Free Essay

Atm Protocol

In:

Submitted By hermionedeeksha
Words 1004
Pages 5
-------------------------------------------------
ClothingPlease feel free to bring clothes according to your personal tastes. This list is just a guideline to what you would require here. | Items | Quantity | Comments | Formal Shirts | 3 or 4 | Plan on bringing full sleeved and half sleeved shirts depending on your personal choice. | Formal Trousers | 2 | | Formal Suits | 1 or 2 | If you plan on getting 1 suit, we suggest you to bring Black suit.MBA students may need 2 suits | Tie | 2 or 3 | | Casual T-shirts | 6 or 7 | | Jeans | 3 or 4 | | Shorts/Cargos/Pants/Bermudas | 3 or 4 | | Belts | 2 | | Undergarments | 14 or 15 | Plan on getting more as you would go to the laundry once in two weeks | Towels | 2 or 3 | | Handkerchiefs | 5 or 6 | | Single bed sheet | 2 | | Double Bed Sheet | 2 | Recommended, because beds are of different sizes. | Pillow Covers | 2-4 | Get Full size covers, pillows here are big in size | Blanket(Light weight) | 1 | Recommended! You can buy a comforter(blanket) here for $15-$35 | Woolen Gloves | 1 | Leather or wool. You can buy them here for approx. $5 | Jacket | 1or2 | Recommended, and better if it works for cold as well as rain, cause here it rains and becomes cold. Not much snowfall | Thermal Undergarments | 1 | optional | Caps | 1 or 2 | Recommended, summers here is really hot. light color(e.g. Off white) preferred | For Women | | | Jewelry Sets, Bindis, Saris, Salwars, Cosmetics | | For Diwali and other ISA parties | | | -------------------------------------------------
FootwearPlease feel free to bring footwear according to your personal comfort. This list is just a guideline to what you would require here. | Items | Quantity | Comments | Slippers/Sandals | 1or2 | We Suggest one set of slippers to be work on your ethnic dress | Regular Slippers | 1or2 | | Formal Black Leather Shoes | 1 | We recommend that you bring it from India. Might be Expensive when compared | Casual Sport Shoes | 1 | | Shoe Polish | 1 | For Formal shoes | Shoe Polishing Brush | 1 | | Socks Black(for Formal Shoes) | 2 pairs | | Socks White | 12 | Cheaply available here | | | -------------------------------------------------
MEDICINESPlease feel free to bring any additional medicines you may think are necessary and safe to travel with. This list is just a guideline to what you might require here. Please carry your regular medicines with you. Please carry prescription from your doctors for medicines other than general medicines. | Items | Quantity | Comments | Glasses/Contact Lenses and accessories | Extra Pair | Optical's are very Expensive here | Nasal Inhaler [Vicks] | | | Soothing Balm [Amurtanjan, etc] | | | Pain Relief Spray | | for fast pain relief | Antiseptic lotion [Dettol] | | | Band Aids | Box | | Painkiller Tablets | | | Burn Ointment [Burnol] | | | Tablets for cold/cough/fever/ allergy | | | B-Complex tablets | | | Moisturizing lotion | | Highly recommended for winters | | | -------------------------------------------------
MiscellaneousPlease feel free to bring any additional items you may think are necessary. This list is just a guideline to what you would require here. | Items | Quantity | Comments | Glasses/Contact Lenses and accessories | Extra pair | Opticals are very Expensive here | Stitching Kit | 1 | Recommended for fast repair of cloths | Alarm Clock | 1 | You can buy electronic clock here starting from $5 | Camera | - | Optional | Walkman | - | Optional, Electronic items are cheap here | Recorded Music CDs/DVD's | | Hard to find Indian Cds here | Wallet[to hold Credit cards also] | 1 | | | | | -------------------------------------------------
