Deliverables:
You should submit 3 Java files containing the Java code (.java).
***The files should be zipped in a file named exactly as specified Project1_Student1FirstNameStudent1LastName_… Student5FirstNameStudent5LastName. Example: Assignment_HanaaAljehani_SuhaBashekh_YasmeenAhmed_ReemOrfali_FadiaAlghamdi.
Suggestions:
Read AND fully understand this document BEFORE starting the program!
Next, design your data structure and make your algorithm
Once the solution is 100% clear to you, then begin making your code.
Hope this helps.
Category: Computer science
-
Title: Project 1 – Java Code Deliverables
-
“Cloud Computing Project Plan for XYZ Company: Leveraging the Benefits of IaaS, PaaS, and SaaS Models”
Over the next 10 weeks you will use what you learn throughout the course to write a project plan for your company.
The assignment is broken into two parts. The first part is your midterm and is due week 5 by Sunday midnight. The second portion of the paper is due week 10 by Sunday midnight and is considered your final exam.
Paper requirements
You paper must be written in APA format. This is not a question and answer assignment. You must write this as a formal report as if you are turning it into a company.
You are NOT required to write an abstract
You must include a title page and reference page which do NOT count towards the final page count
You must cite at least 10 sources
You cannot use Wikipedia, techopedia, or any other site that can be edited by the general public
Acceptable sources
Your textbook
Any academic journal or peer reviewed paper
Any commercial or government site (AWS, Google, Microsoft, Verizon, etc.)
The minimum page count for the midterm is 5 pages. Remember, this does not include the title page or reference page.
The minimum page count for the final is an additional 5 pages. The total document should be at least 10 pages.
Part 1 (Midterm)
Total points possible = 20
Your paper should have the following information:
Title Page (1 point possible)
Company Information (4 points possible)
The name of the company (can be real of made up). The company should remain the same for part 1 and 2.
The size of the company
A brief description of the work the company does
The current network architecture and location(s) of the company
Business Driver (3 points possible)
Why are you proposing the business adopt cloud computing?
What deployment model are you proposing and why? (IaaS, PaaS, SaaS, etc.). Note – you can have multiple models based on your business type.
What is the main benefit of this business model?
Provider, Capacity, and Cost (11 points possible)
What cloud provider do you propose using (example: AWS, Google, Microsoft Azure, etc.)
Identify why you selected this company.
What is the estimated size and resource requirements needed?
Identify how you determined this.
What is the cost?
Break down the costs (i.e. software, resources, accounts, etc.)
Will the cloud be public, private, community, or hybrid?
Describe what this means and why you selected this model.
What is the future state of the IT infrastructure?
Do you plan on growing the business?
Will you need more space? Why?
Reference page (1 point possible)
Note as described plagiarism should be zero
Apa format -
Solving Project Euler Problems Using Python Problem 1: Multiples of 3 and 5 Find the sum of all the multiples of 3 or 5 below 1000. # Solution sum = 0 for i
Choose 4 problems from the first 10 problems (numbers 1 to 10) and solve the problems. Use Python and write down a code for these 4 problems. Choose a submission type
Go to the following link
https://projecteuler.net/archivesLinks to an external site. -
Network Management Project Report and Presentation “Exploring Network Management and Security with Wireshark and Promiscuous Mode”
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g., misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Name:
Name:
Name:
ID:
ID:
ID:
Project Instruction
Project Objective:
This activity is an opportunity for you to practice your knowledge, enhance your skills, and learn from experience to work on network management in terms of network tools, configurations, protocols, and troubleshooting.
Total Marks = 14
Project report
Presentation
11 marks
3 marks
Group Size = 2-3 Members.
One group member (group leader/coordinator) must submit all files (project report and presentation slides) on blackboard. Marks will be given based on your submission and quality of the contents.
Project Report
Each Report will be evaluated according to the marking criteria mentioned in each question section.
Presentation
Students (group) need to present their project (either F2F or Virtual). You should have PowerPoint slides, ranging from 10 to 15.
The presentation schedule with date and allocated time will be shared with you on Blackboard.
2 Marks
Learning Outcome(s):
CLO3
Evaluate different SNMP tools, network statistics tools, and protocol analyzer for network management.
Question One
SNMP (Simple Network Management Protocol) serves as a network management tool to manage and control various network components such as switches, routers, and firewalls. SNMP implementers often encounter issues and difficulties when solving problems related to SNMP network monitoring. Below are some issues SNMP implementers might face; therefore, you are asked to discus in detail how you will troubleshoot them:
I.Error message: “SNMP Is Not Enabled”. [0.5 marks]
II.A delay in responses to SNMP queries. Such that, a switch in the NMS does not respond to GetNext requests and generates a RESPONSE_DELAYED error message. [0.75 marks]
III.If the response for an SNMP has a noSuchName or noSuchObject error. [0.75 marks]
3 Marks
Learning Outcome(s):
CLO5
Demonstrate broadband networking services and technologies.
