LAB3/Lab 3 Answer Sheet(1).docx
Liberty University
CSIS331
Lab 3 Answer Sheet
Submit this completed document with your completed and saved packet tracer in the link provided in Blackboard.
Part 1: Questions.
Step 1:
a. Which command displays the statistics for all interfaces configured on a router?
b. Which command displays the information about the Serial 0/0/0 interface only?
c. 1) What is the IP address configured on R1?
c. 2) What is the bandwidth on the Serial 0/0/0 interface?
d. 1) What is the IP address on R1?
d. 2) What is the MAC address of the GigabitEthernet 0/0 interface?
d. 3) What is the bandwidth on the GigabitEthernet 0/0 interface?
Step 2. Questions.
a. Which command displays a brief summary of the current interfaces, statuses, and IP addresses assigned to them?
b. 1) How many serial interfaces are there on R1 and R2?
b. 2) How many Ethernet interfaces are there on R1 and R2?
b. 3) Are all the Ethernet interfaces on R1 the same? If no, explain the difference(s).
Step 3: Display the routing table on R1.
a. What command displays the content of the routing table?
b. 1) How many connected routes are there (uses the C code)?
b. 2) Which route is listed?
b. 3) How does a router handle a packet destined for a network that is not listed in the routing table?
Part 2 Step 3
a. What command did you use?
Part 3 Step 1
a. 1) How many interfaces on R1 and R2 are configured with IP addresses and in the “up” and “up” state?
a. 2) What part of the interface configuration is NOT displayed in the command output?
a. 3) What commands can you use to verify this part of the configuration?
b. 1) How many connected routes (uses the C code) do you see on each router?
b. 2) How many EIGRP routes (uses the D code) do you see on each router?
b. 3) If the router knows all the routes in the network, then the number of connected routes and dynamically learned routes (EIGRP) should equal the total number of LANs and WANs. How many LANs and WANs are in the topology?
b. 4) Does this number match the number of C and D routes shown in the routing table?
Ping Table:
Ping From Device IP
Ping to Device IP
Results
PC1
PC4
R2
PC2
__MACOSX/LAB3/._Lab 3 Answer Sheet(1).docx
LAB3/Lab 3.pka
__MACOSX/LAB3/._Lab 3.pka
LAB3/Lab 3 Instructions(1).docx
Liberty University CSIS331
Liberty University
CSIS 331
Lab 3 Instructions
Packet Tracer:
[Adapted from Cisco Networking Academy Intro to Networking 6.4.3.3]
Overview
In this activity, you will use various show commands to display the current state of the router. You will then use the Addressing Table to configure router Ethernet interfaces. Finally, you will use commands to verify and test your configurations.
Note: The routers in this activity are partially configured. Some of the configurations are not covered in this course, but are provided to assist you in using verification commands.
Part 1: Display Router Information
Step 1: Display interface information on R1. ...
This document provides the answers to a CCNA 1 final exam with 50 multiple choice questions. It covers topics such as networking tools, network devices, network models, cabling, Ethernet, IP addressing, IPv6 addressing, routing, and network security. Some key points covered are the functions of switches, routers, and default gateways. It also addresses subnetting, private IP addresses, IPv6 addressing formats, and network protocols like TCP/IP, ICMP, DHCP, and DNS.
The document is a sample exam for CCNA certification that contains multiple choice questions about networking concepts. Some of the questions test knowledge of protocols like TCP, UDP, HTTP, SNMP, and protocols used for routing like OSPF, EIGRP, RIP. Other questions cover topics like VLANs, trunking, STP, and IP addressing schemes.
This document provides instructions for a lab report on configuring OSPF routing between three routers in Packet Tracer. It includes questions to answer before completing the lab activity. The lab requires configuring OSPF on three routers, verifying OSPF packet exchange in simulation mode, and answering reflection questions about the OSPF configuration and process IDs. Screenshots must be included to show the OSPF packet exchange.
This document provides instructions for a lab report on configuring OSPF routing between three routers in Packet Tracer. It includes questions to answer before completing the lab activity. The lab requires configuring OSPF on three routers, verifying OSPF packet exchange in simulation mode, and answering reflection questions about the OSPF configuration and process IDs. Screenshots must be included to show the OSPF packet exchange.
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2Lori Head
The output "MTU 1500 bytes" refers to the maximum transmission unit, which is the maximum size of a packet or frame that can be sent in a single piece over a link in a network.
The correct answer is F. The maximum frame size that can traverse this interface is 1500 bytes.
This document provides information for an assessment on configuring a network using Cisco devices. It includes a topology diagram and addressing table with IP information for routers, switches, and PCs. The assessment consists of 6 parts testing initialization of devices, basic configuration settings, LAN redundancy, OSPF routing, network connectivity verification, and displaying IOS software information. Candidates are instructed to configure interfaces, routing protocols, and other settings on 3 routers and 3 switches according to the provided specifications.
The document provides sample exam questions for CCNA Exploration 4.0 related to LAN switching and wireless networking. Specifically:
- The questions cover topics such as VLAN configuration, trunking, switch port security, the OSI model, hierarchical network design, and Ethernet switching functions.
- Multiple choice answers are provided for each question to test understanding of networking concepts and configuration.
So in summary, the document appears to be practice exam questions for a CCNA certification focusing on layer 2 switching and wireless LAN technologies.
This document provides the answers to a CCNA 1 final exam with 50 multiple choice questions. It covers topics such as networking tools, network devices, network models, cabling, Ethernet, IP addressing, IPv6 addressing, routing, and network security. Some key points covered are the functions of switches, routers, and default gateways. It also addresses subnetting, private IP addresses, IPv6 addressing formats, and network protocols like TCP/IP, ICMP, DHCP, and DNS.
The document is a sample exam for CCNA certification that contains multiple choice questions about networking concepts. Some of the questions test knowledge of protocols like TCP, UDP, HTTP, SNMP, and protocols used for routing like OSPF, EIGRP, RIP. Other questions cover topics like VLANs, trunking, STP, and IP addressing schemes.
This document provides instructions for a lab report on configuring OSPF routing between three routers in Packet Tracer. It includes questions to answer before completing the lab activity. The lab requires configuring OSPF on three routers, verifying OSPF packet exchange in simulation mode, and answering reflection questions about the OSPF configuration and process IDs. Screenshots must be included to show the OSPF packet exchange.
This document provides instructions for a lab report on configuring OSPF routing between three routers in Packet Tracer. It includes questions to answer before completing the lab activity. The lab requires configuring OSPF on three routers, verifying OSPF packet exchange in simulation mode, and answering reflection questions about the OSPF configuration and process IDs. Screenshots must be included to show the OSPF packet exchange.
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2Lori Head
The output "MTU 1500 bytes" refers to the maximum transmission unit, which is the maximum size of a packet or frame that can be sent in a single piece over a link in a network.
The correct answer is F. The maximum frame size that can traverse this interface is 1500 bytes.
