Free Essay

Ip Chapter 2

In:

Submitted By aarecto
Words 2009
Pages 9
CHAPTER II
REVIEW OF RELATED LITERATURE AND RELATED STUDIES
Related Literature Adhesive is any substance that is capable of holding materials together in a functional manner by surface attachment that resists separation. “Adhesive” as a general term includes cement, mucilage, glue, and paste—terms that are often used interchangeably for any organic material that forms an adhesive bond. Inorganic substances such as portland cement also can be considered adhesives, in the sense that they hold objects such as bricks and beams together through surface attachment, but this article is limited to a discussion of organic adhesives, both natural and synthetic. (http://www.britannica.com/EBchecked/topic/5823/adhesive)
Fish glue is often made by heating the skin or bones of fish in water. It can also be made from part of the fish’s air bladder which, in the case of glue made from sturgeon, is called isinglass. Adhesives made from fish, as well as hide glue made from other animals, were sometimes used in ancient Egypt. They are still used in art, for shoe and furniture repair, and to preserve old manuscripts. Hide glue is typically manufactured from the skin of non-oily fish.
During medieval times in Europe, fish glue was often used to repair animal-based sheets called parchments, which were used for writing. It was also used in painting materials by some artists in China. Paintings and drawings were often coating with fish glue in the 1800s. While the glue by itself is typically brittle, it can be used along with other materials to restore paintings.
Artistic uses for fish glue include its application as a binder, glazing agent, or protective coating for paintings. The substance can also be used for building and repairing wooden antiques, as well as building new products. It doesn’t always hold a piece enough if gravity is pushing on it, so fish glue is sometimes used in combination with other types of glue when securing objects. Some manufacturers produce such glues that can last in a bottle for a couple of years before being used. (http://www.wisegeek.com/what-is-fish-glue.htm)
The jackfruit (Artocarpusheterophyllus or A. heterophylla) is a species of tree in the Artocarpus genus of the mulberry family (Moraceae). It is native to parts of Southern and Southeast Asia. It is the national fruit of Bangladesh, (locally called Kathal). The jackfruit tree is believed to be indigenous to the southwestern rain forests of India. It is widely cultivated in the tropical regions of Indian subcontinent, Vietnam, Thailand, Malaysia, Indonesia. Jackfruit is also found in East Africa e.g. in Uganda and Mauritius, as well as throughout Brazil and Caribbean nations like Jamaica. It is well suited to tropical lowlands, and its fruit is the largest tree-born fruit, reaching 80 pounds (36 kg) in weight and up to 36 inches (90 cm) long and 20 inches (50 cm) in diameter. The jackfruit tree casts a very dense shade. Heavy side branching usually begins near the ground.
Outside of its countries of origin, fresh jackfruit can be found at Asian food markets, especially in the Philippines. It is also extensively cultivated in the Brazilian coastal region, where it is sold in local markets. It is available canned in sugar syrup, or frozen. Dried jackfruit chips are produced by various manufacturers. In northern Australia, particularly in Darwin, Australia, jackfruit can be found at outdoor produce markets during the dry season. Outside of countries where it is grown, jackfruit can be obtained year-round either canned or dried. It has a ripening season in Asia of late spring to late summer.
All parts of the tree exude sticky white latex when injured. The latex contains resins that may have use in varnishes. The latex also has bacteriolytic value comparable to that of papaya latex. Additionally, the sticky latex is used for trapping birds (birdlime) and for insect traps. The heated latex can be used as glue for mending chinaware (a kind of whiteware known for its high strength and impact resistance and also for low water absorption – all deriving from the high glass content) and pottery and as caulking for boats and buckets. (Elevitch & Manner, 2006)
Flour is a powdery ingredient usually made from grinding wheat, maize, rye, barley or rice. As the main ingredient in bread, it is one of the most common and sought-after ingredients in the world.
White flour, otherwise known as plain flour, contains about 75 percent of the wheat grain, with most of the bran and wheat germ taken out. It is commonly used for cakes, pastries and biscuits. When used in cakes it is combined with a raising agent such as baking powder or bicarbonate of soda. It is also used in quick breads like soda bread, producing a more densely textured loaf. White flour is usually artificially whitened but you can buy an unbleached variety if you prefer which is an off-white color. (www.bbcgoodfood.com/glossary/flour) Related Studies According to an experimental research entitled “Jackfruit Sap as one of the Additive Components in Making Glue” conducted by Abaño, et al (2010), jackfruit sap can be used in making glue. The materials used were graduated cylinder, weighing scale, stirring rod, empty containers, 25mL hot water, 10g of white flour and 10mL jackfruit sap. The researchers prepared this by first mixing the white flour and the hot water. After stirring the mixture, the jackfruit sap was stirred in. Afterwards, the mixture was put into an air-tight container and kept for a week. After a week, the mixture was hardened; it was softened by mixing it in hot water. The results were that it is dirty white in color and very sticky in terms of its adhesiveness. Even materials that are a little heavier can be held by this glue, not just paper and cardboard. Its odor is also good due to the latex which does not have any smell at all. The difference of this research from the present study is that the researchers will also be using fish scales and fish bones as materials in making the glue. The similarity of this study to the current study is that the team will be using jackfruit sap also called as latex and will be making glue like the past research.
