Network Design(500-700 words)

 

Task

Task 1 (Research) [5 marks]

In this task, you are required to research a range of options/methods that can be used for network designing in this assessment. Based on your research you are required to clearly list your views on pros and cons of each available option for the completion of this assessment and select an option that you will use to complete this assessment.

Task 2 – Setting up a Network [10 marks]

You are required to set up a network consisting of PCs, routers, switches and servers. You need to configure routing between routers, use any dynamic routing protocol. The PCs (clients) will be connected to switches and switches to the router’s interfaces. Clients and Servers are connected on different networks (don’t attach clients and servers on same network).
 Client(s) <–> Switch <–> Router <–> Router <–> Switch <–> Server(s) 

Use ONLY the IP address which you calculated in Assignment 2.

Perform the following activities and support your workings with screenshots [10 marks]:
  1. Configure the PCs, Server and Router interfaces with appropriate network addressing;
  2. Configure any classless dynamic routing protocol on the routers;
  3. On any client, ping the client’s own network interfaces, then the local router gateway interface, then the remote router interface, then the servers. Check full network conductivity;
  4. Use the traceroute command from the client to the server. Include results of the traceroute in your submission, explaining meaning of traceroute output.

Task 3 – Configuring Network Services [10 marks]:
 Using the same network topology that you have setup in Task 1, perform the following additional activities 

1.DHCP: Configure DHCP servers and show that the client PC has successfully received IP Addresses and other network parameters (default gateway, subnet mask and DNS IP address) using DHCP
 2.WEB Server: Configure WEBs server on the dedicated machines in their specified networks, with URL as sanchithadesilva.csu.org
 3.DNS: Configure DNS Servers on the server device and demonstrate that forward and reverse DNS are working from the client PC; test DNS Server by browsing yourname.csu.org from client PC, DNS must resolve this URL to IP address of WEB Server
 4.Firewall: Configure traffic filtering on the web servers to block ONLY HTTP TCP traffic between one of the client PCs and WEB Servers and allowing all other IP traffic, provide evidence of such traffic filtering. You should verify firewall by using PING and HTTPS TCP traffic which should not be blocked.

A series of screenshots with commentary on each of the required tasks is to be submitted. The submission must include a comprehensive explanation of each task and all the commands used along with the output (or final result) in report format.

Task 4 [5 marks]

Task 4 will be given to you by your lecturer 7 days before date due. This is to allow everyone to work in this timeframe and to prevent unauthorized assistance with your work. This task is face to face questioning and answering with your lecturer, and must be completed during class time before the due date.

 

Presentation

Please note that this assessment is asking for your reflections/thoughts and understanding of the topic. Therefore refrain from directly copying and pasting from other sources. I encourage wider reading to increase your knowledge base however proper referencing guidelines MUST be followed (please refer to the APA referencing guide in student resources) otherwise your work can be reported for plagiarism.

We have a very diverse learning group with students from different parts of the world, and it is important to respect that with such a diverse group, everyone’s ability to express themselves in written language can vary. Therefore it is important to respect diversity and opinions different from yours, no matter where they come from. Let us all also be mindful that written communication can be easily misinterpreted, therefore please be careful and avoid using strong words so we don’t cause confusion and/or anxiety for our peers. 

Bank Account Solution

define the class bankaccount to implement the basic properties of a bank account. An object of this class should store the following data: Account holder’s name (string), account number
(int), account type (string, checking/saving) balance (double) and interest rate (double). (Store interest rate as a decimal number.) Add appropriate member functions to manipulate an object. Use a static member in the class to automatically assign account
nubmers. Also declare an array of 10 components of type bankAccount ot process up to 10 customers and write a program to illustrate how to use your class. Insert comments to document your program , Program must be implemented and run as instructed, Class Implementation
, Source files (xxx.cpp/xxx.h) and executables (xxx.exe)

I need an EXPERIENCED expert in WEB SCRAPING

An expert in web scraping

Kindly send a message to [email protected]

I NEED EXPERTS ONLY!!!!

I will send you more details about the work when you send an email to me

Business Strategy

 Why is it important for business strategy to drive organizational strategy and  Information Systems strategy? What might happen if the business strategy was not the driver?  

