Friday, March 13, 2020
The eNotes Blog On Following Your Passion Interview with YumiSakugawa
On Following Your Passion Interview with YumiSakugawa Yumi Sakugawa is a writer and illustrator located in Los Angeles, CA. She works with as our primary illustrator, and has published two books,à I Think Im in Friend-Love With Youà andà Your Illustrated Guide to Becoming One with the Universe. Her work is sincere and ethereal, striking a à balance between poignant and peculiar. We are obviously fans- but we think youll enjoy her perspective and her answers from our quick chat with her. When did you first become interested in drawing and writing comics? Were you a student that doodled in the margins of your notebooks? Ive always loved drawing, writing and making up stories ever since I was maybe five or six years old. And yes, much to the constant exasperation of all my teachers, I was a student who doodled way too much in the margins of my notebooks. What was it like the first time you were published? How old were you, and what do you remember most about the experience? My first published bookà I Think Im in Friend-Love With Youà came out in 2014. I was 29-years-old. It had always been a bucket list item of mine to have a published book before turning 30, so seeing my book in bookstores was and is a very gratifying experience. What comes first when developing your comics, the words, or the illustrations? Do you think thereââ¬â¢s a particular reason for this order? Is it contingent upon the project? It varies project by project. Sometimes the imagery comes first, sometimes the words come first. With every story, it is whatever feels the most intuitive. It appears that much of your work relies on your own proximate relationship with the universe, how do you interpret your personal spirituality and apply it to your artwork. Are there particular objects or moments that you feel best represent your perspective on spirituality? I once had this surreal spiritual experience when I was 23-years-old, sitting on the ground outdoors, and looking up at a moon slowly moving across the length of the night sky. Suddenly I had an image of a divine figure pushing the moon with the tip of his or her celestial fingertips and I was so blown away by that concept for a few moments I felt the boundaries between myself and the rest of the universe completely vanish. I always go back to that moment when I think about what spirituality and art mean to me. It is all about interconnectedness and being an ocean as opposed to an island. How did you get your start as a writer/artist? Did anyone in particular influence you? I made a bunch of comics and kept sharing them on the internet or through self-published zines until one day I happened to accidentally create a web comic that went viral which eventually lead to the publication of my first book. Alex and Ann Chiu are an awesome artist couple now based in Portland who first introduced me to zine culture. We love your books I Think I am in Friend-Love with You and Your Illustrated Guide to Becoming One with the Universe, they seem to be equal parts honest and surreal. What artists have influenced you the most, and how have you been able to define your own style as an artist? I dont know if I really have an answer for how to define your own style as an artist. You keep making work that feels the most honest to you, and from there your own unique voice and perspective subconsciously emerge from the act of making work over and over again. Haruki Murakami, Aimee Bender, Ray Bradbury, Miranda July, Adrian Tomine, Jillian Tamaki, Michael DeForge, Moto Hagio, Inka Essenhigh are some of the many artists, cartoonists and writers off the top of my head whom I consider to be an influence. As the primary illustrator for , you must have a pretty vast knowledge of the written works we have study guides for, do you have any favorite illustrations of books that youââ¬â¢ve done for the site? If so, what are they, and why do you like them so much? I really like the image I came up with forà Catcher in the Rye. I love stories about adolescent coming-of-age. Where do you see yourself in five years? What long-term goals do you have set? I hope to still be living in Los Angeles, but with a house and a backyard so that I can finally own a dog. That, and still be making comics and art. The Everyday eNoterââ¬â¢s bookshelf is always full, whatââ¬â¢s your current favorite read? Why? My favorite book Ive read all year so far isà The First Bad Manà by Miranda July. It is weird, intensely honest, and mesmerizing from beginning to end. It feels like a punch in the heart. Whatââ¬â¢s the best advice youââ¬â¢ve ever received from a professor or teacher? A writing mentor of mine once said, Just get it done. What advice can you give the students that use about pursuing their dreams? Just get it done. Also, meditate every day for 20 minutes. Looking back, what advice would you give your freshman self? I dont know, with the time travel paradox and all that, I think Ill just let my freshman self do her own thing. Im pretty content with how things are in my life right now! And finally, whatââ¬â¢s your go-to music/soundtrack for working/writing? Indie rock and moody instrumentals from the early 00s because my music tastes are eternally frozen in my college years. To learn more about Yumi and her artwork and books, visità her website and follow her onà Instagramà and Twitter. Also, be sure to check out 20 Illustrations of Shakespeare Quotes where we showcase her Shakespeare play scene illustrations.
