Practical guide to advanced networking 3rd ed Edition Beasley - The complete ebook is available for download with one click
Practical guide to advanced networking 3rd ed Edition Beasley - The complete ebook is available for download with one click
https://ebookultra.com/download/guide-to-networking-essentials-7th-
edition-greg-tomsho/
https://ebookultra.com/download/advanced-practical-organic-
chemistry-2-ed-reprint-1995-2nd-ed-edition-leonard-john/
https://ebookultra.com/download/bullying-a-practical-guide-to-coping-
for-schools-3rd-edition-michele-elliott/
https://ebookultra.com/download/a-practical-guide-to-clinical-
virology-2nd-ed-edition-l-r-haaheim/
A Practical Guide to TPM 2 0 1st ed. Edition Will Arthur
https://ebookultra.com/download/a-practical-guide-to-tpm-2-0-1st-ed-
edition-will-arthur/
https://ebookultra.com/download/the-busy-coder-s-guide-to-advanced-
android-development-1st-ed-edition-mark-l-murphy/
https://ebookultra.com/download/the-complete-idiot-s-guide-to-
running-3rd-ed-edition-rodgers/
Pearson
800 East 96th Street
Indianapolis, Indiana 46240 USA
A PRACTICAL GUIDE TO ADVANCED NETWORKING ASSOCIATE PUBLISHER
Dave Dusthimer
ii
CONTENTS AT A GLANCE
Introduction xvi
1 Network Infrastructure Design 2
2 Advanced Router Configuration I 52
3 Advanced Router Configuration II 98
4 Configuring Juniper Routers 158
5 Configuring and Managing the Network Infrastructure 188
6 Analyzing Network Data Traffic 226
7 Network Security 266
8 IPv6 306
9 Linux Networking 336
10 Internet Routing 396
11 Voice over IP 428
Glossary 456
Index 472
iii
TABLE OF CONTENTS
Introduction xvi
iv CONTENTS
CHAPTER 2 Advanced Router Configuration I 52
Chapter Outline 53
Objectives 53
Key Terms 53
Introduction 54
2-1 CONFIGURING STATIC ROUTING 54
Gateway of Last Resort 61
Configuring Static Routes 61
Load Balancing and Redundancy 68
Networking Challenge—Static Routes 70
2-2 DYNAMIC ROUTING PROTOCOLS 70
Distance Vector Protocols 73
Link State Protocols 74
2-3 CONFIGURING RIPv2 75
Configuring Routes with RIP 77
Configuring Routes with RIP Version 2 82
Networking Challenge—RIP 84
2-4 TFTP—Trivial File Transfer Protocol 85
Configuring TFTP 85
Summary 89
Questions and Problems 89
CONTENTS v
3-3 CONFIGURING HYBRID ROUTING PROTOCOLS—EIGRP 119
Configuring Routes with EIGRP 120
Load Balancing and Redundancy 125
Networking Challenge: EIGRP 128
3-4 ADVANCED ROUTING REDISTRIBUTION 129
Route Redistribution into RIP 130
Route Redistribution into OSPF 134
Route Redistribution into EIGRP 137
Route Redistribution into IS-IS 141
3-5 ANALYZING OSPF “HELLO” PACKETS 143
Summary 147
Questions and Problems 147
vi CONTENTS
CHAPTER 5 CONFIGURING AND MANAGING THE NETWORK
INFRASTRUCTURE 188
Chapter Outline 189
Objectives 189
Key Terms 189
Introduction 190
5-1 DOMAIN NAME AND IP ASSIGNMENT 190
5-2 IP MANAGEMENT WITH DHCP 195
DHCP Data Packets 197
DHCP Deployment 201
5-3 SCALING THE NETWORK WITH NAT AND PAT 204
Configuring NAT 205
5-4 DOMAIN NAME SERVICE (DNS) 209
DNS Tree Hierarchy 210
DNS Resource Records 214
Summary 220
Questions and Problems 220
CONTENTS vii
CHAPTER 7 Network Security 266
Chapter Outline 267
Objectives 267
Key Terms 267
INTRODUCTION 268
7-1 DENIAL OF SERVICE 268
Distributed Denial of Service Attacks (DDoS) 270
7-2 FIREWALLS AND ACCESS LISTS 270
Network Attack Prevention 272
Access Lists 272
7-3 Router Security 279
Router Access 280
Router Services 282
Router Logging and Access-List 283
7-4 Switch Security 285
Switch Port Security 286
Switch Special Features 288
7-5 Wireless Security 289
7-6 VPN Security 292
VPN Tunneling Protocols 293
Configuring a VPN Virtual Interface (Router to Router) 294
Troubleshooting the VPN Tunnel Link 299
Summary 302
Questions and Problems 302
viii CONTENTS
IPv6: EIGRP 325
IPv6: IS-IS 326
8-6 Troubleshooting IPv6 Connection 327
Summary 329
Questions and Problems 329
CONTENTS ix
9-7 MANAGING THE LINUX SYSTEM 385
Summary 390
Questions and Problems 391
x CONTENTS
11-4 ANALYZING VoIP DATA PACKETS 442
Analyzing VoIP Telephone Call Data Packets 446
11-5 VoIP SECURITY 449
Summary 452
Questions and Problems 452
Index 472
CONTENTS xi
ABOUT THE AUTHORS
Jeffrey S. Beasley is with the Department of Engineering Technology and Surveying Engineering at New
Mexico State University. He has been teaching with the department since 1988 and is the co-author of Modern
Electronic Communication and Electronic Devices and Circuits, and the author of Networking.
Piyasat Nilkaew is a network engineer with 15 years of experience in network management and consulting,
and has extensive expertise in deploying and integrating multiprotocol and multivendor data, voice, and video
network solutions on limited budgets.
xii
DEDICATIONS
This book is dedicated to my family, Kim, Damon, and Dana. —Jeff Beasley
This book is dedicated to Jeff Harris and Norma Grijalva. Not only have you given me my networking career, but
you are also my mentors. You inspire me to think outside the box and motivate me to continue improving my
skills. Thank you for giving me the opportunity of a lifetime. I am very grateful. —Piyasat Nilkaew
ACKNOWLEDGMENTS
I am grateful to the many people who have helped with this text. My sincere thanks go to the following technical
consultants:
• Danny Bosch and Matthew Peralta for sharing their expertise with optical networks and unshielded twisted-
pair cabling, and Don Yates for his help with the initial Net-Challenge Software.
• Abel Sanchez, for his review of the Linux Networking chapter.
I also want to thank my many past and present students for their help with this book:
• David Potts, Jonathan Trejo, and Nate Murillo for their work on the Net-Challenge Software. Josiah Jones,
Raul Marquez Jr., Brandon Wise, and Chris Lascano for their help with the Wireshark material. Also,
thanks to Wayne Randall and Iantha Finley Malbon for the chapter reviews.
xiii
ABOUT THE TECHNICAL REVIEWERS
Wayne Randall started working in the Information Technology field in 1994 at Franklin Pierce College (now
Franklin Pierce University) in Rindge, NH, before becoming a Microsoft Certified Trainer and a consultant at
Enterprise Training and Consulting in Nashua, NH.
Wayne acquired his first certification in Windows NT 3.51 in 1994, became an MCSE in NT 4.0 in 1996, was a
Certified Enterasys Network Switching Engineer in 2000, and then worked as a networking and systems consul-
tant from 2001 to 2006 before becoming a director of IT for a privately held company. Wayne currently works for
Bodycote, PLC, as a network engineer/solutions architect. Bodycote has 170 locations across 27 countries with
43 locations in North America. Wayne has taught for Lincoln Education since 2001 and developed curricula for it
since 2011. Mr. Randall holds a BA in American Studies from Franklin Pierce University.
