Network routing algorithms protocols and architectures Second Edition. Edition Medhi instant download
Network routing algorithms protocols and architectures Second Edition. Edition Medhi instant download
https://textbookfull.com/product/network-routing-algorithms-
protocols-and-architectures-second-edition-edition-medhi/
https://textbookfull.com/product/network-routing-2018-mehdi-
ramasamy-9780128007372-2nd-edition-karthik-ramasamy-deep-medhi/
https://textbookfull.com/product/campus-network-architectures-
and-technologies-1st-edition-ningguo-shen/
https://textbookfull.com/product/network-flow-algorithms-1st-
edition-williamson/
https://textbookfull.com/product/flexible-network-architectures-
security-principles-and-issues-first-edition-rudra/
Sustainable Wireless Network-On-chip Architectures 1st
Edition Murray
https://textbookfull.com/product/sustainable-wireless-network-on-
chip-architectures-1st-edition-murray/
https://textbookfull.com/product/clustering-and-routing-
algorithms-for-wireless-sensor-networks-energy-efficiency-
approaches-1st-edition-pratyay-kuila/
https://textbookfull.com/product/number-systems-for-deep-neural-
network-architectures-1st-edition-alsuhli/
https://textbookfull.com/product/enterprise-wireless-local-area-
network-architectures-and-technologies-1st-edition-rihai-wu/
https://textbookfull.com/product/enhanced-living-environments-
algorithms-architectures-platforms-and-systems-ivan-ganchev/
Network Routing
Algorithms, Protocols, and
Architectures
Second Edition
Network Routing
Algorithms, Protocols, and
Architectures
Second Edition
Deep Medhi
Karthik Ramasamy
Morgan Kaufmann is an imprint of Elsevier
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
Copyright © 2018 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on
how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as
the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted
herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes
in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information,
methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety
and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or
damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods,
products, instructions, or ideas contained in the material herein.
ISBN: 978-0-12-800737-2
CHAPTER 2 Routing Algorithms: Shortest Path, Widest Path, and Spanning Tree ........ 30
2.1 B ackg round . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.2 Bellman-Ford Algorith m and the Di sta nce Vector A ppro ach . ..... . . . .... . . . 33
2.2.1 Centralized View: Bellman-Ford Algorithm . . . . . . . . . . . . . . • • . . 33
2.2 .2 Di stri buted View: A Distance Vector Approach . . . . . . . . . . . • . . . . . . . . . 36
vii
....�
.. --------------------------------------------
VIII CONTENTS
5.5.2 Computing Composite Metric. .... ............ ... . ......... . ..... 172
5.6 Enhanced Interior Gateway Routing Protocol (EIGRP) . .. . . . ... .... . .. . . . .. 175
5.6.1 Packet Format.. . . .. . . .. . . .... . . . . . . ... .... . . . ... . .. ... . . . . .. .. 175
5.7 Route Redistribution 177
5.8 Summary .. . 179
Further Loo kup . . . . . . . . . 181
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • . . . . 182
Exercises . . . . . . . . . . . . . . . . . . . . . . 333
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CHAPTER 11 Routing and Traffic Engineering in Software Defined Networks. . . . .. . . . ... 378
