Monday, January 27, 2020

Religion in Crime and Punishment

Religion in Crime and Punishment Dostoevsky was a very religious an after he got out of jail. Because of this, when he wrote Crime and Punishment he incorporated teachings and symbolism from his own religion to help the characters progress. There are several instances where the use of symbolism along with water portrays rebirth and regeneration. There are also instances where water represents death, whether it is because of murder or suicide. Another symbol used in the novel is the cross. As if the cross did not represent enough already in Christianity, Dostoevsky uses it to represent the ordinary, along with its classic representation of suffering. Finally, Dostoevsky incorporated the stories of Lazarus and Jesus. These are meant to represent the characters spiritual awakening and spiritual death. The outstanding strands of symbolic imagery in the novel are those of water, and stories of Lazarus and Jesus (Gibian 2). Dostoevskys personal beliefs are portrayed through the use of symbolism within Crime and Punishment including the use of religious symbols such as water and the cross, and through biblical stories such as that of Lazarus, which help the characters evolve. The use of water is a recurring theme within Crime and Punishment. To the protagonist of the book, water is a symbol of rebirth and regeneration, always there when something positive occurs (Gibian 2). This is saying that whether it be when Rodya (Raskalinkov) is turning himself in, or when he returns to his faith, water is always present. Inside of Raskalinkovs inner fight, there is still receptivity to water as beauty (Gibian 2). This is saying that no matter how difficult life can get, Rodya always sees the beauty in water which has a calming effect on him. For him, water is soothing and a source of life, such as with the flowers along the bank of a river. He understood the beauty of the river, and therefore that of the water (Gibian 2). Even though he sees this beauty, the rest of his life is so confusing he contemplates suicide within the river. HE then realizes that the river is life, not death. The river which Raskalinkov sees is no longer a means for committing suicide, nor a sight inducing melancholy; it is the river of life (Gibian 4).This is a major step because he realizes he needs to fall onto the road of redemption, which ironically begins by the river as well, along with Sonia (A woman Rodya meets who helps him on his road to redemption.) Rodyas regeneration begins with Sonia at his side at the bank of the river (Gibian 6). During his regeneration, he realizes that even though he has seen the beauty of the river, it was not as it was; he used to see it with more concentration. It occurs to Rodya that he has not fully enjoyed the beauty of the river because his thoughts have banished him (Gibian 6). His reaction to water has changed since becoming a student with his new views (Gibian 4). The religious symbol of water represents rebirth and regeneration to many characters such as Raskalinkov. Even though water can be seen as rebirth and regeneration, it can also be a representation of death, whether it is murder or suicide. For the protagonists, water has a generally positive effect, but this is not the case when dealing with the antagonists. Water has a negative influence on the antagonists, always there when bad events occur (Gibian 2). Whenever anything negative happens to an antagonist, water is involved. One example of this is the situation with Svidrigalov, who, to Raskalinkov, is threatening. Instead of being a positive influence, water is negative for Svidrigalov because it is in the rain that he decides to take his life and shoot himself (Gibian 2). Before this, he also confirms his repulsion of water. Water holds the terror of death for the corrupt Svidrigalov who confirms his depravity by saying Never could I stand water, not even in a landscape painting. (Gibian 2). This shows that water holds a position above Svidrigalov, as a higher power causing harm to him . Unlike the protagonists, the antagonists have a negative reaction with water leading to death. Dostoevsky used another symbol from his religion, the cross, to help develop the characters. The main representation of the cross is suffering. Raskalinkov wears the cypress cross that Sonia gives to him, because now he is ready to suffer for his murdering of the pawnbroker. Sonya gives Raskalinkov the cross as if saying You are no forgiven. Go suffer. (Knopps 1). Sonia convinces Raskalinkov to wear the cross as he confesses which shows he is ready to suffer (Gibian 3). The other reason Dostoevsky used the cross was to show that Raskalinkov and his victim were ordinary people. The cross that Sonya gives to Rodya once belonged to his innocent victim, Lizavita. The cross was also made of an ordinary wood, cypress. Rodya wears the cross of his innocent victim, which is made of an ordinary wood cypress. This represents how his victim was random and innocent (Salvation 2). His victim was ordinary who happened to be in the wrong place at the wrong time, just like the ordinary cypress. The other connection that can be made is between the ordinary cypress