Free Essay

Lan Report

In:

Submitted By lanhua
Words 1302
Pages 6
Plant Type
Normal Conditions (21oC)
With Heater
With Fan (21oC)
With Lamp (21oC)

(27oC)

Arrowhead 3.6mL 6.6mL 7.5mL 4.0mL
Coleus
0.9mL 3.9mL 6.0mL 3.0mL
Devil’s Ivy 2.9mL 4.1mL 4.6mL 3.0mL
Dieffenbachia
4.1mL 6.0mL 7.7mL 3.9mL
English Ivy 1.8mL 3.2mL 5.1mL 2.1mL
Geranium
1.2mL 5.8mL 4.7mL 2.4mL
Rubber Plant 4.9mL 6.8mL 8.4mL 4.3mL
Weeping Plant 3.3mL 4.9mL 6.1mL 2.5mL
Zebra Plant 4.2mL 6.1mL 7.6mL 3.2mL
2. Transpiration is the process of moisture carried through plants from roots to small pores on the bottom side of leaves, where it changes to vapor and is released to the atmosphere. In our experiment, transpiration is the passage of watery vapor from a living plant through a membrane or pores.
3. If the air flow is directed onto the upper surface, then the transpiration rate would be smaller compared to the original result.
4. Light and fan variables would lose the most mass through transpiration and the fan and mist variables would lose the least amount, with room condition in the middle. Light and fan variables lost the most amount of mass because sunlight promote photosynthesis to occur and wind causes the emission of water to occur due to a lower water potential outside the flower. The dark and mist variables lost the least amount of mass because transpiration was kept to a minimum due to lower water potential in the plant and no need to follow through with photosynthesis. The room condition remained in the middle of the mass loss because it was the constant variable and there were no influences for or against transpiration, allowing the natural rate of transpiration to take place. The room condition remained in the middle of the mass loss because it was the constant variable and there were no influences for or against transpiration, allowing the natural rate of transpiration to take place.
5. The rubber plant that I tested had the highest transpiration rate. Each species of plant has a transpiration rate ideal for its domestic environment. Higher transpiration rates may be indicative of a wetter climate, while lower transpiration rates may be used to conserve water in places like a desert where rainfall is minimal.
6. Water moves from the xylem into the mesophyll cells, evaporates from their surfaces and leaves the plant by diffusion through the stomata.
7. The roots have two main functions, to anchor the plant in the soil and to meet the water requirements of the leaves. Almost all the water that a plant takes from the soil enters through the younger parts of the root. Absorption takes place directly through the epidermis of the root, largely in the region of root hairs.
8. Closing the stomata prevents water from evaporating. This means the plant can get by on less water because it isn't wasted. The disadvantage of closing the stomata cuts off the supply of CO2 from the air and traps oxygen inside the leaf. This prevents the plant from doing photosynthesis. A typical solution to this problem is for the plant to separate photosynthesis into two processes that can be carried out at different times. During the day the plant stores energy from light in a temporary form. At night it opens the stomata and uses that energy to fix CO2.
9. a. The cuticle is a waterproof epidermal layer that blocks water loss. The plant will have a cuticle thickness proportionate to their habitat's aridity.
b. Guard cells open and close the stomatal pore with the aid of the surrounding cells, which movements are driven by the changing turgidity of the cells. When opening, the potassium- and sugar-content of the guard cells increase, what results osmotic water uptake and so the swelling of the cells. They also regulates the size of stomata. This in turn regulates the amount of water loss, oxygen and carbon dioxide exchange in plant leaf.
c. Trichomes may serve a variety of functions; they may form a pubescence on the surface or serve the function of secretion (glandular hairs). They also discourage predation. To sum up, their functions are expansion of the boundary layer, retardation of water loss, control of heat exchange, light piping, storage of secondary compounds, secretion and protection.

