100% found this document useful (3 votes)
19 views

Computer Networking and Cybersecurity A Guide to Understanding Communications Systems Internet Connections and Network Security Along with Protection from Hacking and Cyber Security Threats 1st edition by Quinn Kiser 1952559790‎ 978-1952559792 download

The document is a comprehensive guide on computer networking and cybersecurity, covering topics such as networking basics, hardware, protocols, and security measures against cyber threats. It includes detailed chapters on various aspects of networking, cybersecurity principles, types of cyberattacks, and protective techniques. The guide aims to provide readers with a foundational understanding of modern communications systems and the importance of network security.

Uploaded by

zarattupercj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
19 views

Computer Networking and Cybersecurity A Guide to Understanding Communications Systems Internet Connections and Network Security Along with Protection from Hacking and Cyber Security Threats 1st edition by Quinn Kiser 1952559790‎ 978-1952559792 download

The document is a comprehensive guide on computer networking and cybersecurity, covering topics such as networking basics, hardware, protocols, and security measures against cyber threats. It includes detailed chapters on various aspects of networking, cybersecurity principles, types of cyberattacks, and protective techniques. The guide aims to provide readers with a foundational understanding of modern communications systems and the importance of network security.

Uploaded by

zarattupercj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 86

Computer Networking and Cybersecurity A Guide to

Understanding Communications Systems Internet


Connections and Network Security Along with
Protection from Hacking and Cyber Security
Threats 1st edition by Quinn Kiser
https://ebookball.com/product/computer-networking-and-
1952559790‎ 978-1952559792 pdf download
cybersecurity-a-guide-to-understanding-communications-systems-
internet-connections-and-network-security-along-with-protection-
from-hacking-and-cyber-security-threats-1st-editio/

Explore and download more ebooks or textbooks


at ebookball.com
Get Your Digital Files Instantly: PDF, ePub, MOBI and More
Quick Digital Downloads: PDF, ePub, MOBI and Other Formats

Networking for Beginners Simple Guide to Study Basic Advanced Computer


Network Hardware Wireless and Cabling LTE Internet and Cyber Security
1st edition by Jack Mathew 1712954016 978-1712954010

https://ebookball.com/product/networking-for-beginners-simple-
guide-to-study-basic-advanced-computer-network-hardware-wireless-
and-cabling-lte-internet-and-cyber-security-1st-edition-by-jack-
mathew-1712954016-978-1712954010-20034/

Machine Learning for Cybersecurity Cookbook Over 80 recipes on how to


implement machine learning algorithms for building security systems
using Python 1st edition by Emmanuel Tsukerman 9781838556341
1838556346
https://ebookball.com/product/machine-learning-for-cybersecurity-
cookbook-over-80-recipes-on-how-to-implement-machine-learning-
algorithms-for-building-security-systems-using-python-1st-
edition-by-emmanuel-tsukerman-9781838556341-1/

Computer Hacking A Beginners Guide to Computer Hacking How to Hack


Internet Skills Hacking Techniques and More 1st Edition by Joe Benton
ISBN B00W0S29N6

https://ebookball.com/product/computer-hacking-a-beginners-guide-
to-computer-hacking-how-to-hack-internet-skills-hacking-
techniques-and-more-1st-edition-by-joe-benton-
isbn-b00w0s29n6-15696/

Hacking Beginner to Expert Guide to Computer Hacking Basic Security


and Penetration Testing 1st Edition by James Patterson

https://ebookball.com/product/hacking-beginner-to-expert-guide-
to-computer-hacking-basic-security-and-penetration-testing-1st-
edition-by-james-patterson-15708/
Cybercrime and Information Technology Theory and Practice The Computer
Network Infrastructure and Computer Security Cybersecurity Laws
Internet of Things IoT and Mobile Devices 1st edition by Alex
Alexandrou 9781000426922 1000426920
https://ebookball.com/product/cybercrime-and-information-
technology-theory-and-practice-the-computer-network-
infrastructure-and-computer-security-cybersecurity-laws-internet-
of-things-iot-and-mobile-devices-1st-edition-by-alex-ale/

Essential Computer Security Everyone's Guide to Email Internet and


Wireless Security 1st edition by Bradley ISBN 1597491144 9781597491143

https://ebookball.com/product/essential-computer-security-
everyone-s-guide-to-email-internet-and-wireless-security-1st-
edition-by-bradley-isbn-1597491144-9781597491143-16930/

Introduction To 80 86 Assembly Language And Computer Architecture 1st


Edition by Detmer ISBN 0763717738 9780763717735

https://ebookball.com/product/introduction-to-80-86-assembly-
language-and-computer-architecture-1st-edition-by-detmer-
isbn-0763717738-9780763717735-12404/

Hacking Beginner to Expert Guide to Computer Basic Security and


Penetration Testing 1st Edition by James Patterson

https://ebookball.com/product/hacking-beginner-to-expert-guide-
to-computer-basic-security-and-penetration-testing-1st-edition-
by-james-patterson-15720/

CYBER SECURITY FOR BEGINNERS A COMPREHENSIVE AND ESSENTIAL G


EVERY NOVICE TO UNDERSTAND AND MASTER CYBERSECURITY 1st editio
Liam Smith B09S22HW9N

https://ebookball.com/product/cyber-security-for-beginners-a-
comprehensive-and-essential-guide-for-every-novice-to-understand-
and-master-cybersecurity-1st-edition-by-liam-
smith-b09s22hw9n-20054/
Computer Networking and
Cybersecurity
A Guide to Understanding
Communications Systems, Internet
Connections, and Network Security Along
with Protection from Hacking and Cyber
Security Threats
© Copyright 2020
All Rights Reserved. No part of this book may be reproduced in any form without permission in writing from
the author. Reviewers may quote brief passages in reviews.
Disclaimer: No part of this publication may be reproduced or transmitted in any form or by any means,
mechanical or electronic, including photocopying or recording, or by any information storage and retrieval
system, or transmitted by email without permission in writing from the publisher.
While all attempts have been made to verify the information provided in this publication, neither the author
nor the publisher assumes any responsibility for errors, omissions or contrary interpretations of the subject
matter herein.
This book is for entertainment purposes only. The views expressed are those of the author alone, and
should not be taken as expert instruction or commands. The reader is responsible for his or her own actions.
Adherence to all applicable laws and regulations, including international, federal, state and local laws
governing professional licensing, business practices, advertising and all other aspects of doing business in the
US, Canada, UK or any other jurisdiction is the sole responsibility of the purchaser or reader.
Neither the author nor the publisher assumes any responsibility or liability whatsoever on the behalf of the
purchaser or reader of these materials. Any perceived slight of any individual or organization is purely
unintentional.
Contents
PART 1: COMPUTER NETWORKING
INTRODUCTION
CHAPTER 1: COMPUTER NETWORKING BASICS
What is Modern Computer Networking?
CHAPTER 2: NETWORKING SERVICES EXPLAINED
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Network News Transfer Protocol (NNTP)
Simple Mail Transfer Protocol (SMTP)
Keeping the Networks Safe with Firewalls
CHAPTER 3: GETTING INTO THE NETWORKING HARDWARE
FUNDAMENTALS OF COMPUTER RELATIONSHIPS
Core Hardware Elements of a Network
Servers
Hubs, Switches, and Routers
Cabling and Cable Plants
Workstation Hardware
Utilizing the Network Traffic and Knowing the Network Hardware
Repeaters
Hubs (Concentrators)
Switches
Bridges
Routers
Gateways
The Core Fundamentals of Cable Topologies
Star Topology
Ring Topology
CHAPTER 4: WIRELESS COMMUNICATION SYSTEMS AND CONNECTING TO THE
INTERNET
Connecting to the Internet
Wide Area Networks
Internet and Intranet
Understanding the Features of Networking
File Sharing
Printer Sharing
Application Services
E-mail
Remote Access
CHAPTER 5: COMMON NETWORK PROTOCOLS AND PORTS
TCP/IP and UDP
Domain Name System (DNS), allowing users to access websites with easy-to-
remember domain names instead of long numerical IP addresses.
Dynamic Host Configuration Protocol (DHCP), for assigning TCP/IP
addresses to the nodes in a network.
Hypertext Transfer Protocol (HTTP), which controls the transfer of data
between the client and the webserver.
File Transfer Protocol (FTP), which defines the method by which file data is
sent and received between the FTP client and the FTP server.
Network News Transfer Protocol (NNTP), specifically used for Usenet
discussion groups on the Internet.
Simple Mail Transfer Protocol (SMTP), which handles the sending and
receiving of e-mails from one e-mail server to another.
CHAPTER 6: LEARNING ABOUT THE OSI NETWORKING MODEL
Layer 1: The Physical Layer
Layer 2: Data-Link Layer
Layer 3: Network Layer
Layer 4: Transport Layer
Layer 5: Session Layer
Layer 6: Presentation Layer
Layer 7: Application Layer
CHAPTER 7: NETWORK SECURITY, CYBERSECURITY, AND HACKING METHODS
Account Security
Password Security
File and Directory Permissions
Practices and User Education
Understanding External Threats
Front-Door Threats
Back-Door Threats
DDoS Threats
Potential Attacks and Threats
Basics to Hacking and Network Design
The Process of Designing a Network
Assessing Network Needs
Applications
Users
Network Services
Meeting the Network Needs
The Basics of Hacking: The Kill Chain Process
Phase 1: Reconnaissance
Phase 2: Intrusion
Phase 3: Exploitation
Phase 4: Privilege Escalation
Phase 5: Lateral Movement
Phase 6: Obfuscation
Phase 7: Denial of Service
Phase 8: Exfiltration
CHAPTER 8: USEFUL CYBERSECURITY TIPS FOR 2020
Vital Function of a Disaster Recovery Plan
Assessing Disaster Recovery Needs
Considering Disaster Scenarios
Assessing Backup Needs
Acquiring Backup Media and Technologies
Choosing Backup Strategies
CONCLUSION
PART 2: CYBERSECURITY
INTRODUCTION
CHAPTER ONE: CYBERSECURITY AND WHY IT’S IMPORTANT
What is Cybersecurity?
Why is Cybersecurity Important?
Cybersecurity Scenarios
Cybersecurity Terminology
History of Cyberattacks
CHAPTER TWO: CYBERATTACKS AND 10 TYPES OF CYBER HACKERS
Classification of Cybercrimes
Reasons for Cybercrimes
Types of Cyber Hackers
Common Tools Used by Hackers
Types of Cybercrime
CHAPTER THREE: RECOGNIZING AND COUNTERING A PHISHING ATTACK
What is Phishing?
Methods used for Phishing
Common Ways to Tackle Phishing Attacks
Types of Phishing and How to Protect Yourself against Them
Identifying a Phishing Email
Identifying a Spoofed Email
CHAPTER FOUR: HOW TO IDENTIFY AND REMOVE MALWARE
Types of Malware
Protecting Yourself from Malware
CHAPTER FIVE: RECOVERING FROM RANSOMWARE
Defining Ransomware
Types of Ransomware
CHAPTER SIX: HOW TO SPOT AND STOP A SOCIAL ENGINEERING ATTACK
Social Engineering Methodologies
Spotting a Social Engineering Attack
How to Avoid Falling for Social Engineering
Tips
Look out for Banking Scams
CHAPTER SEVEN: NETWORK SECURITY AND PROTECTION TECHNIQUES
Network Security
How Does the Network Security Function?
Top Five Attacks Through a Network that can Affect Your Business
Protecting your Business from a Cyber Attack
Cybersecurity through Configurations and Settings
Some Tips to Maintain Cybersecurity
CHAPTER EIGHT: WEB APPLICATION AND SMARTPHONE SECURITY
Web Application Security
How Can You Secure Web Applications?
CHAPTER NINE: 9 SECURITY TESTING METHODS
Types of Security Testing
Types of Penetration Testing
CHAPTER TEN: SKILLS REQUIRED FOR A CAREER IN CYBERSECURITY
Entry-Level Roles
Senior Level Roles
Four Popular Careers in Cybersecurity and How to Get There
Required Skillset for a Career in Cybersecurity
Technical Skills
CONCLUSION
REFERENCES
Part 1: Computer Networking
An All-in-One Beginner's Guide to
Understanding Communications Systems,
Network Security, Internet Connections,
Cybersecurity and Hacking
Introduction
This book is a concoction of several computer topics that are
relevant and popular in the modern age. Throughout this book, the
reader will explore each topic with easy-to-understand terminology
and analogies. The book starts with a descriptive and comprehensive
insight into computer networking and then branches off to cover
network security, network designing, and hacking. The delivery of
topics is specifically designed to:

Entertain the needs of the readers.

