Virtual Communication

Respond to both prompts:

In recent days, most communication (business interactions, coursework, spiritual communities. etc.) has become computer-mediated  How has this changed your daily life? How might relationships be affected over time? How might our culture change? Advantages? Disadvantages?

View “5 Tips for Delivering Zoom Presentations Like a Pro” How can you apply these suggestions to your presentations in class and at work?

Mininet and Openflow

   

Problem-1: Create the network topology 

Write a python script to create the topology given in the Fig.1. In this topology H1, H2, H3, and H4 are hosts and S1, S2, S3, and S4 are OpenFlow switches. Specify bandwidth, delay and loss rate for each link of your choice. Assign appropriate port numbers to the switch interfaces and accordingly use in your implementation.

Fig.1

Please refer attached document  for topology(Figure)

Problem-2: Push the flow rules 

Implement a controller which pushes flow rules on switches to satisfy following traffic constraints.

· No traffic should be allowed between H3 and H1.

· The HTTP traffic between H4 and H1 should be routed through Switch S2 and any other traffic between H4 and H1 should be routed through Switch S3.

· The traffic between H3 and H2 should be routed through Switch S3.

· The traffic between remaining nodes should follow shortest path.

  

Problem-3: Link Bandwidth Measurement 

Once the flow rules are pushed, create necessary traffic flows to calculate instantaneous bandwidth for the following:

· Measure and print the instantaneous bandwidth on the links connected to the Switch S2.

Problem-4: Packet loss Count for a specific traffic flow 

· Calculate the packet loss count between the switches S4 and S1 for the HTTP traffic flow

H4 —S4 — S2 — S1 — H1

· Calculate the packet loss count between the switches S4 and S1 for the non-HTTP traffic flow

H4 —S4 — S3 — S1 — H1

Deliverables:

1) Topology implementation file: prob1.py

2) Controller implementation file: prob2.py

3) Controller implementation file: prob3.py

4) Controller implementation file: prob4.py

*******

AI week11 DB

Hello,

i need this paper by 11/05 afternoon.

Strictly No plagiarism please use your own words.

What are some of the characteristics and operations of some of the malicious software that exists today?
Your post should be at least 350 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Discussion question #1-4 When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week. All work must be original (not copied from any source).

 Choose any two questions write 200-300 words thats  

Discussion #1: How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.

 Discussion #2: Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

 Discussion #3: Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

 Discussion #4: What are the most common metrics that make for analytics-ready data? 

Business Intelligence

 Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.

Topic: The volatile IP address in the IT sector & how forensics helped them detect

Gather all final project material:

  • final paper (minimum 5 references, A 500-700 word, double spaced paper, written in APA format, showing sources)
  • power point (PPT)
  • Bibliography (An annotated bibliography of at least five sources. The annotations must be at least five sentences long)

DESCRIPTION:

In order to avoid precise identification and commit serious crimes in other nations where they cannot be punished, cybercriminals always use secure software to stay anonymous, which is proxy servers that mask their location and channel their messages via several countries. They use a mix of conventional investigative and complex digital forensics techniques in addition to these collaborations.

Also as A IT professional I see a lot of hackers attempting to intrude external data into my businesses, my interest in taking this project has struck my mind to include digital forensics that can identify and solve this problem.

Digital forensics plays a significant role in preventing cyber – crime in the areas of information networks. In fact, digital forensics is a particular branch of forensic science dealing with the examination and restoration of substances retrieved from electronic device forms, and these devices are linked to crime in most cases. In order to ensure the reliability of network equipment for computer networks, digital forensics plays a significant role. A study based by a start-up company located in Luton has been demonstrated in this field. It was successfully assessed from the case that digital forensics is very helpful in digital crime investigation (Seigfried-Spellar, K. C, 2017). Digital forensics has played a significant role in the resolution of numerous criminal cases, including murder, abuse, smuggling, and many more. Digital forensics has also been analyzed from an overall viewpoint as relevant for law enforcement and plays a significant role in resolving various crimes.

Reference

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2017). Cybercrime and digital forensics: An introduction. Routledge.

1: Business strategy Analysis

 

Imagine you are preparing for an interview with a company as an IT manager. Part of the interview process is providing a work sample. You must provide an analysis of Amazon’s business strategy and explain what part IT governance functions in Amazon reaching their strategic goal to demonstrate your understanding of IT governance and IT strategic vision.  

Research at least 2 articles on Amazon’s business strategy.

Develop a 1- to 2-page checklist detailing the main points Amazon’s IT department should consider to be properly aligned to Amazon’s strategic business plan. Include relevant laws, regulations, and industry standards that would impact the business plan, such as PCI standards and SOX regulations. 

Write a 1- to 2-page summary of how Amazon’s IT Governance works with the Strategic Business Plan to achieve continued success and growth.

Format your citations according to APA guidelines.

Submit your assignment.