11.1 Software Defined Networks: An Over view . . ... . ... . ... . ..... . . 379
11.2 OpenFlow .. .... . . .... . . . .. . . . . .... . . . . .. . . ..... .. . ... . .. . . . .. . . 382
11.3 Rou tin g D ecisi on s . . . . . . . . . . . . . _ _ . . . . . . . . . . _ _ _ . . . . • . _ _ . . . .
. 386
11.4 Traffic Engineering for Aggregated Flow Rou tin g. . . . . . . _ . .
. 388
J 1.4.1 Aggregation at Origin-Dest.ination Level .......................... 388
11.4.2 Traffic Engineering for Mul t iple Se rvices . . . ... ........ .... .... . 389
1 1.4.3 Traffic Engi neeri ng in the Presence of Flow Table Limits .......... 390
1.1.4.4 Remark: Using Optimization Models in Practice 392
11.5 Flow Management Approaches ..................................... . 392
11.6 Summary ...... ............ . ..... ........ .... ..... 394
Furrher Lookup .. ..... .. . . . . .... . . . . .. .. .. ..... 394
Exercises. . ...... ....... . 394
CHAPTER 12 Routing and Traffic Engineering in Data Center Networks . .. ............. 396
12.1 Cloud Services and Data Center Applications 397
12.2 Data Center Network: A Simple Illustration.. 39 8
12.3 Data Center Network: RoutingfForwarding Requirements . . ..... . .. 400
12.4 Fat-Tree Data Center Topology ......................... . 401
12.4.1 Addressi ng...... ...... ... ... . ...... ... ... ............. .. 402
12.4.2 Routing Table ... . . . .... . ... .. .... ... ... 404
12.4.3 Routing Paths ........................................ 40 5
12.5 Portland Approach for the Fat-Tree To pology . . . . . . . . . . . . . . .. . . . . . . . . . . . 405
12.6 Multipath Ro ut ing and Traffic Engine ering for Fat-Tree Topology . . . . . . . . . . . 40 7
....�
.. --------------------------------------------
XIV CONTENTS
22.4.5 Control and Data Path Separallo n and Link Management Protocol , 756
22.5 MPLS Virtual Private Networks. . . . . ... . . . .. . . . . .... . . . . . . . . . . .. 758
22.5.1 BGPIMPLS IP V PN .......... ...... .. ..... ....... .. 758
22.5.2 Layer 2 VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
22.6 Multicast VPN with MPLS . . . . . . .... . . 762
22.7 Summ ary . . . . . . . . . . . . . . . . . . . . . • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
Further L ookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
CHAPTER 24 Routing in Optical Networks, Mu ltilayer Networks, and Overlay Networks . . . 786
24. 1 Optical Technology: Overview . .. . .. ..
. . . ..... . 787
24. 1 .1 SONET/SDH...... ............. ..... .. . . . . . . . . . 787
24. 1.2 OTN ............. .. ........... .. . .... ... .... . . ... ... 788
24.2 How Is Opt ical Routing Different? . . . . ..... . .. . ..... ... . 789
24.3 SONET/SDH and OTN Routing . . . . .. . . . . . . . . . . . ... . . .. . . . . . ... 790
24.3.' Routing in a SONET Ring. . ... . . .. .... .. .. . . . . ..... ... . .. . .... 790
24.3.2 Routing in SONET/SDH or OTN Transport Cross-Connect Networks 792
-------------------------------------------- � ......
CONTENTS XXI
26.2 GSTN Call Routing Using Int ernet ........... . . ....... 868
26.2.1 Conceptual Requirement . . .. . . . . 868
. . . . . . . • . .
My involvement with computer networking started with TheoryNet (1977), an email system for theo-
retical computer scientists. Later (1981) I helped lead the CSNET (computer science network) project
which eventually connected most academic and many industrial computer research groups. In those
early days, our efforts were primarily focused on providing connectivity and being able to use ap-
plications such as email, ftp, and telnet. However, even in the simple (by today’s standards)
environment of the 1970s and early 1980s (Arpanet, CSNET, other experimental Internet networks),
getting routing “right” turned out to be quite challenging.
I was fortunate to be part of the NSFNET regional/backbone model development. This is when
I began to fully understand the significance of routing in a large-scale multi-domain network and, in
particular, the central role of policy issues in such a decentralized environment. As the Internet has
become global in scale and ubiquitous over the past decade, routing has become ever more important.
Packets must be forwarded efficiently from one end of the world to the other with minimal perception
of delay. This has required tremendous efforts on many fronts: how to evolve routing protocols for
large-scale loosely-coupled networking environments, how to engineer a network for efficient routing
from an operational point of view, how to do efficient packet processing at routers, and how to effec-
tively take into account the complexity of policy issues in the determination of routes. And while over
the past two decades there have been many exciting advances, much work remains to be done.
In parallel, we have seen tremendous advances in traditional telephony. The underlying telecommu-
nication system has changed from analog to digital and has incorporated the latest advances in optical
technologies and, more recently, voice over IP. Throughout these revolutionary changes, routing has
continued to play a critical role.