Provide valuable insights into the world of computer


networking in the modern era.

Deliver elaborative yet to-the-point knowledge.

Once the computer networking portion of this book is finished,


the reader will be greeted with the other topics in this all-in-one
guide. In the ending section, there is an informative description of
the kill-chain process in hacking. This topic is not only interesting but
also informative and refers to the methods hackers employ when
penetrating target systems and networks. So, buckle your seatbelts
and enjoy the ride.
Chapter 1: Computer
Networking Basics
In this chapter, we will explore the fundamentals and the very basic
concepts of computer networking. By doing so, we will essentially
lay a conceptual foundation for the reader. This will help increase the
digestibility of the later discussed concepts and some technical
details of computer networking.
Hence, this chapter will be primarily focused on emphasizing the
basic details of computer networking and then steadily building upon
the knowledge as you learn.
To start things off, we will go through a brief introduction of what
computer networking actually is. Then we will delve deeper into the
details solidifying the understanding of each concept that the reader
will have successfully learned.
What is Modern Computer Networking?
The word “networking” describes a connection or set of connections
between multiple objects. Similarly, “computer networking” refers to
the interconnection of two or more computers together to allow for
sharing resources. A network of computers can be established in a
variety of environments, such as homes, offices, or even in large
business organizations. Computer networking stretches even to the
international scope where computers are connected through the
Internet. A more subtle and easily observed example of computer
networking is a printer or a scanner connected (wired or wireless) to
the user's personal computer.
Since the fundamental purpose of computer networking is to
interconnect different PCs, an interesting question arises; why do we
need computer networking in the first place?
The answer to this is very simple. If a person wants to watch a
movie, a video, or even a talk show, he can do so in two ways.
By having a physical storage device that contains the
content, viewable on his computer, or simply by hopping
onto the Internet and accessing the website where he
can find the content and view it directly from there.

The latter approach involves computer networking. It


enables the viewer to connect to a remote computer
server that is the host of the website allowing the visitor
to use its resources to view his favorite content. This is
just a simple example of how computer networking
benefits an average user.

The phenomenon of the Internet is a by-product of computer


networking, and we all know what it’s like to spend a few days
without the Internet. While we have discussed how big a deal
computer networking is to a common person, it becomes even more
important and crucial for big organizations and institutes such as
hospitals, business companies, law enforcement departments, etc.
These organizations rely on computer networking to:

Efficiently establish an information channel through


which the entire organization communicates the data
being gathered and modified. Computer networking has
a huge influence on not only the professional sector but
also the business sector as well because, without a
proper networking infrastructure, the respective industry
would essentially just collapse.

Hence, to understand the importance and the very basic function


of computer networking, note that computer networking is the very
foundation of the Internet itself.
Transferring data from one place to another is the purpose of
networking. Another important thing we have to know about any
connection is how much data it can carry from one place to another.
This capacity to carry data is called bandwidth . If a connection has
a higher capacity bandwidth, it can carry more data within a specific
time slot.
The rate at which a network can transfer data is measured in bits
per second, which are abbreviated as ‘Bps.’ Bps means how many
bits a bandwidth can carry per second. In the modern age, computer
technology and networking have come a long way; this bandwidth
capacity is now measured in multiples of thousands. The different
measures of data transfer speed are:

Kilobytes - thousands of bits per second (Kbps)

Megabytes - millions of bits per second, or thousands


of Kilobytes per second (Mbps)

Gigabytes - billions of bits per second, or thousands of


Megabits per second (Gbps)

A closely related measurement you will also see in computer


networking is ‘hertz’; it is the number of cycles being carried per
second, in the same way ‘hertz’ expresses the number of cycles per
second in an alternating-current signal. Hertz is abbreviated as ‘Hz’
and is used to measure the computational speed of a processor. This
measurement is taken in multiples of thousands, and:

A thousand Hertz is known as a kilohertz (kHz)

A million Hertz is known as a Megahertz (MHz)

A billion Hertz is known as a Gigahertz (GHz)

For example, a processor running at 100 MHz means 100 million


cycles per second. Hz and bps are essentially the same
measurement but used for different elements. However, sometimes
they can be mixed up. For instance, saying that an Ethernet cable
supports a 10 MHz bandwidth instead of 10 Mbps is acceptable in
common usage.
Chapter 2: Networking Services
Explained
In this section, we will discuss several network protocols that either
rely on or make use of the TCP/IP protocol.
The protocols we will be discussing are listed below
1.
DNS
2.
DHCP
3.
HTTP
4.
FTP
5.
NNTP
6.
SMTP

There will be references to the levels at which these protocols


operate in terms of the Open Systems Interconnection, or “OSI”,
networking model. The OSI model defines most methods and
protocols through which computers connect and communicate with
each other on a network. It is an abstract visualization, but a useful
one; understanding the OSI networking model will create a strong
foundation for network designing and network solution engineering.
Chapter Six goes into a detailed treatment of the topic, but,
purely for the sake of reference between here and there, we will
merely present here a basic outline of the OSI model.
The model is divided into seven distinct and separate layers. Each
layer possesses a trait known as ‘successive dependence.’ This
means that the successively higher layers in the model depend
largely on the services and characteristics of the preceding lower
layers.
Consider a standard desktop computer system. It is composed of
several components that must work together to make the system
functional. If we divide this system into the layers of the OSI
networking model, the hardware components of this computer will
be termed as the ‘lowest layer.’ The next layer above the hardware
layer of this computer would be the Operating System and its
system drivers.
Obviously, the operating system and drivers would be useless
without the corresponding hardware. Hence, this higher layer is
depending on the preceding lower layer to perform its function
properly. This successive-hierarchy visualization continues upwards
to the final layer, where an application is displaying useful and
digestible data to the user.
The seven layers of the OSI Networking Model are:
1.
Physical Layer – The physical layer specifies the
network cable, the router, the DSU/CSU box, and the other
physical mediums involved.
2.
Data Link Layer –The data link layer of the OSI model
bridges the connection between the third layer
(network layer) and the first layer (physical layer) by
defining and implementing a protocol through which the network
layer transmits its data to the physical layer.
3.
Network Layer – The main job of the network layer is
to define the route through which the data packets will travel
from node to node. For this purpose, the transport layer masks the
characteristics of lower layers from the upper layers in the OSI
model.
4.
Transport Layer – The transport layer mediates the
movement of data between all the other layers.
5.
Session Layer – By this layer, the OSI model defines
the connection between two computers as either a client-server
connection or a peer-t0-peer connection. The term ‘session’ is used
to describe this virtual network connection between computers.
6.
Presentation Layer – The presentation layer
performs data compression/ decompression and
encryption/decryption.
7.
Application Layer – The main concern of the
application layer is to control and mediate the interaction of
the network with the Operating System and the applications installed
on this OS. It basically defines how the applications handle the
communications in which the system becomes involved when
connected to a network.

If we analyze the nature of the OSI-model layers in a network, we


see that they begin their interaction with the physical elements
within a network, i.e., the routers, network cables, etc. From there,
the layers move toward interacting with virtual features and
elements, i.e., moving toward intelligent aspects of the network.
After this, the OSI model’s focus on the virtual aspects of the
network shift towards the involvement of the computer machine
itself within the network, which is evident from the last two layers
(Presentation and Application layers).
A good grasp of this technique allows network engineers to
analyze networks in a more detailed and comprehensive manner.
Domain Name System (DNS)
The Doman Name System was developed to solve the inherent
problem of keeping track of websites' IP addresses on the Internet.
For instance, let’s say that you want to visit Google. If the server
housing Google's resources had only an IP address, then you would
have to type in http://209.85.171.100 to access it. If the
computer addresses on the Internet had the same addressing
scheme, keeping track of them would be very difficult.
This is where DNS comes in. By using this system, people can
register a name for their domain with ICANN. This registered name
will access that IP address on the Internet. Here are some of the
common domain extensions:

.edu (used by educational institutions)

.gov (used by governmental institutions)

.mil (used by military institutions)

.net (used by entities related to the Internet)

.org (used by non-profit organizations)

.xx (used by countries. The “xx” is a space-holder and


is replaced by the respective country's initials. For
instance, for America: “.us” ).

Once an entity has acquired a domain name, it may add


descriptors into the domain name. For instance, for the domain
dirbs.gov , the government entity can add pta.dirbs.gov, and it
would be acceptable.
The names of the domains are resolved to their respective IP
addresses by using DNS servers, which means ‘domain-name
servers’. These servers perform a database query against a domain
name entered by the user. The server then returns the actual
address of the domain to the user's web browser.
Dynamic Host Configuration Protocol
(DHCP)
The DHCP protocol was developed to facilitate the administrators of
a network to assign TCP/IP addresses to nodes easily. This protocol
was used in a time when administrators would resolve the address
of a node to a TCP/IP address and put it into a text file or even a
dialog box.
The services given by the DHCP protocol is essentially run by
dedicated servers known as DHCP servers. These servers control a
'scope,' which is an array of IP addresses. So, when a node goes
online on a network, it requests the DHCP server to assign it an
address. These addresses are valid for a limited period and expire
after the time limit assigned; they then become available for another
node to use. This period is known as the 'lease period,' and it can be
set by the administrators of the network.
The main use of the DHCP protocol is to support the connectivity
needs of client workstations. Using DHCP for the nodes responsible
for network services is not recommended, as any change to the
TCP/IP address will negate the connection to the network service.
Hypertext Transfer Protocol (HTTP)
The entire Internet (called the World Wide Web) is a collection of
documents created using a formatting language known as 'HTML' or
'Hypertext Markup Language.' Hypertexts on the Internet usually
consist of:

Displayed text

Graphical images

Formatting commands

Hyperlinks (clicking them redirects the user to some


other document on the Internet)

HTML documents are commonly accessed by using web browsers


such as Google, Chrome, and Safari.
The Hypertext Transfer Protocol is what controls the transfer of
data between the client and the webserver. This protocol operates at
the application layer of the OSI model. The HTTP protocol makes
use of other Internet protocols and DNS to establish a connection
between the web client and the webserver. The HTTP protocol itself
is insecure because transferring data happens with no encryption
and can be intercepted. To resolve this security issue, we now use
‘HTTP secure’, commonly known as HTTPS, and SSL (Secure Socket
Layers).
File Transfer Protocol (FTP)
The word FTP refers to both 'File Transfer Protocol' and 'File Transfer
Program,' both of which are related to each other in that the latter is
an application that makes use of the FTP protocol. However, in this
section, we will only discuss the FTP protocol.
FTP performs at the application layer in the OSI model, and it
defines the method by which file data is sent and received between
the FTP client and the FTP server. The data transferred can be text-
based or binary-based, and there is no limit on the file size FTP can
handle.
To perform a file transfer, the user must first connect to the FTP
server and log in with a valid username and password. Some sites
allow users to enter the username 'anonymous' with their e-mail
address being the password. This is known as 'Anonymous FTP.'
Network News Transfer Protocol (NNTP)
This protocol is specifically used for Usenet. Usenet is a term
referring to discussion groups on the Internet. These groups cover a
huge variety of topics, and at the moment, there over ten thousand
Usenet groups on the Internet. The conversations of a Usenet group
are sent to the Usenet servers, which are then sent to the other
international Usenet servers by echoing.
Several classifications of Usenet groups are:

Alt: Usenet group that focuses on topics on alternate


lifestyles and miscellaneous issues.

Comp: Usenet group that focuses on computer topics.

