Free Essay

Unit 5 Lab 5.1-5.4

In:

Submitted By tamaram15
Words 1936
Pages 8
Unit 5. LAB 5 Ethernet LANs
LAB 5.1: LAN Standard
Exercise 5.1.1
Briefly define the 802.1 standard: Keeper of the LAN architecture – IEEE standard 802. Describes the 802 family of standards. Describes the LAN Architecture. Defines some useful things, such as the LAN address format, the SNAP protocol, the Playpen Ethertypes, and the OID registration arcs. The higher Layer Interface working group in 802. Defines the bridging and security glue that interconnects the LANs define by the 802 MAC groups.
Exercise 5.1.2
What 802.3 standard originally define PoE functionality? When was the standard enhanced, and what was the new standard name given for the enhancement? The standard that originally defines PoE functionality was the IEEE 802.3af. The new standard is known as IEEE 802.3at it, and it was enhanced in 2012.

Exercise 5.1.3 Complete Table Standard | Cabling | Maximum Length | 10BASE5 | Coaxial(Thicknet) | 500m | 10BASE2 | Coaxial (Thinnet) | 185m | 10BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | 100BASE-FX | Multi-mode fiber optic cable (SC or ST) | 400m | 100BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | 100BASE-T4 | STP Twisted Cable | 100m | 100BASE-TX | Single-mode fiber optic cable | 20km | 1000BASE-LX | SMF and MMF | 550m | 1000BASE-SX | MM fiber-optic | 220m or 550m (dependent upon fiber thickness | 1000BASE-ZX | MM fiber-optic | 550m | 1000BASE-T | UTP (Cat3, 5, 5e, 6) | 100m |

Exercise 5.1.4
What does the numeric prefix before BASE in the Ethernet standards define? What does the inclusion of a postfix of – T imply? The numeric prefix means the number of Mbps transmission speeds the Ethernet standard supports. T implies twisted pair.

LAB 5.2: MAC and IP Addresses
Exercise 5.2.1
Why must a MAC address have unique for every NIC produced? What effect will it have on the network if two devices from two different manufactures share the last 24-bits of their MAC addresses? Like your mailing address at home, your computer's NIC has a unique address. This address must be unique in the entire world. Otherwise, network traffic couldn't find its way to the right computer.
Exercise 5.2.2
What information about the network connection is given on the Support tab of the status window?
The IP address information, subnet mask, and default gateway.
Exercise 5.2.3
What is the physical address (MAC address) of the NIC (or network adapter) for this connection?
Physical Address: 20-7C-8F-1F-DC-68
Exercise 5.2.4
Who is the manufacturer for your NIC? What information is given about the manufacturer?
Here are the results of your search through the public section of the IEEE Standards OUI database report for 20-7C-8F:

20-7C-8F (hex) Quanta Microsystems,Inc. 207C8F (base 16) Quanta Microsystems,Inc. No.5 Lane 91,Dongmei Rd. Hsinchu 300 TAIWAN, PROVINCE OF CHINA Exercise 5.2.5 What is the IP address of your NIC or network adapter? What is the IP address listed for your default gateway? IP address: 192.168.0.15; Default Gateway: 192.168.0.1 Exercise 5.2.6 What steps are involved and how is each message sent (broadcast to all devices or unicast to single device? Step 1: When a source device wants to communicate with another device, source device checks its Address Resolution Protocol (ARP) cache to find it already has a resolved MAC address of the destination device. If it is there, it will use that address for communication. To view your Local Address Resolution Protocol (ARP) cache, Open Command Prompt and type command "arp -a" (Without double quotes using Windows Operating Systems).
Step 2: If ARP resolution is not there in local cache, the source machine will generate an Address Resolution Protocol (ARP) request message, it puts its own data link layer address as the Sender Hardware Address and its own IP address as the Sender Protocol Address. It fills the destination IP address as the Target Protocol Address. The Target Hardware Address will be left blank, since the machine is trying to find that.
Step 3: The source broadcast the Address Resolution Protocol (ARP) request message to the local network.
Step 4: The message is received by each device on the LAN since it is a broadcast. Each device compare the Target Protocol Address (IP Address of the machine to which the source is trying to communicate) with its own Protocol Address (IP Address). Those who do not match will drop the packet without any action.
Step 5: When the targeted device checks the Target Protocol Address, it will find a match and will generate an Address Resolution Protocol (ARP) reply message. It takes the Sender Hardware Address and the Sender Protocol Address fields from the Address Resolution Protocol (ARP) request message and uses these values for the Targeted Hardware Address and Targeted Protocol Address of the reply message.
Step 6: The destination device will update its Address Resolution Protocol (ARP) cache, since it need to contact the sender machine soon.
Step 7: Destination device send the Address Resolution Protocol (ARP) reply message and it will not be a broadcast, but a unicast.
Step 8: The source machine will process the Address Resolution Protocol (ARP) reply from destination, it store the Sender Hardware Address as the layer 2 address of the destination.
Step 9: The source machine will update its Address Resolution Protocol (ARP) cache with the Sender Hardware Address and Sender Protocol Address it received from the Address Resolution Protocol (ARP) reply message.
Exercise 5.2.7
Exercise 5.2.8
Run the command arp –a again to see the effect it has on the table. What is the IP address that is added? What is the MAC address that was added? Use the –s argument to add a new address to the table to match IP address 101.0.0.1 to the MAC Address 00-AA-00-11-11-11. What command did you use to add the address pair? What is displayed as the type for these pairs?
IP address: 192.168.0.15; MAC Address: 7c-b2-1b-2d-8e-32arp. Arp –s is the command use to add the address pair.