Iantha Finley Malbon’s teaching career has spanned 20 years from middle school to collegiate settings and
is currently a CIS professor at Virginia Union University. She is also an adjunct professor at ECPI University,
having previously served as CIS Department Chair, teaching Cisco routing, networking, and Information Tech-
nology courses. She implemented the Cisco Academy for Hanover Schools and was the CCAI for the Academy.
She earned her master’s degree in Information Systems from Virginia Commonwealth University and bachelor’s
degree in Technology Education from Virginia Tech. She holds numerous certifications including CCNA,
Network+, A+, and Fiber Optic Technician.
xiv
WE WANT TO HEAR FROM YOU!
As the reader of this book, you are our most important critic and commentator. We value your opinion and want
to know what we’re doing right, what we could do better, what areas you’d like to see us publish in, and any other
words of wisdom you’re willing to pass our way.
As the associate publisher for Pearson IT Certification, I welcome your comments. You can email or write me
directly to let me know what you did or didn’t like about this book—as well as what we can do to make our
books better.
Please note that I cannot help you with technical problems related to the topic of this book. We do have a User
Services group, however, where I will forward specific technical questions related to the book.
When you write, please be sure to include this book’s title and author as well as your name, email address, and
phone number. I will carefully review your comments and share them with the author and editors who worked on
the book.
Email: feedback@pearsonitcertification.com
Mail: Dave Dusthimer
Associate Publisher
Pearson IT Certification
800 East 96th Street
Indianapolis, IN 46240 USA
READER SERVICES
Visit our website and register this book at www.pearsonitcertification.com/register for convenient access to any
updates, downloads, or errata that might be available for this book.
xv
INTRODUCTION
This book looks at advanced computer networking. It first guides readers through network infrastructure design.
The readers are then introduced to configuring static, RIPv2, OSPF, ISIS, EIGRP routing protocols, techniques
for configuring Juniper router, managing the network infrastructure, analyzing network data traffic using
Wireshark, network security, IPv6, Linux networking, Internet routing, and Voice over IP. After covering the
entire text, readers will have gained a solid knowledge base in advanced computer networks.
In my years of teaching, I have observed that technology students prefer to learn “how to swim” after they have
gotten wet and taken in a little water. Then, they are ready for more challenges. Show the students the technology,
how it is used, and why, and they will take the applications of the technology to the next level. Allowing them to
experiment with the technology helps them to develop a greater understanding. This book does just that.
xvi
Key Pedagogical Features
• Chapter Outline, Key Terms, and Introduction at the beginning of each chapter clearly outline specific goals
for the reader. An example of these features is shown in Figure P-1.
• Understand and identify the difference be- • Understand the steps for configuring the rout- • Operational mode
tween the operational and configuration er’s interface • Configuration mode
modes • Explain how to configure static, RIP, OSPF,
• Understand the basic steps for working in the and IS-IS routing
operational mode • Understand the steps for route redistribution The basic commands used in the operational mode of the JUNOS command-line
interface (CLI) are presented in Section 4-1. In this chapter, you learn about the
{master} prompt and the >, indicating you are now in the operational mode. You
Key Terms also learn about the re0 { and re1 { .. notations that are used to identify the system
configuration for the routing engines 0 and 1. In Section 4-2, the steps for config-
JUNOS Internal Ethernet interface area interface interface uring the router interface are examined. In addition, the commands for displaying
{master} transient interfaces hello-interval seconds the router interface, configuring the hostname, and assigning an IP address to an
re0 { and re1 { .. Inet dead-interval seconds interface are examined. Section 4-3 introduces route configuration featuring static,
Out of Band Management preferred set metric value RIP, OSPF, and IS-IS. Section 4-4 examines route redistribution. Juniper takes a
PIC edit routing-options set protocols isis inter- different approach when it comes to route redistribution. In the JUNOS software,
static face interface there is no redistribute command. Unlike Cisco where a route distribution is done in
multi-services card
edit protocols rip show isis adjancency a routing process, Juniper uses its routing policy to inject routing protocols.
t3/ds3 card
show rip neighbor edit policy-options
at
commit set policy-statement
oc-3
oc-12 commit and- quit top 4-1 OPERATIONAL MODE
show route export
permanent interfaces The operational mode is the first mode encountered after logging in to the Juniper
Management Ethernet show route protocol rip router. This mode allows for the following:
Interface set protocols ospf area
1. Monitoring network connectivity (for example, using the ping command)
2. Troubleshooting the router interface and network connections
3. Entry point for router configuration
The following examples demonstrate the basic commands used in the operational
mode of the JUNOS command-line interface (CLI). The connection to the Juni-
per router demonstrated in this section is being made via an SSH session (secure
telnet); however, a console serial connection can also be made directly with the
Juniper router, and this connection is used to make the initial router interface con-
figurations.
FIGURE P-1
xvii
• Net-Challenge Software provides a simulated, hands-on experience in configuring routers and switches.
Exercises provided in the text (see Figure P-2) and on the CD challenge readers to undertake certain router/
network configuration tasks. The challenges check the students’ ability to enter basic networking commands
and set up router function, such as configuring the interface (Ethernet and Serial) and routing protocols (that
is, static, RIPv2, OSPF, ISIS, EIGRP, BGP, and VLANs). The software has the look and feel of actually being
connected to the router’s and switch console port.
Networking Challenge—OSPF
Use the Net-Challenge Simulator Software included with the text’s companion CD-ROM to demon-
strate that you can configure OSPF for Router A in the campus LAN (the campus LAN is shown in
Figure 3-2 and is displayed by clicking the View Topology button when the software is started). Place
the Net-Challenge CD-ROM in your computer’s drive. Open the Net-Challenge folder and click
NetChallenge V3-2.exe. When the software is running, click the Select Router Challenge button to
open a Select Router Challenge drop-down menu. Select Chapter 3—OSPF. This opens a checkbox
that can be used to verify that you have completed all the tasks:
1. Enter the privileged EXEC mode on the router.
2. Enter the router’s terminal configuration mode: Router(config).
3. Set the hostname to Router A.
4. Configure the FastEthernet0/0 interface with the following:
IP address: 10.10.20.250
Subnet mask: 255.255.255.0
5. Enable the FA0/0 interface.
6. Configure the FastEthernet0/1 interface with the following:
IP address: 10.10.200.1
Subnet mask: 255.255.255.0
7. Enable the FA0/1 interface.
8. Configure the FastEthernet0/2 interface with the following:
IP address: 10.10.100.1
Subnet mask: 255.255.255.0
FIGURE P-2
xviii
• The textbook features and introduces how to use the Wireshark Network Protocol Analyzer. Examples of us-
ing the software to analyze data traffic are included throughout the text, as shown in Figure P-3.
FTP Filtering
The following example demonstrates the process by which Wireshark filtering can
be used to isolate File Transfer Protocol (FTP) out of a large list of packets. This
can be useful for several reasons. You can use filtering rules to help us find user-
names and passwords being used to connect to the FTP servers as well as get an
idea of the kind of data that is being transferred.
Start this exercise by opening the capture file 5-A.cap in Wireshark. This is not a
huge file, but it’s a little difficult to sort through all of it just by looking. Click
Expression and scroll down until you reach FTP—File Transfer Protocol (FTP).
Click OK and the Filter for FTP is now displayed, as shown in Figure 6-30.
Click Apply, and the packet list is thinned out to 15 total packets relating to the
FTP protocol, as shown in Figure 6-31. From this, we are able to view the username
and password used to establish the FTP connection. In this case, the username and
passwords are listed in plaintext, as well as the file that was accessed. Most times, a
secure version of FTP (SFTP) will be used and this information will be encrypted.
This same rule can also be applied by using the right-click method as previously
shown.
