Saturday, May 23, 2020

Internet Censorship Essay - Internet AccessShould be...

Access to the Internet Should be Restricted to Protect Children We are now entering an age of computers where people have almost unlimited access to information. There are entire books and encyclopedias that can be purchased for use on personal computers. Information such as stock prices to computer-aided design programs to entire business operations is being used and accessed through the power of the computer. This information is obtained through the thousands of computer programs out on the market, but most importantly, it is obtained by access to what is called the Internet. The Internet is the term for the ten thousand plus interconnected computer networks throughout the world that enable us to gather and dispense any†¦show more content†¦For example, when searching the World Wide Web server, I came across six documents for the four letter word for referring to sexual intercourse. Also, while searching the World Wide Web, I found twenty documents under the search title violence. There are also entire homepages that have decoded the p ornographic material posted in some specific newsgroups. Several of these newsgroups contain other obvious objectionable materials. While searching a collection of newsgroups, fifty-eight were found containing the word sex. Internet regulation is a growing concern for many Americans just as censorship of television and movies is also a growing concern. There are many non-profit organizations supporting Internet regulation for children. The Educational Resources Information Center (ERIC) is a main contributor for solutions to the problem of objectionable materials on the Internet. They have e-mail addresses specifically designed to recieve and answer questions about the Internet as well as many other services. The Chatback Trust was also founded in concern with the use of networks to teach children. These as well as The k12 Administration, Parents Helping Parents , Empire Internet Schoolhouse, and The International Society for Technology in Education promote acceptable use of the Internet for children and are concerned with teaching children

Monday, May 18, 2020

West African Jihads - 2175 Words

The African Jihads Jihad, the Muslim word meaning holy war. During the 18th and 19th centuries, this word brought fear to anyone who did not fully believe in the Islamic state and resided in West Africa. The Jihads of this era not only changed the faith of many people, but also the landscape of West African democracy. Although Islamic Jihads had occurred in the past, they never surmounted to the magnitude of those of the 18th century. What factors and leaders caused the West African Jihads, of the 18th and 19th centuries, to be so effective? The people of West Africa were tired of governments who constantly over taxed its constituents, and simply did not care for the well being of common individuals. The Islamic†¦show more content†¦While he was still young, Usman moved south with his family to Degel, where he studied the Koran with his father. Subsequently he moved on to other scholar relatives, traveling from teacher to teacher in the traditional way, and reading extensively in the Islamic sciences. One powerful intellectual and religious influence at this time was his teacher in the southern Saharan city of Agadez, Jibril ibn Umar, a radically Orthodox figure whom Usman respected greatly. Umar educated Usman on the importance of Orthodoxy, and told him stories of how the Fulbe defeated their oppressors through the method of Jihad. It was at this period that Usman discovered that if one decides to live under the Islamic faith, they must follow the Koran from top to bottom. In the upcoming years Usman moved to Gobir where he taught and led a community of Fulbe people. Usman always discussed the importance of Islamic Orthodoxy. His two main concerns were the concerns were the conversion of those Fulani pastoralists who still clung to pagan religious beliefs, and the religious and social reform of the nominally Muslim Hausa rulers. Throughout the 1780s and 90s Usmans reputation increased, as did the size and importance of the community that looked to him for religious and political leadership. It was even thought that Usman was the second coming of the prophet Muhammad. Usman at this time became worried at the interest that Hausa rulers gave to hisShow MoreRelatedInspire, The, And Inspire The Believers Essay1157 Words   |  5 Pagesthe opening â€Å"Editor’s Letter† Yahya Ibrahim states, â€Å"Muslims continue to face the results and consequence of the fierce crusade aggression against Islam.† He praises the 9/11 attacks as â€Å"the blessed 9/11 attacks,† and calls on Muslims in the West to join in jihad â€Å"in the cause of the events of 9/11.† He asserts that the â€Å"Mujahidin took an oath to defend the honor of the Prophet Muhammad,† siting the Charlie Hebdo attacks as retaliation. This outlook is repeated in â€Å"Statement: Vengeance for the ProphetRead MoreSpread of Islam via Sokoto Caliphate608 Words   |  2 Pagessect—incorporating a very different method of prorogating the religion of the faithful and was successful for the greater part of the nineteenth century. Not since the fir st jihads during the time of Muhammad when the city of Medina sought an income by raiding the caravans of the Meccans had the jihad made such an impact on the growth of Islam. A jihad declared by Usman dan Fodio and initially directed by his kinsmen, Sokoto in Nigeria had such an effect in the spread of Muslim influence in Sub-Sahara Africa;Read MoreAl Qaed A Worldwide Terrorist System Established By Usama Receptacle Loaded1527 Words   |  7 Pagescomplex assaults in the West like the 2006 Transoceanic Aircraft plot. Be that as it may, notwithstanding these misfortunes, al-Qaida holds its expectation, however maybe not the strong capacity, to arrange and direct terrori st assaults against the West, including the U.S. country. Center al-Qaida in all likelihood will likewise attempt to rouse provincial hubs and partners, and also unaffiliated yet similarly invested radicals, to participate in terrorism against the West. Set up around 1988 byRead MoreThe War in Kashmir a Religious Conflict? Essay1687 Words   |  7 PagesIndia and Pakistan. Conflict is not only between India and Pakistan but also India and the religious militants. Religious Militants are conducting a jihad to govern by the religious law. Historically, Kashmir included Sufis Muslim not orthodox Muslim. Numerous international events had influenced in the growth of Islamic fundamentalism in Kashmir. Jihad is not originally from Kashmir but they are foreign militancy bought during the end of the Soviet –Afghanistan War. Additionally, they are trained inRead MoreThe Between West Africa And South Africa1318 Words   |  6 Pagesof Islam in West Africa goes back to eighth century, the spread of the confidence in locales that are presently the cutting edge conditions of Senegal, Gambia, Guinea, Burkina Faso, Niger, Mali and Nigeria, was in reality, a progressive and complex procedure. A lot of what we think about the early history o f West Africa originates from medieval records composed by Middle Easterner and North African geographers and antiquarians. Experts have utilized a few models to disclose why Africans changed overRead MoreConflict : The Boko Haram Insurgency1701 Words   |  7 PagesConflict: The Boko Haram Insurgency Type of Conflict: Hot war. Origins Boko Haram is the nickname for the group officially known in Arabic as Jama atu Ahlis Sunna Lidda awati Wal-Jihad--the People Committed to the Propagation of the Prophet s Teachings and Jihad. Named by the Northern Nigerian Muslims and subsequently picked up by the press, the name Boko Haram translates to Western education is forbidden and is derived from the teachings of Mohammed Yusuf, the group s early leader, whoRead MoreBoko Haram Is A Radical Sunni Islamic Gathering1541 Words   |  7 PagesBoko Haram is a radical Sunni Islamic gathering, at first calling itself Jama atu Ahlis Sunnar Lidda awati Wal-Jihad, which thoroughly makes a translation of to people concentrated on the spread of the Prophet s teachings and jihad. The gathering is against Western philosophy. The pioneer of the gathering, Mohammed Yusuf, was a readied Salafist and follower of Ibn Taymiyya, a 14th century analyst who addressed Islamic fundamentalism. Boko Haram hopes to construct an Islamic state in Nigeria ,Read More The Intersection of Religion and Politics in 17th-19th Century Africa2099 Words   |  9 Pagesreligious and political authorities, goals for reshaping the religious and political landscape of their regions, reputations among their contemporaries, and obstacles with which to contend. Some common themes of 17th-19th century African social and political history span these three stories despite their distinct historical contexts and characteristics. In each society, warlords vied for control without being able to unify small disintegrating states, and political strife led toRead MoreAfrican Spirituality The Pivotal Force Of Slave Resistance1922 Words   |  8 Pagesâ€Å"African Spirituality the Pivotal Force of Slave Resistance† Melvin Herskovits’ 1941 publication The Myth of the Negro Past argues the survival of the African culture and its substantial influence in the lives and history of Africans in the Americas. Furthermore, Sterling Stuckey argues that not only did the African religion and culture survive the Middle Passage, it became a pivotal part of the African identity in the America’s.1With that in mind the role of African spirituality was important toRead MoreEssay about Islam has Been Hijacked by Terrorism1472 Words   |  6 Pagesreasonable argument that many reasonable people have made in other contexts. During the 1950s, loyal American leftists resented and resisted demands that they specifically denounce Communism or be presumed fellow travelers. More recently, mainstream African-Americans likewise protested demands that they disassociate themselves from Louis Farrakhan or other controversial figures, with whom they have nothing in common apart from skin color. In 1994, peacea ble Jews everywhere were swift to condemn the massacre

