Premium Essay

Che101 Ip

In:

Submitted By tejosh7
Words 1906
Pages 8
Lovely Professional University,Punjab
Format For Instruction Plan [for Courses with Lectures and Tutorials Course No CHE101 Course Category Cours Title CHEMISTRY Courses with numerical focus Course Planner 14863 :: Ashish Kumar Pandey Lectures Tutorial Practical Credits 3 1 0 4

Text Book:

1 Zumdahl,S., Chemistry: Concepts and applications, Cengage Learning,Indian Edition-2011

Other Specific Book:

2 Suba Ramesh, S.Vairam, Pradnya Tej Godbole ,Engineerig Chemistry, John Wiley, Ist edition ,2011 3 R.T. Morrison and R.N. Boyd, S.K.Bhattacharjee, Organic Chemistry, 7th Edition, Pearson

Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) 4 http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-4601 5 http://www.springer.com/chemistry/electrochemistry/journal/10800 6 http://www.sciencedirect.com/science/journal/13882481 7 http://www.springerlink.com/content/100224/ 8 http://www.sciencedirect.com/science/journal/00108545 9 http://pubs.acs.org/journal/joceah 10 http://www.sciencedirect.com/science/journal/00323861 Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 11 http://www.klte.hu/~lenteg/animate.html 12 http://dwb4.unl.edu/chemAnime/atomic_orbits.htm Salient Features Chemistry animation and videos Atomic orbital animations

13 http://www.mhhe.com/physsci/chemistry/essentialchemistry/fla Hybridization animation sh/hybrv18.swf 1 Approved for Spring Session 2011-12

14 http://www.mhhe.com/physsci/chemistry/animations/chang_7e VSEPR animation _esp/bom3s2_7.swf 15 http://jchemed.chem.wisc.edu/JCEDLib/WebWare/collection/o Molecular orbital theory animations pen/JCEWWOR019/momovies.html 16 http://dwb4.unl.edu/chemAnime/Electro.htm Electrochemistry animations 17 http://www.mhhe.com/physsci/chemistry/essentialchemistry/fla Galvanic Cell animation sh/galvan5.swf 18

Similar Documents

Premium Essay

Matrix

...Following are the setting : APN:- airtelgprs.com Proxy:- vuclip.com Port:- 80 Homepage: 174.142.196.230 OR 50.7.14.182 Now save your settings and restart your mobile. Below are the steps for AIRCEL unlimted 3G gprs. I will be providing setting below ,create a profile of same or edit the older one:- Name-AircelGprs apn-aircelwap IP address-10.4.42.15 proxy server address-010.004.042.015 proxy port-8080 hp-www.google.com Now you have to use UC Browser 8.0+ after  installation of the browser goto setting>>accespoint>>select AircelGprs and Enjoy free internet on your mobile this trick is tested on nokia and samsung phones and is working fine. Note- * Try at low balance 1rs *  Tricks shared here are using loop holes of aircel's network shared are making use of the loop holes in Aircel’s network. share at own risk Seating Plan | Course Code | Course Name | Exam Type | Room No | Reporting Time | Date | Time | MEC107 | ENGINEERING MECHANICS | MTE | Final Date Sheet | 01:00 | 05 Oct 2012 | 01:30-03:00 | PHY110 | ENGINEERING PHYSICS | MTE | Final Date Sheet | 03:00 | 13 Oct 2012 | 03:30-05:00 | CHE101 | ENGINEERING CHEMISTRY | MTE | Final...

