...ASSIGNMENT 1: PROPERTIES OF DNA/RNA Introduction: The polymerase chain reaction is an innovative technology, which amplifies a single piece of DNA across several orders of magnitude. The end result is the creation of thousands to millions of copies of a particular DNA sequence. PCR is closely patterned after the natural principle of DNA replication. It is a three-step process, referred to as a cycle, that is repeated a specified number of times. One PCR cycle consists of the following steps: * Denaturation * Annealing * Extension This process takes place in a thermal cycles, usually between 30 and 40 cycles. In the initial step, heat (usually hotter than 90 degrees Celsius) separates double-stranded DNA into two single strands. This process is called "denaturation." Denaturation is possible because the hydrogen bonds linking the bases to one another are weak. The hydrogen bonds break at high temperatures, whereas the bonds between deoxyribose and phosphates, which are stronger covalent bonds, remain intact. The goal of PCR is not to replicate the entire strand of DNA but to replicate a target sequence of approximately 100-600 base pairs unique to the organism being studied. Targeting the sequence is achieved by using primers. They are specific for the target region of the organism. Two primers are included in the PCR, one for each of the complementary single DNA strands that was produced during denaturation. The primers that anneal or in other...
Words: 2325 - Pages: 10
... - computer server; - computer hardware; - computer software; - computer network (wireless/ local area network (LAN)); - internet system; - email system; - PABX/ telephone system; - fax machine; - photocopy machine; - printers (associated with photocopy machine); - scanner (associated with photocopy machine). 1.0 Reporting ICT Breakdown 1.1 Whenever there is breakdown encountered to any of the ICT in the office, the staff in charge shall complete the ICT Breakdown Report which to include clearly the ICT Name, Model No./ Serial No., Location, Breakdown Date and Time, Nature of Breakdown and refer by faxing/ handing over as soon as possible to the following personnel authorised to attend to the breakdown. 1. Refer to IT Technician for breakdown of, - computer hardware; - computer software; - computer network (wireless/ local area network (LAN)); - internet system; - email system; 1.1.2 Refer to Admin Manager for breakdown of, - PABX system/ telephone system; - fax machine; - photocopy machine; - printers (associated with photocopy machine); - scanner (associated with photocopy machine). 2.0 Investigation of Cause and Rectification 2.1 For any breakdown report for items 1.1.1 as soon as received from ICT user, the IT Technician shall attend to the reported breakdown within 30 minutes from the...
Words: 827 - Pages: 4
...INCORPORATING WIRELESS INVENTORY SCANNERS THROUGHOUT WAREHOUSE Prepared for Professor April 5, 2014 Letter of Transmittal Board Members 1234 Martin Luther King Dr. Killeen, TX 76543 USA Dear Members of the Board and Fellow Employees: Here is my report, highlighting the recommendations that should implement a wireless inventory scanning process throughout our warehouse. This report provides detailed information regarding the significant impact that this wireless network will have on control cost and inventory productivity. My research indicates that implementing a wireless inventory scanning network will drastically improve on control cost and inventory productivity across the board for all involved. It will benefit our inventory clerks by making their working hours more productive and decrease the amount of time needed to manually count the inventory. This will allow for a seamless flow of data from our warehouse location to our store shelves to allow for a more productive selling advantage. Also, it will drop maintenance cost to a minimum by incorporating our own in house IT personnel to maintain the network without having to outsource any maintenance personnel. For these benefits, I encourage you to approve of this upgrade in our inventory process. It will benefit our organization in many ways and improve employee morale. If you have any questions or suggestions, I would be glad to answer them for you. Sincerely, Contents LIST...
