Monday, December 30, 2019

The World s Largest Chain Of Fast Food Restaurants Essay

Organization Name and Background Founded in the year 1940 in San Bernardino, California, McDonald’s Corporation, the industry pioneers of fast food restaurant chains, grew to become the world’s largest chain of hamburger fast food restaurants, with a worldwide client base of more than 58 million daily customers. Through the introduction of their â€Å"Speedee Service System† in 1948, the principles of modern fast-food restaurants arose, and saw the establishment of the present McDonald’s corporation that dates back to April 15th, 1955 with the opening of a franchise restaurant by Ray Kroc, in Des Plaines, Illinois. It was Kroc, who then purchased equity in the company and led to the worldwide expansion of the corporation. The first McDonald’s restaurant, located at Des Plaines, Illinois saw relative success early on with its first day sales revenue totalling to $366.12 back in the year 1955. Accounting for inflation based on the consumer price index (CPI) of 1955 and current day CPI indexes, this amounts roughly to around $3,250, which would be considered a relatively moderate success for an organization that was so unique, innovative and revolutionary for its time. The company saw tremendous growth over the next decade and grew to over 700 locations by the year 1965, throughout the United States, shortly before going international in the year 1967, expanding operations to Canada and Puerto Rico as test markets, owing to their proximity. As of today, based on 2015 data,Show MoreRelatedMcdonald s Corporation : The World s Largest Chain Of Fast Food Restaurants Essay1600 Words   |  7 PagesCorporation is the world’s largest chain of fast food restaurant, serving nearly 69 million customers daily through more than 36,538 restaurants in 119 countries worldwide (McDonald s, n.d.). McDonald’s is one of the most valuable brands, worth more than $25 billion. The business began in 1940, with a barbecue restaurant opened by brothers Dick and Mac McDonald in San Bernardino, California. The present corporation dates its founding to the opening of a franchised restaurant by Ray Kroc in Des PlainesRead MoreFast Food Industry : The World s Largest Restaurant Chain And Now Essay1661 Words   |  7 PagesBa Da Ba Ba Dah, I’m Lovin’ It – the fast food restaurant McDonald’s is the world’s largest restaurant chain and now they are expanding even further. Those iconic golden arches spr ead wide from large urban centers to rural towns. The global giant has sets its sites for further expansion into the country of India. McDonald’s Corporation understands the struggles of tapping into the India culture as each country presents its own unique sets of challenges that must be navigated in order for a new businessRead MoreCorporate Social Responsibility : Mcdonald s The World s Largest Chain Of Hamburger Fast Food Restaurants1014 Words   |  5 Pages Tiffany SFB1 McDonald’s is the world’s largest chain of hamburger fast food restaurants, serving around 68 million customers daily in 119 countries across 35,000 outlets. This company has joined the CSR program and be more socially responsible such as doing charity,promoting healthy eating and improving sporting opportunities in some local school. Some people believe that this attempt is beneficial for such a firm. Therefore, I partly agree with this statement. CSR (Corporate SocialRead MoreBurger King Is The Best Burger Chain1063 Words   |  5 Pageshamburger chain was born more than 100 years ago. Since then hundreds of burger chains have prospered; top competitors today are McDonald’s, Wendy’s, Burger King. And this argument discusses why Burger King is the best burger chain among those three. By stating straightforward, Mcdonald s share the most in the hamburger industry. However, Burger King is much better than McDonald s business wise, taste wise, and charity wise. Burger King was founded in 1954, and is the second largest hamburger chainRead MoreMcdonald s An Example Of A Service / Product Mix Essay1704 Words   |  7 Pagesare for example agriculture and construction. Both agriculture and construction results in the creation of some kind of tangible object. The service industry includes everything else, for example banking, hotels, airlines, insurance, education, restaurants, etc. A services dominated economy is characteristic of more developed countries than developing countries. Realistically the majority of services include some form of good and most goods include some form of service (the delivery of a good). ServicesRead MoreKfc Case Study1509 Words   |  7 PagesKentucky Fried Chicken is one of the well-known fast food restaurants in the world. The industry w as founded by Colonel Sanders. The corporation is based in Louisville, Kentucky and now regarded as the most famous chicken restaurant chain. It can be noted that each day, nearly eight million customers avails the products and foods offered by this fast food chain.   KFC has more than 11, 000 branches in more than 80 nations and territories all over the world. An in quite a few US cities, Kentucky FriedRead MoreMcdonald s Swot Analysis For Marketing Success1238 Words   |  5 Pagesand also through its logo design which is a huge yellow M. McDonalds also keep in mind the customers need and by looking at it, they decide what to serve, what will be the price of the product, how to advertise its product and the location of the restaurant. Which will be more convenient to the customers McDonalds also identifies different types of customer and their needs through social media or the market research. And according to it they decide what to produce. And also finds out that how theyRead MoreConsumer Attitudes to Western Fast Food Restaurants1112 Words   |  5 PagesConsumer attitudes to Western fast food restaurants 1. The introduction of the program. I am the manager of a restaurant, I plan to affiliate a western fast food restaurant. so, I have to investigate the attitudes toward western fast food restaurants in Xi an city. Among most western restaurants, the KFC, the McDonalds and the Pizzahut. Therefore, I decide to carry on the market survey. 