Find a packet that is using the FTP protocol (for example, packet 44). Navigate to
the datagram field and select the FTP row. Right click -> Apply as Filter -> Se-
lected. This will generate the same results provided in Figure 6-32 that are used for
the FTP filter.
FIGURE P-3
xix
• Numerous worked-out examples are included in every chapter to reinforce key concepts and aid in subject
mastery, as shown in Figure P-4.
10.10.200.0 NET
LAN A LAN B
192.168.10.0 NET
LAN A LAN B
must be a
“10” network
10.10.20.0 NET 10.10.10.0 NET
(b)
FIGURE 2-11 An example of (a) a contiguous network and (b) a discontiguous network
FIGURE 11-15 The exchange of voice packets (code 41) between the two IP phones
VoIP VoIP
Next, enter the router’s configuration mode [Router(config)#] and input the com- Phone Phone
Hub
mand router rip to use the RIP routing protocol. The next step is to specify the Phone (# 1006) Phone (# 2010)
network that uses RIP for routing. These two steps are shown here: 00:e0:bb:1c:07:0a
Dial 62 – for accessing
00:e0:bb:1c:06:87
Router(config-router)#network 10.0.0.0
192.168.10.5
Protocol Analyzer
FIGURE 11-16 The test setup for the VoIP telephone call
FIGURE P-4
xx
• Key Terms and their definitions are highlighted in the margins to foster inquisitiveness and ensure retention.
This is illustrated in Figure P-5.
OSPF sends small “Hello” packets at regular time intervals to adjacent routers to
Hello Packets
verify that the link between two routers is active and the routers are communicat-
Used in the OSPF ing. If a router fails to respond to a Hello it is assumed that the link or possibly the
protocol to verify
router is down. The OSPF Hello packet captured with a network protocol analyzer
that the links are still
communicating.
is discussed in Section 3-5.
Areas OSPF uses the concept of areas to partition a large network into smaller networks.
The partition of a large
The advantage of this is that the routers have to calculate routes only for their area.
OSPF network into If a route goes down in a given area, only the routers in that area have to calculate
smaller OSPF networks. new routes. Any number between 0 and 4,294,967,295 (232 – 1) can be used; how-
ever, area 0 is reserved for the root area, which is the backbone for the network.
Backbone The backbone is the primary path for data traffic to and from destinations and
The primary path for sources in the campus network. All areas must connect to area 0, and area 0 cannot
data traffic to and from be split. The area numbers can also be expressed in IP notation—for example, area
destinations and sources
0 could be 0.0.0.0—or you can specify an area as 192.168.25.0 or in subnet nota-
in the campus network.
tion. Hence, the need for the large upper-area number (232 – 1) = 255.255.255.255
when converted to a decimal number.
OSPF allows the use of variable length subnet masks (VLSM), which enable dif-
Variable Length ferent size subnets in the network to better meet the needs of the network and more
Subnet Masks (VLSM) efficiently use the network’s limited IP address space. For example, point-to-point
Enables the use of inter-router links don’t need a large block of addresses assigned to them. Figure 3-1
subnet masks to better
illustrates an example of an inter-router link.
fit the needs of the
network, thereby
minimizing the waste FA0/0 FA0/1
of IP addresses when 10.10.250.1 10.10.250.2
interconnecting subnets.
10.10.250.0 Network address
10.10.250.3 Broadcast address
10.10.25.0 Subnet
FIGURE 3-1 An inter-router link subnetted to provide for two host IP addresses, a network
address, and a broadcast address
FIGURE P-5
xxi
• Extensive Summaries, Questions, and Problems, as well as Critical Thinking Questions, are found at the end
of each chapter, as shown in Figure P-6.
SUMMARY 62. OSPF multicasts are sent out as what class of address?
a. Class A
This chapter presented examples of configuring routing protocols. The network
challenge exercises provided the opportunity for the student to test her or his con- b. Class B
figuration skill prior to actually configuring a real router. The student should be c. Class C
able to configure and verify operation of the following protocols:
d. Class D
Static
RIP/RIPv2 e. Class E
OSPF 63. OSPF Hello packets are sent out every
ISIS a. 30 seconds
EIGRP
b. 90 seconds
Additionally, this chapter examined the steps for route redistribution. The last sec- c. 10 seconds
tion examined the OSPF Hello packets.
d. None of these answers are correct
64. The Router ID (RID) in OSPF Hello packets is chosen from
QUESTIONS AND PROBLEMS a. Loopback addresses
b. OSPF 16P_Router
Section 3-1
c. Highest IP address on an interface
1. OSPF is (select all that apply)
d. a and c
a. Open Shortest Path First routing protocol
e. b and c
b. An open protocol
c. Developed specifically for TCP/IP networks Critical Thinking
d. Developed specifically for IPX networks 65. You are configuring a router connection to a remote network. What protocol
would you select if there is only one network route to the remote network?
e. A distance vector protocol Explain why you selected the protocol.
f. A dynamic routing protocol 66. You are configuring the routing protocols for a small network. What routing
g. A link state protocol protocol would you select and why?
h. A high consumer of bandwidth 67. Router A and Router B are connected and both are running OSPF protocol. The
following is a sample configuration from Router A:
2. In OSPF, route updates are sent in the form of
interface FastEthernet0/0
a. Link state advertisements ip address 10.10.3.1 255.255.255.252
duplex auto
b. Exchanging routing tables every 30 seconds
speed auto
c. Exchanging routing tables every 90 seconds !
interface FastEthernet0/1
d. IETF packets ip address 10.100.1.1 255.255.255.0
3. The OSPF routing protocol uses these to verify that a link between two routers duplex auto
is active and the routers are communicating speed auto
!
a. LSAs ip route 172.16.0.0 255.255.0.0 Null 0
!
b. Hello packets router ospf 200
c. ARP messages network 10.0.0.0 0.255.255.255 area 0
d. Ping
FIGURE P-6
xxii
• An extensive Glossary is found at the end of this book and offers quick, accessible definitions to key terms
and acronyms, as well as an exhaustive Index (see Figure P-7).
6to4 Prefix A technique that enables IPv6 hosts to Area 0 In OSPF, this is the root area and is the back- Address field (show ip eigrp neighbors command), 125
Numbers
communicate over the IPv4 Internet. bone for the network. administration (Linux), 389
3DES (Triple Data Encryption Standard), ESP, 301 Is system-config- * command, 385
802.1Q This standard defines a system of VLAN tag- Area ID Analogous to OSPF area number, and it is
6to4 prefix (IPv6 addresses), 314 security, 387
ging for Ethernet frames. used by L2 routers.
802.1Q, 18, 24-26 system-config- [tool-name] command, 385
2001:DB8::/32 Prefix This IPv6 address prefix is Areas The partition of a large OSPF network into 2001, DB8::/32 prefix and IPv6 router configuration, 324 system-config-date command, 386
reserved for documentation. This is recommended by smaller OSPF networks. system-config-network command, 388
RFC3849 to reduce the likelihood of conflict and administration commands (Linux)
confusion when using the IPv6 address in examples,
ARIN American Registry for Internet Numbers. Symbols
Allocates Internet Protocol resources, develops df command, 363
books, documentation, or even in test environments. ? (question mark), JUNOS operating system, 161
consensus-based policies, and facilitates the advance- df -kh command, 364
.int Intergovernmental domain registries is used for ment of the Internet through information and educa- history command, 364
registering organizations established by international tional outreach.
treaties between or among national governments.