Words: 337 - Pages: 2

Premium Essay

Networkd and Webdesign

... 1. Networks 1.1. The Ethernet and PPP in data transfer. 1.2. Media Accessed Control address 1.3. IPv4 address 1.4. Public and private address 1.5. NAT server/service 1.6. IPv6 1.7. Private addresses in IPv6 2. Web Design 2.1. Static and dynamic pages 2.2. CSS (Cascading Style Sheets) 2.3. URL and Link 2.4. HTML links 2.5. Absolute and relative path links  1. Networks 1.1. The Ethernet and PPP in data transfer. There are different methods for the effective transfer of data between different nodes. Ethernet and Point-to-point protocol are two of them. Ether net can be defined as a family of computer networking technology used for local area networks (LAN). The functioning of Ethernet is based on a set of coding system which allows the coding violations to mark the frame boundaries. It also defines the network layer interfaces to the physical interconnects. There are several important features and advantages for the Ethernet; but there are some disadvantages too. One of the disadvantages is - it will not operate on wide variety of media, which includes the async serial ports which are usually used with the dial up modems and synchronous telecom services. Using Ethernet, only on synchronous links, it will be able to use 100BASE-TX 4B/5B or 1000BASE- X 8B/10B encoding for making an Ethernet-like serial implication. And the result of this will be less efficient too. Point-to point protocol is a commonly used data link protocol for establishing direct connection...

Words: 2617 - Pages: 11

Free Essay

Tcp/Ip Security Concerns

...on the TCP/IP security. As we have seen the transmission of data as securely as possible has become top on the list for many companies and persons. As we have begun using the Internet more and more to conduct business remotely, we need to ensure that our most sacred data is protected from harm. To ensure that we understand the transmission of data using TCP/IP, I will explain the history of the protocol and the reason for this being the established standard used. As we have read and know it is a combination of two known protocols that were combined to become one. The Transport Control Protocol is used to ensure successful delivery of data. It carries the destination and source information such as the address for both. The IP protocol or Internet Protocol is the second. This protocol is only for sending data. It combined with TCP will ensure that the data is transmitted successfully. When the protocols began to communicate they can use on of many ways to ensure successful communication. One being the hand shake method. There are more than one and will be explained in the paper. With that transmission come the possibility of interference and high jacking of data. One common discussed security hole is the prediction of the send sequence. There is also the SYN and FIN scanning, which each attack. Then there is UDP security concerns, which an attacker uses empty UDP ports to send datagram’s. These are just a few ways there are security holes defined with using TCP/IP and I will...

Words: 373 - Pages: 2

Premium Essay

Microsoft

...Microsoft Age of Empires III Readme File September 2005 Welcome to Microsoft® Age of Empires® III! This file contains information to help you install Age of Empires III. It also includes late-breaking information not included in the manual or in-game Help. CONTENTS A. Installing Age of Empires III B. Starting Age of Empires III C. Getting Help D. What's on the Disc? E. Multiplayer Guide F. Shortcut Keys G. Manual Corrections H. Gameplay Troubleshooting I. DirectX Troubleshooting J. Video Troubleshooting K. CD-ROM Drive Troubleshooting L. Audio Troubleshooting M. Processor Troubleshooting N. Performance Troubleshooting O. Multiplayer Troubleshooting P. Age of Empires III Information A. Installing Age of Empires III To install Age of Empires III, you must have administrator rights on your computer and your computer must be running Microsoft Windows® XP. To install Age of Empires III · Insert the Age of Empires III disc into the disc drive. If AutoPlay is enabled, the installation menu will appear; click Install, and then follow the on-screen prompts. —or— · If AutoPlay is disabled, on the Start menu, click My Computer. In the My Computer window, double-click the disc drive icon, and then double-click Setup.exe. On the Setup screen, click Install, and then follow the on-screen prompts. B. Starting Age of Empires III You must have the Age of Empires III disc 1 in your disc drive to play. To start Age of Empires III · Insert the...

Words: 4090 - Pages: 17

Premium Essay

Face Detetction

...Data Communication Theory What is dotted decimal notation on IPv4 addresses? Answer: It is presentation form for the numerical data that consists of a string of decimal numbers each pair is separated by a dot. The common use is to write the numbers in the octet group based 10 (decimal) numbers separated by dots. In computer networking, Internet Protocol Version 4 addresses are commonly written using quad-dotted notation of four decimal integers, ranging from 0 to 255 each. Chapter 6- Explain the Peer-to Peer network and what are its advantages? Answer – In Peer to Peer network, network hosts don’t have a specific role. They provide specific services and also consume network services. We have hosts that will fulfill a variety of different roles, like one computer can have printer connected to it which is then shared on to the network. Another computer can have a large hard drive attached to it and everyone else is allowed to use the hard drive for data storage, modification etc. In Such network we have hosts that both provide and consume network services. In essence they function both as a Client and as a Server at the same time. The advantage of Peer to Peer network is the ease of installation. We can share our resources on the network and everyone can share the benefits. On the other hand is not very scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of...

