Monday, September 30, 2019

Nosocomial Infections

Remember your mother always reminding you to wash your hands? We have all been told to do so at one point in our lives or another. As children we grudgingly obeyed, not really appreciating the wisdom and love behind the statement. For most of us, the value of hand hygiene is superficial; a means to clean soiled, unsightly hands. We were not aware that washing our hands regularly was a primary defense against many types of diseases.As a child it was imposed upon us by our parents, but as we grew older, we realize its true value but no longer practice it on a regular basis, finding it inconvenient and a waste of time. The truth is that hand hygiene is one of our best defenses against diseases. The simple act of washing and rubbing our hands vigorously with soap and running water is an effective shield against bacteria-borne infections. And this is especially true for health care professionals who are exposed to bacteria on a regular basis.People go to hospitals and other healthcare ins titutions for medical attention and treatment of their ailments. However, while most people get well after a trip to the hospital, there are cases where people get worse because of exposure to harmful microorganisms that abound in these hospitals. In hospitals, bacteria proliferate because of the high concentration of ill people at one place at any one given time, and they can cause secondary infections to people going to the hospital. These types of infections are caught secondary to a hospital visit or stay, and are called nosocomial infections.The Center for Disease Control (CDC) defined nosocomial infections or healthcare-acquired infections as â€Å"infections that patients acquire during the course of receiving treatment.† (Boyce, 2002, 29) And because these patients did not initially harbor these nosocomial infections, they could only have been acquired while in the hospital, while in contact with doctors and nurses who go from one sick patient to another. These health care professionals become the main mode of transmission for nosocomial infections, and this is made even worse especially if doctors and nurses do not practice proper hand hygiene.It does not take a rocket scientist to figure it out. In hospitals, most patients are bed-ridden, not allowed to go from one place to another. Therefore, the risk of them directly infecting another patient is slim. Only doctors and nurses move about from one patient to another, in constant physical contact with the patients. Because the hands are their main point of contact, the hands become the main vehicle of microbes as well. They â€Å"stick† to the doctors and nurses hands, and remain there until they are â€Å"dropped off† somewhere else.This process goes on and on until the bacteria find a suitable host, which is almost always, the human body. Inside the human body, these microbes will colonize and proliferate, causing many types of health problems. These transient, disease causing ba cteria use the skin as temporary vehicles to get from one point to another. However, because these microbes are transient and non-colonizing on the skin surface, they are easily removed by proper and rigorous hand washing with an anti-microbial soap and water. Therefore, proper hand washing can halt the spread of disease-causing bacteria in their tracks. If doctors and nurses fail to clean their hands, they become virtual havens for microbes, transmitting and causing nosocomial infections.The figures are alarming. Studies have shown that one out of every 20 patients contract nosocomial infections because of inadequate hygiene practices in most American hospitals. These nosocomial infections â€Å"kill an estimated 103,000 people in the United States a year, as many as AIDS, breast cancer and auto accidents combined.† (McCaughey, 2005, 1) The World Health Organization says that nosocomial or healthcare acquired infections are one of the leading causes of morbidity and mortalit y rates worldwide. (Ducel, 2002, 7) And all of this because of dirty hands. And all of these deaths and suffering are unnecessary. They can be easily remedied. If every healthcare worker would faithfully practice proper hand hygiene as they move from one patient to another, â€Å"there would be an immediate and profound reduction in the spread of resistant bacteria.†(Goldmann, 2006, 122)From every point of contact with patients, the hands of doctors and nurses are dirty, carrying infection-causing microbes; and as doctors and nurses attend to their patients’ needs, these bacteria move into the patients. While most of these bacteria can normally be fought off by the body, the compromised bodies of patients already weakened by an existing sickness become easy targets for these parasites, and nosocomial infections can easily set in. And because these infections attack a weak immune system, these can lead to more serious complications and even death.As the main vectors of nosocomial infections, doctors and nurses can prevent the spread through appropriate hand-sanitizing procedures. Hand hygiene is the single most important patient care practice that health care providers can do to prevent cross contamination and nosocomial infection. Some may say that hand hygiene is made redundant by wearing of antiseptic gloves on a regular basis. However, even if doctors and nurses wear gloves, it will also be contaminated if the hands are not clean in the first place. These gloves must be worn and removed using the hands, and so the cycle of contamination perpetuates itself in the hands of doctors and nurses with dirty hands.The premise of hand washing is very simple and very effective. Microbes are parasites. They depend on a host to live and reproduce themselves. However, bacteria are not mobile; they do have the means to move from one place to another. As such, they depend on outside help to move about and find new hosts to infect. This help comes in the form of doctors and nurse, who because of their many responsibilities, forget to clean their hands, or do so incorrectly. The anti-microbial property of soaps plus the rigorous friction of the rubbing of the hands can easily remove, weaken, or even kill these transient, infection-causing microbes before they can cause anyone any more harm. As such, a system-wide must be enforced, making proper hand hygiene mandatory for all doctors and nurses. Hand hygiene stations must be installed all over hospitals to make it easy for healthcare workers to clean their hands anytime.Indeed nosocomial infections can exact a high price. But what is even more unfortunate about nosocomial infections is the fact that it can be avoided. These healthcare associated infections are unnecessary tragedies that can be easily prevented with proper sanitation and hygiene procedures.Of course it is important to note that hand hygiene or hand washing is not enough. It must be done properly, following certain guidelin es. It is not enough to clean the hands; they must be disinfected. Normal or ordinary hand washing is the same as no hand hygiene at all. This means that hand washing must be done right, or not at all because it does not make any difference to harmful microbes or the health of the patients. Hand hygiene depends on the case and the area of the hospital involved. Normal hand hygiene should be done for at least a minute, with vigorous rubbing of the two hands against each other. Plain soap has been proven to effective against microorganism because the soap lifts the microbes off the surface of the skin to be rinsed off by running water.Hand hygiene need not be complicated or costly. All it takes is soap, running water, and friction, and the discipline to do it regularly and properly. The key is to make it a habit. There is no dearth of evidence showing that hand washing is effective in halting the spread of infections; the problem is that very few people in the health care industry pra ctice hand hygiene in compliance with regulations. Most wash their hands but do so inappropriately, which is useless in itself.While stopping the spread of nosocomial infections is complex, there is no denying the fact that the first line of defense against nosocomial infections is hand hygiene for nurses and doctors. Simple adherence to proper cleaning/disinfecting procedures is all that is needed to prevent needless infections from spreading any further and causing more harm. It is simply a matter of discipline.First do no harm†¦ that is the adage that all health workers swear by. It is ironic that nurses and doctors should also be the main vectors of nosocomial infections. These nosocomial infections are the shame of the healthcare system because it can be prevented with faithful compliance to proper hygiene procedures. The solution lies literally in our hands. If we don’t clean our hands, then it is dirty with the needless suffering and death of patients from nosocom ial infections. Our dirty hands are guilty hands.Works CitedGoldmann, Donald. â€Å"System Failure Versus Personal Accoutability–The Case for Clean Hands. New England Journal of Medicine. 355:121-3. 13 July 2006. 22 May 2007. https://content.nejm.org/cgi/reprint/355/2/121.pdfCenters for Disease Control and Prevention. (2006). Healthcare-Associated Infections (HAIs).  Ã‚   Retrieved March 17, 2007, from http://www.cdc.gov/ncidod/dhqp/healthDis.htmlDucel, G., et al., eds. Prevention of Hospital Acquired Infections-A Practical Guide. Geneva: World Health Organization. 2002. 21 May 2007.   http://www.who.int/csr/resources/publications/drugresist/whocdscsreph200212.pdfGorman, Christine. â€Å"Wash Those Hands† How doctors and nurses can make you sick — and what you can do about it. TIME. 163. 1. 29 March 2004: Opposing Viewpoints Resource Center. Thomas Gale. Pasco-Hernando Community College Lib., New Port Richey, FL. 23 May 2007. http://www.time.com/time/magazi ne/article/0,9171,993710,00.htmlâ€Å"Guideline for Hand Hygiene in Health-Care Settings† Recommendations of the Healthcare Infection Control Practices Advisory Committee and the HICPAC/SHEA/APIC/IDSA Hand Hygiene Task Force. 51. 25. Oct. 2002: 1-44. Boyce, John and Diddier, Pittet. Het.comps Center for Disease Control and Prevention (CDC). MMWR. Retrieved on 23 May 2007.   http://www.cdc.gov/mmwr/preview/mmwrhtml/rr5116a1.htmMcCaughey, Betsy. â€Å"Coming Clean. (Editorial Desk) (Hospital Hygiene and Infections).† The New York Times. 6 June 2005: Opposing Viewpoints Resource Center. Thomas Gale. Pasco-Hernando Community College Lib., New Port Richey, FL. 23 May 2007. http://hospitalinfection.org/press/060505ny_times.pdf Nosocomial Infections Remember your mother always reminding you to wash your hands? We have all been told to do so at one point in our lives or another. As children we grudgingly obeyed, not really appreciating the wisdom and love behind the statement. For most of us, the value of hand hygiene is superficial; a means to clean soiled, unsightly hands. We were not aware that washing our hands regularly was a primary defense against many types of diseases. As a child it was imposed upon us by our parents, but as we grew older, we realize its true value but no longer practice it on a regular basis, finding it inconvenient and a waste of time.The truth is that hand hygiene is one of our best defenses against diseases. The simple act of washing and rubbing our hands vigorously with soap and running water is an effective shield against bacteria-borne infections. And this is especially true for health care professionals who are exposed to bacteria on a regular basis.People go to hospitals and other healthcare ins titutions for medical attention and treatment of their ailments. However, while most people get well after a trip to the hospital, there are cases where people get worse because of exposure to harmful microorganisms that abound in these hospitals. In hospitals, bacteria proliferate because of the high concentration of ill people at one place at any one given time, and they can cause secondary infections to people going to the hospital.These types of infections are caught secondary to a hospital visit or stay, and are called nosocomial infections. The Center for Disease Control (CDC) defined nosocomial infections or healthcare-acquired infections as â€Å"infections that patients acquire during the course of receiving treatment.† (Boyce, 2002, 29) And because these patients did not initially harbor these nosocomial infections, they could only have been acquired while in the hospital, while in contact with doctors and nurses who go from one sick patient to another. These health care professionals become the main mode of transmission for nosocomial infections, and this is made even worse especially if doctors and nurses do not practice proper hand hygiene.It does not take a rocket scientist to figure it out. In hospitals, most patients are bed-ridden, not allowed to go from one place to another. Therefore, the risk of them directly infecting another patient is slim. Only doctors and nurses move about from one patient to another, in constant physical contact with the patients. Because the hands are their main point of contact, the hands become the main vehicle of microbes as well. They â€Å"stick† to the doctors and nurses hands, and remain there until they are â€Å"dropped off† somewhere else. This process goes on and on until the bacteria find a suitable host, which is almost always, the human body. Inside the human body, these microbes will colonize and proliferate, causing many types of health problems.These transient, disease causing ba cteria use the skin as temporary vehicles to get from one point to another. However, because these microbes are transient and non-colonizing on the skin surface, they are easily removed by proper and rigorous hand washing with an anti-microbial soap and water. Therefore, proper hand washing can halt the spread of disease-causing bacteria in their tracks. If doctors and nurses fail to clean their hands, they become virtual havens for microbes, transmitting and causing nosocomial infections.The figures are alarming. Studies have shown that one out of every 20 patients contract nosocomial infections because of inadequate hygiene practices in most American hospitals. These nosocomial infections â€Å"kill an estimated 103,000 people in the United States a year, as many as AIDS, breast cancer and auto accidents combined.† (McCaughey, 2005, 1) The World Health Organization says that nosocomial or healthcare acquired infections are one of the leading causes of morbidity and mortalit y rates worldwide. (Ducel, 2002, 7) And all of this because of dirty hands. And all of these deaths and suffering are unnecessary. They can be easily remedied. If every healthcare worker would faithfully practice proper hand hygiene as they move from one patient to another, â€Å"there would be an immediate and profound reduction in the spread of resistant bacteria.†(Goldmann, 2006, 122)From every point of contact with patients, the hands of doctors and nurses are dirty, carrying infection-causing microbes; and as doctors and nurses attend to their patients’ needs, these bacteria move into the patients. While most of these bacteria can normally be fought off by the body, the compromised bodies of patients already weakened by an existing sickness become easy targets for these parasites, and nosocomial infections can easily set in. And because these infections attack a weak immune system, these can lead to more serious complications and even death.As the main vectors of nosocomial infections, doctors and nurses can prevent the spread through appropriate hand-sanitizing procedures. Hand hygiene is the single most important patient care practice that health care providers can do to prevent cross contamination and nosocomial infection. Some may say that hand hygiene is made redundant by wearing of antiseptic gloves on a regular basis. However, even if doctors and nurses wear gloves, it will also be contaminated if the hands are not clean in the first place. These gloves must be worn and removed using the hands, and so the cycle of contamination perpetuates itself in the hands of doctors and nurses with dirty hands.The premise of hand washing is very simple and very effective. Microbes are parasites. They depend on a host to live and reproduce themselves. However, bacteria are not mobile; they do have the means to move from one place to another. As such, they depend on outside help to move about and find new hosts to infect. This help comes in the form of doctors and nurse, who because of their many responsibilities, forget to clean their hands, or do so incorrectly. The anti-microbial property of soaps plus the rigorous friction of the rubbing of the hands can easily remove, weaken, or even kill these transient, infection-causing microbes before they can cause anyone any more harm. As such, a system-wide must be enforced, making proper hand hygiene mandatory for all doctors and nurses. Hand hygiene stations must be installed all over hospitals to make it easy for healthcare workers to clean their hands anytime.Indeed nosocomial infections can exact a high price. But what is even more unfortunate about nosocomial infections is the fact that it can be avoided. These healthcare associated infections are unnecessary tragedies that can be easily prevented with proper sanitation and hygiene procedures.Of course it is important to note that hand hygiene or hand washing is not enough. It must be done properly, following certain guidelin es. It is not enough to clean the hands; they must be disinfected. Normal or ordinary hand washing is the same as no hand hygiene at all. This means that hand washing must be done right, or not at all because it does not make any difference to harmful microbes or the health of the patients. Hand hygiene depends on the case and the area of the hospital involved. Normal hand hygiene should be done for at least a minute, with vigorous rubbing of the two hands against each other. Plain soap has been proven to effective against microorganism because the soap lifts the microbes off the surface of the skin to be rinsed off by running water.Hand hygiene need not be complicated or costly. All it takes is soap, running water, and friction, and the discipline to do it regularly and properly. The key is to make it a habit. There is no dearth of evidence showing that hand washing is effective in halting the spread of infections; the problem is that very few people in the health care industry pra ctice hand hygiene in compliance with regulations. Most wash their hands but do so inappropriately, which is useless in itself.While stopping the spread of nosocomial infections is complex, there is no denying the fact that the first line of defense against nosocomial infections is hand hygiene for nurses and doctors. Simple adherence to proper cleaning/disinfecting procedures is all that is needed to prevent needless infections from spreading any further and causing more harm. It is simply a matter of discipline.First do no harm†¦ that is the adage that all health workers swear by. It is ironic that nurses and doctors should also be the main vectors of nosocomial infections. These nosocomial infections are the shame of the healthcare system because it can be prevented with faithful compliance to proper hygiene procedures. The solution lies literally in our hands. If we don’t clean our hands, then it is dirty with the needless suffering and death of patients from nosocom ial infections. Our dirty hands are guilty hands.Works CitedGoldmann, Donald. â€Å"System Failure Versus Personal Accoutability–The Case for Clean Hands. New England Journal of Medicine. 355:121-3. 13 July 2006. 22 May 2007. https://content.nejm.org/cgi/reprint/355/2/121.pdfCenters for Disease Control and Prevention. (2006). Healthcare-Associated Infections (HAIs).  Ã‚   Retrieved March 17, 2007, from http://www.cdc.gov/ncidod/dhqp/healthDis.htmlDucel, G., et al., eds. Prevention of Hospital Acquired Infections-A Practical Guide. Geneva: World Health Organization. 2002. 21 May 2007.   http://www.who.int/csr/resources/publications/drugresist/whocdscsreph200212.pdfGorman, Christine. â€Å"Wash Those Hands† How doctors and nurses can make you sick — and what you can do about it. TIME. 163. 1. 29 March 2004: Opposing Viewpoints Resource Center. Thomas Gale. Pasco-Hernando Community College Lib., New Port Richey, FL. 23 May 2007. http://www.time.com/time/magazi ne/article/0,9171,993710,00.htmlâ€Å"Guideline for Hand Hygiene in Health-Care Settings† Recommendations of the Healthcare Infection Control Practices Advisory Committee and the HICPAC/SHEA/APIC/IDSA Hand Hygiene Task Force. 51. 25. Oct. 2002: 1-44. Boyce, John and Diddier, Pittet. Het.comps Center for Disease Control and Prevention (CDC). MMWR. Retrieved on 23 May 2007.   http://www.cdc.gov/mmwr/preview/mmwrhtml/rr5116a1.htmMcCaughey, Betsy. â€Å"Coming Clean. (Editorial Desk) (Hospital Hygiene and Infections).† The New York Times. 6 June 2005: Opposing Viewpoints Resource Center. Thomas Gale. Pasco-Hernando Community College Lib., New Port Richey, FL. 23 May 2007. http://hospitalinfection.org/press/060505ny_times.pdf