Question Two
Build a network topology as given below using the Packet Tracer. Use the information given in the table below to configure the router and PCs. You must also do the following:
I.Write the commands used to configure the router. [1.5 marks]
II.Support your results with screenshots which show the connectivity between hosts from different networks. [1.5 marks]
Machine
Interface
IP address
Subnet Mask
Gateway
Server1
Fast Ethernet
172.16.2.15
255.255.255.0
172.16.2.1
PC1
Fast Ethernet
172.16.2.30
255.255.255.0
172.16.2.1
Server2
Fast Ethernet
172.16.3.200
255.255.255.0
172.16.3.1
PC2
Fast Ethernet
172.16.3.50
255.255.255.0
172.16.3.1
Router0
Fa0/0
172.16.2.1
255.255.255.0
Fa0/1
172.16.3.1
255.255.255.0
2 Marks
Learning Outcome(s)
CLO 2
Analyze security threats, vulnerabilities, and risks.
Question Three
Suppose you are given a task to monitor and track of network status, including routers, switches, and desktops.
1.Discuss which tools/protocols/commands you would use. [0.5 marks]
2.Execute the commands on any network that you can have (e.g., your home router, google servers). Support your work with screenshots, explaining the information shown in each screenshot. Note, the commands would differ based on used operating systems, routers, etc. [1.5 marks]
3 Marks
Learning Outcome(s):
CLO5
Demonstrate broadband networking services and technologies.
Question Four
Part of a network management involves analyzing incoming and outgoing network traffic to identify any potential security threats and performance issues. Therefore, you are requested to download the Wireshark tool on your PC and complete the following tasks:
1.Capture your PC’s network packets. [0.75 marks]
2.Use Wireshark’s filtering to inspect the packets. [0.75 marks]
3.Discuss the benefits of using these tasks. You can also choose to do additional tasks if you wish! Support your work with screenshots, explaining the information shown in each screenshot. [1.5 marks]
1 Marks
Learning Outcome(s):
CLO5
Demonstrate broadband networking services and technologies.
Question Five
Explain why you would use a promiscuous mode in any network.
Requirements: Question -
“Exploring the Strengths and Weaknesses of an Opinion-Based Article: A Review of [Article Title]”
Assignment 1-
Assignment
Article Review
Size
2 – 3 pages
Formatting
In accordance with the Publication Manual of the American Psychological Association, Seventh Edition (2020)
Mandatory Components
· Your Name
· Title of Article
· Author’s Name
· URL to the location of the article
· Summary of the Author’s Position
· Article’s Strengths (how well does the author support his/her position)
· Article’s Weaknesses (what is missing? How could the author have better supported his/her position? (statistics, external references, academic research, etc.)
· What is YOUR opinion of the author’s position?
o Why?
· What do YOU suggest the author could’ve/should’ve done to strengthen his/her position, or more importantly, convinced YOU to agree with the stated position?
Suggested Topics
Relevant to our course learning objectives/subject
Opinion based article
Article recommends a vendor, methodology, etc. over competitors. -
Title: The Advancement and Implementation of AI Technologies through Contemporary AI Programming Languages
Write a 5-page report on any contemporary AI technology that utilizes any prevailing programming language and how it contributes to advancing and implementing AI technologies.
Requirements:
Minimum 3 research articles published after 2017.
You can use the library database to find the article. Here is the link: https://library.na.edu/
Reference and In-text citations should be in APA format.
Your report needs to have the following topics: You can add additional topics too.
Introduction
Background
Findings
Limitations or Weakness
Conclusion
Reference
Deadline May 5, 11:30 PM.
Points to Note:
If found use of chatgpt or any other AI resources, you will get 0.
If you are getting information from the research paper, properly cite them.
Your work will undergo a plagiarism check -
Title: Understanding Network Communication and Protocols
1. Explain the difference between Router and a Switch. Illustrate with example how a switching table and routing table can be used in network communication. (30 points)
Hint: Refer Chapter 2 for Switches and Routers. Chapter 2 also has examples for routing tables (pg.90 and switching tables pg.66,67)
2. Explain the difference between Ipv4 addressing and Ipv6 addressing. Illustrate using examples the structure of a Ipv4 address and Ipv6 address (20 points)
Hint: Refer Chapter 6 for Ipv4 and Ipv6 addressing
3. Explain the TCP/IP protocol and the layered architecture of the TCP/IP protocol (20 points)
Hint: Refer to Chapter 5 for TCP/IP protocol
4. Explain the layers of OSI model involved when you transfer a file from a computer on one network to a computer on different network. Explain the function of each of the layers in OSI model as part of the file transmission activity. (30 points)
Hint: Refer Chapter 7 for OSI models -
Title: The Importance of ERP Integration for Effective Communication and Collaboration within an Organization
I hope you can access this link for the material the assignment says is needed. If you can’t, please let me know so I can give you login info to see if that helps
THIS ASSIGNMENT IS ONLY 2-3 PARAGRAPHS
LINK FOR READING MATERIAL https://mbsdirect.vitalsource.com/reader/books/9781119702917/epubcfi/6/16[%3Bvnd.vst.idref%3DAc03]!/4/2/16[c03-sec-0027]/18[c03-sec-0029]/6[c03-fig-0013]/2%4051:6
In the resources of this module, you read about the implementation of ERP systems and how that implementation enabled different departments of the organization to share data to interact more effectively with each other. For this discussion, you are going to explore the benefits of an ERP from a different perspective. You will consider how systems functioned prior to the implementation of an ERP and the issues that arose from the lack of integration.
In your initial post, address the following:
How were enterprise functional areas integrated before ERPs?
What were some of the issues that arose from the lack of integration?
Did the sales department talk to the marketing department?
Did marketing talk to manufacturing?
What is the impact of each department having its own system and database?