Monday, May 11, 2020

Critique on Open City Essays - 1116 Words

Critique on Open City â€Å"Open City† is a neo-realist film that followed the movement in Italy during World War 2. The film is neo-realistic because it has that ‘reality’ like feeling to it by following specific characters through their daily stressful lives that are screwed up from poverty and war. It has many qualities that make it in some ways ‘closer’ to the characters. While watching, the viewer is sucked into the story and immediately feeling emotional with the families and the other various characters in the film. The main reason is Rossellinis choosing dramatic music and kids with big eyes. This film is divided into two separate parts. First, is a story that shows a situation in Italy during the Nazi occupation of World War†¦show more content†¦As mentioned, the young kids are the hope and the only time the to be husband was saved was by the young boy distracting him. Russolini shows more of the kids being the saviors. At the very end shows hope as the kids walk towards the city. Basically ‘lifting the mood’ of the ending by showing the boys their future world will be brighter than the one into which they were born into. The main problem with the copy we watched is the translations—they were incomplete. It maybe is nothing relevant to the film as a whole, but it drives curiosity to know just what those extra words were. This somehow accumulates throughout the movie making it a bit frustrating. The movie is good by making things unbearable for the many characters. It really showed us how evil the Nazi occupation was like as in good people getting caught in betrayal, hunger, and the force of sadness and death. There is even a part where the Nazi-ism felt like it had a bit of lesbianism. Not that there is anything wrong with homosexuality, but the part when the sister was seduced by the same chick that was like an insider on the whereabouts of the ‘revolutionist’ men in the film. There is some emphasis on religion. This is expected, because after-all it was shot and directed by people from Italy! This religion aspect is shown through a priest character that is forced to face the possibility that the Nazis simply are evil. The priest realizes that he can’t fight these Nazi-guysShow MoreRelatedGrad School Application Essay1127 Words   |  5 Pagesarchitecture students and professionals visiting Chandigarh on how it feels having grown up and educated from this city - a single stroke, paradigm shifting undertaking by the father of modernism himself. I reply with an inherently paradoxical answer. While on one hand it has served as a major source of my exposure towards architecture and urbanism, alongside shaping my perception and critique of urbanity, it has also engendered in me a curiosity towards the ‘other’, the traditional, emergent and incrementalRead MoreUtopi A Critique Of 17th And 16th Century English And European Society1416 Words à ‚  |  6 PagesPaper 3: Utopia Sir Thomas More’s Utopia offers a critique of 15th and 16th century English and European society. He offers this criticism through a fictitious recount of world traveler Raphael Hythloday’s journey to the land of Utopia. More brilliantly expresses his criticisms of society through the voice of Hythloday, primarily so none of his views, no matter how outlandish, couldn’t technically be tied back to him. This societal critique was one of the most famous works produced from the RenaissanceRead MoreThe Ones Who Walk Away From Omelas Summary1294 Words   |  6 PagesMy Review on: The Ones Who Walk Away from Omelas The story opens with a description of Setting up a city, followed by narration of real or imaginary events. This tale won the Hugo Award for Best Story of 1974, which is offered annually for a science fiction or fantasy story, considered a classic of the science fiction genre. His premise is based on a moral dilemma, posed by the philosopher William James, who imagined what would be a hideous happiness if it depended on the suffering of a childRead MoreConformity And Exclusion In Los Cachorros908 Words   |  4 PagesVargas Llosa’s younger literary publications were laced with Marxist critiques of a transitioning Latin American society in the 20th century, and though on the surface, â€Å"Los Cachorros† may seem little more than a fictional coming of age narrative, the allegorical short story is no exception. Told through an encyclopaedic tour of Lima’s urban spaces, a pack of boys’ transition into young men and their interactions with the city reflect bo th the rigidity and fragmentation of the Peruvian communityRead MoreThe Link in Bringing the City and People Together with Urban Design691 Words   |  3 PagesBringing the City and People Together There is a precedent need for the presence of urban design. Urban design is the collection of arranged urban structures that creates functional spaces for people. This is an interdisciplinary practice that can involve multiple actors in fields such as urban planning, architecture, engineering, landscaping, economics, law, and many more. Strong urban designs can lead to the success of linking built structure together to create a unique space open to interpretationRead MoreLatin American Authors Influence On Mexican Culture1698 Words   |  7 Pagescommiting to the viewpoint himself. He also occasionaly resorts to an open scathing critique. He uses this most notably when talking about the phenomenon of machismo, who’s views he reproduces above, saying that the macho â€Å"Es el poder, aislado en su misma potencia, sin relacià ³n ni compromiso con el mundo exterior† and â€Å"no pertenece a nuestro mundo; no es de nuestra ciudad; no vive en nuestro barrio†, a muc h less subtle critique here. Narrating the existing state of the nation is partly facilitatedRead MoreBiographical Sketch Of William Kristol Essay753 Words   |  4 PagesBiographical Sketch. William Kristol was born in New York City in 1952. Upon earning his PhD from Harvard University, he taught politics at both the University of Pennsylvania (1979-1983) before returning to Harvard (1983-1985). Later he served the Reagan and George H. W. Bush administrations. Today, he is the editor of The Weekly Standard and makes regular appearances on FOX News. Mr. Kristol co-authored, The War Over Iraq: America’s Mission and Saddam’s Tyranny as well as several other books.Read MoreA Critique Of Leadership Style1132 Words   |  5 PagesLEADERSHIP CRITIQUE This paper is a critique of preceptor leadership methods. I will describe my current preceptor’s leadership style, giving an example of an observed valuable leadership strategy and why I found it to be successful. Shadowed by an example of an observed unsuccessful leadership strategy, how I responded, and a recommended strategy for the situation described. Ending with the type of leader I aspire to be in the future and my final thought regarding leadership. Preceptor LeadershipRead MoreAristotle’s Examination of the Lacedaemonian Constitution in his Work, Politics1208 Words   |  5 PagesAristotle makes is in regards to the equality that is found among men and women in Spartan society and the laws that grant the license of Lacedaemonian women. Spartan women were viewed by the state in a much higher status than the women of other Greek city-states, including Athens which Aristotle made his home for his adult life. The reasoning behind this attitude towards women comes from the Spartan women being the mothers of the great Spartan warriors as well as the trustee of the state when the SpartanRead MoreReview and Critique of Massachusetts Law 40B Essay1069 Words   |  5 PagesGeneral Laws chapter 40B between housing advocates and open space advocates. This thesis reviews and critiques the current law, and diagnoses various legislative proposals for the progressive feud. One would generally assume advocates of affordable housing and open space preservation are political and ideological allies as affordable, decent housing has been a mainstay of the progressive view since the Great Society of Lyndon Johnson, and open space preservation came to the forefront as a part of