Sunday, September 29, 2019

Ccna 2 Lab Book

Routers and Routing Basics CCNA 2 Labs and Study Guide Instructor Edition Allan Johnson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii Routers and Routing Basics CCNA 2 Labs and Study Guide Routers and Routing Basics CCNA 2 Labs and Study Guide Instructors Edition Allan Johnson Copyrigh © 2007 Cisco Systems, Inc. Cisco Press logo is a trademark of Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved.No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 First Printing July 2006 Library of Congress Cataloging-in-Publication Number: 2006920176 ISBN: 1-58713-167-6 Warning and Disclaimer This book is desi gned to provide information about the labs for the Routers and Routing Basics CCNA 2 course of the Cisco Networking Academy Program.Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an â€Å"as is† basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc. Feedback InformationAt Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community. Readers†™ feedback is a natural continuation of this process. If you have any comments regarding how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through e-mail at [email  protected] com. Please make sure to include the book title and ISBN in your message. We greatly appreciate your assistance.Publisher Paul Boger Cisco Representative Anthony Wolfenden Cisco Press Program Manager Jeff Brady Executive Editor Mary Beth Ray Production Manager Patrick Kanouse Senior Development Editor Christopher Cleveland Senior Project Editor San Dee Phillips Copy Editor John Edwards Technical Editor Tom Knott Team Coordinator Vanessa Evans Book and Cover Designer Louisa Adair Composition Louisa Adair Proofreader Gayle Johnson iii Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc. cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. iv Routers and Routing Basics CCNA 2 Labs and Study Guide About the Author Allan Johnson entered the academic world in 1999 after ten years as a business owner/operator to dedicate his efforts to his passion for teaching. He has an M. B. A. and an M. Ed. in occupational training and development. Allan is currently pursuing an M. S. in information security. He is an information technology instructor at Mary Carroll High School and Del Mar College in Corpus Christi, Texas.Since 2003, Allan has committed much of his time and energy to the CCNA Instructional Support Team, providing services for instructors worldwide and creating training materials. He is a familiar voice on the Cisco Networking Academy Community forum â€Å"Ask the Experts† series. He currently holds CCNA and CCAI certifications. About the Technical Reviewer Tom Knott is a Networking Aca demy instructor and IT career–focused learning community director in the Career and Technical Education department at Southeast Raleigh Magnet High School, Raleigh, N. C. Tom has taught all versions of the CCNA curriculum since v1. 1.He coauthored Networking Basics CCNA 1 Companion Guide (ISBN: 1-58713-164-1), the only authorized Companion Guide for the Cisco Networking Academy Program. v Dedication To my wife, Becky, and my daughter, Christina. Thank you both for your love and patience. vi Routers and Routing Basics CCNA 2 Labs and Study Guide Acknowledgments As technical editor, Tom Knott served admirably as my second pair of eyes, finding and correcting technical inaccuracies as well as grammatical errors, helping to make this project a first-class production. Mary Beth Ray, executive editor, did an outstanding job steering this project from beginning to end.I can always count on Mary Beth to make the tough decisions. Christopher Cleveland, development editor, has a dedica tion to perfection that pays dividends in countless, unseen ways. Thank you for providing me with much-needed guidance and support. This book could not be a reality without your persistence. Last, I cannot forget to thank all my students—past and present—who have helped me over the years to create engaging and exciting activities and labs. There is no better way to test the effectiveness of an activity than to give it to a team of dedicated students.They excel at finding the obscurest of errors! I could have never done this without all your support. vii Contents at a Glance Chapter 1 WANs and Routers 1 Chapter 2 Introduction to Routers Chapter 3 Configuring a Router Chapter 4 Learning About Other Devices 119 Chapter 5 Managing Cisco IOS Software 197 Chapter 6 Routing and Routing Protocols 239 Chapter 7 Distance Vector Routing Protocols Chapter 8 TCP/IP Suite Error and Control Messages Chapter 9 Basic Router Troubleshooting Chapter 10 Intermediate TCP/IP Chapter 11 Acce ss Control Lists (ACLs) Appendix A CCNA 2 Skills-Based Assessment PracticeAppendix B Router Interface Summary Appendix C Erasing and Reloading the Router 21 55 271 351 357 425 439 557 559 551 viii Routers and Routing Basics CCNA 2 Labs and Study Guide Contents Chapter 1: WANs and Routers Study Guide WANs 1 2 2 Vocabulary Exercise: Matching 3 Vocabulary Exercise: Completion 4 Concept Questions 4 Routers 5 Vocabulary Exercise: Completion 5 Internal Components of a Router 6 Label the External Components of a Router 8 Label the Topology Components Exercise 9 Concept Questions 10 Lab Exercises 11 Curriculum Lab 1-1: Connecting Console Interfaces (1. 2. ) 11 Task 1: Identify Connectors and Components 11 Task 2: Identify the Computer Serial Interface (COM 1 or 2) 11 Task 3: Locate the RJ-45–to–DB9 Adapter 12 Task 4: Locate or Build a Rollover Cable 12Task 5: Connect Cabling Components 13 Curriculum Lab 1-2: Connecting Router LAN Interfaces (1. 2. 6) 13 Task 1: Identify the Et hernet or Fast Ethernet Interfaces on the Router 14 Task 2: Identify the Proper Cables and Connect the Router to a Hub or Switch 14 Task 3: Connect the Workstation Ethernet Cabling 15 Task 4: Verify the Connection 15 Curriculum Lab 1-3: Connecting WAN Interfaces (1. . 7) 15 Task 1: Identify the Serial Interfaces on the Router 16 Task 2: Identify and Locate the Proper Cables 16 Task 3: Cable the Routers 17 Challenge Lab 1-4: Build a Two-Router Topology 18 Task 1: Choose the Devices 18 Task 2: Choose the Cables 18 Task 3: Connect the Devices 19 Task 4: Verify Connectivity 19 Chapter 2: Introduction to Routers Study Guide 21 22 Cisco IOS and the IOS Command-Line Interface 22 Vocabulary Exercise: Matching 22 Vocabulary Exercise: Completion 23 Concept Questions 24 Internet Research 25 Starting, Configuring, Accessing, and Using a Router CLI 26 ixRouter Boot Sequence Exercise 26 Using the Router CLI Exercise 27 Interpreting Command Output Exercise 28 Concept Questions 29 Lab Exercises 31 Command Reference 31 Curriculum Lab 2-1: Router Configuration Using Setup (2. 2. 1) 31 Task 1: Start the Router and Begin Setup Mode 32 Task 2: Continue with the Setup Dialog Box 32 Task 3: Show the Current Interface Summary 32 Task 4: Configure the Global Parameters 33 Task 5: Configure the Interface Parameters 33 Task 6: Specifying Whether to Use the Configuration Command Script 33 Curriculum Lab 2-2: Establishing a Console Session withHyperTerminal (2. 2. 4) 34 Task 1: Connect a Rollover Cable to the Console Port 34 Task 2: Start HyperTerminal 34 Task 3: Name the HyperTerminal Session 34 Task 4: Specify the Computer’s Connecting Interface 35 Task 5: Specify the Interface Connection Properties 35 Task 6: Close the Session 36 Task 7: Reopen the HyperTerminal Connection, as Shown in Task 2 37 Task 8: Terminate the HyperTerminal Session 37 Curriculum Lab 2-3: Command-Line Fundamentals (2. 2. 9) 37 Task 1: Start HyperTerminal 38 Task 2: Log In to the Router 38 Task 3: Use the H elp Feature 38 Task 4: Enter Privileged EXEC Mode 38Task 5: Use the Help Feature 39 Task 6: List the show Commands 39 Task 7: Examine the Running Configuration 39 Task 8: Examine the Configuration in More Detail 39 Task 9: Use the Command History Feature 39 Task 10: Log Off and Turn Off the Router 39 Comprehensive Lab 2-4: Exploring the Router and IOS 40 Task 1: Physically Connect to a Router and Start a HyperTerminal Session 40 Task 2: Exploring Setup Mode 42 Task 3: Use the Help Feature 45 Task 4: Examining the Router 47 Task 5: Configure a Workstation on the Router’s LAN 48 Task 6: Troubleshooting Connectivity 49Task 7: Restore Equipment Configurations 50 Challenge Lab 2-5: Configure a Two-Router Topology 51 Task 1: Cable the Topology 51 Task 2: Design and Document Addressing Scheme 51 x Routers and Routing Basics CCNA 2 Labs and Study Guide Task 3: Configure IP Addressing on the Two Routers 52 Task 4: Configure Static Routing Between the Two Routers 52 Task 5: Configure I P Addressing on the Two PCs 53 Task 6: Test Connectivity and Troubleshoot 53 Chapter 3: Configuring a Router Study Guide 55 56 Configuring a Router for Basic Routing 56 Router Prompt Exercise 56 Basic Configuration Exercise 56 how Commands Exercise 59 Documenting the Router Configuration Finishing the Configuration Exercise 62 Managing the Configuration File Exercise 63 Lab Exercises 62 64 Command Reference 64 Curriculum Lab 3-1: Command Modes and Router Identification (3. 1. 2) 65 Task 1: Log in to the Router in User Mode 66 Task 2: Log in to the Router in Privileged Mode 66 Task 3: Enter Global Configuration Mode 66 Task 4: Enter Router Configuration Mode 67 Task 5: Exit from Router Mode and Enter Interface Configuration Mode 67 Task 6: Assign a Name to the Router 67 Task 7: Exit the Router and Global Configuration Mode 68Curriculum Lab 3-2: Configuring Router Passwords (3. 1. 3) 68 Task 1: Log in to the Router in User EXEC Mode 68 Task 2: Log in to the Router in Privileged EXEC M ode 69 Task 3: Enter Global Configuration Mode 69 Task 4: Enter a Hostname of GAD for This Router 69 Task 5: Configure the Console Password on the Router and Exit Line Mode 69 Task 6: Configure the Password on the Virtual Terminal Lines and Exit Line Mode 70 Task 7: Configure the Enable Password and Exit 70 Task 8: Return to User EXEC Mode 70 Task 9: Enter Privileged EXEC Mode Again 70 Task 10: Return to Configuration Mode 70Task 11: Configure the Enable Secret Password and Exit Global Configuration Mode 70 Task 12: Return to User EXEC Mode 71 Task 13: Enter Privileged EXEC Mode Again 71 Task 14: Enter Privileged EXEC Mode Again 71 Task 15: Show the Router’s Running Configuration 71 Curriculum Lab 3-3: Using Router show Commands (3. 1. 4) 73 Task 1: Log in to the Router 74 xi Task 2: Enter the help Command 74 Task 3: Display Help for the show Command 74 Task 4: Display the IOS Software Version and Other Important Information 74 Task 5: Display the Router’s Time and Dat e 75 Task 6: Display a Cached List of Hostnames and Addresses 75Task 7: Display Users Who Are Connected to the Router 75 Task 8: Display the Command Buffer 75 Task 9: Enter Privileged Mode 75 Task 10: Enter the help Command 75 Task 11: Display the Router Address Resolution Protocol (ARP) Table 76 Task 12: Display Information About the Flash Memory Device 76 Task 13: Show Information About the Active Configuration File 76 Task 14: Display Information About the Backup Configuration File 76 Task 15: Display Statistics for All Interfaces Configured on the Router 76 Task 16: Display the Protocols Configured on the Router 77Curriculum Lab 3-4: Configuring a Serial Interface (3. 1. 5) 77 Task 1: Connect the Router and Workstation Cabling 78 Task 2: Configure the Name and Passwords for Router 1 78 Task 3: Configure Serial Interface Serial 0 78 Task 4: Save the Running Configuration to the Startup Configuration in Privileged EXEC Mode 78 Task 5: Display Information About Serial Interface 0 o n GAD 79 Task 6: Configure the Name and Passwords for Router 2 80 Task 7: Configure Serial Interface Serial 0 81 Task 8: Save the Running Configuration to the Startup Configuration in Privileged EXEC Mode 81Task 9: Display Information About Serial Interface 0 on BHM 82 Task 10: Verify That the Serial Connection Is Functioning 83 Curriculum Lab 3-5: Making Configuration Changes (3. 1. 6) 84 Task 1: Connect the Router and Workstation Cabling 84 Task 2: Configure Hostname and Passwords 85 Task 3: Configure the Serial 0 Interface 85 Task 4: Save the Configuration 85 Task 5: Verify the Configuration 85 Task 6: Modify the Configuration 85 Task 7: Bring Down Serial Interface 0 86 Task 8: Bring Up the Serial 0 Interface 86 Task 9: Verify the Configuration 87 Curriculum Lab 3-6: Configuring an Ethernet Interface (3. . 7) 89 Task 1: Configure the Hostname and Passwords on the GAD Router 89 Task 2: Configure the FastEthernet 0 Interface 89 Task 3: Save the Configuration 90 Task 4: Display the FastEthernet 0 Configuration Information 90 Curriculum Lab 3-7: Configuring Interface Descriptions (3. 2. 3) 92 Task 1: Configure the Hostname and Passwords on the Router 93 Task 2: Enter Global Configuration Mode 93 xii Routers and Routing Basics CCNA 2 Labs and Study Guide Task 3: Enter Interface Configuration Mode 93 Task 4: Display Help for the description Command 93 Task 5: Choose a Description for the Interface 93Task 6: Enter a Description for Interface Serial 0 94 Task 7: Examine the Active Configuration File 94 Task 8: Confirm That the Interface Description Is Correct 95 Curriculum Lab 3-8: Configuring Message of the Day (MOTD) (3. 2. 5) 96 Task 1: Configure Basic Router Information 97 Task 2: Enter Global Configuration Mode 97 Task 3: Display Help for the banner motd Command 97 Task 4: Choose the Text for MOTD 97 Task 5: Enter the Desired Banner Message 97 Task 6: Test the MOTD Display 98 Task 7: Verify the MOTD by Looking at the Router Configuration 98 Curriculum Lab 3-9: Configuring Host Tables (3. . 7) 99 Task 1: Configure the Hostname and Passwords on the GAD Router 100 Task 2: Configure the Interfaces and Routing Protocol on the GAD Router 100 Task 3: Save the GAD Router Configuration 101 Task 4: Configure the Hostname and Passwords on the BHM Router 101 Task 5: Configure the Interfaces and Routing Protocol on the BHM Router 101 Task 6: Save the BHM Router Configuration 101 Task 7: Verify That the Internetwork Is Functioning 101 Task 8: Configure the IP Host Table for the Network 102 Task 9: Exit Configuration Mode and Test 102 Curriculum Lab 3-10: Backing Up Configuration Files (3. . 