We are now at a crossroad. Various efforts are underway to determine a framework for next gener-
ation networks that allows seamless convergence of services and a platform to more easily create new
services. Among other things, this requires a fresh look at routing. To be successful, it is important that
we understand what has worked to date. To better understand the issues and complexities we should
look at this broadly, considering a variety of different network architectures, not just the for Internet.
For each such network architecture we can benefit from understanding its principles, protocols, algo-
rithms, and functions, with focus on routing. This will help give us perspective as we consider how to
design routing for the next-generation network.
In this regard, Deepankar Medhi and Karthikeyan Ramasamy’s book, Network Routing: Algo-
rithms, Protocols, and Architectures, is very timely. Departing from most other works, it is unique
in providing an in-depth understanding of routing in a wide variety of types of networks. It includes
extensive coverage of the evolution of routing over time. Particularly appealing is its in-depth coverage
across a spectrum of algorithmic, technical, experiential, and practical issues. In addition, the detailed
coverage of routers and switches is particularly valuable as it helps the reader to gain an understand-
ing of why different approaches and components are needed to address packet processing, especially
for scalability. In this regard, it is uniquely successful in drawing the important connection between
routing and routers.
xxv
XXVI FOREWORD (1ST EDITION)
Medhi and Ramasamy’s presentation is very clear and approachable, allowing a wide audience to
understand and gain an appreciation of network routing. I believe that it will become a core refer-
ence book on routing for router developers, network providers, students, and researchers, both today’s
practitioners and those who are interested in next generation routing.
Lawrence Landweber
Past John P. Morgridge Chair and Past Department Chairman,
Computer Science Department, University of Wisconsin–Madison
Fellow, Association for Computing Machinery
Recipient of IEEE Award on International Communication
Former President and Chair of the Board of Trustees, Internet Society
PREFACE (2ND EDITION)
It has been a decade since the first edition of this book was published. When we first wrote it, we
thought that would be it. To our pleasant surprise, the book picked up an audience from all over the
world. We received remarks such as the following:
“I was searching for particular information and I found it wonderfully explained in your routing
book. What a great book, every time I use it I am so glad to have it!” – Brunilde Sansò (Canada)
“I have found it really good: comprehensive, clear, precise, generic.” – Peter Soreanu (Israel)
“In my opinion, your book is an excellent source for introducing the IGP and EGP protocols.” – Don
Lanzinger (USA)
“It is a very good book, very recommended and it has been a great help for planning the course.”
– Eduardo Moreno (Chile)
We were pleased to get such nice responses and that our book struck a cord with a particular
audience.
Most recently, our publisher approached us to consider doing a second edition. Honestly, we did
not think this book was ever going to go for a second edition. It made us pause. Given our other com-
mitments, we also needed to think if we would have enough bandwidth to work on the second edition.
Finally, we decided to take the plunge. It turned out to be more challenging than we originally thought
for two reasons: 1) while on the surface, it might seem that not much has changed in routing since the
first edition, there has been a number of important developments due to software-defined networking,
data center networking, and more critical issues in regards to security with routing; 2) we faced per-
sonal situations that needed to take priority over working on the book. For the latter, we are thankful
that the publisher was able to accommodate us by giving us additional time to finish this project.
The book has gone through quite a bit of changes. In particular,
• The material in many chapters have been extensively updated with new discussions, based on feed-
back from students, educators, and professionals. New sections are added in many chapters covering
topics such as algorithms for trees in Chapter 2, node-link formulation for additional problems in
Chapter 4, OPSPFv3 in Chapter 6, BGP security in Chapter 9, and IP prefix hijacking in Chapter 10.
In particular, security issues with routing are now discussed throughout the book.
• New chapters have been added on multicast routing (Chapter 8) , on routing and traffic engineering
in data center networks (Chapter 12), and on routing in software defined networks (Chapter 11).
The chapter on optical, multilayer, and overlay routing (Chapter 24) is completely revamped.
