Tuesday, December 24, 2019

Essay on The Daoism and the Confucianism in Han Dynasty

The Daoism and the Confucianism in Han Dynasty Yang Yu History 135: Imperial Chinese History Professor: Robert J. Culp Paper I March 4th, 2011 The Daoism and the Confucianism in Han Dynasty As the dominant philosophical school for around two thousand years in Chinese imperial history, Confucianism is always regarded as the most representative ideology of China, associated with numerous books, poems, artworks and stories that glorify Confucianism’s permeation into every corner of Chinese society. However, before Han Wudi, Confucianism was only one of those competing philosophical schools founded in Spring and Autumn period. During the Warring States period and Qin dynasty, Legalism took place of all other philosophical schools†¦show more content†¦However, it is always easy to start the process of centralization but difficult to maintain the state of centralization. Faced with this knotty problem, Wudi adopted Confucianism, which underlined â€Å"the moral basis of superior-subordinate relations, appreciating that in the long run the ruler would achieve his goals more easily and economically when his subordi nates viewed their relationship with the ruler in moral terms of loyalty and responsibility† (65). In fact, Han’s Confucianism is not the same as the Confucianism during the period of the Spring and Autumn or Warring States. It is a special status of Confucianism. As Ebrey writes in his book, â€Å"Han Confucianism itself was eclectic, fortifying itself with precepts and philosophical concerns drawn from what had been competing philosophical schools in the pre-Qin period† (77). Different from the traditional Confucianism, Han’s Confucianism assimilated thoughts from Legalism, Daoism and other schools, such as Moism’s thought of universal love (å… ¼Ã§Ë† ±) and yin and yang school’s thought of five phases (é˜ ´Ã©Ëœ ³Ã¤ ºâ€Ã¨ ¡Å'è ® º). â€Å"Han Confucians sought ways to comprehend the world around them as a self-generating and self-sustaining organism governed by cyclical yet never replicating flows of yin and yang and the five phases (fire, water, earth, metal, and wood)† (78). Han Confucians thought that if one of these phases was disturbed, the whole system wouldShow MoreRelatedThe Han Dynasty1195 Words   |  5 Pages The Han Dynasty, dating from 206 BCE-220 AD, was founded by Liu Bang who was the winner of the civil wars that followed the collapse of the first Imperial dynasty in China (Qin Dynasty). The Han dynasty is considered an influential empire that created a spiritually and philosophically enlightened nation through the teachings of Daoism, Legalism and Confucianism. At the time that Liu Bang first founded the Han dynasty the basic structures of the Qin state were retained, and the ideology of the QinRead MoreChinese Philosophy Essay1408 Words   |  6 PagesThree areas of philosophy emerged amidst the chaos and constant warring of the Zhou era. The three were called Confucianism, Daoism, and legalism. They were Chinese philosophies that were thought to be the best ways to rule and achieve order in the society. Confucianism believed that a ruler s job was to set a good example, and not order. Since people were thought of as naturally good, they would following the right path based on the ir own conscience. Legalism was a more harsh way of ruling, ledRead MoreThe Three Types of Ancient Chinese Rulers943 Words   |  4 PagesIn ancient China, many different rulers tried to unify and rule the country using a variety of methods – Confucianism, Daoism, and Legalism to name a few. Each philosophy had its own set of rules of how people should act both in public and privately. The overall goal of each philosophy was to set a standard of acceptable living that would ensure harmony and success for the society. However, each was different and thus had different results. Legalism is a philosophy emphasizing strict obedience toRead MoreHan Fei Legalism Analysis1108 Words   |  5 Pagestitled â€Å"The Writings of Master Han Fei† that was written by Han Fei. Han Fei was a prince in the Han state of China. He was schooled with Confucian ideas and principles, but would reject them to create a more lawful society. Since he was a prince, he had a high social status and was in line for the throne of the state of Han after his father would pass. This gave him an advantage to implement his legalist ideas into the government because he would soon be ruler of Han. As the ruler, he would not beRead MoreThe Three Philosophies Of China1097 Words   |  5 Pages31st Religion organizes society; it controls our daily life and can be the breaking or making point of a society. The three Philosophies of China consist of Legalism, Daoism, and Confucianism, but only one Philosophy surpasses all others, Confucianism. Legalism is one of the strictest ways of ruling. Han Fei Zi founded legalism; he believed that there was only one way to obtain order in a society; this was through learning