Gov: Usenet group that focuses on discussions about


governments.
Rec: focus on recreational topics.

Sci: focus on discussions about science.

Usenet groups are not all public. Those groups that are public get
the news echoed by other Usenet servers, but the private ones are
generally hosted by some organization or institution. Private Usenet
groups require users to authenticate themselves with proper
usernames and passwords.
The phenomenon of Usenet is made possible only by the NNTP
protocol. This protocol establishes a connection between the Usenet
server and the Usenet reader. The protocol also handles message
formatting. This makes it possible for the messages to be text-based
or carry binary attachments. Messages with binary attachments are
encoded through MIME, or Multipurpose Internet Message Encoding
(the same encoder used for e-mail attachments).
Simple Mail Transfer Protocol (SMTP)
The Simple Mail Transfer Protocol handles the sending and receiving
of e-mails from one e-mail server to another. The SMTP protocol is
simply a way to communicate with the sending and receiving
systems of e-mail servers.
The SMTP protocol comes into play when the system sending the
e-mail message connects to the receiving system through port 25.
Once the connection between the two systems has been established,
the sender then transmits a 'HELO ’ command along with its
respective address towards the receiving system. Once this
command has been acknowledged, and the receiver responds with
its own address, then communication is initiated. The sender can
then issue a command indicating it wants to send a message, by
specifying the intended recipient of the message. Once the receiving
system gets this request, it looks for the recipient. If the recipient is
known to the system, then the request is acknowledged, and the
sending system then forwards the message, along with any
attachments, to the recipient. Once the receiving system has
acknowledged that the entire message has been received, it
terminates the connection.
Keeping the Networks Safe with Firewalls
Most people reading this book would have come across the Windows
firewall prompt at least once. This firewall application running on
your machine is what keeps the network security policies upheld.
Firewalls are hardware devices that protect a network by enforcing
the network’s security policies. In most networks, a firewall is
installed into the router itself, leveraging its micro-processing chip
and built-in memory. This is true with networks designed and
installed in small offices or similar scenarios. However, for large
networks, the networking equipment includes dedicated hardware
running the firewall. This hardware can be a single unit or multiple
pieces.
Normally, a separate computer running the firewall software is
designated for the network. Otherwise, there can be a firewall
device with a computer chip within it. Generally, a firewall acts as an
outpost stationed between a LAN and the Internet. Regarding the
firewalls available for use, there are mainly two types:
1.
Network-Based Firewall: This firewall operates at the
third layer, also known as the data-link layer, of the OSI
networking model. The security technique used by a
network-based firewall is primarily ‘packet filtering.’ Using
this technique, the firewall is programmed with a defined set
of rules. Whenever data packets travel between the two
networks, the firewall analyzes and compares this packet
against the rules and then decides whether the packet
should be allowed to arrive or depart from the network or
not. The permission or denial of passage according to the
packet-filtering rules for the data packets is usually based on
their destination address, source address, or the TCP/IP
port.
2.
Application Based Firewall: This firewall serves the role
of a proxy. The word ‘proxy’ in this context means that the
firewall represents the user’s interactive session with the
server of which services are requested. An application-based
firewall allows no data traffic to pass through the two
networks directly. Instead, the communication between the
two networks will be handled on one side by the firewall, as
a proxy. This is why an application-based firewall is also
known as a ‘proxy firewall.’ The technique used by a proxy
firewall is ‘NAT,’ also known as ‘Network Address Translation.’
In this technique, the main idea is to conceal the network
addresses of the internal network so it is not directly visible
to the external network. In an application-based model, the
firewall is responsible for the transmission of data to the
network addresses for which the connections are
established.
Chapter 3: Getting into the
Networking Hardware
Fundamentals of Computer
Relationships
The term ‘computer relationship’ refers to how a computer interacts
with another computer connected on a network. There are generally
two types of computer relationship.

1.
Peer to Peer
2.
Client/server

These two types of relationships essentially define the logical


structure of a network. To understand them better, make an analogy
to different management philosophies.
A peer-to-peer, or ‘P2P’, network is much like a decentralized
management philosophy where decisions are made locally, and
resources are managed according to what users need to do first.
A Client/server network is almost like a company that uses
centralized management where decisions are made in a central
location within a group of a few people. There exist circumstances
where P2P and client/server relationships are both appropriate, and
many networks incorporate both in their setup.
Both P2P and client/server networks need certain layers in the
OSI model to be common, along with a physical network connection
between the communicating computers using the same network
protocols. In this respect, the two types of computer relationships
are virtually the same in a network. However, the major difference
arises from whether you spread the shared network resources
around all the computers on the network or use the centralized
network servers.
Core Hardware Elements of a Network
To reinforce and solidify the foundation of the concepts we are
exploring in this discussion, you must learn more about the physical
hardware components that make up a computer network. Until now,
we have focused more on how a network works and interacts on the
virtual level rather than the physical level. However, by
understanding the behavior of the network in its virtual realm, we
are now set up to understand the hardware.
Understanding the physical aspect of computer networks provides
us with adequate knowledge by which we can not only set up a
computer network properly but also troubleshoot and maintain it.
In this section we will be discussing the following hardware, each
a core component of the network:
1.
Servers
2.
Hubs
3.
Routers
4.
Switches
5.
Cabling and cable plants
6.
Workstation hardware

In the ending sections of this chapter, we will discuss these


hardware components within the context of directing network traffic.
However, we will only focus on understanding these components and
their purposes.
Servers
A server is a computer assigned a very important and demanding
job in computer networking. A server computer is essentially the
component that handles all the networking requests and other
functions of the computers on the network. Based on the network
functions, a server can be classified into these different categories.

File and Print Servers: This category includes those


servers that primarily provide file-sharing services to
other computers, and handle requests for network-based
printers.

Application Servers: The servers that essentially


provide specific network application services to programs
and software fall under this category. For example, a
server running a database can provide (on request)
access to the database to a distributed application
connected to this server.

E-mail Servers: The servers primarily designed to


store e-mails and provide interconnection services to the
corresponding clients are categorized as ‘E-mail Servers.’

Networking Servers : This category of servers


mainly offers a variety of services related to networking.
For example, a DHCP server programmed to assign
TCP/IP addresses is categorized as a networking server.
Similarly, a server handling the routing of data packets
through different networks (routing server), is providing a
network service and is hence categorized as a network
server. Other such services performed by network servers
include encryption, decryption, security access, and VPN
access services.

Internet Servers: The servers that provide access to


common Internet services such as the World Wide Web,
Usenet News (NNTP), or even e-mail services based on
the Internet, are known as Internet servers.

Remote Access Servers: Such types of servers


generally serve as a gateway or access point for users
that want to access a network remotely.

An operating system installed on a server is very specific and


tailored to enable the performance of the tasks we have just
mentioned. For instance, if a server is using an operating system
distributed by Microsoft, then it will most likely be using the
Windows Server edition. Such operating systems come pre-loaded
with networking software. Similarly, a server can also run Linux or
UNIX distributions designed for networking. Depending on the
operating system installed, a server can either perform the
networking functions or be specific to only a few. But it’s not always
necessary for a server to comply with every network function;
depending on its purpose, a server can only be tasked with a few
networking operations, and that will be adequate. In this way, users
can deploy multiple servers, each optimized for certain network
operations.
Here are a few features that qualify a server for a different class
of computers as compared to domestic client computers.

Server computers natively incorporate the element of


redundancy inside their hardware architecture. This
means that even if something within the hardware breaks
or fails, the server will still keep running normally. To
achieve this redundancy, the internals of a server
computer are lined with multiple power supplies and
cooling fans, shielding the computer from malfunctioning
due to the failure of any corresponding hardware
component.
The subsystems of a server computer are also
specifically designed to optimize data flow. If we analyze
a typical server, we will see that the design scheme for
the disk, memory, and network subsystems are different
than those used for a desktop computer. This design
supports a high-performance boost to not only the
subsystems mentioned above but also to optimize the
flow of data. So, data moving to and from different points
such as the server, the client, and the network is
comparatively more optimized and faster.

Since servers hold a crucial position within a computer


network, special care is taken for the “health” of the
computer. Server computers feature specially designed
surveillance parameters on both software and hardware
levels; the machine itself can keep an eye out for any
alarming deterioration in its health and essentially warn
the users of imminent failure before it happens. For
instance, one of the common monitoring items installed
in servers is temperature monitors; if the temperature of
the server’s surroundings rises too much, it gives off a
warning detailing the problem. In this way, the people
maintaining the server learn of a problem before it
causes hardware failure and can prioritize resolving this
issue.

Hubs, Switches, and Routers


The purpose of hardware components such as hubs, switches, and
routers is purely to facilitate the establishment and proper
functioning of a network. Hence, these three components are ‘pure’
networking hardware and categorized under the class of
‘internetworking devices.’ These components are essentially the
foundation of any basic or complex network, as the entire cabling
system in a network is connected to these devices. In terms of the
OSI networking model, the data flow from these devices can be
defined at the physical, data link, or even the network layer.
Let’s talk about hubs first. Hubs are also commonly called
‘concentrators.’ The core purpose of a hub provides a point of central
connection for the network cables. Hubs can support multiple
network cables; the number of cables is a matter of the hub’s size. A
typical small hub can connect network cables coming from two
computers while a large hub can support over sixty computers
(depending on the specification). The most popular hub is neither
‘small’ nor ‘large’, but a ‘medium-sized’ hub that generally supports
up to 24 client computers.
In a hub, there is a logical wire through which the connected
client computers communicate with the network. The capability of
this logical wire is known as the ‘collision domain.’ Sometimes,
interference results when too many client computers are connected
to a single hub and attempt to communicate with the network.
We will now discuss switches . The circuital infrastructure (how
the wires have been arranged) of a switch is strikingly similar to that
of a hub. A switch also looks similar to a hub. Although the
conceptual foundation of the working of hubs and switches are also
very similar, the similarity ends there. Unlike the hub, each
connection port on a switch has its own collision domain. In this
way, each network connection on a switch can freely communicate
with the network through a separate collision domain rather than a
single one.
Each network connection on a switch is made to be a private
connection. Nowadays, most computer networks implement switches
instead of hubs, mainly because they are a cheaper solution.
However, switches also have numerous benefits over hubs (we’ll
leave this discussion for some other time since the main focus is to
learn how they work). Good network solutions will use one or more
backbone switches, which connect to the main switch(es). These
backbone switches generally operate at a speed much higher than
the main switch(es). However, even if hubs are used in a network
solution, there will still be the use of a backbone switch (which is
simply an individual switch connected to the hub). The figure below
shows a typical arrangement of switches and hubs in a network.

Last but not least, the router . By now, we have given adequate
attention to the details of how a router works and functions. We now
know that the primary job of a router in a computer network is to
route the data packets effectively through one network on to the
next. A router can also be a bridge that offers a path of flow for the
data packets between two connected networks. These two networks
establish a connection to the router by using their respective types
of wiring and connection.
Let’s understand this better through an example. Consider a
router in a network that establishes a connection between a 10Base-
T network and an ISDN telephone line. In this scenario, the router is
dealing with two network connections, one from/to the 10Base-T
network and the other from/to the ISDN telephone line. The job of
the router will be to create a proper route for the data packets to
travel between these two network connections.
Besides these defined network connections, the router can also
have another terminal connection. The purpose of this secondary
connection would be to program and maintain the router itself.