ACKNOWLEDGMENTS
Several students who took the course, Network Routing, from the first author, read the chapters care-
fully, especially the new chapters while the second edition was under preparation. For their comments
xxvii
XXVIII PREFACE (2ND EDITION)
as well as comments from students who took the course earlier, we like to thank Abdoh Jabbari, Ah-
mad Alhonainy, Akshay Reddy Gayam, Daehee Kim, Daroon Hassan, Diana Dasi, Driss Benhaddou,
Fathima James, Jebreel Khurmi, Jagannath Mangipudi, Mirza Mohd Shahriar Maswood, Md Tajul Is-
lam, Md Mainul Islam Mamun, Nitin George, Rahul Chaudhari, Rohit Abhishek, Saud Alqahtani, Sean
Baes, Seoung Jin Lee, Shuai Jack Zhao, Sheyda Kiani Mehr, Sravan Valluri, Subhash Methuku, Syed
Faraz Hussain, and Tejas Parab.
We also benefited from feedback by Aanand Ramachandran (Microsoft, India), Brunilde Sansò
(Polytechnique Montréal, Canada), Geoff Huston (APNIC, Australia), George Rouskas (North Car-
olina State University, USA), Javier Carmona Murillo (University of Extremadura, Spain), Jennifer
Rexford (Princeton University, USA), Jörg Liebeherr (University of Toronto, Canada), Lúcia Martins
(University of Coimbra, Portugal), María J. Verdú (University of Valladolid, Spain), Mario Baldi (Po-
litecnico di Torino, Italy), Nasir Ghani (University of South Florida, USA), Nelson Fonseca (University
of Campinas, Brazil), Steve Dispensa (Microsoft, USA), Peter Soreanu (ORT Braude College, Israel),
and Teresa Gomes (University of Coimbra, Portugal), at various stages of preparing the manuscript and
for comments on our 1st edition. We again thank Jane Zupan for identifying new quotes for use at the
beginning of the chapters.
Our external reviewers took time out of their busy schedules to review many of the chapters.
We thank Ítalu Cunha (Universidade Federal de Minas Gerais, Brazil), Manav Bhatia (Nokia, In-
dia), T. Venkatesh (Indian Institute of Technology–Guwahati, India), and Stefano Secci (Université
Pierre et Marie Curie, France) for their detailed comments on the draft of many chapters. In addi-
tion, Sandeep Pisharody (Arizona State University, USA), Dallal Belabed (Thales Communications &
Security, France), and Steve Dispensa (Microsoft, USA) read chapters and provided helpful comments.
We thank the Elsevier team, Brian Romer, Ana Claudia A. Garcia (muito obrigado!), and Punitha-
vathy Govindaradjane, for their great support with the second edition. SkyLaTeX from VTEX made
it easy to make the final corrections online. Two persons stood out for their dedicated help in various
phases of this project. Xuan Liu (AT&T Labs-Research) read many chapters on a short notice, and
provided new references and much help when needed; her contributions were immeasurable. Nancy
Lorenz read the manuscript diligently one page at a time to find and fixed numerous typos—the only
person to have read the entire book! We thank them profoundly.
The first author thanks the National Science Foundation (NSF grant #s: 9422092, 9506652,
0831090, 0916505, 1029562, 1217736, 1526299), and the Defense Advanced Research Project Agency
(DARPA AFRL agreement # F30602-97-1-0257) for their funding support that helped shape both the
first edition and the second edition of this book.
Finally, we thank our families for their support (you know who you are).
Deepankar (Deep) Medhi
Overland Park, KS, USA
Karthikeyan (Karthik) Ramasamy
Santa Clara, CA, USA
PREFACE (1ST EDITION)
In the span of a quarter-century, network routing in communication networks has evolved tremen-
dously. Just a quarter century ago, the public switched telephone network (PSTN) was running hierar-
chical routing, ARPANET routing was operational, and the telecommunication infrastructure had fixed
static transport routes. In the 1980s, we first saw the tremendous growth in routing: Internet routing was
deployed under the TCP/IP stack starting, first with the RIP protocol; the telephone network started de-
ploying dynamic call routing schemes; and the telecommunication transport network deployed SONET
transport mechanisms, which could re-route in a ring topology in 40 millisec in the event of a failure.
In the past fifteen years, we have seen the need for policy routing due to multiprovider setting, and
need to develop fast lookup algorithms for packet processing that enables efficient routing. We have
also seen inter-dependency between addressing and routing as first addressed through classless Inter-
domain Routing (CIDR) and more recently, due to number portability in the PSTN; more importantly,
we saw how the way an addressing scheme is deployed can impact routing and lookup algorithms.
