Mininet and Openflow

   

Problem-1: Create the network topology 

Write a python script to create the topology given in the Fig.1. In this topology H1, H2, H3, and H4 are hosts and S1, S2, S3, and S4 are OpenFlow switches. Specify bandwidth, delay and loss rate for each link of your choice. Assign appropriate port numbers to the switch interfaces and accordingly use in your implementation.

Fig.1

Please refer attached document  for topology(Figure)

Problem-2: Push the flow rules 

Implement a controller which pushes flow rules on switches to satisfy following traffic constraints.

· No traffic should be allowed between H3 and H1.

· The HTTP traffic between H4 and H1 should be routed through Switch S2 and any other traffic between H4 and H1 should be routed through Switch S3.

· The traffic between H3 and H2 should be routed through Switch S3.

· The traffic between remaining nodes should follow shortest path.

  

Problem-3: Link Bandwidth Measurement 

Once the flow rules are pushed, create necessary traffic flows to calculate instantaneous bandwidth for the following:

· Measure and print the instantaneous bandwidth on the links connected to the Switch S2.

Problem-4: Packet loss Count for a specific traffic flow 

· Calculate the packet loss count between the switches S4 and S1 for the HTTP traffic flow

H4 —S4 — S2 — S1 — H1

· Calculate the packet loss count between the switches S4 and S1 for the non-HTTP traffic flow

H4 —S4 — S3 — S1 — H1

Deliverables:

1) Topology implementation file: prob1.py

2) Controller implementation file: prob2.py

3) Controller implementation file: prob3.py

4) Controller implementation file: prob4.py

*******

Java Program

  

Write a program, in a file called MeanNumbers.java, that collect integer variables from the user until the user enters a non-positive value. It the user has enter less than two values, display a message “Insufficient data.” and stop. If the user enters more than 10 values, display “Too many values” and stop. Otherwise, call the following methods and display the results: double arithmeticMean(int [] d), double harmonicMean(int [] d), and double harmonicMean(it [] d). arithmeticMean should calculate the arithmetic mean: am= ∑i=0 N d [i] N , harmonicMean should calculate the harmonic mean: am= ∑i=0 N 1 d [i] N , and geometricMean should calculate the geometric mean: am= N √∏i=0 N d[i] .

Defensive Technologies Responses

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

In order to prevent attackers from gaining access to your network, there are three control mechanisms that are used to work together to make sure that security is maintained (Oriyano, 2013). These three controls are administrative, technical and physical.

Administrative controls deal with the policies and procedures. This includes setting up restricted privileges. Server configuration, alerts, response and desktop configurations. Implicit deny is a setting that defaults any missed settings or configurations ill automatically default to not allow access. Least privilege is setting each access to be allowed to only what is absolutely needed and nothing more. Job rotation is used to ensure not one person has too much power in one area, this helps to hold accountability. Other tasks consist of separation of duties, mandatory vacation, and privilege management. All these tasks help contribute to a good mixture of security from attackers internally and externally.

Technical controls consist of things such as passwords, biometrics, access control software, antivirus and malware software. Using access control software to be able to enforce access of sharing information and applications. Anti-Malware software and passwords are one of the most common and most needed technical tools for protecting the security of an organization (Oriyano, 2013). Passwords are only useful if used properly though.

Physical controls are thing that you physically use to protect your systems such as cameras, locks, safes, any types of barriers that act as an extra barricade for an attacker. I think of it like a prison, there’s location, that’s in a strategic place, usually in the middle of nowhere. Fences, barricades, guards, alarms etc. all this can be used to protect your equipment and personnel.

All three of these controls are used in combination with each other to provide an organization security and help prevent from attackers. Each action performed makes it one more hurdle for an attacker to have to navigate through.

Amanda

RESPONSE 2:

There are three overall types of controls used to prevent attackers from gaining access to a network or specific data. The types are Administrative, Technical, and Physical and with the three layered in whatever ways are chosen by the security or IT person, they protect or at least slow the would-be attacker.

Administrative controls are the rules that are in place to dictate who receives what access, and one of my favorite methods of doing this and slowing attackers is through the Principle of Least Privilege. This only provides users with the bare minimum access to perform their job, nothing extra. (Oriyano, 2014) This would slow attackers down because they would then need to find a user with the proper accesses instead of just getting access from any user.

Technical controls are what most people think of when it comes to security and are things like antivirus and malware software but are also methods of users authenticating themselves. (Oriyano, 2014) Biometrics would make gaining access much harder for an attacker as they would need to either somehow obtain a user’s biometric information or obtain it from the database where that belongs.

Physical control is exactly what it sounds like, but location is one that can be a huge deterrent for attacks. Does the server or data get stored in one location? Or is the locations broken up into sections? It can be harder for an attacker either way if controls are present. With one central location a location can only worry about the security for one location, but if the data is spread out the job becomes more work to locate where the data the attacker wants is.

Ruston

Phd: Discussion topic

As outlined within this weeks Topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Identify the challenges associated with each of the Catagories below:

  • Data Gathering
  • Storage and Integration
  • Data Analysis
  • Knowledge Discovery and Information Interpretation

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

600 Words Initial post with at least 3 scholarly references and In-text citation.

Comment 1: 150 words with at least 1 scholarly reference.

Comment 2: 150 words with at least 1 scholarly reference.

Please use proper APA formatting for Headings, paragraphs, spacing, references and all.

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_sample_paper.html

Advanced Operating Systems questions

There are total 3 questions about advanced operating systems. It might not be take long time to solve them. 

You might find out the similar questions at chegg or somewhere else. But the detailed numbers and some parts are different with this questions that I posted.

You have to read carefully and solve those questions please. The time allocated  is one day.   

Qualitative Data Analysis

5 pages

In this Individual Project you will conduct a practice round of Qualitative Data Coding.

Review various methods of coding at Methods Map Coding Coding Methods Map. Sage Research Methods.  

Select one method of coding for this assignment.  

Download the practice qualitative dataset and select one of the letters as sample qualitative data for this coding practice.  

Provide the results of your coding process, using a diagram to present your findings. 

Your diagram could be in a matrix format (table) or a concept chart (node network). 

Refer to your assigned readings on diagramming or other resources explaining how to graphically display qualitative patterns from coding.

Your submission should include the following: Description of your coding process used  List of codes used to code the dataset  Diagram of coding patterns   Brief narrative summary of your graphic diagram

web browser forensic tools

 

You are to explore the different web browser forensic tools available, both paid and free. You are to research the different tools available to you, concentrate on free tools, and provide a summary of the tools and how you can use them to perform web browser forensics. You should also note whether the tools can be used on virtual machines.

Your research should include a 3-4 page executive summary paper in APA format, with all supporting references and screen shots of the software you explored that is available for you to use. Eventually you will be providing a video on the software in action and you using the software.  The goal is to be able to use the software to conduct the investigation and analysis and provide a final report for testimony, just to give you an idea on where we are heading.

Assignment 2

Required Reading:

Optional Resources:

Chapter 2 Journal articles

Task 1

After completing the reading this week, we reflect on a few key concepts this week:

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Please be sure to answer all of the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Please be sure to engage by Wednesday at 11:59pm ET and then engage on two more days throughout the week (for a total of three days of engagement, before Sunday at 11:59pm, ET.  

Task 2

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.