Categories
Writers Solution

Network Security Controls Recommendations

Scenario

Due to the Always Fresh expansion, management wants additional network controls to protect their growing network.

Tasks

Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.

Summarize your network security controls in a summary report to management. You must provide rationale for your choices by explaining how each control makes the environment more secure.

System Restoration Procedure Guide

Scenario

One of the security improvements at Always Fresh is setting up a system recovery procedure for each type of computer. These procedures will guide administrators in recovering a failed computer to a condition as near to the point of failure as possible. The goal is to minimize both downtime and data loss.

You have already implemented the following backup strategies for workstation computers:

§ All desktop workstations were originally installed from a single image for Always Fresh standard workstations. The base image is updated with all patches and new software installed on live workstations.

§ Desktop workstation computers execute a cloud backup every night at 1:00 a.m.

Consider the following for a computer that encounters a disk drive failure or some other error that requires restoration:

1. How much data has been modified between the last backup and the time of failure?

2. What images are necessary to recover the workstation?

3. What are the steps necessary to fix the problem that cause the data loss?

4. What steps should Always Fresh take to avoid a reoccurrence of this issue in the future?

Tasks

Create a procedure guide that describes the necessary steps for recovering a desktop workstation computer. Fill in details for each of the following steps:

1. Describe the processes of:

a. Fixing the problem that caused the failure in the first place. Keep the description of this process general. Just address the problem and ensure the recovery process starts with a functional computer.

b. Restoring the newly repaired computer to a base workstation.

c. Restoring local data for the specific workstation that failed.

2. Provide the steps to follow for each of the restore operations. Assume you will be using the Windows Backup and Restore utility.



Requirement:
2 pages each topic with 2 references each

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, Network Security Controls Recommendations

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG
Categories
Writers Solution

Social Network Analysis (SNA) Report

The topic is relates to Adidas brand.

Word Count: 3200-3500 Weighting: 40%
(20% +20%)
Social Network Analysis (SNA) Report
The main aim of this assignment is to start you thinking about social network analysis and strategy. Your first step will be to form a group of 3 or 4 members and to select an industry. Each group member will then need to pick one organisation (within the chosen industry) that is active on Twitter (please check on Twitter!). If a group has 3 members, then there will be 3 organisations, otherwise, if there are 4 members, then 4 organisations will be featured in the report.
Each group member will need to produce their own analysis before a summary of results is put together for the industry. Once the industry and organisations are selected, please consult your tutor for approval as your step 2. No two students should feature the same organisations in their analysis.
Step 3 is to understand the organisations social media footprint. Here, each member needs to review how many platforms the selected organisation currently exist on (e.g. Facebook, Linkedin, Twitter, Instagram etc). Your team will need to understand how and what each platform is used for and how many accounts each firm has for each platform. Some firms have more than one account in each platform to represent different business streams. This will also include details such as likes, favourites, followers, following etc. For example, IBM may have 5 other (peripheral) twitter accounts apart from the main account. Groups will need to make a note of each platform and carefully observe/analyse each account and the interactions within to interpret the social media footprint.
Your 4th step will require you to map a SNA on your chosen organisation using NodeXL. Each member must be conversant with the software and be able to run analysis and interpret the data of their chosen organisation/Twitter account. Your group report should have the following (i.e. one for each member):
• Organisation background and social media footprint
• Agenda for each social media platform and account-specific
• An analysis on chosen account Twitter and the threads within
• What was the SNA based upon (and why)
• Number of network members and their interactions
• Clusters / Groups found
• Key network members
• Nature of interaction (in-degree and out-degree) within clusters and externally as well
The 5th step is to draw a summary and conclusion for the overall industry which should include a strategy section discussing what should be considered in future based on their current SNA mapping this could also include comments on the social media platforms. It is essential to show critical analysis and understanding to reflect and offer a strategy to the industry in general but also each organisation.
The 6th step is to present the data in class Week 11/12. This 15mins presentation is worth 20% of the final assessment.
© Swinburne University 2021 INF20011

Submission Requirements. Please take time to read the following.