Tuesday, February 25, 2020
Identification and analysis of DNA repair mechanisms Thesis
Identification and analysis of DNA repair mechanisms - Thesis Example In both of these cases, DNA repair systems involve the use of the Mre11/Rad50/NBS1 complex. This project aims to identify and examine what DNA repair systems are present in the cells of Schizosaccharomyces pombe and how these contribute to resistance to treatment with nucleoside analogues. This information should help to provide further insight into the way in which human cells are able to develop resistance to this form of treatment, and perhaps provide some indication of a method to prevent this. Table of Contents Abstract 2 Introduction 4 DNA repair and cancer 6 DNA replication 7 DNA repair 9 MRN Complex 11 Topoisomerase inhibitors 13 Nucleoside analogues 15 Involvement of DNA repair 17 Project System 20 Aims and Objectives 21 References 22 Introduction In everyday life, cells are exposed to external and internal agents that cause thousands of DNA mutations per day. These mutations range from being small, such as affecting a single nucleotide, to large mutations where accurate rep air can be difficult. For the accurate propagation of the genetic information within cells, it is essential that the body has mechanisms of repairing damage in a reliable manner. However, while many methods for DNA repair exist, these are not always successful and mutations can accumulate, resulting in the development of cancer (Helleday et al., 2007). Understanding these processes, why they occur the way that they do and what can be done to influence these is crucial for knowing the way that cancer occurs, and determining methods of treating it effectively. In our modern society, cancer has remained one of the most well studied diseases and perhaps one of the least understood. The fundamental aspects of cancer are damage in the DNA of a cell that results in a lack of control over cell growth and replication, as well reducing the likelihood that cells will enter apoptosis. These cells are able to proliferate well beyond the normal constraints of the tissue that they are in (Loeb and Loeb, 2000). With high levels of replication and low cell death, abnormal cells build up within the body and interfere with body functions. The exact mechanisms that causes these mutations to occur, and allows the cells to break free of the cell control pathway are the focus of much current research into cancer, as understanding these pathways may help to develop treatment or prevent cells from entering this state. Cancer is a disease where mutations in DNA accumulate to the point that traditional controls over cell behaviour can be bypassed, often involving the accumulation of mutations in genes responsible for the birth or death of the cell, as well as controls over the cell cycle (Lengauer et al., 1998). Research indicates that the tumours developed as the result of cancer are heterogeneous (Loeb et al., 2003). Because of this, cancer needs to be thought of as a collection of disease rather than a single disease (Huang et al., 2006). This is an important factor when studying can cer, as it explains why some mechanisms are prevalent in some forms of cancer, but not others. Genetic instability is thought to be one of the driving factors of the development of tumours and this in turn is driven by DNA damage and errors in the replication machinery. However, spontaneous mutation is only one aspect of the puzzle, and the prevalence of cancer development and succession of mutations
Sunday, February 9, 2020
Arms and International Relations Essay Example | Topics and Well Written Essays - 1500 words