2. The background and history of the three companies. KFC Corporation (KFC), founded and also known as KentuckyRead MoreFast Foods And Fast Food1649 Words   |  7 PagesFast food is popular because it s convenient, it s cheap, and it tastes good. But the real cost of eating fast food never appears on the menu, was said by Eric Schlosser. Several people in America have become dependent on fast foods. How many of the people who eat this food actually know what is really in the food or how it was made? Others don t think about it, because within ordering, three minutes later a customer can pull up to the window, pay, and get food. It is quick and cheap. The UnitedRead MorePizza Hut : The Largest Pizza Chain1576 Words   |  7 PagesExecutive Summary Pizza Hut is the largest pizza chain in the world, with over 13,000 units in more than 94 countries. Pizza Hut Canada has over 300 units from coast to coast, with two distinct restaurant builds to service dine-in and delivery channels. Pizza Hut is already established as a world leader in pizza, resulting in the trust and respect of consumers. The mission with this new franchise would be to further extend and build upon Pizza Hut’s good reputation, and there is plenty of confidence

Saturday, December 21, 2019

Langston Hughes The Weary Blues Analysis - 1256 Words

On Langston Hughes’s The Weary Blues Kevin Young, a graduate of Harvard University and one of the winners of the Guggenheim Fellowship, writes the historical perspective of Langston Hughes. He discusses the flowering of the African American literature and culture and how it is actually just the extension of the New Negro movement. From the Harlem Renaissance, Langston Hughes is able to represent â€Å"different things† for â€Å"different men.† The uprising of Hughes’s poems are the result of their hardships that many people of his time faced. â€Å"The black cultural ferment found from the teens to the nineteen twenties and beyond provided an opportunity to prove in culture things sometimes denied black folks in society-- namely, their humanity.† Young†¦show more content†¦Miller, Baxter R. â€Å"The Art and Language Hughes.† On The Weary Blues, The University Press of Kentucky, 1989, www.english.illinois.edu/maps/poets/g_l/hughes/weary.htm. What Langston Hughes Powerful Poem I, Too† Tells Us About America’s Past and Present David C. Ward, a writer for the Smithsonian and historian, writes the lens of the African American experience through the eyes of Langston Hughes’s poem â€Å"I, Too.† He states that this poem embodies that history at a particular point in the early 20th century when Jim Crow laws and other racial segregations were heavily influenced. From the build-up of lack of importance becomes a larger notice of the presence that Langston Hughes brings. Ward brings the title into play when referring to the secondary relationship that Hughes brings into play. â€Å"It suddenly shifts the terrain to someone who is secondary, subordinate, even, inferior.† David Ward States. The African American lens that Ward notices largely in Hughes’s writing is that he speaks for the second-class, also known as, the ones who are excluded. The multi-dimensional pun in the title are not only close and open the poem, but fill the drama the poem portrays for the struggle of the African A mericans. â€Å"From moving out of sight, eating in the kitchen, and then taking their place at the dining room table co-equal with the ‘company’ that is dining.† Ward includes the evolution of the message Hughes presents through his poem. Ward, David C. â€Å"What LangstonShow MoreRelatedAnalysis Of The Poem The Weary Blues Essay1299 Words   |  6 PagesThe Weary Blues is one of many Langston Hughes’s poetry during the Harlem Renaissance. The Harlem Renaissance is a time in American history, in the cities where African Americans were concentrated like Harlem, many master pieces of art, music and literature were created. Blues was much enjoyed during the period; people listened to it and loved it. In the poem of The Weary Blues, people alive through music, and the strong power of music supported the suffering of the black people in that time periodRead MoreReoccurring Themes in the Work of Langston Hughes Essay1649 Words   |  7 PagesLangston Hughes is an extremely successful and well known black writer who emerged from the Harlem Renaissance (â€Å"Langston Hughes† 792). He is recognized for his poetry and like many other writers from the Harlem Renaissance, lived most of his life outside of Harl em (â€Å"Langston Hughes† 792). His personal experiences and opinions inspire his writing intricately. Unlike other writers of his time, Hughes expresses his discontent with black oppression and focuses on the hardships of his people. Hughes’Read MoreThe Characteristics Of Jazz And Blues Langston Hughes s The Weary Blues 1521 Words   |  7 PagesThe Characteristics of Jazz and Blues in Langston Hughes’s The Weary Blues While I was reading Langston Hughes’s poems, I have noticed his outstanding accomplishment in his blending creation of Negro musical characteristics and poetry. And The Weary Blues is his peaked piece of a combination of both jazz and blues. The poem reflected American African’s living situation during the Harlem Renaissance, it sufficiently revealed the cultural charm of Negros and Hughes’s fully affirms of his national dignityRead MoreRhetorical Devices Of `` We Wear The Mask `` And `` Harlem ``885 Words   |  4 Pageswithout the use of them. Subsequently, Harlem Renaissance writers such as Paul Lawrence Dunbar and Langston Hughes employed the rhetorical devices of imagery, description and metaphorical allusion to convey the egregious realities of the black experience in the United States during the early twentieth century. In writings such as, â€Å"We Wear the Mask† by Paul Lawrence Dunbar and â€Å"Harlem† by Langston Hughes, the use of rheto rical devices gives each writer the ability to provide commentary on the socialRead MoreJames Mecer Langston Hughes: Literary Genius1763 Words   |  8 PagesJames Mercer Langston Hughes was born February 1, 1902 in Joplin, Missouri. James Hughes and Carrie Langston are Hughes’ parents. They later divorced when Hughes was young. After his parents divorced he went to live with his grandmother until he turned thirteen years old. At thirteen years old he moved to Lincoln, Illinois. After living in Illinois he later moved to Cleveland, Ohio to live with his mother. When he moved to Cleveland he started writing poetry (â€Å"James Mercer†¦Ã¢â‚¬  par. 2). Langston had manyRead