Cisco Networking - WAN Implementation with SOHO Configuration
You have been recently hired as a network administrator for the xAcme Technology Trade School. The company is realizing that the local systems administrators need help implementing certain technologies at each of the remote locations, as well as final WAN configurations. Out of the network administrators on staff, you have been asked to move forward the project. With your background and skills, you will design, implement, and assist in configurations to support xAcme’s topology. Technologies to implement will differ from site to site, as administrators have begun topology implementations. You will be provided the overall topology as well as certain device configurations in order to determine the best course of action per site/challenge. In addition to helping them configure their network, they require that all new network administrators obtain their CCNA Certification within 60 days of being hired. You are excited about starting this project but realize creating a schedule to help balance your work and home life will be key to success.
To get started, follow the steps below:
IEEE Format and also the assignment will be submitted on TurnItin.
Overview
-
Along with the challenges presented in this document, you will be provided an overall site topology to work from, as well as specific device configurations (where applicable) to make your recommendations.
Suggested solutions should be comprehensive and justified in approach. Configurations of technologies should be written out to help guide the systems administrators with implementation. In some cases, you may find it necessary to implement additional cabling, which can be done by adding to the supplied topology. Any adjustments to the sites’ topology that you find necessary should be documented and supplied with your submission.
Your document will be divided up by site and solutions per site. Each area is unique in requirements but collectively will demonstrate your understanding of network routing and switching technologies. Each scenario will provide you with suggested sections within TestOut (LabSim) to use as a guide in your analysis and recommendations.
You can use this
template
as a guide on how to format your project. Be sure to cite your external sources using the
IEEE citation style
. To learn how you will be assessed on this assignment, please take a moment to review the
rubric
.
Existing VLANs
-
Remote locations vary in terms of size and requirements. Some implementations will require current site router/switch-running configurations, which will be provided. All sites will use the following four VLANs, but you will need to configure only what is asked per site (some assumptions will be made).
Existing VLANs, per xACME:
Faculty VLAN
used by faculty on-site for all office locations (non-instructional communications)
total devices per site will vary
Administrative VLAN
used by staff on-site for business administrative ...
Subnetting Properly subnet addressing blocks to accommodate the sit.pdfebrahimbadushata00
Subnetting: Properly subnet addressing blocks to accommodate the site\'s VLAN sizes. You will
not need to implement VLANs here; rather, you will create the correct sizing to properly
accommodate the devices stated per the xACME educational topology. Carefully consider the
challenges faced when structuring subnets too large and/or too small during your design. The
starting Worchester site addressing range is 10.20.0.0 /16 (per the xACME educational topology
diagram). Formatting per subnet should follow the format below and should be clearly stated and
placed within a table.
NetID
mask/CIDR values
broadcast
usable range
No additional device configurations required to complete
Existing VLANs
-
Remote locations vary in terms of size and requirements. Some implementations will require
current site router/switch-running configurations, which will be provided. All sites will use the
following four VLANs, but you will need to configure only what is asked per site (some
assumptions will be made).
Existing VLANs, per xACME:Faculty VLAN
used by faculty on-site for all office locations (non-instructional communications)
total devices per site will vary
Administrative VLAN
used by staff on-site for business administrative communications
total devices per site will vary
Academic VLAN
used by faculty and students for classroom labs and instructional communications
total devices per site will vary
Server VLAN
used by IT staff for all technology/management communications
total devices per site will vary
The types of devices per site will be the same; however, the number of deployed devices may
vary (all documented in the xAcme educational topology).
Routers Per Site:
Switches Per Site:
Note:Device type will not impact your configuration commands and implementation of ALL
required technologies will use Cisco IOS commands/concepts learned in our TestOut lecture(s).
Standard switchports will be configured and used as trunk OR access ports, and DCE ends
should be noted when configuring serial ports per router.Cisco 2800 Series Integrated
ServicesInterfaces Ports Available4 Fast Ethernet Interfaces
(Per Router)2 Serial Interfaces
(Per Router)fa0/0s0/0/0fa0/1s0/0/1fa1/0fa1/1 Acme Educational Topology Public Address
Range 165.128.63.0 /26 Private Network 10.0.0.0 /8 Boston Site Administrative VLA structional
VLAN Device List 4 Devices 34 Devices Network 10.10.0.0 Switches: Catalyst 6500 Series
Server VLAN Faculty VLAN Devices 5 Devices 96 Gigabit Ports fa010 Mod 220 Total Hosts
Module 2.gl1j1 gl n Stub Area Module 3 gi2u1-g gi012 Boston, MA Module 4 31-g 3/24 Site
Router 2 Router 2800 Series Integrated Services Sacramento. SWTch1 Sacramento SWRch2 Sac
3 024 ta0A0 Pot Contuurations uper Router 4 Fast Ethernet erfaces Sacramento Site 010
Network 10.50.0.0 2- fa011 fa 100 42 Total Hosts 65.128.63. Stub Area Boston, 2 Serial
Interfaces Route Boston, MA Site Router 3 DCE Sacramento, CA 0.255.25 48 30 0,255 .252 130
Internet Faculty VLAN Worchester Site 21 Devices Network.
Comment by JCB Please center this on the pag.docxclarebernice
Comment by JCB: Please center this on the page
Cisco Network Proposal Part 2Comment by JCB: This document should include to sites, Worchester and Boston, you have combined the requirements of both sites.
Worchester requires subnetting, the range of each subnet in a table, and encapsulation 802.1q configured.
Boston requires subnetting, all ranges displayed in a table, a routing protocol chosen and a summarized route advertised utilizing the routing protocol
CMIT 350 7982: Interconnecting Cisco Devices
Contents
Routing Protocol3
Summarization 3
Default Route 4
Topology8Site
The current site which I have been assigned to upgrade in Boston and do the routing, the default routing include Comment by JCB: You wording does not clearly state what you are trying to accomplish.
Recommend that you start by describing the Boston network then describe what you plan to do the fix it. For example
Title should be Boston Site Configuration (or something like this)
The Boston site consist of three (type) routers. The routers will be configured with the x.x.x.x/x. This subnet address will be subnetted to support the current configuration and allow for future expansion.
You actually have something below that should be moved up to the introduction paragraph about Boston. I have highlighted it in red.
You then want to talk about your intension to utilized the OSPF routing protocol and summarization to improve the network and the value it will bring.
Then you can start talking about each.
The subnetting would be a good topic at this point because you would have just finished talking about the network and how you intend to improve it. You can now state the subnet address that will be utilize to configure the router and that the subnet will be summarized
Next you can talk about the routing protocol and state that the summarized route will be used and why.
You can use one of these charts.
Why are you using subinterfaces? There is not requirement for VLANs at the Boston site.
3 – 2900 of integrated routers, the routers have four Ethernet cables and are connected to two serial cables. The diagram for the current cabling is as shown below.
Figure 1: Boston site topology
Comment by JCB: All figures, diagrams, and tables must be labeled and referenced in the test.
What is the purpose of the show ip interface brief command?
The site has implemented a routing protocol and the routers have been configured with the default routing protocol.
Proposed solutions and remedies
Routing Protocols
There are three main interior routing protocols:Comment by JCB: You don’t have to describe all the routing protocols, just pick one and state why you chose it. Then show an example of how to configured it.
i. OSPF protocol – This is a link-state classless protocol which is best suited across multi-vendor networks and extensive networks. The protocol can be used in a distance of 110 meters. The routing standard uses cost metric. Comment by JCB: Your formattin ...
Subnetting Properly subnet addressing blocks to accommodate the sit.pdfebrahimbadushata00
Subnetting: Properly subnet addressing blocks to accommodate the site\'s VLAN sizes. You will
not need to implement VLANs here; rather, you will create the correct sizing to properly
accommodate the devices stated per the xACME educational topology. Carefully consider the
challenges faced when structuring subnets too large and/or too small during your design. The
starting Worchester site addressing range is 10.20.0.0 /16 (per the xACME educational topology
diagram). Formatting per subnet should follow the format below and should be clearly stated and
placed within a table.
NetID
mask/CIDR values
broadcast
usable range
No additional device configurations required to complete
Existing VLANs
-
Remote locations vary in terms of size and requirements. Some implementations will require
current site router/switch-running configurations, which will be provided. All sites will use the
following four VLANs, but you will need to configure only what is asked per site (some
assumptions will be made).
Existing VLANs, per xACME:Faculty VLAN
used by faculty on-site for all office locations (non-instructional communications)
total devices per site will vary
Administrative VLAN
used by staff on-site for business administrative communications
total devices per site will vary
Academic VLAN
used by faculty and students for classroom labs and instructional communications
total devices per site will vary
Server VLAN
used by IT staff for all technology/management communications
total devices per site will vary
The types of devices per site will be the same; however, the number of deployed devices may
vary (all documented in the xAcme educational topology).
Routers Per Site:
Switches Per Site:
Note:Device type will not impact your configuration commands and implementation of ALL
required technologies will use Cisco IOS commands/concepts learned in our TestOut lecture(s).