Words: 1023 - Pages: 5

Premium Essay

Secured Infrastructure Development for Educational University Using Servers, Firewalls and Biometric Devices

...------------------------------------------------- Department of Electrical, Computer & Communications Engineering ------------------------------------------------- MSc Project Final Project Report ------------------------------------------------- Title: Secured infrastructure development for educational university using servers, firewalls and biometric devices ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Author: Azhar ur Rehman ------------------------------------------------- ------------------------------------------------- Academic Session: 2008-2009 ------------------------------------------------- Supervisor: Mr.Manoj Pongubhati Course Title: Msc computer systems and networking Mode of Study: Full Time ACKNOWLEDGEMENT First and foremost I would like to dedicate my thesis to my parents and want to thank Prof. Mr. Manoj pongubhati, my research dissertation supervisor, for giving me an opportunity to work on the dissertation of my interest and encouraging me throughout my work. His support and patience helped me overcome many difficult times during my dissertation research. I am also deeply grateful to Mr Ali Ahmed, a good friend and guardian who is working as an Assistant Manager with Dynamic Associates Info Pvt Ltd was actively involved with my research. The day I started working under the professional guidance of Dynamic...

Words: 7221 - Pages: 29

Free Essay

Test

...subnet mask is not included in the routing updates.  It utilizes load-balancing (equal-cost load balancing) if there are several paths with the same metric. Lastly, RIPv1 summarizes to IP network values at network boundaries, which occurs at a router that has one of more interfaces that do not participate in the specified IP network. | | The Routing Information Protocol (RIP) is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. | | These are some of the steps I would take to start troubleshooting a problem in a Cisco network: First, I would make sure all the cables are the correct ones, not damaged, and are well connected to the corresponding ports. Then, making sure all the appropriate routers and switches' interfaces are configured with the correct parameters, IP Addresses, Subnet Masks, Encapsulation's parameters, Transmission Speeds, and Clock Rates, etc. After that, I would check the configuration of the routers by using commands such as show ip route, show ip protocols, debug ip rip, show ip interface brief. These command can definitely show me what can be missing or misconfigured. Then, I would test connectivity between neighboring routers using commands such as ping and...

Words: 421 - Pages: 2

Free Essay

Ip Networking

... 2. Connect the other end of your network cable to the hub provided by the instructor. Answer the following questions: a. What is the purpose of the hub? b. What is the topology you are creating? 3. Turn on the hub and verify that a link light is illuminated both on the computer’s network interface card (NIC) and the network hub. If not, check with the instructor. Answer the question: a. What does the link light indicate? 4. On the workstation, open a command prompt by clicking START> RUN and type CMD. 5. Next, type the IPCONFIG/ALL command to determine current TCP/IP settings for clients on a network. Record the following: a. Your computer’s IP address b. Classmate’s IP address connected with your hub 6. Next, use the PING command to verify network connectivity between clients. Type PING XX.XX.XX.XX at the command prompt where XX.XX.XX.XX is the IP address that you recorded in Step 5b. 7. You will receive ICMP replies from your classmate’s computer illustrating that your computers are connected and communicating. If not, you can check with your instructor. 8. Now, unplug your network cable from the hub and repeat Step 6. What was the result? 9. Unplug your cable from the ITT computer. Replace the ITT UTP cable to the ITT computer to restore the connection with the ITT network. Verify that the link light is active on the ITT computer. On the ITT computer, verify that you can connect to the Internet. If not, restart the system...