MoreLangston Hughes ´ Memories in His Poems Essay834 Words   |  4 PagesHarlem Renaissance, Langston Hughes was an inspirational poet who highlighted many aspects of the urban life of African-Americans through reflections of his own life and experiences. As a writer, a poet and a prominent activist of the civil rights movement, Langston Hughes was a man that was not only inspired by the world around him but used such inspiration to motivate others. Being that he was also one of the most influential writers during the Harlem Renaissance, Hughes held poetry demonstrationsRead MoreAnalysis Of Langston Hughes s Poem I, Too978 Words   |  4 Pages Langston Hughes America, the ideals of freedom, equality, and opportunity traditionally held to be available to every American. This is what everyone was told, what the Declaration of Independence states. But, Langston Hughes a black American poet in the Harlem Renaissance period saw the truth. Being an African American in the United States during the early 1900’s was difficult. Many lived a life full of hardships; segregation, prejudice and economic hardships, viewed as second-class citizensRead MoreJames Langston Hughes And Countee Cullen934 Words   |  4 Pages James Langston Hughes and Countee Cullen were prominent poets. These poets were at the time of the Harlem Renaissance during the 20th century. Hughes and Cullen wrote for others to understand the stories of African-Americans living in the United State. These men had differences in their writing, but one mutual objective. James Langston Hughes was born in Joplin, Missouri on February 1, 1902. Hughes began writing poetry when he lived in Lincoln, Illinois. The Weary Blues was his first book of poetryRead MorePoem Analysis : Langston Hughes Poem1258 Words   |  6 Pages Research Paper and Poem Analysis: Langston Hughes Poem Analysis: Langston Hughes’ poem â€Å"Mother To Son† is a twenty line poem that seems to be from the perspective of a prudent mother that is giving her son, and possibly the readers, some helpful and supportive advice, telling them that, no matter how many adversities they may face, they can not give up. I believe that this is the main theme of the poem, perseverance. â€Å"So, boy, don’t you turn back./ Don’t you set down on the steps./ ‘Cause youRead MoreLangston Hughes : A Modernist1222 Words   |  5 PagesSappington 13 Apr. 2017 Langston Hughes: A Modernist Credited as being the most recognizable figure of the Harlem Renaissance, Langston Hughes played a vital role in the Modernist literary movement and the movement to revitalize African American culture in the early 20th century. Hughes’s poems reflect his personal struggle and the collective struggle of African Americans during this cultural revival. Langston Hughes’s life contained key influences on his work. As a child, Hughes witnessed a divorce

Friday, December 13, 2019

Kalimunda Hakim Internship Report 2012 Free Essays

string(54) " routing in electronic data networks using packet II\." 1 INTERNSHIP REPORT MTN RWANDA PO BOX 264 BY Kalimunda Hakim Student At RTUC Bachelor In Business Information Technologies _____________________ SUPERVISED BY Aymard Mbonabucya Information Network Security Administrator _____________________ FROM 26 November, 2012 TO 15 January, 2013 INTERNSHIP REPORT 2 ACKNOWLEDGEMENT I am deeply intended to almighty God who has protected me through the whole period of internship. My special thanks are addressed to the MTN RWANDA administration for giving me such opportunity of passing an internship in their company, My sincere acknowledgement go to the Human resource Director Merry Assimwe for their acceptance of my intern . Thank you for all. We will write a custom essay sample on Kalimunda Hakim Internship Report 2012 or any similar topic only for you Order Now I am grateful to my Supervisor Aymard MBONABUCYA for being a best man I have ever known and his modesty, encouragement and understanding s on all my daily questions and answer it because of his spiritual and technical support; I used to became free to ask any question regarding network because he is very good at networking, may thanks be given to him. I finally thank all MTN staff in technology department for their good collaboration during this very important internship. INTERNSHIP REPORT 3 PREFACE The purpose of this report is to fulfill the internship requirement for the Bachelor degree in Business Information Technology program at Rwanda Tourism University College ; to till 15 January, 2013) with a private organizations in Rwanda called MTN RWANDA. successes and short. explain what I did achieved and learned during my internship period (26 November, 2012 The report focuses primarily on intern’s duties and responsibilities, internship results, its INTERNSHIP REPORT 4 About MTN Rwanda MTN is a global communications company and world-class cellular network. empowerment. As a major communications company, MTN is specifically focused on the Africa and the Middle East. We believe that through access to communication comes economic Serving you since 1998, MTN Rwanda continues to expand its network, offer new and innovative packages and services and keep up with the latest trends in communications while maintaining affordability. MTN Mobile Money has transacted over US$36 million Bulk Payment Services. MTN Rwanda has over 2. 9 million subscribers and its network coverage extends to over 98% of the population. ince its launch in 2010. The payment platform is now offering Cash Power Top-up and INTERNSHIP REPORT 5 ACKNOWLEDGEMENT PREFACE. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 BACKGROUND OF COMPANY. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 CHAPTER I. INTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. 1. OVERVIEW OF SWITCHING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. II. 1. OVERVIEW OF ROUTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. II. 2. CONCEPTS OF ROUTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ?II. 2. CONCEPTS OF SWITCHING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. TABLE OF CONTENTS TABLE OF CONTENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦3 CHAPTER II. PRESENATION ON SWITCHING AND ROUTING CONCEPTS AND CONFIG URATION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. 