This document provides information for an assessment on configuring a network using Cisco devices. It includes a topology diagram and addressing table with IP information for routers, switches, and PCs. The assessment consists of 6 parts testing initialization of devices, basic configuration settings, LAN redundancy, OSPF routing, network connectivity verification, and displaying IOS software information. Candidates are instructed to configure interfaces, routing protocols, and other settings on 3 routers and 3 switches according to the provided specifications.
The document provides sample exam questions for CCNA Exploration 4.0 related to LAN switching and wireless networking. Specifically:
- The questions cover topics such as VLAN configuration, trunking, switch port security, the OSI model, hierarchical network design, and Ethernet switching functions.
- Multiple choice answers are provided for each question to test understanding of networking concepts and configuration.
So in summary, the document appears to be practice exam questions for a CCNA certification focusing on layer 2 switching and wireless LAN technologies.
The document provides instructions for a Packet Tracer skills exam to practice IP routing concepts. Students are asked to:
1) Connect various networking devices like routers, switches and PCs according to a topology diagram.
2) Design an IP addressing scheme to meet requirements of providing a certain number of host addresses for two subnets, and fill in an addressing table.
3) Configure the routers and switches with IP addresses, passwords, and descriptions according to the addressing table.
4) Verify connectivity within the network by pinging devices and their default gateways.
This document describes configuring a basic single-area OSPFv2 network. It includes the topology diagram and addressing tables, and steps to build the network, configure OSPF routing on each router with area 0, and verify OSPF neighbor relationships and routing tables. It also provides sample outputs of show commands to check OSPF settings and interfaces.
This document provides an overview of the content and assignments for ECET 340 Entire Course. It lists the weekly homework assignments, labs, and objectives for ECET 340 over 7 weeks. The document includes sample homework questions on topics like interrupts, timers, analog-to-digital conversion, and serial communication. It also provides examples of lab objectives and steps for labs covering these topics.
This document provides instructions for connecting a router to a workstation using HyperTerminal and establishing a console session. The steps include connecting a rollover cable from the router's console port to the workstation's COM1 port, launching HyperTerminal on the workstation, naming and configuring the HyperTerminal session, and connecting to view the router's response. Additional steps cover closing the session, reopening saved sessions, and shutting down connections.
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdfngombeemmanuel
Here are the changes to the code if you make those replacements:
Step 1b: Assign the third subnet to the LAB 124-C LAN.
Step 1c: Assign the first network host address (the lowest) in this subnet to the G0/0 interface on CS Department.
Step 1d: Starting with the fourth subnet, subnet the network again so that the new subnets will provide 14 host addresses per subnet while wasting the fewest addresses.
Step 1f: Assign the first address (the lowest) in the LAB 214-A LAN subnet to the G0/1 interface of the CS Department router.
The rest of the code would remain the same. Let me know if you
And first-class of all, a threat to hone your competencies. It’s adequate if you experience in over your head. We all did sooner or later, this subsequent step is about pushing thru that worry and on the point of address something as hard because the 200-301. In case you get caught, reach out. In case you see others caught, assist them.
How is this newsletter going to help you? Apart from providing you with a brief glimpse of the test’s topics and shape, we are able to additionally assist you discover efficient education substances. Cisco’s internet site is a extraordinary starting point, but you shouldn’t restriction your self to it. Despite the fact that you would possibly have by no means heard approximately them, you have to attempt exam dumps as they may grow to be your secret tool to get a passing rating in 2 hundred-301 assessment. But now, let’s start with the exam details.
Do not permit yourself face your ccna two hundred-301 exam without proper guidance to remorse later when you fail in cisco licensed community associate real exam because many people had been there. Let assist you to your cisco two hundred-301 ccna real examination preparation. To help you put together on your cisco certified network partner (ccna) 200-301 exam.
The document contains a practice quiz for the CCNA certification. It includes 35 multiple choice questions covering topics like:
- Network layer protocols like IP, TCP, UDP
- Ethernet standards and speeds
- Router and switch functions like MAC address tables, VLANs, trunking
- IP addressing schemes including public/private addressing, subnetting, CIDR notation
The quiz questions test knowledge of networking concepts, protocols, hardware functions and configurations, and IP addressing fundamentals.
This document provides answers to exam questions for the CCNA 1 curriculum. It includes answers for the final exam as well as answers for questions from chapters 1-11. For each chapter, it lists 2 multiple choice questions followed by short answers. The overall document serves as a study guide for the CCNA 1 certification exam.
Lab view the switch mac address table lab - view the switchADDY50
This document describes a lab to view network device MAC addresses. It provides a topology with two devices: a switch (S1) and PC (PC-A). The objectives are to configure the devices and verify connectivity, then display, describe, and analyze the Ethernet MAC addresses of the devices. The document provides instructions to configure the IP addresses of the devices, verify connectivity through ping tests, and use commands like ipconfig and show interfaces on the devices to view and analyze their MAC addresses, including identifying the organizationally unique identifier (OUI) and serial number portions of each address.
This document provides instructions for configuring OSPF routing between routers. Key steps include:
1. Configure IP addresses and interfaces on the routers.
2. Configure OSPF routing process on each router to advertise networks in area 0. This includes adding loopback interfaces for stability.
3. Test connectivity between routers and hosts by pinging interfaces. Troubleshoot any issues until connectivity is established across the network.
CCNA 4 Answers, CCNA 1 Version 4.0 Answers, CCNA 2 Version 4.0 Answers, CCNA 3 Version 4.0 Answers, CCNA 4 Version 4.0 Answers, CCNA 1 Final Version 4.0 Answers, CCNA 2 Final Version 4.0 Answers, CCNA 3 Final Version 4.0 Answers, CCNA 4 Final Version 4.0 Answers
The document contains 341 multiple choice questions from the CCNA Routing & Switching 200-120 exam. The questions cover topics such as NAT, routing protocols, VLANs, IPv6, routing, switching, and network security. Sample questions ask about types of NAT addresses, the danger of permit any entries in NAT access lists, and protocols like HSRP, OSPF, EIGRP, and VRRP. The document is broken into 6 pages with explanations for some answers.
The document provides answers to exam questions for CCNA 1 chapters 3 through 9. It includes questions from Cisco exams and brief multiple choice answers. The summaries focus on key topics covered in the chapters, including IP addressing, OSI model, Ethernet, cabling, routers, and TCP/IP protocols.
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxscuttsginette
IFSM 310 Software and Hardware Infrastructure Concepts
Computer and Number Systems
1.
(10 pt)
You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least four features that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.
2.
(2.5 pt each)
In order to receive credit for these problems, you must show all of the steps you took to arrive at your answers.
(c) Convert the following decimal number to binary:
21842
(d) Convert the following binary number to decimal:
11000111011.101
(c) Convert the following hexadecimal number to decimal:
CA97
(d) Convert the following binary number to hexadecimal:
1110011111011010100
CPU and Memory
3.
(10 pt)
ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomite sequence, what is the corresponding binary message being sent by the Sophomites?
(HINT: Decode the sequence reading from left to right then write the corresponding binary sequence, leaving a space between each binary sequence.)
4.
(10 pt)
Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.
Input / Output
5. Answer the follow questions about interrupts.
a.
(5 pt)
Describe in detail the steps that occur when a system receives an interrupt.
b.