Words: 401 - Pages: 2

Premium Essay

Static Ip and Connected Routes

...12 makeup IP routing, Static and connected routes IP routing defines how an IP packet can be delivered from the host at which the packet is created to the destination host. Hosts and routers participate in the IP routing process. The list summarizes a host’s logic when forwarding a packet, assuming that the host is on an Ethernet / wireless LAN. When sending a packet, compare the destination IP address of the packet to the sending host’s perception of the range of addresses in the connected subnet, based on the host’s IP address and subnet mask. If the destination is in the same subnet as the host, send the packet directly to the destination host. ARP is needed to find the destination host’s MAC address. If the destination host is not in the same subnet as the host, send the packet directly to the host’s default gateway. ARP is needed to find the default gateway’s MAC address. Routers use the following steps: the packet must first be received, whereas the sending host begins with the IP packet in memory. For each received frame, use the data-link trailer frame check sequence (FCS) field to ensure that the frame had no errors; if errors occurred, discard the frame and don’t continue to the next step. Check the frame’s destination data link layer address, and process only if addressed to this router or to a broadcast/multicast address. Discard the incoming frame’s old data-link header and trailer, leaving the IP packet. Compare the packet’s destination IP address to the...

Words: 756 - Pages: 4

Free Essay

Cnt 4513 Study Guild

...CNT 4513 Study Guild Note: This study guild also include the material covered before midterm for completeness. You can focus on Chapter 4 and 5 Chapter 1 1. Internet: largest system of interconnected computer networks a) Network edge: end system and access network b) Network core: packet switching(vs. circuit switching) 2. Network Performance a) Delay: Processing delay, queuing delay, transmission delay, propagation delay b) Throughput: bottleneck link 3. Protocol layers a) application (message), transport (segment), network (datagram), link (frame), physical layer b) Layer implementation, data encapsulation Chapter 2 1. Architecture a) client-server: dedicated servers, fixed IP, not scalable, single-point-of-failure. (E.g., Web, FTP, Telnet, and e-mail) b) p2p: direct communication between peers, self-scalability. (E.g., BitTorrent, Skype, PPstream) 2. Process communication Socket: interface between application process and underlying transport layer infrastructure Datagram socket (connectionless socket for UDP) Stream socket (connection-oriented socket for TCP) 3. Web and HTTP Web page: base HTML file + referenced objects URL: hostname + object’s path name HTTP: request-response protocol , TCP, , stateless, message format, non-persistent vs. persistent connections Cookie: back-end database at web site, cookie file in client site, cookie header line in response and request message Web caching: proxy server, conditional get 4. FTP Control connection...

Words: 578 - Pages: 3

Free Essay

Firewall Security Project

...Allen & Bose Insurance Services Firewall Security Project Business Requirement and proposed Solution Report CIS 343 July 10, 2013 Dr. Table of Contents Executive Summary 3 Introduction/Background and History 4 Issues faced and specific needs to be solved by installing upgrades 5 Projects Assumptions and Constraints 7 Business Requirement ….………………………..………………………………………..8 Definition of Terms ….……………………………..……………………………………..9 Project Scope...……………………………………..……………………………………10 References…………………………………………..……………………………………13 Executive Summary The objective of this paper is to educate both the senior management of Allen & Bose Insurance Inc. on the network security threats that exist with our current network design. The enclosed report presents an analysis on Allen & Bose Insurance Services current security posture and highlights the issues we have face over the past year as well as industry best practices and recommended updates we should make to our network security design that will protect the organization from the myriad of security threats that are out there. Introduction/Background and History Allen & Bose Insurance Services has become a dynamic and intricate player in the automotive and home insurance market. The company has grown from 25 employees in one office to over 225 employees in 3 offices. In the early days the computer systems that were used were on a close network of networked computing...

Words: 1848 - Pages: 8

Free Essay

Is3220 Week 7

...access file servers If the user can access the file server using an IP address but not a name, then the most likely reason for failure to connect is a name resolution problem. Name resolution can fail for NetBIOS or DNS host names. If the client operating system is NetBIOS dependent, the VPN clients should be assigned a WINS server address by the VPN server. If the client operating system uses DNS preferentially, VPN clients should be assigned an internal DNS server that can resolve internal network host names. When using DNS to resolve internal network host names for VPN clients, make sure that these clients are able to correctly resolve unqualified fully qualified domain names used on the corporate network. This problem is seen most often when non-domain computers attempt to use DNS to resolve server names on the internal network behind the VPN server. 2. Users can't access anything on the corporate network Sometimes users will be able to connect to the remote access VPN server but are unable to connect to any resources on the corporate network. They are unable to resolve host names and unable to even ping resources on the corporate network. The most common reason for this problem is that users are connected to a network on the same network ID as the corporate network located behind the VPN server. For example, the user is connected to a hotel broadband network and is assigned a private IP address on network ID 10.0.0.0/24. If the corporate network is also on...

