Saturday, May 23, 2020

Why Teachers Should Have Guns - 798 Words

There was a fire in the science class room today. Luckily the teacher had fire extinguishers in the class room which, stoped the fire in a few minutes. Should the school call the fire department and do nothing causing people to get hurt? Or should the teacher stop the fire? Of course the teacher should of stop the fire with a fire extinguisher. By stopping the fire it did not get bigger worse and no one got hurt. There was a kid brought a gun into school today and, pulled out during class. Luckily the teacher had a gun in the class room which stopped the kid in a few minutes. Should the school call the police department and, do nothing causing people to get hurt? Or should the teacher of stop the shooter? Of course the teacher should of stop the shooter. By stopping the shooter it did not get worse and no one got hurt. Teachers should have guns in school to protect the students. Part of the reason why teachers should have guns is what causes school shootings. What is the cause scho ol shootings? Who is to blame? Is it the broken homes, the lack of god or, the fact that there is to many guns? â€Å"Should we blame the government or blame society or should we blame the images on TV?† The thing to blame is fear. Everyday America lives in fear of each other and everything. They fear each other because of their skin, religion and where they live. A foot ball player from Missouris said â€Å"I mean, people were looking at us like we were aliens.† They were looking at him because theyShow MoreRelatedShould School Guns A Weapon Of Self Defense?1000 Words   |  4 PagesThe debate of whether or not teachers should be allowed to carry guns in school is very heated and continues to dilemma the minds of many. However, both the supportive and opposing parties have good grounds that can be used to choose. Recently in the year 2012, 26 people in elementary school in Texas were shot dead triggering public demand that teachers should be armed with guns in ord er to protect our students. A local resident of the area around the elementary school opened fire on 20 studentsRead MoreShould School Guns Be Banned?1638 Words   |  7 PagesProtecting Our Future The debate of whether or not teachers should be allowed to carry guns in school is very heated and continues to dilemma the minds of many. However, both the supportive and opposing parties have good grounds that can be used to choose. Recently in the year 2012, 26 people in elementary school in Texas were shot dead triggering public demand that teachers should be armed with guns in order to protect our students. A local resident of the area around the elementary school openedRead MoreI Want Key Card Locks And Metal Detectors881 Words   |  4 Pagesin every entrance. The reason why I want key card locks is because only faculty and students would have special key cards that would let them into the building and people without the key cards could not enter the building. This prevents any unauthorized personal to enter the building and endanger the faculty and students. The reason why schools need metal sectors is to make sure faculty or students are not carrying a dangerous weapon with them.   Also, the schools should bring in a Police Officer soRead MoreEssay on Teachers Should Be Allowed to Carry Weapons956 Words   |  4 PagesIn this speech, I will talk to you about how allowing teachers to carry concealed weapons will be a good idea. I will talk about the advantages of allowing teachers to carry a concealed weapon, how allowing teachers to carry concealed weapons is helping other countries, and why Gun-Free zones aren’t working. Let’s start with the advantages of allowing teachers to carry a concealed weapon. There are three main advantages for allowing teachers to carry a concealed weapon. The three advantages areRead MoreThe Teacher s Responsibility That Should Be Carry Firearms, And Be Capable Of Combating920 Words   |  4 Pageschildren scramble to their seats as the teacher begins class as usual, stating, â€Å"good morning class take out your notebooks and begin your do now that is placed on the board.† Within seconds every student grabs for their notebooks and begin doodling as the teacher walks around the room to ensure everyone participates and checking attendance. *Boom* the door slams and everyone looks up in shock. Eyes grow big and children begin to scream as a young man holds a hand gun toward the class crying and angryRead MoreEssay on Better Education Will Reduce Americas Crime Rate593 Words   |  3 Pagesthe use of various weapons there is little to no crime in the country. According to the Swiss Federal Police Office there were 2,687 crimes committed in Switze rland in 1997. Of those only 637 involved guns (Halbrook, 1999). The best way to deal with crime is to educate people on weaponry, create more gun control laws, and harsher sentences for criminals caught in possession of a weapon. Education is a key to dealing with the crime rate in America. The more young men and women trained in the use ofRead MoreDefense Of Self, Home And Family1195 Words   |  5 Pageswas written during a time when a gun was required by law to be in every household for the protection of the residents. Don B. Kates, a civil rights attorney and criminologist, writes in â€Å"Is Gun Ownership a Right† that almost all civilian males of military age had to appear with their own guns when called for militia training or service (13). In those days traveling a long distance was met with many perils, highway men, and dangerous animals to name but a few, a gun was needed to insure ones safetyRead MoreEssay on Should Teachers Carry a Gun to School?1236 Words   |  5 PagesHow People’s Opinions of Teacher’s Carrying Guns During School Can Be Grouped By Age, Gender, and Race Do you believe that people have a unique personal opinion that nobody else has? Well, research has shown that personal opinion can be grouped by age, gender and race, but some of this research does not show through in the highly debated topic, should teachers carry guns during school hours. Age Groups One of the ways people’s opinions can be grouped together is by age. According to â€Å"FactorsRead MoreThe Issue Of Guns On Campus953 Words   |  4 PagesGuns on Campus Crime seems to be at an all-time high in current times. I feel that this is due to so many people carrying guns. The safety of all people should be the focus of our society now. One area we really need to not allow firearms on campuses. This is only one area to focus on. There are several reason why allowing guns on colleges campuses and universities could be dangerous to people. First, gun violence seems to lead to an escalation of violent crime. The percentage of students thatRead MoreBanning Guns On Campuses And Universities846 Words   |  4 Pagesso many people carrying guns. The safety of all people should be the focus of our society now. One area we really need to not allow firearms on campuses. This is only one area to focus on. There are several reason why allowing guns on colleges campuses and universities could be dangerous to people. First, gun violence seems to lead to an escalation of violent crime. The percentage of students that could be robbed on their way to class increases . Campuses that do not have metal detectors to screen

Tuesday, May 12, 2020

Female Sensuality and Rebellion in Dracula - Free Essay Example

Sample details Pages: 6 Words: 1802 Downloads: 3 Date added: 2019/05/15 Category Literature Essay Level High school Tags: Dracula Essay Did you like this example? In his novel Dracula, Bram Stoker seeks to highlight the importance of following gender roles in the late 19th century. Throughout the story, many women rebel against societal gender norms and embrace their sexuality. In this novel, Bram Stoker suggests that women should follow their traditional Victorian roles and that female sensuality and rebellion will result in the destruction of a woman and her character. Literary critic John Ruskin describes Victorian gender roles: The mans power is active, progressive, defensive while women must be enduringly, incorruptibly, good (59). This statement proves that men of this time period had many more freedoms than and were generally superior to women, and Bram Stoker analyzes this social construct in Dracula. Mans control over woman in this novel is shown in Draculas character. Dracula is the only male vampire in the novel as well as the implied leader of the rest of the vampires. It is Dracula who is responsible for exerting control on women such as Lucy and Mina by turning them into vampires. His male dominance is clear after Dracula is attacked by the band of men and he exclaims, My revenge is just begun! Your girls that you all love are mine already; and through them you and others shall yet be mine my creatures, to do my bidding and to be my jackals when I want to feed (Stoker 325). Dracula says this with no regard to the women at all; he treat s them as objects, taking advantage of their passivity and exerting his power over them as was typical of men in this time period. Don’t waste time! Our writers will create an original "Female Sensuality and Rebellion in Dracula" essay for you Create order In this novel, female sexuality is presented in a negative light as aggressive and violent. This is shown in various places throughout the story, most notably with the three vampire women. In the first scene of the novel when Jonathan is in Draculas mansion, the three women try to seduce him against his will. Upon seeing the women, Jonathan states, There was something about them that made me uneasy, some longing and at the same time some deadly fear (Stoker 43). Jonathan goes on describing the dark sensuality of the women, referring to them as the three terrible women licking their lips (57). Jonathan repeatedly uses the word voluptuous to describe the three vampires, writing that they have voluptuous lips and a deliberate voluptuousness in their approach to him (46). This word choice emphasizes the womens overt sexuality, which Stoker associates with aggressiveness and cruelty towards children. Harker writes in his journal about the vampiresses, stating that one pointed to the bag w hich moved as though there were some living thing within it There was a gasp and a low wail, as of a half-smothered child. The women closed round, whilst I was aghast with horror, but as I looked they disappeared, and with them the dreadful bag (45). The