Download Complete Data Communication and Computer Networks: A Business User's Approach, 9th Edition Jill West PDF for All Chapters
Download Complete Data Communication and Computer Networks: A Business User's Approach, 9th Edition Jill West PDF for All Chapters
com
https://ebookmass.com/product/data-communication-and-
computer-networks-a-business-users-approach-9th-edition-
jill-west/
OR CLICK BUTTON
DOWNLOAD NOW
https://ebookmass.com/product/comptia-a-core-1-exam-tenth-edition-
author-of-comptia-network-guide-to-networks-jill-west/
ebookmass.com
https://ebookmass.com/product/business-communication-process-
product-9th-edition-edition-mary-ellen-guffey/
ebookmass.com
https://ebookmass.com/product/comptia-network-guide-to-networks-
mindtap-course-list-9th-edition-west/
ebookmass.com
https://ebookmass.com/product/business-communication-a-problem-
solving-approach-1st-edition-ebook-pdf/
ebookmass.com
Technical Communication: A Reader-Centered Approach 9th
Edition Paul V. Anderson
https://ebookmass.com/product/technical-communication-a-reader-
centered-approach-9th-edition-paul-v-anderson/
ebookmass.com
https://ebookmass.com/product/ebook-pdf-media-and-communication-in-
canada-networks-culture-technology-audience-ninth-9th-edition/
ebookmass.com
https://ebookmass.com/product/etextbook-978-1305957961-business-
communication-process-product-9th-edition/
ebookmass.com
https://ebookmass.com/product/essentials-of-business-
communication-9th-edition-ebook-pdf-version/
ebookmass.com
Jill West
Curt M. White
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Important Notice: Media content referenced within the product description or the product
text may not be available in the eBook version.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Data Communications & Computer Networks: © 2023, 2016, 2013 Cengage Learning, Inc. ALL RIGHTS RESERVED.
A Business User’s Approach, Ninth Edition
No part of this work covered by the copyright herein may be reproduced
Jill West and Curt M. White
or distributed in any form or by any means, except as permitted by U.S.
copyright law, without the prior written permission of the copyright owner.
SVP, Higher Education Product Management: Erin
Joyner Unless otherwise noted, all content is © Cengage, Inc.
VP, Product Management, Learning Experiences:
Thais Alencar
Product Director: Jason Fremder For product information and technology assistance, contact us at
Product Manager: Natalie Onderdonk Cengage Customer & Sales Support, 1-800-354-9706
or support.cengage.com.
Product Assistant: Tom Benedetto
Content Manager: Arul Joseph Raj, Lumina For permission to use material from this text or product, submit all
Datamatics, Inc. requests online at www.copyright.com.
Digital Delivery Quality Partner: Jim Vaughey
Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis in connection
with any of the product information contained herein. Publisher does not assume, and expressly disclaims, any obligation to obtain
and include information other than that provided to it by the manufacturer. The reader is expressly warned to consider and adopt
all safety precautions that might be indicated by the activities described herein and to avoid all potential hazards. By following
the instructions contained herein, the reader willingly assumes all risks in connection with such instructions. The publisher makes
no representations or warranties of any kind, including but not limited to, the warranties of fitness for particular purpose or
merchantability, nor are any such representations implied with respect to the material set forth herein, and the publisher takes no
responsibility with respect to such material. The publisher shall not be liable for any special, consequential, or exemplary damages
resulting, in whole or part, from the readers’ use of, or reliance upon, this material.