Wednesday, May 6, 2020

Technology And The Future Of Unmanned Aerial Vehicles

The package comes, but there is no deliverer. A tractor is plowing the field after a successful harvest, but there is no driver. This is the future of technology, and more specifically, unmanned aerial vehicles. UAVs, more commonly referred to as â€Å"drones,† have been advancing for decades now. Their advancement has not come without opposition though, and while this argument is concentrated behind drones role in technologies machination over society, the true reality is a shift to mechanization, a progression the United States has seen before. Historically, many economic shifts have affected the US, including the shift from agrarian society to industrialization in the Gilded Age, periods which allowed the US to dominate the world economy,†¦show more content†¦In addition, farmers who are subject to working conditions along with the simple nature of human abilities which detract from their ability to inspect a field compared to technology, are eliminated in UAV prac tices of inspection. The benefit transfers down the line of agriculture when the product the farmer was able to grow has ended up at the grocery store, and by the same means, the support for the drones’ integration is bound to follow. More acute compared to the agricultural and rural sectors, is the commercial interest of drones through manufacturers and retailers like Amazon. These have come in headlines labeled as an innovation and as an intrusion, bringing more opposition than other areas of use. In an article by Trevir Nath, â€Å"it is estimated that every year integration is delayed; the US loses $10 billion in financial growth† (Nath 2). This is undermined by the citizens of Syracuse who believe that â€Å"as the nation becomes more accustomed to drones...fewer people will oppose their use in war and in commercial application that intrude upon Americans privacy† (Semuels 2). Such strong arguments have came to light because of the growing drone hub in their area. They worry about the local economy as well, and more importantly— jobs. Dave Kashmer, a protestor, falls under the opposition, and stated â€Å"It’s not going to produce jobs for a Syracusan†¦Ã¢â‚¬  These arguments lend to a primary consequence of a shift to drone technology— a job market shift. SyracusansShow MoreRelatedCollisions on the ground are of grave importance as well. A MQ-1C UAV pilot undergoing training1200 Words   |  5 PagesReports conclude that the Grey Eagle was not up to par in its vehicle and ground control packages (Brodeur, 2012). An increased traffic flow of both manned and unmanned aircraft will most definitely increase the probability of collision in the air as well as on the ground. This can lead to human casualties and injuries. In order to fortify safety of use new technologies must be designed, tested, and integrated into the current and future UAV systems. The realization is UAVs will encounter on averageRead MoreEye Of The Sky, The Biggest Moral Dilemma Of Drone Warfare1423 Words   |  6 Pagesof drones in battle fields remains to be one of the most divisive subjects in modern warfare. Use of unmanned aerial vehicles has become the hallmark of the war against terror. The move has elicited debate which is constantly gaining traction as more damming statistics are released on collateral damages associated with drone warfare. The United States has frequently deployed unmanned aerial vehicles to track down and kill enemy combatants and their leaders. Some of the notable killings were those ofRead Mor eEssay on Drones: Unmanned Aerial Vehicles3207 Words   |  13 Pages Like much of today’s technology, Unmanned Aerial Vehicles attribute their creation to the military. The idea of using unmanned aircraft has long been a dream for the military -- scouting planes without any casualties to report should something go wrong, air strikes with only time and money to lose, and the ability to wage war without losing a single life. Well the third one may perhaps not be realistic – as Afghanistan has shown, lack of ground troops leaves certain entities unchecked.1 HoweverRead MoreThe Unmanned Aerial System can also loiter at a different speed presenting the opportunity of other900 Words   |  4 PagesThe Unmanned Aerial System can also loiter at a different speed presenting the opportunity of other aircraft to overtaking the UAS. Due to this ability, potential midair collision scenarios are numerous. Two critical technological functions will separate the Unmanned Aerial Vehicle’s architectures in the system. The vehicle’s abil ity to control the vehicle, survey and avoid must be addressed by the FAA to mitigate the risk of midair and ground collision factors. UAS technology can perform hoveringRead MoreUnmanned Aerial Vehicles1499 Words   |  6 Pagesare many people in this universe that wonder if the United States using drones is a good idea, what many do not know is that well drones are really called UAVs or more commonly said unmanned aerial vehicles. There are many types of drones, but another well-known drone is called UCAVs, unmanned combat aerial vehicles (Matthews). The UCAVs are used for the military to spy on the activities of other countries. The Washington Post says â€Å"These UAVs are just planes that operate through controlled on landRead MoreEMS Essay995 Words   |  4 Pagesnot frequently utilized by providers in EMS. When a provider utilizes drones in EMS, improvements in response time, medical sample transport time, traditional aeromedical barriers and access to emergency care are demonstrated. Advances in drone technology, improved reliability and proliferation have made drones worth considering in EMS. Patient emergency medical system outcomes are improved with Drones in EMS. Drones in EMS Drones in Emergency Medical Service (EMS) are not utilizedRead MorePrototyping Approach For Design Analysis And Testing Of Unmanned Vtol UAV1643 Words   |  7 Pagesanalysis and flight testing of the TURAC VTOL UAV. Paper presented at the International Conference on Unmanned Aircraft Systems (ICUAS), Orlando, FL. http://dx.doi.org/10.1109/ICUAS.2014.6842354 Presented at the 2014 International Conference on Unmanned Aircraft Systems (ICAUS), this paper identifies the need for a low cost approach that is effective in building commercial based small unmanned VTOLs. The researchers’ discuss and analyze the TURAC, which is an easily reproduced tilt rotor VTOLRead MoreDrone Warfare : Unmanned Aerial Vehicles1669 Words   |  7 Pagesin the United States on September eleventh. During the time of Operation Enduring Freedom and Operation Iraqi Freedom, drones had a usage time of approximately 100,000 flight hours when performing tasks in these operations. Also known as unmanned aerial vehicles, the primary use of drones today is for surveillance. However, during recent years, drones have had other uses, such as airstrikes. With these airstrikes, there have been a large amount of civilian casualties due to the drones targeting highlyRead MoreStrategic Direction And Global Security Essay1618 Words   |  7 Pagesensuring cyber technolog y outpaces adversaries. Based on the current U.S. strategic direction and global security environment these capabilities are necessary. Satellites and cyber technology will be part of the design of the GSS system. The U.S. military will be able to strike quickly and remain engaged for increased periods while additional forces move to the area of concern using the GSS system. Increased Navy and Air investments in submarines, ships, aircraft, unmanned aerial vehicles (UAV’s) andRead MoreAerial Systems Essay702 Words   |  3 PagesUnnamed Aerial Systems (UAS) that operate within the our National Airspace System (NAS) whether within Line of Sight (LOS) or Beyond Visual Line of Sight (BVLOS) must be equipped with the appropriate technologies to ensure a safe recovery of the aerial platform in the event of a lost data link between the operator and aerial platform. In accordance with Federal Aviation Regulations (FARs) Parts 91.3 and 91.13 General Operating Flight Rules; the pilo t in command of an aircraft is responsible for

