Recent orders

Routing and Switching

Routing and Switching

Student’s Name

Institution

Date

VLAN

A Virtual Local Network (VLAN) refers to a networking of computers that behave as if they have a connection to a similar wire. Physically, they may be have a location in different segments within the LAN. The VLAN has a configuration through the software, as opposed to the hardware. This gives a significant advantage to the VLAN since that increases its flexibility. Therefore, when physical movement takes place, it is capable of staying within the same VLAN without a single hardware configuration (Tarnay et al., 2011).

Reasons for implementation of a VLAN

The implementation of a VLAN is important for a number of reasons. Firstly, it offers great functionality for almost all networks. This is because its creation has a move towards the separation of networks into separate broadcasts. This takes place with other networks function in different locations well. For instance, if a business organization contains various departments like human Resources and Sales, the VLANS become implements for every department. This creates an individual network throughout the business organizations. In addition, they are cost effective and do not have a compromise for high security need and performance (Solomon & Kim, 2013).

VLAN Trunk

The VLAN trunk provides for the automatic definitions existing between the distribution switches and the core switch. This insinuates that the core switch needs one definition to allow for automatic propagation to all the available network distribution switches. After the propagation of the VLAN to the distribution switch, there is the performance of assigning ports to the VLAN.

Protocol alternatives existing during implementation in the Cisco environment

During implementation on the Cisco environment, the VLAN Trunk Protocol is important. It is the second layer protocol responsible for addition, removal and modifications of VLANs in the network. The VTP has a design that allows the provision of automatic distribution of definitions from the main switch to distribution switches (Tarnay et al., 2011).

Configuration of a VLAN trunk

The use of a switched VLAN allows room for the creation of groups of logical networking devices acting as though they have their own independent network. This includes the sharing of common infrastructure with the other VLANs. The configuration of a VLAN requires one to assign it a number ID. In addition, there is the provision of the naming option. The VLAN implementation helps to associate ports with particular VLANs. The configuration can be in such a way as to forward a frame to a certain VLAN. A port can then have a configuration for supporting all the VLAN types (Tarnay et al., 2011).

Operation of VLAN trunkingThe VLAN trunking allows the movement of traffic to separate parts of the network with a configuration in the VLAN. The trunk gives the provision of a point-to-point linkage between networking devices carrying two and above VLANs. The VLAN trunking enables the extension of the configured VLAN throughout the entire network. The sole purpose of the VPT is the provision of switches through which there is management of the individual switches. This takes place as a group for the purposes of VLAN configuration (Solomon & Kim, 2013).

Major considerations in configuring a VLAN trunk that uses VTP

In case a switch happens to be part of the VTP management domain, every switch should have a configuration to one of the three possible models. They three models include:

Serve mode

The server is the default mode used if the VTP undergoes configuration. The server mode is suitable for addition, deletion and modification of VLANs. The information goes through other switches within the VTP management domain.

Client mode

The mode is the recipient of the added, deleted, or modified VLANs by a switch at the server mode that happens to be within the same management domain. The mode cannot manage to make any significant changes to the VLAN information.

Transparent mode

It passes the updates from the VTP that the switches receive in the server mode to others in the VTP managed domain. However, it cannot make to process the contents of the messages. When the individual VLANs have an addition or deletion or even a modification on switch running in this mode, changes are local to the particular switch alone. The remaining switches are not subject to effecting in the VTP management domain (Tarnay et al., 2011).

VTP pruning

Virtual Tuning Protocol (VTP) stands for VLAN Trunk Protocol used within the multi VLAN structure. When classifying VLAN within a single core switch, one can set up the VTP client and domain core switch in the edge switch and define a trunk port between them. The edge switch can be in a transparent mode that transports the core switch to the other switch. VTP ascertain that all switches in the VTP domain are aware of all VLANs. Sometimes VTP creates unnecessary traffic; VTP pruning comes in and eliminates the unnecessary traffic. VTP pruning enhances the available bandwidth by preventing the hectic traffic in those trunk links that the traffic is to use when access the appropriate network devices. This control of the unnecessary traffic is described as VTP pruning (Solomon & Kim, 2013).

Comparison of trunking with switch port aggregation using Ether Channel

Ether Channel is a port trunking technology used mainly on Cisco switches. It enhances classification of various physical Ethernet connections to create one consistent Ethernet connection for the reason of giving fault-tolerance and high-speed links among routers, switches and servers.An Ether Channel is created between two and eight active Gigabit Ethernet, Fast Ethernet or 10-Gigabit Ethernet ports as well as an additional one to eight inactive ports which later become active while the other active ports fail.

References

Solomon, M., & Kim, D. (2013). Fundamentals of communications and networking.

Tarnay, K., Adamis, G., &Dulai, T. (2011). Advanced communication protocol technologies:

Solutions, methods, and applications.Hershey, PA: Information Science Reference.

