Ip Na

In: Science

Submitted By etherliffe
Words 754
Pages 4
Lab Report 1.2
Separating Components of a Mixture I. Objectives: 1. To know the best way of separating mixtures and substances. 2. To know the some ways of separating mixtures and substances. II. Materials:
STATION 1 * White sand * Clean bottle * Rice grains * Spoons * Rags * Strainers STATION 2 * A glass of water * Table esalt * Alcohol lamp * Matches * Clean bottles * Stirring rods * Small beakers * Biscuit can cover * Tripod * White Sand * Rags
STATION 3 * Ground charcoals * Rags * Iron filings * Magnet * 2 clean cups * Stirring rods III. Procedures:
STATION 1 1. Examine each sample of sand and rice grains. 2. Name some properties of each sample. Prepare a data table for observations. 3. Put a tablespoon each of the sand and rice grains in a clean bottle and stir. 4. Again observe the properties of sand and rice grains and note down any changes. 5. Describe some methods for separating sand from rice. 6. Try the method that your group thinks is the most efficient. 7. Describe your results.
STATION 2 1. Examine samples of water, sand and table salt. 2. Name some properties. 3. Fill a small beaker with water. 4. And in small propertions,half a spoon of salt, stirring the water after each addition. 5. Compare the appearance of salt before and after adding it to water. 6. Apply heat to the beaker and observe what happened when it was heated. 7. Repeat step 2 but using sand instead of salt.
STATION 3 1. Examine the sample of iron filings and the sample of ground charcoal 2. Mix equal amounts of iron filings and charcoal. 3. Stir well 4. Compare their appearance before and after stirring. IV. Data and Results Substance | Properties | Method | White sand( mixed…...

Similar Documents

Ip Addressing

...12.5% (or 1/8th) of the total IPv4 unicast address space. Class D Class D addresses have their leading four-bits set to 1-1-1-0 and are used to support IP Multicasting (IP Address, 2010). RFC 1918 IP address ranges There are 3 IP ranges that are not routed across the Internet and can only be used on local networks. These are RFC 1918 IP addresses. You will sometimes see these used on ISP networks, where the devices can only be accessed from within the ISP's network, not from the rest of the Internet. There are 3 IP ranges defined in RFC 1918: 10.0.0.0/8 (10.0.0.0-10.255.255.255), 172.16.0.0/12 (172.16.0.0-172.31.255.255), 192.168.0.0/16 (192.168.0.0-192.168.255.255) (havoc, 2012) Sampling of Martian/ Bogon address ranges A bogon list is a compilation of address ranges that are used on private networks and should not be visible on the public Internet under normal operation. Some bogons do appear on the public Internet for various reasons, including the (legitimate) use of non-globally unique addresses for router interfaces, source address spoofing in DDoS attacks and the use of unallocated address blocks for malicious or fraudulent purposes (Hyan, 2004) Martians A Martian packet is a packet that is reserved for special use by (IANA) and can’t actually be used or delivered. They arise in denial of service attacks from ip spoofing (Baker, 1995)....

Words: 598 - Pages: 3

Wala Na

...ngayon ang may account sa mga social networking site.Mga pinaka-sikat na libangan ng pinoy ngayon ngunit hindi lang maganda ang naidudulot nito sa atin dahil sa pag-unlad ng teknolohiya sa panahon natin ay rumarami rin ang paraan ng tao na manira ng kanilang kapwa tao. Sa katunayan napakaraming highschool student o teenager ang may mga ganito dahil sinasabi na " IN " ka pag mag ganito ka kaya napakaraming bata ang nahuhumaling na gumawa nito dahil napapadali nga naman ang komunikasyon ng mga tao at easy access nga naman at wala kang babayaran, ngunit dahil rin dito marami ang nasisira, halimbawa na lang nito ay ang pagpopost ng kung anu-anong kasiraan ng tao o kaya mga malalswang panuorin at minsan ay dito pa nagbabangayan ang mga estudyanteng may alitan.Sa mga estudyante ang nagiging epekto nito ay malaki dahil hindi na lang sa school ginagawa ang BULLY pati na rin sa social networking site katulad ng pangblablackmail ginagawa na rin dito upang makasira lang ng bata at nandiyan rin ang panghihingi ng ibang bata ng pera sa binubully nila at meron rin na ang iba ay sinisiraan ang isang bata na may tendencing mabasa ng iba ang mga mapanirang pahayag na dahilan na maapektuhan ito dahil nga bilang teenager madalas magtago ng sikreto ito sa mga magulang at minsan naaapektuhan rin ang emosyon at kilos ng teenager na nabubully sa social networking site. ......