and Raskalinkov being ordinary. After he killed the pawnbroker and her sister, Raskalinkov believes he is a higher power, above the law. This is why he has trouble with religion; he believes he is a god. However, when he takes the cross, this changes. When he takes the cross, he admits he is an ordinary man, now part of society (Salvation 5). This is cutting Rodya down to the level of everyone else. Now he is not above the law and must turn himself in. It also means that he can have faith again and believe in God and Jesus, coming back to religion. Since Dostoevsky was religious, it is not a surprise that he incorporated stories from the bible into his novel. The author uses parallels to the stories of Jesus and Lazarus from the main characters in his novel. The first comparison is to show how Raskalinkov is spiritually dead, but with hope of being awakened. The reading of the story of Lazarus is important because Rodya has experienced a sort of spiritual death (Hutt 1). Before the story of Lazarus, a man whom Jesus raised from the dead after four days, was read to him, Rodya had abandoned faith and was spiritually dead. He asks Sonya to read him the story because he is spiritually dead and needs hope (Salvation 2). Even though Sonya is trying, Raskalinkov doesnt understand and is still not figuring out the connections between him and Lazarus. Even though there is seems to be no chance of it working, Rodyas soul can be raised. The other comparison to Jesus and Lazarus is to show how Raskalinkov can be spiritually awoken. Raskalinkov feels like Lazarus in that one day he may have a resurrection that would end his spiritual depravity (Hutt 1). Rodya asks Sonya to read him the story of Lazarus to give him hope that he can gain faith. Dostoevsky has Raskalinkov ask Sonya to read him the story of Lazarus because it is the best example of a human being resurrected to a new life (Gibian 3). This is because there was a need for Rodya to overcome his feelings of being somewhat God-like. Not only does Raskalinkov identify with Lazarus, but also with Jesus. Rodya is raised from his spiritual death just as Jesus ad, while there were many who did not believe it was possible. Also, as Raskalinkov is going through his regeneration, he keeps a bible under his pillow to symbolize Jesus resurrection (Gibian 5). Raskalinkov can identify with Lazarus and Jesus because of their resurrections back to life. Dostoevsky uses his religion to influence his novel and help develop the characters. The author, a deeply religious man, uses allusions to stories of his faith heavily in order to show how religion can bring about redemption (Hutt 1). There are several instances in which Dostoevsky uses his own religion to influence the characters. One of the main symbols is water. Water is used to help the regeneration and rebirth of the protagonists, helping them realize the beauty of life. On the other side, water is used to show death for the antagonists. The Christian symbol of the cross is used in a traditional sense of suffering and a new view, as ordinary. There is also evidence of stories such as Lazarus helping the characters progress. Dostoevsky used his own religion to impact the characters within his novel.

Sunday, January 19, 2020

Change and People

Outline for â€Å"The Psychological Impact of Dejobbing† †¢ â€Å"You are what you do† – most Americans are defined in terms of their jobs, connected to a wider community through their jobs, and provided with structure and purpose by their jobs. †¢ What you must learn, for today’s job environment – learn to live with work situations that are not framed by job descriptions and clear reporting relationships. We will have to learn to live with multiple roles, where the role mix changes frequently.And we will have to find the income we need in such unstable and unpredictable conditions †¢ The most difficult aspect of being laid off or otherwise â€Å"dejobbed† – The hardest part of being laid off is the mental aspect. † In the long run it will probably be the psychological aspect of dejobbing that people find most difficult. Incomes are modular and portable; they can be replaced. Replacing the psychological rewards tha t jobs have provided is far more difficult. What work gives each of us, cognitively and emotionally – A job gives people parts to play and tells them what they need to do to feel good about their contribution. It gives them a way of knowing when they have done enough, and it tells them when their results are satisfactory. Jobs provide people with a place where they need to show up regularly, a list of things they’ve got to do; a role to play in some larger undertaking; a set of expectations to be measured against.It gives them an everyday sense of purpose, and fulfilling such purpose is a source of self-esteem. For people whose personal lives are not going very well, the job may be the only source of self-esteem. †¢ Relationship between order and change in the world of work today – The art of progress is to preserve order amid change and to preserve change amid order. † It is important to recognize this reciprocal relationship and to understand that c hange and stability are not in an either-or relationship to one