Network Design Paper UMUC

  

Network Design Paper
The school has recently acquired a building in Maryland. This new building will house some admin offices, lecture rooms, and computer labs.
Building Dimensions:
Length: 240 feet
Width: 95 feet
Height: 30 feet
The building has 2 stories with layouts that I can attach for you.
There are 6 computer labs that will be used for instruction. Each of the labs will have 21 computers (20 for students 1 for instructor). Each of these labs will also have a server in the closet located inside the lab.
I addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet.
The library will also have some computers to allow students access to the library resources. There will be 10 computers for student’s use in the library, and 5 computers for Library Staff.
There are 5 lecture classrooms in the building. Each room will have a computer for instructor use.
Finally, there are various offices in the building. Each of these offices will have 1 computer for staff use, with the exception of the Admission office that will have 5 computers for staff use.
 

2 server rooms have been allocated, 1 on the first floor, and 1 on the second.
Your task is to design the network for this new building with the following criteria:
Student-accessed computers should be on separate network from staff accessed computers.
The whole building will share one internet access connection (T-1 link from Verizon). This connection will come into the Server room on the first floor.
Security is very important and this school.
The network will be assigned the 10.15.0.0 network address for all computers and devices. For internet routing use 191.1.1 network address.
The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby Area.
 

Submission should include no more than 3 pages, excluding diagrams and references.
1. Define the subnet (based on :rooms, floor, department, or other criteria.)
2. For each subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.
 

Physical Address Design:
1. Define the topology that will be used.
2. Select the appropriate network media to use.
3. Select the appropriate network connecting devices to use.
4. Physical layout of computers on the floor plan.
5. List of additional servers or network devices needed to implement the network.
6. Justifications for your network design (number 1-5 above).
You will be evaluated by your ability to implement appropriate IP addressing scheme.
Select and justify appropriate cable media that includes the length of each cable segment and number of nodes in each segment.
Select and justify appropriate topology such as star, bus, or ring for your netowork.
Select and justify your selected network equipment.
Select and justify appropriate network services to meet network requirements.
Select and justify implementation of the network.
use proper grammar, formatting, network terminology, and reference citations.
Feel free to use any drawings or attachments, and assume any number of computer or users.

Data Structure Arrays

Assignment Overview

Write a program for a real estate agent. The program should perform the following tasks:

  1. Create an array to hold average house price for the each of past 25  years for a single family residence of 1500 square feet. Initialize the  array with the values in sorted order, assuming the average house price  increases each year.

    Prompt the user for a house value.

  2. Use a binary search algorithm to determine the year that most  closely matches the house value entered by the user and display the year  and average house value for that year.

    After you finish the program, submit the source code and a screen shot of the output.

Assignment Expectations

  1. Use proper data structure to solve programming task.
  2. Demonstrate your knowledge of searching using the binary search algorithm.

Required Reading & Resources

Binary Search (n.d.). Retrieved from http://leepoint.net/algorithms/searching/binarysearch.html

Virtual Business in Global Marketing

  1. Read content resources. Select the following link to the Worldfavor article(https://blog.worldfavor.com/an-overview-of-corruption-in-supply-chains), An Overview of Corruption in Supply Chains. Read the article and then click on the Blockchain link to see how major companies are using technology to provide transparency in their global supply chains.
  2. Write an initial response to the following key question(s) or prompt(s):
    1. Considering the nature of your PBL project’s company, what do you see as major advantages of Blockchain to assist it in avoidance of corruption?
    2. Why is transparency in the entire supply chain from providers of raw materials to the customers’ purchases in their local box stores so important to protect your company’s corporate image and its integrity?
  3. The World Bank stated that corruption is one of the largest contributors to the economic well-being of developing countries. It is also the single biggest cause of business failure. With the growing global competition, governments and business organisations are coming up with solutions to combat corruption. But some argue that corruption is here to stay and they will have to adapt to it (Ibodullaevich & Kizi, 2021). What do you think?

Minimum 3 references with at least 500 words

Client Supported Commands Server Reaction and response Add: x where x can be any integer value (e.g., Add: 74) 1- Add x to the inputValues list 2- Respond with “added successfully” Remove: x where x can be any integer value (e.g., Remove: 2) 1- Remove

 

Client Supported Commands Server Reaction and response   Add: x where x can be any integer value (e.g., Add: 74) 1- Add x to the inputValues list 2- Respond with “added successfully”   Remove: x where x can be any integer value (e.g., Remove: 2) 1- Remove all occurrences x from the inputValues list 2- Respond with “removed

 

  Client Supported Commands Server Reaction and response   Add: x where x can be any integer value (e.g., Add: 74) 1- Add x to the inputValues list 2- Respond with “added successfully”   Remove: x where x can be any integer value (e.g., Remove: 2) 1- Remove all occurrences x from the inputValues list 2- Respond with “removed successfully”   Get_Summation 1- Calculate the summation of values in the inputValues list 2- Respond with “The summation is x” where x is the summation of all values in the list. If empty list or all elements are zeros, x in the message equals null   Get_Minimum 1- Search for the minimum number in the inputValues list 2- Respond with “The minimum is x” where x is the minimum value in the list. If empty list or all elements are zeros, x in the message equals null   Get_Maximum 1- Search for the maximum number in the inputValues list 2- Respond with “The maximum is x” where x is the maximum value in the list. If empty list or all elements are zeros, x in the message equals null    

Exit. This is the only command that terminates the interactive communication.

