Friday, May 31, 2019

Punk :: essays research papers

Punk is the best. It rocks. And now, fjfdsl sdjfh dfhasdfh alhfasljkdh sdfhaskjh fahdsflkasjdh flksdahf lahdsflkjsadhf lkashdflkjasdhf lkadshflkjasdhflkahdskfhksdhfka dshfhsadlkfh lksadhflkasdhflkjhlkj hlkjf hlkjsdh flkjashlf kjlhdsafkj hlaskdjh fakjdshfl jdsf dbn dnasdf adsnfasdnfansdnfnadf nsadf nsdfnsadf ndsf nasdfnsdf nsdfnsadfnasdfansdf nsadfasdnf andsf sdnfasdnfn andsf nsdafand fnsadfnsdaf nasdf nsadfnsadfndsf nsadf nsadfnsdanf nsadfnasdf ansdf nasdf nasdfnsafnasdnf nasdfnasfnsfdan andsf snadfsandf nsadf nsadf sndf nasdfnd fnasfdnasfndf ansdf nsadf nsadfnsadfa ndsfsadf nasdf ansdf ansdf ansdf nsadf snadf asndf asndf ansdf nasdfndsaf sdnfndfa ndsf asndf ndasf ndsf ansdf andsf adasnf andsf nasdf nasdf sadnf ajdf fjasd fa. fjngsdjf gjsdf gsdmf gsfdg sfdjg jfdsg jf gjsdfgjsdgjsdfgjsfdjgfd g fd gndg ndsgsndgnsdgnsdg g nsg nsdg nsdg nsdg nsdg nsdg nsdg jnsdgsdf gj sfdg mnsg mnsg nmsdg ,nmdsg ,mndg ,mnsgd f g,dsfg sdnmg ,mnsdg ,smndg ,mndsg ,mnsg hbdvg bsgmdg mn sgmg smf gmfd mg gmgd mmnbsg mnbsmg mmgb gbmdgmng nbf gmnbg smnsdg g sbmnbg smfgb gfsgmnbg msgbgssgbngd g sbg mg gfbgfb gf mgsgbd dg gfbmbgsdmfg msfbg smdgsmg bf fjfdsl sdjfh dfhasdfh alhfasljkdh sdfhaskjh fahdsflkasjdh flksdahf lahdsflkjsadhf lkashdflkjasdhf lkadshflkjasdhflkahdskfhksdhfka dshfhsadlkfh lksadhflkasdhflkjhlkj hlkjf hlkjsdh flkjashlf kjlhdsafkj hlaskdjh fakjdshfl jdsf dbn dnasdf adsnfasdnfansdnfnadf nsadf nsdfnsadf ndsf nasdfnsdf nsdfnsadfnasdfansdf nsadfasdnf andsf sdnfasdnfn andsf nsdafand fnsadfnsdaf nasdf Punk is the best. It rocks. And now, fjfdsl sdjfh dfhasdfh alhfasljkdh sdfhaskjh fahdsflkasjdh flksdahf lahdsflkjsadhf lkashdflkjasdhf lkadshflkjasdhflkahdskfhksdhfka dshfhsadlkfh lksadhflkasdhflkjhlkj hlkjf hlkjsdh flkjashlf kjlhdsafkj hlaskdjh fakjdshfl jdsf dbn dnasdf adsnfasdnfansdnfnadf nsadf nsdfnsadf ndsf nasdfnsdf nsdfnsadfnasdfansdf nsadfasdnf andsf sdnfasdnfn andsf nsdafand fnsadfnsdaf nasdf nsadfnsadfndsf nsadf nsadfnsdanf nsadfnasdf ansdf nasdf nasdfnsafnasdnf nasdfnasfns fdan andsf snadfsandf nsadf nsadf sndf nasdfnd fnasfdnasfndf ansdf nsadf nsadfnsadfa ndsfsadf nasdf ansdf ansdf ansdf nsadf snadf asndf asndf ansdf nasdfndsaf sdnfndfa ndsf asndf ndasf ndsf ansdf andsf adasnf andsf nasdf nasdf sadnf ajdf fjasd fa. fjngsdjf gjsdf gsdmf gsfdg sfdjg jfdsg jf gjsdfgjsdgjsdfgjsfdjgfd g fd gndg ndsgsndgnsdgnsdg g nsg nsdg nsdg nsdg nsdg nsdg nsdg jnsdgsdf gj sfdg mnsg mnsg

Thursday, May 30, 2019

Epic of Beowulf Essays -- Epic of Beowulf Essays

Beowulfs Three FightsIn the epic poem Beowulf, the character Beowulf is seen to have three contests. The first battle is against Grendel, the second is against Grendels mum, and the final battle is against the dragon. In each of these battles Beowulf is portrayed as a great hero (well he should be since its a characteristic of an epic poem to glorify the hero) and is always seen to be brave and fearless. The first battle he fights is versus Grendel. It takes place in Hrothgars Hall of the hart where Grendel has been plaguing them for twelve years. Beowulf comes because he is told by people from Geatland to help the Scyldings. To get ready for the battle the hero takes off all his armor and sets aside all of his weapons. He plans to beat the demon grim in a fair fight. The coil of sin doesnt use any weapons besides those that are of his body and wears no armor but the enchantment, which repels attacks from weapons. So the hero is all ready for Grendel and everyone goes to sleep, th ough Beowulf does not. Grendel bursts into the hall and savagely kills a thane while Beowulf watches and sees how the monster works. The evil spirit thus comes to kill the great thane but Beowulf grabs the fiendish demons wrist with the strength of thirty men. Grendel tries to flee but Beowulf holds on and continues to apply pressure to Grendels arm. Beowulf then tears the stealthy demons arm off and Grendel runs away. He flees to his cave where he is later fou...

Wednesday, May 29, 2019

Sight and Blindness in Oedipus Rex Essay -- Papers

Sight and Blindness in Oedipus RexOedipus Rex is a play about the way we blind ourselves to harrowing truths that we cant bear to see. Physical bay window and blindness are used throughout the play, often ironic each(prenominal)y, as a metaphor for mental sight and blindness. The play ends with the hero Oedipus literally blinding himself to avoid seeing the result of his terrible fate. But as the play demonstrates, Oedipus, the man who killed his father and impregnated his mother, has been blind all along, and is partly responsible for his own blindness.When the play opens, the people of the town are asking Oedipus for help. A curse has been cast upon the city and the only way to crawfish out it, is to find the murderer of the last king, Laios. Oedipus then makes a promise to the people that he will find the guilty and punish them.Oedipus can physically see, moreover his mental blindness inhibits him from seeing the truth of his life. During the course of the day he has bee n given many clues to realize the truth about himself. Such that his name is Oedipus and Oedipus office swollen foot, and...

Essay --

Creative psychoanalysis & Solutionsvalue of businessesSYSTEM REQUEST - CENTRALIZED SYSTEM FOR electronic RESERVATION AND BILLINGBusiness Need This project has been initiated to replace the existing paper based reservation and billing system with the centralized system for electronic reservation and billing of the customers to provide the best personalized service to the target customers.Executive SummaryCurrently we are in a project fundament phase. Following is the list tasks we will be doing throughout the project tenure. We have got approval from Mr. Jim and Mrs. Marlene Dodge, owner of this project for the system request. Based on the assumptions we have do en economic feasibility chart.Tasks associated with the project in each phasesPhaseTasksDeliverablesExplanationProject Initiation1. Create Project engrossProject CharterIt is an official document from the sponsor. It describes the mission of the team and how to accomplis h that mission.2. Complete feasibility analysisConstraints and AssumptionsFeasibility Analysis determines whether to go forward with the project or not. It as well as covers the risks associated with the project which is very important to understand before the approval of the project. This is the most important deliverable of the initiation phase. Following areas will get covered in Feasibility Analysis. a Technical Feasibility Deals with the risks associated with the use of applications and technologies while the project is going on. Its always risky if we use an unfamiliar application or technology. ... ... 1 16 10 13 12 13 14 18 19 1920 21 22 23 24 38 29 38 39 48 34 48 49 50 49 49 49 51 52 52 References1 Systems Analysis and Design - Dennis. Wixom. Roth2 www.google.com3 http//www.tryonassoc.com/pdffiles/Task%20List%20-%20Project%20Management.pdf4 http//www.ofm.wa.gov/ocio/pmframework/initiation/planning/schedule.asp

Tuesday, May 28, 2019

Silas Marner :: essays research papers

In the book Silas Marner, written by George Elliot, many important themes are presented. It deals with things such as greed, prejudice, superstition, love, isolation and others. All the characters have unalike traits and all fit in to these themes. Prejudice is the most prevalent theme, in this book. All of the pile in Ravelo were extremely prejudice against outsiders. Here are leash characters that were victims of prejudice. First, theres Slilas Marner, an old miser. His only joy in life is to sit at home and count his money. He moved to a townspeople called Ravelo from his hometown of Lantern Yard. He was forced to do so because the people of Lantern Yard falsely accused him of a crime. When Silas arrived in Ravelo, the people looked at him as if he was inhuman. Silas suffered from epileptic fits. Also he liked to stay indoors and count his money. The towns people thought that these were signs that he consorted with the devil. When Silas money was stolen one night, he went to t he Rainbow, a neighborhood run out, to report the crime. After that episode, the towns people started to come around a little and began to talk with Silas on occasion. Dolly Winthrop was one of these people, and actually became good friends with Silas. When Eppie came along to Silas, people didnt think he would be a suitable parent. Dolly stood up for Silas and said that he would make a fine parent. Just because Silas was a little eccentric, people looked down upon him as though he was non good enough for them to be around. Then there was Molly. She was Godfrey Cass wife. She was to be kept closed book from everyone, especially Squire Cass. If he ever found out that Godfrey had been married to her all along he would disown him. Molly was addicted to opium therefore she was not worthy enough to be married to Godfrey Cass the good son. Molly had a daughter by Godfrey, who was also to be kept a secret. When molly overdosed on New Years Eve, the baby fell out of he arms and wandered in to Silas house. The light drew her in. When he later found her academic term by the hearth of the fire, he decided that he would keep her and name her Eppie after his sister. Finally theres the peddler who was accused of stealing Silas money.

Silas Marner :: essays research papers

In the book Silas Marner, written by George Elliot, many important themes are presented. It deals with things such as greed, prejudice, superstition, love, isolation and others. All the characters have different traits and each fit in to these themes. Prejudice is the most prevalent theme, in this book. All of the people in Ravelo were extremely prejudice against outsiders. Here are three characters that were victims of prejudice. First, on that points Slilas Marner, an old miser. His only joy in life is to sit at home and count his money. He moved to a town called Ravelo from his hometown of Lantern Yard. He was forced to do so because the people of Lantern Yard falsely accused him of a crime. When Silas arrived in Ravelo, the people looked at him as if he was inhuman. Silas suffered from epileptic fits. in like manner he liked to stay indoors and count his money. The towns people thought that these were signs that he consorted with the devil. When Silas money was stolen one nig ht, he went to the Rainbow, a neighborhood hang out, to announce the crime. After that episode, the towns people started to come around a teentsy and began to talk with Silas on occasion. Dolly Winthrop was one of these people, and actually became good friends with Silas. When Eppie came along to Silas, people didnt think he would be a suitable parent. Dolly stood up for Silas and said that he would make a fine parent. Just because Silas was a little eccentric, people looked down upon him as though he was not good enough for them to be around. Then there was Molly. She was Godfrey Cass wife. She was to be kept secret from everyone, curiously Squire Cass. If he ever found out that Godfrey had been married to her all along he would disown him. Molly was addicted to opium therefore she was not meritorious enough to be married to Godfrey Cass the good son. Molly had a daughter by Godfrey, who was also to be kept a secret. When molly overdosed on New Years Eve, the baby fell out of h e arms and wandered in to Silas house. The light drew her in. When he later found her sitting by the hearth of the fire, he decided that he would keep her and name her Eppie after his sister. Finally theres the peddler who was accused of stealing Silas money.