Network routing can be broadly divided into three basic fundamental categories: packet routing,
circuit-switched routing, and transport routing; certainly, a combination is possible. The evolution over
the past quarter century has brought to the foreground the need to understand and examine where
and how different dimensions of routing, from algorithms to protocols to architectures, can differ for
different types of networks and where they intersect. Certainly, the goal is to see how we learn from
our past experiences and prepare ourselves for next generation networks and routing.
While numerous papers have been written on the subject of network routing, and several books
are now available on routing for specific networks, the field still lacks a comprehensive or systematic
guide that encompasses various routing paradigms. Secondly, even in discussions of a single routing
type (for example, either Internet or PSTN), the focus often appears to be either on protocols or on
algorithms without tying them together along with analysis and implementation; or, the work delves
more into router command-line for router configuration, or, being informational without explaining
the whys. Furthermore, how the addressing mechanism can affect routing decisions is yet another
important topic that is rarely discussed. For efficient routing, how routers are architectured, and why,
is yet another mystery. Finally, the relation between traffic engineering and efficient routing is also
another topic. In the end, one needs to be somewhat of an “expert” in different routing paradigms to
get a well-rounded view.
Lastly, after investigating about routing in different networks for a number of years, we have come
to the observation that network routing is like an economy. Similar to macroeconomics and microeco-
nomics, network routing also has macro- and micro-centric issues; in addition, seemingly different and
conflicting systems can and do co-exist. Not all of the issues are purely technical; business relations
and regulatory issues are also important to recognize and consider. Thus, this book is an attempt to
paint a broad picture that encompasses various aspects of network routing in one place.
xxix
XXX PREFACE (1ST EDITION)
AUDIENCE
Our goal has been to create a book that can be used by a diverse set of audiences, and with varied levels
of background. Specifically, we set out to create a book that can be used by professionals as well as
students and researchers. In general, this is intended as a self-study. We assume that the reader already
has some basic knowledge of networking. Among professionals, the intent has been to cover two broad
groups, router developers including protocol designers and router architects, and network designers and
operators, with the overall goal to bring out issues that one group might want to understand that the
other group faces. For students, this book is intended to help learn about routing in depth, along with
the big picture and lessons from operational and implementation experience. For researchers, who want
to know what has been done so far and what are critical issues to address for next generation routing,
this is intended as a helpful reference. In general, this book has been intended as a one-stop treatise for
all interested in network routing in different networks.
• Part-I (four chapters): We cover the basic foundations of routing, from algorithms to protocols,
along with network flow modeling.
• Part-II (five chapters): This part is about IP network routing, from standardized protocols for both
intra- and inter-domain routing, to IP traffic engineering, to Internet routing architectures.
• Part-III (four chapters): This part covers PSTN routing, from hierarchical routing to dynamic rout-
ing, from addressing to traffic engineering, including the role of signaling in routing, along with the
impact of number portability in routing.
• Part-IV (three chapters): In this part, we cover router architectures for different scale routers for
efficient packet processing, along with address lookup algorithms, and packet filtering and classifi-
cation mechanisms.
• Part-V (four chapters): As impetuses for next generation routing, we present quality-of-service rout-
ing, multiprotocol label switching, generalized multiprotocol label switching, and routing at the
intersection of IP-PSTN for voice over IP.
• Part-VI (five chapters): This bonus material (available only on the CD-ROM) is made up of two
sub-parts: the first three chapters continue beyond Part-IV by delving more into routers by pre-
senting efficient switching, packet queueing and scheduling, and traffic conditioning; the remaining
two chapters extend Part-V by covering transport network routing, optical network routing, and
multilayer routing.
At the beginning of each chapter, a reading guideline is provided. This gives a brief description
on the background needed to read the chapter; it also discusses which other chapters this chapter is
connected to or has dependency on. In general, it is not necessary to read the chapters in the sequential
order presented. Furthermore, the chapters are organized in a way so that the reader who has famil-
iarity with a particular topic can move on and read other chapters of interest. Similarly, there are a
Discovering Diverse Content Through
Random Scribd Documents
during the war was to so far disgust him with military affairs that he
would neither train, or drill: but paid fines; and got along like a
Quaker untill his age had finally cleared him of Military duty.