another†¦Without order, change has nothing to work on†¦but without hange, order cannot be maintained through time†¦You can feel this relation between change and order when you ride a bicycle: you need to keep making little turns, or else you won’t travel straight and stay upright for very long†¦what the dejobbed worker needs to look for is neither a way to recover absolute stability, nor a way to live with utter chaos, but a dynamic kind of order that does not block the flow of change How to give a sense of structure and meaning to your life if you are ever â€Å"dejobbed†: I.Grouping changes: 1. Goals – listing the three most important goals you have now†¦we’re looking for big, comprehensive goals here, not the many little ones. Then, decide what intermediate objectives (no more than three) each of your goals requires you to meet in the near future. Your to-do list c omes from these nine objectives, but nine is too many. Prioritize them. Which three need to be done pronto? Which three could wait until next week? Which three simply have to be done sometime pretty soon? Now, take the ‘prontos. What immediate, first step does each of them demand? Write them down. Those are the actions you are going to take this week. 2. Steps – After any big change in your life, you are going to have to reprioritize again, because any big change changes the value you put on everything in your life†¦It’s also important to keep others up to date on what your priorities are, since any change is going to affect other people, too. The minute you start considering others, you will find that priority-setting isn’t a game of solitaire. . Actions – Keeping your priorities in order is easier if you are not being swamped by sudden and unexpected changes understand better than others the implications of changes that have already taken pl ace. 4. Environmental shifts – , it is important to improve your capacity to see disruptive changes coming†¦subtle shifts in the environment that have already taken place but have not yet been fully recognized by the people who will be affected by them†¦The demise of jobs is such a shift:†¦closure of ilitary bases, the massive restructuring of the health care industry,†¦ the end of American dominance in world markets†¦What economic, technological, demographic or cultural changes in your own work environment fall into this 5. Internal audit – conduct an audit of your†¦expectations, habits, contacts and personal â€Å"rules,† in regard to how they affect your ability to handle constant change. For each of these ask yourself, what is hindering you? What is helping you? Expectations: do you have expectations that are continually being violated by the next change, such as: †¢ After this change, things will settle down. †¢ If yo u are employed by a large organization, you will be insulated from the ravages of constant change. †¢ If you â€Å"do a good job† for your employer, you’ll remain on the payroll. †¢ A human being will always be able to do your job better than a machine will. †¢ The government will step in if the competition from overseas gets too intense. †¢ Long service to an organization will be viewed as a plus. Habits: It is critical for you to stay up to date on the social, technical and economic changes that are likely to have an impact on the kind of work you do†¦decide what periodicals you would read, and what professional or trade meetings you would attend, if you were an independent professional in the field. †¢ Contacts: Are you ready to launch a personal business-development effort tomorrow by contacting the first two or three of the several dozen people who could help you move in whatever direction you decided was appropriate?These would be pe ople who, themselves, have contacts; or who know a lot about something you need to understand; or who might be partners in a joint venture, or who have resources you might be able to use, or who would be able to attest to your potential and accomplishments. †¢ Personal â€Å"Rules†: Most of us are still playing under the old rules. You need to keep an eye out for them via your self-audit and replace them when find them; rules such as: †¢ Don’t leave a job when good jobs are hard to get. Remember, your present job is only temporarily expedient†¦it is going to disappear. The best jobs go to the people with the best qualifications. This is a half-truth, because the whole idea of â€Å"qualification† is changing. The old ‘qualifications’ included degrees or other formal certification, experience in a similar job, and recommendations. Today, most recommendations are known to be hot air or tail-covering platitudes. Experience is more likely to produce a repetition of the past than the kind of new approach that today’s conditions demand. And there often isn’t any degree or certification in the activity that today’s organization needs.The new meaning of â€Å"qualification† is – your D. A. T. A. †¢ Don’t try to change careers after forty. †¢ Getting into the â€Å"right business† assures a secure future†¦designating any field (as the â€Å"right† one) would be bad advice because although there are parts of the economy that are destined to expand, no part of the economy immune to dejobbing. †¢ It doesn’t matter what you