Ccna Free Essays

string(312) " LAN Switching and Wireless, CCNA Exploration Companion Guide LAN Switching and Wireless, CCNA Exploration Labs and Study Guide is designed to help you learn about and apply your knowledge of the LAN switching and wireless topics from Version 4 of the Cisco ® Networking Academy ® CCNA ® Exploration curriculum\." LAN Switching and Wireless CCNA Exploration Labs and Study Guide LAN Switching and Wireless, CCNA Exploration Companion Guide LAN Switching and Wireless, CCNA Exploration Labs and Study Guide is designed to help you learn about and apply your knowledge of the LAN switching and wireless topics from Version 4 of the Cisco ® Networking Academy ® CCNA ® Exploration curriculum. You read "Ccna" in category "Papers" Each chapter contains a Study Guide section and a Labs and Activities section. ISBN-10: 1-58713-207-9 ISBN-13: 978-158713-207-0 Study Guide The dozens of exercises in this book help you learn the concepts and configurations crucial to your success as a CCNA exam candidate. We will write a custom essay sample on Ccna or any similar topic only for you Order Now Each chapter is slightly different and includes matching, multiple-choice, fill-in-the-blank, and open-ended questions designed to help you  ¦ Review vocabulary  ¦ Strengthen troubleshooting skills  ¦ Boost configuration skills  ¦ Reinforce concepts  ¦ Research topics Packet Tracer Activities—This icon identifies exercises interspersed throughout the Study Guide section where you can practice or visualize a specific task using Packet Tracer, a powerful network simulation program developed by Cisco. Packet Tracer Activity Labs and Activities The Labs and Activities sections begin with a Command Reference table and include all the online curriculum labs to ensure that you have mastered the practical skills needed to succeed in this course. Hands-On Labs—This icon identifies the hands-on labs created for each chapter. Work through all the Basic, Challenge, and Troubleshooting labs as provided to gain a deep understanding of CCNA knowledge and skills to ultimately succeed on the CCNA Certification Exam. Packet Tracer Companion—This icon identifies the companion activities that correspond to each hands-on lab. You use Packet Tracer to complete a simulation of the hands-on lab. Packet Tracer Companion Companion CD-ROM The CD-ROM provides all the Packet Tracer Activity, Packet Tracer Companion, and Packet Tracer Challenge files that are referenced throughout the book as indicated by the icons. These files work with Packet Tracer v4. 1 software, which is available through the Academy Connection website. Ask your instructor for access to the Packet Tracer software. This book is part of the Cisco Networking Academy Series from Cisco Press ®. Books in this series support and complement the Cisco Networking Academy curriculum. ciscopress. com Packet Tracer Skills Integration Challenge—Each chapter concludes with a culminating activity called the Packet Tracer Skills Integration Challenge. These challenging activities require you to pull together several skills learned from the chapter— as well as previous chapters and courses—to successfully complete one comprehensive exercise. Packet Tracer Challenge Allan Johnson works full time developing curriculum for Cisco Networking Academy. Allan also is a part-time instructor at Del Mar College in Corpus Christi, Texas. LAN Switching and Wireless CCNA Exploration Labs and Study Guide Use this book with: ISBN-13: 978-1-58713-202-5 ISBN-10: 1-58713-202-8 90000 9 781587 132025 Cisco Press L AN Switching and Wireless CCNA Exploration Labs and Study Guide Allan Johnson 00_2028_fm. qxp ii 4/3/08 5:08 PM Page ii LAN Switching and Wireless, CCNA Exploration Labs and Study Guide LAN Switching and Wireless CCNA Exploration Labs and Study Guide Allan Johnson Copyright © 2008 Cisco Systems, Inc. Publisher Paul Boger Associate Publisher Dave Dusthimer Cisco Representative Anthony Wolfenden Published by: Cisco Press 00 East 96th Street Indianapolis, IN 46240 USA Cisco Press Program Manager Jeff Brady All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a re view. Production Manager Patrick Kanouse Printed in the United States of America Senior Project Editor Tonya Simpson First Printing April 2008 Library of Congress Cataloging-in-Publication Data: Johnson, Allan, 1962LAN switching and wireless : CCNA exploration labs and study guide / Allan Johnson. p. cm. ISBN-13: 978-1-58713-202-5 (pbk. ) ISBN-10: 1-58713-202-8 (pbk. ) 1. Wireless LANs—Examinations—Study guides. 2. Packet switching—Examinations—Study guides. 3. Telecommunications engineers—Certification—Examinations—Study guides. 4. Routing (Computer network management)—Examinations—Study guides. 5. Telecommunication—Switching systems Examinations—Study guides. I. Title. TK5105. 78. J64 2008 004. 6’8—dc22 2008014858 ISBN-13: 978-1-58713-202-5 ISBN-10: 1-58713-202-8 Executive Editor Mary Beth Ray Development Editor Andrew Cupp Copy Editor Bill McManus Technical Editors Bruce R. Gottwig Khalid Rubayi Tara Skibar Linda C. Watson Editorial Assistant Vanessa Evans Book and Cover Designer Louisa Adair Composition Mark Shirar Proofreader Leslie Joseph 00_2028_fm. qxp 4/3/08 5:08 PM Page xvii xvii Introduction The Cisco Networking Academy is a comprehensive e-learning program that provides students with Internet technology skills. A Networking Academy delivers web-based content, online assessment, student performance tracking, and hands-on labs to prepare students for industry-standard certifications. The CCNA curriculum includes four courses oriented around the topics on the Cisco Certified Network Associate (CCNA) certification. LAN Switching and Wireless, CCNA Exploration Labs and Study Guide is a supplement to your classroom and laboratory experience with the Cisco Networking Academy. In order to be successful on the exam and achieve your CCNA certification, you should do everything in your power to arm yourself with a variety of tools and training materials to support your learning efforts. This Labs and Study Guide is just such a collection of tools. Used to its fullest extent, it will help you gain the knowledge and practice the skills associated with the content area of the CCNA Exploration LAN Switching and Wireless course. Specifically, this book will help you work on these main areas:  ¦ LAN design principles and concepts  ¦ Ethernet operation with switches  ¦ Basic switch configuration and security  ¦ VLAN concepts and configuration  ¦ VTP concepts and configuration  ¦ STP, RSTP, and rapid PVST+ concepts and configuration  ¦ Inter-VLAN routing concepts and configuration  ¦ LAN wireless concepts and security issues LAN wireless configuration using Linksys WRT300N routers  ¦ Troubleshooting LAN switching and wireless configurations Labs and Study Guides similar to this one are also available for the other three courses: Network Fundamentals, CCNA Exploration Labs and Study Guide, Routing Protocols and Concepts, CCNA Exploration Labs and Study Guide, and Accessing the WAN, CCNA Exploration Labs and Study Guid e. Audience for This Book This book’s main audience is anyone taking the CCNA Exploration LAN Switching and Wireless course of the Cisco Networking Academy curriculum. Many Academies use this book as a required tool in the course, while other Academies recommend the Labs and Study Guides as an additional source of study and practice materials. The secondary audiences for this book include people taking CCNA-related classes from professional training organizations. This book can also be used for college- and university-level networking courses, as well as anyone wanting to gain a detailed understanding of basic switching and wireless technologies. 