A kill [PID] command, 361
ARP Address Resolution Protocol, used to map an IP kill -9 [PID] command, 361
{master} The prompt indicating you are in the address to its MAC address. AAA (Authentication, Authorization, and Accounting), 281 man command, 358-359
master routing engine mode on a Juniper router. ABR (area border routers), 112 mount command, 358, 362
arp –a The command used to view the ARP cache. access layer, 6 ps command, 358-361
A Record (Address Record) This maps a hostname to access-list 100 deny udp any any eq 161 command, ACL
ARP Broadcast Used to inform everyone on the shutdown command, 358, 364
an IP address. configuration, 273
network that it now is the owner of the IP address. shutdown -h now command, 364
AAA Authentication, Authorization, and Accounting. access-list 100 deny udp any any eq snmp command, ACL su command, 358, 362
ARP Reply A network protocol where the MAC configuration, 274
ABR Area border routers. address is returned. Tab key shortcut, 364
access-list permit ip any any command, ACL configura-
umount command, 364
Access Layer Where the networking devices in a LAN AS Autonomous System. These numbers are used by tion, 274
up arrow shortcut, 364
connect together. various routing protocols and are a collection of accounting (security), 281
advertise_connected policies, Juniper router route redis-
connected Internet Protocol (IP) routing prefixes. ACK (Acknowledgment) packets, TCP three-way hand-
Access Lists (ACL) A basic form of firewall protec- tribution, 179
Autonomous systems separate organizational networks. shakes, 230
tion used to tell a networking device who and what are advertise_isis policies, Juniper router route redistribu-
ACL (Access Lists), 270-272. See also filter lists
allowed to enter or exit a network. ASN Autonomous systems number is used to distin- tion, 179
access-list 100 deny udp any any eq 161 command, 273
guish separate networks and to prevent routing loops. advertise_rip policies, Juniper router route redistribu-
ACK Acknowledgment packet. access-list 100 deny udp any any eq snmp command, 274 tion, 179
at Asynchronous Transmission Mode (ATM) connec- access-list permit ip any any command, 274 advertise_static policies, Juniper router route redistribu-
address-family ipv6 The command used to
tion for a Juniper router. configure terminal command, 273 tion, 180
specify that IPv6 is specified.
edge routers, 273-275 advertising networks, 75
ATM Asynchronous transfer mode.
Administrative Distance (AD) A number assigned to extended ACL, 273 AES (Advance Encryption Standard)
a protocol or route to declare its reliability. Authoritative Name Server A name server that is false TCP headers, 278 ESP, 301
authorized and configured to answer DNS queries for a hosts, 277
Advertise The sharing of route information. WPA2, 291
particular domain or zone. ip access-group 100 out command, 274 AF33 (Assured Forwarding class 3), VoIP class maps, 441
AES Advance Encryption Standard. A 128-bit block
Automatic Private IP Addressing (APIPA) A IP addresses, stopping data traffic from, 277-278 AH (Authentication Headers), troubleshooting VPN tun-
data encryption technique.
self-assigned IP address in the range of 169.254.1.0– permit ip any any command, 274-276 nels, 300
AF33 Assured Forwarding class 3. Created to ensure 169.254.254.255. placement of, 274 allow-snmp term (filter lists), 279
the VoIP signaling or handshake. remote data hosts, stopping data traffic from, 277 AMI (alternate mark inversion), 38
autonomous-system [AS_Number] This command
AH Authentication Header. A security protocol used is used in JUNOS to define the BGP AS for the router. router logging, 283-285 anycast IPv6 addresses, 314
by IPsec that guarantees the authenticity of the IP show access-list 100 command, 274 AP (access points), NSEL and IS-IS, 113
B8ZS Bipolar 8 zero substitution. A data encoding show access-list command, 275-276 APIPA (Automatic Private IP Addressing), 196
packets.
format developed to improve data transmission over T1 SMB, 273-275 Area ID, IS-IS, 112
AMI Alternate mark inversion. A fundamental line circuits.
standard ACL, 273 areas (OSPF), 102, 105
coding scheme developed for transmission over T1
Backbone The primary path for data traffic to and UDP, 276 A records (Address records), DNS, 214, 218-219
circuits.
from destinations and sources in the campus network. AD (Administrative Distance), 71 ARIN (American Registry for Internet Numbers), IP ad-
Anycast Address Obtained from a list of addresses. address family ipv6 command, IPv6 Internet routing via dress assignments, 191
Backup Designated Router (BDR) The router or
BGP4+, 413
routers with lower priority.
457 473
FIGURE P-7
xxiii
Accompanying CD-ROM
The CD-ROM packaged with the text includes the captured data packets used in the text. It also includes the
Net-Challenge Software, which was developed specifically for this text.
Instructor Resources
The Instructor’s Manual to accompany A Practical Guide to Advanced Networking, (ISBN: 978-0-132-88303-0)
provides the entire book in PDF format along with instructor notes for each section within each chapter, recom-
mending key concepts that should be covered in each chapter. Solutions to all Chapter Questions and Problems
sections are also included. In addition, the instructor can also access 13 lab and lab-related exercises and a test
bank with which to generate quizzes on the material found within the student edition of the book.
xxiv
This page intentionally left blank
NETWORK
1
CHAPTER
INFRASTRUCTURE
DESIGN
Chapter Outline
Introduction 1-4 Routed Network
1-1 Physical Network Design Summary
1-2 IP Subnet Design Questions and Problems
1-3 VLAN Network
Objectives
• Understand the purpose of the three layers • Understand the process of configuring a
of a campus network design VLAN
• Understand the issue of data flow and select- • Understand the issues of configuring the
ing the network media Layer 3 routed network
• Develop techniques for IP allocation and sub-
net design
Key Terms
core show interface status show ip interface brief (sh
distribution layer trunk port ip int br)
access layer Inter-Switch Link (ISL) no switchport
CIDR Switchport mode trunk secondary IP address
ISP switchport trunk encapsu- InterVLAN routing
intranets lation dot1q router on a stick
NAT switchport trunk encapsu- SVI
PAT lation isl DS
Overloading switchport trunk allowed CSU/DSU
vlan vlan_id AMI
supernet
show interfaces trunk B8ZS
gateway
network address Minimum Ones Density
broadcast domain
logical address HDLC
flat network
router interface PPP
VLAN (virtual LAN)
routing table WIC
port-based VLAN
subnet, NET VWIC
tag-based VLAN
multilayer switch (MLS) service-module t1
protocol-based VLAN
wire speed routing show controller t1 slot/
VLAN ID
routed network port
802.1Q
Layer 3 network ATM
static VLAN
SONET Virtual Path Connection
dynamic VLAN
WAN (VPC)
show vlan
terminal monitor (term Virtual Channel Connection
vlan database
mon) (VCC)
vlan vlan_id
terminal no monitor SVC
show vlan name vlan-name
(term no mon) VPI
interface vlan 1
VCI
3
INTRODUCTION
The objective of this chapter is to examine the computer networking issues
that arise when planning a campus network. The term campus network applies
to any network that has multiple LANs interconnected. The LANs are typi-
cally in multiple buildings that are close to each other and interconnected
with switches and routers. This chapter looks at the planning and designs of
a simple campus network, including network design, IP subnet assignment,
VLAN configuration, and routed network configuration.
The basics of configuring the three layers of a campus LAN (core, distribu-
tion, and access) are first examined in Section 1-1. This section also ad-
dresses the important issues of data flow and selecting the proper network
media. Section 1-2 examines IP allocation and subnet design. Section 1-3
discusses the VLAN network, including a step-by-step process of how to con-
figure a VLAN, which provides an introduction to the basic switch commands
and the steps for configuring a static VLAN. Section 1-4 examines the Layer 3
routed network. This section explores the functions of the router and includes
configuration examples in different scenarios.