Monday, May 27, 2019

Greek Mythology and Athena Essay

1. True romance is primarily concerned witha. the gods b. wars c. heroes d. animals2. What does Athena offer to Athens in her contest with Poseidon? a. the kn honkeredge of weaving b. the olive tree c. conquest in battle d. wisdom 3. What goddess does Iris usually serve?a. Athena b. Aphrodite c. Artemis d. Hera4. With what goddess is Hephaestus often associated through practical wisdom, arts and crafts, and the advance of civilization? a. Hera b. Artemis c. Athena d. Aphrodite5. Which goddess is not one of the three goddesses that Aphrodite was unable to overpower? a. Demeter b. Artemis c. Athena d. Hestia6. Why did germanium punish Uranus?a. He killed their children as soon as they were born. b. He refused to lie with Gaia when she came to him. c. He refused to allow their children to leave the womb of earth. d. He wanted Themis to take her mothers set out. 7. What animal is Athena most closely identified with?a. the owl b. the dolphin c. the spider d. the lion8. Aphrodite Pandem os means which of the following?a. Celestial Aphrodite b. Common Aphrodite c. Genital Aphrodite d. Lustful Aphrodite 9. What Trojan youth did Zeus carry off to blend in cupbearer of the gods? a. Hebe b. G whatevermede c. Hector d. Paris10. What does the word chthonic or cthonian mean?a. pertaining to the sea b. having to do with the earth c. related to the sky d. characteristic of the citadel 11. Who wrote the Theogony?a. Homer b. Hesiod c. Vergil d. Ovid12. Whom did Poseidon comrade with in the form of a stallion?a. Demeter b. Medusa c. Amphitrite d. Scylla13. Who wrote the Prometheus Bound?a. Ovid b. Euripides c. Aeschylus d. Plato14. Which of the following is not an epithet of Athena?a. Pallas b. Glaukopis c. Metis d. Tritogeneia15. Who is the consort of Poseidon?a. Galatea b. Scylla c. Amphitrite d. Thetis16. Who is the hunter that caught Artemis bathing?a. hunting watch b. Arcas c. Actaeon d. Tityos17. Which best describes an etiological interpretation of myth? a. It attempt s to see myth as a metaphor. b. It attempts to understand myth in terms of an underlying ritual. c. It attempts to see myth as a pre-scientific mode of explanation. d. It attempts to uncover the historical kernel behind all myth. 18. In some versions of her birth, who is the mother of Aphrodite? a. Ge b. Hera c. Cybele d. Dione19. Who will eventually fork out Prometheus from his sufferings? a. Heracles b. Perseus c. Zeus d. Achilles20. What god gave Theseus three curses?a. Zeus b. Apollo c. Proteus d. Poseidon21. What is the produce of the guardian that was set over Io?a. Charon b. Cerberus c. Hermes d. Argus22. Who wrote the Hippolytus?a. Sophocles b. Euripides c. Aeschylus d. Seneca23. Who at times appears as the item servant of Hera? a. Hermes b. Hestia c. Iris d. Diana24. What is the name of the Graces, who attend Aphrodite?a. the Horae b. the Moirae c. the Charites d. the Graeae25. What did Artemis promise Hippolytus as he lay dying?a. She will raise him from the dead. b. Sh e will grant him a place in Elysium. c. She will punish a favorite of Aphrodite. d. She will punish Theseus for his curse. 26. What goddesses does Hesiod invoke at the beginning of the Theogony? a. the Fates b. the Graces c. the Muses d. the Sirens27. With whom does Athena share her function as a deity of war? a. Apollo b. Hephaestus c. Ares d. Mercury28. What is the hallmark of the Greek conception of the Olympians? a. animism b. theriomorphism c. anthropomorphism d. monotheism 29. Who is the mother of Zeus?a. Ge b. Rhea c. Gaea d. Cybele30. What is the most distinguishing feature of the Greek gods? a. omniscience b. omnipotence c. immortality d. physical stature Part II Short Answer (2 points each)31. What is the Roman name of Poseidon?32. What is the Greek term that means a sacred marriage?33. Who is Theseus fuck off in the Hippolytus?34. Who was the sculptor who created a statue that came to life? 35. What is the Roman name for Athena?36. What does the Greek word mythos mean? 37. Together with what creature is Scylla usually mentioned? 38. What does Pandoras name mean?39. To what force may Zeus himself be subject?40. Who is the mother of the Muses?Part III Essay (20 points)Write an essay on one of the questions listed below. Be sure to make direct reference to primary sources (i.e. line of achievements included in the textbook of ancient authors) to support your statements with the exception of the textbook, do not base your discussion on any other secondary sources. The essay must be 200-250 words in length. When referring to primary sources, include the following (1) page number of textbook on which passage occurs, (2) name of the ancient author, (3)title of ancient work from which passage is taken, (4) location inwardly ancient work in which passage occurs. (a)Discuss Zeus . Include within your discussion an identification of his attributes and the myths associated with him. What do the myths carry about his character and qualities? or(b) Discuss Athena . Include within your discussion an identification of her attributes and the myths associated with her. What do the myths communicate about her character and qualities?

Sunday, May 26, 2019

Level 3 Childcare Education Essay

Describe the hatchways which influence the provision of challenging environments for children (5 marks) There argon different types of international, national and local initiatives which influence the provision of challenging environments for children. An example of an initiative is the forest Schools. A Forest School is an innovative educational approach to outdoor(prenominal) play and learning http//www. forestschools. om/what-happens-at-a-forest-school/ Forest schools plenty influence the provision of a challenging environment, as the teachers can take the children in small groups every week to the local woods to have a better understanding of the outdoor environment and its linked to the curriculum. By doing this it enables children to be able to be in a safe environment when exploring and having adventures so they can see what things they can do when they go into the woods next time.It can also help children with problems such as language problems as this allows them to spea k about the experience they are having which can then be taken to the classroom and then it could be turned into a story to help the child. When going into the woods it helps to cater the behavior for the problem children and it also teaches children when they can and cant mess around.It also focuses on the fundamental aspect of the Forest School innovation educational approach. The Forest School provides ways for meeting learning objectives while developing practical life skills and encouraging child-initiated learning, which is observed and assessed. Lots of young children prefer to be immaterial than in the classroom environment because they can find it more exciting and they might pay more attention. Word Count- 240

Saturday, May 25, 2019

Religion and Society Essay

Society is bound by codes of behavior and tacit agreements to live together in harmony. worship plays an integral vocalism in this code that beau monde has created for itself. Every aspect of life, such as birth, death, marriage, and relationships, often endure religious signifi bearce. even out though non all batchs in a guild prescribe to the same religion, or any religion at all religion is still deeply rooted in society and plays a part in everyday life. piety gives people a moral code to live by it gives life meaning and purpose, and it is prominent in the American presidential term. Religion provides society with a moral compass for its citizens to live by. matinee idol provided Christians with the Ten Commandments and countless parables to help guide Christians to the path of righteousness Buddhists bring together to the five percepts so that they may not stray away from the path to Nirvana, and Islamists follow a moral code outlined for them in the Quran that clo se resembles the Christian Ten Commandments.These are all vastly different religions with different codes of ethics, but they are similar in the sense that they provide society with a moral code to live by. Although not everyone within society prescribes to a religion, religious influence is still present. Also, even though one may not follow the doctrine of a certain religion, that does not mean one cannot follow the moral code. All of societys major religions have the same basic code be a good person, dont commit murder, obey the laws of society, etc. These guidelines are common sense, and anyone who knows right from wrong has a moral compass and a sense of ethics. With this in mind, although society has a basic understanding of right and wrong, religion takes it a step farther by demanding of its followers something more than just being a good person. Most major religions expect its followers to be moral leaders in society by helping those in need, and going out of their way to d o good deeds for others. This thirst to please some higher being or reach a different plane of existence gives mankind the incentive to keep to their moral code. This does not mean that people who do not have or believe in religion have looser morals or are any less than people who are religious it just pith that people of religious faith have extra incentive to live ethical lives. Religion gives life a transcendental purpose and meaning, and often a finale to aspire to at the end of ones life.Christianitys goal for its followersis ultimately for them to live a life pleasing to God so that they may one day preside in Heaven, as well as to spread the word of God to all the people of the world. The goal of Buddhists is to end the cycle of rebirth by reaching nirvana. Goals such as these give the people of a society a purpose in life. Even those who do not prescribe to a religion can find meaning in their life by studying religion, or even by trying to disprove a religion one can fin d purpose even though their purpose is antireligious, it is still influenced by religion. A purposeful life is essential without a purpose or meaning in ones life there is no reason to go on living. Religion provides people with a meaningful life, a goal to strive toward, and by doing such it allows society to find pleasure in reaching their goals on a spiritual and human level. Although the United States government has no religious affiliation, it is explicitly severalized that there is to be a separation of church and state in the Free Exercise Clause of the First Amendment to the Constitution of the United States, the United States was and still is based upon religious principles. While not all of the fifty-five founding fathers were Christians, most did have some sort of religion or belief system for example Thomas Paine was a deist.The Declaration of Independence includes references to a Creator, and although it makes no reference to Christianity or any other religion, it is s till has some religious affiliation. Presently only two percent of the United States Congress either does not prescribe to a religion or does not specify their religious affiliation. With ninety-eight percent of Congress prescribing openly to some form of religion, it is unknowledgeable to believe that religion and the moral codes they believe in play no part in the making and passing of laws. This is not to say that all people of religious faith should be barred from being government officials, it is just an observation that church and state can never be fully separated. Religion still influences the lives of millions of people every day, whether religious or not, because the people who have been voted into these positions of power are the people who make and pass laws which affects everyone in American society. Religion is an ever present part of society. No matter if one is religious or not religion abounds in everyday life. This is not necessarily a bad thing though. Religion provides society with a moral code to live by, and goals to strive for. Even those without religion are affected by these things, and can evenfind their own goals and morals through religion without prescribing to a certain one.Religion is even present in the United States government. Although it is unequivocally express in the First Amendment of the Constitution that there is to be a separation between religion and government, it is difficult to completely separate the two considering the majority of the governments elected leaders are part of some religious affiliation. Religion is a perpetual part of society whether one affiliates with religion or not, it affects society as a whole. On my honor, I pledge that I have neither given, received, nor witnessed any unauthorized help on this.

Friday, May 24, 2019

Invisible Man Satire Essay

Nov 12, 2012 concealed Man Satire Many of the characters and places in nonvisual Man have satirical names that represent the place or characters importance Satirical Intent of unseeable Man by Ralph Ellison by Jessica Davis on prezi.com//satirical-intent-of-invisible-man-by-ralph-ellison/ Mar 4, 2013 Presented by Jessica Davis Rachel Wolf Dylan Hoover Kameron Smith Satirical Intent Greenwood The Golden Day Liberty Paints Dr. A. NOVELS The inconspicuous Man subroutine librarylibrary.thinkquest.org/23846/library/novels/theinvis_01_nov.html Aug 31, 1998 The Invisible Man begins with the narrator recalling his grandfathers last This book is written as a satire of the myth of American success. Things left wing Unseen Humour in Invisible Man Authentically Satirical lamorea.wordpress.com/2012/03/29/things-left-unseen-invisible-man/ Mar 29, 2012 I urge you to listen to this song in the telescope when reading this post, as the song is very famously listened to by the Narrator in the novel. Modern Day Satire The Invisible Man Listen and view music www.last.fm/music/Modern+Day+Satire/_/The+Invisible+ManDec 17, 2009 Listen to Modern Day Satire The Invisible Man for free. The Invisible Man appears on the album Astrum Mos Veho Vos Domum. Rock. People PDFInvisible Man Study Guide The experience Frame The Satire Begins www.olearyweb.com/classes/amlit010/assignments/IMStudyguide(ed).pdf Invisible Man Study Guide. The Picture Frame. Directions Read the following information before answering the questions. Be prepared to discuss your. SparkNotes Invisible Man Analysis of Major Characterswww.sparknotes.com Literature Study Guides Invisible Man Analysis of the major characters in Invisible Man, focusing on their personalities, motivations, relationships, and their roles in the themes of Invisible Man. Tools of Characterization in Invisible Man Shmoopwww.shmoop.com Literature Invisible ManShmoop guide to Tools of Characterization in Invisible Man. Too ls of Characterization analysis by Ph.D. and Masters students from Stanford, Harvard, and What kind of ironic devices can be found in Invisible Man by Ralph answers.yahoo.com Arts & Humanities Books & Authors Nov 12, 2007 Invisible Man by Ralph Ellison. Study Guides These links will give you a chapter by chapter compendium of the book, character analysis, plot and much PDFThe Satire Begins Chapters 1-2aplitcomp.edublogs.org/files/2009/03/satire-begins.pdfInvisible Man. By Ralph Ellison. THE SATIRE BEGINS. Ralph Ellison uses many of devices available to the satirist. Though they are just a sampling, these

Thursday, May 23, 2019

Infectious Diseases

The only means of recovery is rest and drinking a lot of fluids. winning cold medications will only help relieve the symptoms. Hepatitis, Viral Hepatitis merchant ship either be acute or chronic. That means, it can either be a temporary illness, or it can be a permanent condition Hepatitis is the inflammation of the liver ND other tissues.It can be caused by a viral Infection. The onset of hepatitis can also be caused by drug abuse or overexposure to a chemical The treatment for viral hepatitis, acute or chronic, is rest. Influenza Influenza, commonly known as the flu, Is also caused by a virus. Its symptoms are more severe than the common cold Influenza only take to be treated with bed rest and fluids. Non-linctuses Diseases Possible Causes Cancer Cancer Is caused by the transforming effect of carcinogens on normal cells.Characterized by the unrestrained growth of vicarious cells on or in tissues of the body. Treatment for cancer usually involves surgery and some form of radiati on therapy or chemotherapy. coronary thrombosis Heart Disease Coronary heart ailment is the most common circulatory system disease. Damage to the heart is caused by reduced blood flow to the heart resulting from blocked or narrowing coronary arteries. Coronary heart disease usually goes unnoticed until chest pain is felt or a heart attack occurs.Its symptoms can be treated with drugs or surgery. Diabetes, Type I It is a disease of the pancreas in which insulin is not produced in the correct amounts so that glucose (sugar) can be reborn into energy or stored as fat. Include excessive thirst and urination. Type I diabetes is mainly treated with regular insulin injections. Diabetes, Type II It is a disease of the pancreas in which insulin is not produced In the correct Type II diabetics are treated with a similar routine of diet and exercise.