No action or response required    

JAVA PROGRAM. 

import java.io.*;
import java.net.*;

class Server {

   public static void main(String args[]) {
        try {

           // Create server Socket that listens/bonds to port/endpoint address 6666 (any port id of your choice, should be >=1024, as other port addresses are reserved for system use)
            // The default maximum number of queued incoming connections is 50 (the maximum number of clients to connect to this server)
            // There is another constructor that can be used to specify the maximum number of connections
            ServerSocket mySocket = new ServerSocket(6666);

            System.out.println(“Startup the server side over port 6666 ….”);

           // use the created ServerSocket and accept() to start listening for incoming client requests targeting this server and this port
            // accept() blocks the current thread (server application) waiting until a connection is requested by a client.
            // the created connection with a client is represented by the returned Socket object.
            Socket connectedClient = mySocket.accept();
 

           // reaching this point means that a client established a connection with your server and this particular port.
            System.out.println(“Connection established”);

            // to interact (read incoming data / send data) with the connected client, we need to create the following:

           // BufferReader object to read data coming from the client
            BufferedReader br = new BufferedReader(new InputStreamReader(connectedClient.getInputStream()));

           // PrintStream object to send data to the connected client
            PrintStream ps = new PrintStream(connectedClient.getOutputStream());

            // Let’s keep reading data from the client, as long as the client does’t send “exit”.
            String inputData;
            while (!(inputData = br.readLine()).equals(“exit”)) {    
 

                System.out.println(“received a message from client: ” + inputData);   //print the incoming data from the client

               ps.println(“Here is an acknowledgement from the server”);              //respond back to the client
 

            }
 

            System.out.println(“Closing the connection and the sockets”);

           // close the input/output streams and the created client/server sockets
            ps.close();
            br.close();
            mySocket.close();
            connectedClient.close();

       } catch (Exception exc) {
            System.out.println(“Error :” + exc.toString());
        }

   }
} /*********************************/

import java.io.*;
import java.net.*;
import java.util.Scanner;

class Client {

   public static void main(String args[]) {
        try {
 

            // Create client socket to connect to certain server (Server IP, Port address)
            // we use either “localhost” or “127.0.0.1” if the server runs on the same device as the client
            Socket mySocket = new Socket(“127.0.0.1”, 6666);

            // to interact (send data / read incoming data) with the server, we need to create the following:
 

            //DataOutputStream object to send data through the socket
            DataOutputStream outStream = new DataOutputStream(mySocket.getOutputStream());

           // BufferReader object to read data coming from the server through the socket
            BufferedReader inStream = new BufferedReader(new InputStreamReader(mySocket.getInputStream()));

            String statement = “”;
            Scanner in = new Scanner(System.in);
 

            while(!statement.equals(“exit”)) {
 

                statement = in.nextLine();              // read user input from the terminal data to the server
 

                outStream.writeBytes(statement+”n”);        // send such input data to the server

                String str = inStream.readLine();         // receive response from server

               System.out.println(str);                // print this response
 

            }

           System.out.println(“Closing the connection and the sockets”);
 

            // close connection.
            outStream.close();
            inStream.close();
            mySocket.close();
 

        } catch (Exception exc) {
            System.out.println(“Error is : ” + exc.toString());

       }
    }
}

CBSC610: Midterm

Conduct research and compare forensics tools that can examine Mac, IPod, and IPhone devices. Create a table listing the features they have in common, differences in functions, and price. Write a 3 to 4 page paper stating which one you would choose if you were an investigator for a small firm, and explain why.

discussion

 

Discuss the relevance of this paper today. Why do you think it has so many citations on Google Scholar?

Can this model be applied in a Windows Active Directory model? Explain.

https://scholar.google.com/scholar?hl=en&lr=&q=Role-Based+Access+Control+Models&btnG=Search

Viewpoints Applied

 

Prompt

Last week, we all got some experience working with modeling, specifically with ArchiMate. We showed a chosen business from three different core layers: business, application, and technology. However, we can dive much deeper using viewpoints to show specialized diagrams tailored to unique perspectives and stakeholders. The three core layers are actually considered basic viewpoints in and of themselves. In this week’s discussion, we’ll look at some other more specialized viewpoints.

For the company you selected last week, select a viewpoint and present your company from that viewpoint. For a full list of viewpoints and examples, refer to the textbook or visit Full ArchiMate Viewpoints Guide. (Links to an external site.)

Attach your viewpoint as a jpg image to the main post. (Select the Embed Image icon from the box above your discussion reply.) Then, provide 100-word minimum post explaining your thoughts on your company, their process, your experiences using a modeling language, and how such diagrams can be useful and usable.

Response Parameters

Research Paper review

Problem statement: what kind of problem is presented by the authors and why this problem is important?

  1. Approach & Design: briefly describe the approach designed by the authors
  2. Strengths and Weaknesses: list the strengths and weaknesses, in your opinion
  3. Evaluation: how did the authors evaluate the performance of the proposed scheme? What kind of workload was designed and used?
  4. Conclusion: by your own judgement.