  1. Names of all group members and student id must be included.
  2. Only the Team representative will need to submit the file. Save your file as follows: [TeamName.pdf] e.g. TeamSuku.pdf
  3. Submission is made as single PDF document only via the Canvas link Assessment Individual Assignment
  4. The pdf document should have approximately 3200-3500 words (+/- 10%) inclusive of combined appendices (all SNA mapping)
  5. This assignment should be done in a report format and NOT essay. Do include sections such as Executive Summary, Introduction, content by sections, Conclusion and References.
  6. Pages of the report should have appropriate headers and should include printed page numbers
  7. These sections do NOT form part of the word count (Title page, Abstract, Table of Contents, Page footers/headers and Reference Lists)
  8. You must use the Swinburne Harvard Referencing style throughout your report and include an accurate list of references at the end of the report. You can access the correct style from Canvas.
  9. The report should be written in 11-12 point font size and should use no more than 1/1.5 line spacing between each line
  10. Please make sure that you have a spare copy of the assignment.
    Late assignments will result in a lower grade for the assignment in terms of the Universitys Extensions and Late Penalties policies.
    Any request for an extension must be directed to the convener. You must include appropriate supporting documentation such as a doctors certificate or a letter from your employer. These forms must be scanned and emailed to the convener as soon as possible.
    Assignment Hints and Tips:
    • The tutor could provide general feedback during class.
    • Students who skip classes may struggle to pass this assignment, given each student is required to do their own analysis.
    • If youre unsure of the structural differences between a report and an essay, please seek help from the library or learning support centre.
    • It is essential to read widely and use your own words to describe/discuss your thoughts. Regurgitating or copying word for word will lead to severe reduction in marks.
    • IMPORTANT: Plagiarism – the action or practise of taking and using as ones own, the thoughts, writings or other work of someone else – is not condoned by the University and severe penalties will be imposed where plagiarism is detected. Examples of plagiarism range from copying a passage from a book or another persons assignment without appropriate acknowledgement, using another students computer program, or submitting identical assignments. All assignments will be checked for instances of plagiarism.
    © Swinburne University 2021 INF20011

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Social Network Analysis (SNA) Report

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Cybersecurity professionals need to know the differences in the tools used to automate network defense and cybersecurity attacks by hackers in order to properly form strategic defense parameters that can resist network threats.

Assessment Description

Cybersecurity professionals need to know the differences in the tools used to automate network defense and cybersecurity attacks by hackers in order to properly form strategic defense parameters that can resist network threats.

In 500-700 words, explain defensive scripting and how it works.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Programmed Security – Rubric Collapse All Defensive Scripting35 pointsCriteria Description

Defensive Scripting

5. Excellent35 points

The student comprehensively explain defensive scripting and how it works with extensive details and examples. Subject knowledge is excellent.

4. Good29.75 points

The student provides a detailed description of explain defensive scripting and how it works with supporting details and examples. Subject knowledge is good.

3. Satisfactory26.25 points

The student appropriately describes explain defensive scripting and how it works with some supporting details and examples. Subject knowledge appears to be good.

2. Less than Satisfactory22.75 points

The student outlines explain defensive scripting and how it works with few supporting details and examples. Some subject knowledge is evident.

1. Unsatisfactory0 points

The student provides an incomplete description of explain defensive scripting and how it works. Subject knowledge is not evident.

Sources5 pointsCriteria Description

Sources

5. Excellent5 points

Sources are academic, comprehensive, current, and/or relevant. Quoted material and paraphrasing expertly support, extend, and inform ideas but do not substitute for the writer’s own idea development. Sources are well synthesized to support major points.

4. Good4.25 points

Sources are academic, current, and/or relevant to support major points. Quoted material and paraphrasing is used effectively and consistently to support the major points and writer’s idea development.

3. Satisfactory3.75 points

Sources are adequate, relevant, and extend beyond assigned readings. Quoted material and paraphrasing are included to support major points and writer’s idea development.

2. Less than Satisfactory3.25 points

Few relevant sources beyond assigned readings are used to support major points. Important relevant sources are neglected. Quoted material and paraphrasing are overused.