Standard switchports will be configured and used as trunk OR access ports, and DCE ends
should be noted when configuring serial ports per router.Cisco 2800 Series Integrated
ServicesInterfaces Ports Available4 Fast Ethernet Interfaces
(Per Router)2 Serial Interfaces
(Per Router)fa0/0s0/0/0fa0/1s0/0/1fa1/0fa1/1 Acme Educational Topology Public Address
Range 165.128.63.0 /26 Private Network 10.0.0.0 /8 Boston Site Administrative VLA structional
VLAN Device List 4 Devices 34 Devices Network 10.10.0.0 Switches: Catalyst 6500 Series
Server VLAN Faculty VLAN Devices 5 Devices 96 Gigabit Ports fa010 Mod 220 Total Hosts
Module 2.gl1j1 gl n Stub Area Module 3 gi2u1-g gi012 Boston, MA Module 4 31-g 3/24 Site
Router 2 Router 2800 Series Integrated Services Sacramento. SWTch1 Sacramento SWRch2 Sac
3 024 ta0A0 Pot Contuurations uper Router 4 Fast Ethernet erfaces Sacramento Site 010
Network 10.50.0.0 2- fa011 fa 100 42 Total Hosts 65.128.63. Stub Area Boston, 2 Serial
Interfaces Route Boston, MA Site Router 3 DCE Sacramento, CA 0.255.25 48 30 0,255 .252 130
Internet Faculty VLAN Worchester Site 21 Devices Network.
Comment by JCB Please center this on the pag.docxclarebernice
Comment by JCB: Please center this on the page
Cisco Network Proposal Part 2Comment by JCB: This document should include to sites, Worchester and Boston, you have combined the requirements of both sites.
Worchester requires subnetting, the range of each subnet in a table, and encapsulation 802.1q configured.
Boston requires subnetting, all ranges displayed in a table, a routing protocol chosen and a summarized route advertised utilizing the routing protocol
CMIT 350 7982: Interconnecting Cisco Devices
Contents
Routing Protocol3
Summarization 3
Default Route 4
Topology8Site
The current site which I have been assigned to upgrade in Boston and do the routing, the default routing include Comment by JCB: You wording does not clearly state what you are trying to accomplish.
Recommend that you start by describing the Boston network then describe what you plan to do the fix it. For example
Title should be Boston Site Configuration (or something like this)
The Boston site consist of three (type) routers. The routers will be configured with the x.x.x.x/x. This subnet address will be subnetted to support the current configuration and allow for future expansion.
You actually have something below that should be moved up to the introduction paragraph about Boston. I have highlighted it in red.
You then want to talk about your intension to utilized the OSPF routing protocol and summarization to improve the network and the value it will bring.
Then you can start talking about each.
The subnetting would be a good topic at this point because you would have just finished talking about the network and how you intend to improve it. You can now state the subnet address that will be utilize to configure the router and that the subnet will be summarized
Next you can talk about the routing protocol and state that the summarized route will be used and why.
You can use one of these charts.
Why are you using subinterfaces? There is not requirement for VLANs at the Boston site.
3 – 2900 of integrated routers, the routers have four Ethernet cables and are connected to two serial cables. The diagram for the current cabling is as shown below.
Figure 1: Boston site topology
Comment by JCB: All figures, diagrams, and tables must be labeled and referenced in the test.
What is the purpose of the show ip interface brief command?
The site has implemented a routing protocol and the routers have been configured with the default routing protocol.
Proposed solutions and remedies
Routing Protocols
There are three main interior routing protocols:Comment by JCB: You don’t have to describe all the routing protocols, just pick one and state why you chose it. Then show an example of how to configured it.
i. OSPF protocol – This is a link-state classless protocol which is best suited across multi-vendor networks and extensive networks. The protocol can be used in a distance of 110 meters. The routing standard uses cost metric. Comment by JCB: Your formattin ...
2/23/2016 Sample Implementation Plan1.html
file:///C:/Users/Kevo24/AppData/Local/Temp/Temp1_Sample%20Implementation%20Plan1.html.zip/Sample%20Implementation%20Plan1.html 1/8
Now you are completing Part 5 of the AAP (WWTC) which is:
“This section will lay out the implementation plan of the entire AAP design, which include configuration
of key networking devices, detailing milestones, activities, resources, and budgets, as well as providing a
deliverables schedule.”
Project Implementation Plan
In this lecture I will discuss implementation plan through an example of an enterprise network.
The figure presents a fictitious enterprise factious network. The company would like to implement a
scalable solution with a routing protocol that provides fast convergence. For optimal routing and packet
forwarding, hierarchical addressing with summarization is required. Users require highspeed access to
the server farm with redundant connectivity for protection. The company has many remote offices; a
redundant connection to the Internet is required to provide the remote offices with nonstop access to its
server farm. For remote offices, a secure connection must be implemented to prevent unauthorized
persons from accessing data.
The first step before creating an implementation plan is to gather existing information about the networks
and all the requirements.
The existing topology provides redundant connectivity among all the network devices. Internet
connectivity is dual homed, which provides redundant access to the remote sites as well as World Wide
Web resources. The equipment can provide all the functionalities that are required, but the software
version of the operation system must be upgraded.
The networking equipment has existing IP addressing that needs to be changed to ensure optimal routing
and forwarding of packets as well as summarization. Requirements for server farm access and remote
2/23/2016 Sample Implementation Plan1.html
file:///C:/Users/Kevo24/AppData/Local/Temp/Temp1_Sample%20Implementation%20Plan1.html.zip/Sample%20Implementation%20Plan1.html 2/8
office connectivity do not include changes in QoS configuration. The server farm hosts the critical
applications of the company including VoIP, and these require preferred treatment. OSPF is configured
in the network. This configuration must be changed, because a faster convergence time is required.
EIGRP is better choice than OSPF.
Security configuration is required to provide secure access to terminal resources. In this case existing
security is sufficient, therefor no changes are needed.
For this scenario implementation plan would be
Project contact list
Location information and means of accessing the premises
Tools and resources
Assumption
Task and detailed description
Network staging plan
Project Contact List
Consultant Project Team Customer Project Team
Project Manager
Telephone
EMail
Project Manager
Telephone
EMail
Configuration Engineer
Telephone
Email
Con.
Relatore: Alessandro Legnani, Cisco CCIE e IP Network Architect di IT Global Consulting Srl
Sintesi e sinergia perfetta di un nuovo protocollo di routing (e non solo) con il caro vecchio e robusto IPsec (senza le problematiche ike). Perché inventarsi l’ennesima forma di tunnelig per il data plane?
Quanto sopra è la chiave del successo della soluzione sdwan Cisco/Viptela che la rende enormemente scalabile e unica sul mercato.
DescriptionYou were selected to design a small peer-to-peer ne.docxdonaldp2
Description
You were selected to design a small peer-to-peer network for a new facility which has six computers and a networked printer. Each desk computer must have a wired network connection. The rooms are to have wireless access for mobile devices.
For this assignment, utilize the Gliffy (Links to an external site.)Links to an external site. software application to create a basic network diagram depicting a star topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN. Include only that equipment and end node devices on the network diagram. There is no need to draw out the layout of the physical space.
In addition to providing a network diagram, you must also provide a short essay that describes the details of the LAN equipment that is being used and the connections. In the essay, be sure to explain why each device is positioned where it is.
Also, briefly state any assumptions you've made about the kind of work being done, the demands the personnel in the office will put on the network, how they'll use it, and how that influenced your design. For example, if the business that uses the LAN is a small video-based news streaming service, they will probably need more performance from both their network and ISP than a small rental property management office might need.
Recommended reading: Understanding Routers, Switches and Network Hardware (Links to an external site.)Links to an external site.
Requirements
1. Depict a star topology that uses Ethernet.
2. Provide a 'cloud' shape or another symbol for the ISP WAN service. Label the symbol as 'Dial-up,' 'Cable,' or 'Fiber Optic.'
3. Label all network devices in the LAN (brand and model names are acceptable but not required).
4. Connect to the ISP service using a dial-up modem, cable modem, or, if using fiber optic service, an optical network terminal (ONT). Do not use a combination device such as a modem/router.
5. Connect the LAN router (wireless router) to the ISP WAN service device. The LAN router provides many capabilities to include: DHCP (Links to an external site.)Links to an external site., NAT translation (Links to an external site.)Links to an external site., port forwarding (Links to an external site.)Links to an external site., QoS (Links to an external site.)Links to an external site., and software firewall services. Do not use a router/switch combination device, however a router with integrated wireless capabilities is acceptable.
6. Use a managed switch as a centrally-located device to provide wired network connectivity for the seven end nodes (six desktop computers and a printer). Connect the switch directly to the main LAN router.
7. Connect the seven end nodes directly to the central switch.
8. Label the specific type of physical media (cables) being used to connect the LAN router to the ISP service device, the central switch to the LAN router, and the seven end nodes to the central switch.
