter.

Figure 1-4
Photo of a typical network
adapter

Photo used with permission from John Wiley & Sons, Inc.
6 | Lesson 1

This particular network adapter is a PCI card, but again, network adapters come
in many different forms. However, notice the port on the card. This is known as
an RJ-45 port, and is where the RJ-45 plug at the end of the network cable con‑
nects. This is the most common type of network adapter port, allowing the adapter
to connect to most of today’s wired networks.
2. Look for the network adapter on your computer. If the computer only uses a
wireless network adapter, look for an antenna on the card. Laptops have an
internal antenna, but you can usually find out if you are connected wirelessly by
looking at the wireless LED.
3. Examine Figure 1‑5. This is a typical patch cable that connects to an RJ-45 port.

Figure 1-5
Photo of a typical patch cable

Photo used with permission from John Wiley & Sons, Inc.

The type of cable is known as twisted pair. It has an RJ-45 plug on the end,
which is molded so it can only connect one way to the RJ-45 port. It also has
a tab that locks it in place. The RJ-45 plug is slightly larger than a telephone
cable’s RJ-11 plug, but looks very similar. Another difference is that the phone
plug usually has four wires, whereas the RJ-45 plug has eight.
4. Identify the cable that connects your computer to the network. Disconnect the
cable (finish any downloads from the internet if in progress first) and view the
connector. If you are connected via a cable, attempt to identify what device is
connected to the other end of the cable, such as a hub, switch, or router.
5. Now let’s access the operating system and look at the properties of a network
adapter. For this example, we are using a Windows 10 client computer. However,
older versions of Windows have almost identical window and dialog box names, and
the navigation to those windows is similar as well.
   Understanding Local Area Networking | 7

a. Right-click Start and choose Computer Management. Alternatively for Windows


10, and for Windows Server 2016, click Start, type Computer Management, and
then press Enter.
b. Click Device Manager.
c. Click the > sign to expand the Network adapters category, as shown in
Figure 1‑6.

Figure 1-6
Device Manager with the
Network adapters category
expanded

d. Right-click the network adapter and choose Properties. A dialog box similar to
the one shown in Figure 1‑7 opens.

Figure 1-7
Properties dialog box of a
network adapter
Random documents with unrelated
content Scribd suggests to you:
Clelia. Eppure Marianna...
Rob. Ebbene sì.
Clelia. Come rispondi!
Rob. (Addolcito) Scusami...
Mar. (Rientra col lume)
Rob. Ma questo è per voi! — Portane un altro per me.
Clelia. Non vuoi star qui?
Rob. Non posso, ho da fare.
Clelia. Prendi questo. (A Marianna, che aspetta) Va, va.
Mar. (Via).
Rob. (Prende il lume e s’incammina).
Clelia. Roberto!... senza dir nulla a tua moglie?
Rob. (Fermandosi) Ma sì... ma sì, altro! (Va verso Elena).
Elena. (Lo guarda fissamente, aspettando).
Rob. (Posando il lume sulla tavola nervosamente) Insomma cosa c’è?
(a Clelia) Tu mi parli come a un ragazzo mal educato; Elena mi fa
una faccia! Se ci son novità, ditelo. Se no, lasciatemi andare. (Dopo
breve pausa). E non state in quest’aria; si gela. Venite via; fatevi
accendere il fuoco nel salotto.
Clelia. (Con le lagrime nella voce) Ah Roberto, come ci fai male!
Rob. (Tra’ denti) Ecco.
Clelia. Sono sempre stata buona con te. Non rimpiango niente, ma
questo è il momento di ricordartene. Tu lasci una moglie che ti vuole
un bene dell’anima, per correr dietro... sappiamo tutti a chi. È un
vero scandalo, sai. Non è l’esempio che devono dare i signori. — E
so anche altre cose... Giudizio Roberto, giudizio, per carità! Pensa ai
bambini, pensa ad Elena, pensa a me...
Rob. Elena... Elena ha torto: dovrebbe capire che non si può restar
gli stessi per tutta la vita... Se fosse sincera, vedrebbe che anche lei
non mi ama più come una volta.
Elena. (Scattando in piedi) Credi questo tu? — Non lo è. — Tu
vorresti che lo fosse, eh?
Rob. Oh santo Dio!
Elena. Sei cambiato? Ti giuro che io non lo sono. Il mio amore sei tu,
la mia felicità sei tu. Mi sono data a te per tutta in vita, non posso
capire quello che adesso succede.
Rob. È un cattivo momento per discutere. Siamo tutti nervosi...
Elena. No, no, no, finiamola, finiamola subito, d’un colpo. A te, parla.
Rob. Ebbene sia. Non sono più degno di te. Perdonami quello che ti
faccio soffrire.
Elena. Avanti, avanti; non puoi aver finito.
Rob. Hai mia madre che ti ama come una figlia...
Clelia. Ah sì, questo sì!
Rob. Hai i bambini... Amatevi fra di voi, e non pensate più a me.
Vedete bene che non misuro più le cose. Soffro, son vinto, è finita!
Elena. (A Clelia) Lo senti, lo senti!
Clelia. Roberto!
Rob. Conducila via, fa questo per lei!
Elena. Aspetta! Parlo io. Dunque è finita; non posso sperar più, non
tornerai quel di prima, non saremo più noi, mai, mai, mai!? Allora,
per forza, devo cambiare anch’io. Noi madri amiamo i nostri figli, li
difendiamo. Bada a te! badate a voi! Non farei nulla per me, ma
penso a loro. — Guardatevi!
Clelia. (Spaventata) Non dir queste cose! Per carità; non parlare
così!
Elena. Tu non sai che cosa è questo momento per me! — Dimmi
ancora: non vivrò più a lungo; se muoio, tu la sposerai?
Rob. (A Clelia) Conducila via, conducila via!
Elena. (Con grandissima intensità di passione) Dimmi no, dimmi no!
Trova una parola, Roberto! trovala, trovala...
Clelia. (Abbracciandola) Vieni; lasciamolo stare, vieni con me. (A
Roberto, severamente) Non ti riconosco più, fa quello che vuoi! (Via,
conducendo Elena, dalla sinistra).