(5 pt)
Describe how these steps differ in the case when a system receives multiple interrupts
Computer Systems
6. Answer the following questions about clusters.
a.
(5 pt)
Describe how you might use a cluster to provide fault-tolerant computing
b.
(5 pt)
Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.
Networks
7. Answer the following questions about communication protocols.
a.
(5 pt)
Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.
b.
(5 pt)
If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why
.
8. In the context of network security,
a.
(3 pt)
exp.
This document describes the steps to configure basic routing and switching between two routers and connected devices. Key steps include:
1. Configuring interfaces on two routers (R1 and R2) with IP addresses and establishing a connection between their serial interfaces.
2. Configuring static routes between the routers to establish connectivity initially.
3. Configuring a switch (Switch1) and connecting two hosts.
4. Verifying the initial configuration works before removing static routes and configuring the routing protocol RIP on both routers to dynamically exchange routing information.
Sca n skills assess eigrp - student trng - exam-1rafa1976
This document provides information for an exam on configuring a network using EIGRP routing. It includes a topology diagram and addressing table with IP information for routers, switches and PCs. The exam objectives are to initialize devices, configure basic settings on the routers and switches including passwords, interfaces and trunking, configure LAN redundancy and link aggregation, implement EIGRP routing, verify connectivity and HSRP, and display IOS version and license information.
1. Discuss the organization and the family role in every one of the.docxcroysierkathey
1. Discuss the organization and the family role in every one of the heritages mentioned about and how they affect (positively or negatively) the delivery of health care.
2. Identify sociocultural variables within the Irish, Italian and Puerto Rican heritage and mention some examples.
References must be no older than 5 years. A minimum of 700 words is required.
.
1. Compare and contrast DEmilios Capitalism and Gay Identity .docxcroysierkathey
1. Compare and contrast D'Emilio's
Capitalism and Gay Identity
with the
From Mary to Modern Woman
reading. What patterns do you see that are similar to the modern American society? What can be said about global notions of gender in the modern age? Feel free to invoke Foucault.
2. How is the writer's experience important in the story being told in
Middlesex
? Describe your reaction to the reading and invoke some of the concepts discussed in the
Queer Theory
reading to try to make sense of sexuality when it does not match your own conventions. Compare both readings, but go deeper to explore your own stereotypes and socialization.
**PLEASE READ THE READINGS IN ODER TO DO THIS ASSIGNMENT.
.
More Related Content
Similar to LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
The document provides instructions for a Packet Tracer skills exam to practice IP routing concepts. Students are asked to:
1) Connect various networking devices like routers, switches and PCs according to a topology diagram.
2) Design an IP addressing scheme to meet requirements of providing a certain number of host addresses for two subnets, and fill in an addressing table.
3) Configure the routers and switches with IP addresses, passwords, and descriptions according to the addressing table.
4) Verify connectivity within the network by pinging devices and their default gateways.
This document describes configuring a basic single-area OSPFv2 network. It includes the topology diagram and addressing tables, and steps to build the network, configure OSPF routing on each router with area 0, and verify OSPF neighbor relationships and routing tables. It also provides sample outputs of show commands to check OSPF settings and interfaces.
This document provides an overview of the content and assignments for ECET 340 Entire Course. It lists the weekly homework assignments, labs, and objectives for ECET 340 over 7 weeks. The document includes sample homework questions on topics like interrupts, timers, analog-to-digital conversion, and serial communication. It also provides examples of lab objectives and steps for labs covering these topics.
This document provides instructions for connecting a router to a workstation using HyperTerminal and establishing a console session. The steps include connecting a rollover cable from the router's console port to the workstation's COM1 port, launching HyperTerminal on the workstation, naming and configuring the HyperTerminal session, and connecting to view the router's response. Additional steps cover closing the session, reopening saved sessions, and shutting down connections.
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdfngombeemmanuel
Here are the changes to the code if you make those replacements:
Step 1b: Assign the third subnet to the LAB 124-C LAN.
Step 1c: Assign the first network host address (the lowest) in this subnet to the G0/0 interface on CS Department.
Step 1d: Starting with the fourth subnet, subnet the network again so that the new subnets will provide 14 host addresses per subnet while wasting the fewest addresses.
Step 1f: Assign the first address (the lowest) in the LAB 214-A LAN subnet to the G0/1 interface of the CS Department router.
The rest of the code would remain the same. Let me know if you
And first-class of all, a threat to hone your competencies. It’s adequate if you experience in over your head. We all did sooner or later, this subsequent step is about pushing thru that worry and on the point of address something as hard because the 200-301. In case you get caught, reach out. In case you see others caught, assist them.
How is this newsletter going to help you? Apart from providing you with a brief glimpse of the test’s topics and shape, we are able to additionally assist you discover efficient education substances. Cisco’s internet site is a extraordinary starting point, but you shouldn’t restriction your self to it. Despite the fact that you would possibly have by no means heard approximately them, you have to attempt exam dumps as they may grow to be your secret tool to get a passing rating in 2 hundred-301 assessment. But now, let’s start with the exam details.
Do not permit yourself face your ccna two hundred-301 exam without proper guidance to remorse later when you fail in cisco licensed community associate real exam because many people had been there. Let assist you to your cisco two hundred-301 ccna real examination preparation. To help you put together on your cisco certified network partner (ccna) 200-301 exam.
The document contains a practice quiz for the CCNA certification. It includes 35 multiple choice questions covering topics like:
- Network layer protocols like IP, TCP, UDP
- Ethernet standards and speeds
- Router and switch functions like MAC address tables, VLANs, trunking
- IP addressing schemes including public/private addressing, subnetting, CIDR notation
The quiz questions test knowledge of networking concepts, protocols, hardware functions and configurations, and IP addressing fundamentals.
This document provides answers to exam questions for the CCNA 1 curriculum. It includes answers for the final exam as well as answers for questions from chapters 1-11. For each chapter, it lists 2 multiple choice questions followed by short answers. The overall document serves as a study guide for the CCNA 1 certification exam.
Lab view the switch mac address table lab - view the switchADDY50
This document describes a lab to view network device MAC addresses. It provides a topology with two devices: a switch (S1) and PC (PC-A). The objectives are to configure the devices and verify connectivity, then display, describe, and analyze the Ethernet MAC addresses of the devices. The document provides instructions to configure the IP addresses of the devices, verify connectivity through ping tests, and use commands like ipconfig and show interfaces on the devices to view and analyze their MAC addresses, including identifying the organizationally unique identifier (OUI) and serial number portions of each address.
This document provides instructions for configuring OSPF routing between routers. Key steps include:
1. Configure IP addresses and interfaces on the routers.
2. Configure OSPF routing process on each router to advertise networks in area 0. This includes adding loopback interfaces for stability.
3. Test connectivity between routers and hosts by pinging interfaces. Troubleshoot any issues until connectivity is established across the network.