9. Use a s.
DescriptionYou were selected to design a small peer-to-peer ne.docxcarolinef5
Description
You were selected to design a small peer-to-peer network for a new facility which has six computers and a networked printer. Each desk computer must have a wired network connection. The rooms are to have wireless access for mobile devices.
For this assignment, utilize the Gliffy (Links to an external site.)Links to an external site. software application to create a basic network diagram depicting a star topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN. Include only that equipment and end node devices on the network diagram. There is no need to draw out the layout of the physical space.
In addition to providing a network diagram, you must also provide a short essay that describes the details of the LAN equipment that is being used and the connections. In the essay, be sure to explain why each device is positioned where it is.
Also, briefly state any assumptions you've made about the kind of work being done, the demands the personnel in the office will put on the network, how they'll use it, and how that influenced your design. For example, if the business that uses the LAN is a small video-based news streaming service, they will probably need more performance from both their network and ISP than a small rental property management office might need.
Recommended reading: Understanding Routers, Switches and Network Hardware (Links to an external site.)Links to an external site.
Requirements
1. Depict a star topology that uses Ethernet.
2. Provide a 'cloud' shape or another symbol for the ISP WAN service. Label the symbol as 'Dial-up,' 'Cable,' or 'Fiber Optic.'
3. Label all network devices in the LAN (brand and model names are acceptable but not required).
4. Connect to the ISP service using a dial-up modem, cable modem, or, if using fiber optic service, an optical network terminal (ONT). Do not use a combination device such as a modem/router.
5. Connect the LAN router (wireless router) to the ISP WAN service device. The LAN router provides many capabilities to include: DHCP (Links to an external site.)Links to an external site., NAT translation (Links to an external site.)Links to an external site., port forwarding (Links to an external site.)Links to an external site., QoS (Links to an external site.)Links to an external site., and software firewall services. Do not use a router/switch combination device, however a router with integrated wireless capabilities is acceptable.
6. Use a managed switch as a centrally-located device to provide wired network connectivity for the seven end nodes (six desktop computers and a printer). Connect the switch directly to the main LAN router.
7. Connect the seven end nodes directly to the central switch.
8. Label the specific type of physical media (cables) being used to connect the LAN router to the ISP service device, the central switch to the LAN router, and the seven end nodes to the central switch.
9. Use a s.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
E C O N F O C U S T H I R D Q U A R T E R 2 0 1 3 31.docxbrownliecarmella
E C O N F O C U S | T H I R D Q U A R T E R | 2 0 1 3 31
O
ne of the great success stories of American retail-
ing, Circuit City got its start in 1949 as a tiny
storefront in Richmond, Va. From that modest
beginning, founder Sam Wurtzel quickly built the company
into a national chain, and his son Alan turned it
into a household name. By 2000, Circuit City employed
more than 60,000 people at 616 locations across the
United States.
Circuit City is also one of American retailing’s great fail-
ures. In November 2008, the 59 -year-old company filed for
bankruptcy. Within months, it closed its stores and liquidat-
ed more than $1 billion worth of merchandise, and on March
8, 2009, the last Circuit City store turned off its lights for
good. Today there are few reminders of the groundbreaking
retailer; the company’s 700,000-square-foot headquarters
complex outside Richmond is filling up with new tenants,
and the empty stores have been taken over by new retailers.
In part, Circuit City was just one of the many victims of
the financial crisis and recession, which also brought down
other large national retailers such as Linens ’n Things and
The Sharper Image. And businesses fail even during the
best of economic times, as part of the natural process of
“creative destruction” that is the engine of capitalism. But at
business schools across the country, Circuit City’s story is
taught as an example of what can happen when success
breeds complacency.
From Tire Store to Fortune 500
In 1949, New Yorker and serial entrepreneur Sam Wurtzel
was having his hair cut in Richmond on his way to a family
vacation in North Carolina. The barber mentioned that the
first television station in the South had opened in Richmond
less than a year earlier. Wurtzel, fresh from a failed import-
export business, thought this new entertainment device
might be his next opportunity.
The first experimental television stations began operat-
ing in the early 1940s, and commercial broadcasting began
after World War II. Few households owned sets at the time
of Wurtzel’s barbershop visit, but the medium was growing
rapidly: The number of TV stations in the United States
nearly tripled in 1949, from 27 to 76. Through a friend,
Wurtzel knew someone at Olympic Television, a small
manufacturer in Long Island City; through relatives, he had
connections to bankers and businesspeople in Richmond.
Within a month, Wurtzel had moved his family from New
York to Virginia and was selling televisions out of the front
half of a tire store on Broad Street, a few blocks west of
downtown Richmond.
Wurtzel thought his last name might be hard for people
to pronounce, so he named his store Wards, an acronym for
his family’s names: W for Wurtzel, A for his son Alan, R for
his wife, Ruth, D for his son David, and S for Sam. Rather
than try to compete directly with the big department stores,
he catered to lower-income consumers by offering install-
ment payment plans. He also developed a unique s.
E B B 3 5 9 – E B B S P o r t f o l i o V C o u r.docxbrownliecarmella
E B B 3 5 9 – E B B S P o r t f o l i o V
C o u r s e P r o j e c t T e m p l a t e - O n l i n e
2018
2
The Distribution & Marketing Plan Template
Using this Template (attached below), provide your ideas and research for the distribution
strategies you will recommend for the logistical movement and delivery of the product to
targeted users in a niche market. You should research similar products to determine what
other self-distributors are doing to deliver their product to a niche market.
The template is just a guide for organizing your paper with headings and sub-
headings. Retype and duplicate the headings and sub-headings. Everything else is your
original content.
Do not include any of the instructor’s comments in blue in the Template when submitting
this assignment. Reproduction of anything other than the headings and sub-headings
from the template will cause a deduction in points for your assignment.
Use the Budget portion of the template to organize your distribution and marketing
expenses. List each item you plan to spend money on, the frequency with which you will
use it, and the cost for your company’s first year.
All of the tools and tactics found in the written section of the plan must match the dollars
that are allocated to them in the Budget Worksheet.
Do not include any costs in the budget that are not directly related to specific distributing
(selling) and marketing (building awareness) strategies proposed for the product.
Costs should be realistic for what you are trying to accomplish. Remember you are
working with a micro budget of $1500 for the entirety of the one-year plan. So, for example,
World Tours and World Premieres are out. This budget will barely afford more than a local
venue or two to showcase your product.
The best way to tackle the Sales Projections and Budget is to create them in Excel, using
formulas in Excel, and then copy and paste the spreadsheet into your Word document
based on the sample provided.
It should take you a few seconds to set up these spreadsheets and type in the column
headings from the template. All of the line items are custom to your project and should be
revised by you to fit your project.
10/19/18 3
Course Project – Outline Template
(Be sure to start with Title Page to include Project Title, Your Name, Course Name, and Date
in proper APA format)
I. Executive Summary
The Company:
Establish in a sentence or two your experience and goals of the company.
The Project:
Explain your project through a premise statement (Artist’s Story or USP or Logline, depending
on your media) along with ways to relate potential success to the investor through similar
successful projects or its appeal to your Target Market.
Sales Projections / Return on Investment:
Summarize how their one-year investment of the agreed upon amount based on your Client
Interview with them will see the project.
More Related Content
Similar to Cisco Networking - WAN Implementation with SOHO ConfigurationYou.docx
2/23/2016 Sample Implementation Plan1.html
file:///C:/Users/Kevo24/AppData/Local/Temp/Temp1_Sample%20Implementation%20Plan1.html.zip/Sample%20Implementation%20Plan1.html 1/8
Now you are completing Part 5 of the AAP (WWTC) which is:
“This section will lay out the implementation plan of the entire AAP design, which include configuration
of key networking devices, detailing milestones, activities, resources, and budgets, as well as providing a
deliverables schedule.”
Project Implementation Plan
In this lecture I will discuss implementation plan through an example of an enterprise network.
The figure presents a fictitious enterprise factious network. The company would like to implement a
scalable solution with a routing protocol that provides fast convergence. For optimal routing and packet
forwarding, hierarchical addressing with summarization is required. Users require highspeed access to
the server farm with redundant connectivity for protection. The company has many remote offices; a
redundant connection to the Internet is required to provide the remote offices with nonstop access to its
server farm. For remote offices, a secure connection must be implemented to prevent unauthorized
persons from accessing data.
The first step before creating an implementation plan is to gather existing information about the networks
and all the requirements.
The existing topology provides redundant connectivity among all the network devices. Internet
connectivity is dual homed, which provides redundant access to the remote sites as well as World Wide
Web resources. The equipment can provide all the functionalities that are required, but the software
version of the operation system must be upgraded.
The networking equipment has existing IP addressing that needs to be changed to ensure optimal routing
and forwarding of packets as well as summarization. Requirements for server farm access and remote
2/23/2016 Sample Implementation Plan1.html
file:///C:/Users/Kevo24/AppData/Local/Temp/Temp1_Sample%20Implementation%20Plan1.html.zip/Sample%20Implementation%20Plan1.html 2/8
office connectivity do not include changes in QoS configuration. The server farm hosts the critical
applications of the company including VoIP, and these require preferred treatment. OSPF is configured
in the network. This configuration must be changed, because a faster convergence time is required.