from your mistakes. Although the punishments were cruel andRead MoreThe Main Features Of Egyptian And Mesopotamian Civilizations1364 Words   |  6 Pagespolitical problems was the development of bureaucracy in Han China meant to solve? The Han dynasty created a bureaucracy to further repair the mistakes of the Zhou dynasty. The Qin dynasty, the predecessor of the Han dynasty, chose to select officials so that they would not rise up against them, such as in the case of the Zhou dynasty. However, these officials were not necessarily qualified for their job. This prompted the Han dynasty to instate civil service tests for bureaucrats to ensureRead MoreAncient Chinese Philosophies : Comparisons Between Lao And Confucius1476 Words   |  6 PagesAncient Chinese Philosophies: Comparisons between Lao Su and Confucius Daoism and Confucianism are two of China’s oldest religions. Both of these men’s teachings largely affect China’s belief system today, and both still widely practiced and still have temples all over the world. Confucianism helped shape China’s education system that still stands today, and Daoism has been helping people understand â€Å"the way† of life since the Han Dynasty. They are both very similar to each other, but at the same time theyRead MoreYin And Yang : What Do The Chinese? Believe About Nature?3063 Words   |  13 Pagesclearest connections to the past? How many civilizations were there in the classical period, for China? Name all of them in order When did the Zhou dynasty start to decline? What were the people who received land from the ruler supposed to give the government in return for the land? What was the main reason the Zhou dynasty in decline? What was the standard spoken language in China during this time called? Who was the person who gave China its name? What wasRead MoreBuddhism : The Popularity Of Buddhism1306 Words   |  6 Pagesare roughly 244 millions of practitioners in China, which is equivalent to 3.5% of the world population (â€Å"The Global Religious Landscape†). Since Buddhism’s core values and principles are highly correlated to two ancient Chinese religions: Daoism and Confucianism, Buddhism continues to gain popularity and flourish in China. In fact, Buddhism originated from India, and the founder of Buddhism was a prince from a North Indian tribe who lived in the era of 500 B.C. when Confucius lived in China (â€Å"BuddhismRead MoreHow China s Isolation Affected Itself?2161 Words   |  9 Pagesdevelop? Patterns in Classical China What dynasties were widely known in China? What has the Zhou dynasty accomplished? What were the alliances like? What became of the Yangtze River Valley? What did the Zhou dynasty work to do? Qin Dynasty Who took over after the fall of the Zhou dynasty? What accomplishments were made during the Qin dynasty? Han Dynasty What was accomplished in the Han dynasty? Political Institutions What was done with

Monday, December 16, 2019

The Marketing Environment Free Essays

string(69) " are not their own brands, trademarks and brands are using overseas\." 1. The changing and uncertain marketing environment deeply affects the organization’. Discuss this statement,explaining what is meant by the’marketing environment’ and explaining how it might affect marketing plans and activities with an example. We will write a custom essay sample on The Marketing Environment or any similar topic only for you Order Now The Marketing Environment The marketing environment refers to all of the internal and external forces that affect a marketer’s ability to create, communicate, deliver and exchange offerings of value. The factors and forces within the marketing environment can be classified as belonging to the internal environment, the micro-environment, and the macro-environment. The internal environment refers to the organization itself and the factors that are directly controllable by the organization. The micro-environment comprises the forces and factors at play inside the industry in which the marketer operates. Micro-environmental factors affect all parties in the industry, including suppliers, distributors, customers and competitors. The macro-environment comprises the larger-scale forces that influence not only the industry in which the marketer operates, but all industries. Macro-environmental factors include political forces, economic forces, sociocultural forces, technological forces and legal forces. This macro-environmental framework has been called the PESTL framework. Micro-environmental and macro-environmental forces are outside of the organization and, while they can be influenced, they cannot be directly controlled. The internal environment refers to its parts, people and processes. An organization is able to directly control the factors in its internal environment. A thorough understanding of the internal environment ensures that marketers understand the organisation’s strengths and weaknesses, which positively and negatively affect the organisation’s ability to compete in the marketplace. The