UDP File Transfer Using Java

You will implement a reliable FTP client-server system.

Provide a simple menu to the user, e.g.
1. GET
2. PUT
3. CD
4. QUIT
Your code must be robust and handle any incorrect user input. Since there
can be
multiple clients querying the server at the same time with each client
being serviced by a
different thread on the server, the server must ensure concurrency
control on the data file
while it is being updated. Thus, only one thread must gain access to the
data file during
writes (hint: use synchronized keyword for the write method in your
code).
Be sure to terminate each thread cleanly after each client request has
been serviced.
Implement the project as described using Java Datagrams (UDP). This will
be a
connectionless client-server system since UDP is connectionless. However,
you will need
to provide reliability in your client-side application code since UDP
does not guarantee
delivery. You may use the CRC32 checksum class available in the
java.util.zip package
in the JDK for this purpose. 
3.jpg

Advance security & information system

Lab: Threat Modeling

Using the the Microsoft Threat Modeling tool “model” the web service that takes an user input from the internet and gets a response from query of a database as shown in the picture below.

3.jpg

For all communication modify the link properties to be encrypted. For data stored at individual components have the data be encrypted. Generate:

1. A threat report keeping the state as Not Started.

2. Go to each individual threat and change the states to either “Mitigated”, “Not Applicable”, “Need Investigation”. Change the priority as deemed for each threat and provide justification.

3. Regenerate a threat report after working on all the threats.

What to Submit?

Submit a zip file that contains the following:

1. Write-up in Microsoft Word about the Lab goals and insights

2. Threat report from “Microsoft Threat Modeling tool” where threats are just generated by the tool (threats are in a Not Started state)

2. Threat report  from “Microsoft Threat Modeling tool” with threats having different states other than “Not Started” state, with adjusted priority and justification

Assignment

 Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762).This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.

  •     Introduction
  •     Roles and Responsibilities
  •     Incident Response
  •     Plan Activation
  •     Document History
  •     Procedures

Computer Science IT 505 assignment 9

You should have two websites for  questions 1,2,3  and 4 

Website 1 : 

Your favorite web site  overseas and preferably NOT English Language. And its short description. The URL must have the country extension.

Example of websites with county extension

www.——–.ac.in             : Website in India

Do your web search and the find the website that you want to use.   And provide the screenshot the first page of your website.

Website 2: 

Your favorite web site in the USA preferably English Language (it can be sports team, car manufacture, fashion, music band, restaurant or your favorite person’s website or something similar).  And provide the screenshot the fist page of your website.

Have these two websites for the following questions. 

QUESTION 1: 

Using  Whois domain lookup to see the ownership and tenure of a domain name.

https://www.whois.com/whois

And provide the report of each website by providing  for each website.

  • Registrant Contact Name and City:
  • Registered On and Expires On:

QUESTION 2: 

Open the MS command prompt on your computer and do     ping to your two websites one by one. And, provide the screenshots. Answer the following questions for each website.

For example C:UsersmyComputer > ping  www.Your Favorite Website.com

  • How many packets were sent?
  • How many packets were received?
  • Approximate time of round trip
  • TTL ( allocated time to live for the package ) for each website

( get the screenshot of the PING report for both  and paste them on this MS word)

QUESTION 3:  

Windows-based system, use the command prompt and execute tracert and the URL of the two websites that you have declared. tracert will be displaying the route and measuring transit delays of packets across Internet.

For example C:UsersmyComputer > tracert www.Your Favorite Website.com

Compare both results by identifying all intermediate hops between the nodes for each URL.

Write the number stops (hops) achieved for each website. Which one has more hops ? Why?

QUESTION 4: 

Open the command prompt and for each web site do nslookup (name space lookup)

nslookup allows you to query the D N S database from any computer on a network.

  1. a) Do nslookup form your computer command line to find the IP address of the web sever of the two websites

Example C:UsersmyComputer > nslookup  www.Your Favorite Website.com. And,

Use https://www.ipvoid.com/find-website-ip/  to Find the IP address of  the web sever of the two websites  Compare the  Ip addresses you have gathered form nslookup and ipvoid.com  for the same website.

  1. b) Then use https://www.iplocation.net/ to see location  of a website.  And provide short report on; country, region and city of each websites’ server location (for each website)

QUESTION 5:  

Use the undersea fiber optic cable map (https://www.submarinecablemap.com/) and answer the following questions.

  1. Find the Caucasus Cable System on the undersea fiber optic cable map. And visit the owner of the cable and see what kind of products they offer.
  2. Select a fiber line between USA and Japan and provide the following

Ready for service date (RFS):

Cable Length:

Owners:

URL:

Landing Points ( the main ones )

And copy/past the screenshot of cable map here. Us can use Snipping tool.

Discussion with 500 words and

 

Write an essay of at least 500 words discussing discussing IAM in a federated cloud application. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.   Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. 

Discussion Reply!!! About 50 words

 

  • What advice or encouragement do you have for your classmate?
  • What did you learn about the topic from the visual aid? 
  • Do you have any suggestions for how your classmate could revise their visual? 

  Although there are several visual aids that can be used during a  presentation, photographs and images presented through a PowerPoint  would work best for my speech because they will allow me to easily  deliver my message. When deciding and selecting the best visuals for my  topic and speech, I considered factors such as the speech’s message,  occasion and the audience. My chosen visual aid will add to the  audience’s understanding of the topic by amplifying my message and  engaging them enough to enable them to respond.