00_2028_fm. qxp xviii 4/3/08 5:08 PM Page xviii LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Goals and Methods The most important goal of this book is to help you pass the CCNA exam (640-802). Passing this foundation exam means that you not only have the required knowledge of the technologies covered by the exam, but that you can plan, design, implement, operate, and troubleshoot these technologies. In other words, these exams are rigorously application based. You can view the exam topics any time at http://www. cisco. com/go/certifications. The topics are divided into eight categories:  ¦ Describe how a network works  ¦ Configure, verify, and troubleshoot a switch with VLANs and inter-switch communications  ¦ Implement an IP addressing scheme and IP services to meet network requirements in a medium-sized enterprise branch office network  ¦ Configure, verify, and troubleshoot basic router operation and routing on Cisco devices  ¦ Explain and select the appropriate administrative tasks required for a WLAN  ¦ Identify security threats to a network and describe general methods to mitigate those threats  ¦ Implement, verify, and troubleshoot NAT and ACLs in a medium-sized enterprise branch office network  ¦ Implement and verify WAN links The LAN Switching and Wireless course focuses on the second, fifth, and sixth bullets. The Study Guide portion of each chapter offers exercises that help you learn the LAN switching and wireless concepts as well as the configurations crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes some or all of the following types of exercises:  ¦  ¦ Skill-building activities and scenarios  ¦ Configuration scenarios  ¦ Concept questions  ¦ Packet Tracer Activity Vocabulary matching and completion Internet research In the configuration chapters, you’ll find many Packet Tracer Activities that work with the Cisco Packet Tracer tool. Packet Tracer allows you to create networks, visualize how packets flow in the network, and use basic testing tools to determine whether the network would work. When you see this icon, you can use Packet Tracer with the listed file to perform a task suggested in this book. The activity files are available in this book’s CD-ROM; Packet Tracer software, however, is available through the Academy Connection website. Ask your instructor for access to Packet Tracer. The Labs and Activities portion of each chapter includes a Command Reference table, all the online Curriculum Labs, and a Packet Tracer Skills Integration Challenge Activity. The Curriculum Labs are divided into three categories:  ¦ Basic: The Basic Labs are procedural in nature and assume you have no experience configuring the technologies that are the topic of the lab.  ¦ Challenge: The Challenge Labs are implementation in nature and assume you have a firm enough grasp on the technologies to â€Å"go it alone. † These labs often only give you a general requirement that you must implement fully without the details of each small step. In other words, you must use the knowledge and skills you gained in the chapter text, activities, and Basic Lab to successfully complete the Challenge Labs. Avoid the temptation to work through 00_2028_fm. qxp 4/3/08 5:08 PM Page xix xix the Challenge Lab by flipping back through the Basic Lab when you are not sure of a command. Do not try to short-circuit your CCNA training. You need a deep understanding CCNA knowledge and skills to ultimately be successful on the CCNA exam.  ¦ Troubleshooting: The Troubleshooting Labs will ask you to fix a broken network. These labs include corrupted scripts you purposefully load onto the routers. Then you use troubleshooting techniques to isolate problems and implement a solution. By the end of the lab, you should have a functional network with full end-to-end connectivity. Packet Tracer Companion Most of the hands-on labs include Packet Tracer Companion Activities where you can use Packet Tracer to complete a simulation of the lab. Packet Tracer Challenge Each chapter also includes a culminating activity called the Packet Tracer Skills Integration Challenge. These activities require you to pull together several skills learned from the chapter— and from previous chapters and courses—to successfully complete one comprehensive exercise. A Word About Packet Tracer Packet Tracer is a self-paced, visual, interactive teaching and learning tool developed by Cisco. Lab activities are an important part of networking education. However, lab equipment can be a scarce resource. Packet Tracer provides a visual simulation of equipment and network processes to offset the challenge of limited equipment. Students can spend as much time as they like completing standard lab exercises through Packet Tracer, and have the option to work from home. Although Packet Tracer is not a substitute for real equipment, it allows students to practice using a command-line interface. This â€Å"e-doing† capability is a fundamental component of learning how to configure routers and switches from the command line. Packet Tracer v4. x is available only to Cisco Networking Academies through the Academy Connection website. How This Book Is Organized Because the content of LAN Switching and Wireless, CCNA Exploration Companion Guide and the online curriculum is sequential, you should work through this Labs and Study Guide in order beginning with Chapter 1. The book covers the major topic headings in the same sequence as the online curriculum for the CCNA Exploration LAN Switching and Wireless course. This book has seven chapters, with the same numbers and names as the online course chapters. If necessary, a chapter uses a single topology for the exercises in the Study Guide portion. The single topology per chapter allows for better continuity and easier understanding of switching commands, operations, and outputs. However, the topology is different from the one used in the online curriculum and the Companion Guide. A different topology affords you the opportunity to practice your knowledge and skills without just simply recording the information you find in the text.  ¦ Chapter 1, â€Å"LAN Design†: The exercises in the Study Guide portion focus on LAN design concepts, including vocabulary and the three-layer hierarchical model. The Labs and Activities portion includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity.  ¦ Chapter 2, â€Å"Basic Switch Concepts and Configuration†: The exercises in the Study Guide portion help you understand basic Ethernet and switching concepts, including building the MAC address table and collision and broadcast domains. Then, the Packet Tracer exercises 00_2028_fm. qxp xx 4/3/08 5:08 PM Page xx LAN Switching and Wireless, CCNA Exploration Labs and Study Guide cover, in detail, how to configure a switch, including basic switch management and configuring switch security. The Labs and Activities portion includes two Basic Labs, a Challenge Lab, and a Packet Tracer Skills Integration Challenge activity.  ¦ Chapter 3, â€Å"VLANs†: The exercises in the Study Guide portion focus on the concepts of VLANs, including benefits of VLANs and types of VLANs. The exercises then cover VLAN trunking concepts before moving into a section devoted to a VLAN and trunk configuration Packet Tracer exercise. The Labs and Activities portion includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity.  ¦ Chapter 4, â€Å"VTP†: The exercises in the Study Guide portion are devoted to VTP concepts and configuration, including vocabulary, VTP modes, an Internet research exercise, and a VTP Packet Tracer exercise. The Labs and Activities portion includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity.  ¦ Chapter 5, â€Å"STP†: The exercises in the Study Guide portion focus on the concept of redundant LAN topologies, using STP and its variants to stop loops, and the commands to manipulate root bridge elections. The Labs and Activities portion of the chapter includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity.  ¦ Chapter 6, â€Å"Inter-VLAN Routing†: This short chapter focuses on how to configure interVLAN routing, including two Packet Tracer exercises. The Labs and Activities portion includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity.  ¦ Chapter 7, â€Å"Basic Wireless Concepts and Configuration†: The exercises in the Study Guide portion begin with wireless LAN concepts, including standards, operation, and security. The exercises then cover wireless configuration for LAN access using a Linksys WRT300N, including a Packet Tracer exercise. The Labs and Activities portion of the chapter includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity. About the CD-ROM Packet Tracer Activity The CD-ROM included with this book has all the Packet Tracer Activity, Packet Tracer Companion, and Packet Tracer Challenge files that are referenced throughout the book, indicated by the Packet Tracer Activity, Packet Tracer Companion, and Packet Tracer Challenge icons. Packet Tracer Companion Updates to these files can be obtained from the website for this book at http://www. ciscopress. com/title/1587132028. The files will be updated to cover any subsequent releases of Packet Tracer. Packet Tracer Challenge About the Cisco Press Website for This Book Cisco Press may provide additional content that can be accessed by registering your individual book at the Ciscopress. com website. Becoming a member and registering is free, and you then gain access to exclusive deals on other resources from Cisco Press. To register this book, go to www. ciscopress. com/bookstore/register. asp and log into your account or create a free account if you do not have one already. Then enter the ISBN located on the back cover of this book. After you register the book, it will appear on your Account page under Registered Products and you can access any online material from there. 