Congratulations, you have been chosen to build out a network for a new facility for your company, ACME, Inc.
Office Schematic, (select ) each office is approximately a 10’x10′ space with 10′ ceilings. Building is roughly 125’x150′.
Your focus will only be for the areas marked A, B, C, D, E, F and G (I recommend combining E, F and G using one Wireless Access Point (AP).
The topology is STAR and wireless
A router will be placed at the edge of the network for Internet Service Provider connectivity
Use CISCO packet tracer to design the best layout for the ACME, Inc network
Category: Information Systems homework help
-
“Designing a Scalable Network for ACME, Inc: A Topology and Wireless Solution Using CISCO Packet Tracer”
-
Discussion (Chapter 7): Challenges and Applications of Sentiment Analysis (Samantha) Sentiment analysis, also known as opinion mining, is a valuable tool in understanding public perception and sentiment towards a particular topic or entity. However, like any
Week 7 Discussion
Create a discussion thread (with your name) and answer the following question:
Discussion (Chapter 7): What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?
Note: The first post should be made by Tuesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.
Your response should be 250-300 words. Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. -
Title: Performance Management and Organizational Capabilities in Effective Teams
Week 7 DiscussionAfter completing the reading this week, we reflect on a few key concepts this week:
Discuss what performance management is and how it influences effective teams.
Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…). Please note at least five organizational activities and be specific when responding.
Note at least two organizational capabilities and compare and contrast each.
Please be sure to answer all the questions above in the initial post.Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:
Ask an interesting, thoughtful question pertaining to the topic
Expand on the topic, by adding additional thoughtful information
Answer a question posted by another student in detail
Share an applicable personal experience
Provide an outside source
Make an argument
At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.Please be sure to engage by Wednesday at 11:59pm ET and then engage on two more days throughout the week (for a total of three days of engagement, before Sunday at 11:59pm, ET. -
Title: Exploring Network Topologies and their Applicability in Different Industries Network topology is the arrangement of nodes or devices in a network and the way they are connected to each other. Different industries have varied business needs, and choosing the right
A network topology is the shape, or pattern, of the way nodes on the network are connected to each other.
Please respond to the following in a post of 150 – 200 words:
Compare/contrast the basic network topologies: point-to-point, bus, ring, star, and mesh.
Select an industry and recommend which network topology best supports this industry’s business needs.
Support your rationale with examples.
Note: Remember to cite any sources you use, including your textbook, using the Strayer Writing Standards format. -
“Effective Communication: Key Leadership Skills for Implementing Change Initiatives” Effective Communication: Key Leadership Skills for Implementing Change Initiatives Change is a constant in any organization, and effective communication is essential in successfully implementing change initiatives. As a leader,
In this discussion forum, you will define the skills required to effectively communicate change initiatives.
There are specific qualities required to successfully communicate change initiatives within an organization. In your post, discuss some of the most important leadership skills required to develop employee ownership and acceptance of change initiatives within an organization. -
Title: Evaluating Dissertations on Authentication Methods and Their Impact on Real-World Problems
Choose from one of these dissertations
Arts
Business & Economics
Education
Humanities
Social Sciences
Behavioral Sciences
Natural Sciences
Mathematics & Physical Sciences
Health & Medical Sciences
The dissertations you evaluate should discuss issues with authentication such as the adoption of certain types of authentication, such as biometrics, or the resistance of employees to use new authentication methods.
Examine the dissertation you have been working with (or another one) and describe the main themes of the literature that are being analyzed: the underlying theory, underlying models, frameworks, and so on.
Answer the following in your post:
What is the real-world problem the research is trying to solve?
How is the researcher using the base theory? (For example, are they testing the theory with a new population or are they perhaps extending that theory to include a new variable?)
What is the significance of the study? Do you believe the study will contribute to the increased success of authentication methods? -
Title: “Navigating Personnel Changes: Strategies for Effective Communication” As the liaison between decision makers and followers, it is my responsibility to effectively communicate potential personnel change initiatives. In order to do so, I will utilize the communication strategies found in the
Imagine that:
You are the liaison between the decision makers and the followers.
Your role is to communicate potential personnel change initiatives.
In your post, using the communication strategies found in the text,
List the actions you will take to format the conversation with employees regarding the restructuring process.
Design a strategy to communicate the personnel change initiatives. -
Title: Understanding the FDA’s Regulatory Process for Medical Products
Few people have not heard about the Food and Drug Administration (FDA). The COVID pandemic has placed a renewed focus on its role in assuring safety of drug approval. It is not nearly as well known that the FDA is tasked with regulating multiple categories of products. One cannot work in healthcare and not be a part of products regulated in some fashion by the FDA. FDA U.S. Food & Drug Administration.
Investigate the regulatory process for medical products.
Include the following aspects in the assignment:
Access the FDA site, scroll to the bottom to the “Products we Regulate,” choose a product from one of the following sections: Drugs, Medical Devices, Vaccines, Blood, and Biologics.
Click on that topic and open the topic page, scroll to the bottom: navigate the (Drugs, Medical Devices, Vaccines, Blood, and Biologics) section.
Explore each of the eight sections.
Summarize each section, what each contains, its purpose, and resources.
Share if you feel the FDA provides a rigorous review of these products. Why or why not? Do you feel the FDA protects the public?
Cite any references. Proper grammar, sentence structure, and spelling are required. Use your own words. Copying and pasting are not allowed. -
“Comparing Internet Security Standards for Implementing Secure Virtual Private Networks (VPNs)”
Virtual Private Networks (VPNs) provide a secure data flow between two endpoints. There are not only different types of VPNs, but there are also different Internet security standards for implementing security in these different VPN types.
In this assignment, you will classify the three different types of Virtual Private Networks (VPNs). You will compare the features of the IPsec and SLL/TLS Internet security standards. You will then evaluate these two Internet security standards for implementing security in the three different types of VPNs.
Instructions
Write a 3 – 5 page paper in which you:
Classify the three different types of Private Networks (VPNs).
Distinguish the characteristics of each type in terms of configuration (e.g., host-to-host), transmission technology (e.g., multiplexing), and ease of implementation.
Compare the two different Internet security standards of IPsec and SLL/TLS in terms of features they provide for security, strengths, and weaknesses.
Evaluate the IPsec and SLL/TLS standards for implementing security in the three different types of VPNs.
Your evaluation for each VPN type should include the VPN type, your proposed Internet standard for implementing security in this type of VPN, and the rationale behind your evaluation.
Reflect on your learning experience in this assignment, the lessons you learned, and how this experience would apply to your personal or professional life.
This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
Evaluate Internet security standards for implementing secure Virtual Private Networks (VPNs).
-
Title: Understanding the Protection Mechanisms and Operation Modes of IPsec Internet Protocol Security (IPsec) is a set of protocols that provides security services for IP networks. It offers two main protection mechanisms, namely Encapsulating Security Payload (ESP
Internet Protocol Security (IPsec) is a collection of key security standards. As such, IPsec offers several protection mechanisms and several modes of operation.
Analyze the IPsec two protection mechanisms of Encapsulating Security Payload (ESP) and Authentication Header (AH) in terms of protection, authentication, and confidentiality.
Differentiate the ESP two operation modes of Transport and Tunnel modes and explain which mode provides more protection and why.
Respond in 200-250 words