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Brief Contents
Preface xiii
iii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents
Chapter 1
Introduction to Data Communications and Computer Networks 1
1-1: The Language of Computer Application Layer 16
Networking 3 Transport Layer 16
Remember this… 4 Network Layer 16
Self-check 4 Data Link Layer 16
Physical Layer 17
1-2: The Big Picture of Networks 5
The OSI Model 17
Remember this… 6
Logical and Physical Connections 18
Self-check 6
The TCP/IP Protocol Suite in Action 19
1-3: Common Network Examples 6 Remember this… 22
The Desktop Computer and the Internet 6 Self-check 22
A Laptop Computer and a Wireless Connection 8
1-5: Cloud Computing 22
Cellular Network 9
Cloud Computing Characteristics 22
Other Common Network Systems 9
Cloud Service Models 24
Sensor Networks 10
Remember this… 26
Business Mainframe Network 11
Self-check 26
Satellite Networks 11
Summary 27
Cloud Networks 11
Key Terms 28
Remember this… 13
Review Questions 29
Self-check 13
Hands-On Project 1 31
1-4: Network Architectures 14
Reflection Discussion 1 33
The TCP/IP Protocol Suite 14
Solutions to Self-Check Questions 34
Chapter 2
Conducted and Radiated Media 37
2-1: Cabling Standards 38 Unshielded and Shielded Twisted Pair 45
Personal Area Network (PAN) Connection Standards 39 Coaxial Cable 47
Universal Serial Bus (USB) 39 Fiber-Optic Cable 48
Thunderbolt 40 Cable Connectors 51
Lightning 41 Twisted Pair Cable Connectors 51
Remember this… 41 Coaxial Connectors 51
Self-check 42 Fiber Connectors 52
Summary of Wired LAN Technologies 53
2-2: Conducted Media 42
Remember this… 54
Twisted Pair Cable 42
Self-check 54
Types of Twisted Pair Cable 43
iv
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents v
Chapter 3
Fundamentals of Data and Signals 74
3-1: Data and Signals 75 Phase Shift Keying 89
Analog vs. Digital 75 Transmitting Analog Data with Digital Signals 92
Analog Data and Signals 76 Pulse Code Modulation 92
Digital Data and Signals 77 Delta Modulation 94
Fundamentals of Signals 79 Remember this… 96
Remember this… 83 Self-check 97
Self-check 83 3-3: Characters and Codes 97
3-2: Converting Data into Signals 83 ASCII 97
Chapter 4
Frames and Errors 108
4-1: Data Link Frames 108 4-2: Noise and Errors 111
Data Link Responsibilities 109 Gaussian Noise 111
Frame Components 109 Impulse Noise 112
Remember this… 110 Crosstalk 113
Self-check 111 Echo 113
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
vi Contents
Chapter 5
Wired and Wireless Local Area Networks 141
5-1: Using LANs 142 Remember this… 158
Putting LANs to Work 143 Self-check 158
Advantages and Disadvantages of LANs 144 5-4: Wired LANs 158
Remember this… 145 Ethernet Standards 158
Self-check 145 Wired Ethernet Frame Format 160
5-2: Evolution of LAN Technologies 145 Remember this… 162
Bus Topology 145 Self-check 163
Star-Wired Bus Topology 147 5-5: Wireless LANs 163
Contention-Based Protocols 148 Wireless CSMA/CA 163
Star Topology 149 CSMA/CA Frame Format 164
Remember this… 150 Remember this… 166
Self-check 150 Self-check 166
5-3: Switches 151 Summary 166
MAC (Medium Access Control) Addresses 151 Key Terms 168
Virtual LANs 154 Review Questions 168
Link Aggregation 155 Hands-On Project 5 170
Spanning Tree Algorithm 156 Reflection Discussion 5 173
Quality of Service 157 Solutions to Self-Check Questions 174
Chapter 6
Network Systems and Software 175
6-1: Network Servers and Software 175 Remember this… 182
RAID Configurations 176 Self-check 182
Storage Types 178 6-2: Server Operating Systems 183
Utilities 179 Unix 183
Software Licensing Models 180 Linux 183
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents vii
Chapter 7
The Internet 215
7-1: Internet Protocol (IP) 216 Remember this… 233
IP Packets 217 Self-check 233
Internet Protocol Version 4 (IPv4) 218 7-4: Internet Services 233
IPv4 Addresses 219 Email 233
Internet Protocol Version 6 (IPv6) 221 File Transfer Protocol (FTP) 234
IPv6 Addresses 223 Intranets and Extranets 236
Remember this… 223 Remote Login 236
Self-check 223 Telnet 236
7-2: Locating a Resource on the Secure Remote Login Protocols 237
Internet 223 Voice over IP (VoIP) 238
Uniform Resource Locator (URL) 224 Media Streaming 240
Domain Name System (DNS) 225 The Internet of Things (IoT) 240
Dynamic Host Configuration Protocol (DHCP) 225 Data Analytics 242
Network Address Translation (NAT) 226 Remember this… 243
Remember this… 228 Self-check 243
Self-check 228 Summary 244
7-3: Protocols of the Internet 229 Key Terms 245
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii Contents
Chapter 8
Risk, Security, and Compliance 255
8-1: Network Security Risks 256 DES (Data Encryption Standard) and AES
(Advanced Encryption Standard) 274
Common Vulnerabilities and Attack Types 256
Public Key Cryptography 275
Compromise Users 256
Public Key Infrastructure (PKI) 275
Compromise Software 256
Compromise Availability 256 Technologies That Use Encryption 278
Compromise Accounts 257 Digital Signatures 278
Other Attack Strategies 257 Tunneling Protocols 278
Risk and Security Assessments 259 Remember this… 279
Risk Response 261 Self-check 279
Security Policies 261 8-4: IAM (Identity and Access