6_2028_ch06. qxp 4/3/08 5:10 PM Page 239 CHAPTER 6 Inter-VL AN Routing Now that you have a network with many different VLANs, the next question is, â€Å"How do you permit devices on separate VLANs to communicate? † The exercises in this chapter review the concepts of inter-VLAN routing and how it is used to permit devices on separate VLANs to communicate. The Study Guide p ortion of this chapter uses a combination of fill-in-the-blank, open-ended question, and Packet Tracer exercises to test your knowledge of inter-VLAN routing concepts and configurations. The Labs and Activities portion of this chapter includes all the online curriculum labs to ensure that you have mastered the hands-on skills needed to understand inter-VLAN routing concepts and configuration. As you work through this chapter, use Chapter 6 in LAN Switching and Wireless, CCNA Exploration Companion Guide or use the corresponding Chapter 6 in the Exploration LAN Switching and Wireless online curriculum for assistance. 06_2028_ch06. qxp 240 4/3/08 5:10 PM Page 240 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Study Guide Inter-VLAN Routing The exercise in this section covers what inter-VLAN routing is and some of the different ways to accomplish inter-VLAN routing on a network. Inter-VLAN Routing Concepts Exercise Introducing Inter-VLAN Routing Define inter-VLAN routing: Briefly explain traditional inter-VLAN routing: Briefly explain â€Å"router-on-a-stick† inter-VLAN routing: What are subinterfaces? Interfaces and Subinterfaces In Figure 6-1, PC1 and PC3 need connectivity between each other. However, each is on a different VLAN. Assume S1 is already configured for traditional inter-VLAN routing. In Figure 6-1, connect S1 and R1 and label the interfaces. Then record the commands to configure R1 with traditional interVLAN routing. Use the first available IP addresses in each VLAN for the router interfaces. Figure 6-1 Traditional Inter-VLAN Routing Configuration R1 S1 10. 10. 10. 10 VLAN 10 PC1 VLAN 10: 10. 10. 10. 0/24 VLAN 30: 10. 10. 30. 0/24 PC3 10. 10. 30. 10 VLAN 30 06_2028_ch06. qxp 4/3/08 5:10 PM Page 241 Chapter 6: Inter-VLAN Routing 241 In the following lines, record the commands to configure R1 with traditional inter-VLAN routing: In Figure 6-2, PC1 and PC3 need connectivity between each other. However, each is on a different VLAN. Assume S1 is already configured for router-on-a-stick inter-VLAN routing. In Figure 6-2, connect S1 and R1 and label the interfaces. Then record the commands to configure R1 with router-on-astick inter-VLAN routing. Use the first available IP addresses in each VLAN for the router interfaces. Figure 6-2 Router-on-a-Stick Inter-VLAN Routing Configuration R1 S1 10. 10. 10. 10 VLAN 10 PC1 VLAN 10: 10. 10. 10. 0/24 VLAN 30: 10. 10. 30. 0/24 PC3 10. 10. 30. 10 VLAN 30 In the following lines, record the commands to configure R1 with router-on-a-stick inter-VLAN routing: Complete Table 6-1, which compares the characteristics of configuring traditional inter-VLAN routing with router-on-a-stick inter-VLAN routing. Table 6-1 Comparing Traditional and Router-on-a-Stick Inter-VLAN Routing Characteristics Characteristic Traditional Router-on-a-Stick Physical interfaces Bandwidth Switch port configuration continues 06_2028_ch06. qxp 242 4/3/08 5:10 PM Page 242 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Table 6-1 Comparing Traditional and Router-on-a-Stick Inter-VLAN Routing Characteristics continued Characteristic Traditional Router-on-a-Stick Expense Physical complexity Configuring Inter-VLAN Routing The exercises in this section cover how to configure inter-VLAN routing and review the commands to configure a switch to support inter-VLAN routing. Inter-VLAN Routing Configuration Exercise Figure 6-3 shows two topologies. One topology is using traditional inter-VLAN routing and the other topology is using router-on-a-stick inter-VLAN routing. The addressing for both topologies is shown in Table 6-2. For this exercise, you will not configure a separate management or native VLAN. Figure 6-3 Inter-VLAN Routing Configuration Topology Traditional Inter-VLAN Routing Router-on-a-Stick† Inter-VLAN Routing R1 R2 Fa0/0 Fa0/1 Fa0/0 Fa0/1 Fa0/2 Fa0/1 S1 Fa0/6 PC1 Fa0/6 VLAN 10: 192. 168. 10. 0/24 VLAN 20: 192. 168. 20. 0/24 192. 168. 10. 10 VLAN 10 Table 6-2 S2 Fa0/11 PC2 192. 168. 20. 10 VLAN 20 PC3 Fa0/11 VLAN 30: 192. 168. 30. 0/24 VLAN 40: 192. 168. 40. 0/24 192. 168. 30. 10 VLAN 30 PC4 192. 168. 40. 10 VLAN 40 Addressing Table for I nter-VLAN Routing Configuration Exercise Device Interface IP Address Subnet Mask Default Gateway R1 Fa0/0 192. 168. 10. 1 255. 255. 255. 0 — Fa0/1 192. 168. 20. 1 255. 255. 255. 0 — PC1 NIC 192. 168. 10. 10 255. 255. 255. 0 192. 168. 10. 1 PC2 NIC 192. 168. 0. 10 255. 255. 255. 0 192. 168. 20. 10 R2 Fa0/0. 30 192. 168. 30. 1 255. 255. 255. 0 — Fa0/0. 40 192. 168. 40. 1 255. 255. 255. 0 — PC3 NIC 192. 168. 30. 10 255. 255. 255. 0 192. 168. 30. 1 PC4 NIC 192. 168. 40. 10 255. 255. 255. 0 192. 168. 40. 1 06_2028_ch06. qxp 4/3/08 5:10 PM Page 243 Chapter 6: Inter-VLAN Routing 243 Enter the commands, including the router prompt, to configure R1 for traditional inter-VLAN routing: Enter the commands, including the switch prompt, to configure S1 to forward VLAN traffic. Assume the VLANs are already created in the VLAN database. However, VLANs have not yet been assigned to any ports. Enter the commands, including the router prompt, to configure R2 for router-on-a-stick inter-VLAN routing: Enter the commands, including the switch prompt, to configure S2 to forward VLAN traffic. Assume the VLANs are already created in the VLAN database. However, VLANs have not yet been assigned to any ports. 06_2028_ch06. qxp 244 4/3/08 5:10 PM Page 244 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Packet Tracer Activity Packet Tracer Exercise 6-1: Inter-VLAN Configuration Now you are ready to use Packet Tracer to apply your answers to the â€Å"Inter-VLAN Routing Configuration Exercise. Open file LSG03-0601. pka on the CD-ROM that accompanies this book to perform this exercise using Packet Tracer. Note: The following instructions are also contained within the Packet Tracer Exercise. Learning Objectives Upon completion of this Packet Tracer Exercise, you will be able to  ¦ Configure traditional inter-VLAN routing  ¦ Configure router-on-a-stick inter-VLAN ro uting  ¦ Verify connectivity  ¦ Save the Packet Tracer file Scenario In this exercise, you will practice configuring both traditional and router-on-a-stick inter-VLAN routing. The routers and switches have a basic configuration. The passwords are cisco for user EXEC mode and class for privileged EXEC mode. Use your answers from the â€Å"Inter-VLAN Routing Configuration Exercise† to complete the tasks. Task 1: Configure Traditional Inter-VLAN Routing Step 1. Configure R1 for traditional inter-VLAN routing. Step 2. Configure S1 to forward VLAN traffic. Step 3. Your completion percentage should be 53 percent. If not, click Check Results to see which required components are not yet completed. Task 2: Configure Router-on-a-Stick Inter-VLAN Routing Step 1. Configure R2 for router-on-a-stick inter-VLAN routing. Step 2. Configure S2 to forward VLAN traffic. Step 3. Your completion percentage should be 100 percent. If not, click Check Results to see which required components are not yet completed. Task 3: Verify Connectivity PC1 should be able to ping PC2. PC3 should be able to ping PC4. Alternatively, you can click Check Results and then the Connectivity Tests tab. The status of both connectivity tests should be listed as â€Å"Correct. † Task 4: Save the Packet Tracer File Save your Packet Tracer file as LSG03-0601-end. pka. 06_2028_ch06. qxp 4/3/08 5:10 PM Page 245 Chapter 6: Inter-VLAN Routing 245 Troubleshooting Inter-VLAN Routing The exercises in this section explore common issues and troubleshooting methods to identify and correct problems in inter-VLAN routing implementations. Common Errors and Troubleshooting Tools Exercise Using the examples shown in the chapter, list at least six common errors in the inter-VLAN routing implementations. Switch Configuration Issues:  ¦  ¦  ¦ Router Configuration Issues:  ¦  ¦ IP Addressing Issues:  ¦  ¦  ¦ What are some useful commands you can use to isolate problems in an inter-VLAN routing network? Switch IOS Commands:  ¦  ¦ Router IOS Commands:  ¦  ¦ PC Commands:  ¦ Packet Tracer Activity Packet Tracer Exercise 6-2: Troubleshooting Inter-VLAN Routing Now you are ready to use Packet Tracer to apply your knowledge of troubleshooting techniques. Open file LSG03-0602. pka on the CD-ROM that accompanies this book to perform this exercise using Packet Tracer. Note: The following instructions are also contained within the Packet Tracer Exercise. 