According to an experimental research entitled “The Acceptability of Fish Bone as Candy” conducted by Basco, et al (2010), fish bone can be used in making candy. The materials used were graduated medium sized pan, pastry brush, prepared molds, tape or twist ties, plastic wrap, ¾ cup fishbone, one cup sugar and three tablespoons water. The researchers prepared this by first boiling the fish bones in a pot of boiling water. After boiling for five minutes, the fish were removed, cooled and then dried by putting it inside the oven for five minutes. Meanwhile, the sugar and water are mixed in a pan over medium heat, continually stirring. Any sugar that clung to the sides of the pan are dissolved using a pastry brush dampened with water. Then, the grinded fish bones are added to the sugar solution. Glucose and flavoring is added for better appearance and flavor. After five minutes, the pan is removed from the flame and left to cool for two minutes. The solution is then placed into prepared molds and cooled until it is hard. The candies are placed into plastic and/or cellophane and sealed with twist ties and/or tape. The outcome of the experimental research was that it was very good with an overall rating of 4.25 out of 5. The odor, taste, smoothness, and hardness were scored 4.47, 4.33, 4.2, and 3.9, respectively. The researchers based the results from the answers of different respondents to their questionnaires. The alteration of this research from the present study is that the researchers will be using fish scales and fish bones as well as jackfruit latex. Another is that they will be making glue out of these materials, not candy. The similarity of this study to the current study is that the team will be using fish bones as an ingredient similar to the former investigation.
According to an investigatory project by Mauricio et. al., discarded chicken leg bones can be utilized to make glue.
The researchers made their product using discarded chicken bones, muriatic acid to make the pounding of the bones easier, calamansi which can be used as an alternative if muriatic acid is not available, mortar and pestle, and stockpot where the bones will undergo heating processes. First, they washed the bones and removed leftover meat. Then, they submerged the bones in calamansi/muriatic acid. After 24 hours, the bones were washed again. After that, they boiled some water and put the bones in the pot. The mixture was boiled for 15-20 minutes until the juice of the bones mixed with the water and a thick mixture was attained which will now serve as the glue. The product was now tested by the researchers on seven different materials, namely onion skin paper, common bond paper, oslo paper, cartolina, folder, illustration board and popsicle sticks. According to the results, the bone glue's efficiency decreases through time.
Its efficiency depends on the time it was given left to settle. The less time it was given, the more effective the glue gets.
Both the studies aim to make glue out of commonly discarded materials. However, the past researchers used discarded chicken bones while the present researchers will use discarded fish bones, flour and jackfruit.
According to an investigatory project proposal entitled “The Feasibility of Jackfruit Peeling toWhiteware Plastic Mass”, jackfruit peelings can be used as a binder to whiteware plastic mass.
The materials and equipment used are jackfruit peelings, standard whiteware plastic mass powder, spatula, glass panel, tap water, strainer, graduated cylinder, measuring cups, beaker, rectangular molder, container, blender, weighing scale and analytical balance. The researchers prepared this by first preparing the jackfruit peeling as binder. They first utilized the peelings then grinded it in the blender. After a minute the researchers add water to form a paste from the peeling. To obtain size of the small particles, the researchers placed and stored it in a bottle. After that they stored it in a refrigerator, ready to be used as a binder. For the preparation of the A volcano was formed from the Standard Whiteware Plastic Mass powder. For the treatment using jackfruit pulp as binder, jackfruit pulp will be gradually added to the volcano until the mixture hardens (clay-like state). Same will be done using water only as binder. Treatment A& C will be made earlier than treatment B & D since we are aiming to came up with an aged plastic mass. After the two preparations they test it using two different treatments (water and jackfruit pulp).
The similarities of this research to the present study are that the jackfruit as well as its latex will be used as glue together with fishbone and fish scale. The alteration or difference of this study to the current study is that the jackfruit will be used as glue and not as a binder. Also, its peelings will not be used