micro-environment consists of customers, clients, partners, competitors and other parties that make up the organisation’s industry. The organization cannot directly control its micro-environment and respond to the current and future needs and wants of their target market. They must understand how each of their partners’ processes work and how their partnerships benefit each party. They must also understand the risks involved in working with partners and the relative power balance between the organization and each partner. Suppliers are a particularly crucial partner. Marketers must identify, assess, monitor and manage risks to supplies and risks to the price of supplies. To succeed, marketers must ensure their offerings provide their target market with greater value than their competitors’ offerings. Thus, marketers seek to understand their competitors’ marketing mix, sales volumes, sales trends, market share, staffing, sales per employee and employment trends. Marketers should analyse total budget competition, generic competition, product competition and brand competition. The macro-environment encompasses uncontrollable factors outside of the industry: political, economic, sociocultural, technological and legal forces. Political forces describe the influence of politics on marketing decisions. Economic forces affect how much money people and organizations can spend and how they choose to spend it. Sociocultural forces affect people’s attitudes, beliefs, behaviors, preferences, customs and lifestyles. Technological forces are those arising from the search for a better way to do things. Technology changes the expectations and behaviors of customers and clients as well as how organisations work with their partners and within society. Laws and regulations are closely tied to politics and establish the rules under which organizations must conduct their activities. The most significant laws and regulations for marketers are related to privacy, fair trading, consumer safety, prices, contract terms and intellectual property. Marketing metrics are used to measure current performance and the outcomes of past activities. A SWOT analysis is used to identify strengths, weaknesses, opportunities and threats. The example: Wenzhou Shoes 2004? 9? 17? ,â€Å" † —— ,? 400 , , 800 September 17, 2004, â€Å"European shoes† – the eastern town of Elche, Spain, China Shoes City, about 400 Spaniards gathered unidentified street, destroyed a bus carrying Wenzhou shoe container truck and a Wenzhou shoe warehouse, causing about 800 million yuan of economic losses. This is the first ever Spanish Chinese business interests of serious violations of the violence. , ,? 2001 , , In fact, data show that since 2001, Wenzhou shoes incident overseas every year by resistance occurred, and there is an upward trend: 2001? 8 2002? 1? , , August 2001 to January 2002, Russia had seized the incident occurred once, Wenzhou shoes involved. , 3 , The longest that the goods seized, the whole Zhejiang loss of about 3 billion yuan loss of individual enterprises million yuan or more. 2003 ,20 , The winter of 2003, more than 20 products of Wenzhou footwear shoe was burned in Rome, Italy, the specific loss is unknown. 004? 1? 8? , â€Å" †, January 8, 2004, the Nigerian Government issued â€Å"list of banned imports,† Wenzhou shoes one of them. 2004? 2? 12? , â€Å" † , 3000 †¦Ã¢â‚¬ ¦February 12, 2004, the Russian Ministry of Internal Affairs sent a large number of police raids in Moscow, â€Å"Aimila† big market goods, Chinese businessmen, including China, Wenzhou shoe manufacturers, including business loss of about $ 30,000,000 this †¦ à ¢â‚¬ ¦ , 2001 40%, 30%, 4. 6 Relevant data and background information, Wenzhou shoe production for export as early as in 2001, jumped 40%, close to 30% of total output, only from Wenzhou Customs exit of shoes to the value of $ 460,000,000. 10 ,? â€Å" †? â€Å" †? , â€Å" † , Wenzhou top 10 in several shoe factories to produce shoes for export oriented, such as the â€Å"East Art†, â€Å"Tema†, etc. , including â€Å"Tema†, including several of Wenzhou shoe factory, and also Wal-Mart signed production agreement for the global retail industry hegemony of mass production for supermarkets sell cheap shoes. , , , 10 ~30 , 10 From the product level , at present, most of China’s export of footwear is still the middle and low variety, low prices, generally 10 dollars to 30 dollars, many even less than 10 dollars. 