9) 106 Task 1: Configure the Hostname and Passwords on the GAD Router 107 Task 2: Configure the Interfaces and Routing Protocol on the GAD Router 107 Task 3: Save the GAD Router Configuration 107 Task 4: Configure the Hostname and Passwords on the BHM Router 107 Task 5: Configure the Interfaces and Routing Protocol on the BHM Router 107 Task 6: Save the BHM Router Configuration 108 Task 7: Verify That the Internetwork Is Functioning 108 Task 8: Start Capturing the Configuration File 108 Task 9: Stop Capturing the Configuration File 110 Task 10: Clean Up the Captured Configuration File 110Task 11: Test Your Backup Configuration 112 Task 12: Restart the Router to Remove the Running Configuration 112 Task 13: Reconfigure the Router from the Saved Text File 112 Task 14: Verify That the Internetwork Is Functioning Again 113 Comprehensive Lab 3-11: Basic Router Configuration and File Management 113 Task 1: Set Up Lab Equipment and Document 114 Task 2: Document Interface Descriptions and Banner 114 Task 3: Basic Router Configurations 115 Task 4: Interface Configurations 115 xiii Task 5: Routing Configurations 115 Task 6: Configure Hosts and Verify Full Network Connectivity 116 Task 7: Capture Configurations and Clean Up . xt Scripts 116 Task 8: Erase Routers and Reload with . txt Files 116 Task 9: Return Equipment to Former State 116 Challenge Lab 3 -12: Basic Router Configuration Challenge 117 Task 1: Edit Script with a New Configuration 117 Task 2: Load Scripts into the Routers 117 Task 3: Attach and Configure Hosts 118 Task 4: Verify Routing and Test Connectivity 118 Chapter 4: Learning About Other Devices Study Guide 119 120 Discovering Neighbors Using CDP 120 CDP Concepts and Commands Exercise 120 Network Topology Discovery Exercise 1 123 Network Topology Discovery Exercise 2 128Getting Information and Troubleshooting Remote Devices Concept Questions 135 Lab Exercises 135 139 Command Reference 139 Curriculum Lab 4-1: Creating a Network Map Using CDP (4. 1. 4) 139 Task 1: Log in to Router 1 (GAD) 140 Task 2: Configure the Routers 140 Task 3: Gather Information About GAD’s Interfaces 140 Task 4: Display the CDP Updates Received on the Local Router 140 Curriculum Lab 4-2: Using CDP Commands (4. 1. 6) 143 Task 1: Configure the Routers 144 Task 2: Gather Information About the GAD Router’s Interfaces 144 Task 3: En able the Interfaces on GAD 145Task 4: Gather Information About the GAD Router Interfaces 145 Task 5: Display the Values of the CDP Timers, the Interface Status, and Encapsulation Used 145 Task 6: Display the CDP Updates Received on the Local Router 146 Task 7: Enable Serial 0 Interface on BHM 146 Task 8: Display Details About CDP Updates Received on the Local Router GAD 147 Task 9: Observe CDP Packets Being Sent and Received on Router GAD 147 Task 10: Observe CDP Packet Traffic 148 Curriculum Lab 4-3: Establishing and Verifying a Telnet Connection (4. 2. 2) 149 Task 1: Configure the Routers 150Task 2: Log in to Router 1 and Verify the Connection to Router 2 150 Task 3: Use help with the Telnet Command 150 Task 4: Telnet to a Remote Router 150 xiv Routers and Routing Basics CCNA 2 Labs and Study Guide Task 5: Look at the Interfaces on the Remote Router 150 Task 6: Display the Protocols on the Remote Router 151 Task 7: Enter Privileged EXEC Mode 151 Task 8: Look at the Running Configu ration 151 Task 9: Look at the Saved Configuration 151 Task 10: Look at the Neighbor Configuration 151 Curriculum Lab 4-4: Suspending and Disconnecting Telnet Sessions (4. 2. 3) 154 Task 1: Configure the Routers 155Task 2: Log in to GAD and Verify the Connection to BHM 155 Task 3: Telnet to a Remote Router 155 Task 4: Look at the Interfaces on the Remote Router 155 Task 5: Suspend the Current Telnet Session 156 Task 6: Resume a Telnet session 156 Task 7: Close a Telnet Session 156 Curriculum Lab 4-5: Advanced Telnet Operations (4. 2. 4) 158 Task 1: Configure the GAD, BHM, and PHX Routers Using the Tables 160 Task 2: Log in to Router 1 and Verify the Connection to Routers 2 and 3 160 Task 3: Telnet to a Remote Router 160 Task 4: Look at the Interfaces on the Remote Router 160 Task 5: Suspend the Current Telnet Session 162Task 6: Establish Another Telnet Session 162 Task 7: Suspend the Current Telnet Session 162 Task 8: Use the show sessions Command to See the Connections 162 Task 9: Resume the Previously Suspended Telnet Session 162 Task 10: Use the show sessions Command to See the Connections 162 Task 11: Close a Telnet Session 163 Task 12: Use the show sessions Command to See the Connections 163 Task 13: Resume the Previously Suspended Telnet Session 163 Task 14: Close a Telnet Session 163 Task 15: Problems with Linked Telnet Sessions on Multiple Routers 164 Task 16: Telnet to the BHM Router 164Task 17: Telnet Back to the PHX Router 164 Task 18: Telnet to the GAD Router 164 Task 19: Telnet to the BHM Router 164 Task 20: Exiting from All Sessions 164 Curriculum Lab 4-6: Connectivity Tests—Ping (4. 2. 5a) 168 Task 1: Configure the GAD and BHM Routers 169 Task 2: Log in to GAD and Verify the Connection to BHM 170 Task 3: Display Information About Host to Layer 3 Address Mappings 170 Task 4: Use the ping Command 170 Task 5: Examine the Results of the ping Command 171 Task 6: Configure the Workstations 171 Task 7: Use the ping command from the Workstation 1 71 Task 8: Test Layer 3 Connectivity 172Task 9: From the Host, Telnet to the Directly Connected Router 172 xv Task 10: Perform an Extended ping 172 Task 11: Perform Another Extended ping 172 Task 12: Perform an Extended ping from the Host 173 Curriculum Lab 4-7: Connectivity Tests—Traceroute (4. 2. 5b) 176 Task 1: Configure the Routers 177 Task 2: Configure the Workstations 177 Task 3: Use the ping Command from the Workstation 177 Task 4: Test Layer 3 Connectivity 177 Task 5: Log in to the Router in User Mode 178 Task 6: Discover the traceroute Options 178 Task 7: Use the Help Function with traceroute 178 Task 8: Continue Discovering the traceroute Options 178Task 9: Use the traceroute Command 179 Task 10: Continue Using traceroute 179 Task 11: Use the tracert Command from a Workstation 179 Task 12: Trace to Cisco and Other Common Websites 180 Task 13: Compare the IP Route traces to Cisco, Yahoo, and AOL 181 Curriculum Lab 4-8: Troubleshooting IP Address Issues (4. 2. 6) 182 Task 1: Configure the Routers 183 Task 2: Configure the Workstations 183 Task 3: Use the ping Command from the Workstation 183 Comprehensive Lab 4-9: CDP Commands 186 Task 1: Cabling, Basic Router Configuration, Workstation Configuration, and Verification 187Task 2: Display the Values of the CDP Timers, the Interface Status, and the Encapsulation Used 190 Task 3: Display CDP Information About Other Devices 191 Task 4: Monitoring and Observing CDP Traffic 191 Comprehensive Lab 4-10: Network Troubleshooting Commands 192 Task 1: Cable and Configure the Topology 192 Task 2: Verify Network Layer Connectivity 193 Task 3: Verify the Path from Source to Destination 194 Task 4: Advanced Telnet Operations 195 Task 5: Finalize Documentation and Restore Equipment Configurations 196 Chapter 5: Managing Cisco IOS Software Study Guide 197 198Router Boot Sequence and Loading IOS Images 198 Vocabulary Exercise: Completion 198 Router Boot Sequence Exercise 199 Boot System Commands Exercise 199 Config uration Register Exercise 199 Journal Entry 200 Managing Cisco Router IOS and Configuration Files 200 IOS Naming Convention Exercise 200 xvi Routers and Routing Basics CCNA 2 Labs and Study Guide Backing Up an IOS and Configuration File Exercise 202 Using ROMMON and the tftpdnld Command Exercise 203 Command Reference 205 Lab 5-1: Using the boot system Command (5. 1. 3) 206 Task 1: Log in to the Router 206 Task 2: Enter Privileged EXEC Mode 206Task 3: Save the Existing running-config to the startup-config 207 Task 4: Configure the Router and View the Running Configuration File 207 Task 5: Show Information About the Backup Configuration File 207 Task 6: Display the IOS Version and Other Important Information 207 Task 7: Create the Statements to Perform the Following Functions 208 Task 8: Show Information About the Flash Memory Device 209 Task 9: Specify a Fallback Boot Sequence 209 Lab 5-2: Troubleshooting Configuration Register Boot Problems (5. 1. 5) 211 Task 1: Log in to the Router 211 Task 2: Configure the Router Name and Configuration Register Setting 211 Task : Save the Existing running-config to the startup-config 212 Task 4: Restart the Router 212 Task 5: View the Running Configuration File 212 Task 6: Reload the Saved Configuration 213 Task 7: Display the IOS Version and Other Important Information 213 Task 8: Change the Configuration Register to Load the Startup Configuration File from NVRAM, Save, and Reload the Router 214 Task 9. Verify the Configuration Register Setting and Log Out of the Router 214 Lab 5-3: Managing Configuration Files with TFTP (5. 2. 3) 216 Task 1: Configure the GAD Router 217 Task 2: Configure the Workstation 217Task 3: Start and Configure the Cisco TFTP Server 218 Task 4: Verify Connectivity by Pinging the TFTP Server 218 Task 5: Copy the running-config to the TFTP Server 218 Task 6: Verify the Transfer to the TFTP Server 218 Task 7: Copy the startup-config from the TFTP Server 218 Task 8: Save the New running-config 219 Task 9 : Test the Restored File 219 Lab 5-4: Managing IOS Images with TFTP (5. 2. 5) 219 Task 1: Configure the GAD Router 220 Task 2: Configure the Workstation 220 Task 3: Collect Information to Document the Router 220 Task 4: Collect More Information to Document the Router 220Task 5: Start and Configure the Cisco TFTP Server 221 Task 6: Verify Connectivity by Pinging the TFTP Server 221 Task 7: Prepare to Copy the IOS to the TFTP Server 221 Task 8: Copy the IOS Image to the TFTP Server 221 Task 9: Verify the Transfer to the TFTP Server 222 Task 10: Copy the IOS Image from the TFTP Server 222 xvii Task 11: Test the Restored IOS Image 223 Lab 5-5: Password Recovery Procedures (5. 2. 6a) 224 Task 1: Attempt to Log in to the Router 225 Task 2: Document the Current Configuration Register Setting 225 Task 3: Enter ROM Monitor Mode 225 Task 4: Examine the ROM Monitor Mode Help 225Task 5: Change the Configuration Register Setting to Boot Without Loading the Configuration File 226 Task 6: Restart the Router 226 Task 7: Enter Privileged EXEC Mode and Change the Password 226 Task 8: Verify the New Password and Configuration 227 Lab 5-6: Managing IOS Images with ROMMON and Xmodem (5. 2. 6b) 227 Task 1: Enter the ROM Monitor Mode 228 Task 2: Find a Valid Image in Flash Memory 228 Task 3: Recover from the Listed Images if You See Any 228 Task 4: Record Information Using show version 228 Task 5: Configure the Boot Register to Enter ROMMON Mode 229 Task 6: View Available Commands from the ROMMON Prompt 229Task 7: Reset the Terminal Speed for a Faster Download 230 Task 8: Use the xmodem Command to Request a File from the Host 231 Task 9: Send the File from the HyperTerminal Program 231 Task 10: Reset the Boot Register and the Console Speed 233 Task 11: Review the New Settings 233 Challenge Lab 5-7: Use TFTP to Load IOS and Configuration File 234 Task 1: Cable the Lab and Gather Information 234 Task 2: Change the Configuration Register Setting 235 Task 3: Add Statements to Specify a Different Boot Sequence 236 Task 4: Test Your Boot System Commands 236 Task 5: Back Up the Configuration File to a TFTP Server 237Task 6: Back Up the IOS Stored in Flash to a TFTP Server 237 Instructor Confirmation 238 Chapter 6: Routing and Routing Protocols Study Guide 239 240 Adding Connected and Static IP Routes 240 Dissecting a Routing Table Entry Exercise 240 Static Routing Configuration Exercise 1 241 Static Routing Configuration Exercise 2 242 Internet Research: What Is Administrative Distance? 244 Concept Questions 245 Routing Protocols Overview 245 Vocabulary Exercise: Matching 246 Vocabulary Exercise: Completion 247 xviii Routers and Routing Basics CCNA 2 Labs and Study Guide Routing Protocols Flow Chart Exercise 247Concept Questions 248 Routing Protocols: Survey and Configuration Routing Protocol Characteristics Exercise 248 248 RIP Configuration Exercise 1 249 RIP Configuration Exercise 2 250 Concept Questions 252 Lab Exercises 253 Command Reference 253 Curriculum Lab 6 -1: Configuring Static Routes (6. 1. 6) 253 Task 1: Configure Both Routers 254 Task 2: Configure the Workstations with the Proper IP Address, Subnet Mask, and Default Gateway 254 Task 3: Check the Interface Status 255 Task 4: Check the Routing Table Entries 255 Task 5: Add Static Routes 256 Task 6: Verify the New Routes 256 Task 7: Try to Ping Host to Host Again 256Comprehensive Lab 6-2: Static Routing with Migration to Dynamic Routing 259 Task 1: Cable the Lab 260 Task 2: Basic Router Configurations 260 Task 3: Interface Configurations 260 Task 4: Static Routing Configurations 261 Task 5: Migrate to Dynamic Routing 262 Challenge Lab 6-3: Static and Dynamic Routing Configuration 264 Task 1: Cabling, Basic Router Configuration, and Verification 265 Task 2: Configure RIP Routing on HQ and BRANCH 266 Task 3: Configure Static and Default Routing 268 Chapter 7: Distance Vector Routing Protocols Study Guide 271 272 Avoiding Loops When Converging Using Distance Vector Routing Protocols 272 Vocabulary Exercise: Matching 272 Vocabulary Exercise: Completion 273 Routing Loop Avoidance Exercise 273 Routing Information Protocol 275 RIP v1 and RIP v2 Comparison Exercise 275 Advanced RIP Concepts and Configuration Exercise 275 Troubleshooting with show Commands 280 Troubleshooting with debug Commands 282 Lab Exercises 284 Command Reference 284 Lab 7-1: Configuring RIP (7. 2. 2) 285 xix Task 1: Configure the Routers 286 Task 2: Check the Routing Table Entries 286 Task 3: Configure the Routing Protocol on the GAD Router 286 Task 4: Save the GAD Router Configuration 287Task 5: Configure the Routing Protocol on the BHM Router 287 Task 6. Save the BHM Router Configuration 287 Task 7: Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 287 Task 8: Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 287 Task 9: Show the Routing Tables for Each Router 287 Lab 7-2: Troubleshooting RIP (7. 2. 