Pages

Total Pageviews

Wednesday, December 25, 2019

GENERAL ANTHROPOLOGY - "Last of the Neanderthals" by Stephen Hall

Summarize



ANT 101 - 001
12/11/2019
Last of the Neanderthals
This article "Last of the Neanderthals" was written by Stephan Hall. The general summary of
this article includes information, comments and analyzes on the Neanderthals, where they came from, how they led their lives, ways of life, eating habits, social interactions among themselves, and how they disappeared. In March 1994 the remains of neanderthals were found in northern Spain. When these remains were first discovered, it was thought that there were people who were killed in the past by those who ruled the dictatorial regime. However, as a result of the examination of the remains at the Institute of Pathology, it was found that these remains were bones dating back 43,000 years.
The closest relatives of modern-day people are claimed to be Neanderthals by scientists. The regions where Neanderthals remains are found in Europe are generally found to be places where climatic conditions are not difficult. According to this result, Neanderthals seem to move according to climatic conditions. A detailed examination of the remains of the Neanderthals revealed that there were signs of nutritional stress in the bones. In addition, there are deep traces showing that it was made with stone tools on the bones. This means that they are fed from each other. In other words, it shows that they were inadequate in finding food sources before they died. In addition, as a result of the investigations, it was understood that the archaeological discoveries that they shared a period of 45.000 and 30.000 years with the great modern human migrants in Africa.
In the debates in the world of science, the question of which of these two species originated from today's people. However, as a result of DNA analysis made between modern human immigrants from Africa and Neanderthals, geographical and evolutionary results have been obtained with different ancestors. This has caused tremendous confusion. Then how did the Neanderthals disappear? What is the origin of modern man today? It has raised many questions like this. Moreover, the possibility of these two species being intertwined has disappeared. Because Neanderthals leave mitochondrial DNA traces is extremely rare. According to this conclusion is the fact that African modern human migrants and Neanderthals are two completely different species. However, since these two species live in the same region, it may have led to the possibility of reproduction from each other. Who knows, perhaps we are a new species that emerges from the mating of these two species. As a result of the investigations on the Neanderthals remains, it was understood that they have the ability to voice similar to today's people based on genetic findings.
Neanderthals and modern human DNA have been found to be more similar and closer than chimpanzee DNA. As a result of the investigations, scientists claimed that the DNA of Neanderthals and the DNA of Modern human beings are very close to each other. However, it is explained that the differences in the small percentage in the DNA sequence began to be separated 700,000 years ago. According to research on how the Neanderthals suddenly disappeared, it was about whether they reached maturity at an early age. It is thought that if they did, they might have effects on brain development and thus they might have disappeared. Therefore, dental examinations were made about the evolution of Neanderthals. Little is known about their environmental impact and their lives on their teeth. It is understood that a more detailed analysis is needed for further information.
Neanderthals understood that women, children always hunt prey. Neanderthal women are estimated to have a strong and flexible structure. Neanderthals were found to need more calories in their bodies during cold climates. Some scientists claim that the Neanderthals disappeared due to harsh climate consequences. This possibility seems possible. There is the reality that climatic disasters have been experienced in the past centuries. However, as the result of the sudden disappearance of the Neanderthals in the regions they live in, it is thought that the immigrants of Africa took the place. As a result, the domination of a new species and the new world order began.

                                                           Written by Erdogan Akbiyik







Tuesday, December 24, 2019

GENERAL ANTHROPOLOGY - "The Great Human Migration" by Guy Gugliotta

Topic: What are the differences between Neandertals and A.M.H.s.? What are the Multi-regional and Out of Africa models? Explain the DNA evidence. When did humans leave Africa? When did they arrive in Europe?


ANT 101 - 001
12/09/2019
The Great Human Migration
This article "The Great Human Migration" was written by Guy Gugliotta. In this article, it describes the migration of people from Africa to other places, the formation of different human species, the changing of the natural environment and the onset of human superiority on earth. Gugliotta claims that people migrated from the African continent some 80,000 years ago.

