Tuesday, August 25, 2020

The Big Lebowski Essay Example For Students

The Big Lebowski Essay The entirety of the connections among the components in the film the Big Lebowski may appear to be cryptic with one another, however this style of film makes an incorporated arrangement of disunity. The Coen siblings exhibit this style through different themes all through the film, from the primary characters name to what he drinks. The film is an ideal case of a film which has the topic of disunity. In the film the primary character Jeffery Lebowski, alludes to himself as the Dude. This component of the story turns into a theme. The Dude is alluded to, and alludes to himself as the Dude since it speaks to his character, which is an accommodating cool character. The regular Western culture slang which is related with the word fella, is male whore. In the scene where the Dude gets back in the wake of being captured in Malibu, he end up taking part in sex in line with Mod Lebowski. After they finish, Mod discloses to the Dude that she was utilizing him to surrender a kid. We will compose a custom article on The Big Lebowski explicitly for you for just $16.38 $13.9/page Request now Clearly he was not given cash in return for sexual favors be that as it may, the Dude, much like genuine whores was utilized for sex. The Dude is constantly utilized by his companions and business relates all through the entire film. Despite the fact that introduced as a laidback cool character, the Dudes title is illustrative of how he is seen by everybody around him. In the film, Bowling is viewed as a keeps an eye on action, a place where go to contend and escape from the world. In the bowling alley there will never be a female present in the shot inside any scene. This theme is fortified during the scene entitled Gutter Balls. In the Dudes trip-out it begins as a bowling parody obscene film, which can likewise be viewed as a male thing. It has shots of gliding bowling pins and balls modified in various sexual positions, where the pins speak to the male genitalia. Further on in the fantasy, Mod, who is a solid free character, is spoken to by Viking outfit she is wearing. As opposed to this, she despite everything required assistance from the Dude when bowling. In the Big Lebowski bowling is viewed as a male ruled movement. During the scene where the Dude and Mod Lebowski take part in sex, the Dude pores himself a White Russian. The Dude clarifies that the liquor and weed encourages him think. Im keeping on an exacting medication regiment to ahh, keep my ahh, mind agile. This is indicated when very quickly after he smokes his cannabis and pours his White Russian he makes sense of where large Lebowskis cash is. As opposed to this, the medications and liquor can likewise be viewed as a snag in the Dudes exertion to illuminate the case. At a certain point the Dude crashes his vehicle in the wake of spilling his beverage and dropping a lit joint onto his lap. In another scene the Dude is captured in light of the fact that his White Russian was tranquilized. Medications and liquor become an oddity of the Dudes achievement. In light of these themes we can see that the Coen siblings utilized various themes show any number of various things about the film. They can work together topics of manliness to societys perspectives on the powerless. With this, the Big Lebowski has a topic which must be called varied.

Saturday, August 22, 2020

Lord Of The Flies From A Psychology Viewpoint Essays - Happiness

Ruler of the Flies from a Psychology Viewpoint Ruler of the Flies from a Psychology Viewpoint In the book, Ruler of the Flies by William Golding, there were numerous things that happened that relate well to what we have been doing in Psychology 181. There were a few times when I found myself relating what we realized in class to the circumstance that the gathering of young men in the book wound up in. The information that I have learned has helped me comprehend and attempt to make sense of why a portion of the characters acted the manner in which they did. I found the entire thing exceptionally fascinating. In this report I will show what I have seen as the absolute most fascinating purposes of brain research that were consolidated in Master of the Flies. This will end up being a troublesome, be that as it may, moving assignment. The main thing I saw was we generalization individuals when we meet them. Another, fascinating mental finding that was in the book was that the young men needed to fill the fundamental need. This relates to Maslow's progression of human needs. At long last, in doing this report I get to join another fascinating purpose of brain science. That will be that I am doing a report from auxiliary source in context of the young men on the island. That is with the supposition that the book is a genuine story that happened to this gathering of children. Generalizing had a major impact in the book. From the principal setting, admirably the primary page, there was generalizing going on. This had a major impact in the book as it does in our regular day to day existences. The story line of the book is that there is a plane loaded with little fellows flying over a sea. At the point when the plane goes down hitting an island and a few of the young men make it, none of the grown-ups do. This leaves the kid on an island to endure while they hold on to be saved. In the initial demonstration of the book the generalizing starts. There is a child (Ralph) who is strolling on the island when he meets up with another child (Johnny otherwise called Piggy). Piggy makes a presumption about Ralph before they scarcely meet. Piggy places trust in Ralph by telling him a moniker that he had in school and abhorred. Piggy did every one of these things before he knew Ralph dependent on a generalization than he could trust Ralph. Piggy additionally instructed Ralph so as to be the pioneer of the gathering. In this model you need to accept that Piggy was generalizing Ralph. He didn't know anything about Ralph but then he disclosed to him numerous individual things. Another case of generalizing was when Ralph meets Jack. Jack was another individual from the plane on the island. Jack was at the main gathering and imagined that they ought to have a pioneer. He needed to be chosen, yet the gathering casted a ballot and chose Ralph as the pioneer. Promptly, Ralph put Jack accountable for a gathering of young men. He did this by generalizing that Jack was a characteristic head. He likewise got the opportunity to dodge the underlying struggle that may have happened sooner if Jack had not had control over something. This is another fine case of generalizing. Generalizing makes a difference us out in our regular day to day existences. It causes us make speculations about individuals this isn't really a positive or negative arrangement. It is acceptable in that it makes a difference us keep things sifted through in our psyches. It additionally causes us to act in an appropriate route around various types of individuals as indicated by social standards. Generalizing can likewise make a negative influencing that; it can make wrong impressions about individuals. This can do numerous things; it can prompt shame by acting distinctively around various sorts of individuals; it can prompt unjustifiable or on the other hand predisposition suppositions about a specific gatherings or sorts of individuals. Generalizing is a major piece of everybody's everyday life. My second mental reference leads me to Maslow's pecking order of human needs. This comes up on the grounds that the young men are on a new island and the sum total of what they have is the garments on their backs. This implies on the island, there is nothing to fill any of their need. Generally none of the children even knew one another. This leads me to the initial segment of Maslow's discoveries. Which is that of the human needs expressed by Maslow. You have to have physiological security at the top. Each one of the young men filled this need first. Ralph was

