I spoke briefly about wireless in a previous post. Here, I’ll discuss some observations from on-the-job learning.

Frequencies

In our setting, the main frequencies we use are 2.4GHz and 5GHz, which is newer. There a pros and cons to each which, although known in theory, can still require on-site experimentation and measurement (with a wifi analyzer) to find the best options. Also, some devices deployed still can’t use 5GHz, so we have to keep that in mind as well.

2.4GHz has lower bandwidth, so it can’t carry data as quickly, BUT it isn’t disrupted as much by walls and has a longer range the 5GHz.  5GHz is faster BUT it has less range and has a harder time getting through walls. This means that knowledge of the AP (access point) placement, as well as the design of the building and expected working areas, is required to determine which frequency to use. Fortunately, the devices we deploy have (at least) two antennae, so we can broadcast on both frequencies.

We also have to be mindful of the standards supported by the devices themselves. This is seen in the “letters” that often follow the channel or frequency listing. The letters reference that actual IEEE standard for the technology – 802.11, 802.11b, 802.11a, 802.11g, 802.11n, and so on. Newer technologies support higher link rates, and different frequencies, but older devices may not support them. We’ve had a few locations where we’ve had to use older, slower technologies because that’s all that was supported on the client devices themselves.

Channel Width

Moving along, we also have Channel Width – this is essentially how “wide” our signal is allowed to be within the frequency we’re using. For example, 2.4GHz is a range of frequencies from 2.4GHz to 2.5GHz – a 100 MHz range. The more channels we have, the more devices can communicate, BUT the more likely they are to interfere with each other, and the less bandwidth available to them. So channel width is a tradeoff between channel overlap and bandwidth – the more bandwidth we allow, the fewer channels available.

 Wifi Network Type

In our setting, we have three WiFi network types available – bridge, ad hoc, and mesh.

In Bridge networks, the Access Point is basically just a “bridge” back to the main network device (a firewall in our case). If we use integrated Access Points, we can define all of the wifi information on the firewall, plug the APs in, and they’ll just work. If we use other-vendor APs, we have to define the SSID etc. on the AP, which, when connected to by a wireless device, “bridges” the signal back to the firewall.

I’ve only seen an Ad Hoc network once – this is when the devices just communicate directly with each other over wifi. We only had to do it when the network died, so we got the sales PC wirelessly talking to the sales printer. It was ugly and I don’t recommend it at all if other options are available.

Finally, there’s Mesh wifi. We’ve only had to use it when there’s no easy way to get a wired connection from the APs back to the main network. In Mesh Networking, the AP doesn’t just wireless communicate with the client devices; it also uses a wireless connection to get back to the main network hub.

Conclusion

All that said, we’re fortunate in that, for the most part, our wifi setup is pretty straightforward. We configure the SSID and password on the firewall, plug in our (same-vendor) APs, and done. It’s rare that we have to do much more than that.

I’ll say up front that I’ve had less experience with these, but hopefully it’ll be somewhat useful. I’ll address Wireless up front, as all the rest are some type of wired media.

Wireless/WiFi

This is WiFi/Wireless that’s used by cell phones, tablets, and wifi-enabled laptops & desktops. It has the advantage of not requiring a wire (obviously), but it has a few downsides as well. In my experience, I always prefer wired if I can because of these downsides. First, walls and distance become a factor that can make wifi unreliable or unavailable. Also, the transmission speeds tend to be lower due to the signal being attenuated over distances & through obstacles. Also, it can technically be less secure as it’s easier for a less tech-savvy user to use an insecure connection method which allows their traffic to be intercepted. But obviously, the advantage of being mobile and able to use the device is much superior to the downsides in certain settings.

The rest of these are wired methods

Ethernet

This is the common “computer cable” you’re used to – Cat5, Cat6, “networking cable”, “weird phone cable”, etc. The Cat-* just indicates which generation the cable is. Higher numbers are later generation and are faster & more modern. Compatibility can be an issue, so don’t assume that buying a more recent cable will automatically make the connection faster, as the other network equipment may not support it.

Ethernet uses the RJ-45, which, when on the phone with non-tech savvy folks, I will summarize as “a wider phone connection, but too large to fit into a phone jack).

Ethernet is cheap and common, but there are length restrictions to it – you can’t run an ethernet cable hundreds of feet and expect a good connection (though I’ve had customers try that). After a few hundred feet, you’ll need SOMETHING to boost the signal – either a switch or a dedicated device.