* Layer 3 switches
Switch A Switch B
Core
segment segment
A1 A2 B1 B2 C1 C2 D1 D2
FIGURE 1-1 The core, distribution, and access layers of a campus network
Distribution Layer
The distribution layer in the network is the point where the individual LANs con-
nect to the campus network routers or Layer 3 switches. Routing and filtering poli- Distribution Layer
cies are more easily implemented at the distribution layer without having a negative Point where the
individual LANs connect
impact on the performance of the network data traffic. Also, the speed of the net-
together.
work data connections at the distribution layer is typically slower than at the core.
For example, connection speeds at the core should be the highest possible, such as
1 or 10 gigabits, where the data speed connections at the distribution layer could be
100 Mbps or 1 gigabit. Figure 1-1 shows the connections to the access and core lay-
ers via the router’s Ethernet interfaces.
NOTE
Hubs are not recommended at all in modern computer networks.
Data Flow
An important networking issue is how data traffic flows in the core, distribution,
and access layers of a campus LAN. In reference to Figure 1-1, if computer A1
in LAN A sends data to computer D1 in LAN D, the data is first sent through the
switch in LAN A and then to Router A in the distribution layer. Router A then for-
wards the data to the core switches, Switch A or Switch B. Switch A or Switch B
then forwards the data to Router C. The data packet is then sent to the destination
host in LAN D.
The following are some questions often asked when setting up a network that im-
plements the core, distribution, and access layers:
• In what layer are the campus network servers (web, email, DHCP, DNS,
and so on) located? This varies for all campus networks, and there is not a
definitive answer. However, most campus network servers are located in the
access layer.
• Why not connect directly from Router A to Router C at the distribution
layer? There are network stability issues when routing large amounts of net-
work data traffic if the networks are fully or even partially meshed together.
This means that connecting routers together in the distribution layer should be
avoided.
• Where is the campus backbone located in the layers of a campus net-
work? The backbone of a campus network carries the bulk of the routed data
traffic. Based on this, the backbone of the campus network connects the dis-
tribution and the core layer networking devices.
The final steps in designing the IP subnet is to assign an IP address to the interface
that will serve as the gateway out of each subnet.
Intranets
Internetwork that Today, only public Class C addresses are assigned by ISPs, and most of them are
provides file and not even a full set of Class C addresses (256 IP addresses). A lot of ISPs partition
resource sharing. their allotted IP space into smaller subnets and then, in turn, provide those smaller
portions to the customers. The bottom line is the limited number of public IP ad-
NAT dresses are now a commodity on the Internet, and it is important to note that there
Network Address are fees associated with acquiring an IP range from an ISP.
Translation. A technique
used to translate an Not many institutions or businesses have the luxury of using public IP addresses
internal private IP inside their network anymore. This is because the growing number of devices being
address to a public IP used in a network exceeds the number of public IP addresses assigned to them. The
address. solution is that most networks are using private IP addresses in their internal net-
PAT work. Private addresses are IP addresses set aside for use in private intranets. An
Port Address Translation. intranet is an internal internetwork that provides file and resource sharing. Private
A port number is addresses are not valid addresses for Internet use, because they have been reserved
tracked with the client for internal use and are not routable on the Internet. However, these addresses can
computer’s private be used within a private LAN (intranet) to create the internal IP network.
address when translating
to a public address. The private IP addresses must be translated to public IP addresses using techniques
like NAT (Network Address Translation) or PAT (Port Address Translation) before
Overloading being routed over the Internet. For example, computer 1 in the home network (see
Where NAT translates the Figure 1-2) might be trying to establish a connection to an Internet website. The
home network’s private wireless router uses NAT to translate computer 1’s private IP address to the public
IP addresses to a single IP address assigned to the router. The router uses a technique called overloading,
public IP address.
where NAT translates the home network’s private IP addresses to the single public
to ISP
2
Wireless Router
(Access Point/Switch/
Broadband Modem)
Router
192.168.0.66 192.168.0.1 128.123.246.55 : 1973
FIGURE 1-3 This example shows the three data connections originating from the home
network of 192.168.0.0/24
Simply put, the IP network must be designed to accommodate the current demand,
and it must be designed to accommodate future growth. Once the size of a network
is determined, a subnet can be assigned. In the case of a single network, the design
is not too complicated. For example, if the network needs to be able to accommo-
date 150 network devices, an entire Class C address, like 192.168.1.0/24, can be
assigned to the network. This will handle the current 150 network devices and leave
enough room for growth. In this example, 104 additional IP address will be avail-
able for future growth.
When allocating IP address blocks, a table like Table 1-2 can be used to provide the
CIDR for the most common subnet masks and their corresponding number of avail-
able IP addresses.
Even with a much smaller network, like the home network, where only a handful
of network computers and peripherals are present, an entire Class C private address
is generally allocated to the home network. In fact, most home routers are precon-
figured with a private Class C address within the 192.168.0.0–192.168.0.255 range.
This technique is user friendly and easy to use and sets aside private IP addresses
for internal network use. This technique virtually guarantees that users will never
have to worry about subnetting the CIDR block.
For a bigger network that must handle more than 254 network devices, a supernet
can be deployed. A supernet is when two or more classful contiguous networks Supernet
are grouped together. The technique of supernetting was proposed in 1992 to Two or more classful
eliminate the class boundaries and make available the unused IP address space. contiguous networks are
Supernetting allows multiple networks to be specified by one subnet mask. In grouped together.
other words, the class boundary could be overcome. For example, if the network
needs to be able to accommodate 300 network devices, two Class C networks, like
192.168.0.0/24 and 192.168.1.0/24, can be grouped together to form a supernet
of 192.168.0.0/23, which can accommodate up to 510 network devices. As shown
in Table 1-2, a /23 CIDR provides 512 available IP addresses. However, one IP is
reserved for the network address and another one is reserved for the network broad-
cast address. Therefore, a /23 CIDR yields 512 – 2 = 510 usable host IP addresses.
Example 1-1
Figure 1-4 shows three different networks with different size requirements. The
needed capacity (number of devices) for each network is specified in the figure.
Your task is to determine the CIDR block required for each network that will
satisfy the number of expected users. You are to use Class C private IP addresses
when configuring the CIDR blocks.
Interconnect LAN B1
Capacity: 800 devices
RouterA RouterB
LAN B2
LAN A Server Network
Capacity: 300 devices No more than 80 servers
Solution:
For LAN A, a CIDR block that can handle at least 300 networking devices must
be provided. In this case, two contiguous Class C networks of 192.168.0.0/24 and
192.168.1.0/24 can be grouped together to form a 192.168.0.0/23 network. Refer-
ring to Table 1-2, a /23 CIDR with a subnet mask of 255.255.254.0 provides 512
IP addresses which more than satisfies the required 300 networking devices.
The next question is to determine what the network address is for LAN A. This can
be determined by ANDing the 255.255.254.0 subnet mask with 192.168.0.0 and
192.168.1.0.
192. 168. 0. 0 192. 168. 1. 0
255. 255. 254. 0 (/23) 255. 255. 254. 0 (/23)
192. 168. 0. 0 192. 168. 0. 0
This shows that applying the /23 [255.255.254.0] subnet mask to the specified IP
address places both in the same 192.168.0.0 network. This also means that this
CIDR block does not cross boundaries, because applying the subnet mask to each
network address places both in the same 192.168.0.0 network.
Based on this information, the next Class C range 192.168.4.0/22 is selected. This
yields a nonoverlapping network of 192.168.4.0, so the subnet 192.168.4.0/22 is a
valid for this network:
192.168.4.0
255.255.252.0 (/22)
192.168.4.0 is not the same subnet; therefore, this is an acceptable CIDR block.