6) 290 Task 1: Configure the Routers 291 Task 2: Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 291 Task 3: Make Sure That Routing Updates Are Being Sent 291Task 4: Show the Routing Tables for Each Router 292 Task 5: Show the RIP Routing Table Entries for Each Router 293 Task 6: Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 293 Lab 7-3: Preventing Routing Updates Through an Interface (7. 2. 7) 295 Task 1: Configure the Routers 296 Task 2: Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 296 Task 3: Check the Basic Routing Configuration 296 Task 4: Observe RIP Routing Updates 297 Task 5: Stop Routing Updates from GAD to BHM 298Task 6: Add a Default Route to BHM 298 Lab 7-4: Load Balancing Across Multiple Paths (7. 2. 9) 301 Task 1: Configure the Routers 302 Task 2: Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 303 Task 3: Check the Basic Routing Configuration 303 Task 4: Ensure That the Router Load-Balances on a Per-Packet Basis 304 Task 5: Verify Per-Packet Load Balancing 304 Task 6: Verify Per-Destination Load Balancing 305 Lab 7-5: Configuring IGRP (7. 3. 5) 306 Task 1: Configure the Routers 307 Task 2: Configure the Routing Protocol on the GAD Router 307 Task 3.Save the GAD Router Configuration 307 Task 4: Configure the Routing Protocol on the BHM Router 308 Task 5: Save the BHM Router Configuration 308 Task 6: Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 308 Task 7: Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 308 xx Routers and Routing Basics CCNA 2 Labs and Study Guide Task 8: Show the Routing Tables for Each Router 308 Task 9: Verify the Routing Protocol 309 Task 10: Verify the IGRP Statements in the Running Configuration of Both Routers 310Task 11: Verify the IGRP Routing Updates Using the debug ip igr p events Command 310 Task 12: Verify the IGRP Routing Updates Using the debug ip igrp transactions Command 311 Task 13: Analyze Specific Routes 311 Lab 7-6: Default Routing with RIP and IGRP (7. 3. 6) 314 Task 1: Configure the Routers 316 Task 2: Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 316 Task 3: Check the Basic Routing Configuration 316 Task 4: Verify Connectivity 316 Task 5: Configure Centre as the Connection to the Internet Service Provider (ISP) 316 Task 6: Set Up a Default Route on the Centre Router 316Task 7: Verify the Routing Tables 317 Task 8: Migrate the Network from RIP to IGRP 317 Task 9: Check Centre’s Routing Table for the Static Default Route 318 Task 10: Create a Second Loopback Interface on Centre to Test the Default Route 318 Lab 7-7: Unequal-Cost Load Balancing with IGRP (7. 3. 8) 322 Task 1: Configure the Routers 323 Task 2: Configure Bandwidth on the MAD Router Interfaces 323 Task 3: Configure the Hosts with t he Proper IP Addresses, Subnet Masks, and Default Gateways 324 Task 4: Use the variance Command to Configure Unequal-Cost Load Balancing 324 Task 5: Check the Basic Routing Configuration 326Task 6: Verify Per-Packet Load Balancing 327 Task 7: Verify Per-Destination Load Balancing 328 Comprehensive Lab 7-8: Advanced RIP Configuration and Troubleshooting 332 Task 1: Cable the Lab 332 Task 2: Basic Router Configurations 333 Task 3: Interface Configurations 333 Task 4: Dynamic Routing Configurations 334 Task 5: Migration to RIP v2 335 Task 6: Configure and Redistribute a Default Route 339 Task 7: Optimize and Verify RIP Routing 340 Challenge Lab 7-9: RIP and Default Routing to ISP 342 Task 1: Cable the Lab 343 Task 2: Basic Router Configurations 343 Task 3: Interface Configurations 343Task 4: Dynamic Routing Configuration for BRANCH and HQ 344 xxi Task 5: Configure Static Routing on ISP 345 Task 6: Configure Primary Default Routing on HQ 346 Task 7: Configure BRANCH with a Floating Stat ic Default Route 347 Task 8: Test the Backup Route 347 Task 9: Capture and Document Your Configurations 349 Chapter 8: TCP/IP Suite Error and Control Messages Study Guide 351 352 TCP/IP Error Messages: ICMP 352 Vocabulary Exercise: Completion 352 IP Packet Header Exercise 353 ICMP Message Type Exercise 353 ICMP Destination Unreachable Codes Exercise 354 Concept Questions 355 Lab Exercises Chapter 9: 356Basic Router Troubleshooting Study Guide 357 358 Examining the Routing Table 358 Vocabulary Exercises: Completion 358 Interpreting a Routing Table Entry Exercise 360 The show ip route Options Exercise 361 Layer 2 and Layer 3 Address Exercise 361 Complete the Administrative Distance Table Exercise 362 Concept Questions 363 Network Testing Methods and Tips 363 Using the OSI Model to Troubleshoot 364 Match the Tool to the Layer Exercise 365 Concept Questions 365 Router and Routing Troubleshooting Tips 365 The show Command Exercise 366 The debug Command Exercise 371 Concept Questions 372 Lab Exercises 373Command Reference 373 Lab 9-1: Using show ip route to Examine Routing Tables (9. 1. 1) 373 Task 1: Configure the Routers 374 Task 2: Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 374 Task 3: Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 374 Task 4: Make Sure That Routing Updates Are Being Sent 375 Task 5: Show the Routing Tables for Each Router 376 Task 6: Enable IGRP Routing on Both Routers 376 xxii Routers and Routing Basics CCNA 2 Labs and Study Guide Task 7: Show the Routing Tables for Each Router Again 376Task 8: Add a Second Serial Cable Between Routers 377 Task 9: Clear the Routing Tables on Both Routers 377 Task 10: Use show ip route to See Different Routes by Type 377 Lab 9-2: Gateway of Last Resort (9. 1. 2) 380 Task 1: Configure the Routers 381 Task 2: Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 381 Task 3: Verify That th e Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 381 Task 4: Make Sure That Routing Updates Are Being Sent 381 Task 5: Show the Routing Tables for Each Router 382 Task 6: Add the Default Route to the BHM Router 382Task 7: Add the Default Route to the GAD Router 382 Task 8: Remove RIP Routing from Both Routers 382 Task 9: Remove the Default Route from Only the GAD Router 382 Task 10: Remove RIP Routing from the Routers and Use IGRP Instead 383 Task 11: Enter a Default Network Entry on the BHM Router 383 Lab 9-3: Last Route Update (9. 1. 8) 386 Task 1: Configure the Routers 386 Task 2: Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 387 Task 3: Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 387Task 4: Make Sure That Routing Updates Are Being Sent 387 Task 5: Show the Routing Tables for Each Router 387 Task 6: Check the Routing Table for a Specific Route 38 8 Task 7: Check the IP RIP Database on the BHM Router 389 Task 8: Configure IGRP Using AS Number 101 on All Routers 389 Task 9: From BHM, Enter show ip route 390 Task 10: Check the Routing Protocol on Router BHM 390 Lab 9-4: Troubleshooting Using ping and telnet (9. 2. 6) 393 Task 1: Configure the Routers 394 Task 2: Configure the Hosts with the Proper IP Addresses, Subnet Masks, and Default Gateways 395 Task 3: Check the Connections 395Task 4: Troubleshoot 395 Task 5: List the Findings 395 Task 6: Perform the Lab Again with Team Members 1 and 2 Switching Roles 395 Lab 9-5: Troubleshooting Using traceroute (9. 3. 4) 398 Task 1: Configure the Routers 399 Task 2: Configure the Workstations with the Appropriate IP Address Subnet Masks and Default Gateways 399 Task 3: Ping from the Workstations 399 Task 4: Test Layer 3 Connectivity 400 Task 5: Log in to the Router in User Mode 400 Task 6: Discover the trace Options 400 xxiii Task 7: Use the traceroute Command 401 Task 8: Continue Using traceroute 401 Task 9: Use the tracert Command from a Workstation 401Lab 9-6: Troubleshooting Routing Issues with show ip route and show ip protocols (9. 3. 5) 404 Task 1: Configure the Hostname, Passwords, and Interfaces on the GAD Router 405 Task 2: Configure the Routing Protocol on the GAD Router 405 Task 3: Save the GAD Router Configuration 405 Task 4: Configure the Hostname, Passwords, and Interfaces on the BHM Router 406 Task 5: Configure the Routing Protocol on the BHM Router 406 Task 6: Save the BHM Router Configuration 406 Task 7: Verify That the Internetwork Is Functioning by Pinging the FastEthernet Interface of the Other Router 406 Task 8: Examine the Routing Table 406Task 9: Examine the Routing Protocol Status 406 Task 10: Change the Configuration to Route the Correct Networks 407 Task 11: Confirm That RIP Is Routing the Correct Networks 407 Task 12: Verify the Routing Table 408 Task 13: Verify Connectivity Between the GAD Router and the Host in BHM 408 Lab 9-7: Trouble shooting Routing Issues with debug (9. 3. 7) 412 Task 1: Configure the Hostname, Passwords, and Interfaces on the GAD Router 413 Task 2: Configure the Routing Protocol on the GAD Router 413 Task 3: Save the GAD Router Configuration 413 Task 4: Configure the Hostname, Passwords, and Interfaces on the BHM Router 413Task 5: Configure the Routing Protocol on the BHM Router 413 Task 6: Save the BHM Router Configuration 413 Task 7: Gather Facts—Ask and Listen 414 Task 8: Gather Facts—Test Basic Functionality 414 Task 9: Gather Facts—Start Testing to Isolate the Problem 414 Task 10: Examine the Routing Table 414 Task 11: Examine the Routing Protocol Status 415 Task 12: Gather Facts—Identify the Exact Problem 415 Task 13: Consider the Possibilities 416 Task 14: Create an Action Plan 416 Task 15: Implement the Action Plan 416 Task 16: Observe the Results 416 Challenge Lab 9-8: Basic Routing Troubleshooting 420Task 1: Cable the Lab 420 Task 2: Determine an Appropri ate Addressing Scheme 420 Task 3: Router, Routing, and PC Configuration 421 Task 4: Verify and Troubleshoot Your Network Configuration 422 xxiv Routers and Routing Basics CCNA 2 Labs and Study Guide Chapter 10: Intermediate TCP/IP Study Guide 425 426 TCP and UDP Operation 426 Vocabulary Exercise: Completion 426 TCP Segment Format Exercise 427 UDP Segment Format Exercise 427 Concept Questions 427 Operation of Transport Layer Ports 428 Vocabulary Exercise: Completion 428 TCP and UDP Port Numbers Exercise 429 Comparing Layer 2, Layer 3, and Layer 4 Addresses 429Lab Exercises 431 Command Reference 431 Curriculum Lab 10-1: Multiple Active Host Sessions (10. 1. 6) 431 Task 1: Configure the Hostname, Passwords, and Interface on the GAD Router 432 Task 2: Save the Configuration Information from Privileged EXEC Command Mode 432 Task 3: Configure the Host 432 Task 4: Allow HTTP Access to the Router 432 Task 5: Use the Workstation Browser to Access the Router 432 Task 6: Telnet to the Ethernet Interface on the Router from the Host 432 Task 7: Start a Second Telnet Session to the Router 432 Task 8: Check the Sessions on the Host 433Curriculum Lab 10-2: Well-Known Port Numbers and Multiple Sessions (10. 2. 5) 434 Task 1: Configure the Hostname, Passwords, and Interface on the GAD Router 434 Task 2: Save the Configuration Information from Privileged EXEC Command Mode 435 Task 3: Configure the Host 435 Task 4: Allow HTTP Access to the Router 435 Task 5: Use the Workstation Browser to Access the Router 435 Task 6: Telnet to the Ethernet Interface on the Router from the Host 435 Task 7: Start a Second Telnet Session to the Router 435 Task 8: Start a Third Telnet Session to the Router 435 Task 9: Start a Fourth Telnet Session to the Router 436Task 10: Check the Number of Sessions on the Host 436 Task 11: Check the Number of Sessions on the Router 437 Chapter 11: Access Control Lists (ACLs) Study Guide 439 440 Access Control List Fundamentals 440 Basic ACL Concepts and Rules Exe rcises 440 ACL Flow Chart Exercise 441 xxv Standard ACL Syntax Exercise 443 Determine the Wildcard Mask Exercise 443 Concept Questions 444 Access Control Configuration 445 Standard ACL Configuration Exercises 445 Standard ACL Scenario 1 446 Standard ACL Scenario 2 447 Standard ACL Scenario 3 447 Extended ACL Scenario 1 447 Extended ACL Scenario 2 448Extended ACL Scenario 3 449 Extended ACL Scenario 4 449 Extended Named ACL Scenario 450 Restricting vty and HTTP Access 450 Lab Exercises 452 Command Reference 452 Lab 11-1: Configuring Standard Access Lists (11. 2. 1a) 453 Task 1: Configure the Hostname and Passwords on the GAD Router 453 Task 2: Configure the Hosts on the Ethernet Segment 454 Task 3: Save the Configuration Information from Privileged EXEC Command Mode 454 Task 4: Confirm Connectivity by Pinging the Default Gateway from Both Hosts 454 Task 5: Prevent Access to the Ethernet Interface from the Hosts 454 Task 6: Ping the Router from the Hosts 454Task 7: Apply the ACL to th e Interface 454 Task 8: Ping the Router from the Hosts 455 Task 9: Create a New ACL 455 Task 10: Apply the ACL to the Proper Router Interface 455 Task 11: Ping the Router from Each Host 455 Lab 11-2: Standard ACLs (11. 2. 1b) 457 Task 1: Perform Basic Router Interconnection 458 Task 2: Perform Basic Configuration 458 Task 3: Establish Access List Requirements 458 Task 4: Plan the Access List Requirements 458 Task 5: Write and Apply the ACL 459 Task 6: Verify the ACL 460 Task 7: Document the ACL 461 Lab 11-3: Configuring Extended Access Lists (11. 2. 2a) 464Task 1: Configure the Host Name and Passwords on the GAD Router 464 Task 2: Configure the Hosts on the Ethernet Segment 465 Task 3: Save the Configuration Information from Privileged EXEC Command Mode 465 Task 4: Confirm Connectivity by Pinging the Default Gateway from Both Hosts 465 Task 5: Connect to the Router Using the Web Browser 465 xxvi Routers and Routing Basics CCNA 2 Labs and Study Guide Task 6: Prevent Access to HTTP (P ort 80) from the Ethernet Interface Hosts 465 Task 7: Apply the ACL to the Interface 465 Task 8: Ping the Router from the Hosts 465 Task 9: Connect to the Router Using the Web Browser 466Task 10: Telnet to the Router from the Hosts 466 Lab 11-4: Simple Extended Access Lists (11. 2. 2b) 467 Task 1: Perform Basic Router and Host Configurations 468 Task 2: Prevent the Production Users from Accessing the Gadsden Network 470 Task 3: Allow a Production User Access to the Gadsden Network 472 Task 4: Allow Gadsden Users Access to the Administration Payroll Server 473 Task 5: Document the ACL 474 Lab 11-5: Configuring a Named Access List (11. 2. 