CCNA 4 Answers, CCNA 1 Version 4.0 Answers, CCNA 2 Version 4.0 Answers, CCNA 3 Version 4.0 Answers, CCNA 4 Version 4.0 Answers, CCNA 1 Final Version 4.0 Answers, CCNA 2 Final Version 4.0 Answers, CCNA 3 Final Version 4.0 Answers, CCNA 4 Final Version 4.0 Answers
The document contains 341 multiple choice questions from the CCNA Routing & Switching 200-120 exam. The questions cover topics such as NAT, routing protocols, VLANs, IPv6, routing, switching, and network security. Sample questions ask about types of NAT addresses, the danger of permit any entries in NAT access lists, and protocols like HSRP, OSPF, EIGRP, and VRRP. The document is broken into 6 pages with explanations for some answers.
The document provides answers to exam questions for CCNA 1 chapters 3 through 9. It includes questions from Cisco exams and brief multiple choice answers. The summaries focus on key topics covered in the chapters, including IP addressing, OSI model, Ethernet, cabling, routers, and TCP/IP protocols.
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxscuttsginette
IFSM 310 Software and Hardware Infrastructure Concepts
Computer and Number Systems
1.
(10 pt)
You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least four features that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.
2.
(2.5 pt each)
In order to receive credit for these problems, you must show all of the steps you took to arrive at your answers.
(c) Convert the following decimal number to binary:
21842
(d) Convert the following binary number to decimal:
11000111011.101
(c) Convert the following hexadecimal number to decimal:
CA97
(d) Convert the following binary number to hexadecimal:
1110011111011010100
CPU and Memory
3.
(10 pt)
ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomite sequence, what is the corresponding binary message being sent by the Sophomites?
(HINT: Decode the sequence reading from left to right then write the corresponding binary sequence, leaving a space between each binary sequence.)
4.
(10 pt)
Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.
Input / Output
5. Answer the follow questions about interrupts.
a.
(5 pt)
Describe in detail the steps that occur when a system receives an interrupt.
b.
(5 pt)
Describe how these steps differ in the case when a system receives multiple interrupts
Computer Systems
6. Answer the following questions about clusters.
a.
(5 pt)
Describe how you might use a cluster to provide fault-tolerant computing
b.
(5 pt)
Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.
Networks
7. Answer the following questions about communication protocols.
a.
(5 pt)
Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.
b.
(5 pt)
If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why
.
8. In the context of network security,
a.
(3 pt)
exp.
This document describes the steps to configure basic routing and switching between two routers and connected devices. Key steps include:
1. Configuring interfaces on two routers (R1 and R2) with IP addresses and establishing a connection between their serial interfaces.
2. Configuring static routes between the routers to establish connectivity initially.
3. Configuring a switch (Switch1) and connecting two hosts.
4. Verifying the initial configuration works before removing static routes and configuring the routing protocol RIP on both routers to dynamically exchange routing information.
Sca n skills assess eigrp - student trng - exam-1rafa1976
This document provides information for an exam on configuring a network using EIGRP routing. It includes a topology diagram and addressing table with IP information for routers, switches and PCs. The exam objectives are to initialize devices, configure basic settings on the routers and switches including passwords, interfaces and trunking, configure LAN redundancy and link aggregation, implement EIGRP routing, verify connectivity and HSRP, and display IOS version and license information.
Similar to LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx (20)
1. Discuss the organization and the family role in every one of the.docxcroysierkathey
1. Discuss the organization and the family role in every one of the heritages mentioned about and how they affect (positively or negatively) the delivery of health care.
2. Identify sociocultural variables within the Irish, Italian and Puerto Rican heritage and mention some examples.
References must be no older than 5 years. A minimum of 700 words is required.
.
1. Compare and contrast DEmilios Capitalism and Gay Identity .docxcroysierkathey
1. Compare and contrast D'Emilio's
Capitalism and Gay Identity
with the
From Mary to Modern Woman
reading. What patterns do you see that are similar to the modern American society? What can be said about global notions of gender in the modern age? Feel free to invoke Foucault.
2. How is the writer's experience important in the story being told in
Middlesex
? Describe your reaction to the reading and invoke some of the concepts discussed in the
Queer Theory
reading to try to make sense of sexuality when it does not match your own conventions. Compare both readings, but go deeper to explore your own stereotypes and socialization.
**PLEASE READ THE READINGS IN ODER TO DO THIS ASSIGNMENT.
.
1.Purpose the purpose of this essay is to spread awareness .docxcroysierkathey
1.
Purpose: the purpose of this essay is to spread awareness around stereotyping and how it can be very hurtful to some people.
2.
Audience: Anyone that uses stereotypical jokes or saying around people that are different than them even without realizing that they are making a stereotypical joke or statement.
3.
Genre: the genre that I will be trying to reach out to in this essay will be informational, reason being is that I mainly look at informational online documentaries and stories.
4.
Stance and tone: I’m just a young man who grew up around a lot of people from different places and have different cultures and never paid attention in my younger years to what was happening from stereotyping others that they are different till recently.
5.
Graphic design
: My essay will be a strict academic essay
.
1. Tell us why it is your favorite film.2. Talk about the .docxcroysierkathey
1. Tell us why it is your favorite film.
2. Talk about the interconnection between the aesthetic and the technical aspects of the film. This should include at least seven of the following: Editing, Film Structure, Cinematography, Lighting, Colors, Screenwriting, Special effects, Sound and Music.
3. After this course, will you see you favorite film in a different light? Why or why not?
.
1.What are the main issues facing Fargo and Town Manager Susan.docxcroysierkathey
1.What are the main issues facing Fargo and Town Manager Susan Harlow?
Fargo and Town Manager Harlow are on a slippery slope to corruption. I think that Harlow is handling her position the correct way by trying to remain neutral and sticking to a code of ethics so the problem really comes down to the political actors in the town. It is good that Harlow declined the invite to the dinner party, and cracked down on employees playing politics at work, that is a step in the right direction to removing the possibility of political corruption.
2.What is the basis for your answer to question #1?
At the end of the article Harlow remembers another city manager saying “you never have more authority than the day you walk into your office” What I get from that, and what I think Harlow got from that is that when you come into a position as a public manager everyone is going to want something from you. Political actors are going to want political favors, quid pro quos, you have something that everyone else wants and they are going to try and get that from you.
3.What are your recommended solutions to the problems you identified?
I think the best thing to do would be to continue to try to remain neutral. It will always be impossible to please absolutely everybody so the best thing to do is try to avoid doing everything everyone asks and stick to some sort of code of ethics.
4.What points do you agree, disagree or want further discussion from your fellow classmates and why? (tell them not me)
I think the overarching theme of this article is that people are going to want things from the government. I agree with Harlow's steps to avoid political corruption in her administration by cracking down on political favors with the snow plows and referring to the ICMA code of ethics.
.
1.Writing Practice in Reading a PhotographAttached Files.docxcroysierkathey
This document provides instructions for analyzing a photograph by Jonathan Bachman titled "Bachman, Ieshia Evans, Baton Rouge (2016)". Students are asked to select three rhetorical elements from a provided list and write three paragraphs analyzing how each element contributes to the overall meaning or message of the photograph. Additional context is provided about when and where the photo was taken, and that it was a finalist for a Pulitzer Prize. Students are then given similar instructions to analyze a political advertisement, and to watch and take notes on the documentary film "Advertising and the End of the World" by Sut Jhally. A folder of additional images is also provided for future analysis.