Words: 1569 - Pages: 7

Free Essay

Lab7

...packaged with Microsoft® Windows. You also researched public domain sites such as IANA’s WHOIS tool to obtain public domain information about the targeted website. Finally, you performed Google hacking research on the targeted organization’s e-commerce website to identify other shared information. Lab Assessment Questions & Answers 1. Which reconnaissance tool comes with Microsoft® Windows that can provide reconnaissance-gathering data and can be initiated from the DOS command prompt? What useful information does this query provide? name and the IP address associated with the source you are targeting. 2. What is the difference between ARIN, RIPE, and IANA? What regions of the world do these domain name registry organizations cover? The internet assigned numbers authority (IANA) delegates internet resources to the regional internet registries which are what ARIN (American Registry for Internet Numbers) and RIPE (Reseaux IP Europeens Network Coordination Centre) ARIN covers the United States, Canada, several parts of the Carribean and Antartica. RIPE covers Europe, Russia, the MIddle East, and central Asia. Assessment Worksheet 3. What other functions can be completed using the Sam Spade utility? 39 You can do Zone Transfers,...

Words: 918 - Pages: 4

Premium Essay

Network Dessign

...Problem Description: You are have been assigned the net block 72.128.30.0/23 by your ISP; to design a network for a small business wich consists on three sites: Site A 6 offices which need to support up to 30 hosts each. Site B 3 research labs with 25 hosts each. Site C 1 support office with 10 workstations. At site C you also have 14 servers behind a router/firewall. These servers are to be firewalled from internal as well as external hosts. Site A links to the ISP via a dedicated Serial Interface. Site A links to site B via a dedicated Serial Interface. Site B links to site C via a dedicated Serial Interface. 5 Routers with 8 100Mbps Ethernet interfaces Fa0/0 Fa0/1 Fa0/2 Fa0/3 Fa0/4 Fa0/5 Fa0/6 Fa0/7 and one serial interface Se0. 1 (and only one) Router/firewall with two 100Mbps Ethernet interfaces eth0 and eth1. Unlimited amounts of 100Mbit Manageable Fast Ethernet switches in the following sizes: 48 ports 24 ports 8 ports. Subnet/ address assignment Site A: 72.128.31.0/24 - supports 256 addresses (254 usable) 72.128.31.254 is bRouter address on this subnet ( interface fa0/0) 72.128.31.253 is Router1 address on this subnet ( interface fa0/0) 72.128.30.252 is a 8-port switch (Switch1) on this subnet 72.128.30.251 is a 48-port switch (Switch2) on this subnet 72.128.30.250 is a 48-port switch (Switch3) on this subnet 72.128.30.249 is a 48-port switch (Switch4) on this subnet 72.128.30...

Words: 865 - Pages: 4

Premium Essay

Network Design for Acme Manufacturing

...Running head: NETWORK DESIGN FOR ACME Network Design for Acme Manufacturing Learning Team A: [your team members] University of Phoenix Intro To WAN Technologies NTC/242 Acme Manufacturing Network Design Introduction As a network consultant hired by Acme Manufacturing, the company has asked Team A to develop a new networking design for their expanding business. The description below describes the key steps involved in developing a WAN for Acme Manufacturing. The company has six different buildings in six different locations throughout the world which need to be networked collectively. All the remote locations need to be able to communicate effectively with the main headquarters which is located in Atlanta, Georgia. The two buildings which house the headquarters are located across the street from each other. One building is used solely for corporate operations while the other building is used for staffing the sales and engineering department. Network Topology The best choice for the company would be to use a LAN with routers and Ethernet cables. This is a logical choice because the speeds of the network will be far superior and will help to reduce the total cost of the network. The three distribution buildings are located in Chicago, Phoenix, and New York. It is not feasible to run cabling to theses locations due to cost, so using T3 leased lines to communicate is the recommended method to connect the buildings with headquarters...

Words: 1444 - Pages: 6