For longer runs, we use:

Fiber

Fiberoptic cable uses one (or more; usually more) tiny, thin glass threads to send the signal along at near-light speed. While it can handle longer distances and is much faster than ethernet, it’s a lot more fragile (since the inside is glass threads instead of copper wires). So we either 1) use it in short runs to connect switches to each other, since that’s usually locked away in a network closet, or 2) run it through conduit longer distances to provide fast connections more remote locations.

Coax[ial] Cable

You’re probably used to seeing this as the Cable connection for the TVs. We don’t use it ourselves, but it is commonly used by ISPs to connect their cable run to their equipment, which we then bridge to our equipment either with Ethernet or Fiber. I see it as something of a tradeoff between Ethernet and Fiber – it has the long-range of Fiber and the sturdiness of Ethernet, with a price that’s probably in the middle (although I haven’t priced it out in a while). But it’s not as fast as Fiber, so, since we CAN get fiber and run it, we tend to use that for the backbone of our networks (connecting our switches to each other and eventually to the firewall/routers), as fiber doesn’t have as much issue with traffic congestion as cable does.

SFP Modules

Fortunately, most of our equipment comes with “SFP” module interfaces. This is a great feature on our equipment where it comes with an empty port. Into that port we plug an SFP (small form-factor pluggable) module which functions like a converter to ethernet, fiber, coax (and other) interfaces. So if we decide to swap what cable/wire we want to use, we can just replace the SFP module instead of the entire device. As indicated above, this is usually starting with an Ethernet SFP and then switching to a Fiber SFP when we need to handle more traffic.

Here’s some pics of SFP modules (shared with Creative Commons licenses)

Ethernet SFP module
Fiber SFP

In my last post, I discussed different devices that move your piece of information (“packets”) around your network, and also out to OTHER networks on the internet. In this post, I’ll look at a few different TYPEs of packets and what they do. Additionally, some protocols use custom “Ports” – not a physical port like a plug, but a software-defined port which is added as a “tag” to the network traffic to help the network devices understand what it is & where it’s going.

Ping

Ping is great for troubleshooting connection issues (which will be discussed more in a later post). Ping sends a packet out to an IP address that’s designated in the command and reports how long it takes to get a response, OR the error that arises if no response is given. There’s also the helpful -a flag which will try to resolve the Hostname for the IP via DNS (see below).

Tracert

Tracert is great for 1) determining how the traffic is flowing from your PC to the remote IP and 2) see where the connection is “breaking down” if it’s not resolving. It’s a pretty brilliant piece of software under the hood – basically, it increments the number of allowed “hops” (moves from one IP to another) and builds the chain that way. So first it tries to go to your destination IP but only allows 1 hop – so it’ll stop at the next IP in the chain (either your switch or router, probably), which then will report that there’s no more allowed hops and will give its name/IP. Then, tracert increments the allowed hops to ‘2’ so it will get to the next device IP, which will report on itself. It does this until it finally gets to its destination, and then reports the full list of IPs & hostnames. OR, if it fails to reach, you can see WHERE the failure occurred – somewhere AFTER the last successful IP/device.

SSL/TLS

Secure Sockets Layer and Transport Layer Security are cryptographic protocols for increasing security of network traffic. While the encryption methods & authentication systems are outside the scope of this post, they use a series of secret keys to encrypt & decrypt the data at each end of the traffic. Many older protocols will have a version with “S” appended to the end, indicating that it’s the Secure version.

SMTP/SMTPS

This is an actual data protocol, versus a troubleshooting one. In our setting, Simple Mail Transfer Protocol is used by 1) email servers delivering & receiving email to each other and 2) hacked computers sending spam. So on our firewalls, we ALLOW a local email server to send SMTP traffic, but BLOCK anything else from doing so.

A variant of SMTP is SMTPS (the S is for Secure) which is more secure as it uses TLS (Transport Layer Security) to authenticate the servers to each other to prevent security leaks. SMTP uses port 25, while SMTPS uses port 465. Some common email providers use alternate ports for SMTPS.

HTTP/HTTPS

This is your “web browsing” traffic – hence all webpages start with “HTTP(s)://). Hyper Text Transfer Protocol allows you to click on webpages and go to other webpages, or download something, etc. HTTP uses ports 80, while HTTPS (secure) uses 443.

FTP

File Transfer Protocol is used for transferring files from one system to another. It uses ports 20 & 21, based on what exactly is being done in the protocol (setting up the connection, reading files, or writing/sending them).