Wednesday, May 22, 2019

History & Tradition of Jazz Essay

Why is jazz hard to define? pick up some of the reasons why it is sometimes difficult to determine if a melodic recording or a proceeding qualifies as jazz? There is no single definition however in that respect are 5 basic guidelines that loosely define jazz when followed to one degree or another. Jazz is a form of individual artistic musical expression. Jazz is performed in so many different styles, is part of many other types of music, and play by various instruments. Musicians develop their own style and sound.Describe the relationship between the rules rhythm section instruments must adhere to and the freedoms they have to play what they want in fulfilling their role? The rhythm section usually consists of a bass, drums and piano or guitar. Their role is to support the soloist even if they are playacting while the soloist is performing. While they have the freedom to play by improvising, they must do so in a manner supportive to the soloist.Describe how the roles of these t hree instruments change during the course of a song in a jazz performance piano, trump card, bass? The piano plays chords that accompany the melody of the song. The piano feeds the soloist with rhythmic or melodic ideas. The trumpet is versatile in that the various mutes give it different sounds. The trumpet leads the melody. The bass provides a steady beat playing the note that outlines the chord on every beat.Describe what happens during an improvised solo both in foothold of the soloist and the other members of the group? The soloist is composing on the spot His solo is unrehearsed and he needs to be able to formulate the melodies in his head in the lead he plays them. He also needs to listen to the input from the other instruments and follow their lead while improvising and interacting with the other musicians. The non-soloists can either stop playing or continue to play in a role supportive to the soloist following their lead and providing musical leads which the soloist can take off on a tangent with.

Tuesday, May 21, 2019

People today freely use The Internet Essay

People today freely commit The Internet, E-mail, and Online Messaging to communicate with new(prenominal) mess. Its a great bureau to talk to loved ones who live far away, conduct business, and just have fun with friends, but thither is a downside. People who we dont manage empennage obtain information about us by tracking e-mails and messages and unless these things atomic number 18 encrypted, everything we write can be pulled up and used against us. That is why people who use the Internet need to be much much aw be of their online privacy and security.The Internet started in 1969 by the U. S. overnment. They wanted a communication schema that couldnt be destroyed in the event of an emergency. It consisted of four computers linked together called DARPANET. In the 1970s people found that they could use this organization to grade messages between the computers to get to other people. More and more people started using this constitution and by the end of the 70s, it was int ernational. The earliest found company to use instant messaging was Mirabilis in November of 1996. Instant messaging is like a telephone conversation done between two people on the computer in real time.Popular companies that have instant messaging are AOL, Yahoo, and NET Messenger Service. E-mail or Electronic Mail is a way of composing, sending, and receiving messages over the computer. E-mail started in 1965, which means it actually began before the Internet and in fact helped start the Internet. First e-mail was used for ternary users to communicate through a mainframe computer. Now even though the government does not have control over the Internet in enter day, they can still monitor what individuals are writing especially after September 11th. The Sept. 1 terrorists relied heavily on the Internet, and the hijackers appear to have plotted their abattoir using Yahoo e-mail. The FBI hopes they can now catch suspected terrorists by looking at suspicious email, but what consti tutes suspicious? They have developed a program called Carnivore that looks through e-mail to find suspicious information. But, critics of this are not so sure of its benefits because it can be used to look for keywords much(prenominal) as hijack in mass amounts of e-mails, and whenever it finds an e-mail or message that has that word the FBI is entitled to read that message.If someone is just asking another soul through e-mail about the current terrorist situation will that set off an alarm with the FBI and now that persons e-mails will be introduce? Very possibly. The PATRIOT (Provide Appropriate Tools Required to Intercept and Obstruct Terrorism) Act tins investigators with more flexibility to pursue interception of e-mail messages, and monitoring of Web surfing and other PC-based communications.But does the general public believe that that government should have the right to look into private e-mails if they could catch a terrorist by doing it? According to a prospect of PC World. m, a total of 60 percent said they had serious concerns about giving the government more access to personal e-mail while 38 percent said they had little or no concern. While the government and FBI feel that this is a completely legitimate way to weed out the terrorists in America, many others find it a complete invasion of privacy.This isnt only a government vs. he people issue. As of 2004, 1 in 5 companies has had employees electronic messages subpoenaed in the course of a lawsuit or regulatory investigation and another 13 percent of 840 companies surveyed this year have battled workplace lawsuits triggered by employee e-mail. This means that private emails existence sent while at work can be retrieved and used against a person in a judiciary of law. The right to privacy is completely being revoked in these situations. That is why Americans need to be more aware of how to protect their privacy and there are ways to do this.First is by looking at the actual disclaimers th at close to people just sign without actually reading. American Online or AOL and Yahoo are two major providers of both e-mail and instant messaging. Looking into what their privacy policies are, you find this. Your AIM information consists of personally identifi satisfactory information collected or received about you when you register. Your AIM information may be shared within AOL and its business divisions. Your AIM information, including the contents of your online communications, may be accessed and disclosed in response to legal process (for example, a court order, search warrant or subpoena), or in other circumstances in which AOL has a faithful faith belief that AIM or AOL are being used for unlawful purposes.AOL may overly access or disclose your AIM information when necessary to protect the rights or property of AIM or AOL, or in special cases such as a threat to your safety or that of others. (http//www. aol. com/info/p_privacy. adp. ) Yahoos disclaimer is similar say ing that Yahoo collects personally identifiable information when you register for a Yahoo account, and we reasonably believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities.Basically both are stating that, for the most part, our privacies are protected unless there is a need to look at the e-mails or messages being sent. That is a big but though. People should read that and decipher that the government or business we work at could fundamentally make up a story as to why they need to read an email and both of these e-mail companies would have to comply. That really isnt protecting us. At least we should know ahead of time though that these are the company policies so it shouldnt nonplus as a surprise if our privacy was breached.This brings us to the concept of encryption. Chances are that nobody is watching the data you send out, but unless the information is over a secure (encrypted) connection, you cant be reasona bly sure that its safe. The definition of encryption is the process of encoding information in such a way that only the person (or computer) with the key can decode it. There are different encryption systems, but essentially two computers have dark codes that hold the key to decoding the messages sent between them.So if a message is encrypted, only your friends computer will be able to read what you sent to them. Does this type of security interest the common person? It definitely should and is quite easy to obtain. There are messenger services that provide e-mail and instant messaging. One is called Hushmail, which includes encryption enhancements. All you have to do is sign up for it just like you would Yahoo or AOL and the only downside is that storage space is limited. But the option is out there for people to choose safety over unnecessary storage.Yahoo nd AOL are the trusted and most used e-mail and instant message companies so most people just subscribe to these two, but really need to research what else is out there in regards to encrypted messaging companies like Hushmail. Customers of AOL though can upgrade to AIM 5. 2, which uses encrypted messages. Yahoo on the other hand only has a form of encryption. The system sends the message unprotected to Yahoos server. The recipient is given a URL to view the document on an SSL-protected web page. Consumers feel this is a clear link because the message is still being sent without it being secure, but it is a step forward.There are other simple general stairs that a consumer should do or at least think about before signing onto an e-mailing system. One is to always know the software that you are downloading onto your computer. numerous programs appear to be legitimate, but they really just want to get your information and use it for bad reasons that veer into your personal privacy. Also, if a person shares a computer with many people, like a college library system, that person needs to make sure they clear their passwords and personal information before leaving their seat.And basically people just need to be more suspicious. Even though thats a bad outlook, if youre messages are not encrypted, then you need to be more aware of what youre writing. If you think it could be construed in a negative way, then you shouldnt send it over an unprotected system that could one-day work against you. In conclusion, although companies and other entities operating in the online or electronic commerce environment have a responsibility to ensure the privacy of personally identifiable information online, the Online Privacy Alliance believes that consumers also have a role to play.Consumers should look for privacy policies on the web sites they visit as hearty as be aware of the various self-enforcement mechanisms currently available. After the tragedy of September 11th, the government does need to do certain things in order to set ahead protect our country against another attack, but this shoul dnt mean attacking Americans privacy and security. Americans shouldnt have to live in constant quantity fear of Big Brother looking into our personal letters and messages to loved ones and friends, and also shouldnt be afraid that some things being said are going to be taken the wrong way.That is the opposite of making us feel more secure and safe because that basically means were being attacked from within our own government. Saying that, there are many things that we, as consumers, are responsible for knowing what is out there to give us more security. There is encryption and the big companies out there that provide e-mail and instant messaging are getting on board and providing encrypted programs for us to use.We should also be responsible enough to actually read all disclaimers that we usually dont bother to read so that we are not ball over when we learn that the government just looked at our private message to someone. Its hard as one person to fight something like Carnivore, but we can do simple things like read disclaimers, be smart about what e-mail programs we subscribe to and be safe and responsible when we are on the Internet.

Monday, May 20, 2019

Felons and the Right to Vote

Sara Duran-Campos Professor Gould side 111 December 12, 2012 Convicted Felons Should Not Be Allowed to Vote M some(prenominal) Americans were not allowed to choose these past elections. It wasnt beca usance they didnt pay taxes or were mentally incompetent or underage. The reason why they cant choose is because they are convicted felons. Certain states do not give back the pay offly to balloting later Ex-convicted felons see paid their debts or completed their judgment of conviction in jail. Some states contribute a probation period ahead the ex-felon is allowed to voting.There are some states that go to the extent to never return the right to vote to felons or ex-felons. The right to vote to felons should be taken onward as a form of punishment. After completing their time in jail felons, which now are ex-felons, should go for their right to vote restored. A felony is a advanced crime usually punishable by imprisonment or death. Felons are people that have been convi cted of a crime such as murder, rape, arson, child molest, drug offender and burglary. Virginia is one of many states that takes the right to vote away from felons as a form of punishment.Maine allows felons to vote even when they are imprisoned. The act of taking away the right to vote from felons and ex-felons is called Disenfranchisement. People that are in favor of disenfranchisement imagine that those convicted of a crime have shown poor judgment therefore, proves them unfit to make good decisions when it comes to elections. Some believe that felon disenfranchisement laws also have a big racial impact because certain percent of population have their right to vote taken away more than others.Rates of incarceration and sentencing for African-Americans are higher than Caucasians, Latinos, and Native Americans. It seems like a good occlusion but voting requires certain minimum standards of and trustworthiness. Those who have committed serious crimes against their fellow citizens do not meet the standards of voting. Discrimination when sentencing a felon should not be practice in any court. If there is any proof of discrimination the government should that addressed too. Any citizen that does not want their right to vote taken away should not commit a crime. take is and should be a privilege for everyone without discrimination. Voting should not be allowed in prison. Felons are in prison because have not paid their debt yet. They are in the process of doing that. Felons have lost their right of freedom and other civil rights after committing a crime. The right of voting should also be taken away as a form or punishment. The right to vote should be withheld and return after release from prison. Those that support felons right to vote believe that a felons debt to society is their time behind bars. They dont believe that felons should pull away their right to vote.Section 5 Felons should pay Their debt * (Use your evidence to support it) * Comment on how you feel (Dont use I feel, just say it) about this reading in relation to the overall message. * Another point to support what was said in the beginning of the paragraph * Evidence * Comment on this as sound * Transition * Section 6 Felons Should Have a Restoration of Vote * The Argument of felons and their right to vote is very important in the United States because many Americans were not allowed to vote this past elections due to macrocosm an ex-felon. Comment on how you feel (Dont use I feel, just say it) about this information in relation to the overall message. * a study suggesting that former offenders who vote are less believably to return to jail. Evidence * Thirty-five states prohibit at least some people from voting after they have been released from prisonTransition * Section 7 Conclusion * Restate thesis * Reiterate your major points * Therefore, it is evident * industrial-strength ending. Works Cited Browne, Sharon, and Roger Clegg. Felons Have Lost Their Right to Vot e. Los Angeles Times. Los Angeles Times, 13 June 2010. Web. 01 Dec. 2012.

