SDN & IBN

 

Software-defined networking (SDN) and intent-based networking (IBN) offer an ability to revolutionize the modern network architecture. Both concepts are relatively new, and your chief technology officer (CTO) has only heard them in passing. In fact, she pawned them off as the new “marketing fad” dressed up as a new concept. Since you have researched both technologies, you understand this is not a fad. When used in combination with virtualization and cloud computing, you know SDN and IBN could revolutionize how the organization operates, providing for reduced costs, efficiency, better management of the network assets, and security. 

However, you need to develop a white paper for the Caduceus CTO to highlight these benefits. Given the CTO has only heard the term in passing, you must describe in this white paper, the SDN and IBN concepts, their benefits, and what it would take for the organization to implement.

Writing Your Paper

After you brainstorm ideas for this assignment, refer to the company highlights document for more details about Caduceus.

In your white paper, use additional sources of information but also describe the concept in layman’s terms. Use visuals where appropriate. Describe how an SDN/IBN architecture would look different than network architectures we have traditionally deployed. Compare and contrast the network architectures and discuss the pros and cons of each. 

The paper should include the following sections:

  • introduction to software-defined networking (SDN)
  • introduction to intent-based networking (IBN)
  • discussion on how virtualizing the desktop and now back-end infrastructure are complementary and related 
  • discussion of how SDN and IBN are related

Python Project

 In many of computer vision applications, the gray levels of pixels belonging to the object are substantially different from the gray levels of the pixels belonging to the background. Therefore, image thresholding technique is instrumental to the success of many image processing applications. As the input images might be taken at different times of the day, a fixed threshold may not work for different illumination conditions. For this reason, an adaptive thresholding method needs to be incorporated automatically. Otsu has developed a comprehensive statistical technique to find the best threshold for an image. He proposed a criterion for maximizing the between-class variance of pixel intensity to perform image thresholding. This method is accurate for images which contain two distinct classes. On the other hand, to efficiently find the optimal threshold the adaptive progressive thresholding (APT) approach is used as an extension of the Otsu’s technique. 1. Write a program to implement the Otsu’s adaptive thresholding technique. Obtain the optimum threshold for segmenting the region of interest (dark object region with respect to a bright background) and create a binary image. Test and evaluate the algorithm on sample images of different types (single object, multiple objects, different lighting and backgrounds etc., see Project-Data) 2. Write a program to implement the adaptive progressive thresholding (APT) technique. Obtain the optimum final threshold for segmenting the region of interest (dark object region with respect to a bright background) and create a binary image. Test and evaluate the algorithm on sample images of different types (single object, multiple objects, different lighting and backgrounds etc., see Project-Data) Notes: • The project should be implemented in Python. • Only one single file should be submitted through Blackboard for evaluation, which includes: ✓ The project report that includes the methodology, equations used, implementation results and discussion, conclusion, appropriate technical references, etc. ✓ The program codes along with the dataset used for testing and validation. • Late submissions will not be accepted. • Email submissions will not be accepted. 

Download Searches.java

1.

 Download Searches.java; this file defines a Searches class providing versions of  the

search algorithms linearSearch and binarySearch. Make sure

the Searches class compiles before continuing.

2. Make these algorithms generic, so that they will work on any object type. Using the

techniques described in Chapter 2, modify each method: change the types of  the

parameters, and (if  appropriate) local variables, to use the type specifier T for each

method.

Note: for static methods, Java requires us to add  after the keyword static.  So for

example: 

public static boolean contains( …etc…)

3. Next, because we want to search for any kind of  objects and not just ints, we have to be

careful about how we compare them (both for equality and greater than/less than). The

operators for primitive types will no longer work correctly. You know that every class

inherits or overrides the equals method from Object. This will work in place of  the

== operator for the linear searches.

For other comparisons, as in binarySearch, take advantage of 

the compareTo method provided by the Comparable interface. Use this method in

place of  greater than/less than operators.  

You can read up on this interface in the text, Chapter 5, page 314-315; the basic idea is

that we can compare any objects which implement the interface using the following

method:

public int compareTo(String anotherString) // this is the

version for the String class

This method returns the value 0 if  the strings are equal; a value less than 0

if this string is lexicographically less than anotherString; and a value greater

than 0 if this string is lexicographically greater than anotherString. 


Note that we will simply use this method and assume that it is defined for the types

used with our search methods. You do not have to implement your own!

4. Now we have three generic methods that will work on different types of  objects.  The

trouble is, if  I call these methods with an array of  objects that don’t

implement Comparable, this code will fail. We’d like to ensure that the type parameter

used by our generic methods “screens out” object types that aren’t searchable. We do that

by using this extended form of  generics:

>

What does all that mean?  For our purposes, focus in on the first part: here, T is just the

type parameter and  constrains that type parameter to

be one that provides a compareTo method, thereby implementing

the Comparable interface. If  you add this more complex form of  type parameter,

things that can’t be compared won’t compile if  someone tries to pass an array of  a noncomparable

type.

5.

 

6. Write a short program SearchTest.java to test your methods with two different array

types. Do 2 successful searches and 2 unsuccessful searches with each method and print

the results. Use these array declarations:

   Integer[] testInts = {-12, -7, -4, -2, 0, 3, 5, 9, 13,

18, 22, 45};

7.    String[] buildings = {“All Saints”, “Breslin”, “duPont”,

“Fulford”, “Gailor”, “Guerry”, “McClurg”, “Spencer”,

“Woods”};

Installing Windows and Linux

Part 1

Using VirtualBox create a new Virtual Machine with 2 GB to 4 GB of memory and a 120 GB hard drive (thin provisioned). Using the  Windows Install Media, install Microsoft Windows 10 and create a “local” non-online user account. This is harder than it looks, so you will need to research how on the Internet. Open the text editor in Microsoft Windows (Notepad). Enter the following text: “Hello in Microsoft Windows from FIRSTNAME LASTNAME”, replacing first name and last name with your name. Create a screenshot of the virtual machine using VirtualBox and upload it to this assignment.

Part 2

Using VirtualBox create a new Virtual Machine with 2 GB to 4 GB of memory and a 120 GB hard drive (thin provisioned). Using the Ubuntu Install Media, install Ubuntu LTS with a personal user account. You may need to research how to accomplish this by searching the internet. Open the text editor in Ubuntu (Notepad/gedit). Enter the following text: “Hello in Ubuntu from FIRSTNAME LASTNAME”, replacing first name and last name with your name. Create a screenshot of the virtual machine using VirtualBox and upload it to this assignment.

PHYSICAL SECURITY

 

 examples of personally identifiable information  and look at the importance of physical security.

  • Understanding the nature of personally identifiable information
  • Understand the need for physical security
  • Explain threats to physical security

NIST. (2019). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). United States Department of Commerce. National Institute of Standards and Technology Special Publication No. 800-122. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf

Enterprise Data Management and Administration

 Read “How Supply Chain Management Problems Killed Target Canada” (see attached file)  

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

The first 10 records in your

  

The first 10 records in your data file each contain a pay code and the corresponding pay rate per hour. the remaining records in the file are 1 per employee, and each record contains an employee name, hours worked, and pay code. Your are to output for each employee his/her name, hours worked, pay rate per hour, and gross pay.
 

1. Don’t worry about overtime.
2. You may assume that the employee’s pay code will be one of the initial 10 pay codes.
3. Validate the hours worked (must be great than 0).