9 â€Å" † 5 ? Took place in September this year, Spain’s â€Å"burning shoes† incident was burned average unit price of the shoes on ly 5 euros. , ( OEM ) Exports of high-end shoes and own-brand share are very small, and exports more products to OEM manner. ? , , â€Å" † , , , For example, most of the production of footwear sales in the U. S. low-end shoe store, while in the United States, the high-end shoe store also can procure the â€Å"Chinese shoes† of the shadow, but the price was lower than Italy, Spain, Brazil and other countries products, and all Chinese-made shoes are not their own brands, trademarks and brands are using overseas. You read "The Marketing Environment" in category "Papers" , Some of the same grade shoe prices in foreign markets and products to be lower than the country of origin, and some even lower than Vietnam, and Thailand’s exports. , ; , , ; , 10 2200? , View from the export enterprises, private enterprises accounted for most; see from the export area, mainly in Wenzhou, Zhejiang, Fujian Jinjiang, Quanzhou, Guangdong, Shandong, Sichuan and other regions, and has established a number of shoe manufacturing base; from the export scale , the current export value of 10 million U. S. dollars more than 2,200 enterprises, accounting for nearly half of the total number of export enterprises. â€Å" † , â€Å" † , â€Å" †? â€Å" , , † â€Å"The Spanish case, we need to think about the brand. We do not have world-renowned brand, which is the international competition of Chinese shoes in the greatest difficulty. † Executive vice president of Cornell, said Zhou Jinmiao interview. Members of Light Industry Import and Export Corporation Wenzhou Foreign Trade Wai seems to know China better than anyone in the international market brand shoes difficult. â€Å" BATA , , 100 , † â€Å"Well-known supermarket chains in Europe BATA , there are a lot of shoes from around the world, but I never found more than 100 euros over Chinese shoes. Chinese shoe brands in the world, not only to low-end shoes to compete. Spain burning low-end shoes is the result of competition. 2. Describe in detail the five marketing management orientation. Discuss the marketer’s argument for why an organization should embrace the market orientation. Marketing Management Orientation The Marketing Orientation and the Marketing Concept. An organization with a market orientation focuses its efforts on 1)continuously collecting information about customers’ needs and competitors’ capabilities, 2) sharing this information across departments, and 3) using the information to c reate customer value. The market orientation simply defines an organization that understands the importance of customer needs, makes an effort to provide products of high value to its customers, and markets its products and services in a coordinated holistic program across all departments. In what we call the â€Å"Marketing Concept,† the company embraces a philosophy that the â€Å"Customer is King. † The Marketing Concept is an attitude. It’s a philosophy that is driven down throughout the organization from the very top of the management structure. The Marketing Concept communicates that â€Å"the customer is king. Everything that the company does focuses on the customer. Via the Marketing Concept, a company makes every effort to best understand the wants and needs of its target market and to create want-satisfying goods that best fulfill the needs of that target market and to do this better than the competition. It wasn’t always that way. There were other orientations that companies embraced over the years. The Production Concept has been around for years. That concept simply suggests that customers prefer inexpensive products that are readily available. In effect, â€Å"if we make it, they will come. The Product Concept suggests that companies that build the â€Å"better mousetrap† will gain favor. The thinking here is that customers want products that have higher quality, that offer better performance or do something unique. The Selling Concept proceeded the Marketing Concept. From the 1920’s until the 1950’s, most firms had a sales orientation. Competition had grown, and there was a need to pursue the scarce customer. Sales could mean everything from sales people to advertising to public relations, but little effort was made to coordinate any overall marketing function. What we often saw in the Selling Concept was the â€Å"hard sell† and the belief that consumers wouldn’t purchase unless they were sold. The Holistic Marketing Concept that is embraced in the 21st century results in companies looking at their overall marketing efforts. This includes how their marketing affects society, as a whole. Marketing is also done internally within the company. Without customers, a company will quickly flounder — thus the importance of the relationship. Holistic marketing looks at the connectivity of the company, its people, its customers, and the society in which it operates. The Societal Marketing Concept focuses on. Market positioning in the 70s of last century by the American Marketing experts Iris and Jack Trout’s, its meaning is an enterprise based on existing products on the market competitors, the location of the products for a customer These characteristics or attributes of the emphasis, create unique products for the enterprise, giving the impression of a distinctive image, and to pass such a vivid image to the customer, so that the products in the market to determine the appropriate location. Market positioning of a product itself is not what you do, but you do the