Words: 310 - Pages: 2

Mobile Ip

...Material CheckPoint Assignment Mobile IP is emerging as the next industry standard for how wireless devices move from one network to another. This CheckPoint provides an opportunity for you to explore the possibilities of this new technology. Resources: Ch. 9 & 11 of CWNA Certified Wireless Network Administrator Official Study Guide Answer the following questions about the potential of mobile office networking and Mobile IP: • What are the advantages and disadvantages of Mobile IP? • What are the typical installations of Mobile IP? • Do you think Mobile IP will increase in popularity? Why or why not? Support your position with either textual evidence or research from the University Library. Format citations and references consistent with APA guidelines. CheckPoint The advantages of mobile IP protocol are numerous. First of all, unique IP assigned to a specific node allows for faster and more reliable routing. Second, high level of portability is reached as it allows users to go through different networks maintaining same IP address. Lastly, it allows users to cross over between networks without losing connectivity and session. I could not locate anything specific about disadvantages of mobile IP in the textbook or on the Internet, but I did find a few problematic issues with it. First, the mobile IP requires a very strong signal to work properly. If signal is anything......

Words: 454 - Pages: 2

Nas for Organization

...Network-attached storage (NAS) for a small company. This study was commissioned by Design Foundation Finland, aiming to improve the security and the management of the information. This research will be aiming to find the proper way to design and implement a network storage, which will be used as the main data storage within the company for creating an ideal solution for data maintenance, security and ease of access to all the data of the foundation. The outcome of the thesis is a solution, which is created from scratch, offering a design and implementation of an NAS in a small company with a relatively small budget. The case foundation is located in Lahti. The foundation was established in 2009, aimed to improve and support the education (of design), as well as research and development of design. Design Foundation Finland also has an own R&D group to improve the design of Finnish products in several industrial fields. The method used in this study is qualitative, based on the author’s own observation within the subject, interviews among the employees of the Design Foundation Finland and it is done by utilizing Design Science research methodology to develop an artifact. The study result offers a solution to implement and utilize an NAS device in a small company without huge investments on equipment. The study result can be applied to create an NAS for a small company or it can be used as a basis to create an NAS for relatively big companies. Keywords: NAS, Backup, Security,......

Words: 10025 - Pages: 41

Ip Subnetting

...IP networking 12/17/2013 IP Addresses Classes and specific-Use IP Address Space An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.[1] An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[2] The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits for the address, was developed in 1995.[3] IPv6 was standardized as RFC 2460 in 1998,[4] and its deployment has been ongoing since the mid-2000s. IP addresses are binary numbers, but they are usually stored in text files and displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6). The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (Internet service providers) and other entities. In IPv4 an address consists......

Words: 841 - Pages: 4

Ip Networking

...router rip command, would cause RIP to send updates out two interfaces whose IP addresses are 10.1.2.1 and 10.1.1.1, mask 255.255.255.0? a. network 10.0.0.0 b. network 10.1.1.0 10.1.2.0 c. network 10.1.1.1 10.1.2.1 d. network 10.1.0.0 2550.255.0.0 e. network 10 f. You cannot do this with only one network command 7. What command(s) list(s) information identifying the neighboring routers that are sending routing information to a particular router? a. show ip b. show ip protocol c. show ip routing-protocols d. show ip route e. show ip route neighbor f. show ip route received   8. Review the snippet from a show ip route command on a router: R 10.1.2.0 [120/1] via 10.1.128.252, 00:00:13, Serial0/0/1 Which of the following statements are true regarding this output? a. The administrative distance is 1. b. The administrative distance is 120. c. The metric is 1. d. The metric is not listed. e. The router added this route to the routing table 13 seconds ago. f. The router must wait 13 seconds before advertising this route again. Chapter 15 Answer the following review questions. For some questions, more than one choice may be correct. 1. An internetwork diagram shows a router, R1, with the ip subnet-zero command configured. The engineer has typed several configuration commands into a word processor for later pasting into the router’s configuration. Which of the following IP addresses could not be assigned to the router’s Fa0/0......