SCENA SETTIMA.
Roberto solo.

Guarda la porta per cui sono uscite e porge l’orecchio


come per accertarsi che se ne vanno davvero. — Si aggira
un momento turbato, agitatissimo; d’un tratto corre
all’armadio, apre con la chiave che ha in tasca, e presa la
valigia, parte rapidamente dal giardino.

SCENA OTTAVA.
Elena, poi Marianna.

La scena rimane vuota per alcuni momenti.

Elena. (Ricompare, e cerca avidamente con gli sguardi Roberto).


Mar. (Entra frettolosa dal giardino e si ferma sulla soglia a guardare
indietro).
Elena. (Correndo a lei) È uscito, eh? Corri, chiamalo, voglio
parlargli...
Mar. (Trattenendola) Se sapesse!...
Elena. Via! Lasciami...
Mar. Non vada fuori. Tornavo a casa. All’usciolo trovo una figura:
questa mi vede e scappa. Io dietro; scantona, io dietro!... È buio, ma
l’ho riconosciuta. Indovini...
Elena. No! No!
Mar. Era Delfina.
Elena. Ah!
Mar. Aspetti, aspetti! In questo ecco il padrone che salta fuor
dall’usciolo: guarda di qua, guarda di là, non vede nessuno — perchè
noi eravamo dietro il canto — e via, verso la stazione!... Si credeva
in ritardo.
Elena. Cosa dici?
Mar. Non capisce? Scappavano insieme...
Elena. (Con un grido) Oh! Non è vero! Non è vero! Non è vero!
Mar. (indicando l’armadio) Guardi che è aperto! Aveva messa lì la
valigia per averla a mano...
Elena. (Si passa una mano sulla fronte, guarda fissamente, come
fuori di sè).
Mar. Lo sapevo, io! Ma in grazia mia non si sono trovati... (Correndo
all’uscio del giardino) E l’altra è là, sa, la sfacciata! Aspetta; chi sa
come si arrabbia! Non so cosa le farei!
Elena. (È sempre ritta davanti all’armadio: ad un tratto si scuote
come colpita bruscamente da un’idea, si slancia, trova la boccetta
dell’acido e respingendo Marianna, balza in giardino).
Mar. (Sbalordita) Ohi, ohi! perchè? Cosa fa?... Signora, signora!

(Uno strido acutissimo di fuori).

Mar. Oh povera me! (Correndo via a sinistra) Signora Clelia! Signora


Clelia!
SCENA NONA.
Elena sola.

Elena. (Rientra ansante, si lascia andar sul sofà, esausta di forze.


Dopo un istante, si scuote come svegliandosi, tende l’orecchio
atterrita).

Rumori confusi di fuori: voci che si vengono avvicinando


rapidamente.

— È là, è là, è là!


— Cos’è stato?
— È qui; venite qui!
— Chi è? cos’ha?
— Misericordia!
— Lumi, lumi, lumi...
— Una donna!
Una Voce. (più chiara e più forte) Ha la faccia bruciata!
Elena. (Balzando in piedi) I figli! I figli!... Voglio i miei figli!

Cala la tela.
LA PRIMAVERA DEL ’99
SCENE.
PERSONAGGI

Andrea Reviglio.
Il cavaliere di Priasco.
La contessa Clara Malan del Villar.
Don Rolando, prete di casa.
Rosa.
Alban.
Un uffiziale francese.
Un sergente.
Soldati.

La scena è in Piemonte, nella casa di campagna della contessa


Malan. — Maggio 1799.
ATTO UNICO.

Stanza arredata con semplicità elegante. — Ingresso


comune a destra; altro uscio a sinistra; un terrazzino in
prospetto. — Ritratti antichi sulle pareti, vecchi mobili, un
lume acceso sopra una tavola. — È l’alba.

SCENA PRIMA.
Alban, Rosa.

Alban (sul terrazzino, guarda attentamente al di fuori).


Rosa (dalla sinistra, senza alzare la voce). Alban?... Alban?
Alban (venendo fuori dal terrazzino). Son qui!... Par tutto quieto.
Rosa. Ordine di tornare alla fattoria subito, subito.
Alban (per partire). Vado.

SCENA SECONDA.
Alban, Rosa, Don Rolando.

Rolando (dalla destra). Dove andate?


Alban. Alla fattoria.
Rolando. Alla fattoria non si sa ancor niente.
Alban. Aspetterò al portone. (Via)
Rosa. Che notte, don Rolando, che notte!
Rolando (passeggiando). Brutta, sì.
Rosa. Ha capito subito anche lei ch’era la campana a martello? E
come si vedevano le fiamme! E quei colpi? Si battevano, eh?
Rolando. Certo, a Toralta.
Rosa. Libera nos domine! Vado, chè la signora è sola. (Via).

SCENA TERZA.
Don Rolando, Andrea.