EIGRP is better choice than OSPF.
Security configuration is required to provide secure access to terminal resources. In this case existing
security is sufficient, therefor no changes are needed.
For this scenario implementation plan would be
Project contact list
Location information and means of accessing the premises
Tools and resources
Assumption
Task and detailed description
Network staging plan
Project Contact List
Consultant Project Team Customer Project Team
Project Manager
Telephone
EMail
Project Manager
Telephone
EMail
Configuration Engineer
Telephone
Email
Con.
Relatore: Alessandro Legnani, Cisco CCIE e IP Network Architect di IT Global Consulting Srl
Sintesi e sinergia perfetta di un nuovo protocollo di routing (e non solo) con il caro vecchio e robusto IPsec (senza le problematiche ike). Perché inventarsi l’ennesima forma di tunnelig per il data plane?
Quanto sopra è la chiave del successo della soluzione sdwan Cisco/Viptela che la rende enormemente scalabile e unica sul mercato.
DescriptionYou were selected to design a small peer-to-peer ne.docxdonaldp2
Description
You were selected to design a small peer-to-peer network for a new facility which has six computers and a networked printer. Each desk computer must have a wired network connection. The rooms are to have wireless access for mobile devices.
For this assignment, utilize the Gliffy (Links to an external site.)Links to an external site. software application to create a basic network diagram depicting a star topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN. Include only that equipment and end node devices on the network diagram. There is no need to draw out the layout of the physical space.
In addition to providing a network diagram, you must also provide a short essay that describes the details of the LAN equipment that is being used and the connections. In the essay, be sure to explain why each device is positioned where it is.
Also, briefly state any assumptions you've made about the kind of work being done, the demands the personnel in the office will put on the network, how they'll use it, and how that influenced your design. For example, if the business that uses the LAN is a small video-based news streaming service, they will probably need more performance from both their network and ISP than a small rental property management office might need.
Recommended reading: Understanding Routers, Switches and Network Hardware (Links to an external site.)Links to an external site.
Requirements
1. Depict a star topology that uses Ethernet.
2. Provide a 'cloud' shape or another symbol for the ISP WAN service. Label the symbol as 'Dial-up,' 'Cable,' or 'Fiber Optic.'
3. Label all network devices in the LAN (brand and model names are acceptable but not required).
4. Connect to the ISP service using a dial-up modem, cable modem, or, if using fiber optic service, an optical network terminal (ONT). Do not use a combination device such as a modem/router.
5. Connect the LAN router (wireless router) to the ISP WAN service device. The LAN router provides many capabilities to include: DHCP (Links to an external site.)Links to an external site., NAT translation (Links to an external site.)Links to an external site., port forwarding (Links to an external site.)Links to an external site., QoS (Links to an external site.)Links to an external site., and software firewall services. Do not use a router/switch combination device, however a router with integrated wireless capabilities is acceptable.
6. Use a managed switch as a centrally-located device to provide wired network connectivity for the seven end nodes (six desktop computers and a printer). Connect the switch directly to the main LAN router.
7. Connect the seven end nodes directly to the central switch.
8. Label the specific type of physical media (cables) being used to connect the LAN router to the ISP service device, the central switch to the LAN router, and the seven end nodes to the central switch.
9. Use a s.
DescriptionYou were selected to design a small peer-to-peer ne.docxcarolinef5
Description
You were selected to design a small peer-to-peer network for a new facility which has six computers and a networked printer. Each desk computer must have a wired network connection. The rooms are to have wireless access for mobile devices.
For this assignment, utilize the Gliffy (Links to an external site.)Links to an external site. software application to create a basic network diagram depicting a star topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN. Include only that equipment and end node devices on the network diagram. There is no need to draw out the layout of the physical space.
In addition to providing a network diagram, you must also provide a short essay that describes the details of the LAN equipment that is being used and the connections. In the essay, be sure to explain why each device is positioned where it is.
Also, briefly state any assumptions you've made about the kind of work being done, the demands the personnel in the office will put on the network, how they'll use it, and how that influenced your design. For example, if the business that uses the LAN is a small video-based news streaming service, they will probably need more performance from both their network and ISP than a small rental property management office might need.
Recommended reading: Understanding Routers, Switches and Network Hardware (Links to an external site.)Links to an external site.
Requirements
1. Depict a star topology that uses Ethernet.
2. Provide a 'cloud' shape or another symbol for the ISP WAN service. Label the symbol as 'Dial-up,' 'Cable,' or 'Fiber Optic.'
3. Label all network devices in the LAN (brand and model names are acceptable but not required).
4. Connect to the ISP service using a dial-up modem, cable modem, or, if using fiber optic service, an optical network terminal (ONT). Do not use a combination device such as a modem/router.
5. Connect the LAN router (wireless router) to the ISP WAN service device. The LAN router provides many capabilities to include: DHCP (Links to an external site.)Links to an external site., NAT translation (Links to an external site.)Links to an external site., port forwarding (Links to an external site.)Links to an external site., QoS (Links to an external site.)Links to an external site., and software firewall services. Do not use a router/switch combination device, however a router with integrated wireless capabilities is acceptable.
6. Use a managed switch as a centrally-located device to provide wired network connectivity for the seven end nodes (six desktop computers and a printer). Connect the switch directly to the main LAN router.
7. Connect the seven end nodes directly to the central switch.
8. Label the specific type of physical media (cables) being used to connect the LAN router to the ISP service device, the central switch to the LAN router, and the seven end nodes to the central switch.
9. Use a s.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
E C O N F O C U S T H I R D Q U A R T E R 2 0 1 3 31.docxbrownliecarmella
E C O N F O C U S | T H I R D Q U A R T E R | 2 0 1 3 31
O
ne of the great success stories of American retail-
ing, Circuit City got its start in 1949 as a tiny
storefront in Richmond, Va. From that modest
beginning, founder Sam Wurtzel quickly built the company
into a national chain, and his son Alan turned it
into a household name. By 2000, Circuit City employed
more than 60,000 people at 616 locations across the
United States.
Circuit City is also one of American retailing’s great fail-
ures. In November 2008, the 59 -year-old company filed for
bankruptcy. Within months, it closed its stores and liquidat-
ed more than $1 billion worth of merchandise, and on March
8, 2009, the last Circuit City store turned off its lights for
good. Today there are few reminders of the groundbreaking
retailer; the company’s 700,000-square-foot headquarters
complex outside Richmond is filling up with new tenants,
and the empty stores have been taken over by new retailers.
In part, Circuit City was just one of the many victims of
the financial crisis and recession, which also brought down
other large national retailers such as Linens ’n Things and
The Sharper Image. And businesses fail even during the
best of economic times, as part of the natural process of
“creative destruction” that is the engine of capitalism. But at
business schools across the country, Circuit City’s story is
taught as an example of what can happen when success
breeds complacency.
From Tire Store to Fortune 500
In 1949, New Yorker and serial entrepreneur Sam Wurtzel
was having his hair cut in Richmond on his way to a family
vacation in North Carolina. The barber mentioned that the
first television station in the South had opened in Richmond
less than a year earlier. Wurtzel, fresh from a failed import-
export business, thought this new entertainment device
might be his next opportunity.
The first experimental television stations began operat-
ing in the early 1940s, and commercial broadcasting began
after World War II. Few households owned sets at the time
of Wurtzel’s barbershop visit, but the medium was growing
rapidly: The number of TV stations in the United States
nearly tripled in 1949, from 27 to 76. Through a friend,
Wurtzel knew someone at Olympic Television, a small
manufacturer in Long Island City; through relatives, he had
connections to bankers and businesspeople in Richmond.
Within a month, Wurtzel had moved his family from New
York to Virginia and was selling televisions out of the front
half of a tire store on Broad Street, a few blocks west of
downtown Richmond.
Wurtzel thought his last name might be hard for people
to pronounce, so he named his store Wards, an acronym for
his family’s names: W for Wurtzel, A for his son Alan, R for
his wife, Ruth, D for his son David, and S for Sam. Rather
than try to compete directly with the big department stores,
he catered to lower-income consumers by offering install-
ment payment plans. He also developed a unique s.
E B B 3 5 9 – E B B S P o r t f o l i o V C o u r.docxbrownliecarmella
E B B 3 5 9 – E B B S P o r t f o l i o V
C o u r s e P r o j e c t T e m p l a t e - O n l i n e
2018
2
The Distribution & Marketing Plan Template
Using this Template (attached below), provide your ideas and research for the distribution
strategies you will recommend for the logistical movement and delivery of the product to
targeted users in a niche market. You should research similar products to determine what
other self-distributors are doing to deliver their product to a niche market.
The template is just a guide for organizing your paper with headings and sub-
headings. Retype and duplicate the headings and sub-headings. Everything else is your
original content.