Please make your posts are substantive. A substantive post will do at least TWO of the following: Ask an interesting, thoughtful question pertaining to the topic Answer a question (in detail) posted by another student or the instructor Provide extensive additional information on the topic Explain, define, or analyze the topic in detail Share an applicable personal experience Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA) Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

CIO-Business Intelligence Infrastructure

 Imagine that you are hired as a CIO of a quickly growing retail chain with an online presence. You have growing transactional databases but want to build a business intelligence infrastructure. You also have various departments within your company with databases such as marketing, customer service, accounts payable, sales, and accounts receivable. What would your proposed business intelligence infrastructure consist of? Justify your decisions.  200 words

Authentication and authorization- Cyber Security

How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two. Your paper should be 2 pages in length. You need to provide a minimum of two references and need to use APA format in the reference section.

CYB 100 – Week 4 – Individual: Final Project Part 1: Paper and Storyboard

 

Write a 175-to 350-word FAQ document using Microsoft® Word in response to the following:

Scenario One: You are preparing for a new company-wide project to implement cloud technology. In preparation for the project rollout, the VP of Information Technology has asked you to prepare a FAQ document describing cyberspace and its associated complexities for all staff so they understand cyberspace, and cloud technology. The U.S.-based company has 100,000 staff members and offices in 100 countries. Your task is to, in the form of an FAQ, provide answers to the following: What are the definition of cyberspace, and the maritime, space, and physical domains? Provide a concise description of cyberspace and the maritime, space, and physical domains How do international laws affect citizens and companies in the U.S.? Accurately describe how international laws affect citizens and companies in the U.S. How do political elements within the U.S. affect cyber security? Accurately describe how political elements within the U.S. can affect cyber security Why is cyber security so complex in cloud technology? Concisely explain the complexities of cyber security in cloud technology What advantages can cloud technology offer to businesses? Describe at least two advantages cloud technology can offer businesses

Scenario Two: You have recently been hired as a Cybersecurity Intern with a medium size company that has been growing very rapidly. The company supports outreach to the community and has set up a forum to help high school students understand important concepts in security. Your boss has asked you to set up a storyboard that will be used to present to the students to highlight the differences between espionage, intelligence gathering, and cyber warfare. He also wants you to help them understand the physical assets of the Cyber Domain. If you are successful with the storyboard, your boss plans to turn this into an infomercial.

Develop a 6- to 8-slide/panel storyboard document using Microsoft® Word or PowerPoint®. Your storyboard should: Accurately depict the differences between espionage, intelligence gathering, and cyber warfare at a level that high school students can relate to Accurately describe the influence the military has had on intelligence gathering, cyber warfare, and physical assets Provide a complete timeline of a recent incident involving personal privacy including the nature of the attack, and providing insight into the risks of conducting business in cyberspace Enumerate at least five physical assets of the Cyber Domain, including an explanation of why you included the assets Examine where we are today in the areas of espionage, intelligence gathering, cyber warfare, and physical assets, and offer a prediction of the future given your current perspective

All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used.

Submit your assignment using the Assignment Files tab.

Data mining and Business Intelligence

  

1. Do some original research and find two examples of data mining. Summarize each example and then write about what the two examples have in common.

2. Conduct some independent research on the process of business intelligence. Using at least two scholarly or practitioner sources, write a two-page paper giving examples of how business intelligence is being used.

3. Conduct some independent research on the latest technologies being used for knowledge management. Using at least two scholarly or practitioner sources, write a two-page paper giving examples of software applications or new technologies being used in this field.

discussion.Research at least two articles on the topic of managerial issues of a networked organization

Research at least two articles on the topic of managerial issues of a networked organization. Write a brief synthesis and summary of the two articles. How are the topics of the two articles related? What information was relevant and why?

Provide the references in your responses.