Incident Response 261 Management) 279
Remember this… 262 Access Rights 280
Self-check 262 Authentication 280
8-2: Network Security Technologies 262 Hashing 281
Blockchain 284
Physical Security 263
Single Sign-On (SSO) and Federated Identity
Prevention Methods 263
Management (FIM) 284
Detection Methods 263
Authorization 285
Anti-Malware 264
Accounting 285
Proxy Server 264
Remember this… 286
Access Control Lists (ACLs) 265
Self-check 287
Firewalls 265
Firewall Effectiveness 265
8-5: Wireless Security 288
Firewall Functionality in the Cloud 266 Securing Wireless LANs 288
Firewall Limitations 267 Spread Spectrum Technology 288
Intrusion Detection and Prevention Systems 267 Frequency Hopping Spread Spectrum 288
Remember this… 268 Direct Sequence Spread Spectrum 290
Self-check 269 Remember this… 290
Self-check 290
8-3: Data Security Technologies 269
Summary 291
CIA Triad 269
Key Terms 293
Data Security Regulations and Compliance 270
Review Questions 294
Encryption 271
Hands-On Project 8 295
Monoalphabetic Substitution-Based Ciphers 272
Reflection Discussion 8 300
Polyalphabetic Substitution-Based Ciphers 272
Solutions to Self-Check Questions 301
Transposition-Based Ciphers 273
Chapter 9
Wide Area Networks 303
9-1: Networks That Connect LANs 304 Remember this… 306
Campus Area Networks (CANs) 304 Self-check 306
Metropolitan Area Networks (MANs) 304 9-2: Routing 306
WAN Topology 305 Best Paths 307
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents ix
Chapter 10
Connecting Networks and Resources 336
10-1: Small Business and 10-3: WAN Virtualization 355
Consumer-Grade WAN Services 337 Software-Defined WAN (SD-WAN) 356
Digital Subscriber Line (DSL) 337 Software-Defined Branch (SD-Branch) 357
DSL Basics 337 Secure Access Service Edge (SASE) 358
DSL Formats 339 Remember this… 358
Cable Modems 339 Self-check 358
Fiber Internet 341
10-4: Cloud-Supported Technologies 359
Satellite 342
Digital Marketing 359
Cellular Networks 344
Remote Workers 360
Remember this… 346
Edge Computing 361
Self-check 347
Remember this… 362
10-2: Enterprise-Grade WAN Services 347 Self-check 362
Legacy WAN Technologies 347 Summary 363
MPLS 348 Key Terms 365
Ethernet 349 Review Questions 365
Virtual Private Network (VPN) 351 Hands-On Project 10 367
Cloud Connectivity 354 Reflection Discussion 10 369
Remember this… 355 Solutions to Self-Check Questions 370
Self-check 355
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
x Contents
Chapter 11
Network Design and Management 372
11-1: Planning for Changes 373 Simple Network Management
Protocol (SNMP) 388
Project Management 373
NetFlow 389
Application Lifecycle Management (ALM) 374
Creating a Baseline 390
Change Management 376
Remember this… 392
Remember this… 378
Self-check 393
Self-check 378
11-4: Cloud Deployment and
11-2: Analyzing Design 378
Management 393
Network Modeling 378
Cloud Migration 393
Wide Area Connectivity Map 379
Migration Phases 394
Metropolitan Area Connectivity Map 379
Migration Strategies 395
Local Area Connectivity Map 379
Cloud Provisioning and Configuration
Gap Analysis 381 Management 396
Feasibility Studies 381 Automation 396
Capacity Planning 382 Infrastructure as Code (IaC) 398
Testing Environments 383 Automation and Orchestration Tools 399
Remember this… 384 Cloud Monitoring and Optimization 401
Self-check 385 Remember this… 403
11-3: Network Monitoring and Self-check 403
Management 385 Summary 404
Network Monitoring Tools 385 Key Terms 406
Monitoring Network Hardware 385 Review Questions 406
Monitoring Network Traffic 386 Hands-On Project 11 408
Alerts and Logs 387 Reflection Discussion 11 411
Syslog 387 Solutions to Self-Check Questions 412
Chapter 12
Business Principles in IT 414
12-1: People Resources 415 Vendor Documentation 423
Network Administrator Skills and Certifications 415 Request for Information (RFI) 423
Professional Development 416 Statement of Work (SOW) 423
Training Users 418 Service Level Agreement (SLA) 423
Project Evaluations 424
Policies and Procedures 419
Remember this… 425
Remember this… 420
Self-check 425
Self-check 420
12-2: Vendor Relations 420 12-3: Financial Aspects of Cloud 426
CapEx vs. OpEx 426
Vendor Services 421
Tracking Cloud Expenses 427
Support Plans 421
Time to Market 422 Cloud Cost Optimization 428
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents xi
Appendix A
CompTIA Cloud Essentials+ CLO-002 Certification Exam Objectives 449
Domain 1.0 Cloud Concepts—24% Domain 3.0 Management and
of Exam 450 Technical Operations—26% of Exam 453
Domain 2.0 Business Principles of Domain 4.0 Governance, Risk,
Cloud Environments—28% of Exam 451 Compliance, and Security for the
Cloud—22% of Exam 454
Glossary 457
Index 478
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Dedication
In memory of Curt M. White
xii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface
Today’s business world could not function without ❯❯You work in a small company, in which each
data communications and computer networks. Most employee wears many hats. Thus, you may
people cannot make it through an average day with- need to perform some level of network assess-
out encountering or using some form of computer ment, administration, or support.