Do not include any of the instructor’s comments in blue in the Template when submitting
this assignment. Reproduction of anything other than the headings and sub-headings
from the template will cause a deduction in points for your assignment.
Use the Budget portion of the template to organize your distribution and marketing
expenses. List each item you plan to spend money on, the frequency with which you will
use it, and the cost for your company’s first year.
All of the tools and tactics found in the written section of the plan must match the dollars
that are allocated to them in the Budget Worksheet.
Do not include any costs in the budget that are not directly related to specific distributing
(selling) and marketing (building awareness) strategies proposed for the product.
Costs should be realistic for what you are trying to accomplish. Remember you are
working with a micro budget of $1500 for the entirety of the one-year plan. So, for example,
World Tours and World Premieres are out. This budget will barely afford more than a local
venue or two to showcase your product.
The best way to tackle the Sales Projections and Budget is to create them in Excel, using
formulas in Excel, and then copy and paste the spreadsheet into your Word document
based on the sample provided.
It should take you a few seconds to set up these spreadsheets and type in the column
headings from the template. All of the line items are custom to your project and should be
revised by you to fit your project.
10/19/18 3
Course Project – Outline Template
(Be sure to start with Title Page to include Project Title, Your Name, Course Name, and Date
in proper APA format)
I. Executive Summary
The Company:
Establish in a sentence or two your experience and goals of the company.
The Project:
Explain your project through a premise statement (Artist’s Story or USP or Logline, depending
on your media) along with ways to relate potential success to the investor through similar
successful projects or its appeal to your Target Market.
Sales Projections / Return on Investment:
Summarize how their one-year investment of the agreed upon amount based on your Client
Interview with them will see the project.
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docxbrownliecarmella
e activity
https://blackboard.strayer.edu/bbcswebdav/institution/BUS/520/1134/Self-Assessments/Assessment%2014-%20Machiavellianism.pdf
Use the Internet to locate recent (within five years) news of a company whose ethical behavior has led to public corruption and investigation.
1-2 paragraph.
.
Dynamics of Human Service Program ManagementIndividuals who .docxbrownliecarmella
Dynamics of Human Service Program Management
Individuals who enter into a human service area of practice often start from an altruistic perspective and a desire to help a particular population. Getting into the field and discovering value incongruence and the high level of bureaucratic demands—regardless of whether the organization is a government, nonprofit, or for-profit human service organization—can result in disillusionment or departure from the field.
In your initial post, suggest ways a human service program leader can manage the competing demands of bureaucratic standards. What actions can leaders or managers take to help service delivery personnel retain motivation and job satisfaction?
.
Dynamic Postural Assessment Name _____________________.docxbrownliecarmella
Dynamic Postural Assessment
Name ________________________________________ Date __________
Overhead Squat
View
Kinetic Chain
Checkpoint
Observation Notes
Anterior
Foot / Ankle Feet turn out? Left Right
Knee
Knees move:
In? Out?
Left Right
Lateral
LPHC
Excessive forward lean?
Low back arches?
Shoulder Arms fall forward?
Single-Leg Squat
View
Kinetic Chain
Checkpoint
Observation Notes
Anterior Knee
Knees move:
In? Out?
Left Right
Pushing / Pulling
View
Kinetic Chain
Checkpoint
Observation Notes
Lateral
LPHC Low back arches? Push Pull
Shoulder Shoulders elevate? Push Pull
Head / Neck Head moves forward? Push Pull
To determine which muscles are overactive or underactive, compare your observations to the
downloadable Postural Assessment
Solution
s chart that accompanies this assessment template.
Overactive Muscles
_____________________________________________________________________________________
Underactive Muscles
_____________________________________________________________________________________
National Council of Teachers of English is collaborating with JSTOR to digitize, preserve and extend access to College
Composition and Communication.
http://www.jstor.org
The Rhetoric of the Open Hand and the Rhetoric of the Closed Fist
Author(s): Edward P. J. Corbett
Source: College Composition and Communication, Vol. 20, No. 5 (Dec., 1969), pp. 288-296
Published by: National Council of Teachers of English
Stable URL: http://www.jstor.org/stable/355032
Accessed: 11-12-2015 00:54 UTC
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at http://www.jstor.org/page/
info/about/policies/terms.jsp
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content
in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship.
For more information about JSTOR, please contact [email protected]
This content downloaded from 130.253.4.14 on Fri, 11 Dec 2015 00:54:16 UTC
All use subject to JSTOR Terms and Conditions
http://www.jstor.org
http://www.jstor.org/action/showPublisher?publisherCode=ncte
http://www.jstor.org/stable/355032
http://www.jstor.org/page/info/about/policies/terms.jsp
http://www.jstor.org/page/info/about/policies/terms.jsp
http://www.jstor.org/page/info/about/policies/terms.jsp
The kRh oric of the Open -land and the Rhtoric
of the Closed Ti§t
EDWARD P. J. CORBETT
THE FAVORITE METAPHORS USED during
the Renaissance in referring to logic
and rhetoric were Zeno's analogies of
the closed fist and the open hand. The
closed fist symbolized the tight, spare,
compressed discourse of the philosopher;
the open hand symbolized the relaxed,
expansive, ingratiating discourse of the
orator. When, sometime after the ap-
pearance of Descartes's Discou.
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docxbrownliecarmella
Dylan
(age 45, Caucasian) is a heroin addict who has been in and out of rehab facilities and prison since he was 17; he has a 1 year old daughter with a women he dated for a few months, but he is not allowed contact due to his unreliable behavior and constant drug use. He dropped out of high school when he was 17, after the first failed attempt at in-patient treatment. Dylan engages in other drug use – prescription pills, marijuana, and cocaine – but prefers heroin and other opioid-based drugs. Dylan has a twin brother, Daniel (age 45, Caucasian) who is a happily married father of three and owns his own graphic design firm. The parents, Harriet and William (ages 70 and 72, Caucasian) both report being invested and supportive of both of their sons’ interests (i.e. football, photography) during childhood and adolescence as Harriet was a stay-at-home mother and William emphasized family by working a lot from home during the boys’ childhood. They grew-up in a middle class suburb with the Neighborhood Watch and regular neighborhood gatherings. Harriet reports that Dylan struggled with change and seemed anxious with any new situation, whereas Daniel was very adaptable and rolled with any situation.
Rubric
.
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docxbrownliecarmella
Dustin,
A case study is defined by Saunders, Lewis, and Thornhill (2015), as when a researcher collects in the field observations and documentation of information from multiple sources to study a current event. The phenological design is referenced by Saunders et al. (2015), as the respondent’s explanation and remembrance of the activities and involvements being studied. These are quite diverse in being unbiased and factual.
There are other distinctions, such as time and costs associated with each one. The case study requires one person from 1 company, the multiple case study requires at least three companies with at least two persons, and the phenological design requires at least 20 persons. The amount of time commitment to speak to 20 people for 1 hour, is more significant than the amount of time needed to speaks to fewer persons being interviewed or surveyed as part of the study. This time obligation will also transect the financial aspect of the need for additional funding for the research, if more time is needed, then transversely proportional is the monetary aspect (Walden, 2019).
Benefits of Using a Case Study for DBA Doctoral Research
The benefits of using a case study for doctoral research is the cost savings and time required to complete or accomplish the study (Saunders et al., 2015; Yin, 2018). The case study is still a factual designed, based on developing true aspects, but is less problematic than the phenological design.
References
Saunders, M. N. K., Lewis, P., & Thornhill, A. (2015). Research methods for business students (7th ed.). Essex, England: Pearson Education Unlimited.
Walden University. (2019). DBA doctoral study rubric and research handbook. Available from http://academicguides.waldenu.edu/researchcenter/osra/dba
Yin, R. K. (2018). Case study research and applications: Design and methods (6th ed.). Thousand Oaks, CA: Sage.
Marshall
To begin a discussion about case study design and phenomenological research design it is important to define qualitative data. Sanders, Lewis and Thornhill (2015) define qualitative data as data that can be characterized by the richness and fullness of information that is used to explore a subject in a real setting where the researcher derives meaning from images and words, not numbers and data. The quality of qualitative research is defined by the interaction between the data collection process, such as a case study, and the analysis used to explore the meanings of the data (Sanders et al., 2015).
When determining the type of qualitative research that the researcher will conduct it is important to determine the method of collection and how it will be used to analyze the empirical evidence. Yin (2018) proposes that multiple research method can be used for exploratory, descriptive and explanatory studies if properly applied to the research topic. However, there is often one methodology that is more appropriate to address the research q.
DWPM
7/17/13
1
543707.1
MEMBERSHIP AGREEMENT
This Membership Agreement (the “Agreement”) is made between 180 Fitness, Inc. (the
“Club”), a Massachusetts Corporation, and the undersigned member (the “Member”). This
Agreement is made because Member wishes to receive and the Club wishes to provide personal
training services in the form of Training Sessions, defined herein, and health club services at the
Club’s facility, which facility is located at [ADDRESS] (the “Facility” or “Facilities”).