1. Unsatisfactory0 points

No outside academic sources are used to support major points.

Argument Logic and Construction5 pointsCriteria Description

Argument Logic and Construction

5. Excellent5 points

Clear and convincing argument presents a persuasive claim in a distinctive and compelling manner. All sources are authoritative.

4. Good4.25 points

Argument shows logical progression. Techniques of argumentation are evident. There is a smooth progression of claims from introduction to conclusion. Most sources are authoritative.

3. Satisfactory3.75 points

Argument is orderly, but may have a few inconsistencies. The argument presents minimal justification of claims. Argument logically, but not thoroughly, supports the purpose. Sources used are credible. Introduction and conclusion bracket the thesis.

2. Less than Satisfactory3.25 points

Sufficient justification of claims is lacking. Argument lacks consistent unity. There are obvious flaws in the logic. Some sources have questionable credibility.

1. Unsatisfactory0 points

Statement of purpose is not justified by the conclusion. The conclusion does not support the claim made. Argument is incoherent and uses noncredible sources.

Language Use and Audience Awareness (includes sentence construction, word choice, etc.)2.5 pointsCriteria Description

Language Use and Audience Awareness (includes sentence construction, word choice, etc.)

5. Excellent2.5 points

The writer uses a variety of sentence constructions, figures of speech, and word choice in distinctive and creative ways that are appropriate to purpose, discipline, and scope.

4. Good2.13 points

The writer is clearly aware of audience, uses a variety of appropriate vocabulary for the targeted audience, and uses figures of speech to communicate clearly.

3. Satisfactory1.88 points

Language is appropriate to the targeted audience for the most part.

2. Less than Satisfactory1.63 points

Some distracting inconsistencies in language choice (register) and/or word choice are present. The writer exhibits some lack of control in using figures of speech appropriately.

1. Unsatisfactory0 points

Inappropriate word choice and lack of variety in language use are evident. Writer appears to be unaware of audience. Use of primer prose indicates writer either does not apply figures of speech or uses them inappropriately.

Mechanics of Writing (includes spelling, punctuation, grammar, and language use)2.5 pointsCriteria Description

Mechanics of Writing (includes spelling, punctuation, grammar, and language use)

5. Excellent2.5 points

The writer is clearly in command of standard, written academic English.

4. Good2.13 points

Prose is largely free of mechanical errors, although a few may be present. The writer uses a variety of sentence structures and effective figures of speech.

3. Satisfactory1.88 points

Some mechanical errors or typos are present, but are not overly distracting to the reader. Audience-appropriate language is employed.

2. Less than Satisfactory1.63 points

Frequent and repetitive mechanical errors distract the reader. Inconsistencies in language choice (register) and/or word choice are present.

1. Unsatisfactory0 points

Surface errors are pervasive enough that they impede communication of meaning. Inappropriate word choice and/or sentence construction are employed

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Cybersecurity professionals need to know the differences in the tools used to automate network defense and cybersecurity attacks by hackers in order to properly form strategic defense parameters that can resist network threats.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

The Corner Store Network is a not for profit organisation working on programs relating to climate change

Client Description : The Corner Store Network https://cornerstorenetwork.org.au/ The Corner Store Network is a not for profit organisation working on programs relating to climate change, food security, food waste, nutrition and ethical consumption in Australia and the Asia Pacific. Our consumer facing brand, Stock/Store, is the brand that customers and the public know and primarily the brand that allows us to undertake the work that we do. Background There are three main areas that they consider important features of their business: • Coffee Annually we import 20 tonne of coffee fr om Timor -Leste. We roast and distribute within Australia, whilst paying an above fair -trade price to coffee farmers and providing education and training to improve coffee harvest yields and quality. We also plant 1 tree per kilo of coffee that we roast and offset all carbon emissions. • Tree Planting/reforestation We are returning the forests of Timor -Leste, having planted 140,000 mahogany trees over the past 10 years. This program is internationally certified as a carbon offset program. • Food security/waste and nutrition We are running programs in Australia and Timor -Leste to transform ‘food waste’ into preserved food, made available for vulnerable communities to access and giving primarily women skills in food preservation and knowledge around nutrition. Strengths • We have really strong relationships on the ground in Timor -Leste within the communities in which we work. • Our transparency in what we say we do and what we do. Customers can very easily and transparently see where their money goes a nd what it supports and feel comfortable that we are doing what we say we are doing. Weaknesses • Our size. Given the fact that we are a small team, we are stretched across tasks and stretched with the number of hands to get everything done that is needed o n a day to day basis • The coffee market is ever saturated with lower quality coffee that is being purchased at appallingly low cost to the detriment of coffee farmers worldwide. This is affecting roasters like us trying to do the right thing and making it m ore difficult to cut through in a crowded market