Recall that the CIDR for LANB1 is a /22 and is equivalent to grouping four Class C
networks. This means that LANB1 uses the following Class C networks:
192.168.4.0
192.168.5.0
192.168.6.0
192.168.7.0
Gateway
Data Data
enter LAN exit
For LAN A in Example 1-1, the IP address 192.168.0.0 is already reserved as the
network address, and the IP address 192.168.0.255 is reserved as the broadcast
address. This leaves any IP address within the range 192.168.0.1–192.168.0.254
available for use for the gateway address. Choosing the gateway IP address is not
an exact science. Generally, the first IP address or the last IP address of the avail-
able range is chosen. Whatever convention is chosen, it should apply to the rest of
the subnets for the ease of management. Once the gateway IP address is chosen,
this IP address is reserved and is not to be used by any other devices in the subnet.
Otherwise, an IP conflict will be introduced. The following is an example of how
the gateway IP addresses could be assigned to the LANs in Example 1-1.
Network Gateway
LAN A 192.168.0.1
LAN B1 192.168.4.1
LAN B2 192.168.8.1
2nd floor
1st floor
FIGURE 1-6 Three floors of a building interconnected using switches to form one large LAN
VLAN 2 VLAN 3
Ports 2,3,4 Ports 6,7,8
Dynamic VLAN • Dynamic VLAN: Ports are assigned to a VLAN based on either the computer’s
MAC address or the username of the client logged onto the computer. This
Ports are assigned to a
VLAN based on either means that the system has been previously configured with the VLAN as-
the computer’s MAC signments for the computer or the username. The advantage of this is the
address or the username username and/or the computer can move to a different location, but VLAN
of the client logged onto membership will be retained.
the computer.
VLAN Configuration
This section demonstrates the steps for configuring a static VLAN. In this example,
the ports for VLAN 2 (Sales) and VLAN 3 (Engineering) will be defined. This re-
quires that VLAN memberships be defined for the required ports. The steps and the
commands will be demonstrated.
The show vlan command can be used to verify what ports have been defined for the
show vlan switch. By default, all ports are assigned to VLAN 1. An example using the show
Used to verify what vlan command is provided next.
ports have been defined
for the switch. SwitchA# show vlan
On newer Cisco switches, users will get the following message that the command
vlan database is being deprecated:
% Warning: It is recommended to configure VLAN from config mode,
as VLAN database mode is being deprecated. Please consult user
documentation for configuring VTP/VLAN in config mode.
Cisco has moved away from the VLAN database-style command to an IOS global
command. Similarly to other IOS global commands, the switch must be in the con-
figuration mode (config)#. However, the concept remains the same that a VLAN
must be created for it to be activated and ready for use. The steps for creating the
VLAN on newer Cisco switches are as follows:
SwitchA# conf t
SwitchA(config)#vlan 2
SwitchA(config-vlan)#name Sales
SwitchA(config-vlan)#vlan 3
SwitchA(config-vlan)#name Engineering
SwitchA(config-vlan)#exit
SwitchA(config)#exit
To start configuring a VLAN, one must specify which VLAN needs to be config-
vlan [vlan_id]
ured using the vlan [vlan_id] command. If the specific VLAN does not exist, this
command will create the VLAN as well. As shown in the preceding example, the The IOS global command
used to create VLAN ID.
command vlan 2 is entered to configure vlan 2 and then the command name Sales
is entered to configure the name associated to the VLAN. The similar steps are
done for VLAN 3 with the name Engineering.
This shows that both the Sales and Engineering VLANs have been created. In the
next steps, ports will be assigned to the newly created VLANs. This requires that
the configuration mode be entered and each FastEthernet interface (port) must be
assigned to the proper VLAN using the two commands switchport mode access
and switchport access vlan vlan-id. An example is presented for FastEthernet in-
terface 0/2 being assigned to VLAN 2 on a Cisco switch:
SwitchA#conf t
Enter configuration commands, one per line. End with CNTL/Z.
SwitchA(config)#int fa 0/2
SwitchA(config-if)#switchport mode access
SwitchA(config-if)#switchport access vlan 2
SwitchA(config-if)#end
The next step is used to verify that FastEthernet 0/2 has been assigned to the Sales
VLAN (VLAN2). This can be verified using the show vlan brief command, as
shown. This command only displays the interfaces assigned to each VLAN:
SwitchA#sh vlan brief
The next steps are to assign ports 3 and 4 to the Sales VLAN (VLAN 2) and ports
6,7,8 to Engineering (VLAN 3). Once this is completed, the port assignments can
be verified using the show vlan command, as shown:
CHAPTER X.
THE SICK-BED.
CHAPTER XI.
THE MISTAKE.
Some time elapsed before Kummas found himself able to resume his
journey. The bread and cheese remained untouched, which,
however, Malchen put into her basket; and the starling, yet warm,
she again placed in her bag. They went a long way without
speaking; at length Kummas broke the silence--"I now believe," said
he, "that it was Christlieb who destroyed your grandfather's nets!
Who could have thought him such a liar, unless to-day we had had
the most convincing proof of it! So it would appear there is no
knowing people; not even if we do eat a bushel of salt with them!
Who is to be trusted?"
"Trust me," said Malchen confidently.
"You!" replied Kummas, smiling in bitterness of feeling. "Why, I
would have built houses on Christlieb,"----
"And on me too, father, and bridges into the bargain," continued
Malchen. "You must not take it amiss if I say that perhaps you have
been too hasty in turning back. The wine may have affected
Christlieb; and if he had been alone he might have spoken
differently."
"'Drunken words, true words,' says the proverb," answered
Kummas; "and had I been a king, and Christlieb only a cowherd,
would I have been ashamed of him? His comrades, the young
players, are no better than we are! Am I not a musician as well as
they? If Christlieb is already so proud, what will he be when he
becomes a Paganini? It would have been my greatest joy if I could
have taken my place behind him and said,--See, I took this Paganini
out of a manger, and brought him up in a violincello!"
"He will come to his senses again," whispered Malchen, "when
he has had his own way for a time."
"No, no; he must be a demon to have acted as he has done,"
replied the much injured Kummas.
"Don't speak in this wicked way, father!" rejoined the young girl;
"have you no longer a spark of love for your Christlieb?"
The old man stood still, strove with his feelings for a few
minutes, and then said more mildly, "God forgive me! I am too
severe; and yet I mean it not in earnest. Yes, Malchen, I would
joyfully give up my life, if by so doing I could make Christlieb what
he was, although he has broken my heart."
They soon came to the town where they had rested the
previous night, and which was now all bustle and confusion,--it
being the day of the yearly fair. With difficulty the wanderers pressed
through the moving crowd. As they turned the corner of a street
close to the market-place, they met a man and his wife, the former
blind, and playing on a pipe; the latter, whose countenance was the
colour of copper and much swollen, was playing on a barrel organ,
accompanying it with her screeching voice.
Kummas started at the sight of them. "Look!" he said to
Malchen, "that miserable pair might have been sitting comfortably in
a warm house had they acted properly. The blind man was the
landlord of a small inn in the village of Toumern, where I often used
to play. His wife drank up everything, and brought herself and her
husband to begging. They are called Hicup."
