Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the subnet ID, broadcast ID, usable addresses for sub networks and others). The simulator also includes the ability to draw a suggested network topology that matches the entries. The implementation of the simulation required only very few entries (IP, prefix and number of subnets).This simulator is useful for students, instructors, and network engineers to analysis and design a VLSM network by providing all required information in simple, fast and easy steps. Moreover, the software draws a full detailed suggested network topology which is considered a helpful tool for the network administrator that he should have.
Research Summary :
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:
This is a brief research that contained its two rudders the command and its Style in Surat Al-Ma’idah a fundamental rhetorical study, and the study clarified the meaning of imperative in both; the Arabic language and in the terminology of the fundamentalists and rhetoricians in a concise manner, and then indicated the imperative of the command , the true meaning, and the meanings interpretated as an imperative form. I have mentioned some verses of Surat Al-Ma’idah, so what I have quot
... Show MoreIn recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show More
Social networking sites have become very popular since the beginning of the current decade and have become linked to our daily life. We follow the news, Analyses and opinions on the one issue in a way that attracts millions of users and the number grows every secon On Twitter, one of the most important social networking sites, all social groups rushed from the president to the last citizen to open accounts when they found themselves forced to do so . During the recent Gulf crisis, Twitter was buzzing with Twitter, which achieved the largest circulation globally. Instead of serving the issue and directing it to serve the Arab interest, most of the publications were on th |
The Wonderful Wizard of Oz and Peter and Wendy present universal ideas that exist in all times, despite being written in the beginning of the 20th century. Among the most significant ones is the concept of “home”. The article discusses the essentiality of the idea of “home” where the identity of an individual shapes, and where one’s spiritual, psychological, and physical being develop. It also studies the attitudes of each protagonist towards the concept of ‘home’ based on their understanding of it and according to their gender differences. The characters in both stories tread on the path of perplexity between leaving their homes and returning to them. Peter’s world is the world of imagination while Doro
... Show MoreInsect pest management has been dominated by the use of synthetic pesticides since early 1950s. However, lately this control method is not widely accepted due to an increase in environmental awareness, food safety concerns and the increasing number of insecticide-resistant species. In Iraq, the chemical insect pest control is still a dominant control method regardless of the increased pressure to replace it gradually with environment friendly alternatives such as predators, parasitoids, nematodes and entomopathogenic fungi. In Iraq, there is an increasing volume of research that has used different genus and species of entomopathogenic fungi for controlling several agricultural pests. However, these efforts are not yet reflected
... Show MoreThe Rwandan author of comfort chests and verse pleasure of the most important historians of the Seljuks in the sixth century AH / twelfth century and belongs to the mostly ethnic scientists family has won favor with the Sultans of the Seljuks until he became the most famous Markhém is his main source of research sources with respect to the political and social history the Seljuks and the relationship of the Seljuk sultans of the Abbasid caliphs in Baghdad.
The book included the history of the Seljuks from the time of statehood in the fifth century AH / atheist century AD until the death of the Sultan Tgrl bin Arslan year 590 AH / 1193 AD and then shed Akhawarzmeyen, and touched the author at the end of the book in separate chapters t
This study was aimed to explore the impact of a practical program on supporting and reducing
symptoms of school bulling victims in a sample of student in the sixth grade. The study sample consisted of (18)
students that have been chosen from two schools (Al-Abass and Alataa’) it was an intended sample, because
there were enough student with high scores in bulling victims diagnostics test, the sample was divided into two
groups: the control group of (9) student from (Alataa’) school, and the experimental group consisted of (9)
student from Alabass) school keeping in mind to keep the two groups equivalent in maintaining equal controls.
The researcher applied the practical program which is based on cognitive behavioral
The performance of a diesel engine was tested with diesel oil contaminated with glycol at the engineering workshop/Department of Agricultural Machines and Equipment / College of the Agricultural Engineering Sciences at the University of Baghdad. To investigate the impact of different concentrations of glycol on the performance of a diesel engine, an experimental water-cooled four-stroke motor was utilized, with oil containing 0, 100, and 200 parts per million (ppm). Specific fuel consumption, thermal efficiency, friction power, and exhaust gas temperature were examined as performance indicators. To compare the significance of the treatments, the study employed a full randomization des
The performance of a diesel engine was tested with diesel oil contaminated with glycol at the engineering workshop/Department of Agricultural Machines and Equipment / College of the Agricultural Engineering Sciences at the University of Baghdad. To investigate the impact of different concentrations of glycol on the performance of a diesel engine, an experimental water-cooled four-stroke motor was utilized, with oil containing 0, 100, and 200 parts per million (ppm). Specific fuel consumption, thermal efficiency, friction power, and exhaust gas temperature were examined as performance indicators. To compare the significance of the treatments, the study employed a full randomization des
The performance of a diesel engine was tested with diesel oil contaminated with glycol at the engineering workshop/Department of Agricultural Machines and Equipment / College of the Agricultural Engineering Sciences at the University of Baghdad. To investigate the impact of different concentrations of glycol on the performance of a diesel engine, an experimental water-cooled four-stroke motor was utilized, with oil containing 0, 100, and 200 parts per million (ppm). Specific fuel consumption, thermal efficiency, friction power, and exhaust gas temperature were examined as performance indicators. To compare the significance of the treatments, the study employed a full randomization design (CRD), with three replicates for each treatment at th
... Show More