Gugliotta talks about the differences between Neandertals and Modern Homo Sapiens. Gugliotta mentions that the skulls of Neandertals and A.M.H.S. are different from each other. He also mentions that their weapons and tools are very different. Neanderthals also mention that they buried their dead, made ornaments and drew cave paintings. In the 20th century, two hypotheses were put forward in the study of human roots. The first is that a human ancestor species is scattered all over the world and that modern man evolved from this species. The non-African theory is that the human ancestor species evolved in the region they lived before migrating out of Africa. DNA studies of people have been done. Scientists show that a shorter DNA strand found in mitochondria is hereditary only from the mother. Scientists say that every human being studied from about 200,000 years to the present day has seen hereditary source of the same woman. This is the woman today called "Eve". However, scientists call it our last common ancestor.
Gugliotta claims that migration to Europe is between 35,000 and 40,000 years. There are chapters in human history that have too many gaps. It's really hard for us to know exactly what these are. However, no matter how many discoveries and investigations have been made about the division of humans into species and sections, it is probably the only thing that seems to be that we all come from Africa.

                                                   Written by Erdogan Akbiyik




Monday, December 23, 2019

GENERAL ANTHROPOLOGY - "Cooking Up Bigger Brains" by Rachael Gorman

Topic: According to Wrangham, what was the importance of cooking food? How does it change the nutritional value of food? How did cooking potentially influence the evolution of the brain? Are there any challenges to this idea?



ANT 101 - 001
12/06/2019
Cooking Up Bigger Brains
The article "Cooking Up Bigger Brains" written by Rachael Gorman. Harvard University biology anthropologist Richard Wrangham claims that our ancestors do not always eat raw food. Wrangham researched the fruits that monkeys eat and the same fruits that people can survive. However, his conclusion is that people cannot have enough calories and body fitness by eating only fruits. Wrangham claimed that it was impossible to live like this for a long time. That is why Wrangham believed that people should eat cooked food. Because Wrangham says that high calorie and energy needs can only be achieved with cooked food. In addition, cooked food leads to bigger bodies and brains.

Wrangham began research in this direction. First, Wrangham began to investigate our ancestors in the past. Wrangham understood that Homo Erectus's tooth structures and brain structures had a brain and smaller teeth that were 50% larger than the homo habilis, the previous humanoid species. Wrangham did not find a clue that researches of past people eat raw meat. Wrangham concluded that our ancestors' body was more suitable for cooked meat. Because cooked meat provides very high calories. Raw meat does not provide this high calorie. When Wrangham examined the species of wood found in the remains of a homo erectus dating back 1.6 million years, he found evidence of burned wood.
Wrangham claims that even if the scientific world has not been able to accept this, homo erectus are fed with cooked meat as a result of examination of the body structures and organs. Perhaps it is a homo erectus that has eaten the burnt parts of a flaming tree as a result of a lightning strike. However, according to Wrangham, he believes that homo erectus feeds on cooked food. But, when this is proved in the scientific world, it will show that humanity has cooked and eaten even a long time ago.

                                                    Written by Erdogan Akbiyik

Sunday, December 15, 2019

Introduction to Network - Course 17

11.3.4.6 Lab - Using the CLI to Gather Network Device Information


Lab – Using the CLI to Gather Network Device Information
Topology
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/1
192.168.1.1
255.255.255.0
N/A
Lo0
209.165.200.225
255.255.255.224
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Set Up Topology and Initialize Devices
Part 2: Configure Devices and Verify Connectivity
Part 3: Gather Network Device Information
Background / Scenario
Documenting a working network is one of the most important tasks a network professional can perform. Having proper documentation of IP addresses, model numbers, IOS versions, ports used, and testing security, can go a long way in helping to troubleshoot a network.
In this lab, you will build a small network, configure the devices, add some basic security, and then document the configurations by issuing various commands on the router, switch and PC to gather your information.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you are unsure, contact your instructor.
Required Resources
·         1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
·         1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
·         1 PC (Windows 7 or 8 with terminal emulation program, such as Tera Term)
·         Console cables to configure the Cisco IOS devices via the console ports
·         Ethernet cables as shown in the topology
Part 1:     Set Up the Topology and Initialize Devices
In Part 1, you will set up the network topology, clear any configurations if necessary, and configure basic settings on the router and switch.
Step 1:   Cable the network as shown in the topology.
a.     Attach the devices as shown in the topology and cable as necessary.
b.     Power on all devices in the topology.
Step 2:   Initialize and reload the router and the switch.
Part 2:     Configure Devices and Verify Connectivity
In Part 2, you will set up the network topology and configure basic settings on the router and switch. Refer to the topology and Addressing Table at the beginning of this lab for device names and address information.
Step 1:   Configure the IPv4 address for the PC.
Configure the IPv4 address, subnet mask, and default gateway address for PC-A based on the Addressing Table.
Step 2:   Configure the router.
a.     Console into the router and enter privileged EXEC mode.
b.     Set the correct time on the router.
c.     Enter global configuration mode.
1)    Assign a device name to the router based on the topology and Addressing Table.
2)    Disable DNS lookup.
3)    Create a MOTD banner that warns anyone accessing the device that unauthorized access is prohibited.
4)    Assign class as the privileged EXEC encrypted password.
5)    Assign cisco as the console password and enable console login access.
6)    Encrypt clear text passwords.
7)    Create a domain name of cisco.com for SSH access.
8)    Create a user named admin with a secret password of cisco for SSH access.
9)    Generate a RSA modulus key. Use 1024 for the number of bits.
d.     Configure VTY line access.
1)    Use the local database for authentication for SSH.
2)    Enable SSH only for login access.


