Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the subnet ID, broadcast ID, usable addresses for sub networks and others). The simulator also includes the ability to draw a suggested network topology that matches the entries. The implementation of the simulation required only very few entries (IP, prefix and number of subnets).This simulator is useful for students, instructors, and network engineers to analysis and design a VLSM network by providing all required information in simple, fast and easy steps. Moreover, the software draws a full detailed suggested network topology which is considered a helpful tool for the network administrator that he should have.
The present study attempts to examine verbal/nonverbal impoliteness in the classroom interaction and outside it in one of the movies, namely, The Marva Collins. Impoliteness, which is significantly studied within pragmatics, is a negative attitude towards particular behaviors. It always presumes to have emotional concerns for at least one participant who has caused it. This study is an attempt to examine verbal/nonverbal impoliteness in The Marva Collins movie. The study aims to investigate the different types of impoliteness strategies used in the four selected scenes and find out whether the speaker’s status has anything to do with the types of impoliteness. Besides, the functions performed are also examined by following a qual
... Show MoreA recently reported Nile red (NR) dye conjugated with benzothiadiazole species paves the way for the development of novel organic-based sensitizers used in solar cells whose structures are susceptible to modifications. Thus, six novel NR structures were derived from two previously developed structures in laboratories. In this study, density functional theory (DFT) calculations and time-dependent DFT (TD-DFT) were used to determine the optoelectronic properties of the NR-derived moieties such as absorption spectra. Various linkers were investigated in an attempt to understand the impact of π-linkers on the optoelectronic properties. According to the findings, the presence of furan species led to the planarity of the molecule and a reduction
... Show MoreThe subject of this study is one of the most interactive media networks, which is the Instagram.The study uses a descriptive approach and focuses on how Instagram turns from a media tool to a marketing tool. The study problematic consists of this question: How Instagram turns to a marketing tool, and what are the advantages and the disadvantages for that?This study highlights the definition of Instagram, the creation of it and its improvement, the Instagram in Bahrain, the Instagram uses, the Instagram as a marketing tool, and the advantages and disadvantages of using Instagram for marketing.The study confirms that Instagram is a new media network, and focuses on how it develops on later stages and mentions the increase of the percentage
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreThe present study aims to reveal the extent of the influence of the acquired organizational immune through its dimensions (organizational vaccination, organizational learning, organizational memory, and benchmarking) in the application of knowledge management strategies in its two dimensions (codification strategy, personalization strategy) as well as clarifying that influential relationship between the study variables Because of its importance in reducing resistance to change by responding to the requirements of the environment. A set of main and sub-hypotheses emerged from the study, which was formulated in view of the hypothesis scheme of the study, and i
... Show MoreViolence is one of the most serious threats facing societies because it affects their internal structure and threatens the security and stability of society. It is classified as one of the types of security crises that are emerging in Arab and Islamic societies in particular, and in most countries of the world in general.
The threat of this crisis is increasing. Terrorism is considered as one of the most serious aspects of that all the countries of the world, currently, suffer from. The terrorism has begun to penetrate deep into society in one way or another starting from the Second World War, which led to the emergence of leftist movements in Western Europe, Japan, France, Italy and other countries as a result of emerging ideas
... Show MoreCerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexes anddi
... Show MoreThis study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.
In this paper, the first integrals of Darboux type of the generalized Sprott ET9 chaotic system will be studied. This study showed that the system has no polynomial, rational, analytic and Darboux first integrals for any value of . All the Darboux polynomials for this system were derived together with its exponential factors. Using the weight homogenous polynomials helped us prove the process.