eyes of potential consumers. The essence of market orientation to the enterprise and other enterprises strictly separated, so that customers clearly feel and recognize the difference, which the customer occupies a special place in mind. Another argument is the product positioning, target market positioning, competitive positioning. Market positioning is the key enterprises should try to find their products more competitive than the competition’s features. Competitive advantage is generally two basic types: one is price competitive, that is, under the same conditions set lower prices than the competition. This requires companies to take all efforts to reduce unit costs. Second, competitive preference, which can provide certain features to meet customer specific preferences. This requires companies to take every effort to work on the product features. Therefore, the whole process of the enterprise market positioning can be accomplished through three steps: 1) Analysis of the status of the target market to confirm the potential of this business a competitive advantage 2) The exact choice of competitive advantage, the initial positioning of the target market Competitive advantage that the ability of companies to outperform its competitors. This capability can be either existing, may also be potential. Select a competitive advantage is actually a business and competitor strength compared to all aspects of the process. Indicators should be a relatively complete system, the only way to accurately select the relative competitive advantage. The usual method is to analyze, compare companies and competitors in business management, technology development, procurement, production, marketing, finance, and what kinds of products is the strength of seven areas, which are weak. To select the most suitable for the business advantages of the project, initially set to target enterprise market position. 3) Shows a distinct competitive advantage and re-positioning The main task of this step is the enterprise through a series of publicity and promotion activities, the competitive advantage of its unique and accurate communication to potential customers and impress in the minds of customers. To this end, companies should first understand the target customer, know, know, identity, love and preference of the company’s market position, established in the minds of customers is consistent with the positioning of the image. Second, companies target customers through a variety of efforts to strengthen the image and maintain understanding of target customers, target customers attitude stability and deepening the feelings of the target customers to consolidate in line with the market’s image. Finally, enterprises should pay attention to the target customers understand their market position or because of deviations propaganda enterprise market positioning errors caused by target customers fuzzy, chaos and misunderstanding, and promptly correct the inconsistencies in the image and market positioning. Company’s products in the market positioning even if it is appropriate, but in the following circumstances, should consider re-positioning: (1) Introduction of new competitors, product positioning in the vicinity of the enterprise products, enterprise products occupied part of the market, so that the decline in market share of enterprise products. 2) Consumer needs or preferences change, so that the enterprise product sales plummeted. To avoid the strong positioning strategy: trying to avoid is the most powerful business or other enterprise directly place a strong competition, while positioning their products in another market area, to make their products with certain characteristics or attributes the strongest or strong opponents are more significant differences. Head-positioning strategy: is an enterprise based on its own strength, to occupy a better market position, at the market on the dominant, most powerful or compete head-strong competitors, leaving their own and rival products into the the same market position. Looking for new but not yet occupied the position of the potential market demand to fill vacancies on the market, production market, not, with some characteristics of products. Such as Japan’s Sony Corporation Sony Walkman and a number of new How to cite The Marketing Environment, Papers

Sunday, December 8, 2019

Ccna3 Exploration Lan Switching and Wireless free essay sample