During the war with England a circumstance occurred that in the end
made him a most determined Abolitionist: & led him to declare, or
Swear: Eternal war with Slavery. He was staying for a short time
with a very gentlemanly landlord once a United States Marshal who
held a slave boy near his own age very active, intelligent and good
feeling; & to whom John was under considerable obligation for
numerous little acts of kindness. The master made a great pet of
John: brought him to table with his first company; & friends; called
their attention to every little smart thing he said or did: & to the fact
of his being more than a hundred miles from home with a company
of cattle alone; while the negro boy (who was fully if not more than
his equal) was badly clothed, poorly fed: & lodged in cold weather;
& beaten before his eyes with Iron Shovels or any other thing that
came first to hand. This brought John to reflect on the wretched;
hopeless condition, of Fatherless & Motherless slave children: for
such children have neither Father nor Mothers to protect, & provide
for them. He would sometimes raise the question is God their
Father?
At the age of Ten years an old friend induced him to read a little
history; & offered him the free use of a good library; by which he
acquired some taste for reading: which formed the principle part of
his early education: & diverted him in a great measure from bad
company, & conversation of old & inteligent persons. He never
attempted to dance in his life; nor did he ever learn to know one of
a pack of cards from another. He learned nothing of Grammar; nor
did he get at school so much knowledge of common Arithmetic as
the Four ground rules. This will give you some idea of the first
Fifteen years of his life; during which time he became very strong
and large of his age and ambitious to perform the full labour of a
man; at almost any kind of hard work. By reading the lives of great,
wise & good men their sayings, and writings; he grew to a dislike of
vain & frivolous conversation & persons; & was often greatly obliged
by the kind manner in which older & more intelligent persons treated
him at their houses: & in conversation; which was a great relief on
account of his extreme bashfulness.
He very early in life became ambitious to excell in doing anything he
undertook to perform. This kind of feeling I would recomend to all
persons both male & female: as it will certainly tend to secure
admission to the company of the more intelligent & better portion of
every community. By all means endeavor to excell in some laudable
pursuit.
I had like to forgotten to tell you of one of John's misfortunes which
set rather hard on him while a young boy. He had by some means
perhaps by gift of his father become the owner of a little Ewe Lamb
which did finely till it was about Two Thirds grown; and then
sickened & died. This brought another protracted mourning season:
not that he felt the pecuniary loss so much: for that was never his
disposition: but so strong and earnest were his attachments.
John had been taught from earliest childhood to fear God and keep
his commandments; & though quite skeptical he had always by turns
felt much serious doubt as to his future well being & about this time
became to some extent a convert to Christianity & ever after a firm
believer in the divine authenticity of the Bible. With this book he
became very familiar, & possessed a most unusual memory of its
entire contents.
Now some of the things I have been telling of; were just such as I
would recomend to you: & I wd like to know that you had selected
these out; & adopted them as part of your own plan of life; & I wish
you to have some definite plan. Many seem to have none; & others
never stick to any that they do form. This was not the case with
John. He followed up with tenacity whatever he set about so long as
it answered his general purpose: & hence he rarely failed in some
good decree to effect the things he undertook. This was so much the
case that he habitually expected to succeed in his undertakings.
With this feeling should be coupled; the consciousness that our plans
are right in themselves.
During the period I have named John had acquired a kind of
ownership to certain animals of some little value but as he had come
to understand that the title of minor's might be a little imperfect: he
had recource to various means in order to secure a more
independent; & perfect right of property. One of those means was to
exchange with his Father for something of far less value. Another
was trading with other persons for something his Father had never
owned. Older persons have some times found difficulty with titles.