network. In the past, this field of study occupied the ❯❯You have your own business and need to fully
time of only engineers and technicians, but it now
understand the advantages of using computer
involves business managers, end users, programmers,
networks to support your operations. To
and just about anyone who might use a phone or
optimize those advantages, you should have
computer! Thus, Data Communications & Computer
a good grasp of the basic characteristics of a
Networks: A Business User’s Approach, Ninth Edition
computer network.
maintains a business user’s perspective on this vast
and increasingly significant subject. ❯❯You have a computer at home or at work, and
you simply wish to learn more about computer
In a generic sense, this book serves as an owner’s networks.
manual for the individual computer user. In a world in
❯❯You have realized that, to keep your job skills
which computer networks are involved in nearly every
current and remain a key player in the informa-
facet of business and personal life, it is paramount that
tion technology arena, you must understand
each person understands the basic features, opera-
tions, and limitations of different types of computer how different computer networks work and
networks. This understanding helps people become become familiar with their advantages and
better managers, better employees, and simply better shortcomings.
computer users. As a computer network user, you will
probably not be the one who designs, installs, and
maintains the network. Instead, you will have interac- Audience
tions—either direct or indirect—with the individuals
Data Communications & Computer Networks: A Business
who do. Taking this course should give you a strong
User’s Approach, Ninth Edition is intended for a one-
foundation in computer network concepts, which will
semester course in business data communications for
enable you to work effectively with network admin-
students majoring in business, information systems,
istrators, network installers, and network designers.
management information systems, and other applied
Here are some of the many scenarios in which the
fields of computer science. Computer science depart-
knowledge contained in this book would be particu-
ments will also find the book valuable, particularly if
larly useful:
the students read the Details sections accompanying
❯❯You work for a company and must deal directly most chapters. It is a readable resource for computer
with a network specialist. To better understand network users that draws on examples from business
the specialist and be able to conduct a meaningful environments. In a university setting, this book can
dialog with them, you need a basic understanding be used at practically any level above the first year.
of the many aspects of computer networks.
❯❯You are a manager within a company and
depend on network specialists to provide you
Defining Characteristics of
with recommendations for the company’s net- This Book
work. To ensure that you can make intelligent The major goal of this ninth edition is the same as
decisions regarding network resources, you that of the first edition: to go beyond simply provid-
need to know the basic concepts of data com- ing readers with a handful of new definitions, and
munications and computer networks. instead introduce them to the next level of details
xiii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Discovering Diverse Content Through
Random Scribd Documents
“That brings me to another point.” Mitchell bent forward in his chair
in his eagerness. “You left here early Tuesday morning, ostensibly to
catch the steamer St. Louis, which you say you missed—then where
have you been staying since then, and how did you leave this
country place early Tuesday morning without anyone seeing you,
and get into Washington?”
“That is my affair, Mr. Mitchell, and I question your right to quiz me
on the subject.” Noyes’ face hardened, and there was a glint of
anger in his eyes.
“Here’s my authority.” Mitchell displayed his badge. “I’m in charge of
this case, and I consider you a material witness, and as such you are
amenable to the law.”
“You forget I am a British subject.”
“That won’t prevent my getting legal authority through the State
Department, if necessary, to summon you to court when this case
goes to trial,” retorted Mitchell. “Take it from me, you can’t dodge
the issue.”
“I am not striving to dodge it.” Noyes spoke with angry emphasis.
“Surely, gentlemen, you are not striving to fasten the crime on me?”
Thorne, watching him intently, wondered at the almost fanatical light
that leaped for an instant into Noyes’ deep sunken eyes, then died
out as Mitchell responded.
“I am seeking information to clear up the mystery surrounding
Brainard’s death,” he said roughly. “If it involves you, so much the
worse—for you.”