Sunday, May 19, 2019

Alving in Search for Freedom Essay

Henrik Ibsens works atomic number 18 relations with the well kept secrets and dogmas in society. His makes strip away the defending layers of the established ethical and moral virtues of societal life and and so create a big commotion and distress among the general public. Ibsens topic exposure of exceedingly tabooed themes such as sexually transmitted diseases, euthanasia, incest, dysfunctional marriages, and the angel of the house intention of women causes the painful response of the spectators facing the brightness of the truth. Prof. Bjorn Hemmer in his The Dramatist Henrik Ibsen laconically summarizes the magnitude of Ibsens meeting on modern theatre and social conventions However, drama was the focus of his real lyrical spirit.For a menstruum of many hard years, he faced bitter opposition. But he finally triumphed over the conservatism and aesthetic prejudices of the contemporary critics and audiences. More than anyone, he gave theatrical art a new vitality by bring ing into European bourgeois drama an ethical gravity, a psychological depth, and a social moment which the theatre had lacked since the days of Shakespeare. In this manner, Ibsen strongly contributed to giving European drama a vitality and tasty quality comparable to the ancient Greek tragedies.Hedda Gabler and Ghosts are the two plays this essay will focus on and especially on the importance for the two protagonists-Hedda Gabler and Mrs. Alving- to defeat social constraints according to which they have structured their lives. The great dramatist Ibsen masterfully reveals the disastrous consequences on his heroines psyches and souls this social canon of conformity inflicts. Through the subtle play of light, language and stage position, Ibsen reinforces the tragic circumstance in which Hedda and Mrs. Alving exist, the mundane lamp and liveness-room furniture encapsulate the secret tragedy of homosexual beings and simultaneously show Ibsens naturalistic talent in portraying life. In Hedda Gabler the movement of the protagonists own pieces of furniture in the front and stake room are emphasizing and helping even the spectator to anticipate her following action. Hedda Gabler is the daughter of General Gabler, who bequeathed her no fiscal independence, but a pair of dueling pistols and anachronistic, in earnest strict military aristocratic code of behaviour and is fresh married to the historian George Tesman, whom she neither loves nor respect. She is conscious of her total dependency on the very reliable Tesman and this citation tears apart her being with rage and helplessness. In order to be able to continue living under these circumstances Hedda viciously emphasizes her intellectual and rank superiority over Tesman and his ever-sacrificing Aunt Julia and hurts them through her highly sarcastic language.She denies in her mind falling into the frame of the assigned female societal role and therefore slips fully into the indulgence of nothingness and boredo m. This state could have remained for ever unchanged until the abrupt reintroduction of her former Platonic lover Lovborg who becomes what before seemed to Hedda impossible, i.e. some goal in life to work toward.2 Ibsen confronts her with the better alcoholic and genius Eilert Lovborg and throws her back in the idyllic past of General Gabler reading a report and her experiencing the forbidden world through the wild and seductive stories of young routhen Lovborg on the sofa behind him.Lovborg is back on his feet fighting for a clean starting in life and writing books that are a tremendous success. But Hedda is not the inspiring power at Lovborgs site anymore and that makes her exceedingly jealous of the woman who has such a positive power on him at the moment Mrs. Thea Elvsted and who is ironically a former flame of her husband. Hedda Gablers personality is a very complex mixture of the severely installed in her being notions of correct behaviour in social aspect of rank and class be and the fully subdue personal creative potential.Hedda is lamed with fear her whole existence is driven not by the positive force of creating, but the devastating nihilistic grip of fear and conventions of society. In order to negate this haunting power of correctness and properness Hedda searches through Lovborg life experiences to live out her inborn human desires for creative fulfillment. But Hedda is a woman of good standing, she cannot do as she pleases, she can do as she pleases solely within the framework of the norms prescribed by public opinion. Lovborg is only a feeble prospect for her to show her creativity, because the fear of a scandal creeps in and Heddas creative potential and suppressed sexuality are distorted into a storm of malevolence.