Definition of Terms
Adhesive - any substance applied to the surfaces of materials that binds them together and resists separation.
Collagen - the main structural protein of the various connective tissues in animals.
Glue - a substance used to stick things tightly together.
Latex - a milky fluid found in many plants, such as poppies and spurges, which exudes when the plant is cut and coagulates on exposure to the air.
Resin - a sticky flammable organic substance, insoluble in water, exuded by some trees and other plants.
Sap - the fluid, chiefly water with dissolved sugars and mineral salts, which circulates in the vascular system of a plant.
Whiteware - a class of ceramic products that include porcelain, china, pottery, earthenware, stoneware, and vitreous tile, are usually but not necessarily white, and consist typically of clays, feldspar, potter's flint, and whiting.

Similar Documents

Premium Essay

Nt2640

...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics...

Words: 2573 - Pages: 11

Premium Essay

Nt 1210

...Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition...

Words: 4400 - Pages: 18

Premium Essay

Notes of Unit 1. Chapter 1. Nt1230

...CHAPTER 1 Introduction to Networking Objectives Upon completion of this chapter, you should be able to answer the following questions: ■ What are the requirements for an Internet connection? What are the major components of a personal computer (PC)? What procedures are used to install and troubleshoot network interface cards (NICs) and modems? What basic testing procedures are used to test the Internet connection? What are the features of web browsers and plug-ins? ■ What are the Base 2, Base 10, and Base 16 number systems? How do you perform 8-bit-binary-to-decimal and decimal-to-8-bit-binary conversions? How do you perform simple conversions between decimal, binary, and hexadecimal numbers? How are IP addresses and network masks represented in binary form? How are IP addresses and network masks represented in decimal form? ■ ■ ■ ■ ■ ■ ■ ■ Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary: Internet page 4 page 4 parallel port serial port page 10 page 10 enterprise network Internet service provider (ISP) page 6 personal computers (PCs) page 7 page 8 mouse port page 10 keyboard port page 10 Universal Serial Bus (USB) port expansion slots page 10 page 11 page 10 central processing unit (CPU) random-access memory (RAM) page 9 disk drive page 9 hard disk page 9 network interface card (NIC) video card page 11 input/output devices (I/O) page 9 motherboard memory chip page...

Words: 22727 - Pages: 91

Premium Essay

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...

Words: 22068 - Pages: 89

Premium Essay

Advanced Routing

...netfilter. Linux Advanced Routing & Traffic Control HOWTO Table of Contents Chapter 1. Dedication.........................................................................................................................................1 Chapter 2. Introduction ......................................................................................................................................2 2.1. Disclaimer & License.......................................................................................................................2 2.2. Prior knowledge................................................................................................................................2 2.3. What Linux can do for you...............................................................................................................3 2.4. Housekeeping notes..........................................................................................................................3 2.5. Access, CVS & submitting updates..................................................................................................3 2.6. Mailing list........................................................................................................................................4 2.7. Layout of this document...................................................................................................................4 Chapter 3. Introduction to iproute2..................................................

Words: 28706 - Pages: 115

Premium Essay

Cp3002

...Tutorial/Practical 2 (Week 3) – CP3302/CP5603 Remarks: • This tutorial/practical consists of some tutorial-type questions that are chosen from ‘Review Questions’ in Chapters 2 and 3 of the textbook, as well as some practical-type questions that are chosen from: Michael E. Whitman and Herbert J. Mattord, Hands-On Information Security Lab Manual, (third edition), Course Technology, Cengage Learning, USA, 2011. • This tutorial/practical may not be completed in the scheduled practical session for this subject. So you are strongly recommended to complete it in your own time (note that students are expected to work 10 hours per week on this subject, including 3 hours of contact time). • Due to security issues, you may not be allowed to practise all commands and programs of the practical-type questions with the university’s computers. So, interested students are encouraged to do this section on their own computers (if available). You will not be assessed for utilities/commands that cannot be practised on university computers. 1. (Review Question 1 – Chapter 2) Why is information security a management problem? What can management do that technology cannot? 2. (Review Question 2 – Chapter 2) Why is data the most important asset an organization possesses? What other assets in the organization require protection? 3. (Review Question 3 – Chapter 2) Which management groups are responsible for implementing information security to protect the organizations ability to function? 4. (Review Question...