Rolando (passeggia, guarda fuori, si avvede che è giorno, spegne il


lume).
Andrea (entra dalla destra: è un po’ ansante, con qualche disordine
negli abiti come chi è venuto correndo).
Rolando. Dunque? Dunque? (Gli va incontro).
Andrea. Vengo da Toralta. Il villaggio è deserto; ho visto dei morti sul
sagrato; sulla piazza vi sono due o tre case bruciate...
Rolando. Ah! Dai tricolori, eh?
Andrea. Sì. I contadini, ieri mattina hanno buttato giù l’albero della
Libertà; ieri sera è arrivata truppa francese: l’uffiziale voleva farlo
rialzare, allora...
Rolando. Schioppettate?
Andrea. Ecco.
Rolando (con entusiasmo) Bravi!
Andrea (alzando le spalle). Oh, inaffiar con sangue un albero che non
ha radici!
Rolando. I francesi sono i nostri assassini...
Andrea. I piemontesi cercano e ammazzano i soldati che viaggiano
soli.
Rolando. È la santa insurrezione che si estende.
Andrea. Santa perchè favorita dai preti e dai frati?
Rolando. Reviglio! Reviglio!
Andrea (continuando). Che non si contentano di raccomandar
l’omicidio dai pulpiti, ma si mettono alla testa delle bande briache e
feroci.
Rolando. Ma al grido di: — Viva la fede! Al grido di: — Viva il Re!
Andrea (Tace).
Rolando. E gli Austro-Russi si avanzano... (si frega le mani con gioia).
Andrea. (Alza le spalle).
Rolando (irritato). Giacobino!
Andrea. No! (con calma). Sono un servitore, io: un servitore di casa
Malan, e nient’altro.

SCENA QUARTA.
Rolando, Andrea, Alban.

Alban (dalla destra, con sorpresa). Sor Andrea! di dov’è passato?


Andrea. Dal giardino.
Alban. Ed io che aspettavo al portone! Bisogna avvertire la signora
subito. (Entra prestamente a sinistra).
Andrea (a D. Rolando, che passeggia nervoso). Don Rolando, siamo
alle rotte anche noi?
Rolando (porgendogli la mano). No, no, Andrea... Ma come vorrei
avere i tuoi anni!...
SCENA QUINTA.
Rolando, Andrea, Alban, Clara.

Clara (entrando rapida, seguita da Alban) Aspetta. (Ad Andrea). E


così?
Andrea. Non vedendo ritornar Michele...
Clara (con qualche impazienza). Siete andato voi. Lo so questo.
Andrea. Giunto a Toralta...
Clara (interrompendolo). A Toralta?
Andrea. È là che succedeva il trambusto.
Clara (calmandosi un poco). Sta bene... E ne immagino anche la
causa. E poi?... E dunque? Cos’avete fatto? Vi sarete informato,
spero?
Andrea. Sì, signora. Ho saputo tutto da alcuni contadini che stavano
in vedetta sul ponte.
Clara (con vivacità). Che ponte?
Andrea. Il ponte di Rifreddo.
Clara. E cosa siete andato a fare al Rifreddo?
Andrea. È la strada più corta.
Clara. Passando a Priasco allungavate di poco...
Andrea. Non ci ho pensato.
Clara. Avete fatto male a non pensarci. (Voltandosi a don Rolando).
E quell’altro come va che non torna?
Rolando. Michele?... Michele ha la sua vecchia mamma a Toralta.
Partito prima, assai prima di Andrea è arrivato certo a tempo per
metterla in salvo.
Clara. E dove?
Rolando. A Priasco, suppongo, che è il villaggio più vicino.
Clara (ad Alban). Va giù; e se Michele ritorna, avvertimi subito.
Alban (via).
Andrea (a Clara, umilmente). Se la signora contessa desidera, vado io
stesso...
Clara (interrompendolo). No... Più tardi, se mai... (finamente).
Quando le strade saranno di nuovo sicure. (Via a sinistra).

SCENA SESTA.
Andrea e Don Rolando.

Andrea. (È rimasto immobile a capo basso).


Rolando (battendogli leggermente una spalla). Si va?
Andrea (scuotendosi). Dove?
Rolando. A vedere i rifugiati, prenderemo la via dei boschi...
Andrea. Cosa ha voluto dir la signora?
Rolando. Non so, figliuol mio.
Andrea. Che ho avuto paura?
Rolando. Eh via!
Andrea (con forza). Ma io non sapevo... perchè altrimenti sarei
andato dove voleva lei, a costo di lasciarci la vita!
Rolando. Sta bene; ma intanto cosa fai? — Vuoi star qui a covarti il
rabbuffo? Vieni, andiamo...

SCENA SETTIMA.
Andrea, Don Rolando, Alban.
Alban (frettoloso, passando). Michele è tornato... Ha visto il cavalier
di Priasco, che si è battuto tutta la notte... che sarà qui a momenti
(via a sinistra).
Andrea (colpito). Ah! Dunque è per lui che dovevo andare a Priasco!?
Rolando. Certo. È cugino della signora; era il miglior amico del nostro
povero conte... Dunque non ti vuoi muovere?
Andrea (risoluto). No.
Rolando. A rivederci.

SCENA OTTAVA.
Andrea e Clara.

