Categories
Writers Solution

a good place to begin is with a project tracking tool

When one is faced with an enormous amount of work that must be completed in a fixed period of time, a good place to begin is with a project tracking tool or, in this case, three separate project tracking tools.  The tool can be as simple or as complicated as you like.  The only criterion is that it contains enough information to monitor the many steps/tasks that have to be done, which of them have been completed, what remains to be completed, and how long it will take before they all will be done.

The following is an example of a simple project tracking tool.  Feel free to use it or to develop one of your own making.

  • Column 1 should contain a list of each individual step in the project.  In some cases, the list may need to include sub-tasks for a given step.  It is always better to include every possible step, no matter how small it might seem, so that things are not forgotten.  It is also helpful to record challenges, reminders, problems, etc., as they arise so that you will remember to come back and address them.
  • Column 2 should indicate the date on which you should start working on that step if you are to finish the entire task on time.  You may need to revise your original starting dates in the earlier steps if, when you get to the final steps, you find that you have run out of time.
  • Column 3 should indicate the date on which you expect to complete that step in the project.  Here again, you may need to make adjustments if you find that you are likely to run out of time before you have completed all of the steps.
  • Column 4 is the most satisfying column.  It is the one into which you put an “X” whenever a particular step has been completed.  The goal is to have entered an “X” for all of the steps sufficiently in advance of the due date so that you will have time to reflect on the completed document before it must be submitted.

Here is an example:

Prepare and submit a project tracking tool for each of the three tasks – your portfolio presentation, submission of your Research and Practice Portfolio, and preparation of the report of your applied classroom-based research project.  It is important that you include all three projects in one master document.  The tool should show your progress to date on each of the three tasks.

You can use this template to get started or create something of your own

Assignment Status: Solved By Our Experts.

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

WE OFFER THE BEST PAPER WRITING SERVICES on a good place to begin is with a project tracking tool

USA, AUS, CA & UK PhD Writers

Categories
Writers Solution

What are the common elements of the TCP three-way handshake to begin communication?

NUMBER 1

Question A

What are the common elements of the TCP three-way handshake to begin communication? What are the additional elements that can be sent when the handshake fails?

Question B

What are the differences between centralized and distributed network routing? Which method is the most efficient for an organization’s high volume website?

REFLECT AND REPLY TO CLASSMATE DISCUSSION TO THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)

                                                               CLASSMATE’S DISCUSSION

Question A

The elements of a TCP three-way handshake process are as follows:  The first step is the Synchronize Sequence number or SYN by the client.  This sends data packets from the client to the destination server to ensure a port is open to establish a connection.

The second step is the Acknowledgement Sequence Number (ACK) or SYN/ACK packet.  This has two actions.  The first action is the server acknowledging the SYN packet sent by the client.  This is done by sending an ACK packet to the client. The second action is the server sending its own acknowledgement data packet or SYN to the client. I believe both packets are sent at the same time which is why this step is called SYN/ACK. 

The third step is the client sending an ACK to the SYN/ACK packets from the server.   This completes the three-way handshake, the client and server connection is created, and the communications can begin.  If a connection fails, a finish or FIN will be sent by the client and server indicating that the connection has been terminated.  Both will also need to send an ACT to complete the process.

Question B

Centralized routing is a technique for providing routing information that dictates that the routing information generated from the least-cost algorithm is stored at a central location within the network (White, 2016, p. 403). This would be easy to manage because all the routing information is stored in one location but it is also the single point of failure. Distributed routing is a wide area network routing technique in which each node maintains its own routing table (White, 2016, p. 404).  Access to the routing information is available in different locations throughout the network.  This makes it easier to access routing information and provides redundancy.   

In my opinion, a distributed network routing method would be more efficient for an organization with a high volume website due to the availability of the routing information throughout the network.   A centralized routing may get overwhelmed in high volume websites.   

                                                                   References:

Icommunity. (n.d.). Distributed vs. Centralized networks. https://icommunity.io/en/centralized-vs-distributed-networks/#:~:text=CENTRALIZED%3A%20If%20someone%20has%20access,the%20computers%20in%20the%20network.

Shalom, N. (2020). What does Three-way handshake Mean? https://www.techopedia.com/definition/10339/three-way-handshake

The TCP/IP Guide. (2005). TCP Connection Termination. http://www.tcpipguide.com/free/t_TCPConnectionTermination-2.htm

White, C. (2016). Data Communications and Computer Networks: A Business User’s Approach (8th ed.). Independence, KY: Cengage Learnings. https://ebooks.cenreader.com/#!/reader/9396c456-21f6-4768-90d1-7fb1e42967ce/page/11240395-5886-4788-8e5b-3c472a7e603b

NUMBER 2

Question A

What are the common elements of the TCP three-way handshake to begin communication? What are the additional elements that can be sent when the handshake fails?