SSH

Secure SHell is used to remotely connect to other systems via a command line. It uses port 22. It’s helpful for remotely managing and working on other systems without having to setup a full Graphical User Interface. It can also be used to transfer files (SCP, SFTP).

DNS

Domain Name System is used to resolve IP address (like 64.233.177.138) to a Hostname (in this case, “google.com”). Computers only know numbers, while Humans prefer names. DNS is the “glue” to convert one to the other. It uses port 53.

DHCP

Dynamic Host Configuration Protocol, usually on ports 67 & 68, is used to determine what IP address a new device on the network will have assigned. A dedicated DHCP server is responsible for assigning the minimum information required to devices that ask. Generally, that’s

  1. The IP address (what’s my local address on this network),
  2. The subnet mask, used to determine how large the local network is so a device knows if an IP is nearby OR if it needs to send the traffic to
  3. The IP of the Default Gateway, which is a routing device that will handle traffic needing to leave the local network.

The local PC will get its IP address, and then use the Subnet Mask to calculate what OTHER IPs will be on its local network. That way, if it needs to communicate with something directly, it’ll do so. Otherwise, it’ll know the IP address of the Default Gateway and will send the network traffic to THAT IP and allow the Gateway to handle moving it to its correct destination. Every device on the way will use this same structure to get the packet to where it needs to go.

This is already longer than I had intended, but this hopefully addresses the more commonly encountered ports & protocols.

This is the first of (hopefully) a serious of learnings, observations, troubleshooting steps, and informative stories learned at my new IT job.  While the job is generally “all IT related”, most of it is network-related due to the interconnectedness of everything among my employer’s systems. So, most of these posts will probably be somewhat network-related. Also, this will hopefully be used to for my CompTIA Continuing Ed credits if I end up not getting Security+ for that.

In this first post, I want to discuss the various pieces of networking hardware and their purposes. All of these are items I work with regularly at work, but they can also be encountered in a home setup.

Routers

                Routers handle…routing. That is, when a piece of information needs to travel on the network (aka a “packet”), the routers handle moving that packet FROM one network TO another (this differentiates them from Switches, below). In a later post I’ll discuss how the equipment knows what to do, but in the meantime just think of a router as a device that helps packets move outside their home network and find where they should go next.

                Many devices include a routing function – firewalls, dedicated routers, and so on. In a home setting, your ISP-provided equipment includes a router so that packets can get outside your home to the rest of the internet.

Switches

                A switch is, basically, a way to plug multiple network connections into a single device, which is then itself plugged in via a single cable somewhere else. A common setup might be that each PC/smart TV/etc. on a single floor of a building is plugged into a single switch for that floor (or, in a smaller building, a switch for the entire building). Then, the switch has a single cable run from it to another destination (a “master” switch, or a router/firewall). This removes the requirement to have EVERY cable from EVERY device plugged into your firewall/router.

Firewalls

                I’ve mentioned firewalls several times. These are a security device that handles packet/traffic flow according to pre-determined rules setup inside it. I think of a firewall as “a device that routes packets from one port to another based on the rules you set”. In my settings, the firewall sits between the switch(es), which are plugged into its “LAN” ports, and the ISP equipment, which is plugged into the firewall’s “WAN” port(s). Inside the software of the firewall, we determine what traffic can flow where (LAN to WAN and vice-versa) according to business needs.

                More advanced firewalls can also have routing functions, switching functions, DHCP/DNS functions, and more.

Access Points (APs)

                In our settings, APs are wireless APs. Via an ethernet cable run from the firewall/switch to the AP, the AP then broadcasts a WiFi signal for wireless devices to connect to. Based on the setup, they either expand an existing WiFi network, OR serve an independent wifi signal that’s routed back via the ethernet cable to the main network.

VPN

                Virtual Private Networks (VPNs) are a (usually) software-defined network that runs on computer. In  our setting, it’s an app that, after logging into it, connects via an encrypted tunnel to a firewall somewhere else. All traffic is 1) routed through the tunnel. This mean it can’t be snooped on our monitored in-transit, for security purposes. Additionally, since it “comes out” on the other end of the tunnel at the business firewall, 2) the computer can function as if it were physically plugged into the network at the business. This means that a laptop can connect to local resources at the office, but, when taken home, the VPN can be connected so the laptop can STILL connect to “local” (at the office) resources WITHOUT sacrificing security or having to allow those resources to have an open, inbound connection.

Summary

A common “connection” flow might be something like this:

INTERNET -> ISP Equipment -> Firewall/Router -> Switch(es) — many connections to different devices and access points. Additionally, a VPN (in our setting) logs into the Firewall and would be branches off of that.