1.Some say that analytics in general dehumanize managerial activitie.docxcroysierkathey
1.Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view.
2.What are some of the major privacy concerns in employing intelligent systems on mobile data?
3. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.
4.Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork.
Note: Each question must be answered in 5 lines and refrences must be APA cited.
.
1.What is the psychological term for the symptoms James experiences .docxcroysierkathey
1.What is the psychological term for the symptoms James experiences after abstaining from consuming
alcohol? How do changes in the functioning of neurotransmitter systems produce these symptoms?
2.With reference to associative learning principles/models/theories, why does James consume alcohol
to alleviate these symptoms? What motivates his drinking behaviour given that he no longer enjoys this
activity (most of the time)?
3.How do these factors prevent James from quitting his drinking, and lead to a cycle of relapse when he
attempts to do so? Why are these processes important for our understanding of addiction and
substance use disorders.
1 Page
at least 3 sources
APA
.
1.Write at least 500 words discussing the benefits of using R with H.docxcroysierkathey
1.Write at least 500 words discussing the benefits of using R with Hadoop. Use APA format and Include at least 3 quotes from your sources enclosed in quotation marks.
2.Write at least 500 words discussing how insurance companies use text mining to reduce fraud. Use APA format and Include at least 3 quotes from your sources enclosed in quotation marks.
.
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docxcroysierkathey
1.What is Starbucks’ ROA for 2012, 2011, and 2010? Why might focusing specifically on ROA be misleading when assessing asset management (aka management efficiency)?
2.Why is ROE considered the most useful metric in measuring the overall ability of a business strategy to generate returns for shareholders?
3. How do the financial statements reveal company strategy (i.e., what story do the numbers tell and does that story align with the strategy of Starbucks?)?
.
1. Discuss the cultural development of the Japanese and the Jewis.docxcroysierkathey
This assignment requires discussing the cultural development of the Japanese and Jewish heritage in regards to their health care beliefs and how those beliefs influence evidence-based health care delivery. At least two references no older than five years must be used, and the paper must be a minimum of 600 words excluding the cover page and references.
1. Discuss at least 2 contextual factors(family, peers, school,.docxcroysierkathey
1.
Discuss at least 2 contextual factors(family, peers, school, community, work, etc.) that might make young people more or less likely to experience adolescence as a period of storm and stress.
2. How might the dramatic physical changes that adolescents undergo—and the accompanying reactions from others—influence other aspects of development, such as social or emotional development?
3. Describe some ways in which adolescent decision making is a product of interactions among puberty, brain development, cognitive growth, and contextual influences such as parents, peers, and community.
.
1.Write at least 500 words in APA format discussing how to use senti.docxcroysierkathey
1.Write at least 500 words in APA format discussing how to use sentiment analysis how political speech affects voters. Use at least 3 references in APA format.
2.Read the below article(link below) on statistics for categorical variables. Write at least 500 words in APA format discussing how to use these statistics to help understand big data.
Link: https://uc-r.github.io/descriptives_categorical
.
1.The following clause was added to the Food and Drug Actthe S.docxcroysierkathey
1.The following clause was added to the Food and Drug Act:
“the Secretary [of the Food and Drug Administration] shall not approve for use in food any chemical additive found to induce cancer in man, or, after tests, found to induce cancer in animals.”
After this clause was adopted, no new additives could be approved for use in food if they caused cancer in people or animals.
The public loved this and industry hated it.
What do you think of this clause? Do you support it or do you oppose it?
At the top of your post, please indicate SUPPORT or OPPOSE and then give your rationale. Then after you can view your classmates' posts, make your case to your fellow students.
2.There was a law that individuals who were indigent and who wished to litigate could apply to the courts for a total waiver of the normal filing fee. In the legislative session, however, a statute was enacted which limits the courts' authority to waive filing fees in lawsuits brought by prisoners against the state government.
Under this new law, a court has to require the prisoner to pay a filing fee "equal to 20 percent ... of the average monthly deposits made to the prisoner's [prison] account ... or the average balance in that account", whichever is greater (unless this calculation yields a figure larger than the normal filing fee).
A prisoner (who was indigent) wanted to appeal his case and was to be charged this fee. He filed suit claiming it was unconstitutional to charge this fee to prisoners.
Choose the side of the prisoner or the side of the state and tell why you would rule for the side you chose.
At the top of your post, please indicate SUPPORT PRISONER or OPPOSE PRISONER and then give your rationale. After you can view your classmates' posts, make your case to your fellow students.
3.A defendant pleaded guilty to receiving and possessing child pornography and was sentenced to 108 months in prison. The sentencing judge raised the defendant’s base offense level….by two levels because "a computer was used for the transmission" of the illegal material.
The appeal filed challenged the punishment enhancement (not his guilt of the base punishment.)
The defendant argued the law did not apply to him because he did not use a computer to transmit the material. (ie He was the receiver, not the sender, of the child pornography.)
Do you believe that the sentence enhancement should be upheld? Give an economic analysis and rational for your choice.
At the top of your post, please indicate SENTENCE UPHELD or SENTENCE REVERSED and then give your economic analysis/rationale. After you can view your classmates' posts, make your case to your fellow students.
4.The ordinance was enacted that gives tenants more legal rights including:
the payment of interest on security deposits;
requires that those deposits be held in Illinois banks;
allows (with some limitations) a tenant to withhold rent in an amount reflecting the cost to him of the landlord's v.
1.What are social determinants of health Explain how social determ.docxcroysierkathey
1.What are social determinants of health? Explain how social determinants of health contribute to the development of disease. Describe the fundamental idea that the communicable disease chain model is designed to represent. Give an example of the steps a nurse can take to break the link within the communicable disease chain.
Resources within your text covering international/global health, and the websites in the topic materials, will assist you in answering this discussion question.
2. Select a global health issue affecting the international health community. Briefly describe the global health issue and its impact on the larger public health care systems (i.e., continents, regions, countries, states, and health departments). Discuss how health care delivery systems work collaboratively to address global health concerns and some of the stakeholders that work on these issues.
Resources within your text covering international/global health, and the websites in the topic materials, will assist you in answering this discussion question.
.
1.This week, we’ve been introduced to the humanities and have ta.docxcroysierkathey
1.
This week, we’ve been introduced to the humanities and have taken some time to consider the role of the humanities in establishing socio-cultural values, including how the humanities differ from the sciences in terms of offering unique lenses on the world and our reality. Since one of the greatest rewards of being a human is engaging with different forms of art, we’ve taken some time this week to learn about what it means to identify and respond to a work of art. We’ve learned about the difference between abstract ideas and concrete images and concepts like structure and artistic form. To help you deepen your understanding of these foundational ideas, your Unit 1 assignment will consist of writing an essay addressing using the following criteria:
Essay Requirements:
• 1,000 words or roughly four double-spaced pages.
• Make use of at least three scholarly sources to support and develop your ideas. Our course text may serve as one of these three sources.
• Your essay should demonstrate a thorough understanding of the READ and ATTEND sections.
• Be sure to cite your sources using proper APA format (7th edition).