Arms and International Relations - Essay Example There had been considerable unrest and tension between the countries of Eastern and Western Europe. As such, the West European Arms Industry suffered a serious setback due to European integration. There have been rapid developments to address the disruption of the relations between the military and the industry. These changes in the production of arms resulted in several issues, relating to employment, technology, national security and foreign policy. It was perceived that the European nations would find a solution for these challenging tasks. The decisions taken by these countries will invariably affect the employment of a large number of workers in the arms production industry. Furthermore, these decisions could also affect national and international policies, in the areas of technology, economics, arms procurement and international integration (Brzoska & Lock, 1992. Page 4 ââ¬â 5). The annual toll in human life, exacted by small arms, all over the world comes to nearly half a million. Furthermore, the number of people who succumb to small arms is more than the number of people who are slain by missiles or weapons of mass destruction. The international arms control agreements are deeply concerned about this extremely distressing situation; and almost a hundred companies are lobbying to suitably change arms regulations, so as to address this alarming phenomenon. These companies want to form a new treaty that will be aimed at regulating the trade in small arms. The United Kingdom, Japan and several other nations are forging ahead to create such a new treaty. This new treaty would prohibit the sale and purchase of small but lethal weapons, like hand guns and grenade launchers (Falby, October 15, 2007). In the earlier stages this prohibition will be implemented on the rogue states that have a dismal record, regarding human rights. It would also be applied to countries, which employ these
Thursday, January 30, 2020
Decision-Making Process Essay Example for Free
Decision-Making Process Essay Decision-making is a part of everyday life. One must decide on a daily basis; which route to take to work, which has less traffic, coffee or breakfast, or if the morning routine is altered by unexpected situations, which way to continue with the day ahead? According to Bateman and Snell (2011), the ideal decision-making process includes six stages; (1) identify and diagnose the problem, (2) generate alternative solutions, (3) evaluate alternatives, (4) make the choice, (5) implement the decision, and (6) evaluate the decision (p. 89). The process does not have to be thoroughly explained to realize many of the decisions one takes goes through these stages or some of them. One of the types of decisions one must carefully think and analyze before irrationally taking the plunge would have to be the purchase of oneââ¬â¢s home. This type of decision is a very long-term commitment and a bit expensive. However, if properly acquire the decision; it is very worth-while. Buying a house or home starts at stage 1; one starts with identifying the problem or in this case the ââ¬Å"wantingâ⬠to buy something to call home. It then follows to stage 2: generating alternative decisions. Stage 2 one is able to question if the house is really necessary. There are many suitable apartments and housing options as well. In this stage one also gets to question and calculate if it is within budget or if not, what one will have to do to be able to purchase the house. Once the financial side of the situation is evaluated and one still would like to continue it rolls into stage 3. Stage 3 consists of evaluating alternatives. In this stage one can go through the process of seeking locations, areas and house plans to choose what best fits with the ideal perfect home. This stage also allows to pick and choose what is best suitable for your home and knowing if there will be an upgrade made and changing the original price of the house. Staying with two suitable options and deciding from them will glide one to the next stage. Yes or No, Stage 4 is the decision-making part of the process. Once it has been decided to buy the house, the decision is implemented, Stage 5. Starting the necessary contracts and paper work to make this house oneââ¬â¢s new home. The last step of the decision-making process is to evaluate the decision. In Stage 6 consists of one finalizing the process and setting down the last signature on the paper work and/or putting the down payment out on the table. In this type of choice all the steps in the decision-making process were followed. Nothing could have made it easier. As one can see the purchase of a new home, car, changing jobs and/or even choosing what school to send children to takes a decision-making process. Not all the steps are needed in some cases but some steps are automatically done like choosing alternatives.
Wednesday, January 22, 2020
Gatsby and the American Dream Essays -- The Great Gatsby F. Scott Fitz
The American Dream is what we all aspire to achieve. The idea of starting off with nothing and to become something has caused millions of people from all corners of the world to immigrate to this country for over 300 years. However, what exactly is the American Dream? F Scott Fitzgerald answers this question within his novel The Great Gatsby. Through the eyes of Nick Carraway, Fitzgerald analyses the high class of the 1920s and reveals that the American Dream has been distorted from a pure ideal of security into a convoluted scheme of materialistic power. Fitzgerald incorporates the aspects of both the Ãâold dreamÃâ & the Ãânew dreamÃâ in his tragic story to depicts how the inflexible dream has been corrupted and lost forever. à à à à à Fitzgerald illustrates in The Great Gatsby that the qualities of the original dream are perseverance and hope. The most glorified of these characteristics is that of success against all odd. The ethic of hard work can be found in the life of the young James Gatz. His focus on becoming a great man is thoroughly depicted in his ÃâHopalong CassidyÃâ journal. When Mr. Gatsby showed the tattered book to Nick, Mr. Gatsby said, ÃâJimmy was bound to get ahead. He always has some resolves like this or something. Do you notice what heÃâ¢s got about improving his mind? He was always great for thatÃâ. The ÃâHopalong CassidyÃâ symbolizes the continual struggle for self-improvement, which has been the basis of America a land of opportunity. Social Classes have always been apparent in civilization and America in the 1920s is no exception. Often those who rank in the lower classes usually feel that their problems will be resolved if they gain enough wealth to reach the upper class. This then offers a false connotation that the American Dream is this passage into to high social status and upon reaching that level, you are then able to abandon all economic worries. However, the American Dream involves more than acquiring wealth and a high social status. The dream involves attaining a balance between the spiritual strength and the physical strength of an individual. In the end of this book Jay GatsbyÃâ¢s ultimate goal to have Daisy love him never comes to fruition solely because he chooses to pursue his dream by engaging in a lifestyle of high class. The product of hard work is the longing Jay Gatsby, who contains the purest chara... ...umanityÃâ: ÃâSo we beat on, boats against the current, borne back ceaselessly into the pastÃâ. The dream is now completely gone without a possibility of being resurrected. Through unfolding events of a doomed romance, F Scott Fitzgerald also depicts the inevitable doom of the American Dream. Gatsby had no balance to the extremes of his material and spiritual sides of himself. His dream of winning over DaisyÃâ¢s love is masked by the desire to become rich. Fitzgerald created Gatsby to show the failure of the individual who believes the American Dream requires money. It is well documented America was to be a land of endless opportunity and wealth, however a nation needs more depth than itÃâ¢s promise of materialism. The true composition of a nation is the unity of its peopleÃâ¢s minds in order to achieve a universal acceptance. Fitzgerald uses Gatsby and the other characters to convey his message- The American Dream, once a pure and noble concept is now dead and buried into the ground by a dehumanized void which revolves around money. Perhaps the book is not a tribute to a man named Jay Gatsby, rather, a tribute of an a noble aspiration of realistic success which is now and forever gone.
Tuesday, January 14, 2020
M11Cde Skills-Based Assessment
School of Engineering & Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. . Download an electronic copy of this document and where there are blanks or spaces to complete addressing information etc. , please include them in the document. You submission should include the answers in the document, but do not change the document in any other way! If the document has been modified other than to include the required information your submissi on will be null and void. 3. Your files should be name as ââ¬Å"SID_FIRSTNAME_SURNAME. docâ⬠. E. g. 100292_FIRSTNAME_SURNAME. doc. 4. Save the configurations from all your network devices and embed them into the end of this document. 