e.     Return to global configuration mode.
1)    Create the Loopback 0 interface and assign the IP address based on the Addressing Table.
2)    Configure and activate interface G0/1 on the router.
3)    Configure interface descriptions for G0/1 and L0.
4)    Save the running configuration file to the startup configuration file.
Step 3:   Configure the switch.
a.     Console into the switch and enter privileged EXEC mode.
b.     Set the correct time on the switch.
c.     Enter global configuration mode.
1)    Assign a device name on the switch based on the topology and Addressing Table.
2)    Disable DNS lookup.
3)    Create a MOTD banner that warns anyone accessing the device that unauthorized access is prohibited.
4)    Assign class as the privileged EXEC encrypted password.
5)    Encrypt the clear text passwords.
6)    Create a domain name of cisco.com for SSH access.
7)    Create a user named admin with a secret password of cisco for SSH access.
8)    Generate an RSA key. Use 1024 for the number of bits.
9)    Create and activate an IP address on the switch based on the topology and Addressing Table.
10)  Set the default gateway on the switch.
11)  Assign cisco as the console password and enable console login access.
d.     Configure VTY line access.
1)    Use local database for authentication for SSH.
2)    Enable SSH only for login access.
3)    Save the running configuration file to the startup configuration file.
e.     Enter proper mode to configure interface descriptions for F0/5 and F0/6.
Step 4:   Verify network connectivity.
a.     From a command prompt on PC-A, ping the S1 VLAN 1 IP address. Troubleshoot your physical and logical configurations if the pings were not successful.
b.     From the PC-A command prompt, ping your default gateway IP address on R1. Troubleshoot your physical and logical configurations if the pings were not successful.
c.     From the PC-A command prompt, ping the loopback interface on R1. Troubleshoot your physical and logical configurations if the pings were not successful.
d.     Console back into the switch and ping the G0/1 IP address on R1. Troubleshoot your physical and logical configurations if the pings were not successful.
Part 3:     Gather Network Device Information
In Part 3, you will use a variety of commands to gather information about the devices on your network, as well as some performance characteristics. Network documentation is a very important component of managing your network. Documentation of both physical and logical topologies is important, as is verifying platform models and IOS versions of your network devices. Having knowledge of the proper commands to gather this information is essential for a network professional.
Step 1:   Gather information on R1 using IOS commands.
One of the most basic steps is to gather information on the physical device, as well as information on the operating system.
a.     Issue the appropriate command to discover the following information:
Router Model:               __Cisco 1941 Router________________________________
IOS Version:                 _______15.2(4)M3___________________________
Total RAM:                    _______512MB___________________________
Total NVRAM:               _______255K bytes___________________________
Total Flash Memory:      _____250880K bytes_____________________________
IOS Image File:             ___c1900-universalk9-mz.SPA.152-4.M3.bin _______________________________
Configuration Register:  ____0x2102______________________________
Technology Package:    _________ipbasek9_________________________
What command did you issue to gather the information?
______The show version command can be used from either the user EXEC or privileged EXEC prompt._______________________________________________________
b.     Issue the appropriate command to display a summary of important information about the router interfaces. Write down the command and record your results below.
Note: Only record interfaces that have IP addresses.
____The show ip interface brief command can be used from either the user EXEC or privileged EXEC prompt.
Interface                  IP-Address      OK? Method Status                Protocol
GigabitEthernet0/1         192.168.1.1     YES NVRAM  up                    up
Loopback0                  209.165.200.225 YES NVRAM  up                    up
<some output omitted>________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
c.     Issue the appropriate command to display the routing table. Write down the command and record your results below.
_______The show ip route command can be used from either the user EXEC or privileged EXEC prompt.
      192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks

C        192.168.1.0/24 is directly connected, GigabitEthernet0/1

L        192.168.1.1/32 is directly connected, GigabitEthernet0/1

      209.165.200.0/24 is variably subnetted, 2 subnets, 2 masks

C        209.165.200.224/27 is directly connected, Loopback0

L        209.165.200.225/32 is directly connected, Loopback0 _____________________________________________________________________________
d.     What command would you use to display the Layer 2 to Layer 3 mapping of addresses on the router? Write down the command and record your results below.
__________The show arp command can be used from either the user EXEC or privileged EXEC prompt.