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Creditors’ Voluntary Liquidation File (CVL)

 The Corner Store Network is a not for profit organisation working on programs relating to climate change

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays

Categories
Writers Solution

Cisco Packet Tracer application to create a network diagram

Assessment Description

It is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their information assets.

Use the Cisco Packet Tracer application to create a network diagram that makes use of the following devices listed below, which belong to Company X. The diagram should illustrate your knowledge of network defense by placing network assets in their proper location, so as to ensure their protection. Include, within the diagram, any small office/home office (SOHO) solutions that will be used to protect either the infrastructure or end-user devices.

Within the diagram make sure to include at a minimum:

  1. 10 mobile devices (phones/laptops/tablets)
  2. Five desktop/stationary computers
  3. Two servers (file/email)
  4. One printer
  5. One router/firewall
  6. One WAN/gateway connection
  7. One switch
  8. One corresponding backup/replication asset for disaster recovery (local or remote storage/server)

Note: Any IP addresses used should be labeled next to the corresponding device.

Then, create a report outlining the abilities of the network topology in reference to securing network devices and other information assets used by Company X. Make sure to address the following within the report:

  1. A detailed explanation of the topology design addressing the “why” and “how” of the topology defenses solution and design, specifically threat models, motivations (such as insider threat), and ideologies
  2. Network defense solution list (i.e., software/hardware used to protect information assets)
  3. Encryption policies used by the network and end-users
  4. Disaster plan recovery, including restoration plans

When completing the report for this assignment, refer to the “Report Template.” 

APA style is not required, but solid academic writing is expected.

This assignment uses a basic scoring guide, provided by your instructor. Please review the scoring guide prior to beginning the assignment to become familiar with the expectations for successful completion.

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Cisco Packet Tracer application to create a network diagram

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Network infrastructure/security

The management team is comfortable that the service level agreements can be met with respect to things they can control, namely employee performance and knowledge base quality. They are, however, concerned that because the majority of the help desk support infrastructure is based on Web-based self-service, an outage on the Web site could lead to missed service levels.

Describe what can be done to ensure the security and availability of the Web-based infrastructure and what the company can do to keep the help desk running in the event of a Web site outage (business continuity). The discussion about security should focus on 2 levels:

  • Network infrastructure/security
  • Application infrastructure/security

Finally, discuss cultural implications for IT support to encourage effective interactions with those customers who differ in beliefs, behaviors, values, or views. Make sure to cover personal cultural rules/biases and their impact to societies.

Add the discussion about security and business continuity to the section titled Performance Management.

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals.
  • Network infrastructure/security

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar.

Length: Minimum of 400 words Students will be required to create 1 new thread, and provide substantive comments on at least 3 threads created by other students. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.Question:The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliverycapitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Protections from the security software must continue when the device is taken off the network

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Designing a solution for Small Office Home Office (SOHO) network Mark