Essay Prompt:
• In this essay, you will consider the meaning of art and artistic form by responding to these questions:
o To what extent does Kevin Carter’s Pulitzer Prize-winning photograph (figure 2-5) have artistic form?
o Using what you’ve learned in Chapters 1, 2 and 14 explain if you consider Carter’s photograph a work of art? Be sure to point to specific qualities of the photograph to support/develop your response.
o How do you measure the intensity of your experience in response to Carter’s photograph? What does it make you see/feel/imagine and how does your response/reaction support Carter’s image as a work of art?
.
1.What are barriers to listening2.Communicators identif.docxcroysierkathey
1.
What are barriers to listening?
2.
Communicators identified the following as major listening poor habits. Search what each poor habit means and try to set an example using your own experience.
Poor listening habit:
Pseudo-listening, Stage hogging, Filling in gaps, Selective listening, Ambushing (
Definition & Example)
.
1.Timeline description and details There are multiple way.docxcroysierkathey
1.
Timeline description and details
: There are multiple ways to construct a timeline. Find one that fits you and your information.
Include 10-15 events, each including the following descriptors:
- titles of books or writings or some sort of identifier
- your age or some time reference
- and whether it was a positive or negative experience
.
1.The PresidentArticle II of the Constitution establishe.docxcroysierkathey
1.
The President
Article II of the Constitution established the institution of the presidency. Select any TWO Presidents prior to 1933 and any TWO Presidents since 1933 and for EACH one:
a.
Discuss
any
expressed
power used by each president and the
impact
that decision had on American society at the time of its use
b.
Explain
whether you
agree/disagree
with the presidential action taken and
WHY
c.
Describe
one
legislative initiative
promoted by each president and the
impact
on America at the
time of its passage
as well as what the impact of that legislation is
TODAY
d.
Discuss
one
executive order
issued by each president and whether you
agree/disagree
with the order and
WHY
1.
Select any FOUR United States Supreme court decisions related to Civil Rights/Civil Liberties and for
each one
:
a.
Describe
the facts of the case
b.
Discuss
the arguments of each side as it pertains to the
Constitutional issue
being addressed
c.
Explain
the decision citing
Constitutional rationale
of the court including any dissenting opinion if not a unanimous verdict
d.
Explain
whether you
agree/disagree
with the court’s decision and
WHY
.
1.What other potential root causes might influence patient fal.docxcroysierkathey
1.
What other potential root causes might influence patient falls?
2.
Equipped with the data, what would you do about the hypotheses that proved to be unsupported?
3.
Based on the correctly identified hypothesis in the case scenario, what would be your course of action if you were the CEO/president of St. Xavier Memorial Hospital?
4.
What do you think of the CNO’s (Sara Mullins) position of “waiting and seeing what the data tells us” instead of immediately jumping to conclusions?
.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
1. LAB3/Lab 3 Answer Sheet(1).docx
Liberty University
CSIS331
Lab 3 Answer Sheet
Submit this completed document with your completed and saved
packet tracer in the link provided in Blackboard.
Part 1: Questions.
Step 1:
a. Which command displays the statistics for all interfaces
configured on a router?
b. Which command displays the information about the Serial
0/0/0 interface only?
c. 1) What is the IP address configured on R1?
c. 2) What is the bandwidth on the Serial 0/0/0 interface?
d. 1) What is the IP address on R1?
d. 2) What is the MAC address of the GigabitEthernet 0/0
interface?
d. 3) What is the bandwidth on the GigabitEthernet 0/0
interface?
Step 2. Questions.
a. Which command displays a brief summary of the current
interfaces, statuses, and IP addresses assigned to them?
b. 1) How many serial interfaces are there on R1 and R2?
b. 2) How many Ethernet interfaces are there on R1 and R2?
2. b. 3) Are all the Ethernet interfaces on R1 the same? If no,
explain the difference(s).
Step 3: Display the routing table on R1.
a. What command displays the content of the routing table?
b. 1) How many connected routes are there (uses the C code)?
b. 2) Which route is listed?
b. 3) How does a router handle a packet destined for a network
that is not listed in the routing table?
Part 2 Step 3
a. What command did you use?
Part 3 Step 1
a. 1) How many interfaces on R1 and R2 are configured with IP
addresses and in the “up” and “up” state?
a. 2) What part of the interface configuration is NOT displayed
in the command output?
a. 3) What commands can you use to verify this part of the
configuration?
b. 1) How many connected routes (uses the C code) do you see
on each router?
b. 2) How many EIGRP routes (uses the D code) do you see on
each router?
b. 3) If the router knows all the routes in the network, then the
number of connected routes and dynamically learned routes
(EIGRP) should equal the total number of LANs and WANs.
3. How many LANs and WANs are in the topology?
b. 4) Does this number match the number of C and D routes
shown in the routing table?
Ping Table:
Ping From Device IP
Ping to Device IP
Results
PC1
PC4
R2
PC2
__MACOSX/LAB3/._Lab 3 Answer Sheet(1).docx
LAB3/Lab 3.pka
__MACOSX/LAB3/._Lab 3.pka
LAB3/Lab 3 Instructions(1).docx
Liberty University CSIS331
Liberty University
CSIS 331
Lab 3 Instructions
Packet Tracer:
[Adapted from Cisco Networking Academy Intro to Networking
6.4.3.3]
Overview
4. In this activity, you will use various show commands to display
the current state of the router. You will then use the Addressing
Table to configure router Ethernet interfaces. Finally, you will
use commands to verify and test your configurations.
Note: The routers in this activity are partially configured. Some
of the configurations are not covered in this course, but are
provided to assist you in using verification commands.
Part 1: Display Router Information
Step 1: Display interface information on R1.
Note: Click a device and then click the CLI tab to access the
command line directly. The console password is cisco. The
privileged EXEC password is class.
Answer questions Part1 Step 1. a. and b. in your Lab 3 Answer
Sheet
c. Enter the command to display the statistics for the Serial
0/0/0 interface on R1 and answer questions c1) c2) in your Lab
3 Answer Sheet.
d. Enter the command to display the statistics for the
GigabitEthernet 0/0 interface and answer questions d1) d2) d3).
Step 2: Display a summary list of the interfaces on R1.
Answer questions Step 2 a. in your Lab 3 Answer Sheet.
b. Enter the command on each router and answer questions Part
2 b. 1), b. 2), b. 3).
Step 3: Display the routing table on R1.
Answer the question Step 3 a. in your Lab 3 Answer Sheet.
b. Enter the command on R1 and answer questions Step 3 b. 1),
b. 2), b. 3) in your Lab 3 Answer Sheet.
Part 2: Configure Router Interfaces
Step 1: Configure the GigabitEthernet 0/0 interface on R1.
a. Enter the following commands in bold to address and activate
the GigabitEthernet 0/0 interface on R1:
R1(config)# interface gigabitethernet 0/0
R1(config-if)# ip address 192.168.10.1 255.255.255.0
R1(config-if)# no shutdown
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed
state to up
5. %LINEPROTO-5-UPDOWN: Line protocol on Interface
GigabitEthernet0/0, changed state to up
b. It is good practice to configure a description for each
interface to help document the network information. Configure
an interface description indicating to which device it is
connected.