womens brutality in their treatment of the child leads Jonathan to conclude that these creatures are hardly women at all, basing this judgment off of the traditional women with whom he is familiar, such as Mina. The three vampiresses lack of maternal feelings serves to emphasize that a womans ideal role in this novel is as an innocent mother-figure, and that any woman who strays from that role is evil. These voluptuous women are shown as monsters, their sexuality as animalistic and murderous. The three vampire women violate Stokers ideas about womanhood and femininity, and it is because of this that their characters are destroyed by the end of the novel. Throughout the novel, the more concealed sensual side of Lucy Westenra also becomes evident. Lucy is constantly torn between the need to conform and the desire to rebel; she is dissatisfied with the female social tendency towards compliance and obedience (Senf 42). One example of Lucys inherently rebellious nature is shown at the beginning of the novel, when she writes to Mina, Why cant they let a girl marry three men, or as many as want her, and save all this trouble? (Stoker 66). Lucy always has this natural wild side to her, yet she is never really portrayed as a physically sexual being until she is transformed into a vampire. In his analytical essay Sex and Sexuality in Dracula Mitchell R. Lewis considers that The contrasting of angelic purity and monstrous sexuality is evident in the portrayal of Lucy Lucy vacillates between monstrosity and purity until she is completely transformed into a sexual vampire (1). Lucy is portrayed as a sexualized being after she is turned into a vampire who seeks to inspire an intimate response in the men around her. Upon meeting the men in the graveyard, Dr. Seward writes that Lucy said in a soft, voluptuous voice Arthur! Kiss me! (Stoker 167). Lucys dark, villainous seductiveness is evident here, and it is clear that she wants to enkindle sensual passion in Arthur in order to turn him into a vampire. When Seward sees the undead Lucy outside of her tomb later in the novel, he says, we recognized the features of Lucy Westenra but yet how changed. The sweetness was turned to cruelty, and the purity to voluptuous wantonness (226). Throughout the next four paragraphs of this section, Seward describes Lucy with eyes unclean and full of hell-fire and a voluptuous smile stating that she speaks with a languorous, voluptuous grace. Again, there is a noticeable repetition of the word voluptuous as there was in the scene with the three vampire women at the beginning of the novel. Parallels can be drawn between these two sections of the story. Lucy, like the three vampire women, has an excessive sensuality about her that is hostile. After Lucy dies she is turned back from a monstrous sexual being with an unspiritual appearance to Lucy with her face of unequalled sweetness and purity (232). It is clear that Lucy as an erotic being was deeply evil to the point of being demonic, yet the moment that she is transformed from that sinful, sexualized being, she is again characterized as pure (Stevenson 145). In the scene of Lucys death, Bram Stoker insinuates that it is because of her rebelliousness and sensuality that she meets a tragic end where she is killed, beheaded, and her mouth filled with garlic. On the other hand, Mina, with her compassion and sexual innocence, is characterized as the quintessential woman throughout Dracula. Mina is the ideal wife of this time period, considering herself submissive to her husband and invariably putting his needs before her own. For instance, Mina writes to Lucy early in the novel, I have been working very hard lately, because I want to keep up with Jonathans studies When we are married I shall be able to be useful to Jonathan (Stoker 61). Comments like these show Minas determination to be the perfect wife and assist her husband when he might need it. Furthermore, Mina adheres to traditional gender roles throughout her marriage to Jonathan, as she never once gives voice to any sexual desire. Also, contrary to Lucy and the three vampire women, Mina is portrayed as a true mother-figure. She considers herself lucky to have so many strong men watching out for her well-being, and in turn is always willing to offer them emotional support as a moth er would with their child. For example, following Lucys death, Mina allows Lord Godalming to cry to her, remarking that We women have something of the mother in us that makes us rise above smaller matters when the mother-spirit is invoked; I felt this big, sorrowing mans head resting on me, as though it were that of the baby that some day may lie on my bosom, and I stroked his hair as though he were my own child (246). When Quincey Morris enters the room directly after this incident, he says to Mina that No one but a woman can help a man when he is in trouble of the heart (247), implying that she has fulfilled her roles as a woman. Mina is described as angelic and kind-hearted in many parts of the novel; she is portrayed as the depiction of moral purity as was expected of an ideal Victorian woman. Minas perfection as a woman is further emphasized as the story progresses. As literary critic Carol Senf states, the second half of