5.If you have attempted to configure VLANs, please also include a switch configuration from any one of your LAN switches. Please note that this must be a switch that you have actually configured VLANs on. 6. If you have implemented the network in Packet Tracer, you may consider submitting a copy of that as well but this is not compulsory. Zero Tolerance for late submission: If your work is late it will have to be marked zero according to new university policy. Please ensure you upload your work well before the deadline. You will be able to delete and update your work before the deadline. Plagiarism Note:As with all assessed work, both the research and written submission should be your own work. When submitting this work you are explicitly indicati ng that you have read the rules on plagiarism as defined in the University regulations and that all work is in fact your own, except where explicitly referenced using the accepted referencing style. Feedback and marking: The practical work will be marked by using the questions set in the online quiz and number of questions for each section will depend on the weightings set in the below sections. Feedbacks and marks will be provided once the online practical quiz is submitted.Network topology [Whilst the topology shows only two hosts on each LAN, you should configure four hosts on each LAN. ] Network Information The WAN IP network address between Dundee and Glasgow is 209. 154. 17. 0 with a subnet mask of 255. 255. 255. 0. The WAN IP network address between Edinburgh and Glasgow is 209. 154. 16. 0 with a subnet mask of 255. 255. 255. 0. This is clearly shown on the network topology. Dundee information The LAN for Dundee has been assigned an IP network address of 192. 168. 6. 0 Each s ubnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 40. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Dundee |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 6th usable subnet for the LAN.Do not use subnet zero as the first usable subnet. The table below shows how the 6th usable network can be identified. |Network |Network ID |First Host |Last Host |Broadcast |Mask | |0 |192. 168. 6. 0 |192. 168. 6. 1 |192. 168. 6. 14 |192. 168. 6. 15 |/28 | |1 |192. 168. 6. 16 |192. 168. 6. 17 |192. 168. 6. 30 |192. 168. 6. 31 |/28 | |2 |192. 168. 6. 2 |192. 168. 6. 33 |192. 168. 6. 46 |192. 168. 6. 47 |/28 | |3 |192. 168. 6. 48 |192. 168. 6. 49 |192. 168. 6. 62 |192. 168. 6. 63 |/28 | |4 |192. 168. 6. 64 |192. 168. 6. 65 |192. 16 8. 6. 78 |192. 168. 6. 79 |/28 | |5 |192. 168. 6. 80 |192. 168. 6. 81 |192. 168. 6. 94 |192. 168. 6. 95 |/28 | |6 |192. 168. 6. 6 |192. 168. 6. 97 |192. 168. 6. 110 |192. 168. 6. 111 |/28 | |7 |192. 168. 6. 112 |192. 168. 6. 113 |192. 168. 6. 126 |192. 168. 6. 127 |/28 | You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192. 168. 5. 0 Again, each subnet of the above network needs to accommodate 14 host addresses.The subnet mask will be 255. 255. 255. 240. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Edinburgh |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 |Use the 4th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. You must follow the example for Dundee to complete the table for step 1 planning. You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. The elements of the coursework are: 1. Planning and assigning addresses [30 marks] 2. Basic configuration [40 marks] 3. Security ACLs [10 marks] 4.Security VLANs [20 marks] The basic theme is that Glasgow (GLA) is regional headquarters of the company. Edinburgh and Dundee are branch offices. Each network associate (student) will be responsible for an entire network. This means that using either the lab equipment in EC1-13 or Packet Tracer, you will configure 3 routers, 2 switches and 8 PCs. A network address and specific number of hosts per subnet has been assigned for the local LAN on each network (Edinburgh and Dundee).From the information provided, the subnet address, the subnet mask, the first and last usable addresses and the broadcast address for each site LAN need to be determined. (When using the router or Packet Tracer ââ¬â it is expected that you keep a copy of your router configuration at each stage, just in case you run into problems). Step 1 Planning Using the chart below, plan the first ten usable subnets of the LAN address assigned to Edinburgh. You have been given the first 6 addresses for Dundee, you are now expected to plan for the first 10 addresses for Edinburgh. Subnet |Subnet |Subnet |First Host |Last Host |Broadcast | | |Address |Mask (/x) | | | | |0 |192. 168. 5. 0 |28 |192. 168. 5. 1 |192. 168. 5. 14 |192. 168. 5. 5 | |1 |192. 168. 5. 16 |28 |192. 168. 5. 17 |192. 168. 5. 30 |192. 168. 5. 31 | |2 |192. 168. 5. 32 |28 |192. 