Words: 1957 - Pages: 8

Ip Configuration

...For the network configuration, we decided to go with a partial mesh configuration to save on cost and time. With the amount of staff members and estimate growth on a annual basis. For Ip address that’s needed to allow enough for employees and guest for the business the sufficient. ip address 10.0.0.0.0 with 255.255.255.255 subnet with 256 usable ip address with a /25 allow guest to use the network . The configuration of the wireless network would allow the management workgroup to connect wireless on the third floor were the upper management staff. Basement level to the second/ first floor with run unshielded paired Ethernet cabling only to the telemarketers, which is about 85 feet. 15 ft for the security desk and 20 feet to training room. Sales agents will run off the wireless with workgroup allowing minimal access to display product to customers with restricted access to the outside internet with the configurations to allow monitor and packet captures as well as the management group .wireless system will support IEEE 802.11g ,IEEE 802.11b, IEEE 802.11a. Cisco wireless access point will be mounted on the ceiling with a hexagon formation to allow maximum coverage within the infrastructure. Basic information relating to the communication of the wireless network in figure 1.1 and the layout of the cisco wireless access points figure 1.2. each workstation not part of the training or security will be equipped with 150Mbps 2.4GHz Wireless PCI LAN Adapter Card......

Words: 321 - Pages: 2

Ip Subnetting

...n IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. Example: 140.179.220.200 It is sometimes useful to view the values in their binary form. 140 .179 .220 .200 10001100.10110011.11011100.11001000 Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address. Address Classes There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address. Class A addresses begin with 0xxx, or 1 to 126 decimal. Class B addresses begin with 10xx, or 128 to 191 decimal. Class C addresses begin with 110x, or 192 to 223 decimal. Class D addresses begin with 1110, or 224 to 239 decimal. Class E addresses begin with 1111, or 240 to 254 decimal. Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine; [You can test this: you should always be able to ping 127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting; Class E addresses are reserved for future use. They......

Words: 586 - Pages: 3

Nasty Nas

...Nafees Bost Professor Jordan-smith English 112 15 April 2013 Nasty Nas Quite possibly the only man to indirectly steal my attention with sheer words alone, such a man would have to be non-other than Nas, or Nasir bin Olu Dara Jones. Born the son of jazz musician Olu Dara, Nas dropped out of school in the eighth grade, trading classrooms for the streets of the rough Queensbridge projects, long fabled as the former stomping ground of Marley Marl and his Juice Crew as immortalized in "The Bridge." Despite having dropped out of school in the eighth grade, Nas developed a high degree of literacy that would later characterize his rhymes. At the same time, though, he delved into street culture and flirted with danger, such experiences similarly characterizing his rhymes. His synthesis of well-crafted rhetoric and street-glamorous imagery blossomed in 1991 when he connected with Main Source and laid down a fiery verse on "Live at the Barbeque" in which earned him instant respect among the East Coast rap scene. Not long afterward, MC Serch of 3rd Bass approached Nas about contributing a track to the Zebrahead soundtrack. Serch had been the soundtrack's executive producer and, like much of New York, had been impressed by "Live at the Barbeque." Nas then submitted "Halftime," and the song had impressed Serch enough for him to make it the soundtrack's leadoff track. Columbia Records meanwhile signed Nas to a major-label contract, and many of New York's finest producers......

Words: 874 - Pages: 4

Strorage Tech Nas

...paper on Network attached storage covering the various areas given in the contents below. Fall 2014 ASHIF ANWAR Illinois Institute of Technology-Chicago 11/30/2014 Contents: 1. Introduction. 2. History. 3. Product demonstration. 4. NAS future perspective. 5. Introduction Network Attached Storage is basically defined as a file level computer data storage server connected to a computer network. It is specialized for file server operation by its hardware, software or configuration of elements to provide data access to wide range of clients (Wikipedia, 2014). In simple words we can say “a network attached storage is a external hard drive which is a computer storage system that access and remains on a computer network via Ethernet and wireless connections. The drive is then accessible to all computers in a network, instead of one just hard wired computer”(Networking, 2014). Figure-1: NAS Storage on a network infrastructure. (slideshare, 2013). NAS is one of the popular approaches which allow homes and business to store and retrieve large amounts of data in an efficient and affordable manner. One can wirelessly backup their computer files such as music, videos and other important documents onto NAS and share the files seamlessly with any connected device such a home theatre and smart TV’s.(Networking, 2014). History: Now a days with fast developing field of computer data backup, new technologies and trends back-up methods and technologies......