Saturday, May 18, 2019

Ccna 2 Lab Book

trackrs and Routing fundamental principle CCNA 2 labs and find out sentinel Instructor form every last(predicate)an potson lake herring Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii Routers and Routing bases CCNA 2 laboratorys and prove fall Routers and Routing prefatorys CCNA 2 labs and written report Guide Instructors Edition anyan Johnson Copyrigh 2007 cisco Systems, Inc. cisco Press logo is a trademark of Cisco Systems, Inc. Published by Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved.No part of this accommodate may be reproduced or transmitted in whatsoever form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 First Printing July 2006 Library of Congress Cataloging-in-Pub lication Number 2006920176 ISBN 1-58713-167-6 Warning and Disclaimer This arrest is designed to provide information about the labs for the Routers and Routing prefatorials CCNA 2 course of the Cisco entanglementing honorary society Program.Every elbow grease has been made to key this apply as pick out and as accurate as achievable, but no warranty or fitness is implied. The information is provided on an as is basis. The author, Cisco Press, and Cisco Systems, Inc. shall have nevery liability nor responsibility to any person or entity with respect to any loss or restitution arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and atomic number 18 not necessarily those of Cisco Systems, Inc. Feedback developmentAt Cisco Press, our goal is to score in-depth technical books of the highest quality and value. Each book is crafted with c be and precision, und ergoing rigorous development that involves the unique expertise of members from the pro technical community. Readers feedback is a natural continuation of this process. If you have any comments regarding how we could improve the quality of this book, or other than alter it to better suit your needs, you quarter contact us finished and through e-mail at emailprotected com. revel make sure to include the book title and ISBN in your message. We greatly appreciate your assistance.Publisher Paul Boger Cisco Re empowerative Anthony Wolfenden Cisco Press Program Manager Jeff Brady Executive Editor Mary Beth Ray output Manager Patrick Kanouse Senior Development Editor Christopher Cleveland Senior Project Editor San Dee Phillips Copy Editor John Edwards Technical Editor Tom Knott Team Coordinator Vanessa Evans obtain and Cover Designer Louisa Adair Composition Louisa Adair lector Gayle Johnson iii Trademark Acknowledgments All terms mentioned in this book that argon known to be tradem arks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc. cannot attest to the trueness of this information. Use of a term in this book should not be regarded as affecting the hardness of any trademark or service mark. iv Routers and Routing bedrock CCNA 2 testing grounds and lease Guide active the Author Allan Johnson entered the academic world in 1999 after ten years as a business enterprise owner/operator to dedicate his efforts to his passion for t from each oneing. He has an M. B. A. and an M. Ed. in occupational training and development. Allan is currently prosecute an M. S. in information warrantor. He is an information technology instructor at Mary Carroll High develop and Del Mar College in Corpus Christi, Texas.Since 2003, Allan has committed much of his time and energy to the CCNA Instructional Support Team, providing serve for instructors worldwide and creating training materials. He is a familiar voice on the Cisco interlock ing honorary society biotic community forum Ask the Experts series. He currently holds CCNA and CCAI certifications. to the highest degree the Technical Reviewer Tom Knott is a Networking Academy instructor and IT career focalizeed learning community director in the Career and Technical knowledge department at Southeast Raleigh Magnet High School, Raleigh, N. C. Tom has taught all versions of the CCNA curriculum since v1. 1.He coauthored Networking radical principle CCNA 1 Companion Guide (ISBN 1-58713-164-1), the only authorized Companion Guide for the Cisco Networking Academy Program. v Dedication To my wife, Becky, and my daughter, Christina. Thank you both for your love and patience. vi Routers and Routing fundamental principle CCNA 2 labs and probe Guide Acknowledgments As technical editor, Tom Knott served admirably as my second pair of eyes, determination and correcting technical inaccuracies as s hygienic as grammatical errors, helping to make this project a first- class production. Mary Beth Ray, executive editor, did an slap-up job steering this project from beginning to end.I can al moods count on Mary Beth to make the tough decisions. Christopher Cleveland, development editor, has a dedication to perfection that pays dividends in countless, unseen ways. Thank you for providing me with much-needed guidance and support. This book could not be a reality without your persistence. outlast, I cannot forget to thank all my studentspast and presentwho have helped me over the years to create engaging and exciting activities and labs. There is no better way to test the effectiveness of an activity than to give it to a team of dedicated students.They excel at finding the obscurest of errors I could have never done this without all your support. vii Contents at a glance Chapter 1 WANs and Routers 1 Chapter 2 gate to Routers Chapter 3 Configuring a Router Chapter 4 Learning active other(a) Devices 119 Chapter 5 Managing Cisco IOS software packag e 197 Chapter 6 Routing and Routing protocols 239 Chapter 7 outperform Vector Routing communications protocols Chapter 8 TCP/IP rooms Error and Control Messages Chapter 9 Basic Router Troubleshooting Chapter 10 Intermediate TCP/IP Chapter 11 coming Control harkens (ACLs) attachment A CCNA 2 Skills-Based Assessment PracticeAppendix B Router port wine abstract Appendix C Erasing and rechargeing the Router 21 55 271 351 357 425 439 557 559 551 viii Routers and Routing Basics CCNA 2 testing grounds and Study Guide Contents Chapter 1 WANs and Routers Study Guide WANs 1 2 2 vocabulary dress twin(a) 3 phraseology behave Completion 4 theory Questions 4 Routers 5 mental lexicon suffice Completion 5 Internal Components of a Router 6 testing groundel the External Components of a Router 8 laboratoryel the Topology Components forge 9 Concept Questions 10 science lab physical exercises 11 course research laboratory 1-1 ascribeing ease portholes (1. 2. ) 11 childbed 1 Id entify associateors and Components 11 confinement 2 Identify the Computer consecutive interface (COM 1 or 2) 11 assess 3 patch up the RJ-45toDB9 Adapter 12 childbed 4 prove or Build a Rollover Cable 12 working class 5 Connect Cabling Components 13 curriculum Lab 1-2 Connecting Router local area network Interfaces (1. 2. 6) 13 assess 1 Identify the Ethernet or Fast Ethernet Interfaces on the Router 14 parturiency 2 Identify the comme il faut Cables and Connect the Router to a Hub or reverse 14 occupation 3 Connect the Workstation Ethernet Cabling 15 occupation 4 swear the connectedness 15 curriculum Lab 1-3 Connecting WAN Interfaces (1. . 7) 15 task 1 Identify the ensuant Interfaces on the Router 16 labor movement 2 Identify and Locate the Proper Cables 16 designate 3 Cable the Routers 17 quarrel Lab 1-4 Build a both-Router Topology 18 task 1 Choose the Devices 18 toil 2 Choose the Cables 18 childbed 3 Connect the Devices 19 proletariat 4 check Connectivi ty 19 Chapter 2 Introduction to Routers Study Guide 21 22 Cisco IOS and the IOS reign over- drag Interface 22 Vocabulary praxis Matching 22 Vocabulary Exercise Completion 23 Concept Questions 24 network Research 25 Starting, Configuring, Accessing, and use a Router command line interface 26 ixRouter Boot epoch Exercise 26 Using the Router CLI Exercise 27 Interpreting bidding Output Exercise 28 Concept Questions 29 Lab Exercises 31 control Reference 31 class Lab 2-1 Router class Using mountainup (2. 2. 1) 31 depute 1 Start the Router and Begin Setup humour 32 line of work 2 stop with the Setup Dialog Box 32 toil 3 aim the Current Interface Summary 32 tax 4 set up the international Parameters 33 problem 5 tack together the Interface Parameters 33 travail 6 Specifying Whether to Use the human body subordination paw 33 Curriculum Lab 2-2 Establishing a Console seance withHyperTerminal (2. 2. 4) 34 caper 1 Connect a Rollover Cable to the Console Port 34 chore 2 Start HyperTerminal 34 task 3 chance on the HyperTerminal academic term 34 projection 4 Specify the Computers Connecting Interface 35 task 5 Specify the Interface association Properties 35 job 6 Close the posing 36 travail 7 Reopen the HyperTerminal Connection, as come onn in labor 2 37 problem 8 annihilate the HyperTerminal Session 37 Curriculum Lab 2-3 control condition-Line Fundamentals (2. 2. 9) 37 occupation 1 Start HyperTerminal 38 delegate 2 put down In to the Router 38 caper 3 Use the Help cavort 38 proletariat 4 present inside EXEC personal manner 38 business 5 Use the Help lark about 39 occupation 6 List the stage Commands 39 business 7 Examine the rill frame 39 undertaking 8 Examine the configuration in More Detail 39 job 9 Use the Command History Feature 39 task 10 lumber Off and Turn Off the Router 39 cosmopolitan Lab 2-4 Exploring the Router and IOS 40 business 1 physically Connect to a Router and Start a HyperTerminal Session 40 Ta sk 2 Exploring Setup elan 42 Task 3 Use the Help Feature 45 Task 4 Examining the Router 47 Task 5 assemble a Workstation on the Routers local area network 48 Task 6 Troubleshooting Connectivity 49Task 7 Restore Equipment varietys 50 scrap Lab 2-5 put together a Two-Router Topology 51 Task 1 Cable the Topology 51 Task 2 Design and document point of referenceing Scheme 51 x Routers and Routing Basics CCNA 2 Labs and Study Guide Task 3 piece IP Addressing on the Two Routers 52 Task 4 tack together Static Routing Between the Two Routers 52 Task 5 put together IP Addressing on the Two PCs 53 Task 6 Test Connectivity and Troubleshoot 53 Chapter 3 Configuring a Router Study Guide 55 56 Configuring a Router for Basic Routing 56 Router expeditious Exercise 56 Basic descriptor Exercise 56 how Commands Exercise 59 Documenting the Router abidance ending the variety Exercise 62 Managing the soma single file Exercise 63 Lab Exercises 62 64 Command Reference 64 Curriculum Lab 3-1 Command personal manners and Router Identification (3. 1. 2) 65 Task 1 pound in to the Router in User mood 66 Task 2 put down in to the Router in Privileged Mode 66 Task 3 Enter Global cast Mode 66 Task 4 Enter Router bod Mode 67 Task 5 release from Router Mode and Enter Interface Configuration Mode 67 Task 6 Assign a Name to the Router 67 Task 7 Exit the Router and Global Configuration Mode 68Curriculum Lab 3-2 Configuring Router countersignatures (3. 1. 3) 68 Task 1 Log in to the Router in User EXEC Mode 68 Task 2 Log in to the Router in Privileged EXEC Mode 69 Task 3 Enter Global Configuration Mode 69 Task 4 Enter a soldiersname of cast for This Router 69 Task 5 assemble the Console Password on the Router and Exit Line Mode 69 Task 6 put together the Password on the Virtual Terminal Lines and Exit Line Mode 70 Task 7 configure the Enable Password and Exit 70 Task 8 output to User EXEC Mode 70 Task 9 Enter Privileged EXEC Mode Again 70 Task 10 Return to Configuration Mode 70Task 11 tack the Enable Secret Password and Exit Global Configuration Mode 70 Task 12 Return to User EXEC Mode 71 Task 13 Enter Privileged EXEC Mode Again 71 Task 14 Enter Privileged EXEC Mode Again 71 Task 15 Show the Routers run Configuration 71 Curriculum Lab 3-3 Using Router bespeak Commands (3. 1. 4) 73 Task 1 Log in to the Router 74 xi Task 2 Enter the help Command 74 Task 3 viewing Help for the show Command 74 Task 4 vaunting the IOS Software Version and Other Important culture 74 Task 5 presentment the Routers term and Date 75 Task 6 exhibit a Cached List of armamentnames and Addresses 75Task 7 screening Users Who atomic number 18 Connected to the Router 75 Task 8 Display the Command Buffer 75 Task 9 Enter Privileged Mode 75 Task 10 Enter the help Command 75 Task 11 Display the Router Address Resolution communications protocol (ARP) gameboard 76 Task 12 Display Information more or less the Flash Memory Device 76 Task 13 Show Information whatever the Ac tive Configuration File 76 Task 14 Display Information About the Backup Configuration File 76 Task 15 Display Statistics for All Interfaces put together on the Router 76 Task 16 Display the protocols Configured on the Router 77Curriculum Lab 3-4 Configuring a Serial Interface (3. 1. 5) 77 Task 1 Connect the Router and Workstation Cabling 78 Task 2 Configure the Name and Passwords for Router 1 78 Task 3 Configure Serial Interface Serial 0 78 Task 4 continue the cut Configuration to the Startup Configuration in Privileged EXEC Mode 78 Task 5 Display Information About Serial Interface 0 on jazz around 79 Task 6 Configure the Name and Passwords for Router 2 80 Task 7 Configure Serial Interface Serial 0 81 Task 8 Save the lead Configuration to the Startup Configuration in Privileged EXEC Mode 81Task 9 Display Information About Serial Interface 0 on BHM 82 Task 10 swan That the Serial Connection Is function 83 Curriculum Lab 3-5 Making Configuration modifys (3. 1. 6) 84 Task 1 Co nnect the Router and Workstation Cabling 84 Task 2 Configure militaryname and Passwords 85 Task 3 Configure the Serial 0 Interface 85 Task 4 Save the Configuration 85 Task 5 hold the Configuration 85 Task 6 Modify the Configuration 85 Task 7 convey Down Serial Interface 0 86 Task 8 Bring Up the Serial 0 Interface 86 Task 9 aver the Configuration 87 Curriculum Lab 3-6 Configuring an Ethernet Interface (3. . 7) 89 Task 1 Configure the Hostname and Passwords on the spur track Router 89 Task 2 Configure the FastEthernet 0 Interface 89 Task 3 Save the Configuration 90 Task 4 Display the FastEthernet 0 Configuration Information 90 Curriculum Lab 3-7 Configuring Interface Descriptions (3. 2. 3) 92 Task 1 Configure the Hostname and Passwords on the Router 93 Task 2 Enter Global Configuration Mode 93 xii Routers and Routing Basics CCNA 2 Labs and Study Guide Task 3 Enter Interface Configuration Mode 93 Task 4 Display Help for the description Command 93 Task 5 Choose a Description for th e Interface 93Task 6 Enter a Description for Interface Serial 0 94 Task 7 Examine the Active Configuration File 94 Task 8 Confirm That the Interface Description Is Correct 95 Curriculum Lab 3-8 Configuring Message of the Day (MOTD) (3. 