Networking Assignment
Designing a solution for Small Office Home Office (SOHO) network Mark & Horton tax accountants have opened a new office in Melbourne, Australia. They are committed to providing taxation and financial planning services to both individuals and small business owners. Currently, they have four (4) full-time tax accountants, two (2) junior accountants and two (2) receptionists appointed to facilitate the clients. Additionally, two (2) financial advisors work two days a week. You have been hired as a network technician to help in the design and deployment of this network.
Tax Accountants: 04
Junior Accountants: 02
Receptionist: 02
Financial Advisors: 02
Total Host= 10 host
Objectives:
• Set up a small office network, identify devices, network components and media type used
• Assigning IP addresses to devices connected in a LAN environment
• Identify issues and suggest solutions related to network or internet
Scenario – Designing a solution for Shine Dental Clinic (Network Solution):
Tom and Steph has recently opened a new clinic, “Shine Dental”, in Sydney, Australia. They are committed to providing quality dental services to people of all age group.
They have four full-time surgeons using surgery rooms, four assistants working with the surgeons while performing surgery, three receptionists/admin staff, completing daily paperwork, admin, client consulting and handling the front desk.
The area for the new office is 250 sqm approximately. For detailed dimensions and floorplan, refer to Figure 1.
The clinic required eight workstations, one server and a printer and needed to be installed at the following locations:
• One reception desk with space to place two computers (Workstation 5 and 6),
• One small consulting room (Workstation 7)
• One server room with extra space to place an additional computer (Server, Workstation 8)
• Four surgery rooms (Workstation 1 – 4)
The entire floor divided with each other by drywall sheets. The office is fully furnished (except computers, networking devices and cabling)
The owner of “Shine Dental” has purchased eight (8) desktop computers of the same type. Table 1 shows the sample specification.
Desktops x 8 Specifications
Acer Aspire TC-series Desktop Processor Brand/Type AMD A10-7800
RAM 16GB
HDD 1TB
Wired Networking Gigabit Ethernet
Connectivity 1xHDMI,
1xVGA,
3xUSB3.0,
4xUSB 2.0,
RJ45
Operating System Windows 10 Pro
Table 1
The owner of “Shine Dental” has also purchased one (1) server, eight (8) monitors to be connected with desktops and four (4) overhead screens, with the specifications provided in Table 2, Table 3 and Table 4 simultaneously for your reference.
Server x 1 Specifications
Acer TS-series Server
Processor Brand/Type Intel Processor
RAM 64 GB
HDD 2TB
Wired Networking Gigabit Ethernet
Connectivity 1xHDMI, 1xVGA, 3xUSB3.0, 4xUSB 2.0, RJ45
Operating System Windows 2012 R2
Table 2

Monitors x 8 Specifications
BenQ BL2400 series
Brand BenQ
Display LED-TN
Dimension 579 x 213 x 502 mm
Display resolution 1920 x 1080
Connectivity HDMI, D-sub
Display size 24”
Table 3
Overhead screens x 4 Specifications
Sony 3200 series
Brand Sony
Display LED
Dimension 731.8 x 87.3 x 435 mm
Display resolution 1280 x 720, 1366 x 768
Connectivity DVI, USB, Ethernet, Antenna in
Display size 32”
Table 4