Andrea (si aggira un momento per la scena, poi bruscamente si avvia


per raggiungere Rolando).
Clara (entrando). Reviglio.
Andrea (si ferma).
Clara. Buone notizie... Avete sentito?
Andrea. Sì, signora. Buone notizie... Io non ho visto che orrori.
Clara (dopo un momento). È vero... viviamo in tempi così tristi! Tutto
congiura per abbatterci l’anima, tutto!... Perfin le persone che ci
stanno d’intorno.
Andrea. Soffia un vento maligno che ispira a chi comanda asprezza
ed ingiustizia!
Clara (con voce vibrata). Ed a chi dovrebbe ubbidire acrimonia e
rancore!
Andrea (ferito). Signora!
Clara. Una volta si sapeva tacere.
Andrea. Perciò mi perdoni se parlo. Io sono affezionato, pronto ad
ogni comando. E la mia devozione è nel sangue e non può venir
meno. Mio nonno servì in questa casa per tanti anni, e vi morì... E
non era il primo dei miei. Mio padre seguì il vostro al campo, e così
da vicino, che gli era al fianco quando fu fatto prigione... Il vostro
tornò di Francia, il mio no. Non vedrò mai la sua tomba.
Clara (raddolcita). Reviglio, via...
Andrea. Io nacqui in città, ma vissi quasi sempre qui per badare ai
poderi. Lei, signora, non veniva che nella bella stagione. Io l’ho vista
bambina, ragazza... poi sposa. Quando tornò vedova, non se ne
andò più. Sono tre anni che ricevo i suoi ordini. Posso aver mancato
d’abilità nell’eseguirli, ma di zelo...
Clara (vivamente). Mai! — Mai, nè di abilità nè di zelo. (Chetandolo
col gesto). E adesso basta. (Dopo un silenzio). Sì... Ricordo anch’io...
Ricordo anch’io tante cose. Quando mi portarono qui dopo la morte
di mia madre, ero malata, tanto malata di dolore; mi affidarono a voi
per farmi respirare, per svagarmi. Si andava insieme all’aperto... E...
diventammo amici, eh? Tanto è vero che più tardi vi ho poi perfino
confidato un segreto.
Andrea. A me?
Clara. Sì, sì, a voi. Quando mi hanno fidanzata, siete stato dei primi
a saperlo.
Andrea (commosso). È vero, è vero.
Clara. V’ho dato allora una prova di fiducia grande... (Quasi fra sè). E
oggi... Oggi, volendo, potrei di nuovo...
Andrea. Oggi?
Clara (risoluta). Sì, Andrea, voi potete disporvi a non limitar più la
vostra devozione a me sola.
Andrea. Ma io non l’ho mai limitata, mai...
Clara (ilare). Come l’altra volta, Reviglio, come l’altra volta!
Andrea (colpito). Ah! E con chi? E con chi?
Clara. Questo poi...
Andrea. Col cavalier di Priasco?
Clara. Basta, vi dico.
Andrea (ritraendosi). Sì, sì, basta, basta, basta. Questa è una
notizia!... Ehee, certe cose, si capisce all’istante in cui accadono che
si erano già prevedute. Solo allora si capisce... Oh, ma non dico
niente. Sarò discreto, prudente. Griderò poi: — Evviva! evviva! ma a
suo tempo... (Dopo pausa, come ferito da una idea). Signora mia,
non andrà via di qui, no?
Clara (imbarazzata). No... per ora.
Andrea (supplicando, quasi senza avvedersene). Mi faccia tanta
grazia, mi lasci solamente sperare.
Clara. Sì, Andrea, perchè lo desidero anch’io. Ad ogni modo
vedremo...
Andrea (ritirandosi). Questo mi basta. Son contento! (Di sull’uscio).
Comanda?
Clara. Niente. (Subitamente, più seria). Fermatevi, Reviglio: sentite.
Andrea (si riaccosta).
Clara (lentamente, fissandolo in viso). So che tutto andrà bene,
tutto. Ma... se poi un giorno occorresse esser forte?
Andrea. Basterà un cenno.
Clara. Bisogna esser preparati, sempre... anche alle cose più
dolorose e difficili, anche a lasciar le persone a cui si è più
affezionati.
Andrea (come affascinato). Per sempre?
Clara (con dolcezza). Fin che sarà necessario.
Andrea. Oggi?
Clara. No... aspettiamo.
Andrea (piegando il capo). Starò agli ordini. (Dopo una pausa,
animandosi via via). Starò agli ordini. Ma chi sa, forse non sarà mai
necessario! Vivere e morir qui, sotto questo tetto, godendo tutta la
sua grazia: ecco, non desidero altro. Perchè poi finora, non un gesto,
non una parola... E i pensieri non li vede che Dio!... È possibile
anche che vi sia un equivoco. E non posso, e non devo neanche
provarmi a chiarirlo. Perchè lei riderebbe delle mie parole. E
naturalmente dovrei ridere anch’io. (Con riso sforzato). Viva Dio,
finora non ci sono ragioni per credermi matto!

SCENA NONA.
Andrea, Clara, Rosa.

Rosa (dalla sinistra, accorrendo). Il signor cavalier di Priasco arriva


adesso al galoppo.
Clara. Si apra il portone.
Andrea (a Rosa). Restate, vado io. (S’inchina a Clara e via a destra).
Rosa. (Si ritira a sinistra).

SCENA DECIMA.
Clara, il Cavaliere.