StationaryThis list is just a guideline to what you would require here. These items are by no means the only items that you would require here. | Items | Quantity | Comments | School Bag [preferably which can hold a laptop] | 1 | Must- little expensive here | Ball Point Pens | | | Bonded/ Clutch Pencils | | | Lead Box[0.5 mm] | | | Erasers | | | Steel Scale | | | Stapler + pins | | | Scientific calculator | | Try to get a new set of batteries in | Cello tape | | | Glue stick/Glue | | | | | -------------------------------------------------
ToiletriesPlease feel free to bring any additional items you may think are necessary. This list is just a guideline to what you would require here. | Items | Quantity | Comments | Shaving Blades/Cartridges | 12 | Available here, buy little expensive | Razor | 1 or 2 | | Shaving Cream/Gel | 1 | Its cheaper here, but you should have it for immediate use | Shaving brush | 1 | | After Shave Lotion | 1 | | Trimming Scissors | 1 | | Tooth Brush | 2 or 3 | | Tooth Paste | 1 | | Comb | 2 | | Hair Oil | | Optional, depends on whether you use it or not | Nail cutter | 1 | Don't Forget this | Talcum Powder | - | Optional | Shampoo | - | Cheaply Available, You can bring some 5-6 sachets to last for few days | Bathing soap | - | Cheaply available, but recommended to bring if you use specific brand | | | -------------------------------------------------
Cooking GroceriesPlease feel free to bring any additional items you may think are necessary. This list is just a guideline to what you would require here.All the items except the masalas are recommended only if u have luggage space; they are also available here at Indian Grocery stores at reasonable prices. You can bring masalas according to your taste. Personal discretion advised.Tip: Your mother is the best judge. | Items | Quantity | Comments | Tea Leaves | 1-2 Kg | | Instant Coffee | | Cheaply available | Turmeric Powder [Haldi] | 250gms | | Mustard seeds [Raee] | 250 gms | | Red Chilli Powder | 250 gms | | Masala | 250 gms | | Dhane Powder/Dhaniya Powder | 250gms | | Jeera [Cumin seeds] | 500 gms | | Asafetida[Hing] | 20-30gms | | Sambar powder | | 2 packets if buying from store | Chole Masala | 5-6 packets | Recommended, because chole is chepaly available here and cooked frequently | Pav-Bhaji Masala | 3-4 | Recommended fast to cook, good to eat | Tamarind Powder/paste | | Better to bring | Rava/Suji/Poha | 1 Kg | This is very helpful in beginning | Elaichi | | optional | Clove | | | Papad | 2-3 packets | optional | Pickles | - | If you bring, make sure that the packing is good and leak proof | | | -------------------------------------------------
Cooking UtensilsMake sure that all vessels are Flat-Bottomed, because most of the stoves here are electric. | Items | Quantity | Comments | Pressure Cooker 3litres/5litres | 1 | Bigger the Better | Spare Gaskets | 2-3 | | Frying pan [Non- Stick] | 1 | Bring Good Quality one | Spoons Small size | 3-4 | | Big spoons/ serving spoons | 2 | | Plates/Dishes | 2 | Ceramic/Microwavable eating plates, important. can buy here also | Glasses | 2 | | Tongs | 1 | | Kadhai | 1 | Medium size | Utensils | 3 | Medium/big size | Tea filter | 1 | | Tea Pan | 1 | | Cutting Board | 1 | optional/cheaply available here | Cooking book | 1 | Mother's Recipe highly recommended | |

Similar Documents

Free Essay

Atm Protocol

...The ATM reference model, which has two forms - one for the user-to-network interface (UNI) and the other for the network-to-node interface (NNI), is divided into three layers: the ATM adaptation layer (AAL), the ATM layer, and the physical layer. The AAL interfaces the higher layer protocols to the ATM Layer, which relays ATM cells both from the upper layers to the ATM Layer and vice versa. When relaying information received from the higher layers, the AAL segments the data into ATM cells. When relaying information received from the ATM Layer, the AAL must reassemble the payloads into a format the higher layers can understand. This is called Segmentation and Reassembly (SAR). Different AALs are defined in supporting different types of traffic or service expected to be used on ATM networks. The ATM layer is responsible for relaying cells from the AAL to the physical layer for transmission and from the physical layer to the AAL for use at the end systems, it determines where the incoming cells should be forwarded to, resets the corresponding connection identifiers and forwards the cells to the next link, as well as buffers cells, and handles various traffic management functions such as cell loss priority marking, congestion indication, and generic flow control access. It also monitors the transmission rate and conformance to the service contract (traffic policing). The physical layer of ATM defines the bit timing and other characteristics for encoding and decoding the data into...

Words: 506 - Pages: 3

Premium Essay

Econ 5315 Hw 10

...Adapted Homework, Ch. 11 (11 points possible) 1. “An Analysis of sustainability is similar to a five forces analysis.” Comment on this, focusing on the firm you’ve been studying for your term project. (1 point) A sustainability analysis is similar to a five forces analysis because they are focus on creating competitive advantage. The sustainability analysis is to analyze and find a way to compete with competitors and deal with potential entrants, in order to maintain profits in the long run. The analysis includes the company’s resources and isolating mechanism that help the company to sustain its advantages. The five forces analysis also analyze 5 factors, like supplier power, buyer power, competitors, new entrants, and substitutes and complements, which affect to the company profits. The company can use both analysis to build competitive advantage and maintain its position, market share, and profit margin in the industry. 2. (a) How do economies of scale affect sustainability? (b) Economies of scope? (2 points: 1 point each) When economic of scales happens it definitely affects sustainability because the resources and isolating mechanism changes. For some companies might be easier to scale to large quantities of production and the competitive advantage could change for the one able to do it. Economies of scope will also change the sustainability because producing two products because it is the same cost to produce one of them can change how companies limit...

Words: 984 - Pages: 4

Premium Essay

Banking

...statement that the banking sector in nepal exists only at rudimentary level because it has evolved difficult transition from highly centralized and planned economy to government-sector dominated, commodity-focused market economy of today. This project of “Banking" will give us the platform to use the software for basic banking purposes ranging from cash withdrawls to cash deposites.Using this software,customoers can access their bank accounts in order to make cash withdrawals,debit card cash advances and check their account balances.Moreover it also provides us with the background and infrastructres to run an ATM card. Through the project the focus has been on using the ATM on a simple and reliable manner which makes use of normal database and input/output operations to give the desired results to the customer. This project is based upon the basic uses and functioning of the ATM as a whole where a customer can create a bank account, deposit his/her balance and retrieve money using a credit or a debit card. Banking system software keeps the day to day transaction record as a part of complete banking.It can keep the information of the account type,account opening form,deposit and withdrawal and searches the transacton,transaction reports,individual account opening form,group accounts etc. The exiciting part of this project is that through this software we can display transaction reports,statistical summary of account type and interest information. 2. INTRODUCTION The “Banking...

Words: 1152 - Pages: 5

Free Essay

Enron

...and carriage holding a roller, the front of the case holds the keyboard. When you type on a typewriter the carriage and ribbon move from left to right. While a computer, before you saved what you type is only for temporarily shown on the monitor you can still edit it when there’s an error. There similarity is both utilized with ink; they are also mechanical and there keyboard are just the same. Word Derivation: The Italian Guseppe Ravissa created a photo type typewriter called cembalo serivano o macchina de scrivere a tasti. Source: http://www.thefreedictionary.com/typewriter, http://en.wikipedia.org/wiki/Typewriter Classification ATM Card. Most common among the types of bank cards are ATM cards. ATM cards are also known as a bank card, client card, key card, or cash card. ATM is for transactions such as: deposits, cash withdrawals, obtaining account information, and other types of banking transactions, often through interbank networks. General...

Words: 1540 - Pages: 7

Premium Essay

Three Major Costs

...list of new features, which will require personnel to be trained to ensure daily operations are in compliance with future audits. Included in this will be a defined list of network protocol measures, which each employee will be trained. In relation to network protocol will also be security measures, which will serve as the company standard to support compliance for Sarbanes-Oxley requirements. Finally, the newly implemented Fast action response team will need to be knowledgeable in the inspection requirements of Sarbanes-Oxley requirements. Testing The second major cost of the proposed information system will be testing, which will have to be coordinated from several locations. One of the features of the new information will be automatic network enumeration, which will scan remote pc throughout the network. Technicians will require time properly to evaluate the new network and capacity. Second, is the issue of system compatibility between the old and new system components. The testing process will be time sensitive and in some instances may require parts of the older network to be placed on stand –by. Response team The third major cost of the newly proposed information system is the response team. The response team is primarily designed to counter security threats and enforce network protocol in compliance with Sarbanes-Oxley audits. This team will need to be readily available throughout the entire project. The costs of this team are a combination of the training, and man-hours...

Words: 310 - Pages: 2

Free Essay

Idnp Week 2

...IDNP:Part 2 NTC/362 06/29/2015 Importance of Communication Protocols Communications protocols are a very important communication capability. Communications protocols allow two systems or more to communicate effectively and to pass data over a network and between different communication devices. Communication protocols allows for the process of breaking data down into tiny packets that are the encrypted and signed by the sending device. Each of these packets are sent individually to cut down on errors. If any errors occur, instead of resending the whole line of data it is only necessary to send that specific packet to complete the transfer. Communications protocols also allow you to have secure and private communications when transferring data. Each packet we previously discussed has a header imbedded in its data that signifies where it is going. It will then only open on the device it has been addressed to. Also if someone were to intercept one of your packages it is still not the whole transfer since all the data is sent separately in smaller packages and they wouldn’t receive the full data transfer. There are many different kinds of protocols that govern how computers interact with each other through the internet and govern how they communicate most effectively. Common communication protocols include everything from how the data is secure to how the packets are structured and sent. Identifying Protocols/Network Architecture The links of communication and how they...

Words: 932 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment

...Communication Protocols Communication is defined as the exchanging of information or news. Protocol, for all intents and purposes, means an official way or agreed upon procedure or standards to accomplish a task. In this case, it would be rules to help transmit data. In networking, there are various protocols needed to make transmission of data easier. In today’s fast paced environment, the standards of information sharing are increasing exponentially. Adhering to the standards are also becoming more important than before. Design Kudler Fine Foods is dedicated to ensuring that the customer information in their possession remains secure from unapproved access. Securing their network is one of the highest priorities for Kudler. Since the new enterprise network will be integrating a wide area network to connect all the sites, which will have their own individual wireless local networks. Choosing the correct communication protocol stack is vital to the security and availability of both the WAN and WLAN network. In...

Words: 1036 - Pages: 5

Premium Essay

Nt1310 Unit 3 Assignment 1

...is send by two working stations at a time there occurs collision and it stops transmitting and sends again when it founds the line is idle but it’s not defined till which period or duration it has to wait is called non deterministic protocol. It can be also defined as the system that has the possibility of multiple output for each input so that the output cannot be predict. Example: CSMA/CD Q2 Answer A timer is set, before the timer runs out, a clear to send (CTS) will be received from the access point. Q3 Answer No, for the 5 Ghz protocol have a small transmission distance approximately 30 meters and this frequency has trouble to transmit over floors and walls. If we needed to utilize the IEEE 802.11a we need multiple contact...

Words: 1657 - Pages: 7

Free Essay

Kulder

...format of the data being used. Communications protocols must adhere to the following; the rate of transmission either in baud or bps. The transmission is to be synchronous or asynchronous. Also, the data is to be transmitted in half-duplex or full-duplex mode. Baud transmission is the number of signaling elements that occur each second. At slower speeds, only 1 bit of information is encoded in each electrical change. When saying 1500 baud, it means that 1500 bits are transmitted each second, this is also shown as 1500bps. Communication protocols can also describe the syntax, semantics, and synchronization of analog and digital communications. Communications protocols are implemented in hardware and software. There are thousands of communications protocols that are used everywhere in analog and digital communications. Computer networks cannot exist without them. With KFF, being that the Home Office or Headquarters is located in La Jolla, there is a T3 dedicated line that connects HQ with Del Mar and Encinitas locations. These lines are usually rented at a monthly or yearly rate to connect geographically separate offices for private voice and or data networking. It is also very costly averaging over $3000 USD per month, so most don’t lease these lines. They are also reserved circuits that operate over either copper or fiber optics cables. One of the protocols that should be implemented is the Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is the set of rules for...

Words: 838 - Pages: 4

Free Essay

Network Management

...collision rate, the lower the performance. Token Ring, on the other hand, is based on a control/access given to the station owning the "token." Think of a token as the key to the media: whichever station has the token would be allowed to use the ring to send the data. So there would be no collision, just multiple stations competing for the same token. With not too many stations, the wait-for and claim of the token is very efficient (think of a video game with less players waiting to play it.) But if there are too many stations, most would just sit around and wait for the token, hence the flat-out of its performance. 2) What are the standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol? Assume that the Ethernet runs on 10 Mbps on an unshielded twisted-pair cable? A) The standards used for the various layers in an Ethernet-based network that is managed by the Internet management...

Words: 923 - Pages: 4

Premium Essay

It220 Chapter 7and8

...configuration and startup is that in config doesn’t show what is currently saved in the routers nonvolatile memory whereas startup shows the saved configuration in the nonvolatile memory. 8. What is the router command used to view the routes entered into the router’s routing table? The command to use in order to see the routes entered into the routers routing table is show ip route. 9. What is the router command used to configure a static route for a router? The command you would use is ip route in order to configure the router. 14. What is the difference between a static and a dynamic routing protocol? The differences are that static has you enter in ip address information whereas dynamic routing protocol allows the router to be dynamically updated to account for loss or changes in routes or changes in data traffic. 15. What are the four key issues in dynamic routing protocols? The four key issues in dynamic routing...

Words: 2495 - Pages: 10

Premium Essay

Ipv4 vs Ipv6

...Abstract Internet is global system of computer networks in which networks can brings users at any one computer to interact with other computer to get or give information, making video call, chatting with friends and so on. It also links together millions of businesses, government offices, educational institutions, and individuals. The history of internet began with the development of ARPA (Advanced Research Projects Agency) to build a networking project called ARPANET in 1969 by US Department of Defense also known as Pentagon. The original aims are to allow scientists at different locations to share info and collaborate on military and scientist projects. The advantages of ARPANET’s design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in military attack or other disasters. Nowadays, the Internet has drastic control on culture and business with the rise of instance communication by electronic mail (Email), instant messaging, video calls and the World Wide Web (WWW) with its forums, blogs, social networking and online shopping sites. The internet continues to grow, driven by ever greater amounts of online information and knowledge, business, entertainment and social networking. According to Chuck Semeria, the Internet has entered the public awareness as the world’s largest public data network, doubling in size every nine months. This is because of the...

Words: 2813 - Pages: 12

Premium Essay

Netw208 Week 3 You Decde

...to move the data between the two networks. The protocol we will use will be the Point-to-Point protocol. Another protocol will not work is the SLIP protocol. Because it is way too slow for our purposes. The Point-to-Point Tunneling Protocol is a method for implementing virtual private networks. PPTP uses control channel over TCP and GRE tunnel operating to encapsulate PPP packets. The PPTP specification does not describe encryption or authentication features and relies on the PPP protocol being tunneled to implement security functionality. We have that covered with a digital security certificate and the PPTP connection from our router in Cleveland and the router in Pittsburgh. This will allow the internet connection with our secure web server and our network in Pittsburgh with an encrypted connection through the routers across the internet to our offices. The Synchronous Optical Networking, also known as SONET, is a standardized multiplexing protocol that transfers multiple digital bit streams over optical fiber using highly coherent light from light-emitting diodes. SONET allows for simultaneous transport of many different circuits of differing origin within a single framing protocol, which simple means our three OC-1's will easily work for our purposes. SONET is essentially protocol neutral and its transport-oriented features. SONET is used for transporting ATM frames. The frames we will use in our...

Words: 489 - Pages: 2

Premium Essay

Network Design

...Security Proposal Nickolas Dunkle Isaac Mundt Michael Yeager Thomas Sevastos John Dyer Jacob Skrzynski Joseph Weidner Pam Marshall Christopher Montgomery ITT Technical Institute Network Systems Administration Capstone Project Ryan Rucker May 17, 2015 Part 1 - Structure of WAN In this design of a high level network for ABC Company we will provide a basic written infrastructure of both the local and wide area networks we are to build for them, being such an early stage this document is subject to change. This design includes the infrastructure for the corporate headquarters located in San Francisco, as well as the other design centers in Detroit, Paris, Tokyo, and Sao Paulo. We then follow up by explaining the infrastructure of the sales offices, which may not require as high grade of equipment as the design centers depending on its requirements. Finishing with the overview of the entire wide area network, connecting each site to the corporate headquarters which is where we will begin our design. The corporate office being the main headquarters will include many services such as file, print, email, directory, and application. These services will be separated onto at least two different servers due to the constant strain we may see from directory and email services. If necessary we will implement an application server as well to run any in-house programs the company may be familiar with. We also suggest the use of a database server dedicated to storing...

Words: 5812 - Pages: 24

Free Essay

Routing

...CALL ROUTING IN TELEPHONE NETWORKS INTRODUCTION ROUTING is a process of finding a path from a source to every destination in the network. A routing protocol sets up a routing table in routers and switch controllers. A node makes a local choice depending on global topology Telephone calls must be routed across a network of multiple exchanges, potentially owned by different telephone carriers. The exchanges are all connected using trunks. Each exchange has many "neighbours", some of which are also owned by the same telephone operator, and some of which are owned by different operators. When neighbouring exchanges are owned by different operators, they are known as interconnect points. This means that there is really only one virtual network in the world that enables any phone to call any other phone. This virtual network comprises many interconnected operators, each with their own exchange network. Every operator can then route calls directly to their own customers, or pass them on to another operator if the call is not for one of their customers. Call Routing When a call is received by an exchange, there are two treatments that may be applied: • Either the destination terminal is directly connected to that exchange, in which case the call is placed down that connection and the destination terminal rings. • Or the call must be placed to one of the neighboring exchanges through a connecting trunk for onward routing. Each exchange in the chain uses pre-computed routing...

Words: 820 - Pages: 4