Friday, July 31, 2020

Work Life Balance Definition and Practical Tips

Work Life Balance Definition and Practical Tips Ask the first person you see how he would define happiness. Then ask another person. And another, and then another. From asking the same question to several people, you are bound to get different answers.One may equate happiness with having a lot of money. Another may say it would be getting the job of their dreams. One may even say that having a family is what will ultimately make him happy. The answers can be varied.Among those answers, there may be a few that define happiness along the lines of having a balance among all the aspects of one’s existence, such as personal life, professional life, and family life.There has to be a balance between the negative and positive aspects in order for everything to go smoothly. © Shutterstock.com | ratchAccording to author and journalist Paul Krassner in an interview in 1963, “one of the aspects of happiness is when you can make as little distinction as possible between your work and your play”. But this dichotomy between work and play has been around since the middle of the 1800s. However, it was only during the 1970s and 1980s that the concept of work-life balance was shed more light.In this guide, we explore 1) the connection between work and life, 2) common misconceptions about work-life-balance, 3) the importance of achieving it, 4) how to achieve your work-life-balance.THE CONNECTION BETWEEN WORK AND LIFEFor many, talking about work-life balance immediately brings to mind scenes of visiting a psychologist or psychiatrist and starting a discussion about the meaning of life. It sounds like a very complicated concept and, for many people, it probably is. However, it doesn’t have to be, and we hope to provide even a small amount of enlightenment on the topic.Work-life basically refers to the proper prioritizing of an individual between his work or career and his personal life or lifestyle. You may hear other people talking about how they have to balance their work and family. Work-family balance is merely one of the many aspects of having what we call a work-life balance.Worklifebalance named two key everyday concepts that will help us come up with a positive and clearer definition of work-life balance: achievement and enjoyment. These two concepts always go together, meaning you cannot have feel fulfillment out of achieving something if you did not enjoy it, and you cannot enjoy doing something if you do not accomplish anything. These two, together, help an individual realize the full value of life.The four quadrants of live are:  Work, Family, Friends, and Self. All four are subject to both achievement and enjoyment. Let us simplify that quadrant by categorizing family, friends and self into personal life, and putting work into a separate category on its own.Work-life balance is when you can objectively say that you were able to achieve and enjoy something with your family and friends. When you were able to achieve and enjoy something for yourself. When you were able to achieve something at work, doing a job that you enjoy doing.MISCONCEPTIONS ABOUT WORK-LIFE BALANCEWork-life balance does not mean that both blend as one.This may be the first assumption one would make once they read what Paul Krassner said about work-life balance referring to work and play having very little separation. It does not necessarily mean that the lines will be blurred, such that you’d no longer be able to distinguish work from play, and vice versa. Work will still be distinct as work, and play will remain recognizable as play.Work-life balance does not mean having equal amounts of each.Let us say that you spend 8 hours of the day working. Does that mean that you should also spend as much time â€" 8 hours â€" playing? Not r eally. In fact, this can be very stifling, since your work and life will have to adhere to a certain schedule or timetable, where everything is strictly the same, or equal. “Balanced” does not necessarily mean equal.Work-life balance is not fixed at all time.Priorities change. That means that the work-life balance may also change. A fresh graduate from college will have a specific work-life balance at that time. However, that balance will be different once she reaches her 30s and she has a family of her own. It is also likely to change when she reaches the age of 50 and her kids are all off to school, leading their own lives. Therefore, you should not expect one’s work-life balance to remain the same all throughout his life.What works for one will work for everyone.There is no set formula to obtain work-life balance. It’s not a one-size-fits-all deal, wherein what works with one person will naturally work with everyone else. The mere fact that people have different prioritie s and lifestyle choices is already an indicator that there would be varying approaches to obtaining and maintaining the balance between their work and personal life. IMPORTANCE OF WORK-LIFE BALANCEBefore we can fully get into the reasons why we should seek work-life balance, take a look at the following scenarios:A male executive in his early 30s is on the fast track for a promotion, putting him in a potential position of becoming the youngest ever senior manager in the corporation. To get that promotion, he spends more hours at work than usual, taking on a lot of jobs all at once, probably even more than he can chew. His stress levels increased until, at one point, he collapsed and had to be brought to the hospital.A married woman with two kids wants to prove that she is a capable career woman. In order to prove that, she feels compelled to spend most of her time at the office, leaving the care of her children to her husband, who also has a job. This resulted to a distance between her and her children, who rarely see her at home.An employee devotes a lot of time cozying it up with co-workers, in the hopes that they would be able to work together smoothly. This resulted in a tight-knit relationship between her and his co-workers. However, she has no other circle of friends outside of work.From the three scenarios described above, which of the three employees has work-life balance?No one.Some of the harmful consequences of a poor work-life balance (or the lack of one) includes the following:Health issues. Stress is just the beginning for many. It can snowball into bigger health problems and disorders if left untreated. Some of the common medical issues are cardiovascular diseases, headaches, migraines, body pains and aches, depression and weight problems. Some may even resort to substance abuse and alcoholism.Decline in personal productivity. Exhaustion â€" both physical and mental â€" will have a negative impact on one’s work and home life. This will also ma ke the individual prone to mistakes, and churn out subpar quality work and output. They may also end up incurring tardiness and absences regularly.Decline in organizational productivity. An organization might as well kiss its goals goodbye if it has a workforce composed of overtired, burnt out and stressed workers. Unproductive workers, after all, lead to an unproductive organization. Naturally, low productivity also means less profits.High labor turnover and low employee satisfaction. Employees will not stay long in the company, especially if they are highly dissatisfied and constantly frustrated with how the organization aids in their work-life balance maintenance.Injuries and accidents. Exhausted workers are more prone to making mistakes, which makes them bigger risks for accidents and injuries. Poor eye-hand coordination and reflexes will also put them at risk, especially if they are working in highly technical jobs, or those that require the handling of machinery and equipment. Loneliness. Yes, they will also tend to be lonely. They have no friends, and they do not interact with anyone other than their family members and the people they work with. This will lead to feelings of isolation, as the friends that they no longer have time for slowly drift away.Get some tips from Brian Tracy on developing your work-life-balance. HOW TO ACHIEVE WORK-LIFE BALANCEFor sure  it is difficult to juggle a career and one’s personal life, especially if there are family and friends involved. That does not mean, however, that it cannot be done. Achieving work-life balance is a challenge, but it is one that anyone can rise to. Here are some methods on how you can achieve and sustain work-life balance.Exercise time managementMaintain a journal and create a timetable.You can start small. Write down all the activities that you perform in a week, from Monday to Sunday. When we say “all activities”, this includes those that are work-related and personal life-related. Writing things down in a journal helps in making things more concrete and resolute. In case you are confused on what to do, you can simply consult your journal and be reminded.By creating a schedule, you will have a better picture of what to expect in the week to come. This will mentally prepare you for anything that may come up at work or at home. It will also put a semblance of order into things, so you don’t find yourself flailing about aimlessly, with no direction.Insert a downtime in your schedule.No matter how busy you will be in the coming week, make sure to build some downtime into it. It could be time spent with family and friends, or you could insert some relaxing activities that you can do by yourself.The purpose of this downtime is to let you recharge, gather your bearings, and “catch your breath”, so to speak, especially if it has been a particularly busy week at work. This downtime will also give you something to look forward to and anticipate. Say you have dinner and mo vie night scheduled with your girl friends on Friday night. Knowing that it will happen on Friday is likely to put a spring into your step as you go about your chores at home and your tasks at home on the days leading up to Friday night.Examples of downtime inserted in one’s schedule are an hour-long yoga class at the end of the day, swimming several laps at the pool right before breakfast, or going for a run in the early hours of the morning before taking a shower and heading off to work.Do not give the “I don’t have time” reason. “I don’t have time to even have a morning run”or “I don’t have time for a yoga class after work before heading home”. Make time. That is why you have to be more proactive in your scheduling.Organize your tasks efficiently.This goes for both household chores and work tasks. At home, if you are used to doing your laundry every day, you can probably schedule it every two days or three days, or during the weekend.When you are going to shop for your groceries and household supplies, list down everything you need so you can purchase them all at one go, dispensing the need to go on multiple trips to the supermarket every time you need something.Watch this beautiful way to structure your tasks. Its visually similar to a kanban board. Make room for spontaneity.While it is true that we suggest scheduling to keep things organized and easier to manage, we also recommend that you also plan for spontaneity. Leave a day, or a couple of hours during the week blank. No activities scheduled, nothing definite planned.And then, you can just fill it in when an activity occurs to you. Curious about that new ballroom dance class being offered in the studio across the street? Go check it out. You heard about an antique showcase in the next building? Swing by for at least half an hour.Commit yourself and stick to the schedule.This is probably the most important part of the tips on time management. Some people work out elaborate and clear -cut schedules. On paper, it looks perfect and absolutely doable. However, they do not stick to the schedule and end up veering away from it most times. This