R1(config-if)# description LAN connection to S1
c. R1 should now be able to ping PC1.
R1(config-if)# end
%SYS-5-CONFIG_I: Configured from console by console
R1# ping 192.168.10.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.10.10, timeout is 2
seconds: .!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 0/2/8
ms
Step 2: Configure the remaining Gigabit Ethernet Interfaces on
R1 and R2.
a. Use the information in the Addressing Table to finish the
interface configurations for R1 and R2. For each interface, do
the following:
1) Enter the IP address and activate the interface.
2) Configure an appropriate description.
b. Verify interface configurations.
Step 3: Back up the configurations to NVRAM.
Save the configuration files on both routers to NVRAM. Answer
question Part 2 Step 3 a. in your Lab 3 Answer Sheet.
Part 3: Verify the Configuration
Step 1: Use verification commands to check your interface
configurations.
a. Use the show ip interface brief command on both R1 and R2
to quickly verify that the interfaces are configured with the
correct IP address and active. Answer questions Part 3 Step 1 a.
1), a. 2), a. 3) in your Lab 3 Answer Sheet.
b. Use the show ip route command on both R1 and R2 to view
the current routing tables . Answer questions Part 3 Step 1 b. 1),
6. b. 2), b. 3), b. 4) in your Lab 3 Answer Sheet.
Note: If your answer is “no”, then you are missing a required
configuration. Review the steps in Part 2.
Step 2: Test end-to-end connectivity across the network.
You should now be able to ping from any PC to any other PC on
the network. In addition, you should be able to ping the active
interfaces on the routers. For example, the following should
tests should be successful:
Complete the Ping Output in your Lab 3 Answer Sheet.
Note: For simplicity in this activity, the switches are not
configured; you will not be able to ping them.
Page 3 of 3
__MACOSX/LAB3/._Lab 3 Instructions(1).docx
LAB2/Lab 2 Answer Sheet(1).docx
Liberty University
CSIS 331
Lab 2 Answer Sheet
Complete the table.
Device
Interface
IP Address
Subnet Mask
VLAN1
VLAN1
NIC
7. NIC
Fill in the blanks/Answer Questions (Please use different font
color to show answers):
1. Switch 1 Name:
2. Switch 2 Name:
3. PC 1 Name:
4. PC 2 Name:
5. Console Line Password:
6. Secret Password:
7. What command encrypts all text passwords?
8. What word needed to be in the message-of-the-day (MOTD)
Banner?
9. What command did you use to save the running-
configuration?
10. Why do you think it is important to document Address
Tables and verify connectivity?
Ping Output:
Ping From Device IP
Ping to Device IP
Results
PC1
PC2
PC2
PC1
__MACOSX/LAB2/._Lab 2 Answer Sheet(1).docx
8. LAB2/Lab 2 PT.pka
__MACOSX/LAB2/._Lab 2 PT.pka
LAB2/Lab 2 Instructions(3).docx
Liberty University CSIS331
Liberty University
CSIS 331
Lab 2 Instructions
(Names of devices may vary)
Packet Tracer - Skills Integration Challenge
Addressing Table (Address Table will vary)
Device
Interface
IP Address
Subnet Mask
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
Objectives
Configure hostnames and IP addresses on two Cisco
9. Internetwork Operating System (IOS) switches using the
command-line interface (CLI).
Use Cisco IOS commands to specify or limit access to
the device configurations.
Use IOS commands to save the running configuration.
Configure two host devices with IP addresses.
Verify connectivity between the two PC end devices.
Scenario
As a recently hired LAN technician, your network manager has
asked you to demonstrate your ability to configure a small LAN.
Your tasks include configuring initial settings on two switches
using the Cisco IOS and configuring IP address parameters on
host devices to provide end-to-end connectivity. You are to use
two switches and two hosts/PCs on a cabled and powered
network.
Requirements (Switch information may vary)
Use a console connection to access each switch.
Name _________ and ________ switches.
Use the ________ password for all lines.
Use the ________ secret password.
Encrypt all clear text passwords.
Include the word warning in the message-of-the-day
(MOTD) Banner.
Configure addressing for all devices according to the
Addressing Table.
Save your configurations.
Verify connectivity between all devices.
Note: Click Check Results to see your progress. Click Reset
Activity to generate a new set of requirements. If you click on
this before you complete the activity, all configurations will be
lost.
Page 2 of 2
__MACOSX/LAB2/._Lab 2 Instructions(3).docx
10. LAB1/Lab 1 PT-5.pka
__MACOSX/LAB1/._Lab 1 PT-5.pka
LAB1/Lab 1 Instructions-1.docx
BMIS 330
Liberty University BMIS 331
Liberty University
CSIS 331
Lab 1 Instructions
Packet Tracer: Initial Configurations
[Adapted from Cisco Networking Academy Network
Fundamentals and Intro to Networking]
Overview:
Packet Tracer (PT) is a network simulator that allows you to
create a simulated network, configure the devices in the
network, test the network, and examine the traffic in the
network. The first step in creating a simulated network in
Packet Tracer is to place the devices in the Logical Workplace
and connect them together.
When Packet Tracer starts, it presents a logical view of the
network in Realtime mode. The main part of the Packet Tracer
interface is the Logical Workspace. This is the large blank area
where devices can be placed and connected.
The lower left portion of the PT interface, below the yellow bar,
is the portion of the interface that you use to select and place
devices into the Logical Workplace. The first box in the lower
left contains symbols that represent groups of devices. As you
move the mouse pointer over these symbols, the name of the
group appears in the text box in the center. When you click on
one of these symbols, the specific devices in the group appear
in the box to the right. As you point to the specific devices, a
description of the device appears in the text box below the
specific devices.
11. Adding a Device or Connection:
To add a device to the Logical Workplace, click on the specific
device symbol in the center toolbox, point to where you want to
place the device in the Logical Workplace (the pointer becomes
a crosshair), and click. You can also drag and drop devices and
connections from this toolbox into the Logical Workplace.
Deleting a Device:
To delete a device from the Logical Workplace, select the
device by left-clicking on it. Then, click the “X” button on the
toolbox that appears on the right-hand side of the screen.
Note: When you click on the device to initially select it, a
dialog box like the one below may appear.
Close this dialog box and proceed to click the “X” (Delete)
button on the toolbox. The pointer becomes an “X”, and you are
prompted to delete the selected device. Click “Yes.”
After you click the “X” (Delete) button on the toolbox, you
remain in Delete mode. That is, while in this mode, every
subsequent device you click will be deleted. It is therefore
important that after you perform a deletion, you click the Select
button on the toolbox. This action takes you out of Delete mode.
Pressing the [Esc] key also takes you out of Delete mode.
Configuring Initial Switch Settings
Background
In this activity, you will perform basic switch configurations.
You will secure access to the command-line interface (CLI) and
12. console ports using encrypted and plain text passwords. You
will also learn how to configure messages for users logging into
the switch. These banners are also used to warn unauthorized
users that access is prohibited.
Part 1: Verify the Default Switch Configuration
Step 1: Enter privileged EXEC mode.
