I need an ipynb program that matches all the specifications
UDP File Transfer Using Java
You will implement a reliable FTP client-server system.
Provide a simple menu to the user, e.g.
1. GET
2. PUT
3. CD
4. QUIT
Your code must be robust and handle any incorrect user input. Since there
can be
multiple clients querying the server at the same time with each client
being serviced by a
different thread on the server, the server must ensure concurrency
control on the data file
while it is being updated. Thus, only one thread must gain access to the
data file during
writes (hint: use synchronized keyword for the write method in your
code).
Be sure to terminate each thread cleanly after each client request has
been serviced.
Implement the project as described using Java Datagrams (UDP). This will
be a
connectionless client-server system since UDP is connectionless. However,
you will need
to provide reliability in your client-side application code since UDP
does not guarantee
delivery. You may use the CRC32 checksum class available in the
java.util.zip package
in the JDK for this purpose.
Topics in Computer Science feb 17
Basics of Assembly Programming
Advance security & information system
Lab: Threat Modeling
Using the the Microsoft Threat Modeling tool “model” the web service that takes an user input from the internet and gets a response from query of a database as shown in the picture below.
For all communication modify the link properties to be encrypted. For data stored at individual components have the data be encrypted. Generate:
1. A threat report keeping the state as Not Started.
2. Go to each individual threat and change the states to either “Mitigated”, “Not Applicable”, “Need Investigation”. Change the priority as deemed for each threat and provide justification.
3. Regenerate a threat report after working on all the threats.
What to Submit?
Submit a zip file that contains the following:
1. Write-up in Microsoft Word about the Lab goals and insights
2. Threat report from “Microsoft Threat Modeling tool” where threats are just generated by the tool (threats are in a Not Started state)
2. Threat report from “Microsoft Threat Modeling tool” with threats having different states other than “Not Started” state, with adjusted priority and justification
Assignment
Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762).This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
- Introduction
- Roles and Responsibilities
- Incident Response
- Plan Activation
- Document History
- Procedures
FinalExam wireless Networking
Need the Word doc with IEEE citation for the paper
Computer Science IT 505 assignment 9
You should have two websites for questions 1,2,3 and 4
Website 1 :
Your favorite web site overseas and preferably NOT English Language. And its short description. The URL must have the country extension.
Example of websites with county extension
www.——–.ac.in : Website in India
Do your web search and the find the website that you want to use. And provide the screenshot the first page of your website.
Website 2:
Your favorite web site in the USA preferably English Language (it can be sports team, car manufacture, fashion, music band, restaurant or your favorite person’s website or something similar). And provide the screenshot the fist page of your website.
Have these two websites for the following questions.
QUESTION 1:
Using Whois domain lookup to see the ownership and tenure of a domain name.
https://www.whois.com/whois
And provide the report of each website by providing for each website.
- Registrant Contact Name and City:
- Registered On and Expires On:
QUESTION 2:
Open the MS command prompt on your computer and do ping to your two websites one by one. And, provide the screenshots. Answer the following questions for each website.
For example C:UsersmyComputer > ping www.Your Favorite Website.com
- How many packets were sent?
- How many packets were received?
- Approximate time of round trip
- TTL ( allocated time to live for the package ) for each website
( get the screenshot of the PING report for both and paste them on this MS word)
QUESTION 3:
Windows-based system, use the command prompt and execute tracert and the URL of the two websites that you have declared. tracert will be displaying the route and measuring transit delays of packets across Internet.
For example C:UsersmyComputer > tracert www.Your Favorite Website.com
Compare both results by identifying all intermediate hops between the nodes for each URL.
Write the number stops (hops) achieved for each website. Which one has more hops ? Why?
QUESTION 4:
Open the command prompt and for each web site do nslookup (name space lookup)
nslookup allows you to query the D N S database from any computer on a network.
- a) Do nslookup form your computer command line to find the IP address of the web sever of the two websites
Example C:UsersmyComputer > nslookup www.Your Favorite Website.com. And,
Use https://www.ipvoid.com/find-website-ip/ to Find the IP address of the web sever of the two websites Compare the Ip addresses you have gathered form nslookup and ipvoid.com for the same website.
- b) Then use https://www.iplocation.net/ to see location of a website. And provide short report on; country, region and city of each websites’ server location (for each website)
QUESTION 5:
Use the undersea fiber optic cable map (https://www.submarinecablemap.com/) and answer the following questions.
- Find the Caucasus Cable System on the undersea fiber optic cable map. And visit the owner of the cable and see what kind of products they offer.
- Select a fiber line between USA and Japan and provide the following
Ready for service date (RFS):
Cable Length:
Owners:
URL:
Landing Points ( the main ones )
And copy/past the screenshot of cable map here. Us can use Snipping tool.
Cyber
Request for Proposal
Discussion with 500 words and
Write an essay of at least 500 words discussing discussing IAM in a federated cloud application.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.
Discussion Reply!!! About 50 words
- What advice or encouragement do you have for your classmate?
- What did you learn about the topic from the visual aid?
- Do you have any suggestions for how your classmate could revise their visual?
Although there are several visual aids that can be used during a presentation, photographs and images presented through a PowerPoint would work best for my speech because they will allow me to easily deliver my message. When deciding and selecting the best visuals for my topic and speech, I considered factors such as the speech’s message, occasion and the audience. My chosen visual aid will add to the audience’s understanding of the topic by amplifying my message and engaging them enough to enable them to respond.