want; it’s what â€Å"they† want that counts. Most of us were raised on this one. Maturity was a matter of tempering our wants and of conforming to what someone with more influence and resources wanted of us.But today, it doesn’t matter nearly as much what an organization wants as it used to. The power has moved elsewhere; the only â€Å"they† that matters much any more is, customers. †¢ You have to be a salesman to get ahead today. Not necessarily, but what you do need is†¦a clear understanding of why someone needs what you have and do, and the ability to make your case effectively. Many people who do those well have no experience or interest in sales as a field. II. Changes in how work-related words are being defined: 1. â€Å"Qualification† – 2. â€Å"Risky† vs. â€Å"responsible† employment – III.Frames of meaning: 1. Identity/integrity – is about psychological rather than ethical. It means wholeness With so much change and fragmentation in the new career world, you need a solid core of self. You have to be true to who you are; to your identity. Here, â€Å"identity† means sameness. It refers to the thread of being-the-same-person that runs through all the actions and relationships and statements of an integrate d person. Thus the integrity/identity frame is capable of both maintaining continuity and containing change†¦It is the thread of sameness on which differing activities can be strungThe life journey – The first is a journey toward some external goal: influence and power, a happy family, salvation, or self-actualization. The characteristic of this journey is that it has a recognizable destination that is so desirable that we are willing to put up with the hardships along the way. Those hardships are just hurdles or barriers to be overcome. We may even see barriers as â€Å"filters† that keep the impure, the undeveloped or the basely motivated from reaching the valuable goal. We may also view them as filters that screen out those elements in ourselves, in which case we say that the journey made us better people.On this second type of journey we are trying to become the people we are meant to be. We’re â€Å"ugly ducklings† who don’t know that we are really swans†¦we fail to see that most of what the â€Å"great people† of the world have accomplished was not done because they were different but because they were not busy trying to be somebody else. Most of what has been worth doing†¦was accomplished by people who were (like you and me, most of the time) self-doubting, ambivalent and more than a bit discouraged.This second type of journey frames the difficulties along the way no so much as hurdles to be cleared as signals to be attended to, or even lessons to be learned†¦When someone on this journey says that â€Å"there are no accidents,† that does not mean hat we are living according to some great computer program in the sky, but simply that those times when â€Å"the wrong thing happens† are simply the times when we are looking at the world through the filters formed by our outgrown expectations.It means that if we could see the accidental as if it were part of a lesson plan, Our origina l goals and expectations are little more than the â€Å"bait† that lure us into whatever is the next leg of the journey. Anyone who has come to appreciate these things and can see how often the life journey includes or even depends upon events and situations that we didn’t really want to happen can appreciate the definition of the journey offered by an anonymous sage: â€Å"A journey is a trip after you’ve lost your luggage. 1. Where you place your loyalties – As people get tossed around in the changes that are constantly happening in today’s organizations, they lose their loyalty to organizations and increase their loyalty to the kind of work they do. This constitutes a shift in the continuity-producing frame. The organization can no longer perform that task, since the individual’s connection with it is too easily broken. Only something portable can, so the profession, the vocation, or the work becomes the frame.In another version of the s ame process, â€Å"professional growth† becomes the frame. Here the work and the journey metaphor are blended, as the changes that the person encounters are translated into chances to learn more about one’s vocation†¦The journey of increasing expertise and the journey toward mastery become personally meaningful frames, for they contain and give meaning to not only one’s achievements, but even to very serious work-related failures and disappointments. 