In this Agreement, the terms “you” and “your” refer to the Member. A “Training Session” is a
time period in which a personal trainer provides instruction to a Member based on a tailored
exercise program, which is designed for that Member and takes into account that Member’s
fitness objectives, level, and experience. A Training Session may include exercise counseling,
instruction in the proper use of equipment and technique, and dietary suggestions.
I. BASIC MEMBERSHIP INFORMATION
1. Contact Information
2. Membership, Term, and Payment.
a. Membership. Your Membership entitles you to use the Facility until your
Membership Expiration Date, below, and is created when you execute this Agreement, including
fulfilling all Membership Qualifications according to Article II, below, and pay your Fee,
defined below.
b. Fee. Your Fee includes your initial fee (“Initial Fee”), and a fee based on the length
of your membership (“Membership Fee”). Your Initial Fee is due upon execution of this
Agreement. Your Membership Fee may be paid in one (1) lump sum, or in equal monthly
installments.
$ ___________ + $ ____________ = $ ________________
Initial fee Membership Fee TOTAL DUE (Fee)
You opt to pay the Membership Fee in one lump sum (___) equal monthly installments.
Name:
___________________________________
Phone:
______________________________
Address:
_________________________________
Email:
_______________________________
_________________________________________
Date
of
Birth:
_________________________
EMERGENCY
CONTACT:
_________________________________/_________________________/______________________________
Name
Relationship
Phone
Number(s)
DWPM
7/17/13
2
543707.1
circle one
If you decide to pay in equal monthly installments, your payment is due on the first day of the
month.
Membership Start Date: ___/___/___ Membership Expiration Date: ___/___/___
[c. Billing Authorization – automatic withdrawals?]
[d. Membership Freeze. You may put your Membership on hold for any reason for one
.
Dwight
Evaluation
Leadership style assessments certainly have a place within the organization. The effectiveness of a leadership style assessment will depend on what type of assessment and what the organizational needs are. Multi-source feedback assessments are supposed to give a 360 degree look at a leader and give the organization a valuable outcome in the evaluation of the leader (MacKie, 2015). Using multi-source feedback assessments can be extremely beneficial as long as the assessment is properly paired with the organizational goals and needs. Assessing a leader from multi perspectives is truly a holistic approach. But, organizations need to recognize that no leadership style assessment is not without its limitations.
Next, the behavior approach is one of four approaches to leadership. Three of which all have weaknesses; traits, skills, and behavior. But the fourth approach to leadership, the situational approach demonstrates the flexibility of a leader (Northouse2016, 2016). In today’s dynamic and complex business environment, flexible leaders bring the most value to an organization. The situational approach allows the leader to apply the other three approaches given the circumstances. As an Army leader I found this approach to be extremely effective while leading in combat and non-combat situations.
Explanation of Usefulness
Of equal importance is the usefulness leadership style assessments and the behavior approach have on an organization. Once an organization has clearly defined the goals and purpose of conducting an assessment, and then subsequently the correct assessment is used, the results will certainly help the organization. In this case, using an assessment to evaluate the benefits of a behavior approach to leadership will allow the organization to determine what needs to be done, how it needs to be done, and how fast it needs to be done (Saxena, 2014). Additionally, the behavior approach (if the relationship behavior is used), can give subordinates the motivation needed to achieve the desired outcome through a better understanding of themselves.
Explanation of Impact
The impact of leadership assessments on an individual can be positive or negative. Again, this directly correlates to the goals and expectations of the organization when the assessment is implemented. For the individual, it could potentially identify strengths and weaknesses. Thus, giving the individual the opportunity to grow and learn from the assessment. Simultaneously, the organization discovers how these strengths and weaknesses fit into the organization’s goals. Once they have identified where and how an individual nest into the organization, a holistic approach to achieving those goals can be developed (Northouse2016, 2016). In comparison, using a behavior approach assessment will yield valuable information about subordinates’ behavior patterns. Which equates to the organization knowing and understanding their employees. Understanding behavio.
Dwight Waldo is known for his work on the rise of the administrative.docxbrownliecarmella
Dwight Waldo is known for his work on the rise of the administrative state, which prompted scholars to consider whether a large bureaucracy actually fosters or limits democracy. What do you think? Do we need lots of government in order to have the strongest democracy or does “big” government interfere with our democratic ideals? cite 2 academic resources
.
Dwayne and Debbie Tamai Family of Emeryville, Ontario.Mr. Dw.docxbrownliecarmella
Dwayne and Debbie Tamai Family of Emeryville, Ontario.
Mr. Dwayne Tamai and Mrs. Debbie Tamai case of electronic harassment involved 15-year-old son, Billy, who took control of all of the electronic devices in the family's home, including the phone, and manipulated them to the distress of other family members for his own amusement. The incidents began in December 1996, when friends of the family complained that phone calls to the Tamai home were repeatedly being waylaid, cut off missed messages, strange clicking and appears like a minor with a disembodied voice, unnervingly distorted by computer, who interrupted calls to make himself known.
After burping repeatedly, the caller frightened Mr. and Mrs. Tamai, and stated that I know who you are, and I stole your voice mail. Mocking, sometimes menacing, the high-tech stalker became a constant presence, eavesdropping on family conversations, switching TV channels, and shutting off the electricity.
The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect. Mr. Dwayne and Mrs. Debbie Tamai asserted that their son, Billy, had admitted engaging in the mysterious calls. The interruptions included burps, blathering and claims having control over the inner workings of the Tamai’s custom-built home, and the power to turn individual appliances on and off via remote control.
It started off as a witticism with friends and got out of control to an extent that he didn't know how to end the entire operation, become afraid to come forward and tell the parents for the fear of us disowning him.
On Saturday, Mr., and Mrs. Tamai get organized and planned to take their son to the police department to defend him against persistent rumors on him. Instead, Mr., and Mrs. Tamai’s son confessed and labelled an intruder code-named, Sommy. Mr., and Mrs. Tamai eliminated all external sources and had confidence in interior sources. After 2-days, a team of investigators, intelligence and security experts loaded with high-tech equipment failed to locate Sommy. The next day, the team brought in two television networks to assist in the process.
In conclusion, the son, Billy not (Sommy) contacted the victims; (his biological parents), launched verbal threats in combination with the electronic harassment, in an effort to demonstrate his power and authority over them. The best option was, Mr., and Mrs. Tamai victims were not physically harmed, but terrified and greatly inconvenienced by the fact that the unknown force appeared to have control over a great many aspects of their lives, and the unknown force turned out to be their biological son, Billy.
Scenario:
1
Criminal motive is connected to emotional, psychological, and material need are often impel by means of behavior and independent of technology operation. These criminal tendencies are believed to champion the re.
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docxbrownliecarmella
DVWA
Setting up DAMN VULNERABLE WEB APPLICATIONS
Damn Vulnerable Web Application
DVWA is a DAMM VULNERABLE WEB APP coded in PHP/MYSQL.
Security professionals, ethical hackers test their skills and run the tools in a legal environment using DVWA.
DVWA helps web developer better understand the processes of securing web applications and teacher/students to teach/learn web application security in a safe environment.
Installing Kali Linux
Kali Linux has been installed using the Image on Virtual Box and it is up as you can see the Desktop and Browser.
4
DVWA SETUP
I have downloaded DVWA file and using the instructions in the video. I have installed it.
Using the Ifconfig command we can get the Ip address of the DVWA VM
We can use the address and enter it into the browser of the Kali Linux which is up and running.
Once you enter the address , the home page of the DVMA is opened
Enter the User name as admin
Enter the Password as password
I have started exploring options such as SQL Injection.
Go to Setup ------> Create/ Reset Database
I have changed the DVWA Security from High to Low
DVWA Security changed to Low
We can enable PHPIDS, Simulate an attack and View IDS Log
References
Maurice Dawson.(2018,October 3). Setting Up Damn Vulnerable Applications [Video]. YouTube.
https://www.youtube.com/watch?v=LOTaLgY5i5I
DVWA
Setting up DAMN VULNERABLE WEB APPLICATIONS
Damn Vulnerable Web Application
DVWA is a DAMM VULNERABLE WEB APP coded in PHP/MYSQL.
Security professionals, ethical hackers test their skills and run the tools in a legal environment using DVWA.
DVWA helps web developer better understand the processes of securing web applications and teacher/students to teach/learn web application security in a safe environment.
Installing Kali Linux
Kali Linux has been installed using the Image on Virtual Box and it is up as you can see the Desktop and Browser.
4
DVWA SETUP
I have downloaded DVWA file and using the instructions in the video. I have installed it.
Using the Ifconfig command we can get the Ip address of the DVWA VM
We can use the address and enter it into the browser of the Kali Linux which is up and running.
Once you enter the address , the home page of the DVMA is opened
Enter the User name as admin
Enter the Password as password
I have started exploring options such as SQL Injection.