Exercise 5.2.9
Use the arp –a command to verify that the entry is removed. What command will you use to remove the pairing to MAC address 00-AA-00-11-11-11 that you entered as astatic pair in the table?
-d: deletes the host specific by inter_addr.
LAB 5.3: Finding Network Settings
Exercise 5.3.1
What information is displayed as a result?

Are the entries the same for the IP address and for the default gateway? Yes they are the same.
Exercise 5.3.2
What address is returned as the IP address of localhost? How many times is the ping message sent by default? IP address: 192.168.0.15. The ping message was send 4 times.
Exercise 5.3.3
Ping 192.168.1.1. How much time (in time=part of the output) did it take for the ping to response to come back to the local machine? If there were different values, report the average response time.
At first the request was timed out three times. Packets send 4, packets received 0, lost packets 4. It took 2ms, average time 1ms.
Execute the following command from the command –line interface:
Ping www.google.com
How much time (on average) did it take to get a response from the host? How does this compare to the time it took to get a response from the default gateway? Choose another web address and send a ping command to it. Did the ping command get a response? If so, how long did it take (on average)? What makes a difference in the timing of these messages?
It took www.google.com on average of 212ms to get a response. It took the default gateway an average of 1ms.
It took www.yahoo.com on average of 284ms. The reason why some web address takes longer to send a response is how devices they have to go through to get to their destination. Yahoo may be further than Google.
Exercise 5.3.4
Ping –a 192.168.1.1. What is the name of the host for the default gateway? Use this argument to ping localhost. What name does it return? I didn’t get any name for the default gateway. The name return was the localhost computer’s name.
Exercise 5.3.5
Ping –n 6 192.168.1.1. What is the benefit of being able to send a set of number of ping messages to a host? Pings the local host, this will allow you to see if the computer is able to send information out and receive the information back. Note that this does not send information over a network but may allow you to see if the card is being seen.
Exercise 5.3.6
Tracert 192.168.1.1. How many devices are returned in the path between your machine and the default gateway? 14 devices
Now you will use the tracert command to access to different web host and compare devices returned in the path. Tracert www.google.com
Host www.google.com went through 18 devices to get to the local host, while host www.yahoo.com went through 14 devices to get to the local host. Which the distance between the local host and google is furhter than the distance between yahoo and the local host.
Exercise 5.3.7
Run nestat command (without any arguments) on your machine from the command-line interface. How many active connections are returned? What protocols are in use? TCP protocol.
Open a web browser such as Internet Explorer and enter a destination web address in the address bar. When this page has loaded, run netstat command from the commna-line interface again. How many connections are returned this time? Where did these connections originate?
Netstat will provide all established connections for both network and domain sockets. That means we’ll see not only the connections that are actually working over the network, but also the interprocess communications (which, from a security monitoring standpoint, are not useful). So in the command just illustrated, we have asked netstat to show us all ports (-a)—whether they are listening or actually connected—for TCP (-t) and UDP (-u).
LAB 5.4: Basic Network Troubleshooting
Exercise 5.4.1
What command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. The ping command to get this information. Ping –a and Ping –n.
Exercise 5.4.2
What is the best command to determine whether all the hosts on the local-area network are reachable?
Ping host and then ipconfig/all
Exercise 5.4.3
If your computer is unable to reach the internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping command and tracert command.
Exercise 5.4.4
If your local machine is not connecting to any other host on the network, what two command will give you information on whether your network device is active and the current configuration of your NIC or adapter? Net Stat is a tool that tells you what your machine is connected to at the moment the command is run. This makes it a very useful tool to see if your machine is connecting to servers that you don't know about.

Similar Documents

Free Essay

Virtual Instrumentation

...2012 DEPARTMENT OF PRODUCTION ENGINEERING PSG COLLEGE OF TECHNOLOGY (Autonomous Institution affiliated to Anna University, Coimbatore) COIMBATORE – 641 004. FACULTY GUIDE CONTENTS CONTENT Page No ACKNOWLEDGEMENT SYNOPSIS LIST OF FIGURE CHAPTER 1. INTRODUCTION...........………………………...……..………………………........1 1. VIRTUAL INSTRUMENTATION 1 2. LabVIEW 2 3. PIN ON DISC INSTRUMENT 3 2. LITERATURE SURVEY……………………..…………………………..………….5 3. PROBLEM DEFINITION AND OBJECTIVE……………………………......…….8 3.1 PROBLEM DEFINITION 8 3.2 OBJECTIVE 8 4. METHODOLOGY………………………………………………………….………....9 5. PROCEDURE AND RESULTS…………………………………...…..……10 5.1 Calibrating the Pin on Disc Instrument 10 5.2 Conversion of Time to Sliding Distance 11 5.3 Exporting Values to Spreadsheet File 12 5.4 Steps to Run the Program 13 6. CONCLUSION………………..………………………………..….…….....…...…...15 BIBLIOGRAPHY..........................................................................................................16 ACKNOWLEDGEMENT We would like to express our sincere gratitude and profound thanks to Dr. R. Rudramoorthy, Principal, PSG College of...

Words: 3802 - Pages: 16

Premium Essay

Nt 1210

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Premium Essay

Doc, Docx, Odt

...[pic] Diploma of Business BSB50207 |Course Code & Title: |BSB50207 Diploma of Business | |Unit Code & Title: |BSBMKG501B: | | |Identify and evaluate marketing opportunities | |Assessments Type |Report Writing & Presentation | |Assessment No: |One | |Delivery and Assessment Mode(s) |Classroom | |Term |One | |Unit Duration |Three Weeks | Assessment 1-Report Writing & Presentation BSBMKG501B Identify and evaluate marketing opportunities BSB50207 Diploma of Business Version 2.1 Australis Institute of Technology and Education ABN 17 120 701 911 Address Level 2, 25 George St, Parramatta, NSW 2150...

Words: 2167 - Pages: 9

Free Essay

Enlgish Essay

...Biology B     | Activity | Points | % of Total | Discuss | 75 | 4% | Exam | 100 | 5% | Final Exam | 100 | 5% | Journal | 100 | 5% | Lab | 250 | 13% | Practice | 125 | 6% | Quiz | 740 | 38% | Test (CST) | 250 | 13% | Test (TST) | 200 | 10% | | Total Points for the Course : 1940 | Unit 1: DNA and Heredity | Lesson 1.1: The Code of Life | (Documents: Key Terms) | Activity 1.1.1: Study - Organization of DNA | (Documents: Study Sheet) | Learn about the organization of DNA into alleles genes and chromosomes. |   | Duration: 40 min |   |   | Activity 1.1.2: Quiz - Organization of DNA | Take a quiz to assess your understanding of the material. |   | Duration: 20 min | Scoring: 20 | Points Earned: _____ | Activity 1.1.3: Study - Mitosis | (Documents: Study Sheet) | Learn about the process of mitosis. |   | Duration: 40 min |   |   | Activity 1.1.4: Quiz - Mitosis | Take a quiz to assess your understanding of the material. |   | Duration: 20 min | Scoring: 20 | Points Earned: _____ | Activity 1.1.5: Journal - Your Traits | (Documents: Journal) | Reflect on the uniqueness of human traits. |   | Duration: 40 min | Scoring: 20 | Points Earned: _____ | Lesson 1.2: Passing On Traits | (Documents: Key Terms) | Activity 1.2.1: Study - Meiosis | (Documents: Study Sheet) | Learn about the process of meiosis. |   | Duration: 40 min |   |   | Activity 1.2.2: Quiz - Meiosis | Take...

Words: 3422 - Pages: 14

Premium Essay

Anatomy and Physiology 1

...reference to the human body. (LECT & LAB) Describe each of the following levels of organization of the human body: chemical, cellular, tissue, system, organism. (LECT & LAB) Identify the principal systems of the body. (LECT & LAB) Describe the standard anatomical position of the human body. (LECT & LAB) Compare common anatomical terms used to describe the various regions of the human body. (LECT & LAB) List by name and location the principal body cavities. (LECT & LAB) Define homeostasis and explain the effects of the lack of homeostasis on the body's function. (LECT & LAB) Describe the chemical level of organization of the human body. Describe the interrelationship of matter, elements, and atoms. (LECT) Identify by name and symbol the principal elements of the human body. (LECT) Diagram and label the structure of a typical atom. (LECT) Describe the function of electrons located in incomplete outer energy levels. (LECT) Define the terms isotope and radioisotope and give their functions. (LECT) Describe the three types of chemical bonding (ionic, covalent, hydrogen) and give an example of each. (LECT) Describe what happens during a chemical reaction. Give three types of chemical reactions. (LECT) Interpret the information given in chemical notations. (LECT) Define ion, oxidation, and reduction. (LECT) Distinguish between organic and inorganic molecules. (LECT & LAB) Define solution, solute, and solvent. (LECT & LAB) Define...

Words: 2061 - Pages: 9

Premium Essay

Operation Management

...goals. Their main task is to decrease mortality rates and ease the suffering of cancer patients in a respectable manner. Therefore it was recommended that we offer a brief of the major functions in the center and a thorough analysis of their Lab. The aim of this study is to investigate the satisfaction level of the laboratory patients, determine bad processes adopted by the Lab and provide potential ideas that would enhance its’ services. The team had some access to Customer Satisfaction Questionnaires and Interviews that were carefully developed to handle patients’ feedback and complaints in addition to some observations’ outcome. It is apparent that KHCC Lab enjoys a good to very good customer satisfaction in most aspects; nevertheless the major drawbacks were the delays and repetitive activities. As we went through the process and analyzed the workflow utilizing flowcharts, and control charts, we concluded that some functions are working perfectly and others need a little refinement. In conclusion, the team members identified two areas of concern; the workflow and the layout. Therefore the processes should be revisited; a new layout is to be redesigned to improve efficiency and patient’s satisfaction. In addition to the above the Lab must also eliminate or improve their blood specimen rejection problem, which is considered to be a costly problem in the long run; with our OM Pareto analysis we noticed that inadequate sample volume and Hemolysed sample are the...

Words: 2794 - Pages: 12

Free Essay

Spcc

...Table of Contents 1. Acknowledgement 3 2. Introduction 4 2.1 Smart Home Control System 4 2.2 LabVIEW 5 3. Project Requirement 6 3.1 Project Requirement fulfilled by using LabVIEW 6 3.2 Why should I Use LabVIEW? 7 3.3 How does LabVIEW work? 8 3.3.1 Front Panel 8 3.3.2 Block Diagram 9 3.3.3 Icon 9 4. System Analysis 10 4.1 Flow Chart – Client 10 4.2 Flow Chart – Server 11 4.3 Floor Plan 12 5. Protocol Design 13 5.1 The Internet and Client-Server Model 13 14 5.2 Using TCP/IP with LabVIEW 15 5.3 Control Interface - Client Connection 16 5.3.1 TCP Open Connection 16 5.3.2 TCP Write 16 5.4 Indicator Interface - Server Connection 17 5.4.1 TCP Listen VI 17 5.4.2 TCP Read 17 6.4.3 TCP Close Connection 18 5.4.4 Clear Error VI 18 6. Hardware Research 19 7. Extra Features 22 7.1 Alarm 22 7.2 Smart Control 23 7.3 Multiple User Login 23 7.4 Master Control 24 8. Assumption 25 9. Limitation 26 10. Future Enhancement 27 11. Conclusion 28 12. References 29 13. Appendix 31 13.1 User Manual 31 13.2 Class Work Program 37 13.2.1 Television 37 1. Acknowledgement First and foremost, I would like to express my deepest gratitude to everyone that made it possible for me to complete this System Programming and Computer Control (SPCC) assignment. This assignment was one of the most challenging task for me but putting in massive amount of determination, awareness and perseverance eventually helped me to excel and complete...

Words: 5590 - Pages: 23

Free Essay

Fssadfsgsg

...[pic] Australian School of Business School of Banking and Finance FINS 5516 International Corporate Finance Course Outline Session 1, 2010 1. Course Staff 3 1.1 Communication with Staff 3 2. Information about the course 3 2.1 Teaching Times and Locations 3 2.2 Units of Credit 3 2.3 Parallel Teaching in the Course 3 2.4 Relationship of This Course to Other Course Offerings 3 3. Course Aims and Learning Outcomes 3 3.1 Course Aims 3 3.2 Student Learning Outcomes 4 3.3 Approach to Learning and Teaching 5 3.4 Teaching Strategies 5 4. Continual Course evaluation and Improvement 5 5. Learning Assessment 5 5.1 Formal Requirements 5 5.2 Assessment Details 5 5.3 Assignment Format 6 5.4 Assignment Submission Procedure 6 5.5 Late Submission 6 5.6 Special Consideration and Supplementary Examinations 6 6. Academic Honesty and Plagiarism 7 7. Student responsibilities and conduct 7 7.1 Workload 8 7.2 Attendance 8 7.3 General Conduct and Behaviour 8 7.4 Keeping Informed 8 8. Student Resources 9 8.1 Course Resources 9 8.2 Other Resources, Support and Information 9 9. Course Schedule 12 1. Course Staff A/PROF. DONGHUI LI Office: ASB 342 Email: donghui@unsw.edu.au Tel: 9385 5873 1.1 Communication with Staff Consultation Hours: Friday 9:00 –11:00 Outside these times, meetings are by prior appointment only. E-mail the staff in question and arrange a mutually convenient time. Teaching staff will only respond to...

Words: 2909 - Pages: 12

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...

Words: 16182 - Pages: 65

Premium Essay

Police Abuse Essay

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...

Words: 16043 - Pages: 65

Premium Essay

Introduction to Networking

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...

Words: 16043 - Pages: 65

Free Essay

Inertia Bending of a Connecting Rod Experiment

...Background------------------------------------------------------------------------------------------2 1.3 Theory-----------------------------------------------------------------------------------------------2 1.3.1 Bending moment-----------------------------------------------------------------------------2 1.3.2 The Right Angle Assumption--------------------------------------------------------------------------5 2. Apparatus----------------------------------------------------------------------------------------------6 * 3. Data-----------------------------------------------------------------------------------------------------7 * 4. Procedur-----------------------------------------------------------------------------------------------7 * 4.1 Recording-------------------------------------------------------------------------------------------7 * 4.2 Calibration------------------------------------------------------------------------------------------7 5. Results--------------------------------------------------------------------------------------------------8 * 5.1 Determination of the calibration constant----------------------------------------------------8 5.2 Calculation of the Bending Moments----------------------------------------------------------9 5.2.1 Analysis of the oscilloscope traces----------------------------------------------------------9 5.2.2 Calculation of...

Words: 2873 - Pages: 12

Premium Essay

Wongxiaoming

...-1? “ The Aim of the Course To develop and apply technologies for valuing firms and for strategic planning to generate value within the firm. • • Features of the approach: A disciplined approach to valuation: minimizes ad hockery – Built on theoretical and empirical findings from scientific research I ‘_ Marries fundamental analysis and financial statement analysis – Exploits accounting as a system for measuring value added – Exposes good (and “bad”) accounting from a valuation perspective L Financial Statement Analysis and Security Valuation • • • Integrates financial statement analysis with corporate finance Focuses on technologies that can be used in practice – Based on real world examples Adopts activist point of view to investing – The market may be inefficient 0-1 What Will You Learn from the Course Part I Financial statements and valuation Ch. 1-7 • How intrinsic values are calculated • What determines a firm’s value • How businesses are analyzed to assess the value they create • How financial analysis is developed for strategy and planning • The role of financial statements in determining firms’ values • How to pull apart the financial statements to get at the relevant information • How ratio analysis is employed in valuation • How growth is analyzed and valued • How to calculate the P/E and P/B ratio and what they should be • The value of operations • How to make forecasts and develop valuations • How to assess the quality of the...

Words: 2057 - Pages: 9

Premium Essay

Computer - What Is It?

...------------------------------------------------- omputer From Wikipedia, the free encyclopedia For other uses, see Computer (disambiguation). "Computer system" redirects here. For other uses, see Computer system (disambiguation). "Computer technology" redirects here. For the company, see Computer Technology Limited. Computer | | A computer is a general purpose device that can be programmed to carry out a finite set of arithmetic or logical operations. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem. Conventionally, a computer consists of at least one processing element, typically a central processing unit (CPU) and some form of memory. The processing element carries out arithmetic and logic operations, and a sequencing and control unit that can change the order of operations based on stored information. Peripheral devices allow information to be retrieved from an external source, and the result of operations saved and retrieved. The first electronic digital computers were developed between 1940 and 1945 in the United Kingdom and United States. Originally they were the size of a large room, consuming as much power as several hundred modern personal computers (PCs).[1] In this era mechanical analog computers were used for military applications. Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple...

Words: 1954 - Pages: 8