Mininet and Openflow

   

Problem-1: Create the network topology 

Write a python script to create the topology given in the Fig.1. In this topology H1, H2, H3, and H4 are hosts and S1, S2, S3, and S4 are OpenFlow switches. Specify bandwidth, delay and loss rate for each link of your choice. Assign appropriate port numbers to the switch interfaces and accordingly use in your implementation.

Fig.1

Please refer attached document  for topology(Figure)

Problem-2: Push the flow rules 

Implement a controller which pushes flow rules on switches to satisfy following traffic constraints.

· No traffic should be allowed between H3 and H1.

· The HTTP traffic between H4 and H1 should be routed through Switch S2 and any other traffic between H4 and H1 should be routed through Switch S3.

· The traffic between H3 and H2 should be routed through Switch S3.

· The traffic between remaining nodes should follow shortest path.

  

Problem-3: Link Bandwidth Measurement 

Once the flow rules are pushed, create necessary traffic flows to calculate instantaneous bandwidth for the following:

· Measure and print the instantaneous bandwidth on the links connected to the Switch S2.

Problem-4: Packet loss Count for a specific traffic flow 

· Calculate the packet loss count between the switches S4 and S1 for the HTTP traffic flow

H4 —S4 — S2 — S1 — H1

· Calculate the packet loss count between the switches S4 and S1 for the non-HTTP traffic flow

H4 —S4 — S3 — S1 — H1

Deliverables:

1) Topology implementation file: prob1.py

2) Controller implementation file: prob2.py

3) Controller implementation file: prob3.py

4) Controller implementation file: prob4.py

*******

AI week11 DB

Hello,

i need this paper by 11/05 afternoon.

Strictly No plagiarism please use your own words.

What are some of the characteristics and operations of some of the malicious software that exists today?
Your post should be at least 350 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Discussion question #1-4 When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week. All work must be original (not copied from any source).

 Choose any two questions write 200-300 words thats  

Discussion #1: How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.

 Discussion #2: Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

 Discussion #3: Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

 Discussion #4: What are the most common metrics that make for analytics-ready data? 

Business Intelligence

 Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.

Topic: The volatile IP address in the IT sector & how forensics helped them detect

Gather all final project material:

  • final paper (minimum 5 references, A 500-700 word, double spaced paper, written in APA format, showing sources)
  • power point (PPT)
  • Bibliography (An annotated bibliography of at least five sources. The annotations must be at least five sentences long)

DESCRIPTION:

In order to avoid precise identification and commit serious crimes in other nations where they cannot be punished, cybercriminals always use secure software to stay anonymous, which is proxy servers that mask their location and channel their messages via several countries. They use a mix of conventional investigative and complex digital forensics techniques in addition to these collaborations.

Also as A IT professional I see a lot of hackers attempting to intrude external data into my businesses, my interest in taking this project has struck my mind to include digital forensics that can identify and solve this problem.

Digital forensics plays a significant role in preventing cyber – crime in the areas of information networks. In fact, digital forensics is a particular branch of forensic science dealing with the examination and restoration of substances retrieved from electronic device forms, and these devices are linked to crime in most cases. In order to ensure the reliability of network equipment for computer networks, digital forensics plays a significant role. A study based by a start-up company located in Luton has been demonstrated in this field. It was successfully assessed from the case that digital forensics is very helpful in digital crime investigation (Seigfried-Spellar, K. C, 2017). Digital forensics has played a significant role in the resolution of numerous criminal cases, including murder, abuse, smuggling, and many more. Digital forensics has also been analyzed from an overall viewpoint as relevant for law enforcement and plays a significant role in resolving various crimes.

Reference

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2017). Cybercrime and digital forensics: An introduction. Routledge.

1: Business strategy Analysis

 

Imagine you are preparing for an interview with a company as an IT manager. Part of the interview process is providing a work sample. You must provide an analysis of Amazon’s business strategy and explain what part IT governance functions in Amazon reaching their strategic goal to demonstrate your understanding of IT governance and IT strategic vision.  