“Tut! No threats are necessary,” broke in Thorne. “You go too far,
Mitchell,” meeting the detective’s stony glare with composure. Then
he turned courteously to Noyes. “You and Miss Deane are the only
ones known to have been up and about this house on Monday night,
between midnight and early morning; and we are seeking to learn
from every source the identity of the third person who was also up
and about—”
“A third person?” Noyes looked at him, startled. “What third person
do you refer to?”
“The murderer,” dryly. “The quest sifts down to you and Miss Deane,
doctor; Miss Deane has cleared herself of suspicion”—with emphasis
—“while you—”
“Have not.” Noyes eyed his inquisitors with sharp intentness. “Kindly
state your reasons for intimating that I killed a man whom I only
met for the first time on Monday evening—barely ten hours before
he was found murdered in his bed.”
“It’s a bit unusual to give reasons,” said Mitchell dubiously, but a nod
from Thorne reassured him, and he continued, more quickly: “You
admit you were up all night Monday, doctor; you disappeared early
Tuesday morning without leaving word how or where you were
going; you won’t tell us where you spent the past few days; and you
haven’t told us what brings you back to this house today.”
“Surely, the fact of my voluntary return clears me of all suspicion,”
argued Noyes heatedly.
“Not necessarily,” retorted Thorne. “Your actions lead us to suppose
one of two motives inspired you to disappear so promptly Tuesday
morning before the discovery of Brainard’s murder. Don’t interrupt,”
as Noyes moved restlessly. “Either you were guilty or you were
seeking to protect the guilty party.” Noyes sat rigidly in his chair, his
expression blank as Thorne paused and scanned him narrowly.
“Now, doctor, which is it?”
Thorne’s question did not receive an immediate response, and the
detective assumed a self-congratulatory air as he waited for Noyes
to speak, but Thorne, never taking his eyes from the Englishman,
waited with concealed anxiety for his next words. They were slow in
coming; apparently Noyes was feeling his way.
“Sifted down to bed-rock, you have nothing against me except an
unavoidable absence of body at the time Brainard’s murder was
discovered. My so-called ‘disappearance’ was but a coincidence,” said
Noyes finally, and he looked at Thorne. “I understand you are a
surgeon.”
“I am.”
“Then you must be aware that cutting a man’s throat is a difficult
operation.” Noyes spoke slowly, impressively. “According to the
newspaper accounts which I read, Brainard’s throat was cut from
right to left, and that he was found lying on the right side of the
bed; therefore, if such was the case, the wound must have been
inflicted by a right-handed man.”
“Do you mean to claim as your defense that you are left-handed?”
demanded Mitchell.
“No, not originally left-handed.” Noyes threw back the officer’s cape
which he still wore, and disclosed an empty coat sleeve pinned
across his chest. “I left my right arm on a battlefield of France,” he
added.
There was a long silence broken by a scream from the hall.
Springing to his feet Mitchell darted through the open door and
down the hall, Noyes and Thorne at his heels. All three paused at
sight of Millicent Porter on the lower step of the staircase.
“My papers!” she gasped. “Someone has stolen my papers!”
Noyes’ left arm supported her as she staggered and almost fell.
Thorne, standing somewhat in the background, whistled low at sight
of the Englishman’s expression as he bent above Millicent.
“So—the red herring across the trail,” he muttered below his breath,
and started violently at finding Vera Deane at his elbow.
CHAPTER XIV
PRO AND CON
THE moonlight penetrated but feebly through the one small opening
which did duty for a window of the lean-to, and its interior was a
mass of shadows. Suddenly that point of light was obliterated as a
dark cloth was pulled across the opening. There was a prolonged
wait before the same fingers switched on an electric lamp supplied
with current from a powerful dry battery, but the light was so
arranged that it fell directly upon a table on which stood a
photographer’s outfit. A man, his face in shadow from a huge green
eye-shade which he wore low on his brow, removed his hand from
the electric switch. Taking up a piece of bond paper he felt its
texture, and holding it up to the light he examined with minute
attention the red and blue silk fiber running through the paper.
Laying down the paper he took out his wallet and drew out some
money, and holding the spurious bill and the genuine bank note
against the light he compared them closely, then a smile of triumph
crossed his tightly compressed lips. It was next to impossible to
distinguish between the two notes. Greatly elated, he straightened
his weary back and looked about his workshop.
The cabin, for such it was, though to the casual observer it looked
like only a lean-to of logs against the hillside, had but the one room
which was fairly large, but owing to the numerous benches and
tables and other articles it appeared smaller than it really was. At
one side stood a printing-press, a metal rolling-machine, planchette
cutting-machine, pump, two oil stoves, a plating outfit, and a double
Turner torch, while a series of shelves held paints, oils, acids,
brushes, and chemicals. Dumped in one corner were a lathe, a
melting-pot, brazier, crucible and ladles, and on a nearby bench
were scales, copper and zinc plates, dies, and molds.