Health Effects of Obesity

Student’s Name:Instructor:

Course:

Title: Effects of Obesity

Specific Purpose: To inform my audience about the three adverse health effects of obesity

Central Idea: Three health effects of obesity are cancers, type 2 diabetes, and coronary heart disease.

Introduction

Attention grabber: Fast food joints have been put up across all major streets in America providing Americans with a quick and cheaper option of eating. These foods have been advertised to lure people into eating them and give little attention to the effects they have on their health. The calories contained in them are much more than what the human body really needs.

Reveal Topic: I intend to inform you about the major effects of obesity in humans.

Relate to audience: I intend to inform you about the effects of obesity, a condition that you can find yourself in if you get hooked on to fast foods.

Speaker credibility: The information I intend to pass to you has been retrieved from books that have been approved by the American Medical Association.

Preview main points: the effect of eating fast foods is obesity which leads to cancers, type 2 diabetes, and coronary heart disease.

Body

The first effect of obesity is coronary heart diseases.

All through my life, I have heard news of obese not making it to 40 years because they had coronary heart disease.

According to Eckel & Krauss’ American Heart Association call to action, 2008, “Although most of the comorbidities relating obesity to coronary artery disease increase as BMI increases, they also relate to body fat distribution. Long-term longitudinal studies, however, indicate that obesity as such not only relates to but independently predicts coronary atherosclerosis”

According to Grundy’s Journal of Clinical Endocrinology & Metabolism, 2004, “In a 14-year prospective study, middle-aged women with a BMI >23 but <25 had a 50% increase in risk of nonfatal or fatal coronary heart disease, and men aged 40 to 65 years with a BMI >25 but <29 had a 72% increased risk. ”

2. The second adverse health effect of obesity is type 2 diabetes.

A. Awareness against diabetes has been made all through the years with advice being given that people should watch out for obesity.

B. According to Lazar’s How obesity causes diabetes: not a tall tale, 2005, obesity is believed to account for 80-85% of the risk of developing type 2 diabetes, while recent research suggests that obese people are up to 80 times more likely to develop type 2 diabetes than those with a BMI of less than 22.

C. According to Boden, G., & Shulman, G. I. in 2002 “Studies suggest that abdominal fat causes fat cells to releases ‘pro-inflammatory’ chemicals, which can make the body less sensitive to the insulin it produces by disrupting the function of insulin responsive cells and their ability to respond to insulin. This is known as insulin resistance – a major trigger for type 2 diabetes.”

3. The third obesity effect is cancers.

A. It is currently common knowledge that obesity can cause cancer and cancer is right now the leading global cause of death.

B. According to Snowdon’s American journal of epidemiology, 1984, “Fat cells in the body are active and produce hormones and proteins that are released into the bloodstream and carried around the body. Spread through the circulation, these ‘chemical messengers’ can affect many parts of the body, and increase the risk of several different types of cancer.”

C. According to Zhang’s Abdominal obesity and the risk of all-cause, cardiovascular, and cancer mortality sixteen years of follow-up in US women, “Excess fat changes the levels of sex hormones, like oestrogen and testosterone, in the body. This may increase the risk of cancer. Fat cells also produce many other chemical messengers which affect how the body works.”

Conclusion

Signal end: We have looked at the three health effects obesity which can be caused by fast foods.

Review Main Points: The effects of obesity are cancers, type 2 obesity, and coronary heart diseases.

Memorable Clause: I trust thus this information will motivate us to watch what we eat so that our BMI stays in check. The effects or a reckless lifestyle can be very adverse, and at times cause deaths.

Bibliography

Boden, G., & Shulman, G. I. (2002). Free fatty acids in obesity and type 2 diabetes: defining their role in the development of insulin resistance and β‐cell dysfunction. European journal of clinical investigation, 32(s3), 14-23.

Eckel, R. H., & Krauss, R. M. (2008). American Heart Association call to action: obesity as a major risk factor for coronary heart disease. Circulation,97(21), 2099-2100.

Grundy, S. M. (2004). Obesity, metabolic syndrome, and cardiovascular disease. The Journal of Clinical Endocrinology & Metabolism, 89(6), 2595-2600.

Lazar, M. A. (2005). How obesity causes diabetes: not a tall tale. Science,307(5708), 373-375.

Snowdon, D. A., PHILLIPS, R. L., & Choi, W. (1984). Diet, obesity, and risk of fatal prostate cancer. American journal of epidemiology, 120(2), 244-250.

Zhang, C., Rexrode, K. M., van Dam, R. M., Li, T. Y., & Hu, F. B. (2008). Abdominal obesity and the risk of all-cause, cardiovascular, and cancer mortality sixteen years of follow-up in US women. Circulation, 117(13), 1658-1667.

Room Movie Erickson Theory

Room Movie: Erickson Theory

Name

Institution

Date

Room Movie: Erickson’s Theory

Room is a movie that teaches us a few things on psychology. The plot of the movie revolves around a mother and son that are confined in a space for years. The two are in a claustrophobic shack which is located in a suburban backyard. The woman who is Ma and his five-year-old son Jack were imprisoned by a man who had constructed a shack so that the two stayed there locked up like his personal possession. Jack is so profound of the movie characters including Dora the Explorer and Bob from Bob the Builder and although the characters are actually not real, he believes that they actually are real. One can pick up his naivety as he narrates the book because he has never been outside the room. This paper uses Erickson’s theory of psychosocial development to analyze the movie.

Erickson’s theory of psychosocial development is among the most discussed theory when it comes to child development. He argued that during child development, a personality had to be established in the early life of their child and this personality would be established in their whole life. He also argued that the conflicts that we encountered in our lives during development were not all unconscious rather, most were conscious because of the development process. His argument on the child development was based on the fact that a child’s development was contributed by social relations. His theory had eight stages of development that concentrated on series of development and the conflict occurring through the lifespan (Sokol, 2019). The crisis that occur in each stage, one ought to be resolved as it helps one get psychological strengths. The eight stages are; trust vs. mistrust, autonomy vs. shame, initiative vs. guilt, industry vs. inferiority, identity vs. role confusion, intimacy vs isolation, generativity vs. stagnation and integrity vs. despair.

Trust vs. mistrust begins from birth to around the age of 12 as infants begin to realize if adults can be trusted. If a child is able to meet their basic needs of survival, then they know that they can trust the adult. In the movie Room, this stage is completely evident as we see Jack completely in love with her mother. He is angle to identify his mother’s true love and knows that the mother would do anything to protect him. For most infants if the feel they are being treated cruelly then they may decide not to trust the adult in their life.

We can also see the autonomy vs. shame from the movie as we see Jack developing a preference on certain cartoon characters that he feels he can interact with and also feel that they are his friends. This stage begins when a child is 1-3 yeas as children begin to learn how they can interact with the environment and begins to develop preferences on certain elements such as toys and food. Her favorite characters are Dora and Bob (Hunt, 2015). At this stage, a child often tries to create independence and this stage is often referred to as the “me do it” stage. In the movie we can see Ma letting Jack be independent and be his own person. If a child is denied the opportunity to be their own person and make their own decision a sense of doubt and shame may develop in them. This at a later stage in life may contribute to self-esteem issues. When Ma is able to escape from his captor, we see Jack able to catch up in the outside world pretty easily because her mother had established confidence in him.

The next stage in Erickson psychosocial stages of development is the Initiative vs. Guilt and occurs in children around the age 3-6 years. During this stage the children can be able to initiate activities and assert a control over their world by social interactions such as play. Ma plays with her child from time to time including doing exercises. During play time Jack appears to be a very happy girl. Her mother also engages her in her cooking for example breaking the egg and cleaning the dishes after they are done. She is however not in a position to interact with other school going children because she is locked up.

From the movie, the eight stages of Erickson theory only go until the third stage because Jack is five in the movie. Despite this we are able to witness child’s development even in a situation that is quite traumatic. It is evident that a mother’s or guardian love is important in helping a child grow. A child’s understanding of a traumatic situation at a young age is also completely different, with reassurance from the parents that they are okay then they believe that they are okay. The only attachment that Jack has in his life is his mother and the objects around him. One way that people deal with seclusion is creating imaginary friends. Jack has an imagination with inanimate objects that surround him including wardrobe, chairs and skylight and tries to make sense of them (Klickstein, 2017).

In conclusion, Jack’s development can be seen throughout the movie The movie looks into the life of a child who does not really seem to understand the meaning of trauma as the mother as shielded him. This portrays the understanding that most children tend to have had the trust they put on their parents for most children they knew that with a parent who loves and care for them is around, then they have nothing to worry about as everything will be okay. Age is an important factor in how we react to adversity. Jack who is 5 does not understand the situation he is. The doctor actually recommends Ma for being able to escape while Jack was only plastic and thus becomes easier to recover from the trauma.

References

Hunt, Nate. (n.d.). “‘Room’ Is an Excellent Study of Human Psychology.” Calvin University Chimes, https://calvinchimes.org/2015/12/13/room-is-an-excellent-study-of-human-psychology/.

Klickstein, Mathew. (3 June, 2017). “What Room Teaches Us About the Psychology of Fandom.” Wired, Conde Nast, https://www.wired.com/2016/02/room-fandom-psychology/.

Sokol, Justin T. (2019). “Identity development throughout the lifetime: An examination of Eriksonian theory.” Graduate journal of counseling psychology 1.2: 14.