SZL 3203 :CHEMICAL AND STRUCTURAL ORGANISATION OF THE MAMMALIAN BODY
| Institution | UNIVERSITY |
| Course | BACHELOR OF BIOLOGI... |
| Year | 1st Year |
| Semester | Unknown |
| Posted By | stephen oyake rabilo |
| File Type | |
| Pages | 9 Pages |
| File Size | 497.32 KB |
| Views | 1468 |
| Downloads | 0 |
| Price: |
Buy Now
|
Description
The mammalian body is made of essentially non-living matter that is constituted and
organized into forms that can contain and maintain life. The matter is in form of chemical compounds known as the chemicals of life. A description of these chemicals constitutes what is known as the chemical basis of life. There are two classes of chemical compounds in the mammalian body namely:
a) Organic compounds. These are compounds that contain the element carbon covalently bound to other elements especially hydrogen, oxygen and nitrogen.
b) Inorganic compounds. These are various types of salts/electrolytes in the
body.
Organic compounds
There are four main classes of organic compounds in the body and these are referred to as
macromolecules or biomolecules. They are:
Carbohydrates.
These are energy rich compounds that are readily broken down to release energy that runs the body’s life processes. They are also known as the biological fuel molecules. Carbohydrates are made of the elements carbon, hydrogen and oxygen and are simply abbreviated as CHO. Carbohydrates are synthesized by plants through the process of photosynthesis. Animals acquire carbohydrates by feeding on plants. There are two subdivisions of carbohydrates in the body depending on complexity as explained below:
a) Sugars
Sugars are small carbohydrate molecules found in the diets and in the bodies of animals. Sugars are also known as saccharides. Some saccharides consist of a single sugar molecule and are known as monosaccharides. The most common and well known monosaccharide in the mammalian body is glucose. A few saccharides consist of two sugar units joined together and are known as disaccharides or double sugars. Examples of disaccharides in mammalian diets are sucrose (cane sugar), lactose (milk sugar) and maltose (a breakdown product of starch).
b) Polysaccharides -These are large carbohydrate molecules consisting of large numbers of sugar molecules joined together. Examples of polysaccharides in animal diets are starch, glycogen and cellulose.
Below is the document preview.
08 VLAN Principles and Configuration
Trending!
Ethernet technology implements data communication over shared media based
on carrier sense multiple access with collision detection (CSMA/CD). If there are a
large number of PCs on the Ethernet, security risks and broadcast storms may
occur, deteriorating network performance and even causing network breakdowns.
The virtual local area network (VLAN) technology is therefore introduced to solve
the preceding problem.
This note describes basic VLAN principles, working principles of different Layer 2
interfaces, VLAN applications, data forwarding principles, and basic VLAN
configuration methods.
46 Pages
2433 Views
0 Downloads
1.26 MB
09 STP Principles and Configuration
Trending!
On an Ethernet switching network, redundant links are used to implement link backup and enhance network reliability. However, the use of redundant links may produce loops, leading to broadcast storms and an unstable MAC address table. As a result, communication on the network may deteriorate or even be interrupted. To prevent loops, IEEE introduced the Spanning Tree Protocol (STP).
Devices running STP exchange STP Bridge Protocol Data Units (BPDUs) to discover loops on the network and block appropriate ports. This enables a ring topology to be trimmed into a loop-free tree topology, preventing infinite looping of packets and ensuring packet processing capabilities of devices.
IEEE introduced the Rapid Spanning Tree Protocol (RSTP) to improve the network
convergence speed.
60 Pages
2839 Views
1 Downloads
1.37 MB
10 Inter-VLAN Communication
Trending!
By default, a Layer 2 switching network is a broadcast domain, which brings many
problems. Virtual local area network (VLAN) technology isolates such broadcast
domains, preventing users in different VLANs from communicating with each
other. However, such users sometimes need to communicate.
This course describes how to implement inter-VLAN communication.
30 Pages
3038 Views
0 Downloads
1.45 MB
11. Eth-Trunk, iStack, and CSS
Trending!
As services develop and the campus network scale expands, users have
increasingly demanding requirements on network bandwidth and reliability.
Traditional solutions improve network bandwidth by upgrading devices and
implement high reliability by deploying redundant links and using the Spanning
Tree Protocol (STP), leading to low flexibility, time-consuming troubleshooting, and
complex configuration.
This chapter describes how to use Eth-Trunk, intelligent stack (iStack), and cluster
switch system (CSS) technologies to improve network bandwidth and reliability.
48 Pages
2335 Views
0 Downloads
2.23 MB
12 ACL Principles and Configuration
Trending!
Rapid network development brings challenges to network security and quality of service(QoS). Access control lists (ACLs) are closely related to network security and QoS. By accurately identifying packet flows on a network and working with other technologies, ACLs can control network access behaviors, prevent network attacks, and improve network bandwidth utilization, thereby ensuring network environment security and QoS reliability. This course describes the basic principles and functions of ACLs, types and characteristics of ACLs, basic composition of ACLs, ACL rule ID matching order, usage of wildcards, and ACL configurations.
27 Pages
2621 Views
0 Downloads
993.55 KB
13. AAA Principles and Configuration
Trending!
User management is one of the most basic security management requirements for
any network. Authentication, authorization, and accounting (AAA) is a management framework that provides a security mechanism for authorizing some users to access specified resources and recording the operations of these users. AAA is widely used because of its good scalability and easy implementation of centralized management of user information. AAA can be implemented through multiple protocols. In actual applications, the Remote Authentication Dial-In User Service (RADIUS) protocol is the most commonly used to implement AAA.
This course describes the basic concepts, implementation, basic configurations, and
typical application scenarios of AAA.
21 Pages
2467 Views
0 Downloads
869.21 KB
14 Network Address Translation
Trending!
With the development of the Internet and the increase of network applications,
limited public IPv4 addresses have become the bottleneck of network
development. To solve this problem, Network Address Translation (NAT) was
introduced.
NAT enables hosts on an internal network to access an external network. It not
only helps alleviate IPv4 address shortage but also improves the security of the
internal network as NAT prevents devices on the external network from directly
communicating with hosts on the internal network that uses private addresses.
This course describes the motivation behind NAT, and implementations and
application scenarios of different types of NAT.
32 Pages
2810 Views
0 Downloads
1.17 MB
15. Network Services and Applications
Trending!
The Internet has become an integral part of our lives, with a wide range of
applications such as file transfer, email sending, online video, web browsing, and
online gaming. Because of the layered network model, common users can use
various services provided by the application layer, without knowing technical
details such as communication technology implementations.
In previous courses, we have learned technologies related to the data link layer,
network layer, and transport layer. This chapter will describe common network
services and applications such as FTP, DHCP, and HTTP.
50 Pages
3003 Views
0 Downloads
1.7 MB
UCU110.Communication and collaboration skills
These notes are summarizes in a manner that make your studies more simple and efficient
115 Pages
1879 Views
0 Downloads
981.5 KB
16 WLAN Overview
Trending!
Wired LANs are expensive and lack mobility. The increasing demand for portability
and mobility requires wireless local area network (WLAN) technologies. WLAN is now the most cost-efficient and convenient network access mode. This course introduces the development of WLAN in different phases, concepts related to WLAN technologies, implementation and basic configurations of common WLAN networking architectures, and WLAN development trends.
73 Pages
2677 Views
0 Downloads
1.99 MB