Words: 661 - Pages: 3

Nas Devices

...Structure and Logic Research Project – Network Attached Storage A Network Attached Storage (NAS) device is a device connected to a network of two or more computer with the purposes of providing “community storage” of files and other data. As our society moves closer towards greater mobility the need to have mobile storage has increased. There are many types of storage devices, with various advantages and disadvantages to each of them; including Direct Attached Storage (DAS) and Network Attached Storage Devices. NAS devices are useful if all the computers on the network need access to the same files, DAS can only be accessed by the computer they are attached to (unless the computer grants access to another user. Most NAS devices contain multiple hard drives, which are connected by an internal server. There are many features of NAS devices. The speed of the network is dependent on the service available to the network and the number of users on the network. The capacity range of the network is depend on the hard drives contained in the device and the way it is setup. As with most servers or combination of two or more hard drives (Redundant Array of Independent Disks) RAID can be set up to maximize the use of the server and to protect the data. Also most NAS devices have software, which can be installed on client computers which allows the user to manage the device. The device has an IP address which also allows you to manage the device and connect to it. Password,......

Words: 626 - Pages: 3

Ip Spoofing

...12/7/2014 IP Spoofing ­ Cisco Systems The Internet Protocol Journal, Volume 10, No. 4 IP Spoofing HOME ABOUT CISCO PUBLICATIONS AND MERCHANDISE THE INTERNET PROTOCOL JOURNAL ISSUES VOLUME 10, NUMBER 4, DECEMBER 2007 Book Review Call for Papers Download PDF Fragments From the Editor IP Spoofing Looking Toward the Future Remembering Itojun Security Standards Layers above IP use the source address in an incoming packet to identify the sender. To communicate with the sender, the receiving station sends a reply by using the source address in the datagram. Because IP makes no effort to validate whether the source address in the packet generated by a node is actually the source address of the node, you can spoof the source address and the receiver will think the packet is coming from that spoofed address. Many programs for preparing spoofed IP datagrams are available for free on the Internet; for example, hping lets you prepare spoofed IP datagrams with just a one­line command, and you can send them to almost anybody in the world. You can spoof at various network layers; for example, you can use Address Resolution Protocol (ARP) spoofing to divert the traffic intended for one station to someone else. The Simple Mail Transfer Protocol (SMTP) is also a target for spoofing; because SMTP does not verify the sender's address, you can send any e­mail to anybody pretending to be someone else. This article focuses on the various types of attacks that involve......

Words: 3181 - Pages: 13

Tcp/Ip

...1. Three basic building blocks of the internet? = Packet-switch hardware, a communications protocol (TCP/IP), Client/server computing 2. Latency? How does it interfere with internet function? = low level of service quality (delay/late) 3. Explain how packet switching works? = Packet switch is a method slices digital message into packets, routes the packets along different communication paths as they become available, and then reassembles the the packets once they arrive at their destination 4. How is the TCP/LP protocol related to information transfer on the internet? = it is the core combinations protocol for the internet. TCP establishes the connections among sending and receiving web computers and makes sure the packets sent by one computer aww received in the correct sequence by the other, without any packets missing IP provides the addressing scheme and is responsible for the actual delivery of the packet 5. What technological innovation made client/server computing possible? = Client 6. What is cloud computing, how has it impacted the internet? = Cloud computing refers to a model of computing in which firms and individuals obtain computing power and software applications over the internet, rather than purchasing the hardware and software and installing it on their own computers. Cloud computing is the fastest growing form of computing 7. Why are smartphones a disruptive technology? = that radically alters the personal computing and e-commerce......

Words: 346 - Pages: 2

Ip Spoofing

...IP Spoofing: An Introduction Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. IP spoofing is one of the most common forms of on-line camouflage. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by “spoofing” the IP address of that machine. In this article, we will examine the concepts of IP spoofing: why it is possible, how it works, what it is used for and how to defend against it.Internet Protocol – IP Internet protocol (IP) is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field. It's important to note that each datagram is sent independent of all......

Words: 1398 - Pages: 6

Ip Addressing

...IP ADDRESSING: An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." The designers of the Internet Protocol defined an IP address as a 32-bit number[ and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995, standardized as RFC 2460 in 1998, and its deployment has been ongoing since the mid-2000s. In the most widely installed level of the Internet Protocol (IP) today, an IP address is a 32-bit number that identifies each sender or receiver of information that is sent in packets across the Internet. When you request an HTML page or send e-mail, the Internet Protocol part of TCP/IP includes your IP address in the message (actually, in each of the packets if more than one is required) and sends it to the IP address that is obtained by looking up the domain name in the Uniform Resource Locator you requested or in the e-mail address you're sending a note to. At the......

Words: 1361 - Pages: 6