While Malchen was looking at the man and woman a scene
occurred, not at all unusual in such places and at such times. A
rather aged woman, carrying on her bent back a small raree-show,
pushed her way into the midst of the throng, where the two
wretched musicians had taken up their quarters; and here, by the
assistance of a companion who was along with her, the show was
lifted from her back, and arranged for the benefit of the idle and
curious passers by. This attracted the notice of dame Hicup, who,
seeing her domain invaded, began most furiously to abuse the
woman, when a serious quarrel took place. In the progress of the
squabble our former hostess of the nether inn was somehow or the
other enlightened in a way about her rival, which quite changed the
character of her abusive epithets. In order to be the more able for
her work, dame Hicup left her tambourine on the top of the organ,
and advanced to the show-woman with arms a-kimbo. "So you have
given up the crockery and stoneware trade!" she shouted to her
antagonist in the fine arts. "Have you not another pair of brats to
give me? I can tell you where one of the two is which you left with
me fifteen years since. He is now a beer-fiddler, and may help you to
earn your bread. He can play while you exhibit your trumpery
pictures. Bless me! is that you, Kummas? I will now confess that I
put your Christlieb in the manger at the door of the inn, from which
you took him out and carried him home. If I had known that you
were so fond of children, I would have given you the other young
one too, his brother. They were as like as two drops of water. You
may thank this woman for your foundling, and ask her where she
got them. It was easy to be seen they were not her own, the thief
that she is! Oh, you child-stealer!" she shouted to the woman with
the show, who turned pale, and quickly disappeared, leaving the
field to her victorious enemy. Seeing this, dame Hicup redoubled her
abuse and her scolding; and her shouting soon collected a mob,
from the midst of which Kummas and Malchen could scarcely make
their way out, as they thought they had heard enough to enable
them to regulate their future movements.
When Kummas had recovered from the surprise which the
conversation of the woman had caused, he turned to Malchen and
said, "Did you hear, Malchen, that Christlieb had a brother who was
his very counterpart? Might the gay-looking youngster we saw this
morning not have been he, while the real Christlieb is still in the
tower? My Christlieb had no mole on his left temple, and I think that
jackanapes had."
"Now," replied Malchen, "there can be no doubt as to the
person who let the birds of my grandfather escape, and destroyed
the nets."
"Come, then, let us retrace our steps," said Kummas, in a more
cheerful voice. "It is fortunate we were no further away. I would not
have missed the hearing of this quarrel for all the treasures in the
world." In spite of weariness, Kummas stepped briskly on, while
Malchen skipped merrily after him. Even the dead starling was for
the moment forgotten.
The quarrel of the two women had not been without important
results. The magistrates had thought it incumbent on them to
interfere, and both vagrants were taken to prison. In the course of
evidence the truth was not, however, altogether brought out, as the
old woman stoutly maintained the children to be those of her
daughter, who had been long dead; but confessed that she had left
them in the house of dame Hicup. The further examination of the
prisoners was therefore deferred until various inquiries had been
instituted, and notices of the case put into all the public papers.
Meanwhile Christlieb lay ill in the house of the director of the police
at the capital, whose owner, in company with his son's tutor, Mr.
Werter, was searching for the runaway Balduin. Kummas, followed
by Malchen, was making the best of his way towards the small town
in which dwelt the leader of the town-band, where Christlieb was
expected to be found.
CHAPTER XIII.
THE BAD RECEPTION.
Balduin and his companions had reached the same town. This
happened the very day after Christlieb had been taken to the capital,
towards which he had been driven by the memorable event of the
breaking up of the ice. The river was still here and there covered
with huge pieces of ice, while it had far overflowed its banks. The
young adventurers, with many others, stood on the edge of the
stream looking at its singular appearance.
"There must be a beautiful view from the tower up there,"
thought Balduin, as he pointed to poor Christlieb's late abode. "Who
will come with me up the long staircase, and see what is to be
seen?"
"As we have nothing better to do, we may as well all
accompany you," said one of his companions; and they quickly
walked in the direction of the cathedral. They passed a baker's shop
on their way, which another of them perceiving, exclaimed, "I am
sure the view will be seen to much more advantage if we are
provided with some cakes or biscuits. Give me the rest of your
money, Balduin; and if you will go up and find the best place for us
to have a view from, we will follow directly with something nice to
eat, and a small bottle of cordial." He gave the other two youths a
most significant wink, which they were at no loss to comprehend.
Balduin completely emptied his now scanty purse, gave all he had to
his faithless friends, and began to ascend the steps of the tower.
"Now, my good fellows, it is high time for us to beat a retreat!"
shouted the false friend to whom Balduin had given the money. "We
must go back to our tutors and make them believe that we have
repented of our doings, and left our leader Balduin, in order not to
be corrupted by his wicked society. As I said to-day already, Balduin
shall be our scape-goat; we have had a merry life this last fortnight
at his expense."
The others agreed; purchased some cakes to eat on the road,
and at once began their homeward journey.
Almost breathless, Balduin reached the top of the steps, and
rung the bell at the shut door of the stadt-musikus, which was
opened to him by the servant girl. "Bless me!" she exclaimed in
joyful surprise, "is that you, Master Christlieb? Where have you come
from? And where have you got the fine clothes? I scarce would have
known you, you are so changed. What will the master and mistress
say, who have been in such a way about their kettledrums? We were
afraid that, last night, you had been on the ice when it broke up so
suddenly, and that you were drowned."
Balduin looked very stupid at this unexpected harangue. "I am
surely bewitched!" he muttered to himself. He turned round to
descend the steps, not in the best humour, when he was prevented
by the appearance of Mr. Dilling, Mrs. Dilling, and all the scholars,
who had heard the exclamation of the servant, and came out to see
Christlieb, and to hear what happened to him.
"Where have you the kettledrums?" asked the town musician in
a voice of thunder, looking very suspiciously at Balduin's fine dress.
"Sold, pawned, made away with, I have no doubt!" seizing as he
said this, the petrified Balduin by the neck.
"Where are the drums?" screamed the angry lady, shaking her
clenched hand in his face.
"Where are the drums?" echoed the malicious boys, delighted at
the embarrassment and distress of their companion.
"The drums!" stammered out Balduin, his lips quivering with
passion.--"What do I----?"
"Yes, the drums! the drums!" bellowed out Mr. Dilling,
accompanying his words with blows and pinches of the ear. "I will
have my drums, which cost thirty-six dollars, and twenty groschens.
I say, where are they? Where have you got these fine clothes? Are
not my drums pawned for them?"
"Let the boy speak, Mr. Dilling," said Rupel, gently.--"He may be
quite innocent. In consequence of the breaking up of the ice, he
perhaps was prevented crossing the river last night, and had to walk
all the way to the capital to cross the bridge; then to come here; and
how could he carry the heavy drums all that long way? Most likely he
has left them at the inn where the concert was."
"But where has he got the fine clothes?" said Mr. Dilling in a less
angry tone.
"That I know not," answered Rupel; "Christlieb himself will be
able to explain it all, I am sure; only let him speak."
"Where are my drums?" asked now Mr. Dilling in a composed
voice.--"Speak, and tell me where you got these fine clothes!"
"These clothes are my own property," replied Balduin haughtily;
"and as for your drums, I know nothing about them."
Scarcely were these words uttered, when the stadt-musikus,
more enraged than ever, flew at the unfortunate speaker, and began
to beat him without mercy. In vain poor Balduin attempted to speak,
in vain he tried to defend himself. Even Rupel's remonstrances were
not listened to in the midst of the uproar.
Such treatment had the over-indulged Balduin never before
received. He was stunned, stupified, and, for the first time in his life,
afraid. Whenever he opened his lips to offer some explanation, he
was stopped by Mr. Dilling thundering out, "Silence, sir!" and raising
his hand to give him another blow. Balduin anxiously awaited the
arrival of his three companions, in the hope that they would
extricate him from his unpleasant situation; but poor Balduin waited
in vain. He seated himself in a corner of the room, weeping bitterly
from pain and anger, while the enraged master gave vent to the
remainder of his wrath in scolding words.--"I would have the rascal
arrested," he continued, after a volley of abusive epithets; "did I not
need him to-day; indeed I cannot do without him at the concert
which is to take place in the town, and at which he is to play the
oboe. Come along, we have no time to lose; evening will soon be
here, and as yet we have no rehearsal; all on account of that
worthless fellow. Make haste!"