Clara (con tristezza, dopo aver pensato un momento). Mah!... Perchè


questo adesso?... Perchè?
Cav. (a destra sulla soglia). Cugina...
Clara. Vi aspettavo.
Cav. (baciandole la mano). So già che siete stata inquieta, per me.
Clara. Sì, un poco.
Cav. (con galanteria). Poco o molto, la mia riconoscenza è uguale.
Clara (nervosa). Raccontate, raccontate.
Cav. Ieri sera sono andato via di qui ch’era assai tardi.
Clara. Ve l’avevo detto!
Cav. (con un sospiro). Eh sì, me l’avevate detto, e ripetuto anche...
Era tardi dunque e buio. Me ne andavo al passo per non inciampare,
quando alla svolta della Crocetta, ecco un gran chiarore tra gli alberi.
Clara. E la campana.
Cav. E la campana alla disperata. Dieci minuti dopo, arrivavo col
Bianco, di trotto serrato, sulla piazza di Toralta. Da una parte,
davanti alla chiesa, i contadini ronzavano come uno sciame di
calabroni infuriati; dall’altra, i francesi se la godevano guardando ad
avvampar due casupole. E le fiamme, amica mia, cominciavano a
lambirne una terza, spinte in giù da una tramontana indiavolata. O
muoverci subito, eh? o rassegnarci a vederle divorar tutto il villaggio.
I francesi erano pochi, ma armati, disciplinati, soldati insomma; i
contadini più numerosi, ma santo Dio!... E li avevo tutti intorno con
le braccia in aria, che mi scongiuravano di far qualche cosa per
loro... Bene: io ho messo innanzi gli schioppi, le pistole, i tromboni;
dietro le falci, i tridenti, i bastoni, poi dissi loro: — Addosso, ragazzi,
e fate quel che potete. — E si andò bene, o almeno non male. I miei
cani da pagliaio si avventarono come leoni, e sebbene i soldati si
portassero anch’essi ottimamente, si finì col ributtarli fuor del
villaggio.
Clara. Dove sono?
Cav. I francesi? Oh, li credo ancor nei dintorni. I contadini sono
venuti con me a Priasco: là, col Rifreddo davanti e col Paludaccio alle
spalle...
Clara (guardandolo in faccia). Vi siete esposto, eh?
Cav. (sorridendo). Peuh!
Clara (seria). No, ditemi tutto. Eravate innanzi, alla testa; vi vedo. I
repubblicani vi potrebbero riconoscere?... E se vi cercassero?
Cav. Io farei in modo di non lasciarmi trovare.
Clara. Cugino...
Cav. (affettuoso). Vi ringrazio coll’anima, ma vi prego di non
inquietarvi. Basta guadagnar tempo, non occorre più altro oramai.
Gli uni si ritirano e gli altri si avanzano. Allegra cugina, che presto
vedremo i cosacchi!
Clara (con gioia). Ah Vittorio!
Cav. (con entusiasmo). Amica, quando potremo gridar: — Viva il re!
— voglio che ne tremi il Monviso.
Clara. Ho tanto, tanto pregato!
Cav. Lo credo, lo so, e Dio vi ha esaudita (cambiando tono). A noi,
non perdiamo tempo. Mi volete far il favore di suonare a raccolta?
Voglio vedere i vostri uomini, esaminare la casa...
Clara. Perchè?
Cav. Chiamate, vi prego.
Clara (suona il campanello).
Cav. Così in caso di pericolo...
Clara. Pericolo mio?
Cav. Lontanissimo certo. Ma nei momenti in cui siamo, mi par bene
non trascurar precauzioni.

SCENA UNDICESIMA.
Clara, Il Cavaliere, Alban.

Alban (si presenta).


Clara. Avvertite subito don Rolando e Reviglio...
Alban (via).
Cav. (con affetto, cercando di prenderle le mani). Siete buona che mi
permettete d’occuparmi di voi, come s’io fossi già...
Clara (ritraendosi con grazia). Quello che non siete ancora.
Cav. (teneramente). Clara, Clara...
Clara. Vi prego, ecco Alban.
Alban (rientrando). Don Rolando è andato a Priasco. Sor Andrea non
si sa dove sia.
Cav. Male, male, malissimo!
Clara. Come si fa?

SCENA DODICESIMA.
Clara, il Cavaliere, Alban e Rosa.

Rosa (precipitandosi in scena). I francesi! I francesi!


Cav. Oh diavolo! (corre al terrazzino).
Rosa (seguendolo). Là, vede? Laggiù, laggiù...
Cav. Le baionette... Son loro!
Clara. Vengono?
Rosa. Santa Maria! Poveri noi...
Cav. Silenzio! (ad Alban). Chi c’è in casa?
Alban. Stefano, Garbino, Anselmo, Michele...
Cav. Chiamali tutti. Sbarrate il portone, levate la catena ai mastini e
approntate le armi, se ne avete. Vengo giù anch’io.
Clara. Pensate a resistere?
Cav. E perchè no?
Clara. Son pochi, ma bastano per far di noi quello che vogliono.
Badiamo a questo. Non possiamo difenderci. E se poi... se le loro
intenzioni non fossero ostili?
Cav. (spensieratamente) Lo diverrebbero trovandomi qui... Trovando
chi li ha malmenati stanotte.
Clara. Ho capito! (Sgomenta). Fuggite!
Cav. (alzando le spalle). Dio! come se potessi lasciarvi...
Rosa. Vengono, sbucano adesso nel prato.
Cav. (battendosi la fronte) Oh! un uomo fidato, pei boschi, a
Priasco...
Clara. Alban, presto!
Cav. No, no, è tardi.
Rosa. Son fermi, guardano la casa... L’uffiziale parla a un sergente...
Clara (angustiata al Cavaliere) Andate via, andate via!
Cav. (fermo). No, Clara.
Rosa. Agitano un cencio bianco.
Cav. Ah, ah! Vogliono pace.
Rosa. E si avanzano.
Clara (al Cavaliere). Nascondetevi!
Cav. Oh!
Clara. Vi prego, vi supplico, fate questo per me.
Cav. Per voi? (Riflettendo) È giusto. Avete ragione. La mia presenza
può essere pericolosa per voi.
Clara. Non è questo; io non penso a questo. (Correndo all’uscio di
sinistra). Di qui, di qui amico mio, fino all’ultima stanza. Sotto
l’arazzo, v’è un usciolo che mette in uno stanzino. Di là...
Cav. Mi fermerò là. E ricordatevi che voglio essere avvisato di tutto
quel che succede, minuto per minuto.
Clara. Rosa ci penserà. Andate, entrate, in nome di Dio!
Cav. Coraggio, eh!
Clara. Ne avrò, quando non vi vedrò più.
Cav. (via seguito da Rosa).
Clara (respirando). Ah!... Ora a noi. (Ad Alban). Raccomanda la
sicurezza, la calma a tutti quanti, a nome mio... E apri le porte.