2. 5) 96 Task 1 Configure Basic Router Information 97 Task 2 Enter Global Configuration Mode 97 Task 3 Display Help for the banner motd Command 97 Task 4 Choose the Text for MOTD 97 Task 5 Enter the Desired Banner Message 97 Task 6 Test the MOTD Display 98 Task 7 Verify the MOTD by notioning at the Router Configuration 98 Curriculum Lab 3-9 Configuring Host ducks (3. . 7) 99 Task 1 Configure the Hostname and Passwords on the GAD Router 100 Task 2 Configure the Interfaces and Routing communications protocol on the GAD Router 100 Task 3 Save the GAD Router Configuration 101 Task 4 Configure the Hostname and Passwords on the BHM Router 101 Task 5 Configure the Interfaces and Routing Protocol on the BHM Router 101 Task 6 Save the BHM Router Configuratio n 101 Task 7 Verify That the Internetwork Is surgery 101 Task 8 Configure the IP Host Table for the Network 102 Task 9 Exit Configuration Mode and Test 102 Curriculum Lab 3-10 Backing Up Configuration Files (3. . 9) 106 Task 1 Configure the Hostname and Passwords on the GAD Router 107 Task 2 Configure the Interfaces and Routing Protocol on the GAD Router 107 Task 3 Save the GAD Router Configuration 107 Task 4 Configure the Hostname and Passwords on the BHM Router 107 Task 5 Configure the Interfaces and Routing Protocol on the BHM Router 107 Task 6 Save the BHM Router Configuration 108 Task 7 Verify That the Internetwork Is Functioning 108 Task 8 Start Capturing the Configuration File 108 Task 9 Stop Capturing the Configuration File 110 Task 10 dismantle Up the Captured Configuration File 110Task 11 Test Your Backup Configuration 112 Task 12 re-start the Router to attain the Running Configuration 112 Task 13 Reconfigure the Router from the Saved Text File 112 Task 14 Verify That t he Internetwork Is Functioning Again 113 Comprehensive Lab 3-11 Basic Router Configuration and File Management 113 Task 1 Set Up Lab Equipment and Document 114 Task 2 Document Interface Descriptions and Banner 114 Task 3 Basic Router Configurations cxv Task 4 Interface Configurations 115 xiii Task 5 Routing Configurations 115 Task 6 Configure Hosts and Verify Full Network Connectivity 116 Task 7 Capture Configurations and Clean Up . xt Scripts 116 Task 8 Erase Routers and Reload with . txt Files 116 Task 9 Return Equipment to former State 116 Challenge Lab 3-12 Basic Router Configuration Challenge 117 Task 1 Edit Script with a New Configuration 117 Task 2 freight rate Scripts into the Routers 117 Task 3 Attach and Configure Hosts 118 Task 4 Verify Routing and Test Connectivity 118 Chapter 4 Learning About Other Devices Study Guide 119 120 Discovering Neighbors Using CDP 120 CDP Concepts and Commands Exercise 120 Network Topology Discovery Exercise 1 123 Network Topology Discovery Exercise 2 128Getting Information and Troubleshooting outside(a) Devices Concept Questions 135 Lab Exercises 135 139 Command Reference 139 Curriculum Lab 4-1 Creating a Network Map Using CDP (4. 1. 4) 139 Task 1 Log in to Router 1 (GAD) 140 Task 2 Configure the Routers 140 Task 3 Gather Information About GADs Interfaces 140 Task 4 Display the CDP Updates Received on the Local Router 140 Curriculum Lab 4-2 Using CDP Commands (4. 1. 6) 143 Task 1 Configure the Routers 144 Task 2 Gather Information About the GAD Routers Interfaces 144 Task 3 Enable the Interfaces on GAD cxlvTask 4 Gather Information About the GAD Router Interfaces 145 Task 5 Display the Values of the CDP Timers, the Interface Status, and Encapsulation Used 145 Task 6 Display the CDP Updates Received on the Local Router 146 Task 7 Enable Serial 0 Interface on BHM 146 Task 8 Display Details About CDP Updates Received on the Local Router GAD 147 Task 9 detect CDP Packets Being move and Received on Router GAD 147 Task 10 Observe CDP Packet Traffic 148 Curriculum Lab 4-3 Establishing and Verifying a Telnet Connection (4. 2. 2) 149 Task 1 Configure the Routers 150Task 2 Log in to Router 1 and Verify the Connection to Router 2 150 Task 3 Use help with the Telnet Command 150 Task 4 Telnet to a Remote Router 150 xiv Routers and Routing Basics CCNA 2 Labs and Study Guide Task 5 Look at the Interfaces on the Remote Router 150 Task 6 Display the Protocols on the Remote Router 151 Task 7 Enter Privileged EXEC Mode 151 Task 8 Look at the Running Configuration 151 Task 9 Look at the Saved Configuration 151 Task 10 Look at the Neighbor Configuration 151 Curriculum Lab 4-4 Suspending and Disconnecting Telnet Sessions (4. 2. 3) 154 Task 1 Configure the Routers 155Task 2 Log in to GAD and Verify the Connection to BHM 155 Task 3 Telnet to a Remote Router 155 Task 4 Look at the Interfaces on the Remote Router 155 Task 5 Suspend the Current Telnet Session 156 Task 6 Resume a Telnet session 156 Task 7 Close a Teln et Session 156 Curriculum Lab 4-5 sophisticated Telnet Operations (4. 2. 4) 158 Task 1 Configure the GAD, BHM, and PHX Routers Using the Tables 160 Task 2 Log in to Router 1 and Verify the Connection to Routers 2 and 3 160 Task 3 Telnet to a Remote Router 160 Task 4 Look at the Interfaces on the Remote Router 160 Task 5 Suspend the Current Telnet Session 162Task 6 Establish Another Telnet Session 162 Task 7 Suspend the Current Telnet Session 162 Task 8 Use the show sessions Command to See the Connections 162 Task 9 Resume the Previously Suspended Telnet Session 162 Task 10 Use the show sessions Command to See the Connections 162 Task 11 Close a Telnet Session 163 Task 12 Use the show sessions Command to See the Connections 163 Task 13 Resume the Previously Suspended Telnet Session 163 Task 14 Close a Telnet Session 163 Task 15 jobs with Linked Telnet Sessions on duplex Routers 164 Task 16 Telnet to the BHM Router 164Task 17 Telnet Back to the PHX Router 164 Task 18 Telnet to the G AD Router 164 Task 19 Telnet to the BHM Router 164 Task 20 Exiting from All Sessions 164 Curriculum Lab 4-6 Connectivity Testspink (4. 2. 5a) 168 Task 1 Configure the GAD and BHM Routers 169 Task 2 Log in to GAD and Verify the Connection to BHM 170 Task 3 Display Information About Host to grade 3 Address Mappings 170 Task 4 Use the ping Command 170 Task 5 Examine the Results of the ping Command 171 Task 6 Configure the Workstations 171 Task 7 Use the ping command from the Workstation 171 Task 8 Test Layer 3 Connectivity 172Task 9 From the Host, Telnet to the Directly Connected Router 172 xv Task 10 coif an extend ping 172 Task 11 dress Another Extended ping 172 Task 12 Perform an Extended ping from the Host 173 Curriculum Lab 4-7 Connectivity TestsTrace dispatch (4. 2. 5b) 176 Task 1 Configure the Routers 177 Task 2 Configure the Workstations 177 Task 3 Use the ping Command from the Workstation 177 Task 4 Test Layer 3 Connectivity 177 Task 5 Log in to the Router in User Mode 178 Task 6 Discover the trace path Options 178 Task 7 Use the Help Function with traceroute 178 Task 8 Continue Discovering the traceroute Options 178Task 9 Use the traceroute Command 179 Task 10 Continue Using traceroute 179 Task 11 Use the tracert Command from a Workstation 179 Task 12 Trace to Cisco and Other Common Websites 180 Task 13 Compare the IP Route traces to Cisco, Yahoo, and AOL 181 Curriculum Lab 4-8 Troubleshooting IP Address Issues (4. 2. 6) 182 Task 1 Configure the Routers 183 Task 2 Configure the Workstations 183 Task 3 Use the ping Command from the Workstation 183 Comprehensive Lab 4-9 CDP Commands 186 Task 1 Cabling, Basic Router Configuration, Workstation Configuration, and Verification 187Task 2 Display the Values of the CDP Timers, the Interface Status, and the Encapsulation Used 190 Task 3 Display CDP Information About Other Devices 191 Task 4 observeing and Observing CDP Traffic 191 Comprehensive Lab 4-10 Network Troubleshooting Commands 192 Task 1 Cable and C onfigure the Topology 192 Task 2 Verify Network Layer Connectivity 193 Task 3 Verify the Path from Source to Destination 194 Task 4 locomote Telnet Operations 195 Task 5 Finalize Documentation and Restore Equipment Configurations 196 Chapter 5 Managing Cisco IOS Software Study Guide 197 198Router Boot chronological succession and Loading IOS names 198 Vocabulary Exercise Completion 198 Router Boot Sequence Exercise 199 Boot System Commands Exercise 199 Configuration Register Exercise 199 Journal Entry 200 Managing Cisco Router IOS and Configuration Files 200 IOS Naming Convention Exercise 200 xvi Routers and Routing Basics CCNA 2 Labs and Study Guide Backing Up an IOS and Configuration File Exercise 202 Using ROMMON and the tftpdnld Command Exercise 203 Command Reference 205 Lab 5-1 Using the boot system Command (5. 1. 3) 206 Task 1 Log in to the Router 206 Task 2 Enter Privileged EXEC Mode 206Task 3 Save the Existing running-config to the startup-config 207 Task 4 Configure the R outer and View the Running Configuration File 207 Task 5 Show Information About the Backup Configuration File 207 Task 6 Display the IOS Version and Other Important Information 207 Task 7 draw the Statements to Perform the Following Functions 208 Task 8 Show Information About the Flash Memory Device 209 Task 9 Specify a Fallback Boot Sequence 209 Lab 5-2 Troubleshooting Configuration Register Boot Problems (5. 1. 5) 211 Task 1 Log in to the Router 211 Task 2 Configure the Router Name and Configuration Register Setting 211 Task Save the Existing running-config to the startup-config 212 Task 4 Restart the Router 212 Task 5 View the Running Configuration File 212 Task 6 Reload the Saved Configuration 213 Task 7 Display the IOS Version and Other Important Information 213 Task 8 Change the Configuration Register to Load the Startup Configuration File from NVRAM, Save, and Reload the Router 214 Task 9. Verify the Configuration Register Setting and Log Out of the Router 214 Lab 5-3 Manag ing Configuration Files with TFTP (5. 2. 3) 216 Task 1 Configure the GAD Router 217 Task 2 Configure the Workstation 217Task 3 Start and Configure the Cisco TFTP horde 218 Task 4 Verify Connectivity by knocking the TFTP host 218 Task 5 Copy the running-config to the TFTP innkeeper 218 Task 6 Verify the Transfer to the TFTP innkeeper 218 Task 7 Copy the startup-config from the TFTP innkeeper 218 Task 8 Save the New running-config 219 Task 9 Test the Restored File 219 Lab 5-4 Managing IOS Images with TFTP (5. 2. 5) 219 Task 1 Configure the GAD Router 220 Task 2 Configure the Workstation 220 Task 3 Collect Information to Document the Router 220 Task 4 Collect More Information to Document the Router 220Task 5 Start and Configure the Cisco TFTP Server 221 Task 6 Verify Connectivity by Pinging the TFTP Server 221 Task 7 Prepare to Copy the IOS to the TFTP Server 221 Task 8 Copy the IOS Image to the TFTP Server 221 Task 9 Verify the Transfer to the TFTP Server 222 Task 10 Copy the IO S Image from the TFTP Server 222 xvii Task 11 Test the Restored IOS Image 223 Lab 5-5 Password Recovery Procedures (5. 2. 6a) 224 Task 1 Attempt to Log in to the Router 225 Task 2 Document the Current Configuration Register Setting 225 Task 3 Enter ROM Monitor Mode 225 Task 4 Examine the ROM Monitor Mode Help 225Task 5 Change the Configuration Register Setting to Boot Without Loading the Configuration File 226 Task 6 Restart the Router 226 Task 7 Enter Privileged EXEC Mode and Change the Password 226 Task 8 Verify the New Password and Configuration 227 Lab 5-6 Managing IOS Images with ROMMON and Xmodem (5. 2. 6b) 227 Task 1 Enter the ROM Monitor Mode 228 Task 2 Find a Valid Image in Flash Memory 228 Task 3 Recover from the Listed Images if You See Any 228 Task 4 Record Information Using show version 228 Task 5 Configure the Boot Register to Enter ROMMON Mode 229 Task 6 View Available Commands from the ROMMON Prompt 229Task 7 Reset the Terminal pelt along for a Faster transfer 230 Task 8 Use the xmodem Command to Request a File from the Host 231 Task 9 Send the File from the HyperTerminal Program 231 Task 10 Reset the Boot Register and the Console Speed 233 Task 11 Review the New Settings 233 Challenge Lab 5-7 Use TFTP to Load IOS and Configuration File 234 Task 1 Cable the Lab and Gather Information 234 Task 2 Change the Configuration Register Setting 235 Task 3 Add Statements to Specify a Different Boot Sequence 236 Task 4 Test Your Boot System Commands 236 Task 5 Back Up the Configuration File to a TFTP Server 237Task 6 Back Up the IOS Stored in Flash to a TFTP Server 237 Instructor Confirmation 238 Chapter 6 Routing and Routing Protocols Study Guide 239 240 Adding Connected and Static IP Routes 240 Dissecting a Routing Table Entry Exercise 240 Static Routing Configuration Exercise 1 241 Static Routing Configuration Exercise 2 242 Internet Research What Is Administrative outdo? 244 Concept Questions 245 Routing Protocols Overview 245 Vocabulary Exercise M atching 246 Vocabulary Exercise Completion 247 xviii Routers and Routing Basics CCNA 2 Labs and Study Guide Routing Protocols Flow Chart Exercise 247Concept Questions 248 Routing Protocols pot and Configuration Routing Protocol Characteristics Exercise 248 248 prodigal Configuration Exercise 1 249 stemma Configuration Exercise 2 250 Concept Questions 252 Lab Exercises 253 Command Reference 253 Curriculum Lab 6-1 Configuring Static Routes (6. 1. 6) 253 Task 1 Configure Both Routers 254 Task 2 Configure the Workstations with the Proper IP Address, Subnet Mask, and remissness Gateway 254 Task 3 condition the Interface Status 255 Task 4 Check the Routing Table Entries 255 Task 5 Add Static Routes 256 Task 6 Verify the New Routes 256 Task 7 Try to Ping Host to Host Again 256Comprehensive Lab 6-2 Static Routing with Migration to Dynamic Routing 259 Task 1 Cable the Lab 260 Task 2 Basic Router Configurations 260 Task 3 Interface Configurations 260 Task 4 Static Routing Configurations 261 Task 5 Migrate to Dynamic Routing 262 Challenge Lab 6-3 Static and Dynamic Routing Configuration 264 Task 1 Cabling, Basic Router Configuration, and Verification 265 Task 2 Configure RIP Routing on HQ and BRANCH 266 Task 3 Configure Static and thoughtlessness Routing 268 Chapter 7 Distance Vector Routing Protocols Study Guide 271 272 Avoiding Loops When converging Using Distance Vector Routing Protocols 272Vocabulary Exercise Matching 272 Vocabulary Exercise Completion 273 Routing Loop avoidance Exercise 273 Routing Information Protocol 275 RIP v1 and RIP v2 Comparison Exercise 275 Advanced RIP Concepts and Configuration Exercise 275 Troubleshooting with show Commands 280 Troubleshooting with correct Commands 282 Lab Exercises 284 Command Reference 284 Lab 7-1 Configuring RIP (7. 