06_2028_ch06. qxp 246 4/3/08 5:10 PM Page 246 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Learning Objectives Upon completion of this Packet Tracer Exercise, you will be able to  ¦ Test connectivity between the PCs and the router Gather data on the problems  ¦ Implement solutions and test connectivity Scenario In this exercise, you will practice troubleshooting both traditional and router-on-a-stick inter-VLAN routing. The routers, switches, and PCs are already configured and are using the IP addresses listed in Table 6-2. You cannot access the routers or switches directly. Instead, you must use the availabl e console connections through the PCs. The passwords are cisco for user EXEC mode and class for privileged EXEC mode. Use connectivity tests and show commands to discover problems and troubleshoot the networks. The exercise is complete when you achieve 100 percent and the two PCs on each network can ping each other. Task 1: Configure Traditional Inter-VLAN Routing The following tests should be successful at the conclusion of this activity:  ¦ PC1 can ping R1.  ¦ PC2 can ping R1.  ¦ PC1 can ping PC2.  ¦ PC3 can ping R2.  ¦ PC4 can ping R2.  ¦ PC3 can ping PC4. Each of these tests should fail on the first attempt. Task 2: Gather Data on the Problems Step 1. Verify the configuration on the PCs. Are the following configurations for each PC correct?  ¦  ¦ Subnet mask  ¦ Step 2. IP address Default gateway Verify the configuration on the switches. Are the configurations on the switches correct? Be sure to verify the following:  ¦ Ports assigned to the correct VLANs  ¦ Ports configured for the correct mode  ¦ Ports connected to the correct device 06_2028_ch06. qxp 4/3/08 5:10 PM Page 247 Chapter 6: Inter-VLAN Routing Step 3. 247 Verify the configuration on the routers. Are the configurations on the routers correct? Be sure to verify the following:  ¦  ¦ Interface status  ¦ Step 4. IP addresses Encapsulation and VLAN assignment Document the problems and suggest solutions. What are the reasons connectivity failed between the PCs? What are the solutions? There could be more than one problem and more than one solution. All solutions must conform to the topology diagram in Figure 6-3 and the addressing in Table 6-2. List the problems, if any, and the solutions for the PCs: List the problems, if any, and the solutions for the switches: List the problems, if any, and the solutions for routers: Task 3: Implement the Solution and Test Connectivity Step 1. Make changes according to the suggested solutions in Task 2. Note: If you make changes to the switch configuration, you should make the changes in Realtime mode rather than Simulation mode. This is necessary so that the switch port will proceed to the forwarding state. Step 2. Test connectivity between PCs and R1. If you change any IP configurations, you should create new pings because the prior pings use the old IP address:  ¦ PC1 should be able to ping R1.  ¦ PC2 should be able to ping R1. 06_2028_ch06. qxp 248 4/3/08 5:10 PM Page 248 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide  ¦ PC1 should be able to ping PC2.  ¦ PC3 should be able to ping R2.  ¦ PC4 should be able to ping R2.  ¦ PC3 should be able to ping PC4. If any pings fail, return to Task 2 to continue troubleshooting. Step 3. Check results. Your completion percentage should be 100 percent. If not, return to Step 1 and continue to implement your suggested solutions. You will not be able to click Check Results and see which required components are not yet completed. However, you can click Check Results and then the Connectivity Tests tab. The status of all six connectivity tests should be listed as â€Å"Correct. † Task 4: Save the Packet Tracer File Save your Packet Tracer file as LSG03-0602-end. pka. 06_2028_ch06. qxp 4/3/08 5:10 PM Page 249 Chapter 6: Inter-VLAN Routing 249 Labs and Activities Command Reference In Table 6-3, record the command, including the correct prompt, that fits the description. Fill in any blanks with the appropriate missing information. Table 6-3 Commands for Inter-VLAN Routing Configuration Command Description Creates a subinterface numbered 10 on the router for Fa0/0 Specifies IEEE 801. 1Q as the VLAN tagging method for VLAN 10 on this subinterface Lab 6-1: Basic Inter-VLAN Routing (6. 4. 1) Learning Objectives Upon completion of this lab, you will be able to  ¦ Cable a network according to the topology diagram in Figure 6-4  ¦ Clear configurations and reload a switch and a router to the default state Perform basic configuration tasks on a switched LAN and router  ¦ Configure VLANs and VLAN Trunking Protocol (VTP) on all switches  ¦ Demonstrate and explain the impact of Layer 3 boundaries imposed by creating VLANs  ¦ Configure a router to support 802. 1Q trunking on a Fast Ethernet interface  ¦ Configure a router with subinterfaces corresponding to the configured VLANs  ¦ Demonstrate and explain inter-VLAN routing 06_2028_ch06. qxp 250 4/3/08 5:10 PM Page 250 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Figure 6-4 shows the topology diagram for this lab. Figure 6-4 Topology Diagram for Lab 6-1 F0/0 R1 WEB/TFTP Server 172. 17. 50. 254 F0/1 F0/1 F0/2 S3 F0/4 F0/5 F0/1 F0/2 F0/3 S1 F0/3 F0/1 F0/2 F0/3 F0/4 F0/4 S2 F0/11 F0/6 F0/18 PC1 172. 17. 10. 21 VLAN 10 PC2 172. 17. 20. 22 VLAN 20 PC3 172. 17. 30. 23 VLAN 30 Table 6-4 shows the addressing scheme used in this lab. Table 6-4 Addressing Table for Lab 6-1 Device Interface IP Address Subnet Mask Default Gateway R1 Fa0/0 172. 17. 50. 1 255. 255. 255. 0 — Fa0/1. 1 172. 17. 1. 1 255. 255. 255. 0 — Fa0/1. 10 172. 17. 10. 1 255. 255. 255. 0 — Fa0/1. 20 172. 17. 20. 1 255. 255. 255. 0 — Fa0/1. 30 172. 17. 30. 1 255. 255. 255. 0 — Fa0/1. 99 172. 17. 9. 1 255. 255. 255. 0 — S1 VLAN 99 172. 17. 99. 11 255. 255. 255. 0 172. 17. 99. 1 S2 VLAN 99 172. 17. 99. 12 255. 255. 255. 0 172. 17. 99. 1 S3 VLAN 99 172. 17. 99. 13 255. 255. 255. 0 172. 17. 99. 1 PC1 NIC 172. 17. 10. 21 255. 255. 255. 0 172. 17. 10. 1 PC2 NIC 172. 17. 20. 22 255. 255. 255. 0 172. 17. 20. 1 PC3 NIC 172. 17. 30. 23 255. 255. 2 55. 0 172. 17. 30. 1 Web server NIC 172. 17. 50. 254 255. 255. 255. 0 172. 17. 50. 1 06_2028_ch06. qxp 4/3/08 5:10 PM Page 251 Chapter 6: Inter-VLAN Routing 251 Table 6-5 shows the port assignments used in this lab. Table 6-5 Port Assignments for S2 Ports Assignment Network Fa0/1–0/4 802. 1Q Trunks (Native VLAN 99) 172. 17. 99. 0 /24 Fa0/5–0/10 VLAN 30—Guest (Default) 172. 17. 30. 0 /24 Fa0/11–0/17 VLAN 10—Faculty/Staff 172. 17. 10. 0 /24 Fa0/18–0/24 VLAN 20—Students 172. 17. 20. 0 /24 Task 1: Prepare the Network Step 1. Cable a network that is similar to the one shown in Figure 6-4. You can use any current switch in your lab as long as it has the required interfaces shown in Figure 6-4 and supports 802. 1Q encapsulation. The router you choose must support inter-VLAN routing. The output shown in this lab is based on Cisco 2960 switches and an 1841 router. Other switch or router models may produce different output. Set up console connections to all three switches. Step 2. Clear any existing configurations on the switches. Clear NVRAM, delete the vlan. dat file, and reload the switches. Refer to â€Å"Lab 2-1: Basic Switch Configuration (2. 5. 1)† if necessary for the procedure. After the reload is complete, use the show vlan command to confirm that only default VLANs exist and that all ports are assigned to VLAN 1. S1#show vlan VLAN Name Status Ports —— ——————————————— ————- ——————————————1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/15,Fa0/16 Fa0/17, Fa0/18, Fa0/19,Fa0/20 Fa0/21, Fa0/22, Fa0/23,Fa0/24 Gig1/1, Gig1/2 1002 fddi-default active 1003 token-ring-default active 1004 fddinet-default active 1005 trnet-default active 06_2028_ch06. qxp 252 4/3/08 5:10 PM Page 252 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Step 3. Disable all ports on the switches using the shutdown command. Ensure that the initial switch port states are inactive by disabling all ports. Use the interface range command to simplify this task. Commands for S1 are shown here: S1(config)#interface range fa0/1-24 S1(config-if-range)#shutdown S1(config-if-range)#interface range gi0/1-2 S1(config-if-range)#shutdown Step 4. Reenable the active user ports on S2 in access mode: S2(config)#interface fa0/6 S2(config-if)#switchport mode access S2(config-if)#no shutdown S2(config-if)#interface fa0/11 S2(config-if)#switchport mode access S2(config-if)#no shutdown S2(config-if)#interface fa0/18 S2(config-if)#switchport mode access S2(config-if)#no shutdown Task 2: Perform Basic Switch Configurations Configure the S1, S2, and S3 switches according to the addressing table and the following guidelines:  ¦ Configure the switch hostname.  ¦ Disable DNS lookup.  ¦ Configure an enable secret password of class.  ¦ Configure a password of cisco for the console connections.  ¦ Configure a password of cisco for vty connections.  ¦ Configure the default gateway on each switch. Only the commands for S1 are shown here: Switch;gt;enable Switch#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname S1 S1(config)#enable secret class S1(config)#no ip domain-lookup S1(config)#ip default-gateway 172. 17. 99. 1 S1(config)#line console 0 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#line vty 0 15 S1(config-line)#password cisco S1(config-line)#login S1(config-line)