Words: 2039 - Pages: 9
...used to do the heavy lifting of any network needs. Also this allows an integration of a LAN to be merged openly with the layout of the WLAN when or if necessary. Deployment Scenario Rationale While taking in the consideration of limitations on the physical side. The floor plan inside the Call Center allows WAP to be covered and access the other ones that maybe outside one another. In any area that won’t be high regard for security or even be mobile wire can be used for connections this way the wireless can still connect and the two can communicate. Hardware Components • Component Name: AP o Rationale for using component: to provide coverage wirelessly through out the entire are to be covered. o Rough cost estimate: around $100.00 and above depending on what is to be used • Component Name: switch o Rationale for using component: allows all AP’s to be connected o Rough cost estimate: $50.00 and up • Component Name: Cables o Rationale for using component: restrict access to what is not need to have and to gain access to network. o Rough cost estimate: $5.00 and up depending on length and so on. Insert bullets for additional components IEEE Wireless Network Type Apex Designs has identified that an 802.11n LAN will be implemented. Access Point Management Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location...
Words: 334 - Pages: 2
...Roxbury Community College ITS Job Description Job title: Senior Network Engineer Department: Information Systems Office location: Boston, MA Reports to: Director of Network & Security Description The Senior Network Engineer’s role is to ensure the stability and integrity of in-house storage, virtualization, data, and wireless network services. In addition, the Network Engineer is responsible for the configuration, installation, monitoring, maintenance, upgrade patching and associated troubleshooting of Roxbury Community College systems and network infrastructures. This individual will also analyze and resolve network hardware and software problems in a timely and accurate fashion, and provide end user training where required. Responsibilities Performs daily network maintenance and management of network resources including servers, storage, virtualization, routers and switches Deploy company LANs, WANs, and wireless networks, including servers (rack and blade), storage, routers, switches, and other hardware Configure networks and systems to ensure their smooth and reliable operation for fulfilling business objectives and processes Monitor performance and troubleshoot problem areas as needed Create and maintain documentation as it relates to network configuration, systems, processes, and service records Ensure network connectivity of all servers, workstations, telephony equipment, and other network appliances Conduct research on network products...
Words: 467 - Pages: 2
...Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving...
Words: 18577 - Pages: 75
...Progress Report Supervisor: Hussam Jamal & Mohammad Alwan At IT Services with Unilever Project Name | Status | Description | Re locate Data cable and STC DP | Finished | Relocating the main STC data circuit distributed points from one location to another. That will require moving all the critical MPLS and IP VPN circuit with minimum downtime possible.To accomplish that, we should re-pulling new cables and isolate place with label every connectionDowntime was 15 MinutesNumbers of circuits:1 x MPLS4 X IP VPN35 X Telephone lines | Clean and organize server room | In Progress | Head Office Server room last organize was before 10 years, challenge was to clean and organize all the patch cords and cables with zero downtime.This is the active server room organizing projectNumbers of Racks= 5 Number of Patch Panel= 25 | Connection Documentation, Design layout | Not Started | Building High level design with all L2 and L3 information.Create backup configuration library for network devices in server room | Refurbishment Project Phase 2 | Finished (Following) | Refurbishment project to the entire building including IT infrastructure: * Wireless LAN * LAN * IP Telephone * Switches * Desk Top setupThe roll was to lead all moving and setup activity, and assure of service delivery on the entire building | Description of the accomplished...
Words: 701 - Pages: 3
...can be picked up by any node that has the ability to receive wireless signals through a wireless network interface card. o Rough cost estimate: $100 • Component Name: Switches o Rationale for using component: Give the ability to expansion of a WLAN o Rough cost estimate: $250 • Component Name: Cables o Rationale for using component: The access point is connect to wired network with cables to give wireless access o Rough cost estimate:$10 IEEE Wireless Network Type Apex Designs has identified that an 802.11n LAN will be implemented. Access Point Management Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location rather than to be configured separately for each access point. Location of Wireless Devices Network Performance Impediment Report (overview of floor plan and possible impediments) This floor doesn’t need a lot of attention. The microwave and the vending machines in one of the rooms could affect the network performance. WLAN operates by RF same as the microwave and the vending machines. This is a...