Dracula shifts from the presentation of women as vampires to focus on a woman who is the antithesis of these destructive creatures (34). Even after Mina is turned into a vampire, she continues to fulfill her established roles as a woman and act in ways that will benefit the men around her. For instance, Mina allows Van Helsing to hypnotize her as much as he might need in order to obtain information about the ringleader of the vampires. She also tells the men not to discuss their plans in front of her in fear of them getting back to Dracula, as much as it pains her to not know what the men are doing. Mina even goes as far as to make the men promise to kill her before she can betray them (Stevenson 139). As a model of domestic propriety, Mina rejects openness and the pursuit of her own desires, preferring instead to be dutiful and deferential towards the b and of men (Senf 36). Although her physical body is tainted and scarred both from Draculas bites and the Host touching her forehead, Minas soul remains pure. It is this that sets her apart from the other vampire women. Because of her embodiment of the perfect woman of the time, Mina escapes the fate of the other women and even is able to take part in the destruction of Dracula. At the time Dracula was written, women were expected to follow their traditional Victorian gender roles, and Bram Stoker shows that straying from societal gender roles results in the destruction of a womans character. The three vampire women and Lucy become sexual, rebellious, and in turn evil creatures, and consequently they have all been destroyed by the end of the novel. Mina, on the other hand, adheres to conventional gender roles of the time period, and because of this she ends the novel alive and well. Evidently, not following traditional societal gender roles leads to the destruction of womens characters in this novel. Works Cited Craft, Christopher. Kiss me with Those Red Lips: Gender and Inversion in Bram Stokers Dracula. Representations, vol. 8, 1984, pp. 107-133. Lewis, Mitchell R. Sex and Sexuality in Dracula. Encyclopedia of Themes in Literature, 3-Volume Set, Facts On File, 2010. Blooms Literature, online.infobase.com/Auth/Index?aid=100992itemid=WE54articleId=39509. Senf, Carol A. Dracula: Stokers Response to the New Woman. Victorian Studies, vol. 26, no. 1, 1982, pp. 33-49. JSTOR, www.jstor.org/stable/3827492. Stevenson, John Allen. A Vampire in the Mirror: The Sexuality of Dracula. PMLA, vol. 103, no. 2, 1988, pp. 139-149. JSTOR, www.jstor.org/stable/462430. Stoker, Bram. Dracula. Barnes Noble Classics, 2004.

Wednesday, May 6, 2020

3 Categories of Organisms Free Essays

Week 2: Week Two – Class Discussion Class Discussion Graded Activity: Class Discussion (25 points) Instructional Objectives for this activity: Identify the three ecosystem trophic categories of organisms. In Chapter 5, the different trophic categories in an ecosystem are discussed and the importance of each of the trophic categories is described in detail. For this week’s class discussion, please review the materials assigned in chapter 5, and answer all the prompts below. We will write a custom essay sample on 3 Categories of Organisms or any similar topic only for you Order Now What are the three ecosystem trophic categories? Give 2 examples of each trophic category that can be found in your town, city or county. What trophic category do you think is the most important in the ecosystem and why? What is biodiversity? Is it important? Relate biodiversity to the trophic categories. What would happen to the rest of the trophic categories if one them was wiped out? The minimum expectation for class discussions is to respond directly to each part of the discussion prompt and to respond to at least two other posts, either by a student or instructor, by the end of the week: Submit one main post responding directly to each part of the discussion prompt. This should be a substantive response to the topic(s) in your own words, referencing what you have discovered in your required reading and other learning activities. You may use resources in addition to your textbook that support your post(s); however, you must mention the source(s) that you used in your post(s). Reply to at least two posts. Responses can be made to students or to your instructor. Responses to other individuals’ posts should: Expand on their ideas Discuss the differences between your thoughts and theirs Explain why you agree or disagree. For citation guidelines, please refer to the table in the APA Style section of the syllabus. How to cite 3 Categories of Organisms, Papers

Saturday, May 2, 2020

Technical Plan and Implementation New Charter Housing Trust Group