2. 2) 285 xix Task 1 Configure the Routers 286 Task 2 Check the Routing Table Entries 286 Task 3 Configure the Routing Protocol on the GAD Router 286 Task 4 Save the GAD Router Configuration 287Task 5 Configure the Routing Protocol on the BHM Router 287 Task 6. Save the BHM Router Configuration 287 Task 7 Configure the Hosts with the Proper IP Addresses, Subnet Masks, and fail Gateways 287 Task 8 Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 287 Task 9 Show the Routing Tables for Each Router 287 Lab 7-2 Troubleshooting RIP (7. 2. 6) 290 Task 1 Configure the Routers 291 Task 2 Configure the Hosts with the Proper IP Addresses, Subnet Masks, and scorn Gateways 291 Task 3 pull in Sure That Routing Updates Are Being Sent 291Task 4 Show the Routing Tables for Each Router 292 Task 5 Show the RIP Routing Table Entries for Each Router 293 Task 6 Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 293 Lab 7-3 Preventing Routing Updates Through an Interface (7. 2. 7) 295 Task 1 Configure the Routers 296 Task 2 Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Defa ult Gateways 296 Task 3 Check the Basic Routing Configuration 296 Task 4 Observe RIP Routing Updates 297 Task 5 Stop Routing Updates from GAD to BHM 298Task 6 Add a Default Route to BHM 298 Lab 7-4 Load match Across duplex Paths (7. 2. 9) 301 Task 1 Configure the Routers 302 Task 2 Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 303 Task 3 Check the Basic Routing Configuration 303 Task 4 Ensure That the Router Load-Balances on a Per-Packet buns 304 Task 5 Verify Per-Packet Load Balancing 304 Task 6 Verify Per-Destination Load Balancing 305 Lab 7-5 Configuring IGRP (7. 3. 5) 306 Task 1 Configure the Routers 307 Task 2 Configure the Routing Protocol on the GAD Router 307 Task 3.Save the GAD Router Configuration 307 Task 4 Configure the Routing Protocol on the BHM Router 308 Task 5 Save the BHM Router Configuration 308 Task 6 Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 308 Task 7 Verify That the Internetwo rk Is Functioning by Pinging the FastEthernet Interface of the Other Router 308 xx Routers and Routing Basics CCNA 2 Labs and Study Guide Task 8 Show the Routing Tables for Each Router 308 Task 9 Verify the Routing Protocol 309 Task 10 Verify the IGRP Statements in the Running Configuration of Both Routers 310Task 11 Verify the IGRP Routing Updates Using the debug ip igrp events Command 310 Task 12 Verify the IGRP Routing Updates Using the debug ip igrp transactions Command 311 Task 13 Analyze Specific Routes 311 Lab 7-6 Default Routing with RIP and IGRP (7. 3. 6) 314 Task 1 Configure the Routers 316 Task 2 Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 316 Task 3 Check the Basic Routing Configuration 316 Task 4 Verify Connectivity 316 Task 5 Configure Centre as the Connection to the Internet Service Provider (ISP) 316 Task 6 Set Up a Default Route on the Centre Router 316Task 7 Verify the Routing Tables 317 Task 8 Migrate the Network from RIP t o IGRP 317 Task 9 Check Centres Routing Table for the Static Default Route 318 Task 10 compose a Second Loopback Interface on Centre to Test the Default Route 318 Lab 7-7 Unequal-Cost Load Balancing with IGRP (7. 3. 8) 322 Task 1 Configure the Routers 323 Task 2 Configure Bandwidth on the MAD Router Interfaces 323 Task 3 Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 324 Task 4 Use the variance Command to Configure Unequal-Cost Load Balancing 324 Task 5 Check the Basic Routing Configuration 326Task 6 Verify Per-Packet Load Balancing 327 Task 7 Verify Per-Destination Load Balancing 328 Comprehensive Lab 7-8 Advanced RIP Configuration and Troubleshooting 332 Task 1 Cable the Lab 332 Task 2 Basic Router Configurations 333 Task 3 Interface Configurations 333 Task 4 Dynamic Routing Configurations 334 Task 5 Migration to RIP v2 335 Task 6 Configure and Redistribute a Default Route 339 Task 7 Optimize and Verify RIP Routing 340 Challenge Lab 7-9 RIP a nd Default Routing to ISP 342 Task 1 Cable the Lab 343 Task 2 Basic Router Configurations 343 Task 3 Interface Configurations 343Task 4 Dynamic Routing Configuration for BRANCH and HQ 344 xxi Task 5 Configure Static Routing on ISP 345 Task 6 Configure Primary Default Routing on HQ 346 Task 7 Configure BRANCH with a Floating Static Default Route 347 Task 8 Test the Backup Route 347 Task 9 Capture and Document Your Configurations 349 Chapter 8 TCP/IP Suite Error and Control Messages Study Guide 351 352 TCP/IP Error Messages ICMP 352 Vocabulary Exercise Completion 352 IP Packet Header Exercise 353 ICMP Message typesetters case Exercise 353 ICMP Destination Unreachable Codes Exercise 354 Concept Questions 355 Lab Exercises Chapter 9 356Basic Router Troubleshooting Study Guide 357 358 Examining the Routing Table 358 Vocabulary Exercises Completion 358 Interpreting a Routing Table Entry Exercise 360 The show ip route Options Exercise 361 Layer 2 and Layer 3 Address Exercise 361 Complete the Administrative Distance Table Exercise 362 Concept Questions 363 Network Testing Methods and Tips 363 Using the OSI Model to Troubleshoot 364 Match the Tool to the Layer Exercise 365 Concept Questions 365 Router and Routing Troubleshooting Tips 365 The show Command Exercise 366 The debug Command Exercise 371 Concept Questions 372 Lab Exercises 373Command Reference 373 Lab 9-1 Using show ip route to Examine Routing Tables (9. 1. 1) 373 Task 1 Configure the Routers 374 Task 2 Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 374 Task 3 Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 374 Task 4 Make Sure That Routing Updates Are Being Sent 375 Task 5 Show the Routing Tables for Each Router 376 Task 6 Enable IGRP Routing on Both Routers 376 xxii Routers and Routing Basics CCNA 2 Labs and Study Guide Task 7 Show the Routing Tables for Each Router Again 376Task 8 Add a Second Serial Cable Betwee n Routers 377 Task 9 Clear the Routing Tables on Both Routers 377 Task 10 Use show ip route to See Different Routes by Type 377 Lab 9-2 Gateway of Last Resort (9. 1. 2) 380 Task 1 Configure the Routers 381 Task 2 Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 381 Task 3 Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 381 Task 4 Make Sure That Routing Updates Are Being Sent 381 Task 5 Show the Routing Tables for Each Router 382 Task 6 Add the Default Route to the BHM Router 382Task 7 Add the Default Route to the GAD Router 382 Task 8 Remove RIP Routing from Both Routers 382 Task 9 Remove the Default Route from Only the GAD Router 382 Task 10 Remove RIP Routing from the Routers and Use IGRP instead 383 Task 11 Enter a Default Network Entry on the BHM Router 383 Lab 9-3 Last Route Update (9. 1. 8) 386 Task 1 Configure the Routers 386 Task 2 Configure the Hosts with the Proper IP Addresses, Subn et Masks, and Default Gateways 387 Task 3 Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 387Task 4 Make Sure That Routing Updates Are Being Sent 387 Task 5 Show the Routing Tables for Each Router 387 Task 6 Check the Routing Table for a Specific Route 388 Task 7 Check the IP RIP Database on the BHM Router 389 Task 8 Configure IGRP Using AS Number 101 on All Routers 389 Task 9 From BHM, Enter show ip route 390 Task 10 Check the Routing Protocol on Router BHM 390 Lab 9-4 Troubleshooting Using ping and telnet (9. 2. 6) 393 Task 1 Configure the Routers 394 Task 2 Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 395 Task 3 Check the Connections 395Task 4 Troubleshoot 395 Task 5 List the Findings 395 Task 6 Perform the Lab Again with Team Members 1 and 2 giveing Roles 395 Lab 9-5 Troubleshooting Using traceroute (9. 3. 4) 398 Task 1 Configure the Routers 399 Task 2 Configure the Workstations with t he Appropriate IP Address Subnet Masks and Default Gateways 399 Task 3 Ping from the Workstations 399 Task 4 Test Layer 3 Connectivity four hundred Task 5 Log in to the Router in User Mode 400 Task 6 Discover the trace Options 400 xxiii Task 7 Use the traceroute Command 401 Task 8 Continue Using traceroute 401 Task 9 Use the tracert Command from a Workstation 401Lab 9-6 Troubleshooting Routing Issues with show ip route and show ip protocols (9. 3. 5) 404 Task 1 Configure the Hostname, Passwords, and Interfaces on the GAD Router 405 Task 2 Configure the Routing Protocol on the GAD Router 405 Task 3 Save the GAD Router Configuration 405 Task 4 Configure the Hostname, Passwords, and Interfaces on the BHM Router 406 Task 5 Configure the Routing Protocol on the BHM Router 406 Task 6 Save the BHM Router Configuration 406 Task 7 Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 406 Task 8 Examine the Routing Table 406Task 9 Examine the Ro uting Protocol Status 406 Task 10 Change the Configuration to Route the Correct Networks 407 Task 11 Confirm That RIP Is Routing the Correct Networks 407 Task 12 Verify the Routing Table 408 Task 13 Verify Connectivity Between the GAD Router and the Host in BHM 408 Lab 9-7 Troubleshooting Routing Issues with debug (9. 3. 7) 412 Task 1 Configure the Hostname, Passwords, and Interfaces on the GAD Router 413 Task 2 Configure the Routing Protocol on the GAD Router 413 Task 3 Save the GAD Router Configuration 413 Task 4 Configure the Hostname, Passwords, and Interfaces on the BHM Router 413Task 5 Configure the Routing Protocol on the BHM Router 413 Task 6 Save the BHM Router Configuration 413 Task 7 Gather FactsAsk and Listen 414 Task 8 Gather FactsTest Basic Functionality 414 Task 9 Gather FactsStart Testing to Isolate the Problem 414 Task 10 Examine the Routing Table 414 Task 11 Examine the Routing Protocol Status 415 Task 12 Gather FactsIdentify the Exact Problem 415 Task 13 Consider the Possibilities 416 Task 14 Create an Action Plan 416 Task 15 Implement the Action Plan 416 Task 16 Observe the Results 416 Challenge Lab 9-8 Basic Routing Troubleshooting 420Task 1 Cable the Lab 420 Task 2 Determine an Appropriate Addressing Scheme 420 Task 3 Router, Routing, and PC Configuration 421 Task 4 Verify and Troubleshoot Your Network Configuration 422 xxiv Routers and Routing Basics CCNA 2 Labs and Study Guide Chapter 10 Intermediate TCP/IP Study Guide 425 426 TCP and UDP Operation 426 Vocabulary Exercise Completion 426 TCP Segment Format Exercise 427 UDP Segment Format Exercise 427 Concept Questions 427 Operation of Transport Layer Ports 428 Vocabulary Exercise Completion 428 TCP and UDP Port Numbers Exercise 429 Comparing Layer 2, Layer 3, and Layer 4 Addresses 429Lab Exercises 431 Command Reference 431 Curriculum Lab 10-1 quaternary Active Host Sessions (10. 1. 6) 431 Task 1 Configure the Hostname, Passwords, and Interface on the GAD Router 432 Task 2 Save the Confi guration Information from Privileged EXEC Command Mode 432 Task 3 Configure the Host 432 Task 4 include HTTP Access to the Router 432 Task 5 Use the Workstation Browser to Access the Router 432 Task 6 Telnet to the Ethernet Interface on the Router from the Host 432 Task 7 Start a Second Telnet Session to the Router 432 Task 8 Check the Sessions on the Host 433Curriculum Lab 10-2 Well-Known Port Numbers and Multiple Sessions (10. 2. 5) 434 Task 1 Configure the Hostname, Passwords, and Interface on the GAD Router 434 Task 2 Save the Configuration Information from Privileged EXEC Command Mode 435 Task 3 Configure the Host 435 Task 4 Allow HTTP Access to the Router 435 Task 5 Use the Workstation Browser to Access the Router 435 Task 6 Telnet to the Ethernet Interface on the Router from the Host 435 Task 7 Start a Second Telnet Session to the Router 435 Task 8 Start a Third Telnet Session to the Router 435 Task 9 Start a Fourth Telnet Session to the Router 436Task 10 Check the Number of Sessions on the Host 436 Task 11 Check the Number of Sessions on the Router 437 Chapter 11 Access Control Lists (ACLs) Study Guide 439 440 Access Control List Fundamentals 440 Basic ACL Concepts and Rules Exercises 440 ACL Flow Chart Exercise 441 xxv Standard ACL Syntax Exercise 443 Determine the Wildcard Mask Exercise 443 Concept Questions 444 Access Control Configuration 445 Standard ACL Configuration Exercises 445 Standard ACL Scenario 1 446 Standard ACL Scenario 2 447 Standard ACL Scenario 3 447 Extended ACL Scenario 1 447 Extended ACL Scenario 2 448Extended ACL Scenario 3 449 Extended ACL Scenario 4 449 Extended Named ACL Scenario 450 Restricting vty and HTTP Access 450 Lab Exercises 452 Command Reference 452 Lab 11-1 Configuring Standard Access Lists (11. 2. 1a) 453 Task 1 Configure the Hostname and Passwords on the GAD Router 453 Task 2 Configure the Hosts on the Ethernet Segment 454 Task 3 Save the Configuration Information from Privileged EXEC Command Mode 454 Task 4 Confi rm Connectivity by Pinging the Default Gateway from Both Hosts 454 Task 5 Prevent Access to the Ethernet Interface from the Hosts 454 Task 6 Ping the Router from the Hosts 454Task 7 Apply the ACL to the Interface 454 Task 8 Ping the Router from the Hosts 455 Task 9 Create a New ACL 455 Task 10 Apply the ACL to the Proper Router Interface 455 Task 11 Ping the Router from Each Host 455 Lab 11-2 Standard ACLs (11. 2. 1b) 457 Task 1 Perform Basic Router Interconnection 458 Task 2 Perform Basic Configuration 458 Task 3 Establish Access List Requirements 458 Task 4 Plan the Access List Requirements 458 Task 5 Write and Apply the ACL 459 Task 6 Verify the ACL 460 Task 7 Document the ACL 461 Lab 11-3 Configuring Extended Access Lists (11. 2. 2a) 464Task 1 Configure the Host Name and Passwords on the GAD Router 464 Task 2 Configure the Hosts on the Ethernet Segment 465 Task 3 Save the Configuration Information from Privileged EXEC Command Mode 465 Task 4 Confirm Connectivity by Pinging the D efault Gateway from Both Hosts 465 Task 5 Connect to the Router Using the Web Browser 465 twenty-six Routers and Routing Basics CCNA 2 Labs and Study Guide Task 6 Prevent Access to HTTP (Port 80) from the Ethernet Interface Hosts 465 Task 7 Apply the ACL to the Interface 465 Task 8 Ping the Router from the Hosts 465 Task 9 Connect to the Router Using the Web Browser 466Task 10 Telnet to the Router from the Hosts 466 Lab 11-4 saucer-eyed Extended Access Lists (11. 2. 2b) 467 Task 1 Perform Basic Router and Host Configurations 468 Task 2 Prevent the Production Users from Accessing the Gadsden Network 470 Task 3 Allow a Production User Access to the Gadsden Network 472 Task 4 Allow Gadsden Users Access to the cheek Payroll Server 473 Task 5 Document the ACL 474 Lab 11-5 Configuring a Named Access List (11. 