That concludes a brief survey of networking equipment and applications. Next week, we’ll look at various Ports & Protocols that network traffic uses, and how that can be used on a firewall for increased security.

<– Part 225 – November 10, 1918 | Part 226 – November 17, 1918 | Epilogue 1 –>

“At the eleventh hour on the eleventh day of the eleventh month, the guns fell silent.”

New York Times November 11, 1918

The Armistice of Compiègne, agreed upon at 5am (Paris time), signed between 5:12 and 5:20, and finalized at 5:45, declared the end of fighting at 11am. Within the railcar headquarters of French Marshall Foch, the final belligerent facing the Entente, the German Empire, agreed to the occupation of the Rheinland by the four Allied powers – U.S., Belgium, Britain, and France; the annulling of the Brest-Litovsk treaty that took advantage of weakened Russia; and other concessions regarding militaries, navies, and more. The armistice will hold until December 13, with extensions as necessary.

Entente artillery kept firing until the last moments to avoid having to carry away the ammunition, as well as to be ready in case negotiations broke down. There were 11,000 casualties in the last 11 hours of the war. A major offensive led by the Belgian army was interrupted, as the armistice surprised them; one-third of all Belgian casualties were in the last month.

The final soldiers from each of the Entente nations to die:

  • Britain: George Edwin Ellison at 9:30am, while scouting
  • France: Augustin Trebuchon, a messenger, was telling French forces storming the Meuse that soup would be served when the fighting ended. Killed at 10:45.
  • Canada (and final Commonwealth casualty): George Lawrence Price, sniped while advancing on the Belgian town of Ville-sur-Haine, at 10:58.
  • United States (and final casualty of the war): Henry Gunther. Recently demoted and attempting to redeem himself, he charged “astonished” German gunners who attempted to wave him off but were forced to fire. Killed in the final seconds of the war.

Soldiers from the U.S. 64th Regiment celebrate

The collapse of the German and Austro-Hungarian empires continues. Poland declared its independence as the Second Polish Republic, its first time as an independent nation in 123 years. In Germany, the chaos continues with the near-complete collapse of the Imperial Government following Wilhelm II’s abdication; two distinct ruling councils are vying for control, though power seems to be coalescing around Friederich Ebert, head of the Social Democratic Party (SPD), which is attracting conservative and nationalist groups to its cause.

On November 12, Austria was declared a republic by its National Assembly. The rump state, now the “Republic of German-Austria,” so-named due to its primary German populace in remaining lands, as well as a recognition of its probable need to be annexed by the German republic. This difficulty in maintaining independence is magnified by the other independent remnants of the empire refusing to trade necessities with it, such as grain and coal. In Austria too the Social Democrats were given power by the Assembly in an effort to stave off left-wing revolution.

On November 13, the undefeated German General Lettow-Vorbeck, unaware of his nation’s surrender, took undefended Kasama from the British in East Africa. The next day, at 7:30m, he was informed of the surrender and promptly signed a ceasefire, before marching his troops to a formal surrender at Abercom, per British instructions.

Czechoslovakia declared indepenmdence November 14, with Tomáš Masaryk named president and a temporary constitution adopted.

<– Part 224 – November 3, 1918 | Part 225 – November 10, 1918 | Part 226 – November 17, 1918

Australian troops scaling the walls of Le Quesnoy, a village on the Sambre Canal

Additional fighting erupted at the Sambre Canal November 4, as the Allies continue to push the crumbling German army back, preventing them from forming any type of defensive line. At dawn, British and French divisions, coupled with only 37 tanks available for combat, attacked the canal, the sight of fighting four years earlier. 1,200 Allied soldiers fell attempting to place bridges across, included war poet Wilfred Owen. The German defense-in-depth held until noon. French troops to the south captured Gusie and Thiérache later in the day. The crossing of the Sambre River, to depths of 2-3 miles, is now 50 miles wide. The Allies are now marching nearly-unopposed towards the Meuse, and beyond to Berlin. Sedan was captured November 6 by the French. Negotiations for an armistice with Germany began the next day in the railcar headquarters of Ferdinand Foch, French field marshall.