Words: 503 - Pages: 3
...Radio Frequency (RF) Interference Analysis and Optimization By Farhana Jahan ID: 061-19-342 Md. Rafiqul Islam ID: 061-19-370 Md. Mohibul Hasan ID: 061-19-373 A thesis report presented in partial fulfillment of requirements for the degree of Bachelor of Science in Electronics and Telecommunication Engineering Supervised by Mohammed Humayun Manager (Network Department) ADVANCED DATA NETWORKS SYSTEM LIMITED Red Crescent Concord Tower (19th floor) 17, Mohakhali Commercial Area, Dhaka-1212 Department of Electronics and Telecommunication Engineering DAFFODIL INTERNATIONAL UNIVERSITY October 2009 i APPROVAL PAGE This thesis titled „Radio Frequency (RF) Interference Analysis and Optimization‟, Submitted by Md. Rafiqul Islam, Md. Mohibul Hasan and Farhana Jahan to the Department of Electronics and Telecommunication Engineering, Daffodil International University, has been accepted as satisfactory for the partial fulfillment of the requirement for the degree of Bachelor of Science in Electronics and Telecommunication Engineering and approved as to its style and contents. The presentation was held on 19th October 2009. Board of Examiners Mr. Golam Mowla Choudhury Professor and Head Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Chairman) Dr. M. Lutfar Rahman Dean & Professor Faculty of Science and Information Technology Daffodil International University ---------------------(Member) A K M Fazlul...
Words: 18928 - Pages: 76
...Solution | Healthcare Network Allied Telesis Healthcare Network Construction Guidebook Contents Healthcare Network Solution | Introduction Outline of a Healthcare Network Importance of the network Main requirements in designing a healthcare network Non-stop Network Network bandwidth and QoS (Quality of Service) Data capacity Network bandwidth and cost of LAN devices QoS (Quality of Service) Redundancy and proactive measures to overcome network failures Core switch redundancy Comparison of redundancy of communication Loop protection Secure and Reliable Network Security Importance of security: both physical and human factors Threats to network security Network authentication External network (Internet) connection Inter-regional cooperative healthcare network Effective use of Wireless LAN Security in Wireless LAN Install and operation of Wireless LAN Ease of Operation Critical issues for network operation SNMP (Simple Network Management Protocol) Measures against system failures; device failures, incorrect wiring Use of SNMP IPv6 Network Configuration Example Network configuration for hospitals with fewer than 100 beds Network configuration for hospitals with more than 100 and fewer than 200 beds Network configuration for hospitals with more than 200 beds (i) Network configuration for hospitals with more than 200 beds (ii) 3 4 4 5 7 7 7 8 9 10 10 11 12 13 13 13 14 15 19 20 21 21 22 23 23 24 24 25 26 27 28 30 32 34 2 | Healthcare Network Solution Healthcare Network...
Words: 8999 - Pages: 36
...Issue Specific Security Policy Title: Fair and Responsible Use of Wireless LAN Technology Classification: Internal Use Only Statement of Policy This policy addresses fair and responsible use of Acme’s wireless local area network (WLAN) technologies. This includes but is not limited to hardware, software and protocols associated with WLANs. It is intended for authorized users within the Acme enterprise. Authorized users are defined as anyone who has been granted approval to access Acme information and information systems. This includes employees and contingent workers. Authorized users are expected to understand and comply with the contents of this document. Appropriate Use Laptop users are permitted, with prior management approval, to use Acme’s internal WLAN solution. The WLAN should be used only when a wired network solution in unavailable or inappropriate for a particular situation. To ensure appropriate protection of privacy, all wireless transmissions will be secured utilizing strong mutual authentication and encryption. When establishing a connection to a public hotspot or WLAN within your home, a VPN connection must be established and used in conjunction with an Acme approved personal firewall solution. Only Acme approved WLAN technologies are permitted within the enterprise. Use of non-standard hardware, software and protocols is strictly prohibited. Systems Management It is the responsibility of the Network Administrator, for Acme’s WLAN, to...