SCENA TREDICESIMA.
Clara, poi Alban con un uffiziale francese.

Clara (siede presso la tavola, svolge un ricamo, lavora, sforzandosi di


prendere un contegno tranquillo).
Alban (si mostra sull’uscio).
Clara (gli accenna di lasciar libero il passo).
Uff. (entra, guarda Clara e s’inchina). Salute e fratellanza.
Clara (risponde con disinvoltura e con grazia al saluto).
Uff. Cittadina, non vogliamo fare del male, e tu ci puoi far anche del
bene.
Clara. Parlate; darò gli ordini...
Uff. Ho con me quattro feriti, che sarebbero in paradiso sopra un
poco di paglia...
Clara (ad Alban). Va a vedere se Reviglio è tornato.
Uff. E chi è Reviglio? Il tuo intendente? Bon; (ad Alban). Gli dirai di
parlare subito col sergente Mouton per sapere quel che occorre ai
ragazzi.
Alban (si avvia).
Uff. E pensa anche a me.
Alban (via).
Clara. Siete italiano?
Uff. Sono côrso, cittadina. Claudio Morali, di Aiaccio: terzo
battaglione, quinta mezza brigata di fanteria leggiera. (Con un
sospiro). Leggiera e come! Ventiquattr’ore che non abbiamo
mangiato (al terrazzino). Bon! gli uomini son tutti in cortile. Non sarà
torto un capello a nessuno, ma non rispondo dei polli, dei conigli, e
neanche dei gatti. (Dopo aver guardato in giro). Bella vista! Bel
colpo d’occhio! Sono un po’ artista. (Tornando). Però preferisco la
figura al paesaggio. (Accostandosi, dopo averla contemplata un
momento). Come ti chiami?
Clara. Clara.
Uff. Clara? Nient’altro che Clara? Bel nome però! (Con fatuità). Ne
ho conosciute parecchie Clare: non una che non fosse giovane e
bella... Sei un’ex-nobile, eh? (Sentimentale). Ah! cittadina, in questo
mondo non sono che due i piaceri: far la guerra e far all’amore. Ma
quando il primo non lascia tempo al secondo, allora si soffre. Io,
vedi... (s’interrompe scorgendo sull’uscio il sergente). Eh bien?
Avance!

SCENA QUATTORDICESIMA.
Clara, l’uffiziale, il sergente.

Sergente (sull’attenti, parla sottovoce animatamente all’uffiziale).


Uff. (gli dà prestamente alcuni ordini).
Sergente (via frettoloso).
Clara (li avrà osservati, frenando la sua inquietudine).
Uff. (brusco). Dov’è tuo marito?
Clara. Sono vedova.
Uff. Meglio per te. Tiriamo via. Nella tua scuderia si è scoperto un
animale sospetto: il cavallo dell’uomo che comandava gl’insorti
stanotte. Tu comprendi come sia grande il mio desiderio di vederne il
padrone... Non hai niente da dire? No? Si capisce. Cercheremo.
(Guarda intorno, poi s’incammina verso l’uscio di sinistra).
Clara (balza in piedi come per contrastargli il passo, ad un tratto si
ravvede e va ella stessa ad aprire). Volete entrare qui? Ecco fatto:
servitevi.
Uff. (fermandosi). Un momento... (porge l’orecchio). Che, se non
m’inganno, la lepre è scovata! (Si volge come aspettando verso
l’uscio di destra).

SCENA QUINDICESIMA.
Clara, l’uffiziale, Alban, poi Andrea, il sergente ed alcuni
soldati.

Alban (entrando affannato). Signora, oh signora, vogliono arrestare


sor Andrea!
Clara. Lui! perchè?
Alban. Guardi, ma guardi!
Andrea (entra condotto dal sergente, seguito dai soldati, che si
fermano nell’uscio).
Uff. (andandogli incontro). Chi sei? Presto: nome, cognome, età,
condizione, tutto.
Andrea. Mi chiamo Andrea Reviglio, del fu Giovanni.
Uff. (interrompendolo). Ah! sei tu l’intendente? Ti eri nascosto, eh?
Alban. Niente nascosto! L’hanno trovato sopra una panca in fondo al
giardino.
Uff. Cosa facevi? Dormivi?
Andrea. Mi riposavo.
Uff. Ah ti riposavi! Dunque eri stanco? Stanco a quest’ora: non ti
pare un po’ presto? Cosa diavolo hai fatto stanotte? Non sei andato
un po’ in giro per caso? Non hai fatto, per esempio, una passeggiata
a Toralta?
Clara (con impeto, frapponendosi). Badate ch’egli non sa di che cosa
lo si accusa. E poi... ad ogni modo vi giuro, per quello che ho di più
sacro al mondo, che voi vi sbagliate.
Uff. (la guarda fissamente, accarezzandosi il mento). Meno male. Tu
vuoi dire che il reo non è lui? Se non è lui, sarà un altro. Vediamo
quest’altro. Tu capisci che... Insomma le ciance sono inutili...
Clara. Cosa volete dire?
Uff. Voglio dire che se fra un quarto d’ora non ho nelle mani il
colpevole, io regolo il conto a costui.
Clara. È un’infamia!
Uff. No, cittadina.
Clara. Non potete...
Uff. Sì, cittadina. Non solo posso, ma devo. — Ordine del giorno
Grouchy, otto nevoso, anno sette...
Clara. Un’infamia, vi dico; un vero assassinio!
Uff. La parola è grossa... (stendendo la mano verso il terrazzino).
Guarda, mia cara, a piè di quel campanile che si vede laggiù, ho
lasciato Jourdan, Maret e Lecoq: un caporale e due soldati, tre bravi
patrioti. Non sono i primi, e non saranno gli ultimi, perchè
l’insurrezione è scoppiata in tutti i comuni... (Interrompendosi).
Allons! (ai soldati) conducetelo abbasso; accordate i clarinetti, poi
vedremo.
Clara (sgomenta, tirando l’uffiziale in disparte). Venite qui, sentite,
sentite. Reviglio è innocente, ve lo giuro. Ve lo giuro sulla memoria
di mia madre. Non volete credermi? Mettiamo che non possiate
credermi... Che cosa v’importa di quella vita? Risparmiatela, e vi
sentirete contento... Chi sa che questo non vi porti fortuna.
(Trattenendolo sempre, abbassando ancora la voce). Ascoltatemi. Ho
dato tutto al rompersi della guerra, anch’io come gli altri: danaro,
argenteria, quanto v’era di valsente in casa; ma non tutte le mie
gioie, quelle che m’erano più care le ho ancora. Ecco sono vostre, col
patto però...
Uff. (ritraendosi, con garbo). Pas de bêtises, cittadina! Parlo italiano,
ma non son sempre disposto a capirlo. (Ai soldati) Marche!