CCNA3 Exploration: LAN Switching and Wireless Guided Case Study Student: Date: Marks: Overview and Objectives To enhance the Learner’s knowledge of switching and wireless networks. The following case study is used to illustrate the process required for designing a redundant switched network. This case study presents a scenario in which XYZ Insurance Company has hired a Network Consultant Group to design their network. In order to help you organize this project, the scenario has been divided into phases listing the requirements for each task. Configure security via VLANs and propagate with VTP. †¢ Design a redundant switched network. †¢ Configure switch port VLAN information and port security †¢ Connect and verify connectivity to a wireless router †¢ Configure the IP settings of a Linksys wireless router †¢ Configure DHCP on a Linksys wireless router †¢ Change the network mode and corresponding network channel on a wireless router †¢ Enable WE P encryption and disable SSID broadcast. †¢ Enable a wireless MAC filter if available. †¢ Configure access restrictions on a wireless router if available. Background XYZ Insurance Company requires 24/7 access to the Internet in order to service its clients. You have been retained to design a network which meets these requirements. In order to achieve this, you have decided to develop the design in stages proving each stage on the way. In addition some users within your company are provided with wireless laptops and are allowed to log onto the company’s local area network in a secure fashion. Two wireless routers are provided for this for security and the Sales staff will be shared between them. Unauthorised wireless laptop users must be denied access in order to preserve security. Requirements The company has 3 main departments – Personnel, Finance and Sales. The offsite sales team are provided with laptops and, when in the head office, are regarded as part of the Sales Department. Your design must provide for †¢ 5 employees in the Personnel department. †¢ 10 employees in the Finance department. †¢ 5 wired workstations and 5 wireless workstations for internal Sales staff. †¢ 100 laptops for external mobile Sales staff. . Lifetime max of 2 servers for each department regardless of company growth. †¢ Expect 100% growth of current IP requirements when determining size of subnets. †¢ All networking devices must have IP addresses. †¢ Use the private class B 172. 25. 0. 0 network for internal addressing. †¢ Use VLSM for IP addressing. †¢ Use subnet 200. 1. 1. 0/29 for connection to the Internet via a router. †¢ There is a D NS server at address 195. 195. 1. 2/24 connected to the router. †¢ A redundant switched network using a layered design is required with one router for access to the internet. Two routers would be needed in the final analysis). Phase 1 – Network Design (20 marks) To meet the requirements the eventual topology is shown below; Worksheet 1. Produce a logical diagram based on the above diagram for the LAN for XYZ Insurance Company that includes: ? Router and switch names ? VLAN names and details ? Network addresses ? Number of hosts per network ? Link Speeds The next few sections have example grids for documenting this information. 2. The company expects the use of VLSM Design to maximize the use of IP addresses. A table is to be produced showing the subnets that meet the Companies requirements using a VLSM design. A sample table layout for recording the VLSM design is below. |Network Name |VLAN |Number of host |Network Address |Subnet Mask |Max Number of Hosts |Gateway Address | | | |addresses required | | |Possible | | |Personnel |10 |5 |172. 5. 1. 48 |/29 |6 |172. 25. 1. 49 | |Finance |20 |10 |172. 25. 1. 32 |/28 |14 |172. 25. 1. 33 | |Int sales |30 |5c, 5w |172. 25. 1. 0 |/28 |14 |172. 25. 1. 1 | |Ext sales |40 |100 |172. 25. 0. 0 |/25 |126 172. 25. 0. 1 | | | | | | | | | | | | | | | | | | | | | | | | | . For each device, a set of tables is required. These will assist with design and development activities and used when configuring switches and routers. A separate table should be created for each router and switch. Below is a sample layout for routers. Router Name: Network Name |Description and |Interface/Sub Interface|VLAN |Encapsulation |Network Number |Interface IP |Subnet Mask | | |Pu rpose |Type/Number | | | |Address | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Router Name: |Network Name |Description and |Interface/Sub Interface|VLAN |Encapsulation |Network Number |Interface IP |Subnet Mask | | |Purpose |Type/Number | | | |Address | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Wireless Router Name: |Interface Type/Port |Description and |Network Name|Network Number |Interface IP |Subnet Mask | | |Purpose | | |Address | | |Internet Port (Wired) | | | | | | |Wireless Port | | | | | | Wireless Access Point Name: Interface Type/Port |Description and |Network Name|Network Number |Interface IP |Subnet Mask | | |Purpose | | |Address | | |Port 0 (Wired) | | | | | | |Port 1 (Wireless) | | | | | | Below is the sample layout for the switch tables. Distribution Switch Name: Switch IP address: VLAN: |Port/Number |Description and |Speed |Duplex |VLANs allowed |Switchport Type|Encapsul ation (if | | |Purpose | | | | needed) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Distribution Switch Name: Switch IP address: VLAN: Interface/Sub Interface |Description and |Speed |Duplex |VLANs allowed |Switchport Type|Encapsulation (if | |Type/Port/Number |Purpose | | | | |needed) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Access Switch Name: Switch IP