RESEARCH REPORT

 

Topic: Write a scholarly research report on a narrowed focus related to Computer Networking based on one of the following main topics:

Step 1: Select one of these topics:

1) Computer Networking and Machine Learning

Step 2: Review the CU Research Guide and APA documentation (Attached the document)

       a.    Follow the guidelines of the CU Research guide for the structure of the paper

       b.    Following the specifications of APA for format

Note: You will write a paper of at least 8-10 pages in length. The Title page, Abstract, Table of Contents, and Reference pages should not be counted in the number of pages required.

The paper must follow APA guidelines.  

Step 3: Go to Module 6 to submit your final paper

network administration

Although VPNs are relatively secure by nature, endpoints are not. Data entering or leaving the VPN is at risk. An end-user computer could be infected by malicious code that can traverse the VPN link into the company LAN.

Answer the following question(s):

Consider employees who work from home and use personally owned computers to access a company internal network How would you make those computers and connections more secure? That is, how would you prevent malicious code from getting on to the internal network?

C assignment help

C program. NOT C++
specialcountmulthreads.c is not completed. Need some modification

31 text files named input_00.txt to input_30.txt.

Requirements:

Multiple threads are expected to run in parallel to share the workload, i.e. suppose 3 threads to process 30 files totally, then each thread should process 10 files;

When a thread is created, a message should be print out showing which files this thread will process, for example:

Thread id = 274237184 starts processing files with index from 0 to 10!

When a file is being processed, a message should be print out showing which thread (thread_id = xxx) is processing this file, for example:

Thread id = 265844480 is processing file input_11.txt

When a thread is done with its workload, a message should be print out showing which files this thread has done with work, for example:

Thread id = 274237184 is done !

The array long specialfreq[ ] should always be up-to-date, i.e. it always has the result of all the threads counted so far. [You may need to use mutexes to protect this critical region.]

======specialcountmulthreads.c=====================

#include

#include

#include

#include

#include

#include

#define MAX_FILES 30

#define MAX_LEN 1000

int num_threads;

char *filename[MAX_FILES];

int num_files;

long specialfreq[MAX_FILES];

int *index_array[MAX_FILES];

void *thread_function(void *arg) {

int *index = (int *) arg;

int i;

int my_index = *index;

int starting_index = my_index * (num_files / num_threads);

int ending_index = starting_index + (num_files / num_threads);

FILE *fp;

char ch;

int count = 0;

char line[MAX_LEN];

printf(“Thread ID: %lu starts working on files %d to %d.n”, pthread_self(), starting_index, ending_index);

for (i = starting_index; i < ending_index; i++) {

fp = fopen(filename[i], “r”);

if (fp == NULL) {

perror(“Error opening file”);

} else {

printf(“Thread ID: %lu is working on file %sn”, pthread_self(), filename[i]);

while (fgets(line, sizeof (line), fp) != NULL) {

ch = fgetc(fp);

if (ch == ‘!’) {

count++;

}

}

specialfreq[i] = count;

fclose(fp);

}

}

printf(“Thread ID: %lu is done!n”, pthread_self());

pthread_exit(NULL);

}

void specialcountmulthreads(char *path, char *filetowrite, long specialfreq[], int num_threads) {

pthread_t tid;

int i;

int err;

int total_count = 0;

if (argc < 3) {

printf(“Usage: ./a.out num_threads input_file1 input_file2 … input_file30”);

exit(0);

}

num_threads = atoi(argv[1]);

num_files = argc – 2;

//printf(“Num thread: %dn”, num_threads);

//printf(“Num files: %dn”, num_files);

for (i = 2; i < argc; i++) {

filename[i – 2] = argv[i];

//printf(“Argv: %sn”, argv[i]);

//printf(“Filename: %sn”, filename[i – 2]);

}

for (i = 0; i < num_files; i++) {

index_array[i] = malloc(sizeof (int));

*index_array[i] = i;

//printf(“Index array: %dn”, *index_array[i]);

//printf(“Index array: %dn”, index_array[i]);

}

for (i = 0; i < num_threads; i++) {

err = pthread_create(&tid, NULL, thread_function, index_array[i]);

if (err != 0) {

printf(“ncan’t create thread :[%s]”, strerror(err));

}

}

for (i = 0; i < num_files; i++) {

total_count += specialfreq[i];

}

printf(“Total count: %dn”, total_count);

return 0;

}

======================testmulthreads.c=====================================================

#include

#include

#include

#include

#include

#include

#include

#include “count.h”

/*

* Print the frequencies of special words stored in array: specialfreq[] to output screen in the format as:

* letter -> frequency (one letter a line)

* Input: specialfreq – array having the frequency of each special word

size – the total number of special words

* example:

* he -> 250932

* she -> 181764

*/

void displayalphabetfreq(long specialfreq[], int size)

{

for(int i = 0; i < size; i++)

{

switch (i)

{

case 0:

printf(“%s -> %dn”, “he”, specialfreq[i]);

break;

case 1:

printf(“%s -> %dn”, “she”, specialfreq[i]);

break;

case 2:

printf(“%s -> %dn”, “they”, specialfreq[i]);

break;

case 3:

printf(“%s -> %dn”, “him”, specialfreq[i]);

break;

case 4:

printf(“%s -> %dn”, “me”, specialfreq[i]);

break;

defalut:

printf(“%s”, “Wrong number of special words … “);

}

}

}

int main(int argc, char *argv[])

{

printf(“Please enter 2 arguments only eg.”./testmulthreads #_of__threads!!””n””);

(2) discussion – data structures

 Respond to this discussion below about data structures and their roles in programming with at least 150 words or more

Unlike algorithms that pertain to real life scenarios outside of  computer science, data structures are particularly synonymous with  programming and software development. The term “data structure” is  almost self defining. Examples of data structures include arrays, lists,  stack, queue. All examples include different ways that data is arranged  and manipulated. Data structures are integral to developing complex  programs. “Data Structures are widely used in almost every aspect of  Computer Science i.e. Operating System, Compiler Design, Artificial  intelligence, Graphics and many more” (“Data Structure”, n.d.,).  Algorithms utilize different data structures to carry out a task with  the added benefit of reusability. An array is a simple to understand  data structure that is used by all programming languages. The ArrayList  is a particular function that is specific to Java. They are both ways to  declare an array. The cool thing about the ArrayList is that one does  not need to provide the size of the array initially. Java ArrayList  allows for many additional operations like the indexOf() and the  remove() operation. This seems to make ArrayList perhaps of more utility  than a simple array. Although, I have not heard of this ArrayList until  this discussion. I do look forward to experimenting with its many  functions in the future and perhaps in this course.

References:

“Data Structure”, n.d., Java T Point, Retrieved from https://www.javatpoint.com/data-structure-introduction

Mathur, P., 12 Jun, 2020, Geeks for Geeks, Retrieved from https://www.geeksforgeeks.org/array-vs-arraylist-in-java/

Unit 3 Assignment: Loops and Arrays

 In this assignment, you will be analyzing how to use a loop control variable, create nested loops, avoid common loop mistakes, use constants with arrays, search an array for an exact match, and use parallel arrays. 

Computer Science IT505 assignment 6

Company Name: New-Trust Bank, Dallas TX

The bank is helping companies to do online transactions with the customers who hold their credit cards (New-Trust Bank Credit Card). The Bank has a headquarters in Dallas TX with 300 employees.

FDIC regulations require that  Banks must keep customer information (including contact, identification, and transactions) for five years after the account is closed.
Question 1: 

Client/Server  Network for  Intranet.