Cabling and Cable Plants


When setting up a computer network, you’ll find there is a huge
variety of network cables available to use. But on this level, we
should only concern ourselves with the main network cables
commonly used.
The most common network cable used while setting up a Local
Area Network connection is the Category 5 twisted-pair cables.
These cables are also called ‘Cat-5’ cables. The cable has four
twisted pairs; this means it has eight wire contact points. Due to this
design, the cable can carry the network signal to each of these eight
wire points. The Category 5 twisted-pair network cable is primarily
used with Base-T networks such as the 100Base-T network and the
1000Base-T Ethernet network.
A lower-grade version of this same network cable is also available,
and it is termed ‘the Category 3 twisted-pair cable’. The overall
design and structure of the network cable are similar to that of the
higher-end Cat-5 cable; the main difference is the number of pairs it
supports. While the Cat-5 cable has four twisted pairs of wires, the
Cat-3 cable has two twisted pairs of wires, i.e., half of the Cat-5.
Hence, the Cat-3 twisted-pair network cable is generally used to
support older network connections such as the 10Base-T network
and uses connectors comparatively smaller than the Cat-5
connectors.
Similarly, there are newer and improved versions of the Category
5 twisted-pair cables available now. There is the improved Cat-5E
cable and the new Cat-6 standard network cable. There isn’t much
difference between the Cat-5 and the newer versions; the Cat-5E
and Cat-6 are essentially the same as Cat-5 cables. The only
difference is these newer twisted-pair network cables support higher
network specifications, making them ideal for installation in networks
running at higher speeds. Since there’s little physical difference, the
newer versions are backward compatible with the older network
types. If you used Cat-5 cable for a 100Base-T network, then you
can also the Cat-5E and Cat-6 network cables for the same network
connections.
Another type of network cable popular in the past but is not so
common for newer network installations nowadays is the coaxial
cable . This cable can be found installed in old network installations
in old buildings.
Let’s talk about the structure of the coaxial cable. In this network
cable, there is a central core, usually no more than a thick wire,
made up of copper and known as the ‘conductor.’ This core is
surrounded by a plastic material. This plastic cover over the
conductor is wrapped with a ‘shield’ which is basically braided metal.
Over this shield, there is an outer covering made out of plastic. Back
in the day, you might have seen a thick cable that would connect
your television set to the TV cable station’s network. This cable was
also a type of coaxial cable, and this same cable was also used for
cable modems as well in the olden days. The particular coaxial cable
used in networks such as ‘Thin Ethernet’ or 10Base-2 was the RG-58
coaxial cable.
Similarly, for networks such as ARCnet, another (but similar)
coaxial cable would be used, which was the RG-56 coaxial cable. The
coaxial cable to be used would depend on the specification of the
network in which it was being installed. A network’s specifications
would define the support for a certain type of coaxial cable. This
imposed a limitation on compatibility and universal usability of the
coaxial cable. This meant that different coaxial cables could not be
mixed when setting up a network, and it was very important to use
the specified cable for the network being built.
Let’s move on to discussing cable plants . A ‘Cable Plant’ is a
term used to describe the complete installation of the network cable
in the designated building. When we talk about a network’s cable
plant, we are referring to the network cables, the connectors, the
wall plates, the patch panels, and the networking equipment related
to networking cables installed in the building. On the surface, the
network cable installation and cable management might seem like a
simple to-do task, but quite the opposite. Cable plants are very
difficult and complex; due to this, it is always recommended to
choose a vendor that is adept and experienced in cable plant
installation.
Workstation Hardware
In a professional setting, the computers being used by the people
connected on a network are network workstations. Generally, the
workstations are the network client PCs on a network. However,
workstations can also be modified to function as network servers. A
workstation termed a ‘network client’ usually has these features.
1.
It is an Intel-based computer
2.
It is usually running a Microsoft Windows-based operating
system
3.
The install Operating System includes NIC and network
client software (this enables the network client workstation
to communicate with the network)

In the features mentioned above, we said that a network client


workstation usually runs a version of Windows as the main OS. But
the keyword here is ‘usually.’ There are cases where network
workstations use an operating system other than Windows. Such
computers have the hardware and software to allow the workstation
to participate on the network even if the operating system is
different. For example, Apple’s Macintosh and Unix-based computers
can also be used as network workstations.
Utilizing the Network Traffic and Knowing
the Network Hardware
In the earlier sections of this chapter, we discussed the hardware
components involved in every network setup. We also learned about
the purpose of each component in a network. In this section, we will
go a step further and discuss the actual functionality of the hardware
in directing network traffic.
In any network design, the very fundamental and basic approach
to test its capability is to see how effectively the network can direct
the network traffic from node to node. This test determines if the
designed network is good enough or if it is underperforming. To
perform this test, the first requirement is to put the network
hardware components in a configuration that allows the network to
send signals through the connected hardware components
efficiently. This is done while keeping the type and connectivity pre-
requisites of the network under consideration.
In this section, we will discuss the following basic networking
hardware components.

Repeaters : These devices lengthen the traveling


distance of the network traffic in the corresponding
network type.

Hubs or Concentrators : These devices are used


when setting up a network with a star topology. Hubs
connect the different nodes.

Bridges : These devices are the same as repeaters but


more intelligent. Bridges direct network traffic to different
segments. This is done so the segmentation is only
performed if the traffic’s destination is actually the other
segment itself.

Routers : These devices simply route the network


traffic effectively and efficiently.
Switches : These devices serve as a quick and
efficient point-to-point connection for the other
connected network hardware.

Repeaters
A hardware device used in a network to lengthen the range of the
network is called a repeater. Repeaters extend the network’s reach
by boosting the signals. Whenever a network is installed, it is a given
there will be places where the network signal is weak. The repeater
will take this network’s side where the signal is weak, boost this
weak signal, and then send it out through the other side. Repeaters
are most commonly used for networks with a limited range, such as
thin Ethernet networks. Hence you will see the use of repeaters in
such network setups. However, this does not mean that using
repeaters is limited.
But repeaters can be used for virtually any network connection.
For example, consider a typical 100Base-T network installed using
Cat-5 network cables. The maximum length of this cable is one
hundred meters, meaning that’s the range of the network. By using
a repeater in this network setup, we can double the range of the
network signal to two hundred meters.
In terms of the OSI networking model, operating repeaters is a
process in the first layer, i.e., the physical layer. A repeater device is
not intelligent. This means that a repeater does not have the
hardware capability to understand the signals it is transmitting. Since
the only job of the repeater is to perform a network signal
amplification it needs to be used carefully. A repeater will not discern
between a network signal and an interference signal (usually called
“noise”). This is why they should be used only after careful
assessment of the network. Otherwise, a repeater might amplify the
noise in the network.
Repeaters cannot be used to connect different network mediums.
For instance, if a repeater is being used with a 10Base-2 Thin
Ethernet network, then it can be connected only with another
10Base-2 Thin Ethernet network.
If we critically analyze the intelligence of a repeater, then we can
find it does possess a slight hint of intelligent functionality;
nevertheless, this is not enough to perform complex operations such
as discerning between the signal types being transmitted. The extent
of the intelligent functionality of a repeater device is the ability to
separate a connection from the others when the device detects any
problem or anomaly in the connected network. For instance, let’s
consider that we are dealing with two segments of a thin ethernet
network. These two segments are connected by a repeater device. If
these two segments become broken, then instead of shutting down
the entire network, the repeater will still allow the functional
segment to keep on working. In this way, the users of the network
can access the resources on the network segment still functional but
won’t have access to the resources on the broken segment.
However, one thing to note here is that even if the repeater does
separate the working segment from the broken segment, if the main
resources such as the servers are on the broken segment, it will be
useless. This is because even if the workstations were on the
functional segment, they won’t be able to access the main
networking resources of the server.
The figure shown below depicts a typical repeater setup
extending the length of the network.

Hubs (Concentrators)
Hubs are known by these terms:

Intelligent LAN concentrators

Concentrators

This hardware device is used in a network setup to connect the


nodes to the backbones. If we discuss the topology of the network
where hubs are being used, we can see that the nodes are
connected to the hub in a star-like shape. This means that the
network cables connected to the hub fan out to each corresponding
node. This arrangement of the cables remains the same, whether a
hub is being used in a star topology or a ring topology network. In
smaller networks, there is no need for backbone switches, and
hence, there is no need for a hub. However, hubs can be used in
simple networks and large complex networks.
Regarding the compatibility of hubs with the network media
types, fortunately, they offer seamless compatibility. This means that
a hub can be used with any network without worrying about
compatibility issues. If we go further and look at the top shelf
higher-end models of hubs, we will see they feature a replaceable
module through which a single hub can support multiple network
media types. For example, a high-end hub model can support both
Ethernet and Token-ring network modules.
Hubs come in many sizes. Some hubs offer support for up to 2
workstations while others for more than a hundred workstations. It
all depends on the needs of the network.
Here are a few important characteristics of a hub.

Just as how a sound from one source echoes in the


farther depths of a cave, a hub echoes the data from
each of its ports to all the other corresponding ports.
Even though the wired arrangement of hubs is star-
styled, their logical functioning is more akin to that of bus
topology. However, due to the echoing of the data, no
logic or filtering process can stop data packet collisions
originating from the connected nodes.

A distinguishing feature of hubs is that they can


effectively cut off a misbehaving node from the other
properly functioning nodes by shutting it off. This process
is also known as ‘partitioning.’ The scenarios in which a
hub partitions a node include detection of a network-
cable short circuit, an excessive influx of data packets
from a hub port flooding the network, and detection of a
serious problem relating to the hub port. Effective
partitioning of a malfunctioning node prevents the same
effects from negatively affecting the other nodes
functioning normally.

As technology is developing, the mechanics and infrastructure of


a hub device are also becoming increasingly sophisticated. Newer
versions and models of hubs include pretty neat and advanced
features out of the box.

Hubs now include a built-in management feature; by


using network management protocols such as SNMP, a
hub can be managed centrally, over the network.

There are hubs now available that can automatically


detect the connection speed of the network and run each
node at that speed. For instance, a hub detecting a
10Base-T network will run each node at 10 Mbps.
Similarly, for a 100Base-T network, the hub will run each
node at 100 Mbps.

Hubs are using uplinks with faster speeds to connect to


a backbone. The average speed of the uplink is usually
ten times that of the basic speed of the hub. For
instance, a hub with a basic speed of 100 Mbps will have
an uplink with a speed of 1 Gbps.
Hubs now come with a built-in bridging and routing
feature. Previously, networks using hubs would require
separate dedicated hardware devices to perform bridging
and routing functions. With this function built into the
hubs, using such devices has become obsolete.

Hubs feature a built-in switching function. With this


feature, the hub can switch the nodes instead of sharing
them.