3. SOME CONFIGURATION OF SWITCHING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. II. II. 3. SOME CONFIGURATION OF ROUTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. III. NETWORK LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. III. 2. CISCO HIERARCHIAL LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. III. 3. CORE LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. III. 4. DISTRIBUTION LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. III. 5. ACCESS LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. III. 1. OVERVIEW OF NETWORK LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. IV. NETWORK DESIGN CONCEPT †¦. II. IV. 1. THEORIES ON NETWORK DESIGN†¦Ã¢â‚¬ ¦ II. IV. 4 SWITCH PASSWORD RECOVERY II. IV. 2. OVERVIEW ON VIRTUAL LOCAL AREA NETWORK (VLAN) II. IV. 5. FIREWALL PASSWORD RECOVERY II. IV. 3. ROUTER PASSWORD RECOVERY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. INTERNSHIP REPORT 6 INTERNSHIP REPORT 7 Chapter 2. Presentation on switching, routing concepts and configuration II. 1. OVERVIEW OF SWITCH What is switching? Networking concept has two basic concepts and they are Switching and Routing . They using one of these methods. are fundamental concepts in Networking ,other topics like network security are based on these concept. Routing and Switching are the base packet or data delivering methods in When we are talking about the switching ,the protocols and concepts are related to the layer 2 and data packets with in this layer that are called frame . re bigger and bigger and also more expensive. 10base5, 10base-T for cabling were used . . Better switches have more choices than 2 condition and because of this capacity, they In Networking there is a long history for switches. At first time the direct connection network and each device like router , switch , hub , firewall , proxy , cash server, modem are As you know the switch refers to the de vice that can select one condition from 2 or more conditions . For example an electrical switch can select 0 as turn off and select 1 for turn on between to or more computer used to make a network and such technology like 10base2, In those technologies , the base topology was BUS Technology and the most advanced of more devices for sending and receiving data , and when a device wants to send data for figure below we can see a logical view to a hub and the meaning of bus . II. 2. CONCEPTS OF SWITCHING this technology is HUB. A bus or data bus refers to the one link(shared link) between 2 or another device ,this bus should be empty and none of devices should not use the bus . In INTERNSHIP REPORT FIGURE 1: SWITCH II. 3. SOME CONFIGURATION OF SWITCHING Command switch? switchenable switch# switch#disable switchexit switch#show version switch#show flash: switch#show mac-addresstable switch#show running-config switch#show startup-config switch#show vlan switch#show interfaces switch#show interface vlan1 descriptions The ? works here the same as in a r outer Used to get the list of all available commands User mode, same as a router Privileged mode Leaves privileged mode Leaves user mode Displays information about software and hardware. Displays information about flash memory (will work only for the 2900/2950 series). Displays the current MAC address forwarding table . Displays the current configuration in DRAM. Displays the current configuration in NVRAM. Displays the current VLAN configuration. Displays the interface configuration and status of line: up/up, up/down, admin down. Displays setting of virtual interface VLAN 1, the default VLAN on the switch. INTERNSHIP REPORT 9 II. II. 1. OVERVIEW OF ROUTING is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (circuit switching technology. Routers switching), electronic data networks (such as the Internet), and transportation networks. This article is concerned primarily with routing in electronic data networks using packet II. You read "Kalimunda Hakim Internship Report 2012" in category "Papers" II. 2. CONCEPTS OF ROUTING Whereas switches and bridges operate at OSI Layer 2 (the data link layer), routers primarily operate at OSI Layer 3 (the network layer). Like bridging, make the forwarding decisions. Routers make decisions based on network layer protocols such as Internet Protocol (IP) and Novell NetWare Internetwork Packet Exchange (IPX). growing beyond the capability of bridges. Before this popularity, networ he primary act of routing involves moving packets across a network from a source to a destination. The difference involves the information that is used to Routing gained popularity in the mid- to late 1980s as a result of internetworks Figure 2: Image of Router II. II. 3. SOME CONFIGURATION OF ROUTING modes, and the resulting prompts. The prompt helps you identify which mode you are in and, therefore, which commands are available to you: Mode of Operation Usage Mode How to Enter the Prompt The following table describes some of the most commonly used modes, how to enter the INTERNSHIP REPORT 10 User EXEC Change terminal settings on a temporary basis, perform basic tests, and list system information. First level accessed. Router Privileged EXEC Global Config System administration, set operating parameters. Modify configuration that affect the system as a whole. Modify the operation of an interface. Create the initial configuration. From user EXEC mode, enter enable password command Interface Config Setup From privileged EXEC, enter configure terminal. From global mode, enter interface type number. Router# Router(config)# Router(config-if)# Prompted dialog From privileged EXEC mode, enter command setup. User EXEC Mode: When you are connected to the router, you are started in user EXEC mode. The user EXEC commands are a subset of the privileged EXEC commands. Privileged EXEC Mode: Privileged commands include the following: †¢ Configure – Changes the software configuration. Enter the command disable to exit from the privileged EXEC mode and return to user EXEC mode. †¢ Debug – Display process and hardware event messages. †¢ Setup – Enter configuration information at the prompts. INTERNSHIP REPORT 11 Configuration Mode Configuration mode has a set of submodes that you use for modifying interface settings, routing protocol settings, line settings, and so forth. Use caution with configuration mode because all changes you enter take effect immediately. Note: To enter configuration mode, enter the command configure terminal and exit