Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the subnet ID, broadcast ID, usable addresses for sub networks and others). The simulator also includes the ability to draw a suggested network topology that matches the entries. The implementation of the simulation required only very few entries (IP, prefix and number of subnets).This simulator is useful for students, instructors, and network engineers to analysis and design a VLSM network by providing all required information in simple, fast and easy steps. Moreover, the software draws a full detailed suggested network topology which is considered a helpful tool for the network administrator that he should have.
In this research, CNRs have been synthesized using pyrolysis of plastic waste(pp) at 1000 ° C for one hour in a closed reactor made from stainless steel, using magnesium oxide (MgO) as a catalyst. The resultant carbon nano rods were purified and characterized using energy dispersive X-ray spectroscopy (EDX), X-ray powder diffraction (XRD). The surface characteristics of carbon rods were observed with the Field emission scanning electron microscopy (FESEM). The carbon was evenly spread and had the highest concentration from SEM-EDX characterization. The results of XRD and FESEM have shown that carbon Nano rods (CNRs) were present in Nano figures, synthesized at 1000 ° C and with pyrolysis temperature 400° C. One of t
... Show MoreThis work presents the construction of a test apparatus for air-conditioning application that is flexible in changing a scaled down adsorbent bed modules. To improve the heat and mass transfer performance of the adsorbent bed, a finned-tube of the adsorbent bed heat exchanger was used. The results show that the specific cooling power (SCP) and the coefficient of performance (COP) are 163 W/kg and 0.16, respectively, when the cycle time is 40 min, the hot water temperature is 90oC, the cooling water temperature is 30oC and the evaporative water temperature is 11.4oC.
Purpose: The study aims to investigate the extent to which material and non-material requirements are available in applying budgeting programs and performance in Iraqi governmental companies that are not aimed at achieving profits. whose activities are limited to providing services of public interest. This is done by studying the extent to which the requirements of each stage of preparing the programs and performance budget can be met. Theoretical framework: The process of evaluating financial performance is the main objective of all economic units, whether they are governmental or private economic units. Budgets contribute to the evaluation process by analyzing deviations in the application. The study includes an analytical pres
... Show MoreIn this article, a numerical method integrated with statistical data simulation technique is introduced to solve a nonlinear system of ordinary differential equations with multiple random variable coefficients. The utilization of Monte Carlo simulation with central divided difference formula of finite difference (FD) method is repeated n times to simulate values of the variable coefficients as random sampling instead being limited as real values with respect to time. The mean of the n final solutions via this integrated technique, named in short as mean Monte Carlo finite difference (MMCFD) method, represents the final solution of the system. This method is proposed for the first time to calculate the numerical solution obtained fo
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
This study deals with the subject of violence, but from another perspective, it has not been emphasized in contemporary studies of violence in Arabic and raqi universities, which is the structural or institutional aspect of violence. Traditional studies have focused their analysis of violence on the direct side the violence, The other side of the violence is the hidden violence, which is characterized by a lack of clarity of the underlying factors and its effects are not arises, which makes it the most serious violence, which requires a deep research into the social, political, economic, cultural and psychological structure of society (individuals and institutions). This study was based on the theory of the Norwegian scientist (J
... Show MoreThis study was conducted to investigate phytoplasma causing a virescence disease on Arabic jasmine Jasminum sambac based on microscopy and molecular approaches. Samples were collected from symptomatic Arabic jasmine plants grown in nurseries in Baghdad-Iraq. Specimens from infected plants were prepared and Dienes stained for light microscopy examination. Phytoplasma were detected in infected plants by polymerase chain reaction (PCR) using P1/P7 and SecAfor1/SecArev3 Candidatus Phytoplasma specific primer sets. Light microscopy test showed symptomatic Arabic jasmine plants were phytoplasms infected when phloem tissues were stained with a dark blue color. PCR test confirmed the symptomatic plants were phytoplasms infected when SecAfor1/Sec
... Show MoreThe total and individual multipole moments of magnetic electron scattering form factors in 41Ca have been investigated using a widely successful model which is the nuclear shell model configurations keeping in mind of 1f7/2 subshell as an L-S shell and Millinar, Baymann, Zamick as L-S shell (F7MBZ) to give the model space wave vector. Also, harmonic oscillator wave functions have been used as wave function of a single particle in 1f7/2 shell. Nucleus 40Ca as core closed and Core polarization effects have been used as a corrective with first order correction concept to basic computation of L-S shell and the excitement energy has been implemented with 2ћω. The
... Show MoreIn this study, sulfur was removed from imitation oil using oxidative desulfurization process. Silicoaluminophosphate (SAPO-11) was prepared using the hydrothermal method with a concentration of carbon nanotubes (CNT) of 0% and 7.5% at 190 °C crystallization temperature. The final molar composition of the as-prepared SAPO-11 was Al2O3: 0.93P2O5: 0.414SiO2. 4% MO/SAPO-11 was prepared using impregnation methods. The produced SAPO-11 was described using X-ray diffraction (XRD) and Brunauer-Emmet-Teller (N2 adsorption–desorption isotherms). It was found that the addition of CNT increased the crystallinity of SAPO-11. The results showed that the surface area of SAPO-11 cont
... Show MoreDespite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit
... Show More