Protocol  Address          Age (min)  Hardware Addr   Type   Interface

Internet  192.168.1.1                30f7.0da3.1821  ARPA   GigabitEthernet0/1

Internet  192.168.1.3             0   c80a.a9fa.de0d  ARPA   GigabitEthernet0/1

Internet  192.168.1.11            2   0cd9.96d2.34c0  ARPA   GigabitEthernet0/1 __________________________________________________________________________
e.     What command would you use to see detailed information about all the interfaces on the router or about a specific interface? Write down the command below.
___The show interfaces command can be used from either the user EXEC or privileged EXEC prompt. _________________________________________________________________________________
f.      Cisco has a very powerful protocol that operates at Layer 2 of the OSI model. This protocol can help you map out how Cisco devices are connected physically, as well as determining model numbers and even IOS versions and IP addressing. What command or commands would you use on router R1 to find out information about switch S1 to help you complete the table below?
Device ID
Local Interface
Capability
Model #
Remote Port ID
IP Address
IOS Version
S1.cisco.com
G 0/1
            Switch
WS-2960-24TT-L
F 0/5
192.168.1.11
15.0(2)SE1
The show cdp neighbors detail command can be used from either the user EXEC or privileged EXEC prompt.

g.     A very elementary test of your network devices is to see if you can telnet into them. Remember, Telnet is not a secure protocol. It should not be enabled in most cases. Using a Telnet client, such as Tera Term or PuTTY, try to telnet to R1 using the default gateway IP address. Record your results below.
___Tera Term Output: Connection refused. ________________________________________________________________________________
h.     From PC-A, test to ensure that SSH is working properly. Using an SSH client, such as Tera Term or PuTTY, SSH into R1 from PC-A. If you get a warning message regarding a different key, click Continue. Log in with the appropriate username and password you created in Part 2. Were you successful?
__yes_________________________________________________________________________________
The various passwords configured on your router should be as strong and protected as possible.
Note: The passwords used for our lab (cisco and class) do not follow the best practices needed for strong passwords. These passwords are used merely for the convenience of performing the labs. By default, the console password and any vty passwords configured would display in clear text in your configuration file.
i.      Verify that all of your passwords in the configuration file are encrypted. Write down the command and record your results below.
Command: __The show running-config or show run command can be used from the privileged EXEC prompt.______________________________________________
Is the console password encrypted? _____yes_____________________
Is the SSH password encrypted? _____________yes________________
Step 2:     Gather information on S1 using IOS commands.
Many of the commands that you used on R1 can also be used with the switch. However, there are some differences with some of the commands.


a.     Issue the appropriate command to discover the following information:
Switch Model:   _WS-C2960-24TT-L_________________________________
IOS Version:     ____15.0(2)SE1______________________________
Total NVRAM:   _____ 64K_____________________________
IOS Image File: ______c2960-lanbasek9-mz.150-2.SE1.bin____________________________
What command did you issue to gather the information?
____The show version command can be used from either the user EXEC or privileged EXEC prompt._________________________________________________________
b.     Issue the appropriate command to display a summary of status information about the switch interfaces. Write down the command and record your results below.
Note: Only record active interfaces.
____The show ip interface brief command can be used from either the user EXEC or privileged EXEC prompt.

Interface              IP-Address      OK? Method Status                Protocol

Vlan1                  192.168.1.11    YES NVRAM  up                    up

FastEthernet0/5        unassigned      YES unset  up                    up

FastEthernet0/6        unassigned      YES unset  up                    up

<some output omitted> ________________________________________________________________________________
c.     Issue the appropriate command to display the switch MAC address table. Record the dynamic type MAC addresses only in the space below.
____The show mac address-table command can be used from either the user EXEC or privileged EXEC prompt.

          Mac Address Table

——————————————-



Vlan    Mac Address       Type        Ports

—-    ———–       ——–    —–

   1    30f7.0da3.1821    DYNAMIC     Fa0/5

   1    c80a.a9fa.de0d    DYNAMIC     Fa0/6 _______________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
d.     Verify that Telnet VTY access is disabled on S1. Using a Telnet client, such as Tera Term or PuTTY, try to telnet to S1 using the 192.168.1.11 address. Record your results below.
__Tera Term Output: Connection refused. _________________________________________________________________________________
e.     From PC-A, test to ensure that SSH is working properly. Using an SSH client, such as Tera Term or PuTTY, SSH into S1 from PC-A. If you get a warning message regarding a different key, click Continue. Log in with an appropriate username and password. Were you successful?
___yes________________________________________________________________________________
f.      Complete the table below with information about router R1 using the appropriate command or commands necessary on S1.
Device Id
Local Interface
Capability
Model #
Remote Port ID
IP Address
IOS Version
R1.cisco.com
F 0/5
Router
CISCO1941/K9
G 0/1
192.168.1.1
15.2(4)M3
The show cdp neighbors detail command can be used from either the user EXEC or privileged EXEC prompt.
g.     Verify that all of your passwords in the configuration file are encrypted. Write down the command and record your results below.
Command: _The show running-config or show run command can be used from the privileged EXEC prompt. _______________________________________________
Is the console password encrypted? ____yes______________________
Step 3:     Gather information on PC-A.
Using various Windows utility commands, you will gather information on PC-A.
a.     From the PC-A command prompt, issue the ipconfig /all command and record your answers below.
What is the PC-A IP address?
______192.168.1.3______________________________________________________________________________
What is the PC-A subnet mask?
_______255.255.255.0_____________________________________________________________________________
What is the PC-A default gateway address?
________192.168.1.1____________________________________________________________________________
What is the PC-A MAC address?
______Answers will vary. ______________________________________________________________________________
b.     Issue the appropriate command to test the TCP/IP protocol stack with the NIC. What command did you use?
______C:\> ping 127.0.0.1



Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 ______________________________________________________________________________
c.     Ping the loopback interface of R1 from the PC-A command prompt. Was the ping successful?
_____yes_______________________________________________________________________________
d.     Issue the appropriate command on PC-A to trace the list of router hops for packets originating from PC-A to the loopback interface on R1. Record the command and output below. What command did you use?
__C:\> tracert 209.165.200.225

Tracing route to 209.165.200.225 over a maximum of 30 hops

  1     1 ms     1 ms     1 ms  209.165.200.225

Trace complete. __________________________________________________________________________________
____________________________________________________________________________________
e.     Issue the appropriate command on PC-A to find the Layer 2 to Layer 3 address mappings held on your NIC. Record your answers below. Only record answers for the 192.168.1.0/24 network. What command did you use?
___C:\> arp –a



Interface: 192.168.1.3 — 0xb

  Internet Address      Physical Address      Type

  192.168.1.1           30-f7-0d-a3-18-21     dynamic

  192.168.1.11          0c-d9-96-d2-34-c0     dynamic

  192.168.1.255         ff-ff-ff-ff-ff-ff     static _________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Reflection
Why is it important to document your network devices?
_______Having the proper information including: IP addresses, physical port connections, IOS versions, copies of configuration files, and the amount of memory storage, can greatly aid you when troubleshooting and performing network baseline tests. Having good documentation can also help you recover from network outages and replacing equipment when necessary.________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Router Interface Summary Table
Router Interface Summary
Router Model
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
Fast Ethernet 0/0 (F0/0)
Fast Ethernet 0/1 (F0/1)
Serial 0/0/0 (S0/0/0)
Serial 0/0/1 (S0/0/1)
1900
Gigabit Ethernet 0/0 (G0/0)
Gigabit Ethernet 0/1 (G0/1)
Serial 0/0/0 (S0/0/0)
Serial 0/0/1 (S0/0/1)
2801
Fast Ethernet 0/0 (F0/0)
Fast Ethernet 0/1 (F0/1)
Serial 0/1/0 (S0/1/0)
Serial 0/1/1 (S0/1/1)
2811
Fast Ethernet 0/0 (F0/0)
Fast Ethernet 0/1 (F0/1)
Serial 0/0/0 (S0/0/0)
Serial 0/0/1 (S0/0/1)
2900
Gigabit Ethernet 0/0 (G0/0)
Gigabit Ethernet 0/1 (G0/1)
Serial 0/0/0 (S0/0/0)
Serial 0/0/1 (S0/0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent th e interface.



http://erdoganakbiyik.blogspot.com/
https://www.youtube.com/channel/UCDsUnmBfVdEPkcC8FlzPKcg