168. 5. 33 |192. 168. 5. 46 |192. 168. 5. 47 | |3 |192. 168. 5. 48 |28 |192. 168. 5. 49 |192. 168. 5. 2 |192. 168. 5. 63 | |4 |192. 168. 5. 64 |28 |192. 168. 5. 65 |192. 168. 5. 78 |192. 168. 5. 79 | |5 |192. 1 68. 5. 80 |28 |192. 168. 5. 81 |192. 168. 5. 94 |192. 168. 5. 95 | |6 |192. 168. 5. 96 |28 |192. 168. 5. 97 |192. 68. 5. 110 |192. 168. 5. 111 | |7 |192. 168. 5. 112 |28 |192. 168. 5. 113 |192. 168. 5. 126 |192. 168. 5. 127 | |8 |192. 168. 5. 128 |28 |192. 168. 5. 129 |192. 168. 5. 142 |192. 168. 5. 143 | |9 |192. 168. 5. 144 |28 |192. 68. 5. 145 |192. 168. 5. 152 |192. 168. 5. 159 | |10 |192. 168. 5. 160 |28 |192. 168. 5. 161 |192. 168. 5. 174 |192. 168. 5. 175 | For the WAN links for DUN and EDN the lowest usable address on the networks must be used. Identify and use the lowest usable WAN address for your S0 interface assigned to you for the two networks shown: 1 Dundee:209. 154. 17. 1 Edinburgh:209. 154. 16. 1 For security reasons, all of the production workstations will be assigned the lower-half of the IP addresses of the assigned subnet. All of the network devices and management stations will be assigned the upper-half of the IP address numbers of the subnet assigned for the L AN. From this upper half range of addresses, the Ethernet router interface (the default gateway on each LAN) is to be assigned the highest usable address. Identify the required IP address of the Ethernet interface on your two routers. Address of your Ethernet interface on Dundee : 192. 168. 6. 10 Address of your Ethernet interface on Edinburgh : 192. 168. 5. 78 The host (PC) configurations must also be planned. Using the table, complete the host information. |Branch: DUN |IP Address Range | |Production Host Range |192. 168. 6. 97ââ¬âââ¬âââ¬â192. 168. 6. 103 | |(Lower half) | | |Management Host Range |192. 168. 6. 104ââ¬âââ¬âââ¬â192. 168. 6. 10 | |(Upper half) | | [5 marks for ranges of addresses] Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 6. 97 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 Management Host (1) IP Address192. 168. 6. 104 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 |Branch: EDN |IP Address Range | |Production Host Range |192. 68. 5. 65ââ¬âââ¬âââ¬â192. 168. 5. 71 | |(Lower half) | | |Management Host Range |192. 168. 5. 72ââ¬âââ¬âââ¬â192. 168. 5. 78 | |(Upper half) | | Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 5. 65 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Management Host (1)IP Address192. 168. 5. 72 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Step 2 Basic Configuration Apply a basic configuration to the router. This configuration should include all the normal configuration items. You must supply one router configuration file. This will be either Dundee or Edinburgh. The router configuration files will be marked as follows: Basic Configuration â⬠¢ Router name â⬠¢ Console and VTY configuration and passwords (use ââ¬Ëciscoââ¬â¢, ââ¬Ëclassââ¬â¢ and ââ¬Ëberrilââ¬â¢ for console, secret and VTY passwords r espectively) â⬠¢ Interface configurations DTE/DCE identified appropriately and clockrates set only on DCE â⬠¢ Routing correct and working (RIP is fine) â⬠¢ Host tables â⬠¢ Banner display before login ââ¬â warn of unauthorised access Basic Configuration (40 marks) Security (ACLS ââ¬â Marked as part of step 3) 1. ACLs correct and applied to correct interface in correct direction [10] 2. ACLs correct but not applied to correct interface or direction [7 ââ¬â 9] 3. ACLs attempted but some errors or wrong placement [4 ââ¬â 6] 4. ACLs attempted but incorrect and not applied properly [1- 3] 5. ACLs not attempted [0]ACL Total (Total 10 marks) Step 3 Security There are several security concerns in the Internetwork. Develop Access Control Lists (ACLs) to address security issues. The following problems must be addressed: 1. The production hosts in both the Edinburgh and Dundee networks are permitted HTTP access to the 172. 16. 0. 0 network, management hosts are p ermitted no access to this network. 2. The company has discovered an Internet Web server at 198. 145. 7. 1 that is known to contain viruses. All hosts are banned from reaching this site. The ACLs are worth 10 marks. Step 4 VLANsThis step is the final 20% of the coursework mark. To achieve this step you should consider how you might use a VLAN to separate the production and management LANs. The goal is that neither network should be able to see the other network traffic. There is no additional guidance on this part of the skills test as you are expected to identify: 1. An appropriate VLAN number to use for each VLAN. 2. An appropriate VLAN configuration. 