The counterfeiter replaced the genuine money in his wallet and
returned the latter to his pocket, then he moved over to a small safe
and placed a handful of spurious bank notes inside it. He stood for a
moment staring at the closed door of the safe, but he was in too
excited a frame of mind to remain long idle, and walking over to a
small cabinet he pulled out first one drawer and then another,
arranging engraver’s tools and other delicate instruments with deft
fingers. After that task was completed he turned his attention to the
stone chimney and fireplace at the back of the cabin and banked the
smoldering embers with ashes. Finally convinced that there was no
danger of fire he drew out from the background large screens and
arranged them in front of the homogeneous contents of the room.
The screens were cleverly painted to resemble the bare walls of a
log cabin, and once in position they caused the optical illusion,
should any passer-by look through the window, of a deserted and
empty cabin.
The counterfeiter, first concealing his green eye-shade behind one of
the screens, switched off the electric light, and moving over to the
window drew back the black cloth and concealed its presence by
tucking it in a crevice in the log wall. A second later he was outside
the cabin, and the faint click of the spring lock as he closed the door
assured him that the latch had caught. He was inspecting the lock
which chemicals had made old and dilapidated in appearance when
a shadow obscured the moonlight shining on the door. The
counterfeiter’s hand closed over the butt of a revolver inside his
overcoat pocket, but before he caught sight of the newcomer a
subdued but familiar voice reassured him, and his chilled blood
coursed through his veins.
“I’se late, but I’se hyar, sah.”
“So I see, Cato, but come out of the moonlight.” And he pulled the
old servant into the shelter of the woods. “What news?”
“Ain’t none,” tersely; the climb up the hillside had been both steep
and hard, and the old negro was short of breath. The stillness
remained unbroken for several minutes except for the hoot of a
screech owl, at which the negro jumped nervously, then seeing that
his companion had started down the hillside he made what speed he
could after him. They were skirting the hedge which marked the
southern boundary of Thornedale when a hand was laid on Cato’s
shoulder.
“Go home, Cato,” directed the counterfeiter. “Don’t wait for me
tonight, I’ll be along presently.”
“Yessir,” promised Cato, peering cautiously at him. “Yo’ am sure—”
An impatient nod checked Cato, and he thankfully withdrew, making
his way to Thornedale with infinite caution. The counterfeiter
watched him until he was lost from sight in the grove of trees about
the house, then turned his attention to the Porter mansion. But his
wary progress in that direction was checked by the sound of rapidly
approaching footsteps, and he had but time to sink down behind the
friendly hedge when a figure loomed ahead silhouetted against the
skyline in the moonlight.
“Eleven, twelve,” chimed the hall clock, and the sound carried
through the open door of Craig Porter’s bedroom to Dr. Alan Noyes
sitting by the paralytic’s bedside. Noyes looked up and rose as Vera
Deane came over to the bed.
“Mr. Porter responds quickly to medicine,” he said, keeping his voice
low-pitched. “And he has at last fallen asleep. I think we may safely
believe that his relapse of this afternoon was but temporary.”
“Thank God for that—his poor mother!” Vera spoke with deep
feeling. “I am afraid she will be our next patient, doctor.”
Noyes looked grave. “Mrs. Porter has had a trying year; anxiety for
her son, Monday’s tragedy—” His gesture was eloquent. “Try and
humor her as much as you can, Miss Deane; her frayed nerves won’t
stand opposition.” He took an undecided step across the room. “Mr.
Porter is so much improved that I will go and lie down. Call me at
once should Mr. Porter awaken and any alarming symptoms appear.”
“Very well, doctor.” Vera’s eyes strayed from his haggard face to his
empty coat sleeve, and with difficulty she controlled all evidence of
curiosity. Before he reached the door she again spoke to him: “Are
you occupying your same room?” she asked.
Noyes looked his impatience. “Yes, I am,” he said, and his manner
was far from gracious. “Good night, Miss Deane.”
“Good night, sir,” and Vera closed the hall door.
Everything had been arranged in the sick room for the night, and
Vera selected a chair farthest from the night light and near her
patient, and prepared for a long vigil. But while she continued to
gaze steadily at Craig Porter, every sense alive to catch his need of
careful nursing, she could not center her thoughts on her patient.