SCENA SEDICESIMA.
Clara, l’uffiziale, Alban, Andrea, il sergente, i soldati, il
Cavaliere di Priasco.

Cav (sulla soglia a sinistra). Ehi, signore, fatemi il favore di badar a


me un momento.
Uff. Volentieri, cittadino (si accosta squadrandolo).
Clara (smarrita). Vittorio, Vittorio!
Cav. (a Clara, serio, con calma). Cugina, vi prego... (all’uffiziale).
Senza tante parole, lasciate star Reviglio, che non sa neanche di che
cosa si tratti; prendetemi con voi, conducetemi dal comandante di
piazza, dal commissario civile, al diavolo, se volete, ma...
Uff. Ho capito! Cioè no, veramente... (indicando Andrea). Ma sai che
costui ha pressochè confessato.
Cav. Non è possibile.
Andrea (con energia). Sì, signore... E d’altronde tutti costoro mi han
riconosciuto.
Cav. Ah? Ebbene rifacciamo la prova. (Piantandosi di fronte ai
soldati). Attenti voialtri: qual di noi due vi par l’uomo di stanotte?
I Soldati (guardano ora l’uno ora l’altro, dubbiosi e perplessi).

(Un silenzio).

Cav. (ridendo). Bene! Bravi!


Uff. La nuit tous les chats sont gris.
Clara (con impeto). Ecco! E decidereste della sorte di un uomo con
testimonianze così vaghe, incerte, confuse?
Uff. (ad Andrea e al cavaliere). Fate conto di fumar tutti e due la
pipa sopra una barile di polvere.
Cav. Decidiamo...
Uff. (stringendosi nelle spalle). Decidete voi. Io il modo l’ho di finirla.
Clara (avvicinandosi a lui, spaventata) Oh signore! signore, vi
prego...
Cav. (severo). Cugina!
Uff. E perchè no? (attirandola a parte con un cenno). Una parolina
fra noi. Caso mai... (Abbassando la voce). Cercavo un nemico e ne
trovo due. Come vedi, li ho tutti e due nelle mani e potrei... Mi
capisci? Ma sono un buon ragazzo, dopo tutto; e ammetto che infin
dei conti il cavallo bianco portava un sol cavaliero. Quindi (con
malizia) se tu hai qualche ragione di far preferenze...
Clara (attonita). Non so... non comprendo...
Uff. No? Diavolo! Te ne piglio uno, ma ti lascio l’altro. Però bisogna
scegliere.
Clara (dopo un momento, rabbrividendo). Dio!
Uff. Ça ne va pas?
Clara. No, no, no, cerchiamo altro, ma questo no, questo no, questo
no!
Uff. Proviamo la sorte, vuoi?
Clara (si lascia andar seduta, e scuote dolorosamente la testa).
Uff. (pestando i piedi). Sacredieu, quelle stupide affaire! (Voltandosi
agli altri). E come va in lungo, cittadini cari; io non posso star qui in
sempiterno! Il regno della vera Libertà è pur quello della Clemenza.
Ed io voglio esserlo clemente. Vi dò mezz’ora per intendervi. Va bene
così? Quello a cui tocca, se vorrà essere sbrigato sull’atto non avrà
che a consegnarsi al sergente, troverà tutto pronto in cortile. (Al
sergente, accennando l’uscio di destra). Tu starai lì fuori con Malaise
e Legrand. (Ad Alban). Tu sotto con me, a servirmi, che muoio di
fame. (A quelli che restano). Saluto repubblicano, e che l’Ente
supremo vi illumini! (Via seguito da Alban e dai soldati).

SCENA DICIASSETTESIMA.
Clara, Andrea, il Cavaliere di Priasco.

Cav. (andando da Andrea) Ma voi siete matto, eh?!