10. found in stems - collenchyma thin-walled, many-sided cells - parenchyma dead at maturity - sclerenchyma contain lignin - sclerenchyma thick-walled, irregularly shaped - sclerenchyma photosynthetic cells - parenchyma
11. There is usually many more under the leaf than that on top. Many plant species have none on the top surface. In majority of grasses the number is equal on both the surfaces. There is hardly any plant with greater number of stomata on the upper surface of its leaf .
12. Transpiration remains in effect after the flower has been cut from the parent plant. Thus, water in the xylem is pulled up the remaining stem, and it is not replaced. By cutting off a portion of the remaining stem, a transpirational stream re-established , and thus the flower wilts at a reduced rate, in effect “apparently” living longer. Therefore, one needs to make the cuts under water to re-establish the stream.
13. vessel elements are the conducting cells of the xylem, they have elaborate secondary-wall thickenings and lose their cytoplasm at maturity; that is, they are dead when functional. Tracheids overlap each other, whereas vessel elements have open end walls and are arranged end to end to form a larger unit called a vessel.
14. A negative water potential gradient causes water and minerals to move in xylem.
15. The mechanism of sugar from sources to sinks, is called pressure flow. At the sources, sugar molecules are moved into the phloem cells through active transport. First step is sugars are loaded into sieve tube elements, creating a high concentration of solutes. Second step, water enters the sieve tube elements by osmosis. Third step is the movement of water and carbohydrates through the sieve tube elements toward a sugar sink. Last step is sugars are removed from cells at sugar sink, keeping the concentrations of sugars low.
16. The cohesion-tension theory, first described by Dixon and Joly in 1894, describes the manner in which water moves upward through a plant against gravity. Water exists in a continuous "column" from the trees down to the roots and can be put under tension just like a rope that is holding a weight.
Water has strong coheisive and adhesive properties. Cohesion is one water molecule clinging to another through hydrogen bonding, adhesion is one water molecule clinging to something else like the cell wall. These two forces are responsible for capillary action and can actually cause water to move up a tube with-out any other force exerted, however xylem cells are too big and too numerous to transport water this way.
As water evaporates from small pores in the leaves, the cohesion of that molecule to the one behind it pulls that next molecule to where it was, this action is translated down through the water column of the entire plant. In effect water is pulled up the plant by the suction caused by water evaporating. This movement can be defined as bulk flow.
Root pressure and osmosis have little to do with the cohesion-tension theory of water movement. Root pressure is hypothesized to refill xylem cells in spring and to reestablish the water column. Root pressure is created by root cells creating an osmotic gradient that forces water up the tree instead of it being pulled up the tree. Root pressure exerts a positive pressure while the cohesion-tension theory of water movement is accomplished under negative pressure.

Similar Documents

Premium Essay

Lan Report - Dna Biochem

...ASSIGNMENT 1: PROPERTIES OF DNA/RNA Introduction: The polymerase chain reaction is an innovative technology, which amplifies a single piece of DNA across several orders of magnitude. The end result is the creation of thousands to millions of copies of a particular DNA sequence. PCR is closely patterned after the natural principle of DNA replication. It is a three-step process, referred to as a cycle, that is repeated a specified number of times. One PCR cycle consists of the following steps: * Denaturation * Annealing * Extension This process takes place in a thermal cycles, usually between 30 and 40 cycles. In the initial step, heat (usually hotter than 90 degrees Celsius) separates double-stranded DNA into two single strands. This process is called "denaturation." Denaturation is possible because the hydrogen bonds linking the bases to one another are weak. The hydrogen bonds break at high temperatures, whereas the bonds between deoxyribose and phosphates, which are stronger covalent bonds, remain intact. The goal of PCR is not to replicate the entire strand of DNA but to replicate a target sequence of approximately 100-600 base pairs unique to the organism being studied. Targeting the sequence is achieved by using primers. They are specific for the target region of the organism. Two primers are included in the PCR, one for each of the complementary single DNA strands that was produced during denaturation. The primers that anneal or in other...

