Computer Science Business Data and Communication Presentation

Explain and provide example when it is possible that will cover chapter 6 subjects:

•Network architecture components

•Traditional network design

•Building-block network design

–Needs analysis

–Technology design

–Cost assessment

Pick Two of Network Simulation Tools from the following, and Discuss, Present them on the class:

•[WANsim] WAN simulators and emulators http://www.wan-sim.net/

•[OPNET] OPNET Modeler, http://www.opnet.com/

•[NS2] NS2 official website, http://www.isi.edu/nsnam/ns/

•[NS2-wiki] NS2 resource webpage, http://nsnam.isi.edu/nsnam/index.php/Main_Page

•[NS3] NS3 official website, http://www.nsnam.org/documents.html

•[OMNeT] OMNeT++ official website, http://www.omnetpp.org/

•[REAL] REAL 5.0 simulator overview, http://www.cs.cornell.edu/skeshav/real/overview.html

•[SSFNet] Scalable Simulation Framework (SSF), SSFNet homepage, http://www.ssfnet.org/homePage.html

•[J-Sim] J-Sim homepage http://www.j-sim.org/

•[QualNet] QualNet official site, http://www.scalable-networks.com/products/•[YANS], Yet Another Network Simulator http://yans.inria.fr/code/yans/?summary

•[GTNetS] The Ge orgia Tech Network Simulator (GTNetS) http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/

End product

  • Distinguish between due care and due diligence.
  • Based on your experience, provide examples of due care and due diligence.

(Emerging Technologies; Research Project

 Many new clean tech ventures have relied on funding and partnership from established corporations. Select a recently funded clean tech venture with corporate venture involvement. Did the funding impact the structure of the new venture? What does the new venture expect to gain from the backing by the larger corporation? What does the larger corporation expect to gain from being involved in the new venture? 

*******

 You will develop your research project in stages throughout the course, to include:  selecting a topic, submitting an abstract/outline, and submitting your final project (paper) for evaluation.  You must support your materials by using at least five appropriate, properly cited sources in addition to your course textbook. Your project (paper) will comprise 3000 words (not including title and reference pages).  Your project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one inch margins. 

Text book: Technology Ventures : from idea to enterprise 5th edition by Thomas Byers ISBN: 9781260048490

Discussions 3

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 3 & 4  (Jamsa, 2013).Chapter 3 topics:

  • Define and describe PaaS.
  • List the benefits of PaaS solutions.
  • Describe potential disadvantages of PaaS.
  • Describe how a cloud-based database management system differs from an on-site database.
  • List the computing resources normally provided with a PaaS.

Chapter 4 topics:

  • Define and describe IaaS.
  • Define and describe system redundancy. Discuss how you might use IaaS to implement a redundancy plan.
  • Define and describe load balancing. Discuss how you might use IaaS to implement load balancing.
  • Define and describe NAS. Assume you must implement a shared file system within the cloud. What company would you select? Why? What costs should your client expect to pay for cloud-based data on a gigabyte (GB) basis?
  • Define and describe colocation. Discuss how you might use IaaS to implement colocation.
  • Compare and contrast a cloud-based disk storage device (with a file system) with a cloud based database.
  • Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

C++ code

 

Please Upload a source code file for this assignment. Explain your program appropriately using comments the source code.

Check the attached files of “OS Security II,”  for further details of assignment. You are to implement a Dictionary Attack with and without Password Salt program in either C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

Dissertation topic proposal

In 100 words, identify a proposed topic in your discipline.

Connection to program goals and core courses

If you do NOT have a CPT code then just discuss at the end of your Topic how the Topic related to your concentration in the Ph.D. program.

Journals must be from approved list

Access control discussion 8

Explain how access control protects data.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly site the references.