Words: 3431 - Pages: 14

Free Essay

Student Ccna Syllabus

...SYSTEMS NETWORKING Academy CCNA 2 Chapter 1 WANs and Routers One major characteristic of a wide-area network (WAN) is that the network operates beyond the local LAN's geographic scope. It uses the services of carriers, such as regional Bell operating companies (RBOCs), Sprint, and MCI. WANs use serial connections of various types to access bandwidth over wide-area geographies. By definition, the WAN connects devices that are separated by wide areas. WAN devices include the following: • • • • • • Routers, which offer many services, including internetworking and WAN interface ports Switches, which connect to WAN bandwidth for voice, data, and video communication Modems, which interface voice-grade services and channel service units/digital service units Channel service units/data service units (CSUs/DSUs) that interface T1/E1 services and Terminal Adapters/Network Termination 1 (TA/NT1s) TA/NT1s that interface Integrated Services Digital Network (ISDN) services Communication servers, which concentrate on dial-in and dial-out user communication Concept Questions 1. A WAN is used to interconnect local-area networks (LANs) that are typically separated by a large geographic area. A WAN operates at the OSI reference model physical and data link layers. The WAN provides for the exchange of data packets/frames between routers/bridges and the LANs that they support. Draw a WAN that includes three LANs. 1 of 116 CCNA 2 Chapter 1 WANs and Routers 2. Compare and contrast WANs and LANs...

Words: 23437 - Pages: 94

Premium Essay

Nt1210 Final Exam Notes

...NT1210 Introduction to Networking Final Exam Notes Bonus questions from lab work: Chapter 1 12-13 15 Chapter 2 48 Chapter 3 62 Chapter 4 86 Chapter 6 132 Chapter 8 148 Chapter 9 165 Chapter 10 177 Textbook questions: Page Note 4 Byte – 8 bits 84 Essentially, link refers to any cable between two devices, and node refers to any device. 77 HTTP, the Hypertext Transfer Protocol, defines the rules by which a web browser can ask for a web page from a web server, and the rules a web server uses to send the web page back to the web browser. 107 Every standard has two important features on which this book will focus. First, a standard documents ideas. Those ideas are the ideas that matter to anyone creating products to put in a network, or ideas that matter to people building a network. 107 Beyond the ideas in a standard, people must agree to a particular version of document. 110 The TCP/IP model organizes its standards into layers. The layers make TCP/IP easier for humans to understand what TCP/IP does. It also makes it easier to divide the work among different products. * - write protocols, - create standards, - how networks work* 162 Simple Direct Current Circuit Using a Battery Current 169 Encoding scheme – In networking, the encoding scheme defines the electrical equivalent: the electricity that means a 1 or a 0. *Interpreted between nodes.* 171 With full duplex, both endpoints can send at the same time, enabled...

Words: 1336 - Pages: 6

Free Essay

Nt 2640 Unit 1 Summary

...Unit 1 Summary: Chapters 1,2,3,4 Chapter 1 – The TCP/IP and OSI Networking Models: * A network model sometimes also called either a networking architecture or networking blueprint refers to a comprehensive set of documents used to describe the functions of a network as a whole * The international organization for standardization (ISO) took on the task to create such a model, starting as early as the late 1970’s beginning work on what would become known as the open systems interconnection (OSI) networking model. * IP defines addresses for several important reasons. First each device that uses TCP/IP needs a unique address so that it can be identified on the network and IP also figures out how to group addresses together. * The term IP host refers to any device, regardless of size or power that has an IP address and connects to any TCP/IP network * The Current OSI Model: 1. Application 2. Presentation 3. Session 4. Transport 5. Network 6. Data Link 7. Physical Chapter 2 – LAN Fundamentals: * File Sharing: Each computer can be configured to share all or parts of its file system so that the other computers can read, or possibly read and write, the files on another computer. * File Transfers: A computer could install a file transfer server, thereby allowing other computers to send and receive files to and from that computer. * The term collision domain defines the set of devices whose frames could collide * Broadcast...