Words: 2325 - Pages: 10

Free Essay

Information System Breakdown Response Procedures

... - computer server; - computer hardware; - computer software; - computer network (wireless/ local area network (LAN)); - internet system; - email system; - PABX/ telephone system; - fax machine; - photocopy machine; - printers (associated with photocopy machine); - scanner (associated with photocopy machine). 1.0 Reporting ICT Breakdown 1.1 Whenever there is breakdown encountered to any of the ICT in the office, the staff in charge shall complete the ICT Breakdown Report which to include clearly the ICT Name, Model No./ Serial No., Location, Breakdown Date and Time, Nature of Breakdown and refer by faxing/ handing over as soon as possible to the following personnel authorised to attend to the breakdown. 1. Refer to IT Technician for breakdown of, - computer hardware; - computer software; - computer network (wireless/ local area network (LAN)); - internet system; - email system; 1.1.2 Refer to Admin Manager for breakdown of, - PABX system/ telephone system; - fax machine; - photocopy machine; - printers (associated with photocopy machine); - scanner (associated with photocopy machine). 2.0 Investigation of Cause and Rectification 2.1 For any breakdown report for items 1.1.1 as soon as received from ICT user, the IT Technician shall attend to the reported breakdown within 30 minutes from the...

Words: 827 - Pages: 4

Premium Essay

Formal Proposal

...INCORPORATING WIRELESS INVENTORY SCANNERS THROUGHOUT WAREHOUSE Prepared for Professor April 5, 2014 Letter of Transmittal Board Members 1234 Martin Luther King Dr. Killeen, TX 76543 USA Dear Members of the Board and Fellow Employees: Here is my report, highlighting the recommendations that should implement a wireless inventory scanning process throughout our warehouse. This report provides detailed information regarding the significant impact that this wireless network will have on control cost and inventory productivity. My research indicates that implementing a wireless inventory scanning network will drastically improve on control cost and inventory productivity across the board for all involved. It will benefit our inventory clerks by making their working hours more productive and decrease the amount of time needed to manually count the inventory. This will allow for a seamless flow of data from our warehouse location to our store shelves to allow for a more productive selling advantage. Also, it will drop maintenance cost to a minimum by incorporating our own in house IT personnel to maintain the network without having to outsource any maintenance personnel. For these benefits, I encourage you to approve of this upgrade in our inventory process. It will benefit our organization in many ways and improve employee morale. If you have any questions or suggestions, I would be glad to answer them for you. Sincerely, Contents LIST...

Words: 2039 - Pages: 9

Free Essay

It241

...used to do the heavy lifting of any network needs. Also this allows an integration of a LAN to be merged openly with the layout of the WLAN when or if necessary. Deployment Scenario Rationale While taking in the consideration of limitations on the physical side. The floor plan inside the Call Center allows WAP to be covered and access the other ones that maybe outside one another. In any area that won’t be high regard for security or even be mobile wire can be used for connections this way the wireless can still connect and the two can communicate. Hardware Components • Component Name: AP o Rationale for using component: to provide coverage wirelessly through out the entire are to be covered. o Rough cost estimate: around $100.00 and above depending on what is to be used • Component Name: switch o Rationale for using component: allows all AP’s to be connected o Rough cost estimate: $50.00 and up • Component Name: Cables o Rationale for using component: restrict access to what is not need to have and to gain access to network. o Rough cost estimate: $5.00 and up depending on length and so on. Insert bullets for additional components IEEE Wireless Network Type Apex Designs has identified that an 802.11n LAN will be implemented. Access Point Management Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location...