You can access all switch commands from privileged EXEC
mode. However, because many of the privileged commands
configure operating parameters, privileged access should be
password-protected to prevent unauthorized use. The privileged
EXEC command set includes those commands contained in user
EXEC mode, as well as the configure command through which
access to the remaining command modes are gained.
a. Double Click the Packet Tracer file to open the Lab. You will
two windows. The second window is the activity listed below.
Do not answer the questions. Follow the activity to complete the
configurations. Click S1 and then the CLI tab. Press Enter.
b. Enter privileged EXEC mode by entering the enable
command:
Switch> enable
Switch#
Notice that the prompt changed in the configuration to reflect
privileged EXEC mode.
Step 2: Examine the current switch configuration.
a. Enter the show running-config command.
Switch# show running-config
Part 2: Create a Basic Switch Configuration
Step 1: Assign a name to a switch.
To configure parameters on a switch, you may be required to
move between various configuration modes. Notice how the
prompt changes as you navigate through the switch. Type all
commands in bold pressing Enter when complete.
Switch# configure terminal
Switch(config)# hostnameS1
13. S1(config)# exit
S1#
Step 2: Secure access to the console line. To secure access to
the console line, access config-line mode and set the console
password to letmein. Type all commands in bold pressing Enter
when complete.
S1# configure terminal
S1(config)# line console 0
S1(config-line)# password letmein
S1(config-line)# login
S1(config-line)# exit
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Step 3: Verify that console access is secured.
Exit privileged mode to verify that the console port password is
in effect.
S1# exit
Switch con0 is now available
Press RETURN to get started.
User Access Verification Packet
Password:
S1>
Note: If the switch did not prompt you for a password, then you
did not configure the login parameter in Step 2.
Step 4: Secure privileged mode access.
Set the enable password to c1$c0. This password protects access
to privileged mode. Type all commands in bold and then press
enter.
Note: The 0 in c1$c0 is a zero, not a capital O. This password
will not grade as correct until after you encrypt it in Step 8.
S1> enable
S1# configure terminal
S1(config)# enable password c1$c0
S1(config)# exit
14. %SYS-5-CONFIG_I: Configured from console by console
S1#
Step 5: Verify that privileged mode access is secure.
a. Enter the exit command again to log out of the switch.
b. Press Enter key and you will now be asked for a password:
User Access Verification
Password:
c. The first password is the console password you configured
for line con 0. Enter this password to return to user EXEC
mode.
d. Enter the command to access privileged mode.
e. Enter the second password you configured to protect
privileged EXEC mode.
f. Verify your configurations by examining the contents of the
running-configuration file by typing the command in bold below
and pressing Enter key:
S1# show running-config
Notice how the console and enable passwords are both in plain
text. This could pose a security risk if someone is looking over
your shoulder.
Step6: Configure an encrypted password to secure access to
privileged mode.
The enable password should be replaced with the newer
encrypted secret password using the enable secret command. Set
the enable secret password to itsasecret. Type all commands in
bold and then press enter.
S1# config t
S1(config)# enable secret itsasecret
S1(config)# exit
S1#
Note: The enable secret password overrides the enable
password. If both are configured on the switch, you must enter
the enable secret password to enter privileged EXEC mode.
Step 7: Verify that the enable secret password is added to the
configuration file.
a. Verify the new enable secret password is configured by
15. examining the contents of the running-configuration file by
typing the command in bold below and pressing Enter key:
S1# show running-config
Note: You can abbreviate show running-config as S1# show run
Step 8: Encrypt the enable and console passwords.
As you noticed in Step 7, the enable secret password was
encrypted, but the enable and console passwords were still in
plain text. We will now encrypt these plain text passwords using
the service password-encryption command. Type all commands
in bold below and pressing Enter key.
S1# config t
S1(config)# service password-encryption
S1(config)# exit
Part 3: Configure a MOTD Banner
Step 1: Configure a message of the day (MOTD) banner.
The Cisco IOS command set includes a feature that allows you
to configure messages that anyone logging onto the switch sees.
These messages are called message of the day, or MOTD
banners. Enclose the banner text in quotations or use a delimiter
different from any character appearing in the MOTD string.
S1# config t
S1(config)# banner motd "This is a secure system. Authorized
Access Only!"
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Part 4: Save Configuration Files to NVRAM
Step 1: Verify that the configuration is accurate using the show
run command.
Step 2: Save the configuration file.
You have completed the basic configuration of the switch. Now
back up the running configuration file to NVRAM to ensure that
the changes made are not lost if the system is rebooted or loses
power.
S1# copy running-config startup-config
Destination filename [startup-config]?[Enter]
16. Building configuration... [OK]
Step 3: Examine the startup configuration file from Part 4 Step
2. Copy and paste it into your Lab 1 Answer Sheet
Part 5: Configure S2
You have completed the configuration on S1. You will now
configure S2. If you cannot remember the commands, refer to
Parts 1 to 4 for assistance.
Configure S2 with the following parameters:
a. Name device: S2
b. Protect access to the console using the letmein password.
c. Configure an enable password of c1$c0 and an enable secret
password of itsasecret.
d. Configure a message to those logging into the switch with the
following message: Authorized access only. Unauthorized
access is prohibited and violators will be prosecuted to the full
extent of the law.
e. Encrypt all plain text passwords.
f. Ensure that the configuration is correct.
g. Save the configuration file to avoid loss if the switch is
powered down.
Afterward you have completed the configurations click on the
Check Results Button in the second window. . Then click the
Assessment Items Tab and ensure you have all GREEN CHECK
MARKS
Part 6: Save your Packet Tracer configuration.
On the File menu, select Save. You will be prompted to save
your configuration as a Packet Tracer Network file (*.pkt). The
naming convention used in this class will be:
[your first initial + your last name] + “_Lab” (do not include the
quotation marks) + the number of the lab]
For example, Joe Smith will save his file for Lab 1 using the
filename “JSmith_Lab1”. Packet Tracer will automatically
append the .pkt file extension to the file name if “Packet Tracer
17. Network File” is selected from the “Save as type” dropdown
list.
Note that when you exit Packet Tracer, you will likely be
prompted to save your changes again (even if you have made no
additional changes). Click “Yes” to save changes again, and
Packet Tracer will close.
To re-open an existing Packet Tracer file that you have created,
you can double-click the file name in Windows Explorer. This
will automatically launch Packet Tracer, and your PKT file will
be opened. Alternately, you can launch Packet Tracer, select
File | Open…, and navigate to the Packet Tracer File you want
to open.
Deliverables:
Submit your assignment by attaching your PKT file and Lab
Answer Sheet to the appropriate assignment link in Blackboard.
Page 1 of 14
__MACOSX/LAB1/._Lab 1 Instructions-1.docx
LAB1/Lab 1 Answer Sheet(1)-1.docx
Liberty University
CSIS 331
Lab 1 Answer Sheet
On Switch S1 type and press Enter.
S1# copy running-config startup-config
S1# show running-config
Copy and paste Switch S1 Config Here.
On Switch S2 type and press Enter.
S2# copy running-config startup-config