Go to Setup ------> Create/ Reset Database
I have changed the DVWA Security from High to Low
DVWA Security changed to Low
We can enable PHPIDS, Simulate an attack and View IDS Log
References
Maurice Dawson.(2018,October 3). Setting Up Damn Vulnerable Applications [Video]. YouTube.
https://www.youtube.com/watch?v=LOTaLgY5i5I
DVWA
Setting up DAMN VULNERABLE WEB APPLICATIONS
Damn Vulnerable Web Application
DVWA is a DAMM VULNERAB.
Dusk of DawnDiscussion questions1. Explain when we call fo.docxbrownliecarmella
Dusk of Dawn
Discussion questions
1. Explain: “when we call for education, we mean real education. We believe in work. We ourselves are workers, but work is not necessarily education. Education is the development of power and ideal. We want our children to be trained as intelligent human beings should be, and we will fight for all time against any proposal to educate black boys and girls simply as servants and underlings, or simply for the use of other people. They have a right to know, to think, to aspire” (p. 92).
2. Explain: “in the folds of this European civilization I was born and shall die, imprisoned, conditioned, depressed, exalted and inspired. Integrally a part of it and yet, much more significant, one of its rejected parts” (p. 3).
3. What does Du Bois mean by “slave heritage in mind and home” and “compulsory ignorance” (p. 5)?
4. Explain: “these matters seldom bothered me because they were not brought to my attention” (p. 18).
5. Explain: “wealth was God” (p. 26). Does this sound familiar?
6. Explain: “the economic order determined what the next generation should learn and know” (p. 27).
7. Du Bois discusses lynching (the standard Jim Crow era enforcement practice) on pp. 29, 55, 241, and 251. What was your reaction to these sections?
8. Explain: “I was pleasantly surprised when the white school superintendent, on whom I had made a business call, invited me to stay for dinner; and he would have been astonished if he had dreamed that I expected to eat at the table with him and not after he was through” (p. 31).
8. Jim Crow laws disenfranchised black citizens by three common practices—grandfather clause, poll tax, and literacy test. Do you think they might have affected election outcomes from the 1870s to 1965?
9. Why was the lynching of Sam Hose a turning point in Du Bois’ life (pp. 67-68)?
10. What do you think of the principles of the ‘Niagara Movement’ (pp. 88-89)? Do they seem radical to you?
11. Did you realize that the Southern States became more segregated (socially, culturally, and legally) after the Civil War? Step by step, decade by decade, state and local legislatures passed laws and ordinances to separate and distinguish ‘white’ and ‘colored’ in every single way imaginable—right up until the mid-1960s. Comment.
12. Du Bois suggests that if the U.S. does not follow its own ideals it might truly become “the land of the thief and the home of the slave” (which was how most countries in the world thought of—and, funny enough, still think of—the United States). Comment.
13. Du Bois recognizes that thoughts—the thoughts in our heads—are “expressions of social forces more than of our own minds. These forces or ideologies embrace more than our reasoned acts” (p. 96). Explain.
14. Explain: “that history may be epitomized in one word—Empire; the domination of white Europe over black Africa and yellow Asia, through political power built on the economic control of labor, income and ideas” (p. 96).
15. .
Durst et al. (2014) describe the burden that some Romani experience .docxbrownliecarmella
Durst et al. (2014) describe the burden that some Romani experience in not feeling adequately Roma for the Roma communities while also feeling stigmatized and discriminated against by the white Hungarian communities that they assimilate into. How do those different pressures compare? Do such contradictory and compounding pressures exist for any groups within American society?
.
DuringWeek 4, we will shift our attention to the legislative.docxbrownliecarmella
During
Week 4, we will shift our attention to the legislative history behind the Centers for Medicare & Medicaid Services and the challenges faced by the organization in carrying out its responsibilities. Additionally, we will focus on specific implementation activities, such as designing, rulemaking, operating, and evaluating.
Your Learning Objectives for the Week:
Apply and interpret the stages in the policy making process.
Critique the practical aspects of how one might influence the policy process through the political process.
.
DuringWeek 3, we will examine agenda setting in more depth w.docxbrownliecarmella
During
Week 3, we will examine agenda setting in more depth with an emphasis on interest group involvement and the role of chief executives in the agenda setting process. This discussion on policy formulation will give you some additional insight into the development of legislation.
Your Learning Objectives for the Week:
Apply and interpret the stages in the policy making process.
Critique the practical aspects of how one might influence the policy process through the political process.
.
During the course of this class you have learned that Latin Ameri.docxbrownliecarmella
During the course of this class you have learned that Latin America is a very diverse region in terms of race, ethnicity, culture, and geography. Explain the reasons of Latin America diversity. (10 points)
Women in Argentina created monumental movements asking for the whereabouts of their loved ones disappeared for political reasons starting in the 1970s. Explain the political reasons of these disappearances; the names given to these organizations; how these women banded together; their actions; why these movements are labeled as “gendering of human rights;” how they dressed; detail their accomplishments. (10 points).
women in Chile organized to find the whereabout of their loved ones. When did this happened? Why did people disappeared in Chile? Who are the Arpilleras?
El Salvador and Guatemala also experienced political violence. You are asked to provide an explanation of how women reacted to that political violence.
.
During WW II, the Polish resistance obtained the German encoding mac.docxbrownliecarmella
During WW II, the Polish resistance obtained the German encoding machine called
enigma
. The machine was brought to England. The British broke the code machine just before an attack on the British city of Coventry. Churchill, the Prime Minister, faced a dilemma - tell Coventry about the forth-coming attack and save those people but the Germans would know that the British broke the code. The Germans would change it and London could be attacked killing even more people. OR not tell Coventry and protect London and other places.
What would you advise Churchill to do?
Would you tell him to lie about whether he knew?
Why?
____________________________________________
Participants must create a thread in order to view other threads in this forum.
Three postings
are the required minimum.
1 main response: 250 words minimum for the post addressing the questions given for the week. Note that all students are required to return to their main thread and address questions asked or comments made by at least one other person on your main thread.
2 reply postings with 100 words minimum.
One of these reply postings must be asking a content related question on another student’s posting. Another reply post must include a content question on another student's main thread.
.
During Week 5, we studied social stratification and how it influence.docxbrownliecarmella
During Week 5, we studied social stratification and how it influences what goes on in many social interactions among people. After you have read the reading assignment and lecture for this week, please respond to all parts of the discussion by the due date assigned:
What are some of the factors that affect social mobility? Can these be overcome?
Do you believe the structural-functionalist or the social conflict approach best explains social stratification? Why?
How does the media reflect attitudes on gender as far as depicting women and men in very traditional roles? Provide two detailed examples that substantiate your points—these can be an advertisement, television show, website, or magazine.
When you think of various groups (race, class, and gender) in society, which ones have the most power and which ones have the least? Using Intersection Theory, identify two groups that have unequal amounts of power and resources, being specific and using the text and outside resources. For each group, has the power dynamic changed over time? Do you think it will change in the future? Why or why not?
Kendall, D. (2013).
Sociology in Our Times, 11th
. Independence, KY: Wadsworth Publishing. ISBN : 9781305503090
.
During this week you worked with the main concepts of Set Theory. Ch.docxbrownliecarmella
During this week you worked with the main concepts of Set Theory. Choose one newspaper, online journal, or library article that presents results of a survey, poll, or global information and identify the categories used to present the results. Do you think those categories are well defined? Present a different way to organize and categorize the results. How do you think rearranging categories would affect the communication of the article´s conclusions?
.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Cisco Networking - WAN Implementation with SOHO ConfigurationYou.docx
1. Cisco Networking - WAN Implementation with SOHO
Configuration
You have been recently hired as a network administrator for the
xAcme Technology Trade School. The company is realizing that
the local systems administrators need help implementing certain
technologies at each of the remote locations, as well as final
WAN configurations. Out of the network administrators on
staff, you have been asked to move forward the project. With
your background and skills, you will design, implement, and
assist in configurations to support xAcme’s topology.
Technologies to implement will differ from site to site, as
administrators have begun topology implementations. You will
be provided the overall topology as well as certain device
configurations in order to determine the best course of action
per site/challenge. In addition to helping them configure their
network, they require that all new network administrators obtain
their CCNA Certification within 60 days of being hired. You are
excited about starting this project but realize creating a
schedule to help balance your work and home life will be key to
success.
To get started, follow the steps below:
IEEE Format and also the assignment will be submitted on
TurnItin.
Overview
-
Along with the challenges presented in this document, you will
be provided an overall site topology to work from, as well as
specific device configurations (where applicable) to make your
recommendations.
Suggested solutions should be comprehensive and justified in
approach. Configurations of technologies should be written out
to help guide the systems administrators with implementation.
2. In some cases, you may find it necessary to implement
additional cabling, which can be done by adding to the supplied
topology. Any adjustments to the sites’ topology that you find
necessary should be documented and supplied with your
submission.
Your document will be divided up by site and solutions per site.
Each area is unique in requirements but collectively will
demonstrate your understanding of network routing and
switching technologies. Each scenario will provide you with
suggested sections within TestOut (LabSim) to use as a guide in
your analysis and recommendations.