The music-stands were immediately set up, the instruments in
the hands of the pupils, and the miserable Balduin shown where he
was to take his place. When the oboe was thrust into his hand by
one of the boys, he exclaimed, "But, indeed, I cannot----"
"Is he again daring to speak?" cried Mr. Dilling, taking hold of a
stick, and threatening to strike him.--"You are there, sir, to blow, and
not to reason."
In despair, Balduin took the instrument, and, after a few
unsuccessful attempts, raised the mouthpiece of the oboe to his lips,
and placed himself before the music-stand. The overture began, and
Balduin blew as if his cheeks would crack; when suddenly an evil
spirit seemed to have taken possession of the town musician. Purple
with rage, he sprung from his place and struck the unfortunate
player a dreadful blow on the head, saying, "What wretched playing
is that?--do you mean to make a fool of me?"
A stream of blood from Balduin's mouth was the only answer;
and the concert speedily came to an end; for Balduin fell senseless
into the arms of Rupel, who came to his aid. From the violence of
the blow the under end of the oboe had struck against the music-
stand, while the sharp point had pierced Balduin's throat.
"That is all pretence," stammered the now pale-faced master.--
"Wife, give the lad something to gargle his throat with. There is very
little the matter with him."
Balduin, however, soon showed that something serious was the
matter. He gasped for breath as if in agony, and fresh streams of
blood gushed from his mouth. His companions now all looked very
grave, and there was an end of their jests. Rupel assisted the
unhappy youth to his bed, and then went away without saying
where he was going. When Mr. Dilling (who was rather alarmed at
what had happened) missed him, he cried out, "Where has Rupel
gone to?--Does he mean to make a noise about the matter? Is he no
better than an idle chatterbox? I tell you what it is," turning to the
others, "if any of you dare to say one word of this in the town, I will
knock your heads off. I am tormented enough to-day by the loss of
an oboist. The good-for-nothing scoundrel;--he is the cause of the
whole disturbance."
The door-bell now rang. "Who is there?" asked Dilling, half out
of his wits, as he pushed aside the servant and went to open the
door himself. "What do you want?" he asked, in no gentle voice, the
two strangers who presented themselves. "My tower is no dove-cot,
and there is nothing to be had here."
"We do not want anything, sir," answered the honest Kummas;
"we only come to visit my Christlieb Fundus, the little Paganini."
"Your Christlieb?" asked Dilling in a shaking voice. "And who are
you, may I ask?"
"Christlieb is my foster-son; and, with your permission, I am the
musician Kummas, from Gelenau. This is Malchen, the child of an old
neighbour of mine who is dead; she sings like a lark. We have come
a long way to see our Christlieb; so have the kindness to tell us
where he is."
During this speech the unhappy Mr. Dilling stood as if on red-hot
coals. Collecting all his strength he then muttered, "Truly, you sent
me a fine specimen of a youth! The rascal has run away, pawned, or
sold my kettledrums, to buy himself gay clothes. But I will bring him
to the house of correction for this."
Kummas was as if struck by a second thunderbolt. He reeled
backwards, and would have fallen, had not Malchen supported him.
"Can this be true?" he said in a low voice to himself.--"Heaven have
pity on me! is he really lost?--lost beyond hope!" His head sank on
Malchen's shoulder, and he stood mute as a statue.
Warring with his feelings, Mr. Dilling looked at the old man and
his companion. He hemmed and coughed, but could not utter a
word. At length Kummas said, in a voice of sadness, "And where is
my former Christlieb, who now, it seems, neither regards God nor
me?"
"How do I know?" replied the embarrassed town musician.--"I
tell you he has ran away."
"Come, then, Malchen," said the old broken-hearted man; "I
have now nothing to seek but a grave. There, in its stillness, I will
rest my weary head; for I am desolate." With these words Kummas
turned to go away, and Malchen, weeping, led him carefully and
slowly down the steps from the tower. Dilling looked long after them
irresolute; but the fear of blame shut his mouth, and he went back
into the house, where, in his room, his wife and servant were busy
washing away the marks of the blood. Half-way down the steps,
Kummas paused to take breath near an open window. "Let me rest
here a few minutes, Malchen; the fresh air may revive me." Both
stood in silence; but without eyes for the beauty of the scene around
them. After a short time they heard the voices and footsteps of
persons ascending the staircase.
"I pray you, doctor, do all in your power for the youth," said one
of the persons.--"He is the best player of us all."
"Which of them is it?" asked the other.
"It is Christlieb Fundus," replied the first speaker; "the best
player on the violin. Show the master that there is some cause for
alarm, so that he may not treat the matter as a trifle. I tell you, a
stab from a dagger could not be worse than one from the sharp
point of an oboe."
At the name of Christlieb, Kummas had become attentive to
what was said. A ray of hope gleamed upon him, and he raised his
head, awaiting, most anxiously, the appearance of the speakers,
who, in a moment or two afterwards, reached the place where he
was standing. He addressed them in a voice struggling with emotion.
"Kind sirs," he began, "for the love of heaven, tell me where my son
Christlieb Fundus is, and what is the matter with him? Has he really
run away? or is he sick?"
A glance at the old man was sufficient to determine Rupel to
speak the truth.
"If Christlieb is your child, then I will not disguise from you that
he has received an injury, and is lying very ill in his bed. Your arrival,
though not at the happiest time, is nevertheless fortunate."
"One word more," said Kummas, as Rupel and the doctor were
hurrying past;--"is my son really so wicked as the master affirms?"
"The Master!" repeated Rupel, surprised, for he supposed that
the two travellers were only on their way up.--"Your son has been
always good and well-behaved, and in a single day he could not
become the very reverse."
Kummas became less sad; as he would far rather his child were
sick in body, than perverse in mind. Malchen and he soon reached
again the top of the stairs, and were not long in seeing their
favourite, whom they found already under the hands of the doctor,
and in a most dangerous state. At this moment, neither of them
thought of the mole on the left temple, nor of the fine clothes which
were strewn about the room. Kummas and Malchen attended to all
the wants of poor Balduin, who, unable to speak, could neither
thank them nor unravel the mystery. He now passed through a
severe school, which, however, became the means of his radical
cure. For three long days he was unable to swallow anything, in
consequence of his swollen throat. Afterwards, his medicine and a
little tea had to be taken in drops. He was helpless as a child, and
had it not been for his youthful strength, the care of the doctor, and
the unremitting watchfulness of the old man and Malchen, he could
not have recovered. He no longer refused their assistance, but gladly
took from the hand of Malchen any cooling draught she offered.
Their constant presence lessened the tediousness of the slow
creeping hours. How could he have remained insensible to so much
love,--to the self-denial exercised for his sake by two persons wholly
unconnected with him! When Balduin's sleepless eye, sometimes,
during the night, fell on the old man, who, overcome by sleep, was
resting on his hard bed of straw, with a thin cover over him,--when
he heard the loud regular stroke of the pendulum above his head,
sounding as it seemed a death-knell, and saw by the glimmering
light of the feeble lamp the black walls of the tower,--then came the
elegant dwelling of his father, with all its luxuries, before the eye of
his mind. He thought of his gentle mother, who had only been too
indulgent to him, and whose heart, as well as that of his affectionate
father, he had made sad by his ingratitude. He remembered the
treachery and desertion of his three companions; and, overcome by
a deep sense of his former thoughtlessness and guilt, he resolved
from henceforth, to endeavour to be quite a different character.
Remorse had touched his heart, his eyes were opened, and he
prayed to God for forgiveness,--to that God who had long, by gentle
and gracious means, sought to lead him into paths of virtue, but
who now had seen it needful to teach him by affliction and adversity.
Balduin, subdued and humbled, now enjoyed the peace which is
above all price; and his bodily health amended with that of his mind.
CHAPTER XIV.
THE REUNION.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookultra.com