Words: 334 - Pages: 2

Premium Essay

House

...Roxbury Community College ITS Job Description Job title: Senior Network Engineer Department: Information Systems Office location: Boston, MA Reports to: Director of Network & Security Description The Senior Network Engineer’s role is to ensure the stability and integrity of in-house storage, virtualization, data, and wireless network services. In addition, the Network Engineer is responsible for the configuration, installation, monitoring, maintenance, upgrade patching and associated troubleshooting of Roxbury Community College systems and network infrastructures. This individual will also analyze and resolve network hardware and software problems in a timely and accurate fashion, and provide end user training where required. Responsibilities Performs daily network maintenance and management of network resources including servers, storage, virtualization, routers and switches Deploy company LANs, WANs, and wireless networks, including servers (rack and blade), storage, routers, switches, and other hardware Configure networks and systems to ensure their smooth and reliable operation for fulfilling business objectives and processes Monitor performance and troubleshoot problem areas as needed Create and maintain documentation as it relates to network configuration, systems, processes, and service records Ensure network connectivity of all servers, workstations, telephony equipment, and other network appliances Conduct research on network products...

Words: 467 - Pages: 2

Premium Essay

Test

...Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving...

Words: 18577 - Pages: 75

Free Essay

Werfwtwe Er Q

...Progress Report Supervisor: Hussam Jamal & Mohammad Alwan At IT Services with Unilever Project Name | Status | Description | Re locate Data cable and STC DP | Finished | Relocating the main STC data circuit distributed points from one location to another. That will require moving all the critical MPLS and IP VPN circuit with minimum downtime possible.To accomplish that, we should re-pulling new cables and isolate place with label every connectionDowntime was 15 MinutesNumbers of circuits:1 x MPLS4 X IP VPN35 X Telephone lines | Clean and organize server room | In Progress | Head Office Server room last organize was before 10 years, challenge was to clean and organize all the patch cords and cables with zero downtime.This is the active server room organizing projectNumbers of Racks= 5 Number of Patch Panel= 25 | Connection Documentation, Design layout | Not Started | Building High level design with all L2 and L3 information.Create backup configuration library for network devices in server room | Refurbishment Project Phase 2 | Finished (Following) | Refurbishment project to the entire building including IT infrastructure: * Wireless LAN * LAN * IP Telephone * Switches * Desk Top setupThe roll was to lead all moving and setup activity, and assure of service delivery on the entire building | Description of the accomplished...

Words: 701 - Pages: 3

Free Essay

Final

...can be picked up by any node that has the ability to receive wireless signals through a wireless network interface card. o Rough cost estimate: $100 • Component Name: Switches o Rationale for using component: Give the ability to expansion of a WLAN o Rough cost estimate: $250 • Component Name: Cables o Rationale for using component: The access point is connect to wired network with cables to give wireless access o Rough cost estimate:$10 IEEE Wireless Network Type Apex Designs has identified that an 802.11n LAN will be implemented. Access Point Management Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location rather than to be configured separately for each access point. Location of Wireless Devices Network Performance Impediment Report (overview of floor plan and possible impediments) This floor doesn’t need a lot of attention. The microwave and the vending machines in one of the rooms could affect the network performance. WLAN operates by RF same as the microwave and the vending machines. This is a...

Words: 503 - Pages: 3

Free Essay

Radio Frequency (Rf) Interference Analysis and Optimization

...Radio Frequency (RF) Interference Analysis and Optimization By Farhana Jahan ID: 061-19-342 Md. Rafiqul Islam ID: 061-19-370 Md. Mohibul Hasan ID: 061-19-373 A thesis report presented in partial fulfillment of requirements for the degree of Bachelor of Science in Electronics and Telecommunication Engineering Supervised by Mohammed Humayun Manager (Network Department) ADVANCED DATA NETWORKS SYSTEM LIMITED Red Crescent Concord Tower (19th floor) 17, Mohakhali Commercial Area, Dhaka-1212 Department of Electronics and Telecommunication Engineering DAFFODIL INTERNATIONAL UNIVERSITY October 2009 i APPROVAL PAGE This thesis titled „Radio Frequency (RF) Interference Analysis and Optimization‟, Submitted by Md. Rafiqul Islam, Md. Mohibul Hasan and Farhana Jahan to the Department of Electronics and Telecommunication Engineering, Daffodil International University, has been accepted as satisfactory for the partial fulfillment of the requirement for the degree of Bachelor of Science in Electronics and Telecommunication Engineering and approved as to its style and contents. The presentation was held on 19th October 2009. Board of Examiners Mr. Golam Mowla Choudhury Professor and Head Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Chairman) Dr. M. Lutfar Rahman Dean & Professor Faculty of Science and Information Technology Daffodil International University ---------------------(Member) A K M Fazlul...