In Germany, the riots and protests are increasing, with Kiel and Wilhelmshaven now both rocked by revolt. The “14 Points,” issues by the soldiers in revolt, are now finding allies amongst the entire populace:
  1. The release of all inmates and political prisoners.
  2. Complete freedom of speech and the press.
  3. The abolition of mail censorship.
  4. Appropriate treatment of crews by superiors.
  5. No punishment for all comrades on returning to the ships and to the barracks.
  6. The launching of the fleet is to be prevented under all circumstances.
  7. Any defensive measures involving bloodshed are to be prevented.
  8. The withdrawal of all troops not belonging to the garrison.
  9. All measures for the protection of private property will be determined by the soldiers’ council immediately.
  10. Superiors will no longer be recognized outside of duty.
  11. Unlimited personal freedom of every man from the end of his tour of duty until the beginning of his next tour of duty
  12. Officers who declare themselves in agreement with the measures of the newly established soldiers’ council, are welcomed in our midst. All the others have to quit their duty without entitlement to provision.
  13. Every member of the soldiers’ council is to be released from any duty.
  14. All measures to be introduced in the future can only be introduced with the consent of the soldiers’ council.

On November 9, Kaiser Wilhelm II of German abdicated the throne and fled to Holland. Multiple declarations of a new German Republic have been declared, as the confusion and revolt grows. The following day, Romania re-entered the war against the Central Powers.

Anthem for Doomed Youth – Wilfred Owen
What passing-bells for these who die as cattle?
      — Only the monstrous anger of the guns.
      Only the stuttering rifles’ rapid rattle
Can patter out their hasty orisons.
No mockeries now for them; no prayers nor bells;
     Nor any voice of mourning save the choirs,—
The shrill, demented choirs of wailing shells;
      And bugles calling for them from sad shires.
What candles may be held to speed them all?
      Not in the hands of boys, but in their eyes
Shall shine the holy glimmers of goodbyes.
      The pallor of girls’ brows shall be their pall;
Their flowers the tenderness of patient minds,
nd each slow dusk a drawing-down of blinds.

<– Part 223 – October 27, 1918 | Part 224 – November 3, 1918 | Part 225 – November 10, 1918

The once and current flagship sunk

Infantry strength on the Western front this year, showing the effects of American arrival in the summer and the Hundred Days Offensive

On October 28, the Austro-Hungarian empire began its retreat from Italy. This was not only triggered by the loss of 90,000 troops in combat but the surrender of another 448,000, nearly one-third of the entire army. Additionally, rebels in Bohemia declared the founding of Czechoslovakia, prompting other nationalities to also declare their independence, including the Slavs the next day to found “Yugoslavia,” “Land of the Southern Slavs.” A Hungarian independence politician, Mihály Károlyi, seized power on October 31, forcing the emperor to appoint him Hungarian prime minister. His first act was officially dissolving the Austro-Hungarian compromise agreement, ending the entire state, and leaving Emperor Karl with only his German, Danubian, and Alpine territories. Trieste was seized by the Allies on November 3. This full collapse of a once Great Power, having taken only 2 weeks since the October 18 statement from the United States that forced national autonomy, is remarkable for its speed.

On October 29, Wilhelm Groener, an army chief-of-staff, was recalled and appointed First Quartermaster General, replacing Ludendorff as Deputy Chief of the General staff. One of his first acts has been addressing rising revolts in Germany, sparked by several sailor mutinies amongst the High Seas fleet starting the day before, in response to an order to engage the British Royal Navy in a decisive encounter (and one the Germans would most likely lose). Following arrests of the mutineers, additional sailors reached out to several unions and political parties for support. Several thousand people gathered at a shipyard in Kiel earlier today, trumpeting the slogan, “Frieden und Brot,” “Peace and bread.” Police fired warning shots and then fired into the crowd, killing 7 and injuring 29. The crowd dispersed, but tensions remain.

The final combat between the Allies and the Ottoman empire, at Sharqat, ended October 30, when the Ottoman commander learned of the armistice signed earlier that day (and following a successful bayonet charge by dismounted British Hussars). The armistice, effective noon the 31st, orders the Ottomans to withdraw all troops into Anatolia, allow the British garrisons along the Dardanelles and Bosporus, permission to quell any disorder in Ottoman territory, demobilization of the Ottoman Army and air force, and full access to their infrastructure for the Allies. The Middle Eastern front has ended.

The Austro-Hungarian navy at Pula was handed over to the State of Slovenes, Croats, and Serbs. However, the Austrian’s former flagship Viribus Unitis, a dreadnought, renamed Jugoslavia, was sunk in an Allied raid November 1, as the Allies were not aware of the transfer, nor the neutrality of the new nation.

With the Americans clearing the Argonne forest, and the French reaching the Aisne river, the Allied advance along the Meuse-Argonne continues.