3a) 477 Task 1: Configure the Hostname and Passwords on the GAD Router 478 Task 2: Configure the Hosts on the Ethernet Segment 478Task 3: Save the Configuration Information from Privileged EXEC Command Mode 479 Task 4: Confirm Connectivity by Pinging the Default Gateway from Both Hosts 479 Task 5: Prevent Access to the Ethernet Interface from the Hos ts 479 Task 6: Ping the router from the Hosts 480 Task 7: Apply the ACL to the Interface 480 Task 8: Ping the Router from the Hosts 480 Lab 11-6: Simple DMZ Extended Access Lists (11. 2. 3b) 481 Task 1: Perform Basic Router and Host Configurations 482 Task 2: Protect the Corporate Network 486 Task 3: Protect the DMZ Network 490 Task 4: Deter Spoofing 495 Task 5: Document the ACL 498Lab 11-7: Multiple Access Lists Functions (11. 2. 3c) 502 Task 1: Perform Basic Router Interconnection 503 Task 2: Design the Internetwork Addressing Scheme 504 Task 3: Perform Basic Router Configuration 504 Task 4: Configre the Clients 505 Task 5: Secure the Intranet Server 505 Task 6: Secure the Intranet Documents 506 Task 7: Deter Internet Abuse 506 Task 8: Deter DoS Attacks 507 Task 9: Stop Telnet into the Routers 508 Task 10: Verify the Access Lists 509 Lab 11-8: VTY Restriction (11. 2. 6) 510 Task 1: Perform Basic Router Interconnection 511 Task 2: Perform Basic Configuration 511Task 3: Create the A ccess List That Represents the Gadsden LAN 511 Task 4: Apply the Access List to Permit Only the Gadsden LAN 511 Task 5: Test the Restriction 512 xxvii Task 6: Create the Restrictions for the BHM Router 513 Task 7: Document the ACL 514 Comprehensive Lab 11-9: Standard, Extended, and Named ACLs 518 Task 1: Cable and Document the Lab 518 Task 2: Router, Routing, and PC Configuration 519 Task 3: Verify and Troubleshoot Your Network Configuration 524 Task 4: Configure and Verify Access Control Lists 525 Challenge Lab 11-10a: Three Routers with Multiple ACL Configurations (Form A) 533Task 1: Cable the Lab 534 Task 2: Router, Routing, and PC Configuration 534 Task 3: Verify and Troubleshoot Your Network Configuration 534 Task 4: Configure and Verify Access Control Lists 535 Challenge Lab 11-10b: Three Routers with Multiple ACL Configurations (Form B) 541 Task 1: Cable the Lab 542 Task 2: Router, Routing, and PC Configuration 542 Task 3: Verify and Troubleshoot Your Network Configuration 54 2 Task 4: Configure and Verify Access Control Lists 543 Appendix A: CCNA 2 Skills-Based Assessment Practice Appendix B: Router Interface Summary Appendix C: Erasing and Reloading the Router 557 559 551 xxviiiRouters and Routing Basics CCNA 2 Labs and Study Guide Icons Used in This Book Communication Server PC PC with Software Terminal File Server Macintosh Access Server ISDN/Frame Relay Switch Cisco Works Workstation ATM Switch Modem Sun Workstation Token Ring Token Ring Printer Laptop Web Server IBM Mainframe Front End Processor Cluster Controller Multilayer Switch FDDI Gateway Router Network Cloud Bridge Line: Ethernet Hub Line: Serial DSU/CSU DSU/CSU FDDI Catalyst Switch Line: Switched Serial Command Syntax Conventions The conventions that present command syntax in this book are the same conventions used in the IOS Command Reference.The Command Reference describes these conventions as follows:  ¦ Bold indicates commands and keywords that are entered literally as shown. In actua l configuration examples and output (not general command syntax), bold indicates commands that are manually input by the user (such as a show command).  ¦ Italic indicates arguments for which you supply actual values.  ¦ Vertical bars (|) separate alternative, mutually exclusive elements.  ¦ Square brackets ([ ] ) indicate optional elements.  ¦ Braces ({ }) indicate a required choice.  ¦ Braces within brackets ([{ }] ) indicate a required choice within an optional element. xxix IntroductionRouters and Routing Basics CCNA 2 Labs and Study Guide is a supplement to your classroom and laboratory experience with the Cisco Networking Academy Program. Specifically, this book covers the second of four courses. To be successful in this course and achieve your CCNA certification, you should do everything possible to arm yourself with a variety of tools and training materials to support your learning efforts. This book is just such a collection of tools. Used to its fullest extent, i t can help you gain the knowledge as well as practice the skills associated with the content area of the CCNA 2 Routers and Routing Basics course.Specifically, this book can help you work on these main areas of CCNA 2:  ¦ Configuring a router  ¦ Managing the Cisco IOS  ¦ Selecting a routing protocol  ¦ Verifying and troubleshooting a network  ¦ Implementing basic security with access control lists Books similar to this one are also available for the other three courses: Networking Basics CCNA 1 Labs and Study Guide, Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide, and WAN Technologies CCNA 4 Labs and Study Guide. Goals and Methods One of the most important goals of this book is to help you prepare for either the CCNA exam (640-801) or the INTRO exam (640-821).Whether you are studying for the full exam or the first part of your CCNA, passing either of these exams means that you not only have the required knowledge of the technologies covered by the exa m, but that you can also plan, design, implement, operate, and troubleshoot these technologies. In other words, these exams are rigorously application-based. In fact, if you view the main objectives for the CCNA exam at http://www. cisco. com/go/certifications, you can see the following four categories of objectives:  ¦ Planning & Design  ¦ Implementation & Operation  ¦ Troubleshooting  ¦ TechnologyAlthough Technology is listed last, a CCNA student cannot possibly plan, design, implement, operate, and troubleshoot networks without first fully grasping the technology. So you must devote large amounts of time and effort in the Study Guide section of each chapter, learning the concepts and theories before applying them in the Lab Exercises. The Study Guide section offers exercises that help you learn the concepts and configurations that are crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes some or all of the following types of exe rcises:  ¦Vocabulary Matching and Completion  ¦ Skill-Building Activities and Scenarios  ¦ Configuration Scenarios  ¦ Concept Questions  ¦ Journal Entries  ¦ Internet Research xxx Routers and Routing Basics CCNA 2 Labs and Study Guide The Lab Exercises section includes a Command Reference table, all the online Curriculum Labs, and new Comprehensive Labs and Challenge Labs. The Curriculum Labs typically walk you through the configuration tasks step by step. The Comprehensive Labs include many, if not all, of the configuration tasks of the Curriculum Labs without actually providing you with the commands.The Challenge Labs take this a step further, often giving you only a general requirement that you must implement fully without the details of each small step. In other words, you must use the knowledge and skills you gained in the Curriculum Labs to successfully complete the Comprehensive and Challenge Labs. In fact, you should not attempt the Comprehensive or Challenge lab s until you have worked through all the Study Guide activities and the Curriculum Labs. Avoid the temptation to work through the Comprehensive and Challenge Labs by flipping back through the Curriculum Labs when you are unsure of a command.Do not try to short-change your CCNA training. You need a deep understanding of CCNA knowledge and skills to ultimately be successful on the CCNA exam. How This Book Is Organized Because the content of Routers and Routing Basics CCNA 2 Companion Guide and the online course is sequential, you should work through this book in order, beginning with Chapter 1. Chapters 1 through 11 cover the following topics: Chapter 1, â€Å"WANs and Routers†Ã¢â‚¬â€After presenting a few vocabulary exercises covering the topic of WANs, this chapter delves into the internal and external components of routers.Understanding how a router works and how you connect to a router are important concepts and skills you need throughout the rest of your CCNA studies. The three Curriculum Labs focus your attention on connecting LANs and WANs using routers. An additional Challenge Lab helps you review the skills learned in the Curriculum Labs. Chapter 2, â€Å"Introduction to Routers†Ã¢â‚¬â€This chapter discusses the basics of using the command-line interface (CLI). Several exercises help you solidify your skills with using the CLI.In addition, you work through exercises that focus on understanding the router boot sequence and interpreting output from the show version command. The three Curriculum Labs focus your attention on the configuration tasks covered in the chapter. Two additional labs, a Comprehensive Lab and Challenge Lab, help you review the commands and skills learned in the Curriculum Labs. Chapter 3, â€Å"Configuring a Router†Ã¢â‚¬â€This chapter first focuses on basic router configuraion, including learning the commands that every router uses as well as activating interfaces and setting up basic routing.Then your attentio n turns to file-management issues: backing up the configuration and the IOS. The ten Curriculum Labs focus your attention on the router configuration and file-management tasks covered in the chapter. Two additional labs, a Comprehensive Lab and Challenge Lab, help you review the commands and skills learned in the Curriculum Labs. Chapter 4, â€Å"Learning About Other Devices†Ã¢â‚¬â€The Cisco IOS software offers a powerful tool for gathering information about other directly connected devices through its Cisco Discovery Protocol (CDP).This chapter’s exercises center your attention on the benefits of using CDP as a network engineer. Other commands, including telnet and traceroute, are also part of your tool kit for learning about other network devices. So you spend some time on these as well. The eight Curriculum Labs focus your attention on the configuration tasks covered in the chapter. Two additional Comprehensive Labs help you review the commands and skills learned i n the Curriculum Labs. Chapter 5, â€Å"Managing Cisco IOS Software†Ã¢â‚¬â€This chapter examines in detail how a router boots and loads the IOS.Knowing the default boot sequence as well as how to change the sequence is an important part of your network engineer’s skill set. Exercises focus on the boot sequence, the boot system commands, the configuration register, the IOS naming convention, and methods for uploading and downloading an IOS. The six Curriculum Labs focus your attention on the configuration tasks covered in the chapter. An additional Challenge Lab helps you review the commands and skills learned in the Curriculum Labs. xxxi Chapter 6, â€Å"Routing and Routing Protocols†Ã¢â‚¬â€This chapter covers a crucial topic for any CCNA candidate: routing.Exercises focus on reading routing table output from the show ip route command, using static routing, choosing a routing protocol, understanding dynamic routing, and learning basic Routing Information Proto col (RIP) configuration. The Curriculum Lab focuses your attention on configuring static routes. Two additional labs, a Comprehensive Lab and Challenge Lab, help you review the commands and skills learned in the chapter. Chapter 7, â€Å"Distance Vector Routing Protocols†Ã¢â‚¬â€This chapter covers how distance vector routing avoids loops.In addition, you extend your skills in configuring RIP and you learn some valuable troubleshooting tools. The seven Curriculum Labs focus your attention on the configuration tasks covered in the chapter. Two additional labs, a Comprehensive Lab and Challenge Lab, help you review the commands and skills learned in the chapter. Chapter 8, â€Å"TCP/IP Suite Error and Control Messages†Ã¢â‚¬â€This chapter takes a brief look at the Internet Control Message Protocol (ICMP). A basic understanding of the IP packet header and the most important ICMP messages are covered.There are no labs in this chapter. Chapter 9, â€Å"Basic Router Trouble shooting†Ã¢â‚¬â€This chapter focuses exclusively on your troubleshooting skills. For a major part of the CCNA exam, you must be proficient at troubleshooting a simple internetwork. Exercises include dissecting a routing table entry, knowing troubleshooting steps, matching a problem to the correct layer, and reviewing the most powerful show and debug commands. The seven Curriculum Labs focus your attention on the configuration tasks covered in the chapter.An additional Challenge Lab helps you review the commands and skills learned in the Curriculum Labs. Chapter 10, â€Å"Intermediate TCP/IP†Ã¢â‚¬â€This chapter is mostly a review of material covered in your CCNA 1 studies. Exercises include learning vocabulary, reviewing TCP and User Datagram Protocol (UDP) segments, understanding port numbers, and comparing Layers 2, 3 and 4. The two Curriculum Labs focus your attention on how port numbers work to allow multiple sessions for the same host or application. Chapter 11, à ¢â‚¬Å"Access Control Lists (ACLs)†Ã¢â‚¬â€This chapter covers the fundamentals of access control lists.Having a basic understanding of ACLs and knowing how to implement them are crucial to your success on the CCNA exam and in the networking field. Therefore, the exercises in this chapter are extensive. First, you work through some exercises that help you understand what ACLs are and how they operate. Then you work through eight ACL configuration exercises and scenarios that focus on CCNA-level security implementations. The eight Curriculum Labs focus your attention on the configuration tasks covered in the chapter. An additional Challenge Lab helps you review the commands and skills learned in the Curriculum Labs.Appendix A, â€Å"CCNA 2 Skills-Based Assessment Practice†Ã¢â‚¬â€This appendix contains a practice lab for the Skills-Based Assessment in which you are required to demonstrate all the skills covered in the CCNA 2 course. Appendix B, â€Å"Router Interface Sum mary†Ã¢â‚¬â€This appendix provides a chart of the router interface identifiers that you need for the curriculum-based labs in each chapter. Appendix C, â€Å"Erasing and Reloading the Router†Ã¢â‚¬â€This appendix guides you through the procedure for clearing out previous configurations and starting with an unconfigured router for use in the Curriculum Labs in each chapter. This page intentionally left blank