You can use this
template
as a guide on how to format your project. Be sure to cite your
external sources using the
IEEE citation style
. To learn how you will be assessed on this assignment, please
take a moment to review the
rubric
.
Existing VLANs
-
Remote locations vary in terms of size and requirements. Some
implementations will require current site router/switch-running
configurations, which will be provided. All sites will use the
following four VLANs, but you will need to configure only
what is asked per site (some assumptions will be made).
Existing VLANs, per xACME:
Faculty VLAN
used by faculty on-site for all office locations (non-instructional
communications)
total devices per site will vary
Administrative VLAN
used by staff on-site for business administrative
communications
total devices per site will vary
3. Academic VLAN
used by faculty and students for classroom labs and
instructional communications
total devices per site will vary
Server VLAN
used by IT staff for all technology/management communications
total devices per site will vary
The types of devices per site will be the same; however, the
number of deployed devices may vary (all documented in the
xAcme educational topology).
Routers Per Site:
Cisco 2800 Series Integrated Services
Interfaces Ports Available
4 Fast Ethernet Interfaces
(Per Router)
2 Serial Interfaces
(Per Router)
fa0/0
s0/0/0
fa0/1
s0/0/1
fa1/0
fa1/1
Switches Per Site:
Cisco Catalyst 6500 Series
Ports Available
96 Total Gigabit Ethernet
Ports Per Switch
Module 1 = gi0/1 - gi0/24
Module 2 = gi1/1 - gi1/24
Module 3 = gi2/1 - gi2/24
Module 4 = gi3/1 - gi3/24
Note:
Device type will not impact your configuration commands and
implementation of ALL required technologies will use Cisco
4. IOS commands/concepts learned in our TestOut lecture(s).
Standard switchports will be configured and used as trunk OR
access ports and DCE ends should be noted when configuring
serial ports per router.
Springfield Site Device and STP Configurations (Focus on the
Springfield Site Only)
-
Required Implementation:
Device hostnames, banners, secured passwords and spanning
tree protocol.
Device Configurations:
Implement device hostnames to match the xACME educational
topology labels. Provide a template and sample configuration
for the MOTD banner and login banner (wording and
implementation) for one of the switches. Keep this generic, as it
will be implemented on
all
switches in the xACME educational topology. Lastly, include
the configuration steps for implementing device passwords on
both console port (out-of-band communications) and VTY
(Telnet/in-band communications). All passwords should be
encrypted.
Spanning Tree Protocol (STP):
Briefly explain the advantages and purpose of the STP.
Administrators are having a difficult time placing switch 1 as
the root. Provide a sample configuration for implementing SPT
on the switches. Choose the mode you feel would be best suited
for the environment and justify why. Switch 1 will need to be
the root switch in the Springfield topology. Consider any
security measures that can be implemented to protect the
devices from bogus BPDUs.
Note:
When approaching the spanning tree challenge,
do not
concern yourself with the multiple VLANs at this time. Focus
simply on the default VLAN1, which is the active VLAN that
5. all ports belong to in this topology at this time.
Please refer to the following configurations:
SpringfieldSw1
SpringfieldSw2
SpringfieldSw3
SpringfieldSw4
Worchester Site Subnetting Configurations (Focus on the
Worchester Site Only)
-
Required Implementation:
Subnet addressing to accommodate Worchester site
Subnetting:
Properly subnet addressing blocks to accommodate the sites
VLAN sizes. You
will not
need to implement VLANs here; rather, you will create the
correct sizing to properly accommodate the devices stated per
the xACME educational topology. Carefully consider the
challenges faced when structuring subnets too large and/or too
small during your design. The starting Worchester site
addressing range is 10.20.0.0 /16 (per the xACME educational
topology diagram). Formatting per subnet should follow format
below and should be clearly stated and placed within a table.
NetID
mask/CIDR values
broadcast
usable range
No additional device configurations required to complete
Boston Site Routing Protocol, Route Summarization and
Topology Improvements (Focus on the Boston Site Only)
-
Required Implementation:
Implement a routing protocol to manage networks within the
Boston site topology as well as default routes to exit non-
Boston traffic. Summarization addresses should be stated per
router in Boston’s topology. Consider redundancy upgrades as
6. well and document per topology.
Routing Protocol:
Research the different routing protocol types (distance
vector/link state/hybrid) and choose a routing protocol
implement (OSPF, EIGRP, RIP). Justify your selection by
defining its strengths and weaknesses. Define the proper
addressing block to assign per point-to-point links and
implement your solution per all three routers. Routing protocol
should be set up in a way to advertise all IP subnets, WAN and
LAN interfaces on a router. Be sure to protect the
advertisements of our routing tables as well.
Summarization:
Define the route summarization addresses for each Boston site
router. These addresses will not be implemented on the routers,
but they will be documented in your response. Each
summarization address must be large enough to include all
required subnets contained within the underlying site subnets.
Default Route:
Any traffic not matching internal networks will need to be
routed outward. Implement default routes on the site routers to
exit this traffic.
Topology:
Consider the potential challenges with the current Boston site
topology (cabling and redundancy approach). If improvements
are needed, update the topology and discuss and routing
redundancy approaches you see fit.
Please refer to the following configurations:
BostonSiteRouter1
BostonSiteRouter2
BostonSiteRouter3
Sacramento Site VLAN, Routing on a Stick (ROS) and DHCP
Implementation (Focus on the Sacramento Site Only)
-
Required Implementation:
VLANs, ROS, and DHCP implementation
VLANs:
7. Implement the VLAN database on the Sacramento site switches.
Explain the assignment of switchport modes and how to
implement each. Demonstrate how to implement port security
on the switchports to allow only two MAC addresses per port
and shutdowns for violations. Additionally, consider proper
security management of any unused ports.
Provide the VLAN IDs, ports with matching switchport modes,
and sample configuration of port security and port management
steps.
ROS:
The site will be treated as a routing on a stick (ROS) topology.
Provide a sample configuration for Sacramento fa0/0 interface
to support the multiple VLAN’s and inter-vlan routing.
To simplify configuration, please use the following addressing:
faculty VLAN: 10.50.0.0 /26
administrative VLAN: 10.50.0.64 /26
instructional VLAN: 10.50.0.128 /26
server VLAN: 10.50.0.192 /26
DHCP:
The site will need a solution to manage the deployment of IP
addresses. Briefly explain the purpose of DHCP and provide
implementation of the DHCP configuration for the VLANs. Be
sure to include the pool name, exclude the last 10 addresses of
each subnet range and configure the gateway, subnet mask and
DNS Address (Sacramento fa0/0 address).
Please refer to the following configurations:
SacramentoSw1
SacramentoSw2
SacramentoSw3
SacramentoRouter
Los Angeles Site Management Technologies (Focus on the Los
Angeles Site Only)
-
Required Implementation:
Device configuration remote storage, remote management of
switches, ACL implementation, and an NTP solution.
8. Remote IOS Storage:
The site will require remote storage of the devices
configurations. Server details are provided per your topology.
You will determine the protocol to use and demonstrate how to
implement the solution.
Remote Management of Switches:
All devices will be configured to allow for remote
management. You will be required to implement this solution on
the switches found on the site.
ACL Implementation:
In order to restrict and protect access to the devices, the only
VLAN allowed to communicate remotely with the devices
should belong to the server VLAN. Determine the type of ACL
to implement and the placement of the list, and implement the
solution on the site router.
Network Time Protocol:
Implement an NTP solution on the devices found within this
topology to ensure clock synchronization is accomplished. The
purpose would be for accurate logging records and
authentication protocols. Server details are provided per your
topology.
Please refer to the following configurations:
LosAngelesSw1
LosAngelesSw2
LosAngelesSw3
LosAngelesRouter
xACME WAN - WAN Implementation and Secure
Communications (Focus on All Site Entry Point Routers)
-
Required Implementation:
WAN Implementation, device authentication, and topology
suggestions.
WAN Implementation:
Current WAN links are serial based and connected over leased
lines that are using the Cisco default protocol for layer 2
connectivity. Authentication is not present at this time, but the
9. added security would be preferred. Research the available WAN
protocols and suggest a solution to provide authentication
between devices. Implement basic routing protocol
authentication. Provide a sample implementation over serial
links for your systems administrator to follow. Included in this
task are device configurations for the current implementation.
Topology:
Currently, the Los Angeles and Boston sites are connected
across leased lines and each remains as the entry point to its
respective regional locations. There is growing concern over the
amount of traffic both devices are handling. Please review the
xAMCE educational topology and make recommendations to
provide some redundancy among sites, as well as to alleviate
some of the bandwidth requirements placed on both devices.
This may require additional lines to be leased. With your
suggested improvements, please update the topology as you see
fit.
Note:
Additional addressing is available if needed. Simply create the
additional ranges from the provided available xACME public
address range, 165.128.63.0 /26.
Please refer to the following configurations:
BostonSiteRouter1
WorchesterRouter
SpringfieldRouter
SacramentoRouter
LosAngelesRouter