will render all your scheduling useless.Set goals, expectations and limitationsAccording to Matt Might, maintaining work-life balance requires the “setting of boundaries”. But it is not enough to just set those boundaries. You have to enforce them, put your foot down, and be firm about it.Conduct self-assessment.You have to know what you are capable of, and acknowledge what you cannot do. This will help you better in your scheduling and in making lifestyle choices. There are several tests that will help you perform self-assessments if you are having trouble listing down your strengths and weaknesses by yourself.Set goals and objectives.It does not matter if they are short-term objectives or long-term goals. Your objective may even fall along the lines of what you want to accomplish at the end of the day, or the week, or of the month. Just make sure that you have them.What do you want to achieve? What do you want to prove? What do you want to happen? Answering these questions will act as a guide in your succeeding decisions about your work and personal life.Choose your activities wisely.Burnout is primarily due to taking on more activities than one can handle at one time. Everything becomes too much, too heavy, and the person just breaks down. They end up over-committing themselves, and then feeling extreme disappointment if they are unable to deliver on all the things that they have committed to. A possible result of this frustration? Depression.One way to address that is to pick the activities that will be done.Identify the activities that you enjoy or love doing. From the journal that you have written, listing down all the activities that you will be doing, or plan on doing, for the rest of the week, start by identifying those things or activities that you actually want to do.Identify the activities that you must do, whether you want to do them or not. Often, these may include tasks at work, or errands that you are tasked to do. Create a separate list for them because, like it or not, you will have to perform them.Drop the activities that take up too much of your time. Psychologist and executive coach Marilyn Puder-York suggests that you should drop the activities that do not really do not add value, or do anything to enhance your career or your personal life. If you cannot drop them entirely, you can try to minimize the time spent on them.Drop the activities that use up a lot of your energy. Some activities are more draining than others. You are doing something, and then you realize later on that you just tired yourself out needlessly, with no positive effect on your personal life or your career. These activities should also go, so you can make room in your schedule for other activities that actually do add value to your work and life.Consider alternative courses of action. W hat if you can achieve the same results, but you just did things differently? There may be an errand that you have to do, but what if you can find a way to cut down the time devoted to it? For example, instead of always rushing to pick up your child from school at the end of the day, you can make an arrangement with your neighbor, whose kid also goes to the same school. You can agree to pick the kids on alternate days, or whatever schedule you will be able to work out.At work, if you find that going to and from work is stressful because of heavy traffic, look into the possibility of working flexible hours, or even working from home. Check with your employer if these options are available, or these types of special arrangements are allowed.Keep work separate from home.Work is work, home is home. There should be no place for work at your home (unless, of course, the nature of the job has you working from home). Limit yourself in bringing work home. This is a practice done by many empl oyees: when they are unable to finish something, they pack it up and bring it home with them. The result is a dinner table strewn with papers and notes, instead of a meal eaten with family.If your workplace is your home, you have to designate an area that is exclusively for work, and keep anything personal from entering that domain. The same applies in instances where you have no choice but to bring work home. Pick a certain area of your home to do your work in, and keep it there.Put yourself firstAt the risk of sounding selfish, you should definitely put yourself first. Lately, the term “workaholic” has been getting negative connotations, and for good reason. Workaholics, after all, are often described to have “no life”. You don’t want that person to be you, do you?Stay active and fit.Make time for exercise, even if it’s just a few minutes in a day, or a few hours in a week. In an effort to help work-life balance among employees, many organizations create policies thatT here are a lot of advantages of adding exercise in your to-do list.Exercise boosts your energy levels. If your energy is high, you will not tire easily, and you can handle anything that comes your way with optimism and enthusiasm. Those who are getting bored with monotony at work will be able to go to work with renewed zeal.Exercise improves your ability to concentrate and focus. According to psychologist Robert Brooks, exercise can help you become more alert. This will improve your concentration and focus, allowing you to perform better at work.Exercise puts you in a good mood. If you are in a good mood, you will look forward to going to work and accomplishing your assigned tasks. The feel-good endorphins will flow through your body, thanks to exercise.Exercise keeps you physically fit and healthy. A healthy workforce is a productive workforce. You may be motivated to work, with a strong drive and determination to carry out your tasks efficiently and effectively. However, if your b ody is unhealthy and you fall ill easily, you won’t be able to do everything that you planned on doing.Meditation is another recommended activity, although it may not work for most people as exercise does. The good thing about meditation is that you can do it practically everywhere. Take a few breaths on the commute to work. Meditate for a few minutes before going to bed. These may sound too simple, but they can actually do a lot for your stress levels.Watch this very relaxing guided meditation so you can focus on the current moment. Celebrate special occasions and milestones.Many companies impose a birthday leave policy, where employees can take their day off on their birthdays so they can celebrate it with their loved ones.They also allow days off on other important family occasions such as anniversaries and even conduct family days, or recreational activities where they can bring members of their family for a day of merriment and solidarity.Unplug yourself once in a while.Somet imes, with technology always being an arm’s reach away, it is hard for us to leave our work behind. On a weekend outing with the family, the father may still tear himself away from playing with his kids to make a work phone call. In the middle of family dinner, he will remember something important and log into his office account to do “a little bit” of work.Pick a day to unplug yourself from these conveniences, even for a day out of the week. Or, if that is not possible, for a couple of hours during the day. Take the example set by France, when a labor agreement was signed by unions and employers in the high-tech and consulting field, banning employees to check their work emails once the clock has struck 6pm. This allowed employees to solely focus on their home and families after 6pm.Learn to say no.Employees are inclined to say yes and agree to everything that the boss says. This is partly to stay on the boss’ good side, and to avoid conflicts or disagreements at work. Howe ver, when the circumstances do not allow it, and you feel that you are being taken advantage of, you should speak out.Just say no when you are being told to do something that you know is beyond your capability at that moment. For example, you just put in all-nighters for the past week, missing sleep and barely seeing your family in the interim. When the work was done, your boss has another to put on your plate. You feel your body breaking down, and you just want to curl up and get proper sleep. Just say no, you won’t be able to do it, at least not until you have recharged. Do it in a respectful and diplomatic way, stating your reasons.Get enough rest and sleep.If you keep on running on two to three hours’ worth of sleep every day, that is bound to take a toll on your body and disposition. Try to get as much proper sleep as you can, and if you have the opportunity to get some shut-eye, even a power nap during lunch time, then do so. It may be short, but it will work wonders in re charging you right up.Get a hobby.Remember those activities that you loved doing when you were young, and when you were not yet working? Maybe you can try going back to them. If you have a passion for carpentry and building things, you can devote even an hour or two every week for that.Your hobby is something that is solely yours. It is something that you do entirely for yourself; not your family and friends, and certainly not the people you work for and work with. Keep the hobbies that you have, and revisit the ones that you let go of in the past.Don’t spoil your bosses and co-workers.Are you the type to immediately answer on the first ring? Are you the type to drop anything that you are doing and rush to work at a moment’s notice because you were called in? This is actually a commendable trait, but it also opens possibilities of you being abused by your bosses and co-workers. Soon you will notice that they will call you at any time, even when you are away on a much-needed and long-overdue trip to the beach with your family.Make it clear to your bosses and co-workers that, while on a trip, you won’t be immediately available to receive their calls or do whatever it is they need you to do. Let them know that you will eventually get back to them, just not instantly.Volunteer.Wait, did I hear you right? I barely have enough time to squeeze in some exercise, but I should volunteer too?According to research, volunteering gives a greater sense of work-life balance. It zeroes in on the innate desire of humans to become socially responsible towards other people. This takes care of the employee’s social well-being, and will also boost their emotional well-being.Many organizations integrate volunteer work and make it a part of their corporate social responsibility programs. Employees should consider joining these activities, because it will be like hitting two birds with one stone.Communicate clearly and properly.Did you know that most conflicts in relationships result from miscommunication or lack of communication? Couples get into an argument because one failed to talk to the other about something important. Business partners develop rifts because they did not talk about a business plan prior to implementing it. Friends become estranged because they refuse to talk about their differences or whatever it is that bothers them.By keeping communication lines open with family and friends, you will be minimizing the possibility of alienating them. If work is suddenly becoming more demanding, let your family and friends know about it clearly, so they will not be surprised at how little time you are spending with them. This will clear the air and prevent them from suspecting that you are pulling away intentionally.Seek help.If, despite all these, you still have trouble achieving work-life balance, then you should probably consider asking for help. Talk about it with your supervisor or bosses. Let your family know about the difficulties you are fa cing. Ask them for their advice and any other assistance. You may also consider seeking the help of a professional, although that may be a last resort.