2. Reality† – Quantum physics has taught us to think in terms of energy fields rather than solid matter, and has show us that some life changes occur not gradually or piecemeal as ordinary experience would suggest, but in â€Å"quantum leaps† wherein a pattern of energy moves suddenly from one state or level to another. Life sometimes has that quality – we wake up one morning and â€Å"everything has changed. † The career that looked fine yesterday is today trivial and worthles s. The relationship that was very important to us yesterday suddenly isn’t.Or perhaps chaos theory provides an more effective metaphor. If the organization is not like a set of children’s building blocks, all horizontals and verticals on the organizational chart, perhaps the organization is more like flowing water†¦Ã¢â‚¬ Points† are unreal; it’s all flux. The patterns are like weather systems, only predictable in the very short term – yet undeniably ordered by some principle beyond randomness. Contemporary chaos theory talks about so-called strange attractors, which are the ordering principles within such apparently random patterns.They are found in water flows, in the seasons, in the rise and fall of animal populations, in the behavior of financial markets†¦Such a ‘frame’ has the feel of life, its messiness-without-meaninglessness, its constant change and continuous transformation†¦ Create â€Å"Islands of Order† : One of the ways to manage a life of constant change is to maintain stability in some areas your life by not letting change into them†¦some people whose careers have taken them all over the world have kept a home base somewhere that they return to whenever they need to put the pieces back together again.Many people whose work associates come and go†¦keep a circle of friends which changes very little. Many people who go through professional identities as though they were seasonal clothing maintain a spiritual discipline†¦or play a sport seriously. These are the solid points of contact are their rock, which enable them to move safely. Other islands of order are temporal and periodic: quiet time every weekend, every other weekend, one weekend every month; a half-hour of meditation or solitary exercise every morning; two or three weeks â€Å"away from it all† every summer.Some time-outs are occasional: a break, a totally free and passive period at the end of every big project. Some are spontaneous: a sudden decision to spend the afternoon at a movie, take a hike or swim, instead of working. Other islands of order are spatial. They are places where the person goes to break the pattern of constant change. It may be a little park near where you work that you stop by every lunch hour. It may be a room (even a corner of a room) in your house or a chair under a tree in the backyard.It may be a motel room you rent at the beach. Whatever and wherever they are, these are places of order, where you take a break from constant input and output. Still other islands of order are created by favored activities. They may be hobbies†¦stamp collecting†¦playing a musical instrument or a sport†¦cooking, listening to music, taking walks, gardening, doing carpentry, brushing a horse, or training a dog. The common element is that time slows down, even stands still, when you do them.

Friday, January 10, 2020

Transmission Control Protocol and Cisco Public Information

Learning Objectives Be able to explain the purpose of a protocol analyzer (Wireshark). Be able to perform basic PDU capture using Wireshark. Be able to perform basic PDU analysis on straightforward network data traffic. Experiment with Wireshark features and options such as PDU capture and display filtering. Background Wireshark is a software protocol analyzer, or â€Å"packet sniffer† application, used for network troubleshooting, analysis, software and protocol development, and education. Before June 2006, Wireshark was known as Ethereal.A packet sniffer (also known as a network analyzer or protocol analyzer) is comput er software that can intercept and log data traffic passing over a data network. As data streams travel back and forth over the network, the sniffer â€Å"captures† each protocol dat a unit (PDU) and can decode and analyze its content according to the appropriate RFC or other specifications. Wireshark is programmed to recognize the structure of differen t network protocols. This enables it to display the encapsulati on and individual fields of a PDU and interpret their meaning.It is a useful tool for anyone working with networks and can be used with most labs in the CCNA courses for data analysis and troubleshooting. For information and to download the program go to -http://www. Wireshark. org Scenario To capture PDUs the computer on which W ireshark is installed must have a working connection to the network and Wireshark must be running before any data can be captured. W hen Wireshark is launched, the screen below is displayed. To start data capture it is first necessary to go to the Capture menu and select the Options choice.The Options dialog provides a range of settings and filters which determines which and how much data traffic is captured. All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 12 First, it is necessary to ensure that Wire shark is set to monitor the correct interface. From the Interface drop down list, select the network adapter in use. Typically, for a computer this will be the connected Ethernet Adapter. Then other Options can be set. Among those available in Capture Options, the two highlighted below are worth examination.Setting Wireshark to capture packets in promiscuous mode If this feature is NOT checked, only PDUs destined for this computer will be captured. If this feature is checked, all PDUs d estined for this computer AND all those detected by the computer NIC on the same network segment (i. e. , those that â€Å"pass by† the NI C but are not destined for the computer) are captured. Note: The capturing of these other PDUs depends on the intermediary device connecting the end device computers on this network. As you use different intermediary devices (hubs, switches, routers) thro ughout these courses, you will experience the different Wireshark results.Setting Wireshark for network name resolution This option allows you to control whether or not Wireshark translates network addresses found in PDUs into names. Although th is is a useful feature, the name resolution process may add extra PDUs to your captured data perhaps distorting the analysis. There are also a number of other capture filtering and process settings available. Clicking on the Start button starts the data capture process and a message box displays the progress of this process. All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved.This document is Cisco Public Information. Page 3 of 12 As data PDUs are captured, the types and number are indicated in the message box The examples above show the capture of a ping process and then accessing a web page . When the Stop button is clicked, the capture process is terminated and the main screen is displayed . This main display window of Wireshark has three panes. All contents are Copyright  © 1992–2007 Cisco Sys tems, Inc. All rights reserved. This document i s Cisco Public Information. Page 4 of 12 The PDU (or Packet) List Pane at the top of the diagram displays a summary of each packet captured.By clicking on packets in this pane, you control what is displayed in the other two panes. The PDU (or Packet) Details Pane in the middle of the diagram displays the packet selected in the Packet List Pane in more de tail. The PDU (or Packet) Bytes Pane at the bottom of the diagram displays the actual data (in hexadecimal form representing the actual binary) from the packet selected in the Packet List Pane, and highlights the field selected in the Packet Details Pane . Each line in the Packet List corresponds to one PDU or packet of the captured d ata.If you select a line in this pane, more details will be displayed in the â€Å"Packet Details† and â€Å"Packet Bytes† panes. The example above shows the PDUs captured when the ping utilit y was used and http://www. Wireshark. org was ac cessed. Packet number 1 is selected in this pane. The Packet Details pane shows the current packet (selected in the â€Å"Packet List† pane) in a more detailed form. This pane show s the protocols and protocol fields of the selected packet. The protocols and fields of the packet are disp layed using a tree, which can be expanded and collapsed.The Packet Bytes pane shows the data of the current packet (selec ted in the â€Å"Packet List† pane) in what is known as â€Å"hexdump† style. In this lab, this pane will not be examined in detail. However, when a more in -depth analysis is required this displayed information is useful for examining the binary values and content o f PDUs. All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 12 The information captured for the data PDUs can be saved in a file. This file can then be opened in Wireshark f or analysis some time in the fut ure ithout the need to re-capture the same data traffic again. The information displayed when a capture file is opened is the same as the original capture. When closing a data capture screen or exiting Wireshark you are pr ompted to save the captured PDUs. Clicking on Continue without Saving closes the file or exits Wireshark without saving the displayed captured data. Task 1: Ping PDU Capture Step 1: After ensuring that the standard lab topology and configuration is correct, launch Wireshark on a computer in a lab pod. Set the Capture Options as described above in the overview and start the capture process.From the command line of the computer, ping the IP address of another network connected and powered on end device on in the lab topology. In this case, ping the Eagle Server at using the command ping 192. 168. 254. 254. After receiving the successful replies to the ping in the command line window, stop the packet capture. Step 2: Examine the Packet List pane. The Packet List pane on Wireshark should now look something like this: Look at the packets listed above; we are interested in packet numbers 6, 7, 8, 9, 11, 12, 14 and 15. Locate the equivalent packets on the packet list on your computer.All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Pa ge 6 of 12 If you performed Step 1A above match the messages displayed in the command line window when th e ping was issued with the six packets captured by Wireshark . From the Wireshark Packet List answer the following: What protocol is used by ping? ________ICMP______________________ What is the full protocol name? ___Internet Control Message Protocol____ What are the names of the two ping messages? _____Echo Request____ _____Echo Reply____________________________________Are the listed source and destination IP addresses what you expected? Yes / N o Why? ___________________________________ Answers may vary-Yes, the source address is my computer and the destination is the Eagle server Step 3: Select (highlight) the first echo request packet on the list with the mouse. The Packet Detail pane will now display something similar to: Click on each of the four â€Å"+† to expand the information. The packet Detail Pane will now be similar to: All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.Page 7 of 12 As you can see, the details for each section and protocol can be expanded further. Spend some time scrolling through this information. At this stage of the course, you may not fully understand the information displayed but make a note of the information you do recognize. Locate the two different types of ‘Source† and â€Å"Destination†. Why are there two types? The Ethernet II shows the MAC addresses and the Internet Protocol shows the IP addresses What protocols are in the Ethernet frame? ___ eth:ip:icmp:data _ __________________________________As you select a line in the Packets Detail pane all or part of the information in the Packet Bytes pane als o becomes highlighted. For example, if the second line (+ Ethernet II) is highlighted in the Details pane the Bytes pane no w highlights the corresponding values. This shows the particular binary values that represent that information in the PDU. At this stage of the course, it is not necessary to understand this information in detail. Step 4: Go to the File menu and select Close. Click on Continue without Saving when this message box appears. Task 2: FTP PDU Capture Step 1: Start packet capture.Assuming Wireshark is still running from the previous steps, start packet capture by clicking on the Start option on the Capture menu of Wireshark. At the command line on your computer running Wireshark, enter ftp 192. 168. 254. 254 When the connection is established, enter anonymous as the user without a password. Userid: anonymous All contents are Co pyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 12 Password: You may alternatively use login with userid cisco and with password cisco. When successfully logged in enter get /pub/eagle_labs/eagle1/chapter1/gaim-1. . 0. exe and press the enter key . This will start downloading the file from the ftp server. The output wil l look similar to: C:Documents and Settingsccna1>ftp eagle-server. example. com Connected to eagle-server. example. com. 220 Welcome to the eagle-server FTP service. User (eagle-server. example. com:(none)): anonymous 331 Please specify the password. Password: 230 Login successful. ftp> get /pub/eagle_labs/eagle1/chapter1/gaim-1. 5. 0. exe 200 PORT command successful. Consider using PASV. 150 Opening BINARY mode data connection for pub/eagle_labs/eagle1/chapter1/gaim-1. 5. 0. xe (6967072 bytes). 226 File send OK. ftp: 6967072 bytes received in 0. 59Seconds 11729. 08Kbytes/sec. When the file d ownload is complete enter quit ftp> quit 221 Goodbye. C:Documents and Settingsccna1> When the file has successfully downloaded, stop the PDU capture in Wireshark. Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed. Locate and note those PDUs associated with the file download. These will be the PDUs from the Layer 4 protocol TCP and the Layer 7 protocol FTP. Identify the three groups of PDUs associated with the file transfer.If you performed the step above, match the packets with the messages and prompts in the FTP command line window. The first group is associated with the â€Å"connection† phase and logging into the server . List examples of messages exchanged in this phase. Answers will vary- 1292 > ftp [SYN], FTP > 1292 [SYN, ACK], Response: 220 Welcome to the eagle -server FTP service, 1292 > ftp [ACK], Request: User anonymous, Response: 331 Please specify the password, Request: Pass Locate and list examples of messages exchange d in the second phase that is the actual download request and the data transfer.Answers will vary- FTP Data: 1448 bytes, 1294 > ftp-data [ACK], All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 12 The third group of PDUs relate to logging out and â€Å"breaking the connection†. List examples of messages exchanged during this process. Answers will vary- Request:QUIT, Response: 221 Goodbye, 1292 > ftp [FIN, ACK], ftp >1292 [FIN, ACK] Locate recurring TCP exchanges throughout the FTP process. What feature of TCP does this indicate? __Send and receipt of data____________________________________________ Step 3: Examine Packet Details. Select (highlight) a packet on the list associated with the first phase of the FTP process. View the packet details in the Details pane. What are the protocols encapsulated in the frame? ____ Eth:ip:tcp:ftp-data ______________________________________ Highligh t the packets containing the user name and password. Examine the highlighted portion in the Packet Byte pane. What does this say about the security of this FTP login process ? _____ Security isn’t very high because the name and password are visible. ___________ Highlight a packet associated with the second phase. From any pane, locate the packet containing the f ile name. The filename is: ___gaim-1. 5. 0. exe__________ Highlight a packet containing the actual file content -note the plain text visible in the Byte pane. Highlight and examine, in the Details and Byte panes, some packets exchanged in the third phase o f the file download. What features distinguish the content of these packets ? ____ A [FIN, ACK] is issued to close the connection. __________________ When finished, close the Wireshark file and continue without savingTask 3: HTTP PDU Capture Step 1: Start packet capture. Assuming Wireshark is still running from the previous steps, start packet capture by clicking on the Start option on the Capture menu of Wireshark. Note: Capture Options do not have to be set if continuing from previous steps of thi s lab. Launch a web browser on the computer that is running Wireshark. All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 12 Enter the URL of the Eagle Server of example. com or enter the IP address-192. 168. 54. 254. When the webpage has fully downloaded, stop the Wireshark packet capture. Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed. Locate and identify the TCP and HTTP packets associated with the webpage download. Note the similarity between this message exchange and the FTP exchange. Step 3: In the Packet List pane, highlight an HTTP packet that has the notation â€Å"(text/html)† in the Info column. In the Packet Detail pane click on the â€Å"+† next to â€Å"Line-based text data: htmlâ €  When this information expands what is displayed? ____HTML code for the web page__________________________ Examine the highlighted portion of the Byte Panel. This shows the HTML data carried by the packet. When finished close the Wireshark file and continue without saving Task 4: Reflection Consider the encapsulation information pertaining to captured network data Wireshark can provide. Relate this to th e OSI and TCP/IP layer models. It is important that you can recognize and link both the protocols represented and the protocol layer a nd encapsulation types of the models with the information provided by Wireshark.Task 5: Challenge Discuss how you could use a protocol analyzer such as Wireshark to: (1) Troubleshoot the failure of a webpage to download successfully to a browser on a computer. and (2) Identify data traffic on a network that is requested by users. Answers could vary-Wireshark could show when request for a web page failed due to incorrect URL. User traffic could b e monitored to identify errors in source or destination. All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 12

Thursday, January 2, 2020

The History of the Taj Mahal

The Taj Mahal is a beautiful white marble mausoleum in the city of Agra, India. It is widely considered to be one of the greatest architectural masterpieces in the world  and is listed as one of the New Seven Wonders of the World. Every year, the Taj Mahal receives visits from between four and six million tourists from all over the world.   Interestingly, less than 500,000 of those visitors are from overseas; the vast majority are from India itself. UNESCO has designated the building and its grounds as an official World Heritage Site, and there is much concern that the sheer volume of foot traffic may have a negative impact on this wonder of the world. Still, it is hard to blame people in India for wanting to see the Taj, since the growing middle class there finally has the time and leisure to visit their countrys great treasure. Why the Taj Mahal Was Built The Taj Mahal was built by the Mughal Emperor Shah Jahan  (r. 1628 - 1658) in honor of the Persian princess Mumtaz Mahal, his beloved third wife. She died in 1632 while bearing their fourteenth child, and Shah Jahan never really recovered from the loss. He poured his energy into designing and building the most beautiful tomb ever known for her, on the southern banks of the Yamuna River. It took some 20,000 artisans more than a decade to build the Taj Mahal complex. The white marble stone is inlaid with floral details carved from precious gems. In places, the stone is carved into delicate vined screens called pierce work so that visitors can see into the next chamber. All of the floors are inlaid with patterned stone, and incised painting in abstract designs adorns the walls. The artisans who did this incredible work were supervised by an entire committee of architects, headed by Ustad Ahmad Lahauri. The cost in modern values was about 53 billion rupees ($827 million US).  Construction of the mausoleum was completed around 1648. The Taj Mahal Today The Taj Mahal is one of the loveliest buildings in the world, combining architectural elements from across the Muslim lands. Among the other works that inspired its design are the Gur-e Amir, or the Tomb of Timur, in Samarkand, Uzbekistan; Humayuns Tomb in Delhi; and the Tomb of Itmad-Ud-Daulah in Agra. However, the Taj outshines all of these earlier mausoleums in its beauty and grace. Its name literally translates as Crown of Palaces. Shah Jahan was a member of the Mughal Dynasty, descended from Timur (Tamerlane) and from Genghis Khan.  His family ruled India from 1526 to 1857.  Unfortunately for Shah Jahan, and for India, the loss of Mumtaz Mahal and the construction of her amazing tomb utterly distracted Shah Jahan from the business of governing India.  He ended up being deposed and imprisoned by his own third son, the ruthless and intolerant Emperor Aurangzeb.  Shah Jahan ended his days under house arrest, lying in bed, gazing out at the white dome of the Taj Mahal.  His body was interred in the glorious building he had made, beside that of his beloved Mumtaz.