by pressing Ctrl-Z. Almost every configuration command also has a no form. In general, use the no form to disable a feature or function. Use the command without the keyword no to re-enable a disabled feature or to enable a feature that is disabled by default. For example, IP routing is enabled by default. To disable IP routing, enter the no ip routing command and enter ip routing to re-enable it. INTERNSHIP REPORT 12 Getting Help In any command mode, you can get a list of available commands by entering a question mark (? ). To obtain a list of commands that begin with a particular character sequence, type in those characters followed immediately by the question mark (? ). Router#co? configure connect copy Router? To list keywords or arguments, enter a question mark in place of a keyword or argument. Include a space before the question mark. Router#configure ? memory Configure from NV memory network Configure from a TFTP network host terminal Configure from the terminal You can also abbreviate commands and keywords by entering just enough characters to make the command unique from other commands. For example, you can abbreviate the show command to sh. INTERNSHIP REPORT 13 Configuration Files Any time you make changes to the router configuration, you must save the changes to memory because if you do not they will be lost if there is a system reload or power outage. There are two types of configuration files: the running (current operating) configuration and the startup configuration. Use the following privileged mode commands to work with configuration files. show running-config – display the running configuration. †¢ show startup-config – display the startup configuration. †¢ configure terminal – modify the running configuration manually from the terminal. †¢ copy running-config startup-config – copy the running configuration to the startup configuration. †¢ copy startup-config running-config – copy the startup configuration to the running configuration. †¢ erase startup-config – erase the startup-configuration in NVRAM. †¢ copy tftp running-config – load a configuration file stored on a Trivial File Transfer Protocol (TFTP) server into the running configuration. copy running-config tftp – store the running configuration on a TFTP server. INTERNSHIP REPORT 14 IP Address Configuration Take the following steps to configure the IP address of an interface. Step 1: Enter privileged EXEC mode: Routerenable password Router#config terminal Example: Example, Step 2: Enter the configure terminal command to enter global configuration mode. Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for Cisco 2500 series) to enter the interface configuration mode. Step 4: Enter the IP address and subnet mask of the interface using the ip address ipaddress subnetmask command. Step 5: Exit the configuration mode by pressing Ctrl-Z Router(config-if)#[Ctrl-Z Router (config-if)#ip address 192. 168. 10. 1 255. 255. 255. 0 Router (config)#interface ethernet 0/1 II. III. NETWORK LAYER II. III. 1. OVERVIEW OF NETWORK LAYER INTERNSHIP REPORT II. III. 2. CISCO HIERARCHIAL LAYER 15 Hierarchy has many of the same benefits in network design that it does in other areas of life. When used properly, it makes networks more predictable. It helps us define at which levels of hierarchy we should perform certain functions. Likewise, you can use tools such as access lists at certain levels in hierarchical networks and avoid them at others. large networks can be extremely complicated, with multiple protocols, detailed configurations, and diverse technologies. Hierarchy helps us summarize a complex collection of details into an understandable model. Then, as specific configurations are needed, the model dictates the appropriate manner to apply them. The Cisco hierarchical model can help you design, implement, and maintain a scalable, reliable, cost-effective hierarchical internetwork. The following are the three layers: ? ? ? FIGURE 3 : CISCONHIERARCHIAL Each layer has specific responsibilities. However, that the three layers are logical and are not necessarily physical devices. Consider the OSI model, another logical hierarchy. The seven layers describe functions but not necessarily protocols. Now, let’s take a closer look at each of the layers. II. III. 3. CORE LAYER the core layer is responsible for transporting large amounts of data quickly The Core layer or Backbone The Distribution layer The Access layer and reliably. The designer must ensure that the core layer is designed with fault tolerance, especially because all users in the network can be affected by a failure. The ability to avoid unnecessary delays INTERNSHIP REPORT in network traffic quickly becomes a top priority for the network designer. What Happens at the Core Layer? 16 The core layer is sometimes called the network backbone. Routers and switches at the core layer provide high-speed connectivity. In an enterprise LAN, the core layer, shown in Figure 1-7, may connect multiple buildings or multiple sites, and may provide connectivity to the server farm. Goals of the Core Layer The core layer design enables the efficient, high-speed transfer of data between one section of the network and another. The primary design goals at the core layer are as follows: – Provide 100% uptime. -Maximize throughput. -Facilitate network growth. Core Layer Technologies Technologies used at the core layer include the following: – Routers or multilayer switches that combine routing and switching in the same device -Redundancy and load balancing – High-speed and aggregate links II. III. 4. DISTRIBUTION LAYER The distribution layer is sometimes referred to as the workgroup layer and is the major communication point between the access layer and the core. The primary function of the distribution layer is to provide routing, filtering, and WAN access and to determine how packets can access the core, if needed. The distribution layer must determine the fastest way that network service requests are handled; for example, how a file request is forwarded to a server. After the distribution layer determines the best path, it forwards the request to the core layer. The core layer then quickly transports the request to the correct service. II. III. 5. ACCESS LAYER The access layer controls user and workgroup access to internetwork resources. The access layer is sometimes referred to as the desktop layer. The network resources most users need will be available locally. The distribution layer handles any traffic for remote services. INTERNSHIP REPORT The following are some of the functions to be included at the access layer: ? ? ? 