address: VLAN: |Interface/Sub |Description and |Speed |Duplex |Network Name |Network Number | |Interface |Purpose | | | | | |Type/Port/Number | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The tables and supporting text will be part of the documentation delivered to the XYZ Research Company. Before you commence with the implementation the logical diagram and tables need to be approved by the company. Instructors Signature: ______________________Date:_______________ For this Case Study, implement your design in phases with Packet Tracer and check out any particular aspects not supported by Packet Tracer with the equipment. Deliverables: Assignment with answers, Packet Tracer file and relevant configuration records and testing records.. Phase 2: Basic Switch Configurations (5 marks) Using Packet Tracer, create and connect three access switches, one distribution switch, the servers and PCs together to form basic connectivity. †¢ Name the distribution switch DistSW1. †¢ Name the access switches AccessSW1 and AccessSW2. †¢ On all switches, configure a login password as cisco, an encrypted privileged password as class, and provide secure telnet login capability. All passwords should be encrypted. †¢ Connect the access switches to the PCs representing ultimately the VLANs. †¢ Assign ip addresses to all PCs and the switches within the network 192. 168. 1. 0 solely to test connectivity. These addresses are purely temporary. †¢ The distribution switch is connected by trunk links to the access switches. Configure port security on the ports to which the PCs are connected with a maximum of 1 and violation mode as shutdown. †¢ DO NOT create any VLANs at this stage. Testing 1. Is there connectivity between all devices? [Y/N] ___________ 2. Can the PCs ping every device? [Y/N] ______________ 3. Do the access connected ports acquire the first MAC address? [Y/N] _______ First MAC address _____________ 4. Do the connected ports shutdown if a second PC replaces the first PC? [Y/N] _ Record the MAC addresses learned on each access port across all switches. Phase 3: VLAN Configurations (20 marks) Assign the VLANs from your design to achieve security between the Personnel, Sales and the IT management function of the network. Based on your Network Design in Phase 1, create the networks and assign the ip addresses to the access switches and one distribution switch, and the PCs and servers. NB: Do not include redundancy with the second Distribution switch in this phase. Steps 1. Via VTP, assign version 2 to all switches. 2. Assign server mode to the distribution switch and client mode to the access switches. 3. Assign a domain and password to the switches. 4. Use VTP to propagate the VLAN database from the distribution switch. 5. Create the VLANs on the distribution switch as in your design for Personnel, Finance and Sales. 6. Create a Management VLAN for the switches. 7. Assign single ports as access ports with port security as in the previous phase for each VLAN on both access switches. 8. Configure the PCs to represent the departments and assign representative ip addresses from each VLAN. Tests 1. Has the VLAN database propagated to the access switches? [Y/N] ____ 2. Test connectivity across the network for each of the three VLANs [Y/N]____ 3. Is there connectivity between different VLANs? [Y/N] ________ 4. Test that pings are successful from switch to switch: Ping from Distribution Switch 1 to Access Switch 1 and 2? [Y/N] ________ Ping from Access Switch 1 to Access Switch 2? [Y/N] ___________ Save and print out (1) Switch configurations, (2) show interface trunk, (3) show VLAN for each switch, (4) show VTP mode and status for each switch.. Phase 4: Router Configuration (20 marks) Add one router to provide inter-network communication between VLANs and simulate the Internet with a web server with a home page with the text â€Å"CCNA3 Exploration Case Study. Communication successful. Your name and date†. NB. Whilst this inter-network connectivity negates the security provided by VLANs, with access control lists firewalls would be configured to deny or allow communication as necessary. Steps 1. Select a router with two fastethernet ports and name it Router1 with login password as cisco and secret password as class. 2. Configure sub-interfaces on Router1 fa0/0 for the VLANs and the native VLAN. The sub-interfaces become the default gateways for each of these networks. 3. Connect a web server with a home page to simulate the Internet for test purposes. 