Words: 18928 - Pages: 76

Free Essay

Networking

...Solution | Healthcare Network Allied Telesis Healthcare Network Construction Guidebook Contents Healthcare Network Solution | Introduction Outline of a Healthcare Network Importance of the network Main requirements in designing a healthcare network Non-stop Network Network bandwidth and QoS (Quality of Service) Data capacity Network bandwidth and cost of LAN devices QoS (Quality of Service) Redundancy and proactive measures to overcome network failures Core switch redundancy Comparison of redundancy of communication Loop protection Secure and Reliable Network Security Importance of security: both physical and human factors Threats to network security Network authentication External network (Internet) connection Inter-regional cooperative healthcare network Effective use of Wireless LAN Security in Wireless LAN Install and operation of Wireless LAN Ease of Operation Critical issues for network operation SNMP (Simple Network Management Protocol) Measures against system failures; device failures, incorrect wiring Use of SNMP IPv6 Network Configuration Example Network configuration for hospitals with fewer than 100 beds Network configuration for hospitals with more than 100 and fewer than 200 beds Network configuration for hospitals with more than 200 beds (i) Network configuration for hospitals with more than 200 beds (ii) 3 4 4 5 7 7 7 8 9 10 10 11 12 13 13 13 14 15 19 20 21 21 22 23 23 24 24 25 26 27 28 30 32 34 2 | Healthcare Network Solution Healthcare Network...

Words: 8999 - Pages: 36

Free Essay

Fair and Responsible Use of Wireless Lan Technology

...Issue Specific Security Policy Title: Fair and Responsible Use of Wireless LAN Technology Classification: Internal Use Only Statement of Policy This policy addresses fair and responsible use of Acme’s wireless local area network (WLAN) technologies. This includes but is not limited to hardware, software and protocols associated with WLANs. It is intended for authorized users within the Acme enterprise. Authorized users are defined as anyone who has been granted approval to access Acme information and information systems. This includes employees and contingent workers. Authorized users are expected to understand and comply with the contents of this document. Appropriate Use Laptop users are permitted, with prior management approval, to use Acme’s internal WLAN solution. The WLAN should be used only when a wired network solution in unavailable or inappropriate for a particular situation. To ensure appropriate protection of privacy, all wireless transmissions will be secured utilizing strong mutual authentication and encryption. When establishing a connection to a public hotspot or WLAN within your home, a VPN connection must be established and used in conjunction with an Acme approved personal firewall solution. Only Acme approved WLAN technologies are permitted within the enterprise. Use of non-standard hardware, software and protocols is strictly prohibited. Systems Management It is the responsibility of the Network Administrator, for Acme’s WLAN, to...

Words: 472 - Pages: 2

Free Essay

Ilab 5

... 1. Chanalyzer_Installer.3.4.msi: Installation program that installs Chanalyzer on your computer 2. Capture1.wsr: First, capture file for analysis 3. Capture2.wsr: Second, capture file for analysis 4. Capture3.wsr: Third, wireless capture file for analysis 5. Capture4.wsr: Fourth, wireless capture file for analysis 3. Install the Chanalyzer spectrum analysis program by double-clicking on the Chanalyzer_Installer.3.4.msi file. 4. Start the Chanalyzer. Once the Chanalyzer is running, open the first capture file, Capture1.wsr, and let the recording run for a few minutes. Using this capture, answer the following questions in your lab report. Question 1: Are any channels being used that overlap other channels? Question 2: If you had to install a new wireless LAN, what channel would you use? 5. Close Capture1.wsr and open the file Capture2.wsr. Let the recording run for a few minutes. Using this...