17 Technologies such as DDR and Ethernet switching are frequently seen in the access layer. Static routing is seen here as well. As already noted, three separate levels does not imply three separate routers. It could be fewer, or it could be more. Remember, this is a layered approach. II. IV. NETWORK DESIGN CONCEPT My second part of my internship dealt with network design concept. In this I have been able to read different theories of network design from eBooks downloaded from the internet, doing exercises on subnetting, VLSM and VLANs and finally I had opportunity to do some practices on network documentation and laboratories on virtual LAN. II. IV. 1. THEORIES ON NETWORK DESIGN Designing a network for a better performance of data access and resource sharing of any institution is an extremely important thing to consider. I learned different concept of designing a network whether by reading eBooks or discussing it with my supervisor. A good network design is composed of four parts in general: Continued access control and policies Creation of separate collision domains Workgroup connectivity into the distribution layer through layer 2 switching Identification of customer’s needs and goals: In this part you deal with identifying business goals and technical requirements which include the task of characterizing the existing network, analysis of the network traffic. Logical network design: Here, it’s all about developing a network topology. During this phase, you devise a network layer addressing model, and selects switching and routing protocols. It also includes security planning, network management design. Finally you make a study of the service provider on how he can meet your WAN and remote access requirements Physical network design: The physical design phase deals with specific technologies and products to realize the logical design. It starts with the selection of technologies and devices for campus networks that includes cabling, Ethernet switches, wireless access points, wireless bridges, and routers. There is also a selection of technologies and devices for remote-access and WAN needs. INTERNSHIP REPORT Testing, Optimizing and Documentation: The final step is to write and implement a test plan, build a prototype or pilot, optimize the network design, and document your work with a network design proposal. If your test results indicate any performance problems, then during this phase you have to update your design to include such optimization features. 18 In all this different network design steps, I have been able to do some practices on logical network design where I did exercises on subnetting, VLAN as network management requires it. II. IV. 2. OVERVIEW VIRTUAL LOCAL AREA NETWORK (VLAN) Definition A VLAN (Virtual Local Network) is a logically separate IP subnetwork. VLANs allow multiple IP networks and subnets to exist on the same-switched network. A VLAN is a logical broadcast domain that can span multiple physical LAN segments. It allows an administrator to group together stations by logical function. A VLAN has three major functions: i. Limits the size of broadcast domains ii. Improves network performance ii. Provides a level of security Security – Security of sensitive data are separated from the rest of the network, decreasing the chances of confidential information breaches. Advantages of VLAN: Higher performance – Division of Layer 2 networks into multiple logical workgroups (broadcast domains) reduces unnecessary traffic on the network and boosts performance. Cost reduction – Cost savings result from less need for expensive network upgrades and more on this network. Types of VLAN There are different types of VLANs. The type of network traffic they carry defines a particular type of VLAN and others INTERNSHIP REPORT 9 names due to the type or a specific function the VLAN performs. The following describes common VLAN: Default VLAN At the initial boot up of the switch, All switch ports become a member of the default VLAN, which makes them all part of the same broadcast domain. This allows any network device connected to any of the switch port to communicate with other devices on other switch po rts. On Cisco switches the default VLAN is VLAN 1. VLAN 1 has all the features of any VLAN, except that you cannot rename or delete it. Data VLAN A data VLAN that can also be referred to as user VLAN. This is configured to carry only usergenerated traffic. The importance of separating user data from other type of VLAN is proper switch management and control. Native VLAN A native VLAN is assigned to trunk port. An trunk port supports traffic coming from many VLANs as well as traffic that do not come from a VLAN. The trunk port places untagged traffic (traffic that does not come from a VLAN) on the native VLAN. In summary, the native VLAN observes and identifies traffic coming from each end of a trunk link. Management VLAN A management VLAN is any VLAN you configure to access the management capabilities of a switch. Your configured management VLAN is to be assign with an IP address and subnet mask. Any of a switch VLAN could be configured as the management VLAN if you has not configured or define a unique VLAN to serve as the management VLAN. In some cases, a network administrator proactively defines VLAN 1 as the management VLAN; this enables a loophole for an unauthorized connection to a switch. Voice VLAN Voice VLAN is configured to carry voice traffic. Voice VLANs are mostly given transmission priority over other types of network traffic. Communication over the network is not complete without phone calls. More calls are made over the network than other forms of a message transmission. Sending emails and text messages are also forms of inter-relations but listening to a real voice provides legitimacy and assurance. SOME EXAMPLE OF VLAN INTERNSHIP REPORT There I was design a network that are composed with 1 router ,2 switch ,6machine. 20 And each switch have 3 computer . one switch to three machine . on the network we have default vlan ,native vlan ,management vlan. Management vlan can control other machine on network. this network have the vlan and trunk . e have design it by using a outils that called packet tracer FIGURE 4: DESIGN OF A NETWORK Example of same machine i ping Machine ip 196. 