Saturday, September 28, 2019

Article summary of Roschach Essay Example | Topics and Well Written Essays - 250 words

Article summary of Roschach - Essay Example The findings of over 125 meta-analysis and 800 multimethod assessment studies have shown that psychological assessment instruments such as the Rorschach perform as effectively as any instrument used in the entire health services industry such as â€Å"electrocardiograms, mammography, magnetic resonance imaging (MRI), dental radiographs, Papanicolaou (Pap) smears, positron emission tomography (PET) scans, and serum cholesterol level testing†. This conclusion was arrived at after analyzing a comprehensive set of 144 validity coefficients for psychological and medical tests. The results of these tests were comparable to those obtained for finding the validity of intelligence scales and the Minnesota Multi-phasic Personality Inventory (MMPI). Hence the research scholars unanimously concur on the validity of the Rorschach, stating that they find no reason why this instrument should be criticized. Moreover, when one considers the contexts in which the Rorschach is usually used, then most criticisms directed against it don’t hold good. Hence conditional validity is a key area of research going forward.

Friday, September 27, 2019

Marketing Strategy Essay Example | Topics and Well Written Essays - 2250 words

Marketing Strategy - Essay Example Magners has a lot of strong competitors in the cider market. Most of these competitors have existed for decades now. During the early 1990s, Diamond White and Max were a major rage all over. This was before alcopops took over and nudged traditional drinks on a corner. During the 1960s and 1970s, pear cider gained a lot of popularity. This was a result of the marketing campaign by Baby champ. The industry continues to grow and has grown its set of competitors in the market over the years. The industry is of the view that the current renaissance will take the somewhere. Some major set of competitors include Scottish, Newcastle and Constellation Europe. They have spent a lot of moolah on promotional campaigns and advertisements to promote Cider. What remains to be seen is to what extend will each of these big wigs fare in the market. When Magner was launched initially, it was perceived as a drink for teenagers and park benchers. Since then it has gone through a makeover. They have come up with various ways to promote their brand. Most notably by lowering the alcoholic content in the bottle, serving it chilled and by launching a 30 million advertising campaign. Magner soon regained its position via this and grew by 33 %. Rivals did not rest low. They were quick to react as they saw potential in the cider market. Magner’s success thus paved way for a huge influx of other brands. Scottish and New Castle as mentioned earlier were quick to re-launch their Bulmer’s. They were all over the market and Bulmer’s had a massive marketing campaign wherein its packaging was identical to that of Magners.

Thursday, September 26, 2019

COMMUNISM, MARIXSM AND CAPITALISM Research Paper

COMMUNISM, MARIXSM AND CAPITALISM - Research Paper Example The productions occur under the private owners and they themselves make the investment. They are the ones who are also the eventual receivers of all the profits that are generated. The laborers work on fixed salaries and do not hold a share in the profits generated. The purpose of the manufacture of goods that is production is mainly directed not towards the greater good but only purpose of providing profits for the owners. The owners in capitalism enjoy the rights of having hold over their property along with the decisions as to whether what they wish to do with the property. Also all the profits that are produced on their property go in their hands. Capitalism is considered to be a booming factor for economic growth but it is believed that it is due to capitalism that there is unequal distribution of the wealth. This is because all the profits mainly go in the hands of the private owners and hence they are the ones who mainly benefit from capitalism. Marxism on the other hand is an other form of economic and social governance which was presented by Karl Marx and Friedrich Engels.

Wednesday, September 25, 2019

Read the sources and summarize them Essay Example | Topics and Well Written Essays - 500 words - 2

Read the sources and summarize them - Essay Example The Haymarket riot or Haymarket massacre was a struggle for workers’ rights and has become a symbol of the rights of workers internationally. The incident highlighted the increasing confrontations that were taking place between the workers and the industrialists. The workers having formed unions were agitating for greater power and economic security as well as better working conditions in the workplaces. Since 1889 it has been associated with international Labor Day celebrated on May 1 every year. The riot took place on May 4, a day after police intervention between strikers who wanted to return to work and those who tried to prevent them, during a strike at McCormick Harvesting Machine Company in Chicago. The strike was part of a workers campaign for 8 hour working days. The labor leaders called a meeting at Haymarket square to protest the police action and the governor was present as an observer. After most of the demonstrators had dispersed peacefully, a bomb was thrown by an unidentified person and the violence that followed a peaceful meeting, led to several deaths. The riot created an atmosphere of distrust and frenzy against immigrant workers and labor leaders. Amidst allegations and counter allegations eight people were convicted of murder, although nothing was ever proved against any of them. Of the eight known as the Chicago Eight, four were hanged on November 11 1887 while one committed suicide. When the remaining three sent a mercy petition to the then governor of Illinois, a few years later, it was found that the judge and jury had been biased and evidence fabricated against the defendants. They were therefore pardoned to the dismay of industrialists and the press. The pardon was a shot in the arm for those in favor of labor reform. Mary Harris Jones who worked as an organizer for the Knights of Labor passionately declared â€Å"I long to see the day when Labor will have the destiny of the nation in

Tuesday, September 24, 2019

Kinship and Gender Essay Example | Topics and Well Written Essays - 1000 words

Kinship and Gender - Essay Example The process of identification begins in seeing how relationships are formed and how the realization of being in the need to reproduce comes into knowledge. It is rather innate in humans to have the push to reproduce. Not animalistic in nature, but it is indeed a part of human instinct that the need to reproduce is a must, perhaps not obviously or directly said through words, but the aggressive behavior of many individuals towards sexual relations today explains such truth (Stone 34). Believably, medical experts and psychologists agree on the same ground of understanding that people today tend to take consideration of the major aggressions that they feel and the morals are of a lower ground of definition in terms of fulfilling the aggressive push of the flesh. Through the years, the lesser recognition that human individuals post with regards the need to follow morals had been over thrown by the fact that people simply want to give way to their desires. Why so Basically, the instinct that exists in a person to reproduce is much stronger than that of the push of the mind to contain that need. Likely, not all falls on the trap of aggression, some of the people though willingly submit to the push of the said desires. It is unknowingly realized by many that their bodily aggressions control them successfully through letting themselves be guided by their desires and not by what they know is right. As a result, the social dilemma on teenage pregnancy and early parenthood has been brought about into existence. The truth behind the growing phenomenon is rather supported by the fact that many families today are only composed of single parents who are trying to pursue the life of their children as some of the partners who left did not actually realize the role that they are taking in the process of reproduction. Unlike animals, humans are driven by the desire and are expected to have the knowledge of what they are doing. This especially concerns their fleshly desires. One simply cannot give way to that desire and believe that it stops there. Reproduction comes with responsibilities of parenthood. It is through this realization that a man and woman take their place in the identification of gender roles among human individuals. The idea is not simply to reproduce for the sake giving way to aggression, but for the sake of realizing the role that each one agreed to take part of. To some, the complete recognition of both elements of human recognition is not that vivid at all. In fact, some may insist that human relationships based on sexual desires are part of the development of the human society. This though has caused many issues among individuals believing and perceiving that sexual relations are mere establishments of their role as men and women, a basic truth derived as a major understanding of the roles that each one take in the process of reproduction. Conclusion In this regard, it is strongly suggested that the thought of being humans be strongly applied in the recognition of one's role as a person and as an individual who simply wants to take his or her place in the normative ways of human existence. What is meant by the thought of being human Basically, instinct is not the ruling edge of every human individual but knowledge. Through the

Monday, September 23, 2019

Big Data, Big Data Analytics, Data Mining and their applications in Essay

Big Data, Big Data Analytics, Data Mining and their applications in Industrial Engineering - Essay Example The usage of predictive analytics in big data situation can help power plants forecast production size and also gain insight on prevailing challenges within the plant. Energy companies that are capable of managing and analysing high volume data by using advanced softwares like IBM information systems or any other suitable statistical software, can always transform their data into useful and profitable strategies. For instance, developing efficient demand response strategies requires that utilities apply innovative analytics across a mix of data about clients, consumption rate, generation capacity, physical grid unique behaviour, weather, and energy commodities market. A Company’s decision backed by data are always more forward and acceptable as compared to using prevailing perceived information about the energy market. As mentioned before, power plants are welcoming the usage of smart grids and meters as a long term strategy that enables efficient energy supply. Energy companies can therefore create better power storage solutions, include uniform power generation points and in the process eliminate the need for new power plants. Essentially, this will enable power consumers to have more control over the amount of power/electricity they use. A higher number of meter reads per day of power usage by consumers basically generate an overwhelming amount of data. This amount of data presents a great opportunity for power plants to study their consumers’ behaviours and also understand how market segmentation of customers can help industries know the amount of power output to achieve. For example, if you are an electricity producer, time of use pricing usually makes cost-savvy retail consumers to run dryers, dishwashers and washing machines at off-peak periods. Evidently, these segment of consumers do not only save cash but they also need less generation capacity from their electricity providers.