Slowly she reviewed the happenings of the day—her meeting with
Beverly Thorne; his possession of the black-edged card. Was it mere
chance, Fate or Fury which had entwined their paths? Could she
place dependence upon Thorne? Her heart beat more swiftly and a
vivid blush dyed her cheeks as recollection rose of the message his
eyes conveyed as they stood together at Diamond Rock barely eight
hours before. Pshaw! she was not impressionable, like Dorothy and
Millicent—and experience had taught her something of man’s
duplicity.
Vera blinked violently, and leaned over to smooth out an infinitesimal
wrinkle from the white sheet. Craig Porter had not awakened, and
she forced thoughts of Beverly Thorne out of her mind and instead
endeavored to recall her scene with Mrs. Porter in the library. As she
remembered the expression in the older woman’s eyes when she
had asked, “Who in this household would have a motive for killing
Bruce Brainard?” Vera turned cold. Why had she not obliged Mrs.
Porter to give a direct answer to her own question—at least she
would have had her suspicions either confirmed or denied; any
alternative would have been preferable to the intolerable suspense
she was enduring.
She passed a hand before her eyes, and her thoughts took a new
trend. What had brought Alan Noyes back to the Porters’ when he—
The opening of the hall door abruptly terminated her troubled
reflections, and she rose as Mrs. Porter entered the room.
Without speaking Mrs. Porter tiptoed over to the bed and gazed long
and earnestly at her son.
“Is he really asleep?” she whispered.
“Yes, Mrs. Porter. Won’t you take my chair?” placing it for her.
Mrs. Porter seated herself, drawing Vera down to sit on the arm in
order that she might speak confidentially and not raise her voice.
“I can do nothing with Millicent,” she said wearily. “Arguments,
commands, are of no avail; she will not go to bed, will not even slip
on her wrapper and lie down on the lounge. She declares that she
cannot sleep, that she must have ‘air, air.’” Mrs. Porter pushed her
hair off her forehead. “She even threatens to go for a walk.”
“At this hour?”
“Yes. I thought of sending for your sister to quiet her, but concluded
to come for you. Your nursing experience can decide if she needs a
sedative.”
“Shall I call Dr. Noyes to attend her?”
“No.” Mrs. Porter’s mouth closed obstinately. “Except that her
manner is a trifle wild and her cheeks unduly flushed, Millicent
seems rational. You have great influence with her, Vera; go and quiet
her.”
“But I cannot leave your son.”
“Yes, you can; I will stay here until you return.” Mrs. Porter spoke
authoritatively and Vera hesitated, Noyes’ caution of the moment
before recurring to her; he had told her that Mrs. Porter should be
humored, and there was nothing for her to do but obey his
instructions. She looked again at Craig Porter, whose closed eyes and
regular breathing indicated that his sleep was uninterrupted. If
Millicent did require medical attendance she could summon Dr.
Noyes and Mrs. Hall, and return to her regular duties. A thought
occurred to her, and she turned back to Mrs. Porter.
“Would you like me to call Mrs. Hall?”
“Mercy, no!” Mrs. Porter frowned; she objected to suggestions, no
matter how well meant they were. “Go at once, Vera, I do not like to
leave Millicent alone for any length of time. She is sitting in the
boudoir.”
With a last look at her patient, Vera left the room and sought the
boudoir; it was empty. She went at once to Millicent’s bedroom and,
her gentle tap getting no response, she opened the door and went
in. Millicent was not there, and, somewhat perplexed, Vera looked
into the communicating dressing-room and from there passed into
her sister’s bedroom. Dorothy was lying asleep on the bed, her gas-
light turned low, but as Vera bent over her she saw traces of recent
tears on her pale cheeks and forbore to wake her.
Returning to the hall she stood debating as to whether to report to
Mrs. Porter or continue her search for Millicent on the first floor. She
decided to go back to Mrs. Porter, but as she paused in front of the
door of Craig Porter’s bedroom a faint noise caused her to look
hastily down the hall just as Millicent emerged from the attic stairs
and disappeared down the back staircase. The acetylene lights at
either end of the long hall were burning dimly, as Mrs. Porter
deemed it unsafe to keep the house in darkness, and Vera saw that
Millicent was enveloped in some sort of a cloak.
Considerably perturbed, Vera hesitated, but only for a moment; then
she sped after Millicent. Mrs. Porter was on guard in the sick room,
and she had sent her to look after her daughter. If Millicent, in a
moment of delirium perhaps, attempted to walk abroad at that hour
of the night she must be reasoned with and stopped.