Words: 855 - Pages: 4

Free Essay

Netw360

... 1. Chanalyzer_Installer.3.4.msi: Installation program that installs Chanalyzer on your computer 2. Capture1.wsr: First, capture file for analysis 3. Capture2.wsr: Second, capture file for analysis 4. Capture3.wsr: Third, wireless capture file for analysis 5. Capture4.wsr: Fourth, wireless capture file for analysis 3. Install the Chanalyzer spectrum analysis program by double-clicking on the Chanalyzer_Installer.3.4.msi file. 4. Start the Chanalyzer. Once the Chanalyzer is running, open the first capture file, Capture1.wsr, and let the recording run for a few minutes. Using this capture, answer the following questions in your lab report. Question 1: Are any channels being used that overlap other channels? Question 2: If you had to install a new wireless LAN, what channel would you use? 5. Close Capture1.wsr and open the file Capture2.wsr. Let the recording run for a few minutes. Using this...

Words: 855 - Pages: 4

Premium Essay

Sitnefit

...| Network Administrator | Memo To: John Smith From: Felix Pino CC: Richard Pierce Date: 4/27/2015 Re: Site Survey Benefits Dear Sir, It has come to my attention that we have not been allocated time and money to do a proper site survey. I feel this is a detrimental path for your new system. A site survey is the precursor to a successful wireless network implementation. Like with many things, upfront planning and documentation facilitates the smooth deployment of the new network. With a site survey an engineer completes the physical check and identifies the best locations for the wireless access points, then creates a site report. The throughput of the access points is then fine-tuned using specialized training of those doing the evaluation. The final report will include a hardware list, where to install the products, the configuration of the devices, and suggestions for antenna placement for each device. All of these things can and will save the company money in the long run. Some of the things that can go wrong without a proper site survey are not getting optimal performance from our new network, over purchasing of equipment or under purchasing of equipment, not getting full coverage inside the buildings, potential interference that you would not know about beforehand, unauthorized access to your network and so on and so forth There are three types of tools needed for a site survey, wireless tools, measurement tools, and documentation tools. Wireless tools are such...

Words: 457 - Pages: 2

Free Essay

Lab #1 Assessment

...Lab #1 – Attack & Penetration Test Plan Answer Sheet Hacking and Countermeasures 6/28/2013 MR. Walker Ramon B Kreher Jared Long Part 1: Table of Contents 1. Introduction 2. Authorization 3. Preliminary 4. Scope 5. Goals & Objectives 6. Test Plan Reporting 7. Test Plan Reporting 8. Projecting Plan and Schedule Part 2: Sample Authorization Letter The Undersigned hereby testifies that they have proper authority and agrees to offer authorization to perform the work that is specified in the statement of work for the penetration test to be conducted by Security Consulting Inc. The systems to be tested shall not be compromised and any vulnerabilities that are discovered shall be kept confidential unless federal, state, or local law requires that they be disclosed or the statement of work specifies otherwise. This Document also certifies that the undersigned testifies that the Client has sufficient disaster recovery systems and insurance in the event of an incident during or after the test procedures. Part 3: Penetration Test Client Questions If black box is selected, do not fill out question 3 or following sections. 1. Black Box | White Box (please circle one) 2. Intrusive | Non-Intrusive (please circle one 3. Test Credentials: (fill in as many as needed) Username | Password | | | | | | | | | | | | | | | E-Commerce Web-based Application Server 1. Authorized to View Source? Yes | No (please...

Words: 652 - Pages: 3