Sunday, September 22, 2019

Subsidies Research Paper Example | Topics and Well Written Essays - 2000 words - 1

Subsidies - Research Paper Example This paper aims at examining the relationship between subsidies and economic growth in the context of developing countries. Subsidies are financial assistance provided by the government of a country to some of its domestic firms or a specific industry or sector (Schaffer, Agusti & Earle 374). The governments of different countries allocate subsidies to its industries with a variety of objectives both in direct and indirect forms. However, the central purpose of levying a subsidy is to keep the price below the level normally determined by the market forces in the sector in which the subsidy is provided and accelerate the course of development in the entire nation (Moltke, McKee & Morgan 23). In particular, subsidies are provided to those industries or sectors which are lagging behind the other sectors in the economy in terms of performance or are not being able to perform up the expected level. The subject about impact of subsidies on the developing countries is quite researched upon. Before going into the details of my research work I shall review some of the existing literature on this topic in this section. Peacock elaborates in his paper the role of subsidies is important in the overall welfare of the economy (Peocock 323-335). Although elimination of subsidies on necessary goods, such as agricultural products, medicines and other items related to health sector and the petroleum products, is a key policy prescription for the developing countries by the World Bank, no persuasive theory has been developed supporting this policy. Amegashie states in this context that the governments of the developing countries should exercise caution in following a process of removing subsidies since it might give rise to agitation on part of the citizens (Amegashie 7-15). Thus, the research will try to explore the effects and side effects of such system. The study employs secondary sources. The research will employ Qualitative method and

Saturday, September 21, 2019

Favourite Brand Paper Essay Example for Free

Favourite Brand Paper Essay The brand that I identify with is tide laundry detergent. I love tide laundry detergent because there are 5 people in my house and a lot of laundry being done with Tide I am able to use less detergent for a large amount of cloths. It keeps the colors of the cloths bright and even if you have been using cheap detergent when cloths are washed with tide the colors bright. Tide also gets hard to remove stains out of cloths without having to pretreat the sting and soak cloths for a long period of times. I can also save money by using Tide because when using a less effective brand I have to pour more than the required amount to wash and the cloths deteriorate faster. When cloths deteriorate and look dull I have to spend more money to purchase cloths in a shorter amount of time. I do believe Tide Company has built a successful relationship with loyal customers because even during the recession Tide created a cheaper detergent called Tide Basic in order to accommodate its loyal customers during these hard times. The company has created a Tide detergent that can be used with cold water which saves on the energy bill. Loyal Tide customer has a lot of variety to choose from which helps maintain the relationship with the brand. This brand is focused on groups of all ages because it is efficient and has been around since 1946. The Tide brand for the younger generation helps them remember home and for the older generation it is familiar and a brand they can trust. Tide has a variety of detergent product such as tide pods eliminate odor and are pre-measured, Tide ultra-stain release removes 99 percent of stains, Tide to go instant stain remover to go it’s a pen that is small and can be carried around if you get a small stain on your cloths, Tide boost duo packs it has stain removing power without any dyes or scent, Tide total care for high efficiency washers, Tide ultra clean plus downy gives same clean feeling and soft cloths, Tide cold water great cleaning and save money no hot or even warm water needed, Tide alternative bleach wash whites without the need of using bleach, Tide Free provide ge ntle on skin, Tide febreze for individuals who play sports, all of these also come in powder form for those who do not like liquid detergent. This is another reason Tide caters to all  age groups there is something for everyone. The two competitor brands Whisk and Kirkland Signature Ultra. These two detergents are numbers 2 and 3 on the list of competitor detergents which was done by ABC news. I have tried both of these brands. In my opinion these brands are good but the stain fighting power is not as effective as tide. When using tide on my chef uniform which has food and oils from cooking kitchen smell was gone. I used both brands to wash my nephews chef uniforms and they were not as effective at removing dirt, grim and most of all the smell of food. Tide has also been featured in good housekeeping magazine. It was also named one of the must steal products because in recent years there has been a surge of theft with tide detergent. In conclusion Tide laundry detergent is a brand that has been around for decades. It maintains and brightens colors. Tide also has over 15 varieties from one that can be used on sensitive skin to cold water Tide that helps save money. Tide is a trusted brand and caters to their customer’s needs. They also have helped maintain the relationship by offering a lower priced detergent when the recession affected all individuals around the world. Tide does have some competition but it does not have all the varieties or report that Tide has with their customers. References http://nymag.com/news/features/tide-detergent-drugs-2013-1/index2.html /www.nytim http:/es.com/roomfordebate/2013/01/14/why-would-drug-dealers-use-tide-as-a-currency/tide-is-the-must-steal-product-of-the-season http://www.goodhousekeeping.com/product-reviews/home-products/laundry-detergents/best-laundry-detergent#slid