When choosing a suitable hub for your network, the first thing to
bear in mind is the specifications of your network. By knowing how
many nodes are supposed to be connected to the hub, the required
bandwidth for each node, and the network backbone type being
used with the hub, we can choose the right hub best suited for the
network. In terms of the network backbones usually installed with a
hub, they are generally anything between shared 10 Mbps thin
ethernet networks to 100 Mbps 100Base-Tx and high-speed
networks. Whatever the case, the choosing of a backbone
technology primarily depends on the bandwidth requirement of the
network and other criteria that need to be fulfilled for the network
designed.
Technically, in a network where hubs are being used, the hubs act
as ‘collision domains’, where collisions usually occur. So, if we use
multiple hubs in a single network set up, then the area of the
collision domain in the network will inevitably become larger. The
only exception is when the hubs are individually connected to a
switch. By using switches, we can restrict the collision domains of
each hub to itself. The figure shown below depicts a network using
several hubs.
Switches
Just as the name implies, a switch is a hardware component of a
network that can rapidly switch connections from port to port. A
switch creates these connections in a network by switching
dynamically among the several network ports available. Consider a
train yard, where several trains are coming in from certain tracks and
leaving through other tracks. The train yard has a designated person
tasked to manage the movement and routes of the train. This
person is called the ‘yard manager.’ To make sure that the trains
arrive at their destination, the yard manager essentially switches the
tracks according to their specified route. In this analogy, the ‘switch’
is the ‘yard manager.’ Instead of directing trains by switching the
tracks, a switch directs the data packets through the network by
ethernet cabling. In this way, a data packet is effectively routed to
its destination.
We know that a switch establishes an individualized connection
between any two given ports of the network; it makes sense that
the entire ports converging into the switch device don’t share a
common collision domain. This is why a switch device plays a role
somewhat similar to that of a super bridge.
Due to the nature of switches, they are mostly used to bridge the
connection between hubs and relatively faster backbones in a
network. For instance, consider a network using ten hubs. Each hub
supports up to 24 connection nodes for workstations. With ten hubs,
we will have about 240 connection nodes meaning there will be 240
workstations in total connected to the hubs. If these hubs are
connected to the same backbone in the network, then it would mean
that the collision domain of all the hubs would be the same. When
the 240 workstations are sharing the same collision domain, then
network performance will deteriorate. Here, we can fix this problem
by using a switch with 12 ports. Earlier, each port of the switch had
its own separate collision domain. Here, all ten of the hubs
connected to the 12-port switch will have domains, thereby
maintaining the network quality.
A 100Base-T network connection is commonly used with
workstations. A networking expert would recommend a 1000Base-T
or faster connection as the backbone network. By using a switch and
a fast backbone, the workstations connected to the network through
the nodes can operate at 100 Mbps.
Switches impact the speed and performance of the network so
well that using a switch becomes a no-brainer. Another aspect that
makes switches so desirable in networks is that they are very
inexpensive. For a typical local area network, using switches instead
of hubs makes more sense because hubs are expensive network
components. In comparison, a switch is inexpensive, has much to
offer to the network, and is comparatively easier and simple to
install. Nowadays, you might find difficulty finding an available
bridge on the market as the supply and demand of switches is
overwhelming.
The reason to know and understand hubs is that although they
are not used now, you might still come across older installations
using hubs. In newer network installations, it is guaranteed that you
will exclusively deal with switches instead. To reiterate the main
concept of these hubs and switches, hubs create a bigger packet
collision domain, while switches have smaller, separated collision
domains.
Bridges
A bridge is a hardware device that performs the same function as a
repeater but is more intelligent. Bridges work by joining two network
segments, just like repeaters; the main difference is that when a
bridge must pass data traffic from a segment to another segment, it
does so intelligently. This means that a bridge will only pass the data
traffic to the other segment if this traffic’s destination is the target
segment; otherwise, it will not. Another distinguishing feature of a
bridge is that they also divide the network into smaller segments.
Certain bridges can be connected to two network segments. For
instance, such a bridge can span from coaxial Thin Ethernet to a
twisted-pair Token Ring.
We talked about the layer at which repeaters operate at (which
was the physical layer of the OSI model). One would assume that
since the function and purpose of the bridges is virtually the same as
repeaters, they would also operate at the first layer of the OSI
networking model. However, that’s not the case; instead, the bridges
operate at a layer that is one level higher, i.e., at the second layer,
also known as the data-link layer in the OSI networking model. This
is because bridges connect the network segments and then pass the
data traffic from segment to the other segment ‘intelligently.’ To do
this, the bridge analyzes each encountered data packet’s MAC, or
Media Access Control address. This analysis of the MAC address
helps the bridge determine whether it should forward the data
packet onto the other network or not. A bridge device can store the
parts of the network’s address data. This can be done in either of
two ways.
1.
The user programs a static routing table that contains the
address information and data.
2.
The user implements a dynamic learning system that
learns in a tree pattern by automatically identifying and
discovering the network’s addresses.

Bridges shouldn’t be used carelessly. Here are scenarios where


using bridges in the network is recommended.

If you are dealing with a small-scale network, then


bridges can be used.

If the network is using a repeater, then a bridge can be


installed in place of the repeater.

If the network you are dealing with seems to benefit


when the network traffic is not transferred unnecessarily
between the different segments of a network, then a
bridge should be used.

Routers
Continuing the chain of intelligent iterations of the other hardware
components of a network, a router is basically a bridge, but even
more intelligent, just as a bridge is an intelligent version of a
repeater. Just as bridges operate at one layer higher (at the data-link
layer) in the OSI networking model than repeaters, routers operate
at the third layer of the OSI networking model, also known as the
network layer. Routers are more efficient and far better than bridges
for transmitting data packets to their respective destinations.
Since the operation of the router is at the third layer of the OSI
networking model, the only requirement for the upper layers of the
OSI model to establish a connection with the router is that of using
the same protocols. If the router is configured and designed
specifically for protocol translation, then it can translate any protocol
from the first three layers (physical, datalink and network layers) to
any other protocol also a part of these three layers. A router can
also connect two networks that have no similarity to each other
(while connecting similar networks is a given). Generally, routers are
best suited and commonly used for Wide Area Networks (WAN) as
they can effectively create the links required for this network to be
established.
If we analyze the characteristics of the router which allow it to
effectively connect two similar or dissimilar networks, we conclude
that a router essentially serves the purpose of a node. Routers
feature their very own network address, which solidifies their
function as a node even more. A router receives data packets from
other nodes. After receiving the packets, the router analyzes and
examines the contents of the data packets: only after this
assessment does the router send the data packet to its destination.
This procedure needs to be performed almost instantaneously to
avoid delay and lag in data traffic. To ensure that the router swiftly
and accurately performs this job, they are designed with a
microprocessor inside them to handle the computational and logical
needs of the task. Usually, this processor is a variant of the RISC or
Reduced Instruction Set Computer type chip. Besides a
microprocessor, routers also have built-in memory to help with
routing function. Since routers are more intelligent than bridges and
they have more computational resources; they can figure out the
shortest route (if available) towards any data packet’s destination
and use it.
Besides this, routers can also perform certain tasks that facilitate
the bandwidth maximization of a network. Also, a router can
logically and dynamically adapt to the traffic problems detected in a
network.
Let’s talk about the importance of routers in a network. It
wouldn’t be an exaggeration to say that routers form the backbone
of the entire Internet. For instance, consider the TRACERT
command. When you use this command to trace a route from two
points, a node to a destination, we can see there are multiple ‘hops’
shown by the terminal before it can show the destination. These
‘hops’ are routers that are forwarding the data packet until it reaches
its destination.

Routers are not pre-configured. To perform their tasks and


functions properly, they need to be programmed. For instance, a
standard router configuration may include the assignment of
network addresses to each of its ports and the configuration of the
protocol settings. The programming of routers is usually done in
either of these two ways.
1.
Usually, there is a port known as the ‘RS-232C’ port. By
using terminal emulation software, we can connect a
computer or a terminal using this port. Once connected, it
becomes possible to program the router in text mode.
2.
Besides programming a router directly from its RS-232C
port, routers can also be programmed by using network-
based software that comes with it. Usually, this software
uses either a graphical tool or a simple web interface.

Both of these two methods are supported by the majority of the


routers available nowadays. However, there is no recommended
method. It all depends on aspects such as your security needs and
the specific model of the router you are using. When using routers,
one should be careful, as the network-based programming method
for a router can be exploited by hackers. This would allow
unauthorized users to change the configuration of the router.
Gateways
A gateway is an application-specific interface. The main job of a
gateway is to link all layers of the OSI networking model whenever
they are detected to be dissimilar. This dissimilarity can be in any
single layer or all layers and the gateway will still perform its
function. To understand this better, let’s see an example. Let’s say
we have established networks by using the OSI networking model,
but we want to connect to a network using Systems Network
Architecture, also known as SNA, by IBM. These two networks are
not similar, so to connect them, we will use a gateway to do so.
Gateways also can translate Ethernet to Token Ring. However, there
are simpler network solutions if you need a network translation such
as this one. Since the translation load on gateways is considerably
larger than other solutions, gateways perform relatively slower.
Nowadays, using gateways in networking is primarily to handle e-
mails. For example, two of the most common e-mail protocols
handled by gateways are:

POP3

SMTP

Generally, the majority of the e-mail systems that need to connect


with systems on a different network will either use a computer set
up as a gateway or use the e-mail server to perform the gateway
tasks.
The Core Fundamentals of Cable Topologies
Before we move on to the cable topologies, let’s refresh the concept
of a ‘Topology.’ The word ‘Topology’ means ‘shape’; similarly, the
word ‘Network Topology’ essentially refers to a network’s shape (the
wired arrangement of the network’s nodes).

Different topologies have different costs, advantages,


disadvantages, performance, stability, and reliability. In this section,
we will discuss the three main cable topologies commonly used
today.
1.
Bus Topology
2.
Star Topology
3.
Ring Topology

Bus Topology
Bus topology is also commonly called ‘Common bus multipoint
topology.’ A bus topology is basically a network that uses a single
end-to-end network cable. On this network cable, some devices are
connected at different locations on the cable, and these connections
are termed ‘nodes.’ A simple illustration of a bus topology network is
shown below:

However, there is no universal bus topology in use. Instead, bus


topology comes in many types, each featuring its own specifications.
These specifications are based on these factors:

The number of nodes that can be handled by a single


segment

By using a repeater, what is the resulting number of


segments that can be used

The maximum limit of physical proximity for the nodes

The network segment’s length

The coaxial cable required


How the segment’s terminal ends are supposed to be
terminated

Generally, a bus topology network implements coaxial cable. In


such a type of network, the two open terminal ends of the network
need to be addressed; otherwise, the network would not be
functional. A special type of cable terminator is used on each
terminal end of the network.
There are several different bus topology, and each group uses a
different type of connector to conjoin the different segments of the
network cable. For instance, a Thin Ethernet 10Base-2 bus topology
network uses a connector known as a ‘BNC connector.’ This
connector is also known as the ‘BNC-T connector’ because it
resembles a ‘T’ shape. This connector allows a node (computer or a
server) to be connected to the network segment while allowing the
network to continue its bus. There are also different types of BNC
connectors:
1.
BNC-T connector
2.
BNC barrel connector
3.
RG-58 cable with male BNC connector

In terms of budget, the bus topology network is the least


expensive option of the three. This is because a bus topology
network uses comparatively less network cable regarding the star
and ring topology. Hence, a bus topology network uses less
networking materials and needs less installation labor. However,
while the bus topology has advantages over the other two topologies
with cost, it also has significant drawbacks.
A network with a bus topology is more sensitive and prone to
failure because it comprises multiple subscales, which essentially
create a segment. These subscales must be connected to the nodes.
Now, this level of intricacy introduces a new problem, and that is:
Another Random Scribd Document
with Unrelated Content
Mientras hacía Aracil la lista de los platos, entró una florista con una
cesta de claveles rojos, y ofreció sus flores a María.
—¿Quiere usted?
—Bueno.
María tomó dos claveles grandes y rojos, y como había visto a todas
las pendonas que danzaban por allí con flores en la cabeza, se las
puso ella también, para parecer una de tantas. Luego se asomó a la
ventana; Aracil hizo lo mismo, y pasó la mano por la cintura de su
hija. Estaban así, como protegidos el uno con el otro, cuando el
mozo llamó:
—¡Eh, señorito, que está la cena!
María se volvió, y la expresión del camarero le hizo ruborizarse.
¡Qué opinión tendría de ella aquel hombre! Pero, en fin, esto era
precisamente lo que se deseaba, que los tomaran por enamorados.
Se sentaron a la mesa; ninguno de los dos sentía el menor apetito, y
como Aracil pensaba que cualquier cosa podría servir de indicio para
descubrirles, fué cogiendo la comida y tirándola por la ventana. No
hicieron mas que beber agua y tomar café con coñac. Cuando
terminó la cena el camarero se retiró, y María cerró la puerta. Ya
solos, Aracil comenzó a leer un periódico; pero se excitaba de tal
manera, que se ponía a temblar, y le castañeteaban los dientes.
—¿Para qué lees?—le dijo María—; hay que tener serenidad. Vamos
a ver el baile.
Se oía algazara de palmas y de gritos, que llegaba del patio. Se
asomaron a la ventana. Enfrente, en un cuarto galería, a la vista del
público, una mujer y un hombre bailaron un zapateado al son de la
guitarra. Debían de ser profesionales, a juzgar por la perfección con
que se zarandeaban.
—¡Olé! ¡Venga de ahí!—gritaban unos cuantos sietemesinos, golfos y
galafates, que formaban la reunión.
Un bárbaro, con una voz monótona de borracho, empezó a cantar,
de un modo estúpido, una canción de cementerios y de agonías,
cuando otro, imperiosamente, le dijo:
—¡Calla, imbécil!
Después, a ruego de la gente, el que tocaba la guitarra, un hombre
pequeño, ya viejo, se dispuso a cantar; los señoritos y chulapones
formaron un corro, y el cantador comenzó, con una voz muy baja,
de recitado, y como si tuviera prisa, el tango del Espartero:

La muerte del Espartero,


en Sevilla causó espanto;
desde Madrid lo trajeron,
desde Madrid lo trajeron
hasta el mismo camposanto.