Friday, May 22, 2020

Edgar Allan Poe Essay examples - 692 Words

Short Stories + Terror = Poe American Romanticism brought a new era to America and American literature. Within literature of the Romanticism era came the development of the gothic novel. Edger Allen Poe is one of the well-known gothic authors which arose from this era. Throughout Poe’s career he wrote many short stories following one theory which he created - that every aspect of a short story should lead to one single effect. For Poe many of his stories have the single effect of terror. In Poe’s story â€Å"The Fall of the House of Usher† he creates the single effect of terror through his description of the house, the entombment of Madeline, and Madeline’s appearance at the end of the story. At the beginning of the story, the narrator†¦show more content†¦Instead of burring her in the family cemetery far away from the house Roderick, Madeline’s brother decides to burry her beneath the house( 752). As the narrator describes, Madeline is pl aced in a vault which is â€Å"small, damp, and entirely without means of admission for light†(Poe 272). After Madeline is placed in the vault the lid of her coffin is â€Å"replaced and screwed down† and the iron door to the vault is secured. Madeline is now screwed alive into a coffin and locked into a dark vault. The mere thought of Madeline’s entombment should evoke terror into any reader. Finley Madeline’s appearance at the end of the story is the last and most crucial part in creating the story’s terror. Roderick and the narrator along with the reader have now assumed that Madeline is dead. While the narrator is reading to Roderick, he begins to hear noises that coincidently coincide with the actions in the story he is reading. The story is about to reach its climax when the narrator finds Roderick sitting in front of the room door mumbling. Before the narrator can figure out what Roderick is saying the bedroom door abruptly opens and Madel ine appears in her white robes bloodied by her struggle, falling upon her brother to bring both of them to their deaths(Carpenter 753). In retrospect Poe creates a masterful terror in â€Å"The Fall of the House of Usher† through his description of the house, Madeline’s entombment and the crucialShow MoreRelatedEdgar Allan Poe721 Words   |  3 PagesEdgar Allan Poe Edgar Allen Poe, born is 1809, was an American short story writer, poet, and critic. He is commonly know as the father of detective stories. His most well know work of art is his poem The Raven (Werlock). Although Poe had a short lived career, his literature continues to influence many writers in the United States and Europe. He worked with many genres such as: gothic tale, science fiction, occult fantasies, and satire. While many critics consider his works of literature as grotesqueRead MoreEdgar Allan Poe792 Words   |  4 Pagesauthor, Edgar Allan Poe, on Sunday October 7, 1849. In Massachusetts on the 19th day of January in the year 1809, Edgar Poe was born to actress Elizabeth Arnold Hopkins Poe and actor David Poe Junior, making him an older brother to Rosalie Poe, and a younger one to William Henry Leonard Poe. Poe may, perchance, have been named after a character in the play that his parents were performing that year. He was never formally adopted, however, Edgar Poe was r enamed Edgar Allan Poe when the John Allan familyRead MoreEdgar Allan Poe1245 Words   |  5 Pagesbe discussing about my poet Edgar Allan Poe. Poe had written numerous of poems and stories but the one I chose was â€Å"Annabel Lee†. This poem was written in 1849 which was a long time ago. Even though this poem is centuries old, it is still a well known poem. This whole project includes a biography, literary movement, and a explication about the poem. The biography includes where Poe grew up and how his lifestyle were. Through research and sources, I found out that Poe lived a hard life. He was inRead MoreThe Rise Of Poe By Edgar Allan Poe1635 Words   |  7 PagesThe Rise of Poe The words people use and how they use them holds so much power within themselves. It seems that, people are always searching for the right words to express their true emotions towards a certain subject. Artists and authors manage to make a living off of knowing how to use the right words to reach through to their platform. Though within his time, Edgar Allan Poe did not have an established platform and was seen as estranged; he still dabbled as an author and has made many famous shortRead More Edgar Allan Poe Essay515 Words   |  3 Pages Edgar Allan Poe nbsp;nbsp;nbsp;nbsp;nbsp;Edgar Allan Poe, the first master of the short story, had written many short stories from mysteries to morbidity. Edgar was born on January 19,1809 in Boston, Massachussettes. Edgars Parents, David and Eliza, were both in the acting business. Poe also had a sister, who is rarely spoken of. When Edgar was young his father fleed from the family, leaving Edgar, his mother, and sister alone. At the age of two Edgars mother died of tuberculosis. Edgar wasRead MoreDeath By Edgar Allan Poe975 Words   |  4 Pagesabout the topic, and the fear of not knowing this leads it to be a taboo subject in many discussions. Edgar Allan Poe defied this sense of taboo and wrote many works centering on the topic of death. It is Edgar Allan Poe’s discussion of death in his works that reveals the innate human perversion of the discussion of death. The reason for his discussion of death may find roots in his personal life. Poe was born into a traveling family in 1809 and had two other siblings. His parents tragically lost theirRead MoreThe Biography Of Edgar Allan Poe841 Words   |  4 PagesThe Biography of Edgar Allan Poe â€Å"Lord, help my poor soul†, the last and final words of the amazing writer, Edgar Allan Poe, before his sudden death in 1849. Edgar Allan Poe wrote dark and treacherous stories and poems that often lead to the questioning of his mental state. Poe lived a rather difficult life in which writing was his escape. He at one time was in so much debt that he could have never payed it back even if his career took off. No one ever knew what had happened to Poe, only that heRead More Edgar Allan Poe Essay1589 Words   |  7 Pages Edgar Allen Poe Edgar Allan Poe Edgar Allen Poe’s contributions to American literature have become increasingly more prominent as the years have passed. As short fiction has become a more accepted genre in literary circles, Poe’s theories are studied with more passion. Although he lived a rather melancholy life, Poe did experience moments of joy, and desired to capture the beauty through poetic form. Indeed, what he left behind for the literary world was his gifted genus, revealed throughRead MoreEdgar Allan Poe Essay1575 Words   |  7 PagesEdgar Allan Poe Edgar Allan Poe was a bizarre and often scary writer. People throughout history have often wondered why his writings were so fantastically different and unusual. They were not the result of a diseased mind, as some think. Rather they came from a tense and miserable life. Edgar Allan Poe was not a happy man. He was a victim of fate from the moment he was born to his death only forty years later. He died alone and unappreciated. It is quite obvious that his life affected hisRead MoreEdgar Allan Poe Essay812 Words   |  4 PagesEdgar Allan Poe Edgar Allan Poe was one of Americas famous poets, fiction short-story writers, and literary critics. He is known as the first master of short story form especially in tales of horror, and mystery. The work he produced was considered to be some of the most influential literary criticism of his time. His poems made him one of the most famous figures in American literary history. His influence on literature is seen in all literature books in schools everywhere. Some of his famous