Words: 483 - Pages: 2

Premium Essay

Computer

...THEORY The correct answer(s): D What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP Novell-ether is the default LAN encapsulation. Novell-ether is 802.3. The correct answer(s): A What must be true for two Routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP For two routers to exchange IGRP routes they must be configured with the same autonomous system number. The correct answer(s): C The following is partial output from a routing table, identify the 2 numbers in the square brackets; '192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' A.) 100 = metric, 1300 = administrative distance B.) 100 = administrative distance, 1300 = hop count C.) 100 = administrative distance, 1300 = metric D.) 100 = hop count, 1300 = metric The first number is the Administrative distance and the seconds number is the metric. In this case it is an IGRP metric. The correct answer(s): A B C Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's Routing loops can be prevented by split horizon, poison reverse and holddown times. The other two choices relate to Link State. The correct answer(s): A Which statement is true regarding full duplex? A.) Allows for transmission and receiving...

Words: 23850 - Pages: 96

Premium Essay

Ccna

...Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing July 2007 Library of Congress Cataloging-in-Publication Data Empson, Scott. Portable command reference / Scott Empson. -- 2nd ed. p. cm. ISBN 978-1-58720-193-6 (pbk.) 1. Computer networks--Examinations--Study guides. 2. Internetworking (Telecommunication)--Examinations--Study guides. 3. Electronic data processing personnel--Certification. I. Title. TK5105.5.E4352 2007 004.6--dc22 2007023863 ISBN-13: 978-1-5872-0193-6 ISBN-10: 1-58720-193-3 Warning and Disclaimer This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss...

Words: 64092 - Pages: 257

Free Essay

Ccnp Bsci 642 901

...Routing CCNP BSCI Quick Reference Sheets Exam 642-901 BGP IP Multicast IPv6 Introduction Brent Stewart Denise Donohue ciscopress.com [2] ABOUT THE AUTHORS CCNP BSCI Quick Reference Sheets About the Authors Brent Stewart, CCNP, CCDP, MCSE, Certified Cisco Systems Instructor, is a network administrator for CommScope. He participated in the development of BSCI, and has seperately developed training material for ICND, BSCI, BCMSN, BCRAN, and CIT. Brent lives in Hickory, NC, with his wife, Karen and children, Benjamin, Kaitlyn, Madelyn, and William. Denise Donohue, CCIE No. 9566, is a Design Engineer with AT&T. She is responsible for designing and implementing data and VoIP networks for SBC and AT&T customers. Prior to that, she was a Cisco instructor and course director for Global Knowledge. Her CCIE is in Routing and Switching. © 2007 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 73 for more details. [3] ICONS USED IN THIS BOOK CCNP BSCI Quick Reference Sheets Icons Used in This Book Si Router 7507 Router Multilayer Switch with Text Multilayer Switch Communication Server Switch I DC Internal Firewall IDS Web Browser Database App Server © 2007 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 73 for more details. [4] CHAPTER 1 CCNP BSCI Quick Reference Sheets The Evolving Network Model ...

Words: 24928 - Pages: 100

Premium Essay

Alksdjf

...Portable Command Guide, Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing July 2007 Library of Congress Cataloging-in-Publication Data Empson, Scott. Portable command reference / Scott Empson. -- 2nd ed. p. cm. ISBN 978-1-58720-193-6 (pbk.) 1. Computer networks--Examinations--Study guides. 2. Internetworking (Telecommunication)--Examinations--Study guides. 3. Electronic data processing personnel--Certification. I. Title. TK5105.5.E4352 2007 004.6--dc22 2007023863 ISBN-13: 978-1-5872-0193-6 ISBN-10: 1-58720-193-3 Warning and Disclaimer This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising...

Words: 64092 - Pages: 257

Free Essay

Traffic Modeling

...Cisco Unified Presence Deployment Guide Release 6.0(1) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Customer Order Number: Text Part Number: OL-12732-02 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS...

Words: 13683 - Pages: 55