<– Part 222 – October 20, 1918 | Part 223 – October 27, 1918 | Part 224 – November 3, 1918

The last German forces in the Caucasus were evacuated October 21, leaving the Ottomans to their own devices.

Italian machine gun nest atop Monte Grappa

Reaching Aleppo on October 23, in their pursuit of the crumbling Ottoman force of 20,000 (though only 4,000 are combat-ready), the combined British and Arab forces encouraged the Ottoman garrison to surrender but were refused. Although plans were drawn up for an attack on the city the morning of the 26, the Arabs attacked the night before, and after hours of intense hand-to-hand fighting in the streets, the garrison surrendered at 10am, just as the British armored cars were arriving for the attack. Elements have managed to evacuate north, including Ottoman general Mustafa Pasha.

North of Baghdad, British forces defeated the Ottomans at Sharqat, also on the 23rd, as their press to capture the key Ottoman oil fields.

The Italian army launched a large offensive on October 24, the one-year anniversary of their humiliating withdrawal following the battle of Caporetto. Nine Italian divisions attacked Monte Grappa to push the nine Austro-Hungarian divisions off; although the defenders were reinforced with an additional six divisions, their withdrawal is expected. Centered around Vittorio Veneto, the front-wide offensive includes nearly 1.5 million Italians and 1.8 million Austro-Hungarians. The Italians have secured a hold across the Piave river, while Austro-Hungarian elements have refused orders to counter-attack, hindering their defensive efforts.

On the Western front, British forces cross the Selle river October 25, following a failed German counter-attack the day before.

In response to crumbling German defenses, Erich Ludendorff was forced to resign October 26 as First Quartermaster-General of the German General Staff, a role which has seen him essentially as a co-dictator with Hindenburg.

On October 27, the United States Army expelled the final German divisions from the Champagne region, ending the 3-week battle at the Blanc Mont Ridge.

<– Part 221 – October 13, 1918 | Part 222 – October 20, 1918 | Part 223 – October 27, 1918

At the Blanc Mont Ridge, American infantry continues to push the Germans out of Champagne and the Argonne Forest.

On October 14, Groupe d’Armées des Flandres, a collection of Belgian, British, and French divisions, attacked the Germans at Courtrai, on the French/Belgian border, and pushed the Germans back to Ghent by the 19th, having met minimal German resistance, taking 12,000 captives and nearly 600 artillery pieces. A follow-up was launched earlier today to cross the Lys and Escaut rivers.

Following the success at Cambrai, the British forces attacked the Germans on the Selle River on October 17; despite facing stiff resistance, the German defense has broken and have withdrawn nearly 5 miles.

The Entente continues its liberation of the Balkans.

Germany announced earlier today that they were suspending their policy of unrestricted submarine warfare.

<– Part 220 – October 6, 1918 | Part 221 – October 13, 1918 | Part 222 – October 20, 1918

On October 7, after six days surrounded by Germans, the “Lost Batallion” was finally rescued. Only 194 of the 500+ Americans are healthy; the rest casualties. In fact, the Allies only knew the Battalion was there when they received a carrier pigeon with the message, “WE ARE ALONG THE ROAD PARALELL [sic] 276.4. OUR ARTILLERY IS DROPPING A BARRAGE DIRECTLY ON US. FOR HEAVENS SAKE STOP IT.”

The Allies have successfully taken the bridge of the St. Quintin Canal, suffering 25,000 casualties to the German’s 36,000 POWs.

At Cambrai, British forces engaged the Germans on October 8, using the new tactics they have developed, including strategic use of tanks. The German forces, weakened as they were by the wide frontal assault across the entire Allied line, nevertheless were crushed in 3 days. Of the 750,000 British forces, 12,000 were killed, while the Germans lost 10,000 of their 180,000. The Allies have now broken through the Hindenburg Line. British General Henry Rawlinson wrote, “Had the Boche [Germans] not shown marked signs of deterioration during the past month, I should never have contemplated attacking the Hindenburg line. Had it been defended by the Germans of two years ago, it would certainly have been impregnable….” The severe hit to German morale indicates to the Allies that the war can be won by year’s end, rather than the original plan of a massive final assault in 1919.

Follow the collapse of enemy power in the Balkans, and the surrender of Bulgaria, Allied forces have begun the liberation of Serbia, Albania, and Montenegro. In Palestine, following the capture of Damascus October 1, the British Desert Mounted Corps of the Egyptian Expeditionary Force are pursuing the remnants of the Ottoman army.