Research at least 2 articles on Amazon’s business strategy.

Develop a 1- to 2-page checklist detailing the main points Amazon’s IT department should consider to be properly aligned to Amazon’s strategic business plan. Include relevant laws, regulations, and industry standards that would impact the business plan, such as PCI standards and SOX regulations. 

Write a 1- to 2-page summary of how Amazon’s IT Governance works with the Strategic Business Plan to achieve continued success and growth.

Format your citations according to APA guidelines.

Submit your assignment.

Why is stretching important?

Please create an account on Wix.com Website and design an instructional website by following the video tutorial.  You can click on  the  Wix Tutorial Video Link Here. Please view the video tutorial first, and then start to work on it.  A sample Wix website is Here at https://shali94.wixsite.com/sample.  After you create an account at www.wix.com . you can  start creating your website relating to your classroom teaching in any content you  would like to teach. You need to create at least a total of three web pages, but the more pates are welcome. The first page is the home page, and then the other two pages as subpages. You need to have three buttons linked to three web pages. If some students could not do this project well enough, he/she could come to the classroom class of Wix web design on campus afterwards.  You are welcome to come to my Wix class in my classroom for this Wix web design project if you have difficulty with it. Or you can follow the video tutorial to create web pages. Click Save button to save your work, and click the Publish button to publish it online. 

project 2

  Now that you understand and have created a virtual machine,  your Caduceus CTO, Eliza, has asked you to extend that application and  provision infrastructure in the cloud. Specifically, you will provision a  Windows operating system in the cloud. The provisioned infrastructure  could be accessed by any end-user device client. This includes a desktop  running Microsoft Windows, a Mac device running Apple MacOS, iPad,  Android Tablet, and even a Google Chromebook. You will use any of the  aforementioned end-user devices to access the provision infrastructure  once this is set up.

Step 1: Log in to the AWS Dashboard

CMIT 495 requires you to complete hands-on assignments in the Amazon Web Services (AWS) virtual environment.To get started, log in to the AWS free account you created in Week 1.

Step 2: Download the Week 2 Assignment Template

Next, watch the video and download the template from the Cloud Computing Assignment Resources page. You will answer the questions and embed the appropriate screenshots of your cloud infrastructure provision as you work.When providing a detailed overview of the steps required to  install the Windows operating system on the virtual machine, make sure  to include screenshots of each step in the process. Specific details and  instructions are included within the Week 2 Assignment Template.

Step 3: Install and Configure a Microsoft Windows Operating System

  • Provision cloud infrastructure via Amazon and a OS platform (PaaS) by installing and configuring a Microsoft Windows operating system that can be accessed on demand by any end-user device.   
    • Research and use AWS documentation and tutorials for instructions and guidance to complete the assignment.  
    • Consult the AWS Connection Documentation in order to connect to the Microsoft Windows operating system.  
    •     How Will My Work Be Evaluated? The following evaluation criteria aligned to the competencies will be used to grade your assignment:  
    • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.  
    • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.  
    • 2.3.1: State conclusions or solutions clearly and precisely.  
    • 3.1.1: Identify quantitative information that is relevant to a problem or situation.  
    • 3.1.2: Analyze quantitative data using an appropriate method.  
    • 10.1.1: Identify the problem to be solved.  
    • 11.1.3: Install software.  
    • 11.3.1: Add and update systems as required.  
    • 11.2.1: Configure technology according to stakeholder specifications and requirements.  

Step 4: Upload Your Work to the Assignment Folder

  • When complete, export your file as a PDF and upload to the LEO Assignments Folder (e.g., Project 2 – Cloud Computing).  

Step 5: Stop and Terminate Your Amazon Instance

After you complete the Week 2 Assignment, stop and terminate your  Amazon deployment/instances so you do not receive any unexpected charges  on your account.