Words: 472 - Pages: 2
... 1. Chanalyzer_Installer.3.4.msi: Installation program that installs Chanalyzer on your computer 2. Capture1.wsr: First, capture file for analysis 3. Capture2.wsr: Second, capture file for analysis 4. Capture3.wsr: Third, wireless capture file for analysis 5. Capture4.wsr: Fourth, wireless capture file for analysis 3. Install the Chanalyzer spectrum analysis program by double-clicking on the Chanalyzer_Installer.3.4.msi file. 4. Start the Chanalyzer. Once the Chanalyzer is running, open the first capture file, Capture1.wsr, and let the recording run for a few minutes. Using this capture, answer the following questions in your lab report. Question 1: Are any channels being used that overlap other channels? Question 2: If you had to install a new wireless LAN, what channel would you use? 5. Close Capture1.wsr and open the file Capture2.wsr. Let the recording run for a few minutes. Using this...
Words: 855 - Pages: 4
... 1. Chanalyzer_Installer.3.4.msi: Installation program that installs Chanalyzer on your computer 2. Capture1.wsr: First, capture file for analysis 3. Capture2.wsr: Second, capture file for analysis 4. Capture3.wsr: Third, wireless capture file for analysis 5. Capture4.wsr: Fourth, wireless capture file for analysis 3. Install the Chanalyzer spectrum analysis program by double-clicking on the Chanalyzer_Installer.3.4.msi file. 4. Start the Chanalyzer. Once the Chanalyzer is running, open the first capture file, Capture1.wsr, and let the recording run for a few minutes. Using this capture, answer the following questions in your lab report. Question 1: Are any channels being used that overlap other channels? Question 2: If you had to install a new wireless LAN, what channel would you use? 5. Close Capture1.wsr and open the file Capture2.wsr. Let the recording run for a few minutes. Using this...
Words: 855 - Pages: 4
...| Network Administrator | Memo To: John Smith From: Felix Pino CC: Richard Pierce Date: 4/27/2015 Re: Site Survey Benefits Dear Sir, It has come to my attention that we have not been allocated time and money to do a proper site survey. I feel this is a detrimental path for your new system. A site survey is the precursor to a successful wireless network implementation. Like with many things, upfront planning and documentation facilitates the smooth deployment of the new network. With a site survey an engineer completes the physical check and identifies the best locations for the wireless access points, then creates a site report. The throughput of the access points is then fine-tuned using specialized training of those doing the evaluation. The final report will include a hardware list, where to install the products, the configuration of the devices, and suggestions for antenna placement for each device. All of these things can and will save the company money in the long run. Some of the things that can go wrong without a proper site survey are not getting optimal performance from our new network, over purchasing of equipment or under purchasing of equipment, not getting full coverage inside the buildings, potential interference that you would not know about beforehand, unauthorized access to your network and so on and so forth There are three types of tools needed for a site survey, wireless tools, measurement tools, and documentation tools. Wireless tools are such...
Words: 457 - Pages: 2
...Lab #1 – Attack & Penetration Test Plan Answer Sheet Hacking and Countermeasures 6/28/2013 MR. Walker Ramon B Kreher Jared Long Part 1: Table of Contents 1. Introduction 2. Authorization 3. Preliminary 4. Scope 5. Goals & Objectives 6. Test Plan Reporting 7. Test Plan Reporting 8. Projecting Plan and Schedule Part 2: Sample Authorization Letter The Undersigned hereby testifies that they have proper authority and agrees to offer authorization to perform the work that is specified in the statement of work for the penetration test to be conducted by Security Consulting Inc. The systems to be tested shall not be compromised and any vulnerabilities that are discovered shall be kept confidential unless federal, state, or local law requires that they be disclosed or the statement of work specifies otherwise. This Document also certifies that the undersigned testifies that the Client has sufficient disaster recovery systems and insurance in the event of an incident during or after the test procedures. Part 3: Penetration Test Client Questions If black box is selected, do not fill out question 3 or following sections. 1. Black Box | White Box (please circle one) 2. Intrusive | Non-Intrusive (please circle one 3. Test Credentials: (fill in as many as needed) Username | Password | | | | | | | | | | | | | | | E-Commerce Web-based Application Server 1. Authorized to View Source? Yes | No (please...
Words: 652 - Pages: 3