168. 40. 105 are pinging a switch3 ip address 196. 168. 40. 106 INTERNSHIP REPORT 21 FIGURE 5 : Command Prompt INTERNSHIP REPORT 22 II. IV. 3. ROUTER PASSWORD RECOVERY 1. Connect the router to the PC using a console cable/port. 2. Open an emulation software (Hyper Terminal or Terra Term or Secure C RT, Putty) + setup (Com port and bits=9600, etc. ) 3. Switch on the router HOLDING DOWN CTRL + BREAK (keys) a. The router will boot and display the ROMMON prompt (Rommon;) 4. Type the CONFREG command to view current status 5. Change the configuration register (this is a hexadecimal number that tells the IOS where to fetch the configuration file. 0x142 bypasses the NVRAM contents, 0x2102 gets the configuration file from the NVRAM) a. Rommon;confreg 0x142 b. Reset (reboot i. e. power-cycle the router) The router will boot in normal but asking for a new configuration. 6. Router; (after saying NO to the configuration wizard) 7. Go to privilege mode (enable) and copy the startup-config to the running-config (Router#copy startup-config running-config). This will load the configuration with an unkown password back to RAM). 8. As you are already in privilege, the unkown password won’t prevent you from changing the configuration. You can now change the privilege password (LAB#config t ; LAB(config)#enable secret cisco). Also change the console and vty passwords. 9. Change the configuration register back to 0x2102 (LAB(config)# config-register 0x2102) then reload (in privilege mode). 10. Save your configuration. (LAB#copy running-config startup-config or write memory ~ wr) INTERNSHIP REPORT How to cite Kalimunda Hakim Internship Report 2012, Papers

Thursday, December 5, 2019

CR & Ethics Public Policies

Question: Discuss about the CR Ethics for Public Policies. Answer: Introduction The purpose of this report is to make sure that there is a proper understanding of Corporate Social Responsibility and Ethics. Moreover to have an understanding in terms of how Corporate Social Responsibility has come up. The scope of this reports deals with the literature review of CSR as a concept and also with the company which is quite involved in these sorts of practices which is Nike. Nike which has been one of those companies which have never looked at the finish line but have always tried to give their best shot to win and even come back stronger with more strength. With so many of their initiatives at a very early time of CSR coming up- they had the advent of new labor practices and sustainable development which was a concept that gained popularity. (Tebo, 2005) It somehow became necessary for Nike to cope up with the same as the kind of issues which Nike had to deal before it was not good for their corporate image. Thus from 1998 to 2013- they have made sure that they are treading on the path which is making their products helping the nature to sustain and even employees being their most important resource. (Utting, 2005) Defining CSR CSR is the continuous commitment of the business in order to behave ethically and contribute to the development of the country economically while improving the quality of life of the labor and their families at large even. (Van et. al, 2007) CSR has been one such term which has revolutionized how the companies now do activities for the society. The practice of this responsibility has benefited many who are in need of such initiatives by the companies. Reputation Institute, the world's leading research and advisory firm which even measures that how is CSR done and how they can do it better. They not only provide the companys top level- the ways to communicate their activities in a better manner. They also make sure that they analyze risks and a lot more while serving more than 400 companies. Case for CSR Here we are definitely talking about- why CSR? What is the need of CSR by big companies when there might be many agencies that are doing the same? But CSR is quite important- no doubt about that. Some programmes and practices which can actually make the employment do a great thing in terms of attracting best of the talents. Moreover the case for CSR can even be in favor of the society from which the companies have taken a lot and they need to provide them back. Also if we talk about the cost management, CSR activities not only make sure that the companies have a control on the amount of carbon dioxide in the environment but also preventing the society from getting dirtier and polluted. Ethics which is the main part even retains the employees and even attracts new ones because they can be rest assured in terms of in what kind of company they are working and lots more. (Black et. al. 2003) Case against CSR Organizations cant really help it if they dont have an effective sustainable performance. In the times where the organizations should be looking in order to perform well in terms of financial stability, these CSR programmes actually detract them in order to perform well enough in terms of financial and economic front. The organizations should actually be performing well in terms of having their employees a great deal of incentives and helping them grow a lot. Also to make sure that these programmes help them have stability in terms of their own performance which have a good impact on their employees. Out of these CSR programmes they need to actually see that it is impacting their own organization first and then the society because if the company forgets its own survival then there will be no one to look after these sorts of responsibilities. Nikes CSR Initiatives From Nike's prior days just they have this Fair Labor Association (FLA) which helps the representatives and work to work in great condition. From this affiliation getting shaped there was a colossal change and prompt improvement of work conditions everywhere throughout the globe. (Waddell, 2007) This was not it, Nike even moved to having implicit rules for its production lines with observing manufacturing plants and gathering information for environment and work. (Doorey, 2011) They have been keeping up with their Corporate Responsibility (CR) process which was only reclassifying its position on supportability for the advancement of the considerable number