Question: Case study of New Charter organization. Answer: Introduction The task includes primary requirements on designing Virtual Private Network over a case study of New Charter organization. At first, the assignment addressees the essential design of the VPN network along with security and business objectives ("Social Housing Program Protects Network Inside and Out", 2016). The business and security objectives are included as with showing the new network design configuration. The assumptions are attached for depicting entire security scope inclusion. The description is attached in this study for showing the network specifications and design components. The justification is assigned for showing the entire objectives based design of the network as well (Liao, WU Dai, 2016). The components are shown for further addressing of the network procedures; the implementation of the planned network is depicted to show the entire scenario of the design. Network Diagram for the Case Study Figure 1: VPN Network Design Security and Business Objectives in Case Study The security and business objectives are included as per the case study consideration. The organization New Charter Housing Trust Group required incorporating a low-cost yet scalable network connection architecture connecting more people in one grid (Liu et al., 2015). Their primary goal of business is to connect more people from lower income background with serving 20,000 citizens in UK. Their business initiatives are included as following: To provide low cost implementation of Virtual Private Network with serving more residents and corporate staffs To integrate the management units into the existing IT network with mitigating the difficulties To implement the network with legacy hardware and software without any discrepancies in interconnection To implement the network with including access controlling for proper policy and maintenance planning The security considerations are included as following in form of techniques for mitigating the risks and discrepancies. To include potential policies in the organization practices with including deployment of technology To recommend several security and privacy considerations under the network for mitigating the risk of packet transmission without exploit To incorporate the suitable security guidelines under the network connection for privacy maintenance To minimize the security and maintenance cost with increasing the performance later on with connecting the components in network architecture as well Assumptions in Network Design and Security Primary and essential consideration is that the users and personnel should consider entire process with care and sincerity. The organizations personnel and their staff should be included with suitable level of maintaining the secure and private network (Gharam, Salhi Boudriga, 2015). The assumptions in network design and security are included as following. These assumptions are attached for showing which parts are to be considered as the security concerns. The assumptions are important for determining whether the considerations are in the project scope or not. The assumptions are included herewith: The network will be incorporated with access controlling for the users under blocking access to unidentified users The network will be under some users, those who are identified in the grid The network is to be implemented with suitable structuring and configuration The IP addressing is necessary for setting the architecture at a certain packet passing rate Staff and users will be accounted with primary and essential knowledge of interconnection within the grid The staff and personnel will be aware about the network security policies and they would not be violating the rules of the security policy The security and privacy policy will be activated at the time of VPN implementation Description of Network Diagram The system is depicted with including the crucial prerequisites of segments associated in the network. The configuration is made do with considering effortlessness in design with stressing the availability procedure. The switches have RIP routing convention incorporated into the design for appropriate bulk of packet passing through the connected network architecture. The RIP convention is appended for particular bundle going in the system. The switch to switch passage is recognized as 10.0.0.0 and the change to switch portal is distinguished as 192.168.10.0 and 192.168.20.0 individually. The switch is incorporated into the system chart with passing the parcels all through two doors of 192.168.10.1 and 192.168.20.1 too. The switches are interconnected in the middle of the PCs and switches. The switch is possessed with quick Ethernet ports as fro 0/1 to 0/24; there are 24 quick Ethernet ports. The IP locations are in space of 192.168.10.0 and 192.168.20.0 individually. The association is kept up with adaptability as far as segmenting the two areas with two separate doors as 192.168.10.1 and 192.168.20.1 individually. The security encryption as "AES" is incorporated into the outline also. The verification is put as pre-offer mode. The verification is put through with sharing the key however the switch design alongside some IP address ranges. The key is pre-shared as to setting up the privacy in the middle of the frameworks for preparatory SA development. The system outline is dynamic with "isakmp" convention in the 10.0.0.0 entryways through the interfaces fa0/0 and fa0/1. The convention is incorporated into the outline for securing the encryption under the PCs in IP address scope of 192.168.10.2 to 192.168.10.255 and 192.168.20.2 to 192.168.20.255 separately. The computers are communicating with suitable packet passing as shown in the following figure. Figure 2: Ping test in between first