Caught in the Trap free essay sample

Aromas confronted me as I walked in the door. Masalas—or spices—like curry, cumin and cinnamon each contributed. I sat on the edge of my chair—eager like a child on Christmas. I wanted to experience these exotic spices. They were delicious and fiery, yet flavorful. This is not the first time I desired something new. I yearn for knowledge and enrichment. If I hear something I don’t know much about, I look it up. A new technique, style, movie, or crisis—my desire for understanding and knowledge ranges. This time, the Indian food caught me in its trap. I needed not only the flavor—but also the culture. I needed to know more. I needed to understand. This is how I came across Hinduism. I saw the fascinating three-like symbol, the Om, before and I had looked it up. I knew it was Hindi. But my eyes were blind to Indian culture and religion. We will write a custom essay sample on Caught in the Trap or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Enthralled by the beauty of the symbol and the delicious food, I started my research online. Then, I turned to books. One about Hinduism. An India travel guide about customs. And lastly, The Bhagavad Gita—a book essential to Hindus. I started with basics and grew. I learned that the cow is sacred and therefore, beef is not eaten and cows not slaughtered. This was something I found fascinating. Beef is vital in America. A good steak, special and expensive. But in Hinduism, the cow is a symbol of life and honored. I was drawn in by the open-mindedness towards other religions. Hindus believe that religion is the same just named differently. This appealed to me because religion is about loving and accepting and in Hinduism this is true. Hinduism is diverse, allowing its own followers to believe in a variety of things. Religion tends to be strict, and the diversity and variety in Hinduism made it appealing. The travel guide explained Hinduism is a way of life and is reflected in the customs. The Bhagavad Gita gave me insight and helped me learn from the same text that a Hindu would learn from. All this new information made me think in ways I hadn’t before, pose questions and challenge my beliefs. Did I still believe the religious foundation built around me? I wasn’t sure. â€Å"Aren’t you a Hindu or something?† asked my brother. I knew this question was coming, but I still didn’t have an answer. â€Å"I’m not sure.† Before claiming it, I want to fully understand. And I am still working towards that. I may adapt to this religion, I may not. But it doesn’t matter. This search is about understanding and delving into the intriguing unknown. The Indian food caught me. Forever I will recall my first meal at Tandoori Nights a year ago and what stemmed from it. What will catch me next?