Luego, la voz del cantador subió en el aire, como una flecha, hasta
llegar a un tono agudísimo, y en este tono cantó el entierro del
torero, las coronas que llevaba, las dedicatorias de los compañeros,
la tristeza del pueblo, y, al terminar esta parte, la guitarra animó el
final con unos cuantos acordes, como para no dejarse entristecer
por la muerte del héroe.
Después, el cantador terminó el tango en tono de salmodia, con
estas palabras:
Murió por su valentía
aquel valiente torero,
llamado Manuel García
y apodado el Espartero.

En el circo madrileño
toreó con mala suerte;
la afición, que no dormía,
le llorará eternamente.

Y el cantador dió fin con un rasguear furioso de la guitarra, y la


gente del cuarto y la del patio aplaudió con entusiasmo. Pidieron que
repitiese la misma canción, y volvió el hombre a cantarla de nuevo.
Aracil y María escuchaban absortos. En medio de la noche, aquel
canto de fiereza, de abatimiento, de brutalidad y de dolor, producía
una impresión honda y angustiosa.
—¡Qué país más terrible el nuestro!—murmuró Aracil, pensativo.
—Sí, es verdad—dijo María.
—Esa canción, ese baile, las voces, la música, todo chorrea violencia
y sangre... Y eso es España, y eso es nuestra grandeza—añadió el
doctor.
Padre e hija tuvieron que dominarse con un esfuerzo sobre sí
mismos, para volver a sus preocupaciones. Discutieron la hora de
encaminarse a la Casa de Campo.
—Cuando esto acabe y ya no haya por aquí gente, creo que será lo
mejor—dijo María.
—Y ¿por dónde iremos?
—Por ahí; por ese puente que se llama de los Franceses.
—Pero yo creo que hay una estacada.
—La saltaremos.
—¡Qué valiente eres, María! Yo envidio tu serenidad; yo soy un
cobarde, un harapo.
—¡Ca! Déjate de eso. Cree, por lo menos durante unas horas, que
eres el mismo Cid.
Estuvieron sentados en el diván, mirando el suelo, sin decir nada; de
cuando en cuando María preguntaba: «¿Qué hora es?» Aracil sacaba
el reloj. No parecía sino que se habían paralizado las agujas; tan
lentas pasaban las horas para ellos.
Al dar las doce, el doctor suspiró:
—Todavía tenemos dos o tres horas para estar aquí. ¡Qué horror!
—Si quieres, vamos.
—¿Te parece bien?
—¿Por qué no? Anda. En marcha.
—Bueno. Vamos.
—El doctor llamó al mozo, le pagó y le dió una buena propina; tomó
otra copa de coñac, y padre e hija salieron del merendero, y, dando
la vuelta a la casa, entraron en la parte de la Florida, obscura y
desierta. A María le resonaban sin cesar en los oídos las notas del
tango que acababa de oír.
X.
BUSCANDO EL CAMINO
Hacía una magnífica noche; el cielo, estrellado, resplandecía entre el
follaje. Avanzaron los dos fugitivos a prisa, recatadamente; cruzaron
un camino hondo y llegaron a la valla que limitaba la vía del tren.
—Por aquí debe haber un paso—dijo Aracil.
—Pero en la caseta habrá un guarda. No vayamos por ahí.
Siguieron a lo largo de la estacada, que era más alta que un
hombre, buscando el sitio mejor para saltarla. Cerca del Puente de
los Franceses, la vía estaba a mayor nivel que el terreno de ambos
lados, de tal modo, que la altura de la estacada era grande por
fuera, pero, en cambio, era pequeña por dentro. La caída, al saltar el
obstáculo, no podía ser peligrosa.
Encontraron un punto en donde se levantaba un árbol al borde de la
vía, embutido entre las estacas de la empalizada.
—Este es el mejor sitio—dijo María—. Vamos. Mira a ver si anda
alguno por ahí.
—No, no hay nadie.
Aracil cruzó las dos manos fuertemente, para que sirvieran de
estribo; María puso en ellas el pie izquierdo y se agarró al árbol. Al
primer intento no pudo encaramarse; las faldas le estorbaron; pero
luego, con decisión, apoyó el pie derecho sobre las estacas y saltó al
otro lado, sin lastimarse ni desollarse las manos.
—¿Te has hecho daño?
—No. Nada. Anda tú ahora.
Aracil intentó subir a la valla, pero no pudo; se martirizaba las
manos, y, convulso y jadeante, forcejeaba, hasta que, aniquilado por
el esfuerzo, se sentó en el suelo, sollozando.
—Descansa, descansa un rato—dijo María—, y luego vuelves a
intentar.
—¿Y si viene alguno?
—No, no vendrá nadie.
Estuvieron sentados en el suelo, a los lados de la valla. De pronto se
oyó el trepidar lejano de un tren, que se fué acercando con rapidez.
—Ocúltate—dijo Aracil.
—¿En dónde?
—Junto al árbol.
Se ocultó María; Aracil se tendió en el suelo, y el tren avanzó
despacio, con un estrépito de hierro formidable. Aparecieron las
luces de la locomotora, y comenzaron a pasar vagones. De pronto,
la máquina lanzó un silbido estridente y echó una bocanada de
humo negro, llena de chispas, que saturó el aire de olor a carbón de
piedra.
—Vamos a ver ahora—dijo María, cuando se perdió de vista el tren.
—Parece mentira que sea uno tan botarate—murmuró Aracil.
—Mira. Espera un momento—y María, sentándose en el suelo y
tirando con violencia, arrancó el volante de su vestido.
—¿Qué haces?
María no respondió; hizo un nudo con las dos puntas del volante y lo
colocó en una estaca, como un estribo. Resultó demasiado bajo, y
Aracil tuvo que hacer otro nudo. Luego apoyó el pie y vió que se
sostenía; se agarró al tronco del árbol, y, con alguna dificultad, logró
saltar, no sin desollarse las manos y lastimado un pie. Al asalto, el
gabán del doctor cayó fuera de la vía.
—Vamos—dijo Aracil.
—No; hay que coger el gabán. Si lo dejamos en el suelo, pueden
averiguar por dónde nos hemos escapado.
Con ayuda del bastón recobraron el abrigo, guardaron el volante
roto y echaron a andar por la vía. Comenzaron a cruzar despacio el
Puente de los Franceses, pasando por encima del camino de la
Florida y de la carretera del Pardo. Abajo, en un merendero, se
zarandeaban unas parejas al son de un organillo. Atravesaron el río,
pasaron por delante de la casilla, iluminada, de un guardagujas y
entraron en la Casa de Campo. Nadie les salió al encuentro.
Avanzaron por la posesión real rápidamente, subieron el talud de la
trinchera por donde iba la vía, cruzaron la estacada, en la cual
faltaban varias estacas, que dejaban hueco de fácil paso, y salieron
a terreno de árboles y matas.
Marchaban los dos entre la maleza, desgarrándose las ropas, sin
querer tomar el camino. Aracil iba callado; María tarareaba, sin
querer, el tango que acababa de oír. No podía olvidar esta canción;
la obsesionaba y perseguía de una manera fastidiosa y molesta.
Perdían mucho tiempo marchando por entre los árboles. Además,
era imposible orientarse. No tuvieron más remedio que salir al
camino, y, después de andar mucho, Aracil, manifestando un
profundo desaliento, dijo:
—La casa de Isidro no está por este lado de la vía, sino por el otro.
Tendremos que bajar y volver a subir, y yo estoy rendido.
—No, no es necesario; hay un puente allá.
Efectivamente, había uno por encima de la vía. Lo atravesaron
rápidamente, y, poco después, vieron a una pareja de guardias
civiles. Se ocultaron María y Aracil entre los árboles; cuando los
guardias se perdieron de vista, siguieron andando, pero sin
atreverse a marchar por el camino.
Ya comenzaba a clarear; las estrellas palidecían, las ramas de los
árboles iban destacándose más fuertes en el cielo, todavía obscuro.
Aracil se ponía los anteojos, miraba a un lado y a otro y se
orientaba. Se acercaron a la tapia de la posesión real, y el doctor
reconoció la casa de Isidro el guarda: una casa pequeña, que tenía
un gran emparrado. La puerta aun no se había abierto.
—¿Qué hacemos?—preguntó Aracil—. ¿Llamaremos?
—No; habrá que esperar a que abran.
—Sí; será lo mejor. Vamos a ocultarnos por aquí.
Se tendieron en la hierba húmeda de rocío, entre los árboles y frente
a la casa del guarda, y, una vez uno y otra vez otro, aguardaron a
que se abriera la puerta. Estuvieron así más de media hora; el cielo
se aclaraba por instantes, los pájaros piaban en la espesura. De
pronto, María dijo:
—Han abierto una ventana.
Luego, al cabo de poco tiempo, se abrió la puerta.
—Ahora ha aparecido un hombre en mangas de camisa.
Aracil se puso los anteojos y miró: era Isidro. El guarda abrió un
corral, de donde salió una nube de gallinas.
—Creo que ya debes ir—dijo María.
Aracil, con el corazón palpitante, se levantó y se acercó al guarda.
Este, al ver a aquel hombre lívido y destrozado, se detuvo, sin
reconocerlo.
—Soy Aracil. Enrique Aracil, el médico, que viene huyendo—dijo el
doctor, con voz lastimera como un sollozo—. Vengo a que usted me
proteja.
El guarda agarró del brazo al doctor y, empujándolo violentamente,
lo metió por la puerta del corral, que acababa de abrir.
—Entre usted ahí—le dijo al mismo tiempo.
María, al presenciar lo ocurrido, se sobresaltó.
—¿Qué pasará?—se dijo.
La brusquedad del guarda quedó pronto explicada, porque, un
momento después, una mujer, con un cesto de ropa en la cabeza,
salió de la casa, y, tras una corta charla con Isidro, se fué. Entonces
el guarda volvió a buscar al doctor.
—Ahí está mi hija—le dijo Aracil.
Isidro fué a su encuentro, y les hizo pasar a los dos a un corralillo.
—¿Cómo han venido hasta aquí? ¿No les ha visto nadie?
—Nadie—y María contó lo que habían hecho para llegar.
—Muy bien—exclamó el guarda.
Aracil quiso explicar lo ocurrido con el anarquista, pero balbuceaba,
sin encontrar las palabras.
—No me tiene usted que decir nada, don Enrique—interrumpió el
señor Isidro—; usted me necesita a mí, y yo tengo la obligación de
servirle a usted. Y si usted pide la vida, también. ¿Que usted no ha
querido denunciar a un amigo? El mismo rey no hubiera podido
hacer otra cosa. Vale más ir a presidio para toda la vida que no
denunciar a un hombre.
El señor Isidro tenía sentimientos hidalguescos. Era lógico en un
español, y quizá en todo hombre sencillo que considerase la ley de la
hospitalidad como una ley superior a toda otra social o ciudadana.
Luego de exponer sus ideas acerca de este punto, el guarda añadió:
—Ahora, que van a pasar aquí una mala temporada.
—Peor la pasaríamos presos—dijo María.
—También es verdad. Yo les llevaría a mi casa; pero hay mujeres, y
algunas son blandas de boca.
—En cualquier lado estamos bien—replicó Aracil.
—Bueno, pues aquí se quedan ustedes—contestó el guarda—. Y no
hay que apurarse, que para todo hay arreglo en este mundo. Ahora,
sí; van ustedes a tener que dormir en el pajar.
—Muy bien—dijeron padre e hija.
—Hay otra cosa; que no podrán ustedes salir de este corralillo en
todo el día.
—Nos conformaremos con todo—murmuró Aracil.
—Respecto a la comida, hay que ver cómo nos arreglamos. ¿La
señorita sabe guisar algo?
—Sí.
—Pues yo les traeré unos cuantos celemines de habichuelas y de
garbanzos, y todos los días matan una gallina o dos.
—No, no hay necesidad—dijo María.
—Bueno; pues yo enviaré un trozo de cecina para hacer una miaja
de puchero. Aquí tienen ustedes leña.
—Muy bien. ¡Muchas gracias!—exclamaron padre e hija a la vez con
efusión.
—Las gracias a ustedes—contestó el señor Isidro—. Bueno; pues
ahora vengo con todo. Yo tengo la llave del corral, y aquí no entra
nadie... Y, paciencia, que las cosas del mundo conforme sean se
toman.
El señor Isidro salió del corralillo, y María y Aracil se hicieron lenguas
de la nobleza de este hombre. Ciertamente, su cara no indicaba, ni
mucho menos, su bondad; tenía un tipo de facineroso para dar
miedo a cualquiera. Estaba curtido por el sol, y gastaba bigote y
patillas de boca de hacha, ya grises. Llevaba sombrero blanco, traje
de pana y polainas.
Volvió el señor Isidro al poco rato, y en varios viajes llevó lo que
necesitaban los fugitivos, y encendió fuego.
—Ahora, lo que deben ustedes hacer es dormir. Y tranquilidad, que
no dan con ustedes ni con podencos. Yo echaré un vistazo a la
comida, y ustedes a descansar.
Y el guarda tomó una escalera de mano y la apoyó en la pared de
una casucha encalada que había en el fondo del corralillo. Aracil y
María subieron por ella y entraron por una ventana en el pajar.
Ninguno de los dos pudo dormir en paz. Aracil se despertaba a cada
momento, hablando; María soñó que estaba en un pueblo
ceniciento, en donde todo el mundo huía sin saber de qué, y, de
cuando en cuando, en alguna calle o plazoleta, había un hombre
cantando una canción, y la canción era siempre la misma: el tango
oído por ella en el merendero.
XI.
LO QUE DIJERON LOS PERIÓDICOS
La vida en aquel rincón fué para los dos fugitivos muy extraña y
distinta de la normal. Se levantaban de madrugada, cuando oían al
señor Isidro llamando a sus gallinas, y desde aquellas horas
comenzaba para ellos una serie de operaciones que les distraía.
Por la mañana, Aracil, con una paciencia inaudita, machacaba entre
dos piedras granos de cebada y avena, y con la especie de harina
gruesa que quedaba hacía una pasta, que les servía, como un puré,
para el desayuno. Después, sólo con el cuidado de hacer hervir la
olla se pasaban toda la mañana.
María se entretuvo en quitar las iniciales a la poca ropa blanca que
llevaban encima. Una de las preocupaciones del doctor Aracil fué la
de curtirse al sol para quedar más desconocido; tenían padre e hija
la cara blanca de los que no andan a la intemperie, y todos los días
los dos se pasaban largos ratos al sol, para ir ennegreciendo.
Entre la comida, el tomar el sol y discutir proyectos de fuga,
tuvieron, al principio, ocupación bastante.
El segundo día, el señor Isidro les dejó por la mañana un periódico.
Lo leyeron, y renovó en ellos las tristezas y las angustias. No habían
cogido todavía a Brull, y se perseguía como cómplice al doctor.
Las noticias más interesantes para Aracil publicadas por los diarios
eran éstas:

«En casa del doctor Aracil.

»Esta mañana se ha presentado un inspector de policía en casa del


doctor don Enrique Aracil, pues está plenamente demostrado que el
doctor era amigo del anarquista Brull. Se ha llamado repetidas veces
en casa del señor Aracil, y, viendo que nadie contestaba, ha habido
que buscar un cerrajero para que abriese la puerta. En la casa no
había nadie. Interrogada la portera, ha dicho que vió salir al doctor
Aracil a eso de las seis de la tarde del día del atentado. Se le
preguntó si no le pareció extraño el ver la casa cerrada, y dijo que
no, porque muy frecuentemente el doctor Aracil y su hija salían de
Madrid sin avisar a nadie. Mientras el inspector hablaba con la
portera, una muchacha, sirviente en un cuarto del mismo piso en
donde vive el señor Aracil, ha dicho que ayer oyeron en la habitación
del doctor el ruido de una fuente que corría. Preguntó a una de las
criadas del señor Aracil: «¿Están tus señoritos?» Y ella dijo: «No».
«Pues he oído el ruido de la fuente».
»Por el examen de la casa y por la declaración de esta muchacha,
hay motivos para creer que Nilo Brull estuvo en casa del doctor
Aracil, y que después los dos, juntos o separados, han huído.»

«El cochero que condujo al doctor Aracil.

»Se ha presentado el cochero del coche número 1.329 en el Juzgado


de Palacio. Ha declarado que llevó a un hombre de las señas de
Aracil, elegante, de barba negra, con anteojos, gabán al brazo,
desde la calle de Fuencarral a la del Prado.»

«La familia de Aracil.


»Don Venancio Arce, ingeniero de minas, llamado por el juez del
distrito de Palacio, ha dicho que su sobrina María Aracil estuvo el día
del atentado en su casa, y que fué a visitar a una hija del ingeniero,
enferma del sarampión. El señor Arce cree que su pariente Aracil
conocía a Brull; pero que se puede tener la seguridad absoluta de
que el doctor no tiene participación en el atentado. Pensar otra cosa
le parece una locura.
»Doña Belén Arrillaga dijo que su sobrina María, hija del doctor
Aracil, estuvo en su casa el día del atentado, desde las tres a las
siete de la tarde, hora en que fué a recogerla su padre.»

«Sor María, del Hospital General.

»Sor María, de la sala de enfermos que está a cargo del doctor


Aracil, ha declarado que la tarde del atentado vió entrar al doctor
con una mujer. Le hizo la hermana una pregunta a Aracil respecto al
tratamiento de un nefrítico, y luego no le vió más. Un mozo del
hospital vió salir al doctor Aracil, con su hija, a eso de las siete o
siete y media de la noche; habló un momento con ellos, pero el
doctor no tenía ganas de conversación.
»Desde este momento nadie ha visto al doctor Aracil y a su hija.»

«Señas de los anarquistas.

»Se han dado órdenes telegráficas a las estaciones de todas las


líneas con las señas de Nilo Brull, del doctor Aracil y de su hija. Se
duda que consigan salir de España.»

«El doctor Aracil.


»El doctor Aracil tiene cuarenta y dos años, es de mediana estatura,
delgado, de barba negra. El doctor es médico del Hospital General, y
goza de justa fama. Su clientela, numerosa, no es mayor, según
dicen, porque él mismo no la cultiva. Es uno de los médicos más
ilustres e inteligentes de Madrid. Su hija María es una linda
muchacha de diez y ocho años, muy conocida en la sociedad
madrileña.
»Los amigos del doctor Aracil afirman que es un absurdo suponer
que el doctor tenga complicidad en el atentado Brull. Sin embargo,
parece confirmarse que Aracil se hallaba relacionado con los
anarquistas, a quienes favorecía con su influencia y su dinero.»

«Una rusa.

»Se dice que una señorita rusa, afiliada al terrorismo, en compañía


de un significado anarquista de Barcelona, que ha desaparecido, y
de Brull, estuvieron en casa del doctor Aracil conferenciando con él.
Por algunas personas se asegura que el doctor Aracil ha sido el
inductor de este atentado, y que Brull ha obrado sólo como un
instrumento.»

Cuando Aracil leía estas noticias, en el rincón de la Casa de Campo,


se estremecía de terror.
—La verdad es que esto—pensaba—parece una pesadilla, un sueño
de fiebre.
Al cuarto día, la excitación que reflejaban los periódicos iba en
aumento. Se detuvo a un italiano, tomándolo como anarquista, y
estuvo a punto de ser linchado, pero demostró claramente su
inocencia. Ni el criminal, ni el encubridor parecían. En los periódicos,
Aracil tomaba una personalidad siniestra; se le quería complicar en
la bomba de París y en las de Barcelona, y se suponía que era el jefe
de una asociación terrorista. Desde Londres enviaron a Madrid una
información folletinesca de lo más absurdo posible. Según esta
información, en el Centro Anarquista Internacional de Londres se
había celebrado una gran reunión, en donde se había discutido y
aprobado la muerte de los reyes de España. Brull, que asistió a la
reunión, dijo que él, en compañía de un señor don José, iría a
España a dinamitar a los reyes. El relato tenía el aspecto de una
filfa, y el fantástico y anarquista señor don José parecía salido de la
ópera Carmen, más que de la realidad.
Para fin de fiesta, el doctor Iturrioz comenzó a contar una de
historias que acabaron de embarullar por completo el asunto.
Iturrioz habló de un millonario extranjero que protegía a su amigo
Aracil, y cuyo automóvil rojo había visto pasar a toda velocidad el
mismo día del atentado, y pintó tales misterios, siempre diciendo
que no sabía nada, que no tenía dato alguno, sino que suponía,
pensaba, que puso en movimiento a toda la policía y la lanzó sobre
una serie de pistas falsas.
—¿Para qué hará eso Iturrioz?—preguntaba Aracil a María.
—Para engañar a la policía, seguramente.
—Eso debe ser. Lo que a mí me preocupa es Brull. ¿Qué hace ese
hombre?
Al quinto día, un periódico afirmó que Aracil estaba ya en París, y la
noticia le hizo pensar al doctor.
—¿Qué te parece—le dijo a María—, si escribiera a mi amigo
Fournier para que diga que me han visto allí?
—Muy bien.
Escribió una nota Aracil, firmándola.
—¿Y si alguno del correo la ve?—preguntó María.
—No van a abrir las cartas.
—¡Fíate! Por si acaso, convendría no firmar. ¿No podrías decir algo a
tu amigo que le indicase que eras tú quien le escribías, sin poner tu
nombre?
—Sí; pondré esto: «El antiguo compañero del número siete del hotel
Médicis.»
—Sí, es lo mejor. También estaría bien ponerlo en un idioma que no
lo comprendiesen.
—Fournier sabe el inglés.
—Pues escribiré yo en inglés.
—Sí, es buena idea. Además, le voy a decir que haga unas tarjetas
con mi nombre y las deje en cuatro o cinco sitios.
Tradujo María la carta al inglés, la copió Aracil y escribió ella el
sobre. El señor Isidro echó la carta, con grandes precauciones,
comprando primero el sello, y luego pegándolo él mismo.
XII.
LA DESPEDIDA DE BRULL
Tres días después de enviada la carta, los periódicos trajeron una
noticia sensacional: la muerte de Brull. Una mañana, al amanecer, se
oyeron dos tiros en una casa de la calle de San Mateo. El sereno y
los guardias de servicio llamaron en la casa en donde se habían oído
las detonaciones; despertaron a la portera y reconocieron todos los
cuartos. Ya se iban a marchar, cuando uno de ellos vió que por
debajo de la puerta de una guardilla deshabitada salía un reguero de
sangre. Descerrajada la puerta, los guardias encontraron el cuerpo
de Nilo Brull, que acababa de expirar. El anarquista se había
suicidado. Junto a él, en un cuaderno escrito con lápiz, encontraron
los guardias una carta de despedida del anarquista, que publicaron y
comentaron los periódicos.
Decía así:

«A los españoles.
»Momentos antes de morir, frío, tranquilo, con el
convencimiento de mi superioridad sobre vosotros, quiero
hablaros.
»Durante toda mi vida, la sociedad me ha perseguido, me
ha acorralado como a una fiera. Siendo el mejor, he sido
considerado como el peor; siendo el primero, se me ha
considerado como el último.
»Daría los motivos de mi Gran Obra de Altruísmo, si los
españoles pudieran comprenderme; pero tengo la
seguridad de que no me comprenderán, de que no pueden
comprenderme. Los esclavos no se explican al rebelde, y
vosotros sois esclavos, esclavos todos, hasta los que se
creen emancipados. Unos del rey, otros de la moral, otros
de Dios, otros del uniforme, otros de la ciencia, otros de
Kant o de Velázquez.
»Todo es esclavitud y miseria.
»Yo sólo soy rebelde, soy el Rebelde por excelencia. Mi
rebeldía no procede de esas concepciones necias y vulgares
de los Reclus y de los Kropotkine.
»Yo voy más lejos, más lejos que las ideas.
»Yo estoy por encima de la justicia. Mi plan no es mas que
éste: empujar el mundo hacia el caos.
»He realizado mi Gran Obra solo. Quizá no lo crean los
imbéciles que suponen que los atentados anarquistas se
realizan por complot.
»Sí; he estado solo; solo frente al destino.
»Si hubiese tenido necesidad de un cómplice, no hubiera
llegado al fin. En España no hay un hombre con bastante
corazón para secundarme a mí. No hay dos como yo. Yo
soy un león metido en un corral de gallinas.
»Hubiese escrito con gusto un estudio acerca de la
psicología del anarquista de acción, para dedicárselo a la
Sociedad de Psicología de París, pasándome en
observaciones mías interesantísimas, pero no hay tiempo.
»Durante estos últimos meses tenía la idea vaga de llevar a
cabo mi Gran Obra. Cuando me convencí de la necesidad
de ejecutarla, mis vacilaciones desaparecieron y viví
tranquilo, estudiando el momento y la manera de
conducirla al fin.
»Viví tranquilo, y la vida que me escamotearon los demás la
viví enérgicamente en el tiempo en que preparaba mi obra.
»¿Se puede comparar la intensidad extraordinaria de mi
vida con la existencia ridícula de los sibaritas de la antigua
Roma o con la no menos ridícula de los cortesanos de
Versalles?
»Sólo en cualquier noche antes del atentado, cuando tiraba
desde el balcón una naranja, para ver dónde caía en la
calle, y poder precisar el modo de echar la bomba, tenía yo
más emociones que todos ellos.
»Sí. Me he resarcido en grande.
»En el último momento, al tomar la bomba entre las
manos, y al inyectarle la nitrobencina, temblaba: «Tiembla,
grande hombre, me dije a mí mismo; tienes derecho a eso
y a más.»
»¡Y cuando la lancé, rodeándola con flores! Al estallar, creí
que se me desgarraban las entrañas.
»Algo semejante debe sentir la mujer al parir. Yo acababa
también de dejar en el mundo algo vivo.
»Antes de mí, en España no había nada. ¡Nada! Después
de mi Gran Acto vivía ya un ideal: la Anarquía. Yo lo
acababa de echar al mundo en aquel momento terrible.
»Si hubiese posibilidad de comparación entre el autor de un
hecho individual obscuro y sin trascendencia y el autor de
un acontecimiento que habrá conmovido el mundo, diría
que mi estado de automatismo cerebral, desde que pensé
mi Obra hasta que la realicé, era idéntico al de Raskolnikof,
en Crimen y Castigo, de Dostoievski.
»Creo que pocos hombres hubieran tenido mi serenidad. En
el momento terrible, cuando estaba en el balcón con la
bomba en la mano, vi en la calle unas cuantas muchachas
que reían. Sin embargo, no vacilé. Implacable como el
Destino, las condené de antemano a la muerte. Era
necesario.
»He realizado mi Gran Obra y la he realizado solo y con
éxito.
»Creo que mi atentado es el más grande de cuantos se han
cometido. Todos los españoles, si no fueran cretinos,
debieran agradecerme, todos, el rey, porque he dignificado
su cargo; la burguesía, porque ante el peligro parece
menos egoísta y vil; el pueblo, porque ha aprendido de mí
la forma más eficaz y más enérgica de la protesta.
»He tenido un instante de debilidad, es cierto, al acogerme
en casa del doctor Aracil. No me arrepiento. Este instante
pasajero de flaqueza me ha permitido tener, en el último
momento, la conciencia de mi vida y de la magnitud de mi
obra.
»Me voy a hundir en la nada incrustándome una bala en el
corazón. Deshacer mi cerebro, disparar contra él, me
parecería un sacrilegio. Además, no lo podrían estudiar los
médicos, y como este cerebro no encontrarán muchos.
«Adiós.

Nilo Brull.»
Aracil, al leer esta carta, quedó pensativo.
La parte teatral, enfática, el bello gesto de mediterráneo que había
dejado Brull, le producía cierta envidia.
—La verdad es que era todo un hombre—murmuró.
Luego, volviendo sobre su sentimiento, pensó en la fuerza de ilusión
que tiene el hombre para convertir las acideces de su estómago y las
irritaciones del hígado en motivos idealistas y metafísicos...
Se pudo seguir el camino llevado por el anarquista, saltando tejados
desde el cuarto de la casa del doctor Aracil, hasta allí.
Ya resuelto el desenlace del actor principal del drama, aunque no a
satisfacción de la justicia ni del público, los periódicos comenzaron a
zaherir y a burlarse de la policía y del Gobierno porque no lograba
coger a Aracil.
Algunos aseguraban que el doctor había salido de España en
automóvil, en el célebre automóvil rojo del millonario, visto por
Iturrioz; otros, que en el tren, disfrazado; pero la mayoría opinaba
que el doctor y su hija se hallaban escondidos en Madrid.
En esto, a los cinco días de enviar Aracil la carta a su amigo de París,
trajeron los periódicos la siguiente noticia con letras grandes: «El
doctor Aracil en París», y a continuación una serie de telegramas.
El doctor había estado en la redacción de El Intransigente a saludar
a Rochefort, y en su conversación con uno de los redactores de
dicho periódico había dicho que Nilo Brull, sin duda se dirigió a su
casa a pedirle protección por ser su amigo. El doctor no podía
desampararle ni protegerle, y había optado por abandonarle la casa.
Aracil había pasado la frontera en el automóvil de un amigo y se
disponía a marchar a América, pero no tenía inconveniente en volver
a España, cuando se calmara la efervescencia del momento, para
probar su absoluta inocencia. Aracil había estado en casa de los
corresponsales de los periódicos madrileños en París, dejando su
tarjeta.
La campaña estuvo lo bastante bien hecha para que nadie dudara.
Se intentó averiguar quién había salvado al doctor, pero no se puso
nada en claro.
Se discutió la cuestión de la extradición de Aracil, y a los cuatro o
cinco días los periódicos comenzaron a dar este asunto por
terminado.
La Epoca dijo: «Los anarquistas pueden estar satisfechos; han dado
la batalla sin pérdidas por su parte».
XIII.
LA PARTIDA
A las dos semanas de encierro, Aracil se sentía aplanado por la
soledad y el silencio.
—Creo que debíamos marcharnos ya—dijo Aracil a su hija, después
de pensarlo varios días—. Isidro no puede vivir en paz teniéndonos a
nosotros aquí.
—¿Por qué?
—Porque ya es molestar demasiado.
—No; es algo más que molestar. Pero a Isidro no le importa. Por él
podemos estar aquí un año si queremos.
Y era verdad. El guarda tenía una abnegación extraordinaria. El
devolver el beneficio al doctor Aracil, que le había curado su hija, le
producía tal júbilo, que rebosaba de contento.
A pesar de esto, Aracil quería marcharse; se sentía abatido, achicado
de encontrarse solo, y necesitaba verse entre gente, en un sitio
donde poder hablar y lucirse.
María era partidaria de pasar allí todavía un par de meses y luego
marcharse en el tren, sin tomar precaución alguna; pero Aracil
confesó que no podía más, que estar metido en aquel rincón le era
insoportable.
—Bueno, pues nos iremos—dijo María.
Decidieron la marcha. Lo más prudente era que Aracil fuese solo,
aprovechando trenes de ferias, y que esperase a María en la
frontera; pero el doctor aseguró que temía la soledad, pues era
capaz de hacer cualquier tontería. Yendo juntos era una locura
tomar el tren, estando todavía tan reciente el atentado y las órdenes
dadas a la policía. Lo mejor era ir a caballo. De acuerdo padre e hija
en este punto, discutieron por dónde intentarían salir de España.
Aracil creía lo más sencillo encaminarse directamente a Francia.
María encontraba mejor marchar a Portugal.
—En primer término, el viaje es más corto—dijo ella—; luego, la que
hay que cruzar es tierra más despoblada y seguramente camino
menos vigilado.
María había oído hablar de este viaje varias veces a su primo
Venancio. Consultaron con Isidro, y éste fué partidario de la marcha
por Portugal.
—Nada; pues vamos por Portugal—dijo el doctor.
Se comenzaron a hacer los preparativos; Isidro compró dos
caballejos baratos y los dejó en una cuadra de un amigo suyo de las
Ventas de Alcorcón. Trajo ropas de campesino usadas; para Aracil
una especie de marsellés, faja y pantalones de pana, y un refajo y
una chaqueta para María.
María cosió unos cuantos billetes de Banco, el capital con que
contaban, en el forro de la americana de su padre después de
haberlos envuelto en un trozo de hule, y se quedaron con unos
duros y unas pesetas sueltas para el camino.
El señor Isidro enseñó a Aracil, en un borrico que tenía, la manera
de echarle las albardillas y ponerle la cincha y el ataharre. Luego
compró el guarda una manta y una alforja, en donde metió unas
cuantas libras de chocolate, un queso, una bota y pan, por si
algunos días no encontraban comida en el camino. María le mandó
comprar una tetera, un bote de té y una maquinilla de alcohol.
El señor Isidro se agenció un plano de España, y, por último, le dió
al doctor su cédula y sus papeles.
—Usted se llama como yo, Isidro García; es usted guarda de la Casa
de Campo y va usted con su hija a San Martín de Valdeiglesias.
Desde San Martín dicen ustedes que han ido hasta allá en tren, y
que van a la Vera de Plasencia.
Hicieron una lista de los pueblos por los que tenían que cruzar, y ya
decididos, fijo el día de salida y dispuesto todo, a media noche se
presentó el señor Isidro, les hizo salir de su encierro, y los tres,
cargados con una porción de cosas, y por entre las matas, cruzaron
gran parte de la Casa de Campo hasta un lugar frontero a la aldea
de Aravaca.
Al llegar a este punto, Isidro cogió una escalera de mano y la apoyó
en la tapia. Subió, miró a derecha e izquierda, y dijo:
—¡Hala! Vengan ustedes.
Subieron María y Aracil. La tapia, por el otro lado, apenas levantaba
un metro del suelo; así que de un brinco quedaron fuera.
—Ahora sigan ustedes bordeando esta tapia—dijo el señor Isidro—;
yo voy a adelantarme para traerles a ustedes los caballos.
El guarda desapareció en un instante; Aracil y María continuaron
solos. La noche estaba negra; en el suelo, mojado por la lluvia, se
hundían los pies. No se cruzaron con nadie. Clareaba ya el alba
cuando llegaron a las Ventas de Alcorcón.
En la carretera les esperaba el guarda, teniendo de la brida a los dos
caballos.
—¡Ea, vamos allá!—dijo el señor Isidro. La yegua de usted, don
Enrique, se llama Montesina, y el jaco de la señorita, Galán. Hábleles
usted, porque estos animales obedecen muchas veces mejor a la
palabra que al palo.
Prometió hacerlo así Aracil. El guarda ayudó a montar a padre e hija,
dió una varita a cada uno de ellos, les estrechó la mano
afectuosamente, y les dijo:
—¡Vaya, filando! Adiós, y buena suerte.
Welcome to Our Bookstore - The Ultimate Destination for Book Lovers
Are you passionate about books and eager to explore new worlds of
knowledge? At our website, we offer a vast collection of books that
cater to every interest and age group. From classic literature to
specialized publications, self-help books, and children’s stories, we
have it all! Each book is a gateway to new adventures, helping you
expand your knowledge and nourish your soul
Experience Convenient and Enjoyable Book Shopping Our website is more
than just an online bookstore—it’s a bridge connecting readers to the
timeless values of culture and wisdom. With a sleek and user-friendly
interface and a smart search system, you can find your favorite books
quickly and easily. Enjoy special promotions, fast home delivery, and
a seamless shopping experience that saves you time and enhances your
love for reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!

ebookball.com

You might also like