New-Trust Bank’s IT system is cable of processing 15,000 customers a day. All Customer accounts are kept in the Customer Accounts database and there is a backup system to fulfill the FDIC regulations. Customer transaction information has to be moved to the long-term memory (archive) for backup and to fulfill the FDIC regulations. This database is within the New-Trust Bank IT data center.  All company employees will be connected to the Customer Accounts database via the intranet.

Task: Develop a Client/Server diagram for the Bank’s management office intranet only. You should present the client computers (office PCs), network devices, the customer accounts database, and long-term data storage (archive) in your Intranet diagram.  You should not be specific about the number of computers in the LAN, you can use generic numbers for presentation purposes. For security reasons; there is no requirement for wireless devices. All connections must be via cable.

Your Intranet diagram has to have the following components

Bank’s management office intranet:

  • Client Computers (Office PCs),
  • Network Devices (switch, router, etc.)
  • Server(s)
  • Customer Accounts Database
  • Employee Database
  • Long-term Data storage (archive) for Customer Accounts
  • Connections /cables

You may use DRAW.IO for your Client/Server diagram.

You should write at Top right corner Meet Patel and New Trust Bank  name on your diagrams.

Question 2: 

Cloud Computing

It looks like New-Trust Bank Credit Card will become very popular in near future. And there will be more companies that will accept Bank Credit Cards in the future. Each company will bring more customers for the Bank. This growth in customer numbers is of course good for the Bank, but the Bank managers are worried about the current data center and the FDIC regulations. The current data center cannot handle this fast growth of customer numbers. They need your help with the solution.

Consider the Bank’s IT system and the expectations from the Bank Management to accommodate the expansion of the customer numbers and FDIC regulations. Which sections/components/services would be achieved by Cloud Computing?

  • List the IT components that can be moved to Cloud. So, the Cloud service provider can help the growth of the company
  • List the IT components that can NOT be moved to Cloud. These are the section(s), you would not move to the cloud. List the IT components that can be done by the on-site data center (not Cloud Computing) and write the reason for not caring over to the cloud. 

 
Question 3:  

Web Page Structure

New-Trust Bank’s website has three different sections for three different business interactions.

Section 1 Personal accounts are accessible via the internet and open to the public. And should have the following subsections 

  • Opening page/ welcome/opening page
  • Locations and business hours
  • User Login page
  • Latest rates for the loans
  • Incentives for new customers

Section 2 Employees can access via the intranet, employee accesses only and is not open to the public. And should have the following subsections

  • Opening page/ welcome/opening page
  • This week’s upcoming activities/projects
  • Link to the Human Resources department’s webpage
  • Link to the Marketing department’s webpage
  • Link to IT department’s webpage 

Section 3 Corporate accounts are accessible via the internet and open to only partner companies. And should have the following subsections

  • Opening page/ welcome/opening page
  • Locations and business hours
  • Login page for the corporate accounts

Task: Develop the Bank’s Website structure for Intranet only.  You should first decide which sections should be under this Website and then draw the Website Structure using a block diagram. Please refer to the lecture notes for a similar case. This section of the website should not be open to the public.

You should write at Top right corner Meet Patel and New Trust Bank  name on your diagrams.

Wk 4 – Apply: Summative Assessment: Lab Reflection

 

After completing this week’s labs, reflect on what you learned and respond to the following questions in 1 to 2 pages:

  • Reflect on your experience of performing the simulated attacks. What insights did you gain about the attacks and about security from working on these exercises? 
  • What are the different types of denial-of-service attacks? How do you detect and respond to these types of events? 

Cite sources to support your assignment. 

Format your citations according to APA guidelines. 

Data Analysis

  • Define and describe Machine Learning in relationship to Big Data processing and analysis with examples. 
  • List and describe Neural Networks and Machine Learning models along with applicable areas and effectiveness to types of problems.
  • List and describe different types of statistical methods that can be applied to Big Data analysis.
  • Describe and compare different types of databases in terms of data visualizations. Provide detailed explanations and examples in contrast to each other.