Question B

What are the differences between centralized and distributed network routing? Which method is the most efficient for an organization’s high volume website?

REFLECT AND REPLY TO CLASSMATE DISCUSSION TO THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)

                                                                  CLASSMATE’S DISCUSSION

Question A

When setting up a TCP three-way handshake the sending and receiving device must be setup to send and receive control packets so that they an be synched. The handshake starts with the first device by sending the initiation of a TCP segment with a SYN control set. The next step the second TCP segment will received and return a TCP segment with SYN. In the final step the initial device will send to the TCP segments to the second device leaving an acceptance delivery. If the handshake fails then the server will return an ACK message. The packet will continue to send until a successful exchange or the results will be broken.

Question B

The centralized routing model uses a centralized database to carry out routing, whereas the distributed routing model uses a distributed database. In the centralized approach, one central node contains the routing table, but in the distributed model, each node carries a routing table. I believe that a decentralized network would be the most efficient for a high-volume website. The large amount of activity wouldn’t work for a single use server. The use of multiple servers will manage the load of the high-volume use.

References

3 way handshake, TCP Three-way handshake, TCP Synchronization. (2022). Omnisecu. https://www.omnisecu.com/tcpip/tcp-three-way-handshake.php

Systems, Z. (2022, February 25). Centralized vs. Distributed Network Management: Which One to Choose? – ZPE Systems – Rethink the Way Networks are Built and Managed. ZPE Systems. https://www.zpesystems.com/centralized-vs-distributed-network-management-zs/

WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER on What are the common elements of the TCP three-way handshake to begin communication?

Are You looking for Assignment and Homework Writing help? We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism.

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

Begin thinking of mobile device security in a business situation

Topic

Begin thinking of mobile device security in a business situation. Select a fictional or real corporate or university environment that requires mobile access. Use the Q & A Forum to ask questions and discuss your ideas about the project.

Proposal

Course Project Proposal (one to two pages, 35 points). Remember to properly cite any external sources used.

The proposal should contain the following items.

  1. Cover page
  2. Subject of the Course Project
  3. Name of the company or organization
  4. Brief description of the company chosen
    • Value proposition of the company
    • Size of the workforce (students included if the company chosen is an academic institution) with respect to IT infrastructure needs
    • Overview of the different types of mobile networks available in the company
    • Overview of types of mobile devices and storage media used in the company
    • Identification of potential mobile security risks
  5. Audience to whom you are presenting the recommendation(s)
  6. References

Technical Report (four to five pages, 65 points). Remember to properly cite any external sources used. The technical report should contain the following items.

  1. Cover page
  2. Introduction
  3. Intentional versus unintentional mobility scenarios in the company
  4. Protection of data
  • Physical protection mechanisms
  • Logical protection mechanisms
  • Protecting heterogeneous information
  • Protecting data in motion
  • Data protection models
  • Using a device-centric or data-centric model for the case study; which one is better?
  • Encryption
  • Types of encryption employed by the company’s IT department
  • Defense or countermeasures
  • Auditing
  • Deterrent controls
  • Preventive controls
  • Portable computer controls
  • Smartphones and PDAs
  • E-mail protection
  • Conclusion
  • References

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com ON  Begin thinking of mobile device security in a business situation

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

When a figure skater goes into spin she will begin with her arms extended, and then draws her arms inward.

Newtons Pendulum:  http://commons.wikimedia.org/wiki/File:Newton_Cradle_5_ball_s

When a figure skater goes into spin she will begin with her arms extended, and then draws her arms inward. As a result the ice skater spins faster.  Describe why this works in terms of angular momentum.

Provide your own example of the conservation of linear momentum in a collision.  Use the words elastic, inelastic, and totally inelastic in your explanation.

Be sure to provide substantive responses to at least two of your classmates. For instance a response referencing some specific point in the post to which you are responding is a substantive response. Another example of a substantive post is one which prompts your classmate to address some missed point of the discussion. As always responses such as, “Good Job,” and “I agree,” are considered non substantive and earn no points

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliverycapitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. When a figure skater goes into spin she will begin with her arms extended, and then draws her arms inward.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays