Free Essay

Spanish Packet

In: English and Literature

Submitted By danicoto
Words 1736
Pages 7
Spanish IV AP 2011-2012 Summer Assignment

The activities in this assignment are meant to help me become familiar with your Spanish skills at this point. They will help you become familiar with the textbook, its Supersite and the WebSAM. You need to know how to use them by the beginning of the Fall semester. You’ll also do activities in the Barron’s AP Spanish book. If you encounter problems or know of situations that will keep you from submitting your work by the stated deadlines, you need to contact me at your earliest convenience. I will contact parents for verification.

By July 16th.
Write a reflection piece in English on your Spanish language skills and learning style. You may list your answers to the questions below or write a composition. Submit as a Word document to HYPERLINK ""

1) In what areas do you do well in Spanish without putting out a great deal of effort? (You may address- listening comprehension, reading comprehension, vocabulary, grammar, spelling, accentuation, speaking, pronunciation, composing your thoughts clearly before writing or speaking, etc.)
2) In what area(s) do you do well in Spanish, after putting out a considerable amount of effort?

3) What types of activities help you learn more effectively? * Hearing others’ explanations and examples, * Reading numerous explanations of grammar or vocabulary items, * Writing diagrams, formulas or summaries of explanations of the grammar, * Seeing visual representations, explanations or dramatizations of grammatical or vocabulary concepts

4) In which areas would you like assistance and why? * In: speaking, reading, spelling, accentuation, grammar, and listening comprehension.

By July 23rd . Read and complete the attached handout “Game-like Rules for Putting Accent Marks on Words Correctly”. E-mail me your responses. Be sure to review the feedback I send you as well as the rules frequently before the fall semester. You will be quizzed on them during the first week of classes.

Write a 150 word composition on - “Mis responsabilidades, presiones y deseos durante el año escolar”. E-mail it as a Word document, with your Name, Date, Title. Include an introductory paragraph, body paragraphs and a concluding paragraph – with supporting details and addressing the questions below. Refer to the attached sheets for how to put accents through the computer.
¿Qué cosas te mantendrán muy ocupado(a) el próximo año escolar? ¿Estarás envuelto(a) en algunas organizaciones o deportes – en qué semestre(s)? ¿Tendrás varias clases difíciles – cuáles? ¿Vas a trabajar? (¿Dónde y cuántas horas?) ¿Qué deseos/esperanzas tienes? ¿Qué vas a hacer para controlar el nivel de estrés que puedas sentir? ¿Qué cosas te harán sentirte feliz o contento(a)?

By July 30th
Purchase the Imagina, 2nd ed. student textbook, and the pass codes for its Supersite and the WebSAM.

Set up/create your Imagina Supersite account. After purchasing your Supersite access code, you’ll receive confirmation that it is redeemable. Next, create a Supersite account so that you can use the Supersite. Go to HYPERLINK "" Then, click on the “Create an account” under the “New to VHL Central?” Enter your access code to get started and follow the directions you are given. You’ll need to provide information to create your account and click on “Create an account”. Then, you’ll see the main view of your Supersite.

Enroll in my course, Span. IV AP from July 1, 2012 to June 12, 2013. (These dates allow you to start submitting Supersite work during the early part of the summer.)

You will click on the “Enroll” link at the top of the Students tool sidebar. On the “Select School Location and Type” choose “United States”, “California” and “High Schools”. Click Save & Continue. On the “Select Your School” page, select “Note Dame High School” from the list and Save & Click. You should see my name, dates of instruction and Section 1. Then click Save. You’ll see a confirmation of enrolling successfully in the class. Now you can do and submit work for activities on the Supersite and WebSAM.

Before Aug. 5th
Open up the Supersite – providing your necessary Log in information, and take all of the student tour.

It has various components. These do not have to be done all in one sitting. Take notes as you do the tour because you will be writing a reflection about your experience about how it went for you. See below.

By Aug. 10th.
Send me a reflection or comments, in English, about your experience taking this Supersite tour.
Include information about - when you took the tour, how long it took you to do it, if you had any problems with it, what you found helpful and/or interesting, and what you liked about it. At the end, you can add some questions and concerns that you may have. You will receive points for the course from this part of the summer assignment. Please provide a clear and sufficiently detailed (not overly detailed) picture of your experience. Minimal effort earns you minimal points. Note that you can contact the website’s technical assistance link and phone number with questions while you are on the computer.

By Aug. 13th.
Do several activities and exercises on the Supersite by following the instructions below. Some take only a few minutes to do. They help you learn to manipulate various components of the Supersite.
1. Open the Supersite, click on Lección 1 under the section “PARA EMPEZAR” and click on the section “ Las relaciones personales” . Review & listen to these terms, and then go back to the page with the list of activities for Lección 1.

2. Under the section “Práctica”, which is in the “PARA EMPEZAR” section, DO the activities “Definiciones” and “Identificar” and click submit at the bottom of each exercise.

3. In the “CULTURA” section of the list of activities, go to the “Preparación” subsection and do the Vocabulario de la lectura and Vocabulario activities. Click submit at the bottom of each exercise.

4. Then, under the “Lectura” section, listen to Corriente Latina. Then, go to the “Análisis” section and do the activities titled Comprensión and ¿Cierto o falso? Click submit at the bottom of each exercise.

5. Click on the WebSAM heading of the menu bar and click on Lección 1. Then, click on the section titled “WORK- BOOK” with the blue background. Click on the arrow to its right and you will see the title “LAB MANUAL”. Go to the section ESTRUCTURAS and find the section “1.1 The present tense”. Click on and do 1 – Nueva compañera. Click submit at the end of the activity.

6. Continue on the “Practice” section and find the “Estructura” section and Click on 1.2 Ser and estar. In the Tutorials section. Click on Ser vs. Estar. Do and submit the four activities in the section titled “Práctica”.
By August 16th
Purchase The Barron’s AP Spanish, 7th ed. 2011 (ISBN: 978-1-4380-7030-8) and do the activities described below. You can purchase it through MBS Direct or at a local book seller.
You will use this textbook primarily at home to do assignments (practice sections for the test) and review the answer key. It has various reference sections to review vocabulary, grammar, and the rules of accentuation. It has many suggestions for improving your speaking and writing skills as well as your reading and listening comprehension.
1. Read pp. 3-7, introduction to the AP exam and its format
2. Read pp. 16-17, How to use this book.
3. Read pp. 122-128. Preparation for Reading comprehension and vocabulary study
4. Do the activity on p. 125
5. Submit a summary in English (via e-mail) of your reaction to the sections you read and the activity you did in Barron’s.
Game-Like Rules for Putting Accent Marks on Words Correctly

After each of the following rules, write as many examples as come to mind. E-mail this back with me with your answers by July 23rd. Be ready for a quiz during the first week of class.

WORDS THAT ALWAYS TAKE WRITTEN ACCENT MARKS BELONG TO THE FOLLOWING CATEGORIES. Note that the accent marks are over the vowel with the oral emphasis. Spanish words have the stress or oral emphasis in only one vowel per word.

1. Question words ¿Qué? OTHERS ARE: _________________________________________________


2. Exclamation words ¡Qué interesante! = How interesting!, ¡Cómo habla! (How he/she talks!)

OTHERS ARE: ________________________________________________________________________

3. Words that use accent marks to distinguish them from other words which are written the same, pronounced the same, but have different meanings. Please write the meaning for the following words. él ______ mí ______ tú ______ sé _______ sí________ sólo _________ el ______ mi ______ tu ______ se _______ si _______ solo _________

OTHERS ARE: ________________________________________________________________

4. Words with combinations of “i” or “u” and other vowels (“a”, “e”, “o” or “u”) and with the oral emphasis on the “i” and the “u”, and not on another vowel in the word. These combinations of vowels are pronounced in 2 separate syllables. The underlined vowel has the oral emphasis of the word.

** With accent mark: tía tío ríe reí actúa Raúl OTHERS ARE: __________________

vs. ** Without accent mark: piano baila siete veinte radio esteroides cualidad pausa bueno deuda cuidado individuo

OTHERS ARE: ________________________________________________________________

WORDS that do not belong to the four categories above TAKE WRITTEN ACCENT MARKS ONLY if they have either (+ -) or (- +) answers to the two questions below. (Note that after doing exercises like this one, you will be able to come to conclusions about groups of other words that always take accent marks.) The underlined vowel has the oral emphasis of the word.

1. Does the word end in a vowel (a, e, i, o, or u), “n” or “s”? Write (+) if Yes, and (-) if No.

2. Is the oral emphasis or stress in the second to the last syllable? Write (+) if Yes, and (-) if No.

Words with (+ + ) answers = televisiones hablo joven jugo lunes

Words with ( - - ) answers = universidad hablar actriz fatal fenomenal

Words with (+ - ) answers = fantástico habló jóvenes jugó televisión

Words with ( - + ) answers = lápiz huésped suéter útil portátil

On the following words write an accent mark if needed and indicate why below the words. -- Indicate if the word follows rules # 1 through # 4, or if it has (+ -) or (- +) as the answers to questions 1 and 2 above.

arbol natal util sensacional Lopez actriz feliz heroe aereo oceano feo

traer teatro verdad universidades reunen pais despues estudie estudie

Similar Documents

Free Essay

Implementing Firewall Configurations

...configure, maintain and monitor rules for multiple profiles, notifications and authenticated exceptions and he would also like me to be able to create and manage inbound and outbound rules and with windows firewall I can accomplish both of these task because Windows Firewall with Advanced Security works by examining the source and destination addresses, source and destination ports, and protocol numbers of a packet, and then comparing them to the rules that are defined by the administrator. When a rule matches a network packet then the action specified in the rule (to allow or block the packet) is taken. Windows Firewall with Advanced Security also lets you allow or block network packets based on whether they are protected by IPsec authentication or encryption. Then I could also have capabilities of Data encryption and connection security rules with Windows Firewall Data protection includes both data integrity and data encryption. Data integrity uses message hashes to ensure that information is not being changed while in transit. Hash message authentication codes (HMAC) sign packets to verify that the information received is exactly the same as the information sent. This is called integrity and it is critical when data is exchanged over unsecured...

Words: 344 - Pages: 2

Free Essay

Sec 402 Wk 8 Assignment 2 Implementing Network

...SEC 402 WK 8 ASSIGNMENT 2 IMPLEMENTING NETWORK To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 402 WK 8 ASSIGNMENT 2 IMPLEMENTING NETWORK SEC 402 WK 8 Assignment 2 - Implementing Network and Personnel Security Measures Write a four to five (4-5) page paper in which you: 1. Create an information flow diagram, using Visio or Dia, which: a. Illustrates how remote users will securely connect to the government agency’s network. b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to server. Note: The graphically depicted solution is not included in the required page length. 2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list: a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items. b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment. 3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you: a. Describe the risks associated with not fulfilling the activities outlined within your maintenance......

Words: 832 - Pages: 4

Free Essay

Nt2580 Lab 2.2

... Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to, timeout is 2 seconds: .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 0/0/2 ms PC>ping Pinging with 32 bytes of data: Reply from bytes=32 time=1ms TTL=128 Reply from bytes=32 time=0ms TTL=128 Reply from bytes=32 time=0ms TTL=128 Reply from bytes=32 time=0ms TTL=128 Ping statistics for Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 1ms, Average = 0ms Packet Tracer PC Command Line 1.0 PC>ping Pinging with 32 bytes of data: Reply from bytes=32 time=1ms TTL=128 Reply from bytes=32 time=0ms TTL=128 Reply from bytes=32 time=0ms TTL=128 Reply from bytes=32 time=0ms TTL=128 Ping statistics for Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 1ms, Average =...

Words: 277 - Pages: 2

Premium Essay

Term Paper: Ripe

...Game.............2 Logging Packets...............3 Sending Packets...............3-4 Dynamic Packets..............5 Packet Blocking...............6 Packet Modification........6 Opcode Labeling..............7 Introduction to RiPEST...7 RiPEST Database.............8 Further Reading................8 1 RiPE Injecting RiPE: If you are using RiPE Launcher: Select the game or process that you want to inject into, and then click the "Inject" button. RiPE Launcher comes with RiPE. Make sure that RiPE Launcher is in the same folder / directory as RiPE.dll. If you are using Injector Gadget: Select the game or process that you want to inject into from the left. Add RiPE.dll to the DLLs to Inject list by browsing for it or dragging the .dll and dropping it into the DLLs to Inject box. After that is done, click the "Inject" button. Do NOT check "Cloak DLL." RiPE uses its own cloaking methods. Selecting a Game: After injecting, you should now see a "Game Selection" dialog. Select the game that you want to use RiPE for from the left, and the version from the right. Click on "Continue." You may additionally "Search for a Plugin" to search the RiPEST plugin database for other plugins. Plugins appear on the Game Selection menu just like any other game. 2 RiPE Logging Packets: To log packets, simply click "Hook Send" or "Hook Recv." Hook Send will log packets sent FROM the client TO the server. Hook Recv will log packets sent FROM the server......

Words: 1937 - Pages: 8

Free Essay


...for a change in the way data is delivered. Currently it’s by one packet of information (data) at a time. After some research I have learned there are a number of ways people are trying to change this method of data delivery. Some of them are: • Packets • Capsules • Holograms and Lasers • Teleportation I will give a brief explanation of each one and include the advantages and disadvantages. The current technology uses packets which are small files of information wrapped by a header and footer with security information on the both sides. These are the destination the packets are being sent to and the source that the packets are coming from. The advantages are: Packets are very secure because they can use encryption. Key exchange algorithms are used to securely exchange a shared secret value between two computers over an unsecured network connection. The computers exchange information that, when processed by the algorithm, produces the shared secret value. A third computer listening on the network and intercepting network packets between the first two computers cannot determine the shared secret value. The shared secret value can then be used as a session key, or to generate a session key, to encrypt the rest of the communications used in the IPsec negotiations. (Technet) • Small enough to send quickly The disadvantages are: • high learning curve • only sent one packet at a time Bottom line with packets it is like downloading a two-hour movie in 3 hours with a......

Words: 1069 - Pages: 5

Premium Essay

Abc: Foodles Finance of Foodles

...Cost of yoodles is Rs. 10. 2. Sales Pattern in two halfs of 2011 is in the ratio 45:55. 3. The Duzy Pasar Retail Chain is available in 77 cities Working: | Demeter | Category | Total sales Ytd. 2011(Rs.) | 15381861.56 | 314249823.08 | Projected Yearly sales FY 2011(Rs.) | 34147733 | 697634607 | Target Market share | 15% | - | New Projected Sales FY 2011 | 104645191 | - | Incremental Sale | 69995007 | | Total Cost of BTL | 109152928 | - | ROI | 64% | - | Calculation of the cost: The following are the various costs for the BTL activities: Sample explanation: 1. Wet Sampling: 1 packet will serve 5 customers No. of customers per day: 40 (metros)+ 30(B & C Class cities) No. of packets per day per hyper per metro: 8+5.2=13.2 Total no. of packets: 8*15 (metros)+ 5.2* (77-15)= 442 Cost per day: 442* 7(unit cost of a packet)= 3097 per month Total cost for the next six month (2nd half-year): Rs. 557424 Similar calculations are done for other BTL Strategies. Analysis of the data provided: 1. For yoodles, in terms of cities. , the highest growth in sales in Mini metros & town class (‘C’ & ’D’ Class cities). 2. Also, the growth is highest for Modern Stores- Urban. 3. Region wise: * In Ytd. 2010, South & East did decently whereas North & west had extremely poor sales. * In Ytd. 2011, North & West picked up in sales. But Still we have highlighted North & West to strengthen its......

Words: 283 - Pages: 2

Free Essay

Term Paper

...Expectations from students: The aim of this Term Paper is to produce a Programming logic or Animation on the assigned Topic. The assignment is to read the existing system/problem and create a program of your concept to obtain the expected results. Assistance from text and reference books, articles and reports on the concerned topics from Internet can be taken but the animation logic should be your own piece of work. Along with, students are supposed to write an abstract of the topic with example, real world applications, and impact on society or solutions recommended. Abstract submission: (3-4 pages) • Description of the topic • Example of the given topic • Future plan of the given work. The Abstract (Synopsis) of the topic must be submitted latest by 15thof Sept and submission will be accepted thereafter. Final submission: a) A report containing following contents: 1. Introduction Provide a brief textual description of the problem. Elaborate on the given problem statement, providing some more detail. 2. Background a. What was the weakness in the previous algorithm/concepts and requirement of existing algorithm/concept? 3. Methodology : a. Steps of making the program (graphics be used to showcase the output) 4. Observation a. Result in the form of output and a well formatted report. 5. Future Scope and Suggestion --- Suggestion to improve the......

Words: 835 - Pages: 4

Free Essay

Tech Support

...William Kollie IS3120: Convergence of IP Based Network MR. McMiller July 20 2014 The dial up connection is made from a computer through modem and telephone line to the ISP's computer. The computer uses data in digital form. It means that it the computer can transmit data in 1's and 0's on and off also called digital or binary form. On other hand, telephone lines transmit data in analog form. It means that they transmit data by sound. the telephone line from your house is joined to a special terminal that sends the data received from their computers in form of audio signals from to enter the Public Switched Telephone Network PSTN. From PSTN, it is routed to the person or ISP that the modem is calling through the internet. Dial-up connection face connectivity problem which the user has to deal with. Dial up connection is unstable, dialup demand phone line connection which block incoming calls access, the chief disadvantage of dialup Internet, as compared with broadband Internet, is its slowness. Access to modern broadband networks is essential in the information age, said FCC Chairman Tom Wheeler. Yet 15 million Americans live in areas where they can’t get wireline broadband no matter how much they want it. These funds will jump-start broadband access in areas that would otherwise be bypassed by the digital economy. At least 100 million U.S. homes should have affordable access to actual download speeds of at least 100 megabits per second and actual upload......

Words: 687 - Pages: 3

Premium Essay

It321 Unit 1

... Step 11- Step 12- No Step 13- None Step 14- No it could not ping default gateway, Step 15- No Step 18- R1, R2, and R3 are connected, because it use PPP Step 19- Fa0/0 Step 21- Yes Step 22-,,,; R1 forward the packet to R3 which send it to R2 which sends it to PC2 Step 24- R3 S0/0/0 Step 26- belongs to R3 S0/0/1; belongs to R1 S0/0/0 Step 27- Yes, Serial interface S0/0/1 Step 28- Yes, passive interface S0/0/1 Lab 7 Step 2- R2 Fa0/0, PC2 Step 3-,,,,, and Step 4- Yes, All route exist on table Step 5- R3 S0/0/0, R1 S0/0/1 Step 6- Goes to R3 then back to R1 Step 8- via Step 9- there is no route to Step 10- use static default S0/0/0 Step 11- R1 use a static route to that send the packet to R3 and R3 use default to send it back to R1 Step 12- No Step 13- No, from R1 to R2 Step 14- ip route Step 15- Use command “configure terminal” then command “no ip route” Step 16- It will take Step 17- Takes route......

Words: 610 - Pages: 3

Free Essay

Nt1210 Lab 6. 1-4

...Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. It has a very very short range and is unable to penetrate walls and other objects. 3. It is able to maintain connection anywhere in the house it is setup in without the need of trailing a connection cable like wired connections so you get a tradeoff of speed vs versatility Lab 6.2 Review 1. The biggest problem would be collision if multiple routers are using the same channel a common example of this is Comcast routers are set to use a channel close to the signal for the ps3 so you get a depredation of signal and loss of data packets as the connection goes on. 2. If a previously stated standard is not compatible with your adapter you could have issues with your connection not connecting Lab 6.3 Review 1. Um well I could write a book but simply a guest having access to your network could result in any imaginable results on your network to name a few rootkits,Trojan droppers, Remote Access Terminals, Keyloggers, Viruse’s. 2. Setting a MAC filter is a good way to filter who has access to your network its simply like saying Fred has access to the building with his fingerprint being scanned by a biometric scanner. Although this can be spoofed by spoofing your mac but you would still have to find out which macs are allowed and have to make sure the mac your spoofing is not connected so that you do not receive a duplicate error. Lab Review 6...

Words: 393 - Pages: 2

Premium Essay


...something like a spoken language that uses electricity. A header and/or trailer as a place to store a message that needs to flow through the network with the user data. Leased line creates the equivalent of a cable directly between two remote sites. T Internet Protocol (IP), list the rules so that the network can forward data from end to end through the entire TCP/IP network. IP address identifies that device in a TCP/IP network. Remember, computer networks, including TCP/IP networks, need to deliver bits from one device to another. IP routing defines exactly how routers makes their choices of how to forward data in a TCP/IP network. : frame and packet. The term frame specifically refers to encapsulated data that includes the data-link header and trailer, plus everything in between—including the IP header. The term packet refers to what sits between the data-link header and trailer, but not including the data-link header and...

Words: 257 - Pages: 2

Free Essay


...Kod Projek : | BITU 3973 | UNIVERSITI TEKNIKAL MALAYSIA MELAKAFACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGYPROJEK SARJANA MUDA 1PROPOSAL FORM[Incomplete form will be rejected] | A | TITLE OF PROPOSED PROJECT:Tajuk projek yang dicadangkan :ANALYSIS ON IPV6 ATTACK (SMURF6) | B | DETAILS OF STUDENT / MAKLUMAT PELAJAR | B(i) | Name of Student:Nama Pelajar: JAMALUDDIN BIN NAFIS Identity card no.:No. Kad Pengenalan : 910424-14-6277Student card no.:No. Kad Pelajar : B031310034 | B(ii) | CorrespondenceAddress :Alamat Surat Menyurat : 66G JLN MELUR 3 SERI MELUR KG MELAYU AMPANG 68000 SELANGOR DARUL EHSAN. | B(iii) | Program Pengajian:Study Program:BITS BITS BITM BITM BITI BITI BITC BITC BITD BITD | B(iv) | Home Telephone No.: No. Telefon Rumah: Handphone No.:No. Telefon Bimbit: 017-6160196 | B(v) | E-mail Address:Alamat e-mel: | C | PROJECT INFORMATION / MAKLUMAT PROJEK | C(i) | Project Area (Please tick): Bidang Projek (Sila tanda ( √ )): A. Intelligent Information Systems Sistem Informasi Pintar B. Software Technology Teknologi Perisian C. Database Technology Teknologi Pangkalan......

Words: 1224 - Pages: 5

Premium Essay

It Wk7

...Getting a Mobile IP is extremely important for any kind of mobile devices linked to the internet. In case there was no Mobile IP, a computer device would need to get a fresh IP each time it shifted from one network to a different one. The reason is since TCP/IP depends on origin as well as destination IP handles for being referenced in the data packet headers: Which means the mobile devices are not able of modifying the IP address as well as maintaining a continuous link. That's the place where Mobile IP comes into play as well as altered that. Having Mobile IP every time a device goes to afresh network, the IP address of the device is provided. One of the benefits of using Mobile IP which is obvious to everybody is that it lets the cordless devices to move around freely into new networks without losing net connection. For users which use cordless devices on a regular basis, it means that maintaining online connectivity to VPNs as well as company intranets, enhances employees efficiency. (Cisco, 2007)Just like anything else there are also drawbacks to Mobile IP. There are lots of routers on the market which are designed to throw away packages which are meant for IP addresses that do not exist in the networks. This is chiefly carried out prevent the network from any attacks. So as to fix this issue, there will have to be enhanced header sizes, that leads to a higher amount of net traffic loads. There are lots of items that are keeping back Mobile IP. Obsolete as well as rival......

Words: 322 - Pages: 2

Free Essay

Packet Filtering

...Packet Filtering Index Should arriving packet be allowed in? Should a departing packet be let out? Filter packet-by-packet, making decisions to forward/drop a packet based on: Functions of Packet Filter Control: Allow only those packets that you are interested in to pass through. Security: Reject packets from malicious outsiders Watchfulness: Log packets to/from outside world In a software firewall, packet filtering is done by a program called a packet filter. The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides to prevent it from passing (called DROP) or allow it to pass (called ACCEPT). There are three ways in which a packet filter can be configured, once the set of filtering rules has been defined. In the first method, the filter accepts only those packets that it is certain are safe, dropping all others. This is the most secure mode, but it can cause inconvenience if legitimate packets are inadvertently dropped. In the second method, the filter drops only the packets that it is certain are unsafe, accepting all others. This mode is the least secure, but is causes less inconvenience, particularly in casual Web browsing. In the third method, if the filter encounters a packet for which its rules do not provide instructions, that packet can be quarantined, or the user can be specifically queried concerning what should be done with it. This can be inconvenient if it causes numerous dialog boxes to......

Words: 256 - Pages: 2

Free Essay

Dynamic Source Routing

...and Route Maintenance, where the Route Discovery mechanism handles establishment of routes and the Route Maintenance mechanism keeps route information updated. Assumptions Some assumptions concerning the behavior of the nodes that participate in the ad hoc network are made. The most important assumptions are the following: A1. All nodes that participate in the network are willing to participate fully in the protocols of the network. A2. The diameter of an ad hoc network is the minimum number of hops necessary for a packet to reach from any node located at one extreme edge of the ad hoc network to another node located at the opposite extreme. We assume that this diameter will often be small (e.g., perhaps 5 or 10 hops), but it may often be greater than 1. A3. Nodes can detect the error through a standard link-layer checksum or Cyclic Redundancy Check (CRC), and discard corrupted packages . A4. The speed at which nodes move is moderate with respect to packet transmission latency and wireless transmission range of the particular underlying network hardware in use. A5. Each node can be identified by a unique id by which it is recognized in the network. Mode of Operation DSR operate on demand, which means that no data, such as route advertisement messages, is send periodically and therefore routing traffic caused by DSR can scale down and overhead packages can be avoided. DSR is a source routing protocol, which means the entire route is...

Words: 1841 - Pages: 8