3. Implement the VLAN and provide the switch configuration file(s) to show that the VLAN has been implemented. VLAN Marks The VLAN component will be marked as follows: VLAN configured and correct configuration supplied [20] â⬠¢ VLAN identified but configuration incomplete or incorrect [10 ââ¬â 15] â⬠¢ VLAN attempted [5 â â¬â 10 depending on level of attempt] â⬠¢ VLAN not attempted [0] VLAN (Total 20 marks) Appendix Network device configurationsâ⬠¦Ã¢â¬ ¦ [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] Press RETURN to get started! Router>enable Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# Router(config)#hostname EDINBURGH EDINBURGH(config)#line console 0 EDINBURGH(config-line)#password ciscoEDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#line vty 0 4 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#enable password cisco EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH>en Password: EDINBURGH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#enable secret class EDINBURGH(config)#exit EDINBURGH# SYS-5-CONFIG_I: Configured from console by console [pic] [pic] EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip address 209. 154. 16. 1 255. 255. 255. 0 EDINBURGH(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial2/0, changed state to up EDINBURGH(config-if)#exit %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/0, changed state to up EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip address 192. 168. 5. 78 255. 255. 255. 240 EDINBURGH(config-if)#no shutdown LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up EDINBURGH(config-if)#exit EDINBURGH(config)#router rip EDINBURGH(config-router)#network 172. 16. 0. 0 EDINBURGH(config-router)#network 192. 168. 6. 0 EDINBURGH(config-router)#network 192. 168. 5. 0 EDINBURGH(config-rout er)#network 209. 154. 16. 0 EDINBURGH(config-router)#network 209. 154. 17. 0 EDINBURGH(config-router)#exit EDINBURGH(config)# banner motd #warn of unauthorised access# EDINBURGH(config)# banner login #do not enter if you are not authorized# EDINBURGH(config)#ip host DUN 209. 54. 17. 1 192. 168. 6. 110 EDINBURGH(config)#ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configurationâ⬠¦ [OK] EDINBURGH# EDINBURGH>show host Default Domain is not set Name/address lookup uses domain service Name servers are 255. 255. 255. 255 Codes: UN ââ¬â unknown, EX ââ¬â expired, OK ââ¬â OK, ââ¬â revalidate temp ââ¬â temporary, perm ââ¬â permanent NA ââ¬â Not Applicable None ââ¬â Not definedHost Port Flags Age Type Address(es) DUN None (perm, OK) 0 IP 192. 168. 6. 110 209. 154. 17 . 1 GLA None (perm, OK) 0 IP 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH> [pic] [pic] [pic] EDINBURGH#show r Building configurationâ⬠¦ Current configuration : 1291 bytes ! version 12. 2 no service timestamps log datetime msec no service timestamps debug datetime msec o service password-encryption ! hostname EDINBURGH ! ! ! enable secret 5 $1$mERr$9cTjUIEqNGurQiFU. ZeCi1 enable password cisco ! ! ! ! ! ! ! ! ip host DUN 192. 168. 6. 110 209. 154. 17. 1 ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 ! ! ! ! ! ! interface FastEthernet0/0 ip address 192. 168. 5. 78 255. 255. 255. 240 ip access-group 100 in duplex auto speed auto ! interface FastEthernet1/0 no ip address duplex auto speed auto shutdown ! interface Serial2/0 ip address 209. 154. 16. 1 255. 255. 255. 0 ip access-group 10 out ! interface Serial3/0 no ip address shutdown ! interface FastEthernet4/0 o ip address shutdown ! interface FastEthernet5/0 no ip address shutdown ! router rip network 172 . 16. 0. 0 network 192. 168. 5. 0 network 192. 168. 6. 0 network 209. 154. 16. 0 network 209. 154. 17. 0 ! ip classless ! ! access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www access-list 100 permit ip any any access-list 10 permit any access-list 10 deny host 198. 145. 7. 1 ! ! ! no cdp run ! banner login ^Cdo not enter if you are not authorized^C banner motd ^Cwarn of unauthorised access^C ! ! ! ! line con 0 password cisco login line vty 0 4 password cisco login ! ! ! endEDINBURGH# EDINBURGH#show access-lists configuration EDINBURGH(config)#access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq 80 EDINBURGH(config)#access-list 100 permit ip any any EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip access-group 100 in EDINBURGH(config-if)#exit EDINBURGH(config)#access-list 10 permit any EDINBURGH(config)#access-list 10 deny host 198. 145. 7. 