Friday, September 20, 2019

An Analysis Into The Uk Food Retail Industry Marketing Essay

An Analysis Into The Uk Food Retail Industry Marketing Essay The analysis will begin with a presentation of the food retail industry and a highlight of its significant features. Furthermore, to assess the remote environment of the industry a PEST analysis will be conducted, analysing the political, economical, social and technological factors that affect the industry. Furthermore, a Porters 5 forces analysis will be used to evaluate the operating environment and the nature of competition. Moreover the major competitors and their competition strategies will be identified. Additionally, the effect of the remote and operating environment on the players of the industry will be highlighted. Also, a critical analysis of the industrys strength and its future will be presented. Finally, a critical evaluation on the used business analysis techniques will be illustrated. 2 .Industry profile The UK food retail industry is an established sector of the UK economy. During the last thirty years the food retail corporations expanded their activities to serve various consumer needs. The products that are provided to the public include food and its sub-products, but also alcohol, tobacco, health and beauty products, clothing, electrical products, homeware, fuel and financial services. However, according to the Mintel report 2009, more than half of the total sales in 2008 were assigned to food. Furthermore, concerning the size of the industry an increasing trend of sales can be observed of about 4% per year from 2004 to 2008 and a total amount of 108.1 billion pounds in 2008 (National Statistics Mintel report 2009). The food retail industry is mainly controlled by large supermarket chains that possess the overwhelming majority of the industrys market share, as it will be analysed further in the report. Concerning the size diversification of the retail stores, the majority are large units like hypermarkets, supermarkets and discounters with a percentage of 62% of the total number of stores. Furthermore, small units as convenience stores and gas stations represent the 21.2% and food and drink specialists the 11.3%. The minority are drug stores, warehouses and cash and carry stores (Datamonitor 2009). 3. PEST analysis Macro-environment To analyse the macro-environment or otherwise known remote environment of the food retail industry, a PEST analysis will be used to specify how Political and legal, Economical, Social and Technological issues affect the industry. 3.1 Political There are many political and legal factors that affect the food retail industry. Future political decisions concerning taxation or the retail industry legislation will definitely have an impact in the industry competitors policies and strategies. The current legislation and regulation concern competition, employment, environmental, food and grocery safety, financial services and health issues. Specifically, the UK food retailers are obliged to follow food hygiene legislation set by the Food Standards Agency and the equivalent European Union regulation such as the General Food Law Regulation. In the UK the food safety act of 1990 was enacted to set the food safety requirements for food intended for human consumption. The Food Standards Agency was created in 2000 after the food standards act of 1999, which was enacted to further secure the public health related to food safety (Office of Public Sector Information, 1999). The UK food retailers are obliged to follow the above regulations in conjunction with the General Food Regulations 2004 that set the rules about the transportation, distribution, quality, hygiene, maintenance, advertising and selling of food and its substances. Especially for the food hygiene and maintenance the rules and requirements of the Food Hygiene Regulations of 2006 and the internationally recognised Hazard Analysis Critical Control Point (HACCP) must be followed (Food Standards Agency, 2010). Therefore, possible disobedience of the above regulations by the supermarkets will cause legal problems and the enforcement of fines, harming their budget and social image. The competition in the UK is observed and controlled by two government bodies, the Competition Commission and the Office of Fair Trading. The two government bodies ensure that the companies in the UK comply with the competition law and practices. Therefore, they observe and interface the market to avoid monopoly, oligopoly and cartel phenomena. Their role beyond the control of competition between the competitors within the industry is to ensure the fair trade between the supermarkets and their supplies. According to recent press publications the fair trade is currently the most important issue (Haurant S., 2009). In 2001 the Office of Fair Trading enacted the Supermarkets Code of Practice to regulate and assure the trade between supermarkets and suppliers, who include amongst others, farmers and breeders (Office of Fair Trading, 2001). Additionally, the major supermarket chains had been often accused for anticompetitive, unfair practices and failure to meet the necessary requirements . For example, in April 2010 the Office of Fair Trading fined nine retailers for anticompetitive practices at their tobacco pricing between 2001 and 2003 (Mintel report, 2009). For this reason the Competition Commission planned to change the existing Supermarkets Code of Practice to a new Grocery Supply Code of Practice (Haurant S., 2009). The new code of practice added intensive pressure to the Grocery retailers because they were forced to comply with stricter regulation and to cover the costs of the observation body. This new regulation led to greater competition which toughed the operations of the supermarkets but reduced slightly the prices to benefit the consumers. Another important group of regulations are those concerning the planning and environmental law. The grocery retail companies need to comply with the planning law to be able to expand their activities in new places. During the past years, the grocery retailers tended to expand their stores in places away from town centres. The reason was primary the reduced property prices and the ability to construct large supermarket units, maximising their profits. However this trend provoked a series of issues such as the increased pollution from the consumers transportation leading the government to change the legislation, demanding the presence of town centre stores at first. Therefore, the reaction of the supermarket chains was to increase the number of mid-size and small stores who complied with legislation and increased the supermarkets points of presence (Tescopoly; Butler S., 2006). Furthermore, the grocery retail corporations need to comply with environmental law and regulations concerning goods transportation pollution, aesthetics, proper disposal and recycling. For example the supermarkets were forced by new legislation to charge their customers a certain cost for each provided plastic bag (Brogan B., 2008). There is a significant percentage of the workforce that is employed in the food retail industry. Therefore, the food retail companies are obliged to comply with the UK and EU employment legislation exactly as the rest of the employers. Labour law such as the Employment Rights Act 1996 and the Employment Act 2002 specify the workers rights including wages, working conditions, work hours and job security Also, during the past thirty years, a series of anti-discrimination laws were enacted to establish equality and diversity in the workforce (Businesspme.com, 2008; direct.gov.uk, 2010). Also, the food retail corporations are obliged to comply with health and safety standards in the workplace in operations like the use of machinery, electrical equipment, transportation of goods, violence etc (Shropshire, 2010). These regulations are mainly set by the Health and Safety at Work Act 1974 and the Workplace regulations of 1992. Therefore, any political decision leading to more complex employm ent legislation can increase the labour costs in the industry and reduce the profitability. Additionally, non compliance with the labour regulations can lead to long term litigations with former or employees or the government. During the last years the large supermarket chains expanded their activities to provide financial services such as credit cards, loans and deposits. Therefore the supermarkets are obliged to comply with the legislation and regulations enacted by the Financial Services Authority (Financial Services Authority, 2010). Therefore, a possible change in financial services taxation or regulation will affect their profitability. Furthermore, the supermarkets are obliged to pay the equivalent corporate tax at the HM Revenue and Customs. 3.2 Economical The economic factors, incidents and situations that affect the food retail industry can be concentrated in the following categories: Consumer spending and disposable income, inflation, taxation, interest rates, unemployment, monetary issues, and the recent financial crisis. The recent financial crisis has definitely brought many important changes in the food retail sector as well as to the majority of the industries. However, the effect of the financial crisis did not affect negatively the consumer demand. On the contrary the consumer spending in the food retail industry increased from 2007 to 2008 especially in the food products and continues to increase at an approximately rate of 5% (National Statistics; Mintel report, 2009). The main implication for this trend was that because of the recession, the consumers cut their eating out expenses and started to consume food at home as it is much cheaper. Furthermore the sales of organic food, specialised products such as television and sound systems and expensive products declined (Mintel report, 2009).On the contrary, the sales of own brand products and hard discounters chains increased indicating the consumers turn in low cost products. The price competition and the importance of food increased the consumer demand and expenditure; however it is doubtful if it will continue to rise mainly because of the general economic uncertainty and the higher upcoming personal income taxation. In macroeconomic terms, the GDP after a massive decline in its change rate started to increase after the mid 2009 to reach a positive 0.5% in early 2010. Also, the inflation after a decline during the recession increased in late 2009 which probably led to an increasing trend at groceries prices (National Statistics, 2010). However, the Bank of England continues to maintain the interest rates at a low level (0.5%), to protect the fragile economy (BBC, 2010). This low interest rate will lead to increased consumption because consumers will favour to spend than to save their funds and the food retailers will be able to borrow funds at a low costs to cover their liabilities. This fact will act as compensation to the increased inflation and will probably maintain the prices. Concerning the monetary issues, during the last three years the sterling faced a significant decline of approximately (-26%) towards the euro and approximately (-25%) towards the dollar which increased the cost of imported goods in the UK (Yahoo Finance, 2010). Therefore, this situation might force the UK food retailers to construct food manufacturing plants in the United Kingdom and prefer UK suppliers. Thus, the grocery retailers will be able to have a stable pricing policy and larger price margins. From 2009 to 2010 the exchange rates fluctuated causing uncertainty and maintaining the food prices high One of the most important parts of the economic factors that affect the food retail industry is taxation. This is divided to personal income tax for the consumers and to corporation tax for the supermarkets. After May 2010 elections a coalition government between the Conservatives party and the Liberal Democrats party formed and changes are expected in taxation. Concerning income tax an increase in tax contributions is expected in 2010/2011 which will lead to a decline in consumption possibly affecting the more expensive goods and food retailers. On the other hand the corporate tax will be probably reduced during 2010 to boost economy and development. (Vincent, 2010) Therefore, the food retail corporations will be able to afford larger margins to price competition. The above facts will possibly lead the supermarkets to a trend of decreasing prices in basic goods and making offers to maintain consumer spending levels. For example there is a trend at supermarkets to offer products in r ounded prices ( £1,  £2) creating an offer impression (Felsted A., 2010). 3.3 Social The next sector of the PEST analysis is consisted by the social factors that affect the industry such as the demographics, lifestyle, culture and population trends. It is well known that Europes population is getting older and as years are passing this phenomenon will be more intense. In the United Kingdom (Mintel report, 2009) the average age and the percentage of retired people are rising. This trend has many implications to the food retail industry. First of all, elder people tend to consume less than younger people. This happens because their income which mainly comes from pensions is lower. Secondly, elder people tend to shop from the cheaper discounter retailers. Therefore, the market share of the discounter chains will increase against the rest of the competitors in the industry (Mintel oxygen, 2009). Also, the additional needs of this age group leads to an increasing trend of online and distance shopping which increase the home grocery deliveries. Thus, the operational costs of the supermarkets increase due to increased expenses for vehicles and personnel. Another implication coming from the ageing population will be the need for new product lines designed for people with various chronic ailments which are common amongst elder people. An important issue that concerns the society is obesity. According to the Health Survey for England, there is an increasing trend of obesity especially in children (NHS, 2009). The health problems and their consequences led the government and various organisations to promote a healthier lifestyle in Britain. Therefore, the consumers health awareness increased and they turned their interest to healthier foods and to more fruit and vegetables. Thus, it can be supposed that the food retail corporations will continue to adapt to the consumers demand enhancing their existing product lines with new healthier products such as organic foods, low fat and low sugar products and healthy food campaigns. Also, it will be possible to appear products for specific social groups such as people suffering from diabetes, cardiovascular diseases and allergies. Therefore, by targeting these consumer groups the food retail corporations will increase their income and improve their corporate social image. Furthermore, the increasing trend of more women entering the workforce, led to the need for ready meals at the supermarkets because women had less time to prepare food after work (International Labour Organisation, 2008). As this trend continues the supermarkets will expand their ready meals variety and create new categories depending into cost, calories and taste covering different needs. Also, the presence of different people from different background and culture in the UK changed the structure of the society. According to the UK National Statistics approximately the 10% of the UK population is non-British (UK National Statistics, 2001). Different cultures mean different habits and different food preferences. Therefore, the food retailers often provide goods from all over the world to serve those needs. 3.4 Technological The final element of the PEST analysis concerns the technological factors that are related to the food retail industry. The technological development affected and changed the industry in different categories including consumers, environment, cost, distribution, and logistics. During the last decade, the supermarkets in the United Kingdom took advantage of the internet and they are offering online shopping to the consumers. Through this innovative feature the supermarkets offer their entire catalogue of products to the consumers and the ability to compare prices, search for a product, pay and order for their groceries. Therefore, the food retailers reduce their personnel costs while they are able to advertise almost free and make consumers aware of their offers. Also it is not unusual that many products cannot be found inside the stores and are available only through e-commerce (Tesco annual report 2009). This is another example of minimising operating costs while increasing sales. Furthermore, the food retail corporations used the information technology to organise their operations and maximise the organisations efficiency and profitability. Specifically, the management of each organisations functions is assigned to specialised software and digitalisation of processes. Through the use of innovative technology the cost and the paperwork is reduced and time is saved. Also, the logistics department increases its efficiency because the supply chain is more efficient controlled and the stock management provides a real and immediate view (Sainsburys annual report 2009). The implementation of technology can be beneficial for both retailer and consumer. The self-checkout machines reduce the labour costs of the company because they usually require one person per five machines to observe. Also, in that way the consumers save time and control their groceries shopping. The introduction of point earning cards offers discounts and rewards to the consumer while it provides valuable information to the supermarket company about the preferences and habits of each individual. The analysis of this information assists to the companys advertising planning and strategy while it offers the ability of targeted marketing (Moody, 1997). The effective application of technology in the distribution and transportation process through energy efficient vehicles protects the environment as it reduces the vehicles carbon emissions. Furthermore, the food retail company improves its corporate social responsibility and reduces the goods transportation cost. Finally, the Universal Product Code or in other words bar-code was an innovation that brought a revolution in the industry. Each product could have its specific bar-code, simplifying the pricing and check-out while saving time and establishing accuracy. Also, the use of wireless technology and the attachment of electronic chips on the products can prevent theft and measure the product availability on shelves. Therefore, the inventory is the supply process becomes faster and the food retail corporations avoid unexpected losses that due to their volume can have a significant cost for the organisation (Food Marketing Institute, 2010). 4. Porters five forces analysis Operating Environment To analyse the operating environment of the food retail industry and evaluate its competitive nature, a Porters Five Forces Analysis, created by E.M Porter professor at Harvard University Business School, will be used. According to Porter the five forces are: the industry competitors rivalry, the threat of new entrants, the bargaining power of suppliers, the bargaining power of buyers and the threat of substitutes products or services (Porter, 2004). 4.1 The industry competitors rivalry. The competition in the food retail industry is intense. The named big4 supermarkets which are: Tesco, Sainsburys, Asda, Morrisons own the 73.3% market share, fact that makes the industry an oligopoly (Mintel report 2009). Below are the identified the major competitors in the industry and their competitive strategies. 4.1.1 Tesco Tesco is the market leader with a market share of 31%, and a total number of outlets 2,282, is traded in the London Stock Exchange and had  £41,520m sales and  £2,381m profit in 2009. Beyond food products it sells electrical equipment, health products, petrol, clothing, homeware, telecommunications through a joint venture with O2, and financial services through Tesco Bank (Datamonitor, 2009). Also, Tesco is expanding to land telecommunications, construction and youth clothing (Parker; Felsted; Poulter; Minton, 2010) Tescos expansion plans target to the development of the small Tesco Express who satisfy the legal size requirement of Sunday trading act to operate on Sunday (DEFRA, 2006). The objectives of Tescos strategy are concentrated in five areas: to be a successful international retailer, to grow the core UK business, to be as strong in non-food as in food, to develop retailing services such as Tesco Personal Finance, Telecoms and tesco.com and to put community at the heart of what we do (Tesco Annual report 2009). 4.1.2 Sainsburys Sainsburys is a supermarket chain in the United Kingdom with a market share of 15.4%, and a total number of outlets 792, is traded in the London Stock Exchange and had sales  £18,911m and  £466m profit in 2009. Sainsburys sells food products, home and garden products, electrical appliances, clothing, health products, sports and leisure products, petrol and offers financial and insurance services. Also, Sainsburys is expanding to Electricity and Gas, broadband and digital TV. Furthermore, Sainsburys collaborates with convenience store chains Bells Stores, Jacksons Stores, and JB Beaumont Stores in a strategic alliance move to increase its market share in the convenience stores battle. Sainsburys concentrate its corporate objectives in five areas: Great food at fair prices, Expansion in non-food products and services, Reaching more consumers through alternative distribution channels (online shopping), growing supermarket space and active property management of existing stores (Datamonitor, 2009; Rigby and Killgren, 2008; Sainsburys annual report, 2009). 4.1.3. Asda Asda is a supermarket chain owned by Walmart a United States of America supermarket corporation. Asda operates in the United Kingdom with a market share of 15.1% and a total number of outlets 356 and had sales  £18,573m and  £520m profit in 2009. Asda sells food products, health and beauty products, household products and petrol. Also it offers telecommunication services through its own mobile network Asda mobile and clothing through the George stores. Asdas competitive strategy is to differentiate from the competition emphasises in the fresh food, including bakers and butchers in its stores. Also, Asda operates a discount store Asda Essentials with own brand products competing directly with the discounters Lidl and Aldi. In a generic view, Asda targets in price competition boasting better prices and offers. (Datamonitor 2009; Corporatewatch.org.uk, 2004) 4.1.4. Morrisons Wm Morrison supermarkets or otherwise Morrisons is the fourth supermarket chain in the United Kingdom. Morrisons have a market share of 11.8% and a total number of outlets 420. Morrisons sells groceries, household products, petrol and dry cleaning and photo services. Morrisons operates through its own stores and its subsidiaries with Safeway among others. Morrisons target is to become the Food Specialist for Everyone as it owns 13 manufacturing plants and a fresh food factory. Morrisons concentrates its strategy around three brand values: Fresh, Value and Service. This means that Morrisons targets to offer fresh food in competitive prices in a premium consumer service. Generally, Morrisons is an emerging power in the industry and tries to gain competitive advantage by connecting the gap between value and high quality products. (Datamonitor, 2009; Wm Morrison annual report, 2009) Examining the nature of competition and the competitive rivalry it can be observed that the market share of mid-size and local grocery retailers is too small and the increasing appearance of big4 convenience stores and the large fixed costs. This leads to the implication that the competition in the industry is mainly concentrated among the major competitors. The major competitors are operating in a mature market, which pushes them to fiercely compete for market share through price, range and service (DEFRA 2006). In a mature market with a stable population like in the UK the consumption cannot be increased significantly. Thus, the main objective is to acquire a bigger percentage of the market share pie. Therefore, this situation has driven the grocery retailers to compete in a price war to maintain their customers and if possible to attract more to increase their revenues (Felsted, 2010). For this reason the grocery retailers aim to innovate and minimise the cost to be able to allow larger price margins. Also, taking into account the recent financial crisis and the recession it can be observed that the consumers were cutting their expenses and turned to hard discounters chains such as Lidl and Aldi. (Mintel report, 2009) This situation strengthens the price competition from sophisticated to basic products such as milk, poultry and bread. Also, the major competitors adopted aggressive advertising policy comparing often their prices with competition (Leroux, 2009). Furthermore, to increase their competitiveness supermarkets expand their activities and increase their product range. For example they offer in their stores non-food products like electrical equipment, homeware, pharmacy, financial services etc. This action widened their competitive arena, as they compete with a large portion of the retail sector such as electrical equipment, clothing, DoItYourself, furniture and health and beauty stores. The existence of petrol stations at the supermarkets competes directly with the petroleum providers e.g. BP and SHELL. Also, the supermarkets expansion to financial services e.g. Tesco Bank, place supermarkets to compete with retail banks. It can be suggested that the supermarkets because of the mature food market aim to provide a total package of products and services to their customers covering all their consuming needs; thus increasing the food retail industrys sales and profits. 4.2 The threat of new entrants. The entrance of new competitors in the food retail industry faces several difficulties. The creation of a new supermarket chain requires large capital investment, funds for corporate planning, advertising and trading capital. Furthermore, the majority of the industrys market share is acquired by the established big4 chain supermarkets and the margins for expansion are very limited. Also, the acquisitions are very difficult to realise because of the high value of the existing chains. However possible mergers or strategic alliances might take place. Other barriers to entry in the industry are the large fixed costs and the developed supply chains. Also, the existing dominants of the market benefit from the economies of scale which gives them the ability to adopt an aggressive pricing strategy. Therefore, it is very hard for the smaller retailers to compete and survive in that environment. According to the Competition Commission (2008) there are three different factors that lift entry barriers to the industry: a) cost advantages that large grocery retailers have b) the planning regime for grocery retailing and c) the control of land of large grocery retailers. The Competition Commission report divides the large grocery retailers cost advantages in two categories: distribution costs and purchasing costs. The large grocery retailers gain benefits from reduced distributions costs occurring by economies of scale and economies of density. The economies of density benefit the supermarkets because they operate satellite distribution centres that serve groups of stores. This process reduces the distribution costs because the distribution centres supply only the short and medium distance branches saving time distance and transportation costs. The economy of scale impact is that the supermarket chains use technology to control the products availability, to maintain the sensitive groceries such as meat and vegetables. Also, the supermarket maximise the efficiency of the distribution from and to suppliers, supermarket stores and consumers. Therefore this acts as another barrier to entry because the large supermarket chains have established channels of distribution and a cost effective distribution network supported by their own distribution fleet which covers the majority of the British territory (Competition Commission, 2008). The purchasing costs act as a barrier to entry to the food retail industry. The large supermarket chains because of their high volume purchases are able to deal better prices with their suppliers. Therefore, they are able to offer their products at a lower price in contrast with the smaller retailers who are obliged to purchase at a higher price (Competition Commission, 2008). Also, the big4 chains have already a competitive advantage because they possess knowledge and information about the suppliers. The volume of their sales gives them the ability to make large orders of supplies in lower prices. Another barrier to entry in the industry is the current planning regime for grocery retailing. The planning regulation sets limitations to the ability of new and existing competitors to open new stores in the positions they want. The reasons for this include environmental, competition and town planning issues. Also, the continuous development of supermarket outside towns led the UK government to demand the town centre development since 1996 (Competition Commission, 2008). Additionally the large supermarket chains already control the suitable land and the best locations, which make the rest of the sites expensive and difficult to find. All the barriers to entry in the industry are beneficial to the oligopolistic big4 supermarket chains and allow them to increase their profitability through the reduced costs and by controlling the goods prices. 4.3 The bargaining power of suppliers. According to the Datamonitor report (2009) the suppliers in the grocery retail industry include: food manufacturers, food processors, farmers, and agricultural co-operatives. The most powerful suppliers are the food manufacturers and the food processors because their number is smaller and in some cases they are irreplaceable. The bargaining power of the suppliers is high when they supply the supermarkets with branded goods that are highly demanded by the consumers. The supermarkets cannot apply big pressure to secure low prices and the suppliers can negotiate better prices. Therefore the supermarket chains make long term contracts with certain suppliers while maintaining their deals with a variety of suppliers to keep the switching costs low. Furthermore, the presence of the supermarkets own brands weakens the position of the suppliers and reduces their bargaining power. For example the supermarket chain Sainsburys includes in their product line their own branded Sainsburys ham and the Danepak ham and the consumers prefer them because they are usually sold at lower prices (Ali, 2009). The implication is that the supermarkets gain bargaining power because they are able to change suppliers or to make big orders. However when the food retailers choose to cooperate with only a few suppliers they give bargaining power to suppliers. For example big food manufacturer like Nestle have loyal consumers who give high value to the brand. Therefore, the supermarkets are obliged to bargain with different terms with the big suppliers and make concessions to their profits (Hill, 2007). During the last years the big4 competitors demanding for lower prices, were often accused for price wars with the suppliers. Unfair competition practices like late p