4. Add default gateways to the PCs. Tests 1. Is there communication between PCs and servers? [Y/N] ________ 2. Is there communication via the router between each VLAN? [Y/N] ________ 3. Test that pings are still successful from switch to switch. Ping from Distribution Switch 1 to Access Switch 1 and 2? [Y/N] ________ Ping from Access Switch 1 to Access Switch 2? [Y/N] ___________ 4. Can each PC browse to the web server on the internet? [Y/N] ____________ Save and print out (1) the router configuration, (2) show ip route, (3) show protocols. Phase 5: Wireless Configuration (20 marks) Add a wireless router for mobile communication for the external Sales staff with secure access to the Sales network and the wireless access point for the internal Sales staff with wireless laptops. NB. With Packet Tracer, full security may not be achievable on the wireless devices. If not, state what additional security measures you would configure. Steps 1. Select a wireless router with an internet port connected to the wired Sales VLAN. 2. Configure the wireless router internet port with a static IP address in the Sales network. 3. Configure the wireless LAN on the wireless router with DHCP and the SSID: â€Å"ExternalXYZSales†. 4. Configure additional security with a WEP key and explain the addition of MAC filters. 5. Install a LAN wireless card in a PC and configure with DHCP selected. 6. Select a wireless access point and configure it with secure access to the wired Sales VLAN with SSID: â€Å"InternalXYZSales† and a WEP key. Tests 1. Is there communication from wireless router to the Sales PCs on the wired network via both access switches? [Y/N] ________ 2. Record the IP address assigned to wireless PC via DHCP? ____________ 3. Is wireless communication via the access point? [Y/N] 4. Is there communication from the wireless PCs and the wired Sales PCs? Successful ping from external wireless PC to a wired Sales PC via wireless router? Y/N] ____ Successful ping from internal wireless PC to a wired Sales PC via wireless access point? [Y/N] ____ 5. Test that pings are still successful from switch to switch: Ping from Distribution Switch 1 to Access Switch 1 and 2? [Y/N] ________ Ping from Access Switch 1 to Access Switch 2? [Y/N] ___________ 6. Can the wireless PCs browse to the web server on the internet? [Y/N] ______ Save, capture and print out configuration of (1) wireless router, (2) wireless access point. Phase 6: Redundant Distribution Switch (15 marks) Add a second switch at the distribution level to create a redundant switched network. Steps 1. Add the redundant switch in server mode with the same domain and password. 2. Ensure the root bridge is one of the distribution switches. 3. Connect the redundant switch via a trunk link to the first distribution switch. 4. Connect trunk links from the distribution switches to the access switches. 5. Allow spanning-tree protocol to set the port states. Tests Enter show spanning-tree to record: 1. Identity of the root bridge: _____________________ 2. Assign same priority to all VLANs. 3. For each switch on VLAN99record the root bridge identity, ensuring one of the distribution switches is a root bridge, and the status of the trunk ports as shown below: Switch:_DistSW1__ MAC Address:__________________ Priority: ____ Root ID: ___________________________ Trunk Port |Status |Trunk Port |Status |Trunk Port |Status | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Switch:_DistSW2_ MAC Address:__________________ Priority: ____ Root ID: Trunk Port |Status |Trunk Port |Status |Trunk Port |Status | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Switch:_AccessSW1 MAC Address:__________________ Priority: ____ Root ID: ___________ |Trunk Port |Status |Trunk Port |Status |Trunk Port |Status | | | | | | | | | | | | | | | | | | | | | | Switch: AccessSW2 MAC Address:__________________ Priority: ____ Root ID: ___________ Trunk Port |Status |Trunk Port |Status |Trunk Port |Status | | | | | | | | | | | | | | | | | | | | | | Switch:AccessSW3 MAC Address:__________________ Priority: ____ Root ID: |Trunk Port |Status |Trunk Port |Status |Trunk Port |Status | | | | | | | | | | | | | | | | | | | | | | 4. Change the bridge priorities so that the other distribution switch becomes the root bridge and record the states and identities as previously. Save, capture and print out the output from show spanning-tree of all switches for both root bridge assignments. EXTRA Phase 7: Fully Redundant Switched Network (No marks) To provide 24/7 access to the Internet, a second router would be installed with a trunk link to the redundant distribution switch. Steps †¢ Add the second router and name it Router2. †¢ Configure it in the same manner as Router1. †¢ Connect the web server via a switch to Router1 and Router2. †¢ Connect it via a switch to the fastethernet ports on the two routers.. †¢ Connect Router2 to the second distribution switch. Tests 1. Access the web server from all PCs? [Y/N] ________ 2. If DistSW1 fails, can all PCs still access the Internet. [Y/N] _____ NB. Default gateway of web server may need changing. Save and print the port status for the surviving Distribution switch. 3. If Router1 fails, can all PCs still access the Internet. [Y/N] _____ NB. Default gateway of web server may need changing. END of CASE STUDY EXTRA [pic] [pic] [pic] [pic] [pic] Internet WRS2 Fa0/0 Fa0/1 Fa0/0 Fa0/1 Fa0/24 Fa0/2 Fa0/3 Fa0/4 Fa0/24 Fa0/2 Fa0/3 Fa0/4 Fa0/23 Fa0/24 Fa0/23 Fa0/24 Fa0/23 Fa0/24 [pic] DNS Server 195. 195. 1. 2/24 Fa0/5 Fa0/5