Your original post should be 250 words long

it should be in APA format

2 -3 pgs rough draft

  We do not learn from experience…we learn from reflecting on experience. ―John Dewey, 1916, Philosopher and Educator

As an adult, you bring so much life experience into the classroom, the connections between the life you’ve lived and the things you’ve learned are made through the process of reflection. Some of you might picture reflection as a time where you are seated comfortably, and your mind is free of all other thoughts. The truth is that life affords few opportunities to actually reflect and dwell on learning. The great part of being an adult in college is that you will be exposed to new voices, images, and ideas. Reflection might not be a deliberate act of sitting silently, but instead, you might find that ideas come to you while you are driving or shampooing or petting the dog. Reflection allows your mind to make the explicit connections between your lived experience and the academic content that you will encounter here at Walden.As mentioned above, you are working through a writing process where you will compose the first draft of the ReflectionAssignment paper. This week you will begin with actually writing and submitting a rough draft.During Week 6, you’ll be guided through a revisions and proofreading process that will help you further develop and improve your rough draft by adding more thoughts, incorporating any feedback received, and ensuring you’ve followed Academic Writing Expectations. Your final draft will be due at the end of Week 6.The required elements for both weeks are the same, but the expectations are slightly different. The grading rubrics for Weeks 4 and 6 demonstrate this. For example, this week’s rough draft represents a first attempt at putting your thoughts down on paper and only covers four weeks. By Week 6, your final paper should be longer, include obvious improvements to the rough draft, and include aspects from the entire six weeks.Your paper should include four sections. Be sure to review all four sections before starting. Remember to include an introductory and a concluding paragraph, and to support your ideas with specific examples and resources whenever possible.Include the following parts:Part 1: Today I am…The first and longest section of your essay should describe who you are today as a result of this first-term course and starting your educational journey. Specifically consider your personal plan for success at Walden. Answer these questions to develop this section: Who are you as a Walden student? What tools has Walden provided?  Academic Advising  How do the tools and available support play into achieving your goals? What did you learn about yourself through the assessments? How is that going to feed into your plan for success? What has this first course done for you? What might this course do for you moving forward?

Think about some of the course themes and big ideas we discussed and connect them to the way you will approach learning and future classes.Make sure to get specific and point to course examples to support your ideas.Part 2: I promise to…In the second section, make a promise to yourself and the classmates who might need your support during the program. Think about your reasons for being here and why you are promising to work towards success. Consider the following: Here is why I am not going to walk away Here’s how I will help myself Here’s how Walden will help me get there Here’s how I will be part of positive change

Part 3: How I will become part of the Walden CommunityIn the third section, explain how you might identify a mentor (colleague with different professional skills, someone in your profession, or a Walden Faculty Member) to support your educational efforts. Share how a mentor would have a positive impact on your education and the role you would like him/her to take. How you might become a mentor to others in the program?Part 4: Visual Representation [This step will be due by Week 6]After you have completed your Reflection, find or create a visual artifact that shows your aspiration and hang it above your desk. Think of something that will motivate you and keep you engaged and focused as you complete each Discussion and Assignment as you move through your coursework toward graduation. Be sure to include a picture or copy of this visual representation with your reflection paper by copying and pasting it into your paper or attaching it as a separate file.
Submit a 2- to 3-page rough draft essay of your Reflection Assignment using the guidelines above. Your rough draftshould demonstrate use of the Academic Writing Expectations, such as proper grammar and sentence structure, and address the parts described above. It should also include an introduction and conclusion. Make sure to support your ideas with specific evidence and class examples. If you used the worksheet from the Week 4 Learning Resources, you may submit the completed worksheet as your rough draft.
notes and reading
Over the last couple of weeks, we have technology and virtual worlds influence how we understand ourselves and the society in which we live.It is also important to remember that technology is made by humans. Some of you are looking at a career in information technology, and you could be the person who creates a new technology. The person who makes a technology influences it. For a long time, technology was a male dominated field. In the same way that a novel is influenced by the author, the groups that craft technology directly influence the people who use these spaces to learn.In her speech to the United Nations/NGO Forum “On Women in 1995”, Robin Abrams talked about the different ways that men and women use computers. Although she speaks in general terms, reflect on how your gender might affect how you relate to computer technology. What other characteristics might influence our relationship to technology, such as ethnicity, age, or location? Tweeting Towards Freedom? (2011). Wilson Quarterly, 35(2), 64–66.  Ross, J. (2012, March 4). Make room, Socrates, for Lady Gaga and Beyonce. Star Tribune.  Honan, M. (2010, November). Crimes against humanity: Digital atonement. Wired, 18(11), 110.
https://youtu.be/ZVHOqrw3Jks