and second PC The AES encryption is actualized with hash code "SHA" under the system engineering for fortifying the security and bundle passing component. The figure key is relegated as "toor" in the configuration, and the key is pre-shared under the IP ranges. The sharing imparts in the PCs without interpreting the message physically. As secure 'SHA 256' calculation is utilized alongside AES encryption for irregular hash-code era under a reasonable key task. The calculation is compelling inside Virtual Private Network, as it has no issues in decoding messages without a moment's delay. The security approach 10 is incorporated into the usage, as it is good with VPN arrangement with all parts of protection in bundle passing. The strategy is helpful inside the system for making the NAT conceivable under VPN setup too. Justification of Network Design The network design is justified as it is aligned with security and design initiatives as well. The necessary alignment with objectives is included along with suitable and essential design requirements. To provide low cost implementation of Virtual Private Network with serving more residents and corporate staffs; the VPN is implemented. It is feasible with low cost yet higher performance network architecture. To integrate the management units into the existing IT network with mitigating the difficulties; is implemented with dynamic IP configuration under the architecture as well. To implement the network with legacy hardware and software without any discrepancies in interconnection; as the VPN configuration does not require more important components in this aspect. To implement the network with including access controlling for proper policy and maintenance planning; the network is considered with access control lists in the process. The security considerations are included as followin g in form of techniques for mitigating the risks and discrepancies. To include potential policies in the organization practices with including deployment of technology; the security policy is included as isakmp. To recommend several security and privacy considerations under the network for mitigating the risk of packet transmission without exploit. To incorporate the suitable security guidelines under the network connection for privacy maintenance; the policy documents need to be distributed to the users and staff. To minimize the security and maintenance cost with increasing the performance later on with connecting the components in network architecture as well. Description of Major and Required Equipment The requirements of hardware and components are included as following with specifications in the network diagram. The design is managed with considering simplicity in architecture with emphasizing the connectivity process. The required hardware components are quite popular in market within limited cost as well. 2811 Router: The routers are general with two fast-Ethernet interfaces as 0/1 and 0/0. The routers have RIP routing protocol included in the configuration for suitable packet passing regardless of gateway. The RIP protocol is attached for specific packet passing in the network. The router to router gateway is identified as 10.0.0.0 and the switch to router gateway is identified as 192.168.10.0 and 192.168.20.0 respectively. 2950-24 Switch: The switch is included in the network diagram with passing the packets throughout two gateways of 192.168.10.1 and 192.168.20.1 as well. The switches are interconnected in between the computers and routers. The switch is occupied with fast-Ethernet ports as fro 0/1 to 0/24; there are 24 fast-Ethernet ports. General PC: The personal computers are generic with no extra requirements regarding the network connection. The IP addresses are in domain of 192.168.10.0 and 192.168.20.0 respectively. The connection is maintained with scalability in terms of sectioning the two domains with two separate gateways as 192.168.10.1 and 192.168.20.1 respectively. VPN Tunnelling and Encapsulation Requirements The VPN tunnelling and encapsulation requirements are included with including the security policy in the process. The security encryption as AES is included in the design as well. The authentication is placed as pre-share mode. The authentication is put through with sharing the key though the router configuration along with some IP address ranges. The encapsulation requirements are included as following: isakmp protocol: The protocol is assigned with mentioning a key as toor in the network architecture. The key is pre-shared as to establishing the confidentiality in between the systems for preliminary SA formation. The network design is active with isakmp protocol in the 10.0.0.0 gateways through the interfaces fa0/0 and fa0/1. ipsec protocol: The protocol is included in the design for securing the encryption under the computers in IP address range of 192.168.10.2 to 192.168.10.255 and 192.168.20.2 to 192.168.20.255 respectively. AES encryption: The AES encryption is implemented with hash code SHA under the network architecture for strengthening the security and packet passing mechanism. The cipher key is assigned as toor in the design, and the key is pre-shared under the IP ranges. The sharing helps to communicate in the