1 EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if )#ip access-group 10 out EDINBURGH(config-if)#exit EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by consoleEDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configurationâ⬠¦ [OK] EDINBURGH# [pic] EDINBURGH#show access-lists Extended IP access list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www permit ip any any Standard IP access list 10 permit any deny host 198. 145. 7. 1 EDINBURGH# [pic] EDINBURGHSWITCH CONFIGURATION Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname EDINBURGHSWITCH EDINBURGHSWITCH(config)#line console 0 EDINBURGHSWITCH(config-line)#password ciscoEDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#line vty 0 4 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#enable password c isco EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#enable secret class EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH# EDINBURGHSWITCH#config tEnter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface vlan1 EDINBURGHSWITCH(config-if)#ip address 192. 168. 5. 77 255. 255. 255. 240 EDINBURGHSWITCH(config-if)#no shutdown %LINK-5-CHANGED: Interface Vlan1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up EDINBURGHSWITCH(config-if)#ip default-gateway 192. 168. 5. 78 EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#copy running-config startup-config Destination filename [startup-config]? Building configurationâ⬠¦ [OK ]EDINBURGHSWITCH# EDINBURGHSWITCH#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. EDINBURGHSWITCH(vlan)#vlan 10 name production VLAN 10 modified: Name: production EDINBURGHSWITCH(vlan)#vlan 20 name management VLAN 20 added: Name: management EDINBURGHSWITCH(vlan)#exit APPLY completed. EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface fastethernet0/2 EDINBURGHSWITCH(config-if)#switchport mode accessEDINBURGHSWITCH(config-if)#switchport access vlan 10 EDINBURGHSWITCH(config-if)
Sunday, January 5, 2020
Effective Leadership Ellen Degeneres Principles Of...
Effective Leadership-Ellen DeGeneres Shari Kjos BUS 119-Principles of Personal Organizational Leadership Instructor: Chris Crites November 12, 2016 As human beings the vast majority of us wish we could change the world, whether that be helping humans, animals, the environment, it is helping those that cannot help themselves. However, we also realize to help with these causes it takes money and for the most part a great deal of it. But, some people are fortunate enough and can help change the lives of many. That is what Ellen DeGeneres has done with her leadership skills, guidance, celebrity status and wealth. Through her kind heart and passion for the social good she does everything she can to make the world a better place. It is true that money can certainly help in spanning social good, however, multiple pennies can also impact those in need. Social good is something that anyone can do. It is not about celebrity status or being a millionaire. Social good is about feeling good about helping others when they are in need. It is about creating a sense of connectedness to humanity and being humble all the while influencing those th at follow you. This is what Ellen DeGeneres is all about. This paper will discuss, Ellen s foundations and charities, how these reflect her personal values and leadership integrity, how her giving enhances her celebrity image and whether her integrity is compatible with her image. Ellen DeGeneres is not only anShow MoreRelatedOptimizing Millennials Communication Styles8016 Words à |à 33 Pageseffectiveness. Developing style-typing and style-flexing skills can serve as building blocks for millennialsââ¬â¢ subsequent interpersonal skill development in key areas such as audience analysis, active listening, conflict management and negotiation, and effective team building. An in-class exercise highlighting communication style-typing and style-flexing is included. Keywords:Ã¢â¬Æ' millennials; communication skills; style-flexing MILLENNIALS, THOSE INDIVIDUALS born between 1980 and 2000, compose the largestRead MoreUnderstanding Marketing Management16709 Words à |à 67 Pagesbreadth and depth as they want about practically anything. They can access online encyclopedias, dictionaries, medical information, movie ratings, consumer reports, newspapers, and other information sources in many languages from anywhere in the world. Personal connections and user-generated content thrive on social media such as Facebook, Flickr (photos), Del.icio.us (links), Digg (news stories), Wikipedia (encyclopedia articles), and YouTube (video).23 Social networking sitesââ¬âsuch as Dogster for dog lovers
Subscribe to:
Posts (Atom)