From fifteen to Twenty years old, he spent most of his time working
at the Tanner & Currier's trade keeping Bachelors hall; & he was
acting as Cook; & for most of the time as foreman of the
establishment under his father. During this period he found much
trouble with some of the bad habits I have mentioned & with some
that I have not told you of: his conscience urging him forward with
great power in this matter: but his close attention to business; &
success in his management; together with the way he got along with
a company of men; & boys; made him quite a favorite with the
serious & more intelligent portion of older persons. This was so
much the case; & secured for him so many little notices from those
he esteemed; that his vanity was very much fed by it; & he came
forward to manhood quite full of self-conceit; & self-confidence;
notwithstanding his extreme bashfulness. A younger brother used
sometimes to remind him of this: and to repeat to him this
expression which you may somewhere find, 'A King against whome
there is no rising up.' The habit so early formed of being obeyed
rendered him in after life too much disposed to speak in an
imperious & dictating way. From Fifteen years & upward he felt a
good deal of anxiety to learn; but could only read and study a little;
both for want of time; & on account of inflammation of the eyes. He
however managed by the help of books to make himself tolerably
well acquainted with common arithmetic; & Surveying; which he
practiced more or less after he was Twenty years old.
At a little past Twenty years led by his own inclination & prompted
also by his Father, he married a remarkably plain; but neat
industrious & economical girl; of excellent character; earnest piety; &
good practical common sense; about one year younger than himself.
This woman, by her mild, frank, & more than all else: by her very
consistent conduct; acquired & ever while she lived maintained a
most powerful; & good influence over him. Her plain but kind
admonitions generally had the right effect; without arousing his
hauty obstinate temper. John began early in life to discover a great
liking to fine Cattle, Horses, Sheep, & Swine; & as soon as
circumstances would enable him he began to be a practical
Shepherd: it being a calling for which in early life he had a kind of
enthusiastic longing: with the idea that as a business it bid fair to
afford him the means of carrying out his greatest or principle object.
I have now given you a kind of general idea of the early life of this
boy; & if I believed it would be worth the trouble; or afford much
interest to any good feeling person: I might be tempted to tell you
something of his course in after life; or manhood. I do not say that I
will do it.
You will discover that in using up my half sheets to save paper; I
have written Two pages, so that one does not follow the other as it
should. I have no time to write it over; & but for unavoidable
hindrances in traveling I can hardly say when I should have written
what I have. With an honest desire for your best good, I subscribe
myself,
Y
o
u
r
F
r
i
e
n
d
,
J
.
B
r
o
w
n
Adair, Rev. S. L., 77, 108, 146, 152, 221, 234, 264, 273
Adams, Mrs. Anne Brown, quoted, 82, 290, 291, 292, 293
Bank of Wooster, 39
Belshazzar, 326
Benjamin, Jacob, at Pottawatomie, 110; 20, 135, 159, 170, 172, 182
Black Jack, battle of, 110, 135, 141, 144, 149, 157, 223, 403, 405
Black Warrior, 60
Brown, Frederick, son of B., killed at Osawatomie, 170; 72, 136, 161,
165, 169, 171, 182
Brown, Jason, son of B., 45, 72, 116, 125, 144, 146, 159, 179, 182,
207, 405
Brown, Mary Ann (Day), B.'s second wife, 28; 381, 390, 392, 393
Charleston Mercury, 70
Chicago Tribune, 46
Chilton, Samuel, counsel for B., 369; 372, 373, 374, 375
Clay, Henry, 59
Committee, Mass. State Kans., 185, 187, 188, 195, 200, 203, 221,
256
Committee, National, Kans., 181, 184, 187, 188, 189, 190, 196, 203,
221, 265
Congressional Globe, 59
Corcoran, W. W., 58
De Bow's Review, 70
Emancipation Proclamation, 63
Fastness, "hill-top," myth, 328, 330, 332, 335, 338, 339, 340
Geary, Genl. John W., Gov. K. T., 69, 70, 174, 176, 184
Goliath-American, 80
Green, Israel, Lieut. U. S. Marine Corps, 308, 309, 310, 320, 321
Green, Thomas G., counsel for B., 366, 369, 371, 372
Hinton, Richard J., author, 17, 26, 130, 228, 235, 264, 342, 384
Holmes, "Capt." J. H., 160, 161, 162, 170, 171, 172, 179, 213, 214,
235
Howe, Dr. Saml. G., member of B.'s War Com., 254; 186, 240, 242,
245, 255, 257, 325, 347, 353, 355, 384
Hoyt, Geo. H., counsel for B., and spy, 368; 370, 372, 383, 385
Hurlbut, Mr., 78
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com