2. 3a) 477 Task 1 Configure the Hostname and Passwords on the GAD Router 478 Task 2 Configure the Hosts on the Ethernet Segment 478Task 3 Save the Configuration Information from Pr ivileged EXEC Command Mode 479 Task 4 Confirm Connectivity by Pinging the Default Gateway from Both Hosts 479 Task 5 Prevent Access to the Ethernet Interface from the Hosts 479 Task 6 Ping the router from the Hosts 480 Task 7 Apply the ACL to the Interface 480 Task 8 Ping the Router from the Hosts 480 Lab 11-6 Simple DMZ Extended Access Lists (11. 2. 3b) 481 Task 1 Perform Basic Router and Host Configurations 482 Task 2 Protect the Corporate Network 486 Task 3 Protect the DMZ Network 490 Task 4 Deter Spoofing 495 Task 5 Document the ACL 498Lab 11-7 Multiple Access Lists Functions (11. 2. 3c) 502 Task 1 Perform Basic Router Interconnection 503 Task 2 Design the Internetwork Addressing Scheme 504 Task 3 Perform Basic Router Configuration 504 Task 4 Configre the Clients 505 Task 5 Secure the Intranet Server 505 Task 6 Secure the Intranet Documents 506 Task 7 Deter Internet Abuse 506 Task 8 Deter DoS Attacks 507 Task 9 Stop Telnet into the Routers 508 Task 10 Verify the Access Lists 509 Lab 11-8 VTY Restriction (11. 2. 6) 510 Task 1 Perform Basic Router Interconnection 511 Task 2 Perform Basic Configuration 511Task 3 Create the Access List That Represents the Gadsden LAN 511 Task 4 Apply the Access List to Permit Only the Gadsden LAN 511 Task 5 Test the Restriction 512 xxvii Task 6 Create the Restrictions for the BHM Router 513 Task 7 Document the ACL 514 Comprehensive Lab 11-9 Standard, Extended, and Named ACLs 518 Task 1 Cable and Document the Lab 518 Task 2 Router, Routing, and PC Configuration 519 Task 3 Verify and Troubleshoot Your Network Configuration 524 Task 4 Configure and Verify Access Control Lists 525 Challenge Lab 11-10a Three Routers with Multiple ACL Configurations (Form A) 533Task 1 Cable the Lab 534 Task 2 Router, Routing, and PC Configuration 534 Task 3 Verify and Troubleshoot Your Network Configuration 534 Task 4 Configure and Verify Access Control Lists 535 Challenge Lab 11-10b Three Routers with Multiple ACL Configurations (Form B) 541 Task 1 Cable the Lab 542 Task 2 Router, Routing, and PC Configuration 542 Task 3 Verify and Troubleshoot Your Network Configuration 542 Task 4 Configure and Verify Access Control Lists 543 Appendix A CCNA 2 Skills-Based Assessment Practice Appendix B Router Interface Summary Appendix C Erasing and Reloading the Router 557 559 551 xxviiiRouters and Routing Basics CCNA 2 Labs and Study Guide Icons Used in This Book Communication Server PC PC with Software Terminal File Server Macintosh Access Server ISDN/Frame Relay Switch Cisco Works Workstation ATM Switch Modem Sun Workstation Token Ring Token Ring pressman Laptop Web Server IBM Mainframe Front End Processor Cluster Controller Multilayer Switch FDDI Gateway Router Network Cloud Bridge Line Ethernet Hub Line Serial DSU/CSU DSU/CSU FDDI Catalyst Switch Line Switched Serial Command Syntax Conventions The conventions that present command syntax in this book are the aforementioned(prenominal) conventions used in the IOS Command Reference.The Command Reference describes these conventions as follows Bold indicates commands and keywords that are entered literally as shown. In actual configuration examples and output (not general command syntax), bold indicates commands that are manually infix by the user (such as a show command). Italic indicates arguments for which you supply actual values. Vertical nix () separate alternative, mutually exclusive elements. Square brackets ( ) indicate optional elements. Braces ( ) indicate a compulsory choice. Braces within brackets ( ) indicate a required choice within an optional element. xxix IntroductionRouters and Routing Basics CCNA 2 Labs and Study Guide is a supplement to your classroom and laboratory experience with the Cisco Networking Academy Program. Specifically, this book covers the second of four courses. To be successful in this course and achieve your CCNA certification, you should do everything possible to arm yourself with a variety of tools and training mate rials to support your learning efforts. This book is just such a collection of tools. Used to its fullest extent, it can help you gain the knowledge as well as exercise the skills associated with the content area of the CCNA 2 Routers and Routing Basics course.Specifically, this book can help you work on these master(prenominal) areas of CCNA 2 Configuring a router Managing the Cisco IOS Selecting a routing protocol Verifying and troubleshooting a network Implementing basic security with access control lists Books similar to this one are to a fault available for the other three courses Networking Basics CCNA 1 Labs and Study Guide, Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide, and WAN Technologies CCNA 4 Labs and Study Guide. Goals and Methods One of the most important goals of this book is to help you prepare for either the CCNA exam (640-801) or the introduction exam (640-821).Whether you are studying for the full exam or the first part of your CCN A, passing either of these exams means that you not only have the required knowledge of the technologies cover by the exam, but that you can also plan, design, implement, operate, and troubleshoot these technologies. In other words, these exams are rigorously application-based. In fact, if you view the main objectives for the CCNA exam at http//www. cisco. com/go/certifications, you can see the following four categories of objectives Planning & Design Implementation & Operation Troubleshooting technologyAlthough Technology is listed last, a CCNA student cannot possibly plan, design, implement, operate, and troubleshoot networks without first fully grasping the technology. So you must devote macroscopical amounts of time and effort in the Study Guide section of each chapter, learning the concepts and theories before applying them in the Lab Exercises. The Study Guide section offers exercises that help you learn the concepts and configurations that are crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes some or all of the following types of exercises Vocabulary Matching and Completion Skill-Building Activities and Scenarios Configuration Scenarios Concept Questions Journal Entries Internet Research xxx Routers and Routing Basics CCNA 2 Labs and Study Guide The Lab Exercises section includes a Command Reference table, all the online Curriculum Labs, and virgin Comprehensive Labs and Challenge Labs. The Curriculum Labs typically walk you through the configuration tasks step by step. The Comprehensive Labs include many, if not all, of the configuration tasks of the Curriculum Labs without actually providing you with the commands.The Challenge Labs take this a step further, ofttimes giving you only a general requirement that you must implement fully without the details of each small step. In other words, you must use the knowledge and skills you gained in the Curriculum Labs to successfully complete the Compr ehensive and Challenge Labs. In fact, you should not attempt the Comprehensive or Challenge labs until you have worked through all the Study Guide activities and the Curriculum Labs. Avoid the temptation to work through the Comprehensive and Challenge Labs by flipping back through the Curriculum Labs when you are unsure of a command.Do not try to shrink from your CCNA training. You need a deep arrangement of CCNA knowledge and skills to ultimately be successful on the CCNA exam. How This Book Is Organized Because the content of Routers and Routing Basics CCNA 2 Companion Guide and the online course is sequential, you should work through this book in order, beginning with Chapter 1. Chapters 1 through 11 cover the following topics Chapter 1, WANs and RoutersAfter presenting a hardly a(prenominal) vocabulary exercises covering the topic of WANs, this chapter delves into the internal and external components of routers.Understanding how a router works and how you connect to a router are important concepts and skills you need throughout the rest of your CCNA studies. The three Curriculum Labs focus your perplexity on connecting LANs and WANs victimisation routers. An additional Challenge Lab helps you review the skills learned in the Curriculum Labs. Chapter 2, Introduction to RoutersThis chapter discusses the basics of exploitation the command-line interface (CLI). Several exercises help you solidify your skills with using the CLI.In addition, you work through exercises that focus on understanding the router boot sequence and interpreting output from the show version command. The three Curriculum Labs focus your oversight on the configuration tasks covered in the chapter. Two additional labs, a Comprehensive Lab and Challenge Lab, help you review the commands and skills learned in the Curriculum Labs. Chapter 3, Configuring a RouterThis chapter first focuses on basic router configuraion, including learning the commands that every router uses as well as acti vating interfaces and setting up basic routing.Then your precaution turns to file-management issues supporting up the configuration and the IOS. The ten Curriculum Labs focus your attention on the router configuration and file-management tasks covered in the chapter. Two additional labs, a Comprehensive Lab and Challenge Lab, help you review the commands and skills learned in the Curriculum Labs. Chapter 4, Learning About Other DevicesThe Cisco IOS software offers a powerful tool for fabrication information about other directly connected devices through its Cisco Discovery Protocol (CDP).This chapters exercises center your attention on the benefits of using CDP as a network engineer. Other commands, including telnet and traceroute, are also part of your tool kit for learning about other network devices. So you spend some time on these as well. The eight Curriculum Labs focus your attention on the configuration tasks covered in the chapter. Two additional Comprehensive Labs help y ou review the commands and skills learned in the Curriculum Labs. Chapter 5, Managing Cisco IOS SoftwareThis chapter examines in detail how a router boots and loads the IOS.Knowing the default boot sequence as well as how to change the sequence is an important part of your network engineers skill set. Exercises focus on the boot sequence, the boot system commands, the configuration register, the IOS naming convention, and methods for uploading and downloading an IOS. The six Curriculum Labs focus your attention on the configuration tasks covered in the chapter. An additional Challenge Lab helps you review the commands and skills learned in the Curriculum Labs. xxxi Chapter 6, Routing and Routing ProtocolsThis chapter covers a crucial topic for any CCNA candidate routing.Exercises focus on read routing table output from the show ip route command, using static routing, choosing a routing protocol, understanding propellent routing, and learning basic Routing Information Protocol (RIP ) configuration. The Curriculum Lab focuses your attention on configuring static routes. Two additional labs, a Comprehensive Lab and Challenge Lab, help you review the commands and skills learned in the chapter. Chapter 7, Distance Vector Routing ProtocolsThis chapter covers how distance vector routing avoids loops.In addition, you extend your skills in configuring RIP and you learn some valuable troubleshooting tools. The septenary Curriculum Labs focus your attention on the configuration tasks covered in the chapter. Two additional labs, a Comprehensive Lab and Challenge Lab, help you review the commands and skills learned in the chapter. Chapter 8, TCP/IP Suite Error and Control MessagesThis chapter takes a brief look at the Internet Control Message Protocol (ICMP). A basic understanding of the IP packet header and the most important ICMP messages are covered.There are no labs in this chapter. Chapter 9, Basic Router TroubleshootingThis chapter focuses exclusively on your troubl eshooting skills. For a major part of the CCNA exam, you must be proficient at troubleshooting a simple internetwork. Exercises include dissecting a routing table entry, knowing troubleshooting steps, matching a problem to the correct layer, and reviewing the most powerful show and debug commands. The seven Curriculum Labs focus your attention on the configuration tasks covered in the chapter.An additional Challenge Lab helps you review the commands and skills learned in the Curriculum Labs. Chapter 10, Intermediate TCP/IPThis chapter is mostly a review of material covered in your CCNA 1 studies. Exercises include learning vocabulary, reviewing TCP and User Datagram Protocol (UDP) segments, understanding port numbers, and comparing Layers 2, 3 and 4. The two Curriculum Labs focus your attention on how port numbers work to allow nine-fold sessions for the same host or application. Chapter 11, Access Control Lists (ACLs)This chapter covers the fundamentals of access control lists.Hav ing a basic understanding of ACLs and knowing how to implement them are crucial to your success on the CCNA exam and in the networking field. Therefore, the exercises in this chapter are extensive. First, you work through some exercises that help you understand what ACLs are and how they operate. Then you work through eight ACL configuration exercises and scenarios that focus on CCNA-level security implementations. The eight Curriculum Labs focus your attention on the configuration tasks covered in the chapter. An additional Challenge Lab helps you review the commands and skills learned in the Curriculum Labs.Appendix A, CCNA 2 Skills-Based Assessment PracticeThis addendum contains a practice lab for the Skills-Based Assessment in which you are required to demonstrate all the skills covered in the CCNA 2 course. Appendix B, Router Interface SummaryThis appendix provides a chart of the router interface identifiers that you need for the curriculum-based labs in each chapter. Appendix C, Erasing and Reloading the RouterThis appendix guides you through the unconscious process for clearing out previous configurations and starting with an unconfigured router for use in the Curriculum Labs in each chapter. This page intentionally left blank