Sunday, May 10, 2020

Schizophreni A Mental Disorder - 904 Words

Schizophrenia is a chronic mental illness that affects approximately 1% of people around the world, and more than two million citizens in the U.S. alone (Dryden-Edwards). This illness is seen to affect men more often than woman. Schizophrenia is one of many psychotic mental disorders and usually presents with symptoms including behavior, thought, and social issues. Many people would describe schizophrenia more simply as a mental disorder that is characterized by abnormal social behavior which leaves the sufferer with a hard time differentiating things that are real from things that are hallucinations. There are five different types of schizophrenia that are all categorized differently due to the different symptoms the person experiences. The five different types of schizophrenia are: Paranoid schizophrenia, Disorganized schizophrenia, Catatonic schizophrenia, Undifferentiated schizophrenia, and Residual schizophrenia. Though all different types of schizophrenia have unique symptoms, Undifferentiated schizophrenia contains all of the symptoms from every type of schizophrenia put together. Before people put a name to this illness is was deemed a separate mental illness by Emile Kraepelin, a German physician, in 1887. Rather than schizophrenia, Dr. Kraepelin referred to this mental disorder as â€Å"dementia praecox and manic depression†. Though there was not a specific name for this illness recorded symptoms similar to those of schizophrenia can be traced as far back as 2000Show MoreRelatedSchizophreni A Mental Disorder1048 Words   |  5 Pages Schizophrenia is in a mental disorder classification on its own. Schizophrenia is said to possibly date as far back as Egyptian times. Although it may date back to ancient times, the first belief was that the person was possessed by a demon or was being punished for not obeying the God’s wishes. Schizophrenia has not always had that name. The term used before Eugene Bleuber renamed it was called dementia praecox. Arnold Pick was actually the first one to name the disorder dementia praecox but wasRead MoreSchizophreni A Mental Disorder Essay1427 Words   |  6 PagesIntroduction Schizophrenia is a mental disorder that often appears in someone’s early adulthood stage, but it can emerge at any point of time in life. This disorder affects the brain and is considered as psychosis, which is a type of mental illness that makes people with it unable to differentiate between reality and imagination. The first person to identify schizophrenia as a mental illness was German physician Dr. Emile Kraepelin in 1887 and categorized it as dementia that occurs early in lifeRead MoreSchizophreni A Mental Disorder Essay1278 Words   |  6 PagesSchizophrenia is a mental disorder that takes over a patient’s body and mind. Schizophrenia’s causes and mechanisms remain poorly understood, and the most common treatments do little to restore patients health (Kurtz 7). Schizophrenia affects the person’s brain and ability on to think and function. People with Schizophrenia have voices inside their heads telling them to do things they don t want to. People with schizophrenia are not eligible to control the things they do or say. Schizophrenia isRead MoreSchizophreni A Distinct Mental Disorder862 Words   |  4 PagesSchizophrenia Deemed as the disorder with no preference, schizophrenia has followed mankind since the times of Ancient Egypt (2000, Okasha) under the broad term of â€Å"madness† yet it was not officially recognized until 1887 when Dr. Emile Kraepelin issued it a distinct mental disorder (2012, Burton). Widely thought to be a split personality disorder, it has in fact nothing to do with multiple personality conditions but instead, schizophrenia is an extreme thought disorder that causes disconnected thoughtsRead MoreSchizophreni A Severe Mental Disorder2078 Words   |  9 PagesDefinition Schizophrenia is a severe mental disorder characterized by some, but not necessarily all, of the following features: emotional blunting, intellectual deterioration, social isolation, disorganized speech, behavior delusions, and hallucinations. Delusions are beliefs that are not true, like people are trying to hurt them, believing other people can read their mind, or they have special abilities or powers. Hallucinations are hearing voices that are not there. People with schizophrenia mayRead MoreSchizophreni A Severe Mental Disorder2469 Words   |  10 PagesDefinition Schizophrenia is a severe mental disorder characterized by some, but not necessarily all, of the following features: emotional blunting, intellectual deterioration, social isolation, disorganized speech, behavior delusions, and hallucinations. Delusions are beliefs that are not true, like people are trying to hurt them, believing other people can read their mind, or they have special abilities or powers. Hallucinations are hearing voices that are not there. People with schizophreniaRead MoreSchizophreni A Severe And Disabling Mental Disorder924 Words   |  4 PagesSchizophrenia is a severe and disabling mental disorder, affecting approximately one percent of the world s adult population. Researcher say there are several of causes for this disorder, for instance genetics, substance use, or even the environment. As research began we found that, â€Å"schizophrenia can occur at any age, the average age begin in the late teens to the early 20s for men, and the late 20s to early 30s f or women† (NAMI). As said this disorder can go both ways with either women or men

Wednesday, May 6, 2020

M11Cde Skills-Based Assessment Free Essays

string(39) " be responsible for an entire network\." School of Engineering Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. We will write a custom essay sample on M11Cde Skills-Based Assessment or any similar topic only for you Order Now Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. . Download an electronic copy of this document and where there are blanks or spaces to complete addressing information etc. , please include them in the document. You submission should include the answers in the document, but do not change the document in any other way! If the document has been modified other than to include the required information your submission will be null and void. 3. Your files should be name as â€Å"SID_FIRSTNAME_SURNAME. doc†. E. g. 100292_FIRSTNAME_SURNAME. doc. 4. Save the configurations from all your network devices and embed them into the end of this document. 5. If you have attempted to configure VLANs, please also include a switch configuration from any one of your LAN switches. Please note that this must be a switch that you have actually configured VLANs on. 6. If you have implemented the network in Packet Tracer, you may consider submitting a copy of that as well but this is not compulsory. Zero Tolerance for late submission: If your work is late it will have to be marked zero according to new university policy. Please ensure you upload your work well before the deadline. You will be able to delete and update your work before the deadline. Plagiarism Note: As with all assessed work, both the research and written submission should be your own work. When submitting this work you are explicitly indicating that you have read the rules on plagiarism as defined in the University regulations and that all work is in fact your own, except where explicitly referenced using the accepted referencing style. Feedback and marking: The practical work will be marked by using the questions set in the online quiz and number of questions for each section will depend on the weightings set in the below sections. Feedbacks and marks will be provided once the online practical quiz is submitted. Network topology [Whilst the topology shows only two hosts on each LAN, you should configure four hosts on each LAN. ] Network Information The WAN IP network address between Dundee and Glasgow is 209. 154. 17. 0 with a subnet mask of 255. 255. 255. 0. The WAN IP network address between Edinburgh and Glasgow is 209. 154. 16. 0 with a subnet mask of 255. 255. 255. 0. This is clearly shown on the network topology. Dundee information The LAN for Dundee has been assigned an IP network address of 192. 168. 6. 0 Each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 40. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Dundee |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 6th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. The table below shows how the 6th usable network can be identified. |Network |Network ID |First Host |Last Host |Broadcast |Mask | |0 |192. 168. 6. 0 |192. 168. 6. 1 |192. 168. 6. 14 |192. 168. 6. 15 |/28 | |1 |192. 168. 6. 16 |192. 168. 6. 17 |192. 168. 6. 30 |192. 168. 6. 31 |/28 | |2 |192. 168. 6. 2 |192. 168. 6. 33 |192. 168. 6. 46 |192. 168. 6. 47 |/28 | |3 |192. 168. 6. 48 |192. 168. 6. 49 |192. 168. 6. 62 |192. 168. 6. 63 |/28 | |4 |192. 168. 6. 64 |192. 168. 6. 65 |192. 168. 6. 78 |192. 168. 6. 79 |/28 | |5 |192. 168. 6. 80 |192. 168. 6. 81 |192. 168. 6. 94 |192. 168. 6. 95 |/28 | |6 |192. 168. 6. 6 |192. 168. 6. 97 |192. 168. 6. 110 |192. 168. 6. 111 |/28 | |7 |192. 168. 6. 112 |192. 168. 6. 113 |192. 168. 6. 126 |192. 168. 6. 127 |/28 | You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192. 168. 5. 0 Again, each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 240. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Edinburgh |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 4th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. You must follow the example for Dundee to complete the table for step 1 planning. You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. The elements of the coursework are: 1. Planning and assigning addresses [30 marks] 2. Basic configuration [40 marks] 3. Security ACLs [10 marks] 4. Security VLANs [20 marks] The basic theme is that Glasgow (GLA) is regional headquarters of the company. Edinburgh and Dundee are branch offices. Each network associate (student) will be responsible for an entire network. You read "M11Cde Skills-Based Assessment" in category "Essay examples" This means that using either the lab equipment in EC1-13 or Packet Tracer, you will configure 3 routers, 2 switches and 8 PCs. A network address and specific number of hosts per subnet has been assigned for the local LAN on each network (Edinburgh and Dundee). From the information provided, the subnet address, the subnet mask, the first and last usable addresses and the broadcast address for each site LAN need to be determined. (When using the router or Packet Tracer – it is expected that you keep a copy of your router configuration at each stage, just in case you run into problems). Step 1 Planning Using the chart below, plan the first ten usable subnets of the LAN address assigned to Edinburgh. You have been given the first 6 addresses for Dundee, you are now expected to plan for the first 10 addresses for Edinburgh. Subnet |Subnet |Subnet |First Host |Last Host |Broadcast | | |Address |Mask (/x) | | | | |0 |192. 168. 5. 0 |28 |192. 168. 5. 1 |192. 168. 5. 14 |192. 168. 5. 5 | |1 |192. 168. 5. 16 |28 |192. 168. 5. 17 |192. 168. 5. 30 |192. 168. 5. 31 | |2 |192. 168. 5. 32 |28 |192. 168. 5. 33 |192. 168. 5. 46 |192. 168. 5. 47 | |3 |192. 168. 5. 48 |28 |192. 168. 5. 49 |192. 168. 5. 2 |192. 168. 5. 63 | |4 |192. 168. 5. 64 |28 |19 2. 168. 5. 65 |192. 168. 5. 78 |192. 168. 5. 79 | |5 |192. 168. 5. 80 |28 |192. 168. 5. 81 |192. 168. 5. 94 |192. 168. 5. 95 | |6 |192. 168. 5. 96 |28 |192. 168. 5. 97 |192. 68. 5. 110 |192. 168. 5. 111 | |7 |192. 168. 5. 112 |28 |192. 168. 5. 113 |192. 168. 5. 126 |192. 168. 5. 127 | |8 |192. 168. 5. 128 |28 |192. 168. 5. 129 |192. 168. 5. 142 |192. 168. 5. 143 | |9 |192. 168. 5. 144 |28 |192. 68. 5. 145 |192. 168. 5. 152 |192. 168. 5. 159 | |10 |192. 168. 5. 160 |28 |192. 168. 5. 161 |192. 168. 5. 174 |192. 168. 5. 175 | For the WAN links for DUN and EDN the lowest usable address on the networks must be used. Identify and use the lowest usable WAN address for your S0 interface assigned to you for the two networks shown: 1 Dundee:209. 154. 17. 1 Edinburgh:209. 154. 16. 1 For security reasons, all of the production workstations will be assigned the lower-half of the IP addresses of the assigned subnet. All of the network devices and management stations will be assigned the upper-hal f of the IP address numbers of the subnet assigned for the LAN. From this upper half range of addresses, the Ethernet router interface (the default gateway on each LAN) is to be assigned the highest usable address. Identify the required IP address of the Ethernet interface on your two routers. Address of your Ethernet interface on Dundee : 192. 168. 6. 10 Address of your Ethernet interface on Edinburgh : 192. 168. 5. 78 The host (PC) configurations must also be planned. Using the table, complete the host information. |Branch: DUN |IP Address Range | |Production Host Range |192. 168. 6. 97——–192. 168. 6. 103 | |(Lower half) | | |Management Host Range |192. 168. 6. 104——–192. 168. 6. 10 | |(Upper half) | | [5 marks for ranges of addresses] Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 6. 97 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 Management Host (1) IP Address192. 168. 6. 104 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 |Branch: EDN |IP Address Range | |Production Host Range |192. 68. 5. 65——–192. 168. 5. 71 | |(Lower half) | | |Management Host Range |192. 168. 5. 72——–192. 168. 5. 78 | |(Upper half) | | Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 5. 65 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Management Host (1) IP Address192. 168. 5. 72 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Step 2 Basic Configuration Apply a basic configuration to the router. This configuration should include all the normal configuration items. You must supply one router configuration file. This will be either Dundee or Edinburgh. The router configuration files will be marked as follows: Basic Configuration †¢ Router name †¢ Console and VTY configuration and passwords (use ‘cisco’, ‘class’ and ‘berril’ for console, secret and VTY passwords respectively) †¢ Interface configurations DTE/DCE identified appropriately and clockrates set only on DCE †¢ Routing correct and working (RIP is fine) †¢ Host tables †¢ Banner display before login – warn of unauthorised access Basic Configuration (40 marks) Security (ACLS – Marked as part of step 3) 1. ACLs correct and applied to correct interface in correct direction [10] 2. ACLs cor rect but not applied to correct interface or direction [7 – 9] 3. ACLs attempted but some errors or wrong placement [4 – 6] 4. ACLs attempted but incorrect and not applied properly [1- 3] 5. ACLs not attempted [0] ACL Total (Total 10 marks) Step 3 Security There are several security concerns in the Internetwork. Develop Access Control Lists (ACLs) to address security issues. The following problems must be addressed: 1. The production hosts in both the Edinburgh and Dundee networks are permitted HTTP access to the 172. 16. 0. 0 network, management hosts are permitted no access to this network. 2. The company has discovered an Internet Web server at 198. 145. 7. 1 that is known to contain viruses. All hosts are banned from reaching this site. The ACLs are worth 10 marks. Step 4 VLANs This step is the final 20% of the coursework mark. To achieve this step you should consider how you might use a VLAN to separate the production and management LANs. The goal is that neither network should be able to see the other network traffic. There is no additional guidance on this part of the skills test as you are expected to identify: 1. An appropriate VLAN number to use for each VLAN. 2. An appropriate VLAN configuration. 3. Implement the VLAN and provide the switch configuration file(s) to show that the VLAN has been implemented. VLAN Marks The VLAN component will be marked as follows: VLAN configured and correct configuration supplied [20] †¢ VLAN identified but configuration incomplete or incorrect [10 – 15] †¢ VLAN attempted [5 – 10 depending on level of attempt] †¢ VLAN not attempted [0] VLAN (Total 20 marks) Appendix Network device configurations†¦Ã¢â‚¬ ¦ [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] Press RETURN to get st arted! Routerenable Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# Router(config)#hostname EDINBURGH EDINBURGH(config)#line console 0 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#line vty 0 4 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#enable password cisco EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHen Password: EDINBURGH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#enable secret class EDINBURGH(config)#exit EDINBURGH# SYS-5-CONFIG_I: Configured from console by console [pic] [pic] EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip address 209. 154. 16. 1 255. 255. 255. 0 EDINBURGH(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial2/0, changed state to up EDINBURGH(config-if)#exit %LINEPROTO-5-UPDOWN: Line protocol on Interface Seri al2/0, changed state to up EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip address 192. 168. 5. 78 255. 255. 255. 240 EDINBURGH(config-if)#no shutdown LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up EDINBURGH(config-if)#exit EDINBURGH(config)#router rip EDINBURGH(config-router)#network 172. 16. 0. 0 EDINBURGH(config-router)#network 192. 168. 6. 0 EDINBURGH(config-router)#network 192. 168. 5. 0 EDINBURGH(config-router)#network 209. 154. 16. 0 EDINBURGH(config-router)#network 209. 154. 17. 0 EDINBURGH(config-router)#exit EDINBURGH(config)# banner motd #warn of unauthorised access# EDINBURGH(config)# banner login #do not enter if you are not authorized# EDINBURGH(config)#ip host DUN 209. 54. 17. 1 192. 168. 6. 110 EDINBURGH(config)#ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# EDINBURGHshow host Default Domain is not set Name/address lookup uses domain service Name servers are 255. 255. 255. 255 Codes: UN – unknown, EX – expired, OK – OK, – revalidate temp – temporary, perm – permanent NA – Not Applicable None – Not defined Host Port Flags Age Type Address(es) DUN None (perm, OK) 0 IP 192. 168. 6. 110 209. 154. 17. 1 GLA None (perm, OK) 0 IP 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH [pic] [pic] [pic] EDINBURGH#show r Building configuration†¦ Current configuration : 1291 bytes ! version 12. 2 no service timestamps log datetime msec no service timestamps debug datetime msec o service password-encryption ! hostname EDINBURGH ! ! ! enable secret 5 $1$mERr$9cTjUIEqNGurQiFU. ZeCi1 enable password cisco ! ! ! ! ! ! ! ! ip host DUN 192. 168. 6. 110 209. 154. 17. 1 ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 ! ! ! ! ! ! interface FastEthernet0/0 ip address 192. 168. 5. 78 255. 255. 255. 240 ip access-group 100 in duplex auto speed auto ! interface FastEthernet1/0 no ip address duplex auto speed auto shutdown ! interface Serial2/0 ip address 209. 154. 16. 1 255. 255. 255. 0 ip access-group 10 out ! interface Serial3/0 no ip address shutdown ! interface FastEthernet4/0 o ip add ress shutdown ! interface FastEthernet5/0 no ip address shutdown ! router rip network 172. 16. 0. 0 network 192. 168. 5. 0 network 192. 168. 6. 0 network 209. 154. 16. 0 network 209. 154. 17. 0 ! ip classless ! ! access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www access-list 100 permit ip any any access-list 10 permit any access-list 10 deny host 198. 145. 7. 1 ! ! ! no cdp run ! banner login ^Cdo not enter if you are not authorized^C banner motd ^Cwarn of unauthorised access^C ! ! ! ! line con 0 password cisco login line vty 0 4 password cisco login ! ! ! end EDINBURGH# EDINBURGH#show access-lists configuration EDINBURGH(config)#access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq 80 EDINBURGH(config)#access-list 100 permit ip any any EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip access-group 100 in EDINBURGH(config-if)#exit EDINBURGH(config)#access-list 10 permit any EDINBURGH(config)#access-list 10 deny host 198. 145. 7. 1 EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip access-group 10 out EDINBURGH(config-if)#exit EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# [pic] EDINBURGH#show access-lists Extended IP access list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www permit ip any any Standard IP access list 10 permit any deny host 198. 145. 7. 1 EDINBURGH# [pic] EDINBURGHSWITCH CONFIGURATION Switchen Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname EDINBURGHSWITCH EDINBURGHSWITCH(config)#line console 0 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#line vty 0 4 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#enable password cisco EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#enable secret class EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH# EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface vlan1 EDINBURGHSWITCH(config-if)#ip address 192. 168. 5. 77 255. 255. 255. 240 EDINBURGHSWITCH(config-if)#no shutdown %LINK-5-CHANGED: Interface Vlan1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up EDINBURGHSWITCH(config-if)#ip default-gateway 192. 168. 5. 78 EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGHSWITCH# EDINBURGHSWITCH#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. EDINBURGHSWITCH(vlan)#vlan 10 name production VLAN 10 modified: Name: production EDINBURGHSWITCH(vlan)#vlan 20 name management VLAN 20 added: Name: management EDINBURGHSWITCH(vlan)#exit APPLY completed. EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface fastethernet0/2 EDINBURGHSWITCH(config-if)#switchport mode access EDINBURGHSWITCH(config-if)#switchport access vlan 10 EDINBURGHSWITCH(config-if)