PCs without deciphering the message manually. SHA 256 algorithm: As secure SHA 256 algorithm is used along with AES encryption for random hash-code generation under a suitable key assignment. The algorithm is effective within Virtual Private Network as it has no issues in decrypting messages at once. Security Policy: The security policy 10 is included in the implementation, as it is compatible with VPN configuration with all aspects of privacy in packet passing. The policy is beneficial within the network for making the NAT possible under VPN configuration as well. Implementation of Planned Network The implementation of the planned network is quite simple in this aspect. The routers are connected though the cross-over cables within the gateways as 10.0.0.1 and 10.0.0.2 within them. The switches are connected with computers and routers with straight cable wiring. The PC gateway is identified to be 192.168.10.1 and 192.168.20.1 as well. The computers are configured with 192.168.10.2 to 192.168.10.255 and 192.168.20.2 to 192.168.20.255 IP addressing. The routers are included with RIP packet routing procedures. The cryptography is assigned with security policy 10, along with pre-shared authentication of key. The encryption is implemented with AES security over packet passing. The hash code SHA is attached for showing the random key generation with mapping the access-list 101 in IP range of 192.168.10.0 to 0.0.0.255 and 192.168.20.0 to 0.0.0.255. Again, the second router is incorporated with access-list of 101 within similar ranges of IP addressing. The mapping is supported with CMA P and TSET compatibility for key matching of toor. Figure 3: isakmp Cryptography active in first router Figure 4: ipsec Encryption Shown in red outline Conclusion The assumptions in network design and security are included for managing the in-scope requirements only. The network design is justified as it is aligned with security and design initiatives as well. It is feasible with low cost yet higher performance network architecture. To implement the network with including access controlling for proper policy and maintenance planning; the network is considered with access control lists in the process. The RIP protocol is attached for specific packet passing in the network. The protocol is assigned with mentioning a key as toor in the network architecture. The cryptography is assigned with security policy 10, along with pre-shared authentication of key. The encryption is implemented with AES security over packet passing. Bibliography Ahmed, B. A., Saleem, Y., Waseem, S. (2015). AN IMPLEMENTATION OF MULTIPROTOCOL LABEL SWITCHING VIRTUAL PRIVATE NETWORKS AND INTERNET PROTOCOL SECURITY USING GRAPHICAL NETWORK SIMULATOR 3 AS AN EDUCATIONAL TOOL.Science International,27(3). Burke, C. (2015). Implementation and Evaluation of Virtual Network Functions Performance in the Home Environment. Chen, Y. L., Chen, P. W., Wang, C. H. (2015, October). Performance improvement for CMT-SCTP via load-balancing virtual connections. InComputing and Communication (IEMCON), 2015 International Conference and Workshop on(pp. 1-7). IEEE. Dumka, A., Mandoria, H. L., Dumka, K., Anand, A. (2015, March). MPLS VPN using IPv4 and IPv6 protocol. InComputing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on(pp. 1051-1055). IEEE. Gharam, M., Salhi, M., Boudriga, N. (2015). An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks. InCryptology and Network Security(pp. 248-256). Springer International Publishing. Ghilen, A., Azizi, M., Bouallegue, R. (2015). Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution. InCryptology and Network Security(pp. 238-247). Springer International Publishing. Gladstone, P. J. S., McGrew, D. A. (2015).U.S. Patent No. 9,178,697. Washington, DC: U.S. Patent and Trademark Office. Han, S. B., Phan, T. (2015).U.S. Patent No. 9,178,761. Washington, DC: U.S. Patent and Trademark Office. Kim, B., Oh, S. (2016). Implementation of Data Visualization of Harmful Information Filtering System.International Information Institute (Tokyo). Information,19(3), 987. Liao, T., WU, B., Dai, X. (2016).U.S. Patent No. 20,160,134,591. Washington, DC: U.S. Patent and Trademark Office. Liu, V., Tesfamicael, A. D., Caelli, W., Sahama, T. R. (2015). Network security and performance testing for health information system management. Lospoto, G., Rimondini, M., Vignoli, B. G., Di Battista, G. (2015, May). Making MPLS VPNs manageable through the adoption of SDN. InIntegrated Network Management (IM), 2015 IFIP/IEEE International Symposium on(pp. 1155-1156). IEEE. Priyanka, B. H., Prakash, R. (2015). A Critical Survey Of Privacy Infrastructures.arXiv preprint arXiv:1512.07207. Social Housing Program Protects Network Inside and Out. (2016). www.cisco.com. Retrieved 29 May 2016, from https://www.cisco.com/c/dam/en/us/products/collateral/security/new-charter-housing.pdf Zhou, L. (2015, January). Implementation of Linux VPN Gateway based on Netlink communication. InControl Engineering and Information Systems: Proceedings of the 2014 International Conference on Control Engineering and Information Systems (ICCEIS 2014, Yueyang, Hunan, China, 20-22 June 2014).(p. 399). CRC Press. Zhuang, S., Li, Z., Baohua, S. O. N. G. (2015).U.S. Pate.