Clara (alzandosi). Vittorio! Non parlargli così.
Cav. Matto, dico. Perchè mentire? Che cosa gli salta di cacciarsi
anche lui nell’imbroglio, col rischio di farci moschettar tutti e due?
Andrea (volendo parlare). Mi perdoni...
Cav. Credete voi ch’io non sappia a quel che mi espongo?
Andrea. No, signor mio.
Cav. Sarò condotto in Francia, perderò i beni...
Andrea (con forza) La vita!
Cav. (incredulo). Ah!
Andrea. Due mesi fa le cose sarebbero forse andate come lei
immagina. Ma oggi, oggi che la Repubblica è vinta, morde e sbrana
come una lupa arrabbiata.
Cav. Dirò il mio nome, i miei titoli, le mie aderenze... (s’avvia come
per uscire).
Andrea (opponendosi). Se lei passa la soglia, casca nelle mani dei
soldati, e allora è finita.
Cav. (con impazienza). Oh in nome di Dio!...
Andrea (opponendosi ancora). La prego...
Clara. Vittorio! Andrea! Non voglio vedervi l’un contro l’altro così.
Andrea. Non perdiamo tempo. O l’uno o l’altro, dunque...
Cav. E vorreste andar voi?
Andrea. O l’uno o l’altro! Pensiamo, qual dei due sacrifizi è il più utile.
Lei deve vivere. In questi momenti ne ha il dovere: il suo nome
rappresenta secoli di onore, di valore, di gloria...
Cav. (con ironia). È per questo che dovrei lasciarvi assassinare al mio
posto?!
Andrea (continuando). Di là dal mare, vi è chi aspetta. Il suo esilio
sta per finire. Ricuperato il regno, guai se non potrà chiamare a sè,
stringersi intorno tutti i fedeli, tutti gli amici! Lasci ch’io contribuisca
a conservargliene uno, e dei migliori. Sono solo, signore, non ho
famiglia, non ho nè speranze, nè gioie, ed è così poca cosa la mia
vita!... (A Clara). Lo prego, m’aiuti lei a persuaderlo.
Clara (addoloratissima). Io? Perchè? Non voglio perdervi, io...
Cerchiamo, cerchiamo, approfittiamo di questo respiro... (ai due che
si scostano alquanto). Ma no! Venite qui, tutti e due, vicino a me... E
cercate, voialtri che siete uomini, che siete forti e coraggiosi. Io
soffro troppo, non posso pensare. (Giungendo le mani
affannosamente). Pregherò, ecco; pregherò perchè non muoia
nessuno.
Andrea (dolcemente, insistendo). Ma se non mi spaventa la morte!
Vado alla pace, al riposo. E mi porto nel cuore un conforto, così
grande, così bello: la certezza di vivere nella vostra memoria... (Fa
due o tre passi verso l’uscio).
Cav. (con autorità). Fermo! Verranno a cercarci. Non precipitiamo,
qualche cosa sarà.
Clara (attaccandosi a queste parole). È vero, è vero: aspettiamo. Chi
sa! Chi lo sa cosa può accadere! (Dopo un silenzio, con un grido).
Vittorio! Andrea! E... e se non venissero più?!
Cav. (sorpreso). Perchè?
Clara. Se l’uffiziale, o mosso a pietà, o che so io... non so insomma,
ci avesse lasciati così per... per darci il modo...
Cav. (correndo al terrazzino). Non è possibile!... Eh no: guardate.
Clara (che lo ha seguito). È vero! Sentinelle per tutto.
Cav. (indicando in lontano). Se mai, la salvezza potrebbe venir di là.
Da Priasco.
Clara. Sì, sì, un miracolo!
Cav. I contadini mi amano, mi adorano. Pensate, se mi sapessero
qui, se avessi potuto avvertirli! (Smaniando). Oh esser là, farli entrar
nella macchia, arrivare in silenzio fino al giardino, e piombar su
costoro come l’ira di Dio!
Andrea (senza levare gli occhi dal terrazzino, ha indietreggiato fino
all’uscio di destra. Apre pian piano; impone silenzio ai soldati che si
affacciano, saluta Clara con uno sguardo, e scompare).

(Un silenzio).

Clara (con un grido). Dio!... Vittorio!


Cav. (scuotendosi). Che c’è?
Clara. Là, là! Guardate là (con gesti febbrili). No, più sotto, in
quell’ombra, tra gli alberi...
Cav. (attentissimo). Vedo, vedo anch’io, ma...
Clara (ansiosamente). Son loro?
Cav. (frenandosi). No, Clara.
Clara. Eppure Priasco è là.
Cav. Sì... ma non pensate. Non sperate. Guai!
Clara. Aspettiamo, dunque. Aspettiamo... Non guardiamo più... Chi
sa, chi sa... (Ritraendosi, coprendosi la faccia con le mani). Così...
Vittorio, io prego, vuoi?
Cav. (con gli occhi fissi, pallido e grave). Prega, prega.
Clara (dopo brevissima pausa). Ebbene?
Cav. Mah!
Clara (premendosi il petto con le mani). Muoio, sai. Non sento più il
cuore.
Cav. Coraggio!
Clara. E gli altri, e i nemici che fanno?
Cav. Son tutti in cortile, quieti, sicuri... (Sporgendosi) E che diamine
c’è da veder in cortile?... (Saltando bruscamente in scena e
guardando intorno). Reviglio! Reviglio!
Clara (cercando anch’essa). Reviglio!
Cav. (indicando l’uscio). È uscito di là. (Vi corre).
Clara (stringendosi a lui). Vittorio no! Ti amo! Lo sai che ti amo!
Cav. Lasciami! Lasciami, ti dico. Non capisci che è perduto?

(Una scarica da basso).

Clara. Ah!

(Si guardano allibiti. Clara si lascia andar seduta e


nasconde il viso: il cavaliere le è vicino, immobile e muto).
Un lungo silenzio poi un grido lontano: Qui vive?
Altro silenzio, altro grido: Aux armes! Aux armes! Urli,
spari, tumulto.

You might also like