M11Cde Skills-Based Assessment Free Essays

string(39) " be responsible for an entire network\." School of Engineering Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. We will write a custom essay sample on M11Cde Skills-Based Assessment or any similar topic only for you Order Now Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. . Download an electronic copy of this document and where there are blanks or spaces to complete addressing information etc. , please include them in the document. You submission should include the answers in the document, but do not change the document in any other way! If the document has been modified other than to include the required information your submission will be null and void. 3. Your files should be name as â€Å"SID_FIRSTNAME_SURNAME. doc†. E. g. 100292_FIRSTNAME_SURNAME. doc. 4. Save the configurations from all your network devices and embed them into the end of this document. 5. If you have attempted to configure VLANs, please also include a switch configuration from any one of your LAN switches. Please note that this must be a switch that you have actually configured VLANs on. 6. If you have implemented the network in Packet Tracer, you may consider submitting a copy of that as well but this is not compulsory. Zero Tolerance for late submission: If your work is late it will have to be marked zero according to new university policy. Please ensure you upload your work well before the deadline. You will be able to delete and update your work before the deadline. Plagiarism Note: As with all assessed work, both the research and written submission should be your own work. When submitting this work you are explicitly indicating that you have read the rules on plagiarism as defined in the University regulations and that all work is in fact your own, except where explicitly referenced using the accepted referencing style. Feedback and marking: The practical work will be marked by using the questions set in the online quiz and number of questions for each section will depend on the weightings set in the below sections. Feedbacks and marks will be provided once the online practical quiz is submitted. Network topology [Whilst the topology shows only two hosts on each LAN, you should configure four hosts on each LAN. ] Network Information The WAN IP network address between Dundee and Glasgow is 209. 154. 17. 0 with a subnet mask of 255. 255. 255. 0. The WAN IP network address between Edinburgh and Glasgow is 209. 154. 16. 0 with a subnet mask of 255. 255. 255. 0. This is clearly shown on the network topology. Dundee information The LAN for Dundee has been assigned an IP network address of 192. 168. 6. 0 Each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 40. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Dundee |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 6th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. The table below shows how the 6th usable network can be identified. |Network |Network ID |First Host |Last Host |Broadcast |Mask | |0 |192. 168. 6. 0 |192. 168. 6. 1 |192. 168. 6. 14 |192. 168. 6. 15 |/28 | |1 |192. 168. 6. 16 |192. 168. 6. 17 |192. 168. 6. 30 |192. 168. 6. 31 |/28 | |2 |192. 168. 6. 2 |192. 168. 6. 33 |192. 168. 6. 46 |192. 168. 6. 47 |/28 | |3 |192. 168. 6. 48 |192. 168. 6. 49 |192. 168. 6. 62 |192. 168. 6. 63 |/28 | |4 |192. 168. 6. 64 |192. 168. 6. 65 |192. 168. 6. 78 |192. 168. 6. 79 |/28 | |5 |192. 168. 6. 80 |192. 168. 6. 81 |192. 168. 6. 94 |192. 168. 6. 95 |/28 | |6 |192. 168. 6. 6 |192. 168. 6. 97 |192. 168. 6. 110 |192. 168. 6. 111 |/28 | |7 |192. 168. 6. 112 |192. 168. 6. 113 |192. 168. 6. 126 |192. 168. 6. 127 |/28 | You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192. 168. 5. 0 Again, each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 240. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Edinburgh |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 4th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. You must follow the example for Dundee to complete the table for step 1 planning. You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. The elements of the coursework are: 1. Planning and assigning addresses [30 marks] 2. Basic configuration [40 marks] 3. Security ACLs [10 marks] 4. Security VLANs [20 marks] The basic theme is that Glasgow (GLA) is regional headquarters of the company. Edinburgh and Dundee are branch offices. Each network associate (student) will be responsible for an entire network. You read "M11Cde Skills-Based Assessment" in category "Essay examples" This means that using either the lab equipment in EC1-13 or Packet Tracer, you will configure 3 routers, 2 switches and 8 PCs. A network address and specific number of hosts per subnet has been assigned for the local LAN on each network (Edinburgh and Dundee). From the information provided, the subnet address, the subnet mask, the first and last usable addresses and the broadcast address for each site LAN need to be determined. (When using the router or Packet Tracer – it is expected that you keep a copy of your router configuration at each stage, just in case you run into problems). Step 1 Planning Using the chart below, plan the first ten usable subnets of the LAN address assigned to Edinburgh. You have been given the first 6 addresses for Dundee, you are now expected to plan for the first 10 addresses for Edinburgh. Subnet |Subnet |Subnet |First Host |Last Host |Broadcast | | |Address |Mask (/x) | | | | |0 |192. 168. 5. 0 |28 |192. 168. 5. 1 |192. 168. 5. 14 |192. 168. 5. 5 | |1 |192. 168. 5. 16 |28 |192. 168. 5. 17 |192. 168. 5. 30 |192. 168. 5. 31 | |2 |192. 168. 5. 32 |28 |192. 168. 5. 33 |192. 168. 5. 46 |192. 168. 5. 47 | |3 |192. 168. 5. 48 |28 |192. 168. 5. 49 |192. 168. 5. 2 |192. 168. 5. 63 | |4 |192. 168. 5. 64 |28 |19 2. 168. 5. 65 |192. 168. 5. 78 |192. 168. 5. 79 | |5 |192. 168. 5. 80 |28 |192. 168. 5. 81 |192. 168. 5. 94 |192. 168. 5. 95 | |6 |192. 168. 5. 96 |28 |192. 168. 5. 97 |192. 68. 5. 110 |192. 168. 5. 111 | |7 |192. 168. 5. 112 |28 |192. 168. 5. 113 |192. 168. 5. 126 |192. 168. 5. 127 | |8 |192. 168. 5. 128 |28 |192. 168. 5. 129 |192. 168. 5. 142 |192. 168. 5. 143 | |9 |192. 168. 5. 144 |28 |192. 68. 5. 145 |192. 168. 5. 152 |192. 168. 5. 159 | |10 |192. 168. 5. 160 |28 |192. 168. 5. 161 |192. 168. 5. 174 |192. 168. 5. 175 | For the WAN links for DUN and EDN the lowest usable address on the networks must be used. Identify and use the lowest usable WAN address for your S0 interface assigned to you for the two networks shown: 1 Dundee:209. 154. 17. 1 Edinburgh:209. 154. 16. 1 For security reasons, all of the production workstations will be assigned the lower-half of the IP addresses of the assigned subnet. All of the network devices and management stations will be assigned the upper-hal f of the IP address numbers of the subnet assigned for the LAN. From this upper half range of addresses, the Ethernet router interface (the default gateway on each LAN) is to be assigned the highest usable address. Identify the required IP address of the Ethernet interface on your two routers. Address of your Ethernet interface on Dundee : 192. 168. 6. 10 Address of your Ethernet interface on Edinburgh : 192. 168. 5. 78 The host (PC) configurations must also be planned. Using the table, complete the host information. |Branch: DUN |IP Address Range | |Production Host Range |192. 168. 6. 97——–192. 168. 6. 103 | |(Lower half) | | |Management Host Range |192. 168. 6. 104——–192. 168. 6. 10 | |(Upper half) | | [5 marks for ranges of addresses] Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 6. 97 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 Management Host (1) IP Address192. 168. 6. 104 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 |Branch: EDN |IP Address Range | |Production Host Range |192. 68. 5. 65——–192. 168. 5. 71 | |(Lower half) | | |Management Host Range |192. 168. 5. 72——–192. 168. 5. 78 | |(Upper half) | | Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 5. 65 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Management Host (1) IP Address192. 168. 5. 72 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Step 2 Basic Configuration Apply a basic configuration to the router. This configuration should include all the normal configuration items. You must supply one router configuration file. This will be either Dundee or Edinburgh. The router configuration files will be marked as follows: Basic Configuration †¢ Router name †¢ Console and VTY configuration and passwords (use ‘cisco’, ‘class’ and ‘berril’ for console, secret and VTY passwords respectively) †¢ Interface configurations DTE/DCE identified appropriately and clockrates set only on DCE †¢ Routing correct and working (RIP is fine) †¢ Host tables †¢ Banner display before login – warn of unauthorised access Basic Configuration (40 marks) Security (ACLS – Marked as part of step 3) 1. ACLs correct and applied to correct interface in correct direction [10] 2. ACLs cor rect but not applied to correct interface or direction [7 – 9] 3. ACLs attempted but some errors or wrong placement [4 – 6] 4. ACLs attempted but incorrect and not applied properly [1- 3] 5. ACLs not attempted [0] ACL Total (Total 10 marks) Step 3 Security There are several security concerns in the Internetwork. Develop Access Control Lists (ACLs) to address security issues. The following problems must be addressed: 1. The production hosts in both the Edinburgh and Dundee networks are permitted HTTP access to the 172. 16. 0. 0 network, management hosts are permitted no access to this network. 2. The company has discovered an Internet Web server at 198. 145. 7. 1 that is known to contain viruses. All hosts are banned from reaching this site. The ACLs are worth 10 marks. Step 4 VLANs This step is the final 20% of the coursework mark. To achieve this step you should consider how you might use a VLAN to separate the production and management LANs. The goal is that neither network should be able to see the other network traffic. There is no additional guidance on this part of the skills test as you are expected to identify: 1. An appropriate VLAN number to use for each VLAN. 2. An appropriate VLAN configuration. 3. Implement the VLAN and provide the switch configuration file(s) to show that the VLAN has been implemented. VLAN Marks The VLAN component will be marked as follows: VLAN configured and correct configuration supplied [20] †¢ VLAN identified but configuration incomplete or incorrect [10 – 15] †¢ VLAN attempted [5 – 10 depending on level of attempt] †¢ VLAN not attempted [0] VLAN (Total 20 marks) Appendix Network device configurations†¦Ã¢â‚¬ ¦ [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] Press RETURN to get st arted! Routerenable Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# Router(config)#hostname EDINBURGH EDINBURGH(config)#line console 0 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#line vty 0 4 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#enable password cisco EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHen Password: EDINBURGH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#enable secret class EDINBURGH(config)#exit EDINBURGH# SYS-5-CONFIG_I: Configured from console by console [pic] [pic] EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip address 209. 154. 16. 1 255. 255. 255. 0 EDINBURGH(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial2/0, changed state to up EDINBURGH(config-if)#exit %LINEPROTO-5-UPDOWN: Line protocol on Interface Seri al2/0, changed state to up EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip address 192. 168. 5. 78 255. 255. 255. 240 EDINBURGH(config-if)#no shutdown LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up EDINBURGH(config-if)#exit EDINBURGH(config)#router rip EDINBURGH(config-router)#network 172. 16. 0. 0 EDINBURGH(config-router)#network 192. 168. 6. 0 EDINBURGH(config-router)#network 192. 168. 5. 0 EDINBURGH(config-router)#network 209. 154. 16. 0 EDINBURGH(config-router)#network 209. 154. 17. 0 EDINBURGH(config-router)#exit EDINBURGH(config)# banner motd #warn of unauthorised access# EDINBURGH(config)# banner login #do not enter if you are not authorized# EDINBURGH(config)#ip host DUN 209. 54. 17. 1 192. 168. 6. 110 EDINBURGH(config)#ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# EDINBURGHshow host Default Domain is not set Name/address lookup uses domain service Name servers are 255. 255. 255. 255 Codes: UN – unknown, EX – expired, OK – OK, – revalidate temp – temporary, perm – permanent NA – Not Applicable None – Not defined Host Port Flags Age Type Address(es) DUN None (perm, OK) 0 IP 192. 168. 6. 110 209. 154. 17. 1 GLA None (perm, OK) 0 IP 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH [pic] [pic] [pic] EDINBURGH#show r Building configuration†¦ Current configuration : 1291 bytes ! version 12. 2 no service timestamps log datetime msec no service timestamps debug datetime msec o service password-encryption ! hostname EDINBURGH ! ! ! enable secret 5 $1$mERr$9cTjUIEqNGurQiFU. ZeCi1 enable password cisco ! ! ! ! ! ! ! ! ip host DUN 192. 168. 6. 110 209. 154. 17. 1 ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 ! ! ! ! ! ! interface FastEthernet0/0 ip address 192. 168. 5. 78 255. 255. 255. 240 ip access-group 100 in duplex auto speed auto ! interface FastEthernet1/0 no ip address duplex auto speed auto shutdown ! interface Serial2/0 ip address 209. 154. 16. 1 255. 255. 255. 0 ip access-group 10 out ! interface Serial3/0 no ip address shutdown ! interface FastEthernet4/0 o ip add ress shutdown ! interface FastEthernet5/0 no ip address shutdown ! router rip network 172. 16. 0. 0 network 192. 168. 5. 0 network 192. 168. 6. 0 network 209. 154. 16. 0 network 209. 154. 17. 0 ! ip classless ! ! access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www access-list 100 permit ip any any access-list 10 permit any access-list 10 deny host 198. 145. 7. 1 ! ! ! no cdp run ! banner login ^Cdo not enter if you are not authorized^C banner motd ^Cwarn of unauthorised access^C ! ! ! ! line con 0 password cisco login line vty 0 4 password cisco login ! ! ! end EDINBURGH# EDINBURGH#show access-lists configuration EDINBURGH(config)#access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq 80 EDINBURGH(config)#access-list 100 permit ip any any EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip access-group 100 in EDINBURGH(config-if)#exit EDINBURGH(config)#access-list 10 permit any EDINBURGH(config)#access-list 10 deny host 198. 145. 7. 1 EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip access-group 10 out EDINBURGH(config-if)#exit EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# [pic] EDINBURGH#show access-lists Extended IP access list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www permit ip any any Standard IP access list 10 permit any deny host 198. 145. 7. 1 EDINBURGH# [pic] EDINBURGHSWITCH CONFIGURATION Switchen Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname EDINBURGHSWITCH EDINBURGHSWITCH(config)#line console 0 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#line vty 0 4 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#enable password cisco EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#enable secret class EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH# EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface vlan1 EDINBURGHSWITCH(config-if)#ip address 192. 168. 5. 77 255. 255. 255. 240 EDINBURGHSWITCH(config-if)#no shutdown %LINK-5-CHANGED: Interface Vlan1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up EDINBURGHSWITCH(config-if)#ip default-gateway 192. 168. 5. 78 EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGHSWITCH# EDINBURGHSWITCH#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. EDINBURGHSWITCH(vlan)#vlan 10 name production VLAN 10 modified: Name: production EDINBURGHSWITCH(vlan)#vlan 20 name management VLAN 20 added: Name: management EDINBURGHSWITCH(vlan)#exit APPLY completed. EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface fastethernet0/2 EDINBURGHSWITCH(config-if)#switchport mode access EDINBURGHSWITCH(config-if)#switchport access vlan 10 EDINBURGHSWITCH(config-if)