of partners included. They even centered on numerous changes in their supply chains which will make sure that the work which they are doing is making the ecological balance stable. With this they had an approach of ensuring that they are working while tending to the worldwide patterns of rising populace; diminish in nature of environment around us. They have been able to change the supply change management completely in which they are the biggest pioneers. (Berkhout, 2005) Moving the Corporate Responsibility (CR) group to the cutting edge in corporate basic leadership prepare and even they created files which were material to all the agreement makes and on themselves even. This ensures the organization is being real as far as how they are being maintainable and have been working towards the manageable practices. In 2013, when Nike could have become the target of so many activists they were enjoying a safe position because they understood that why is there a need of such practices and a lot more. Also with the kind of indexes they had developed, it helped them a lot in terms of maintaining their standards and a lot more. This has been even including creating a great number of livelihood opportunities. Also for the stakeholders even they have a separate focus all together and the company has even decided to focus on their consultation and have activities where the maximum amount of value can be generated. The following are the focus areas: Nutrition: There is a large part of the population which is totally malnutrition and is not getting the desired information regarding the amount of nutrition. Nike has been focusing on the problem of malnutrition of school children. Water and Sanitation: the Company is even focusing on reducing water usage in agriculture, raising awareness on conservation of water. (Albareda, et. al 2007) Nike have always made sure that the labor is working as per Industry standards- Nike which helped to form FLA- a non- profit which makes sure that there are universal regulations for labors. Even though Nike and Adidas both worked for this but somehow Nike only emerged as one of the pioneers and carried with this kind of practice. Nike has been evolving labour practices which can even help them to get a great amount of wage rates and good working conditions- this all deals with great labor practices. Global RepTrak 100 has been ranking Nike at the 13th position time and again and also if we analyze that how Nike has been performing from past years- thus their profits have been reaching heights and the kind of CSR initiatives they have been taking is beyond doubt amazing. With not only helping in decreasing the environment footprint which indirectly helps them decrease the cost but also helps them do a lot more than achieving a great sense of financial stability. Concentrating on vitality, science, water and waste, we dive deep into the store network to comprehend our effects and recognize techniques to utilize less, utilize better and utilize once more. They have been taking in account a lot of issues which they can change in order to help the environment more and making sure that they have a lot of impacts on the society as their philosophy says. They have been growing with their tag line of just do it and they have been doing it since they understood that how much ethics and CSR can make a difference in the image of the company and even in the society. Thus by making this sure they have been doing a great deal of change management in the environment by not only taking care of their employees but also adding value in the environment by being environmentally friendly and a lot more. The company is doing great in their financial figures and has never left the sheer practice of CSR by incorporating ethics since 1990s. Thus is the way a company can do wonders if they wish too. Conclusion Furthermore, accordingly there has to be proper legitimate controlling standards which look after the kind of association to develop the CSR and its initiatives. Nike has been one of the pioneers who have been doing so much of CSR activities when this initiative didnt even break out. Moreover the kind of the philosophies which have been there in order to make sure that there is a great sense of development, and then there can be a lot of development in the world. Along these lines there can be various methodologies by which they can keep up in their abilities like masterminding the procedure, guaranteeing that the gathering is sensible and true blue progression course of action. Additionally there can be various sorts of facilitated strategy which the pioneer truly encounters when the affiliation is in danger. Thusly in Nike we can continue with an awesome arrangement integrative approach while making power capacities of the affiliation. Subsequently in the report, over each and every, various strategy which can be taken to develop your pioneer and considerably more is there which can be associated in the affiliation I have picked. References Albareda, L., Lozano, J. M., Ysa, T. 2007. Public policies on corporate social responsibility: The role of governments in Europe. Journal of Business Ethics, 74, 391407. Bendell, J. 2005. In whose name? The accountability of corporate social responsibility. Development in Practice, 15(3-4), 362374. Berkhout, T. 2005. Corporate gains: Corporate social responsibility can be the strategic engine for long-term corporate profits and responsible social development. Alternatives Journal, 31(1), 1518. Black, L. D., Hartel, C. E. J. 2003. The five capabilities of socially responsible companies. The Journal of Public Affairs, 4, 125144. Doorey, D. 2011. The Transparent Supply Chain: From Resistance to Implementation at Nike and Levi-Strauss. InJournal of Business Ethics(4th ed., Vol. 103, pp. 587603). Springer. Waddell, S. 2007. Realizing global change: Developing the tools; building the infrastructure. Journal of Corporate Citizenship, 26, 6984. Van Kleef, J. A. G., Roome, N. 2007. Developing capabilities and competence for sustainable business management as innovation: A research agenda. Journal of leaner Production, 15, 3851 Utting, P. 2005. Corporate responsibility and the movement of business. Development in Practice, 14(34), 375388. Tebo, P. V. 2005. Building business value through sustainable growth. Research Technology Management, 48(5), 2832.