Vera’s disturbed ideas took form as she dashed downstairs, the
sound of her approach deadened by her rubber-soled shoes. She
was halfway down the circular staircase when she saw Millicent
fumbling with the lock, by aid of the moonlight streaming through
the fanlight over the side door. The clang of the night chain when
Millicent unhooked it drowned Vera’s low-voiced call, and, snatching
up a small bundle which she had placed on a console, Millicent
darted out into the night. Her foot turned just as she was about to
descend the few steps leading to the graveled path, and only her
outflung hand saved her from a nasty fall. Recovering herself and
never glancing behind her, she hastened up the path, being careful,
however, to tread only on the turf.
Vera, unmindful of the chill wind and her coatless condition, paused
only long enough to close the door, then hurried after Millicent. She
had taken but a few steps beyond the house when her foot struck
against something which whizzed ahead of her, and she caught the
glint of moonlight on metal. Catching up with the small object, she
stooped over and picked it up. It was a razor.
Vera’s heart beat with suffocating rapidity as she tore ahead. What
fresh tragedy was impending? To her dismay she saw Millicent was
gaining ground. What use to call—no one was near—and she needed
every ounce of breath to overtake the flying figure. Millicent kept a
fairly straight course, then, darting among a clump of laurel bushes,
disappeared from view, but only for a moment, as Vera, circling the
bushes, caught sight of her cutting across fields toward Thornedale,
but instead of continuing her approach to the low, rambling hunting
lodge, she doubled on her tracks and half slid down a steep
embankment.
Vera, hampered by her unfamiliarity with the ground, was some
minutes later in reaching the top of the embankment, and she halted
abruptly on seeing Millicent, no sign of her recent haste discernible,
seated at the bottom of the embankment, apparently resting at her
ease. Shifting clouds temporarily obscured the moon, and Vera
waited expectantly before attempting the descent, dropping to her
knees behind a cluster of shrubs as she decided to call and ask
Millicent to wait for her. But her intentions received a check as a
figure turned the corner of the winding highway, and a voice
addressed Millicent.
“Who is here?” The next instant an electric pocket torch played
across her face, then flickered out as Hugh Wyndham exclaimed in
deep astonishment, “Millicent!”
His cousin threw out her hand as if to ward off the censure she felt
coming.
“The house was stifling, Hugh,” she explained hurriedly. “I simply
had to come out,” rising. “I’ll walk back with you. My head feels
better already.”
Wyndham gazed at her in undisguised concern. “I wish I had known
—” he began, and broke off. “Come, Millicent.” And slipping his arm
inside hers, he led her with gentle determination in the direction of
her house. Vera, greatly relieved at having Wyndham take charge of
his cousin, was about to rise from her cramped position and follow
them, when the razor, which she still clutched, slipped from her
grasp and slid down the embankment. Instinctively she reached for
it, lost her balance and went plunging down to the roadway. In an
instant she was on her feet, the razor once again in hand, and she
started forward but, confused by her tumble, she did not realize that
she was headed in the wrong direction until she had taken several
steps.
“Hush!” he whispered. “No noise. Look——”
As she paused she became aware that someone was approaching
swiftly down the road, and suddenly awakening to the fact that
Millicent and Wyndham were out of sight in the opposite direction,
and that it must be long after midnight, she made a few hesitating
steps toward a hedge and stopped irresolutely; there was no reason
why she should run away. She held up the razor and the sight of the
burnished steel in the light from the moon, which had come from
behind the obscuring clouds, reassured her. She was not without
protection, but a sudden doubt assailed her; how was she to
account for the possession of the razor? Millicent might have
dropped it in her flight from the house—but why had Millicent
carried a razor—it was a toilet article not usually possessed by
women. Could it be that Millicent was striving to get rid of the razor
surreptitiously? The police were still searching for the set of razors
from which had been taken the razor used to kill Bruce Brainard—
Vera’s arm was raised to fling the razor far from her when a hand
was clapped over her mouth and she was pulled down in the shadow
of the hedge bordering the road. Her startled eyes looked straight at
Beverly Thorne.
“Hush!” he whispered. “No noise. Look!”
And following his pointing finger Vera saw a man run across the
opposite field, vault the fence and hurry down the road. He was
entirely out of sight before Thorne removed his hand from Vera’s
shoulder, and, rising, he helped her up.
“Come,” he said, and in silence accompanied her to the Porter
mansion.
Vera, her ideas too chaotic for utterance, detained him at the side
door. “Who was the man we saw run up the road?” she asked. “His
figure looked familiar, but I did not get a clear view of his face.”
“It was Detective Mitchell,” responded Thorne softly, lifting his cap.
“Good night.”
Not until she was safely inside the Porter mansion did Vera
remember the razor—she gazed blankly at her empty hands. Had
she dropped the razor in her excitement or—had Beverly Thorne
taken it from her?
CHAPTER XVI
HARE AND HOUNDS
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookmass.com