Figure 1
In addition to the computers, he has also wanted to purchase one LaserJet multifunction printer for print/copy/scan/fax. The printer should have USB 2.0, Gigabit LAN, Wi-Fi(n) and other prominent printing and scanning features.
All computers/server has got a dedicated screen. In addition to that, there are four additional overhead screens attached in the four surgery rooms for patients to view local TV channels.
Those four screens are also attached to the main computers in the surgery room.
Doctors should display x-rays on the overhead screen for patients, but simply changing the input on the TV, your job is to connect the overhead screen/TV to the computer as an extended display or mirror and the Antenna.
You are also required to set up a backup for all the computers/server. All the backups should run each night and should get stored at one physical location within the premises, and a copy of the local backup has to be held on to the cloud utilizing one of the cloud services.
As a consultant, you can choose any cloud service of your choice but must justify your recommendation.
Assume that you have been hired as a network technician to help design and deploy this network.
Perform the following tasks to support this.
Task 1
To inter-connect the desktop computers and connect the overhead screens/TV with the computers and TV antenna, you have decided to use a wired network. What is the primary transmission media, connectors, adaptors you would use for this? For your recommendation of media, consider and explain the following criteria:
• Speed
• Length
• Ease of installation
• Compatibility with intermediary devices
Your answer must also include transmission media, connectors, adaptors, and other necessary devices to help you implement this successfully.
Task 2
Waiting customers should be able to access the “Shine Dental” Wi-Fi network for internet usage. What devices will you need to extend your wired network to support wireless devices with maximum speed and make sure that customers using “Shine Dental” internet do not cause interruption to the clinic’s network? Justify your answer.
Task 3
In addition to the workstations and server, the multifunctional printer needs to be connected to the network. Would you connect it via a wired media or wireless media? Justify your answer. Recommend a make and model of the multifunctional printer as per the customer requirement.
Task 4
Complete Table 5 to assign suitable static IP version 4 addresses to the devices (with subnet mask) on the network. You have decided to go with the class C private IP address range 192.168.30.0/24 (except where it is indicated otherwise).
You need to complete 3rd column of Table 5.
Device IP address IP address with subnet mask
Workstation_1 (Surgery1) 1st usable IP address 192.168.30._ ? _ /24
255.255.255._ ? _
Workstation_2 (Surgery2) 2nd usable IP address 192.168.30._ ? _ /24
255.255.255._ ? _
Workstation 3 (Surgery3) 4th usable IP address 192.168.30. ? _ /24
255.255.255._ ? _
Workstation 4 (Surgery4) 5th usable IP address 192.168.30. ? _ /24
255.255.255._ ? _
Workstation 5 (Fdesk1) 7th usable IP address 192.168.30. ? _ /24
255.255.255._ ? _
Workstation 6 (Fdesk2) 8th usable IP address 192.168.30. ? _ /24
255.255.255._ ? _
Workstation 7 (Consulting) 10th usable IP address 192.168.30. ? _ /24
255.255.255._ ? _
Workstation 8 (BDesk) 11th usable IP address 192.168.30. ? _ /24
255.255.255._ ? _
Server_9 (Server) 14th usable IP address 192.168.30._ ? _ /24
255.255.255._ ? _
Printer 192.168.200.100/24 192.168.200.100 /24
255.255.255._ ? _
Table 5

Task 5
Implement the network topology (Figure 2 is a partial design to assist you) using a packet tracer. For example, it would help if you considered the following:
• All devices (Server, workstations and printer etc.) mentioned in table 5 are labelled and have their IP addresses and subnet mask configured (as per your answer in Task 4)
• Select the appropriate media in packet tracer, label the media type and use the switch 2960 with 24 ports and two-gigabit uplink ports to interconnect the Desktops
• Connect workstation_5 and workstation_6 to one of the “5 port switch” of your choice and connect the switch to the 24-port switch
• A standard wireless access point is added and configured with security. This wireless access point should be then connected to the 24-port switch via suitable wired media.
• Printer is configured and connected to the previously added “5 port switch.”
Figure 2
Task 6
Test the network using a suitable network utility and verify that workstation_7 can communicate with other workstations and servers. Provide screenshots to confirm that you have used the appropriate tools for this purpose. Use command-line utility only to test the connectivity
Task 7
Configure the most secure protocol (available in packet tracer) to authenticate three newly hired part-time employees’ “Jason”, “John”, and “Steph”, assign 21st, 36th and 43rd usable IP addresses, respectively.
Users should be able to differentiate the network before connecting to the office network easily. For example, provide screenshots and justify.
Label Jason’s laptop as “jason_laptop”, John’s laptop as “john_laptop”, and Steph’s laptop as “steph_laptop” and configure in packet tracer.
Task 8
Assume that Workstation_5 (consulting room) is a Linux box. You have run standard command-line tools and receive the following output:

Figure 3
Use Figure 3 above to answer the following questions:

  1. What is the IP version 4 address of this machine?
  2. What is the IP version 6 address of this machine?
  3. What is the MAC address of this machine?
  4. What is the default gateway?
  5. Ping command gives the following error below, and the site cannot be opened. Give possible explanations, and provide a solution.
    Task 9
    Assume that the network has been physically set up, as you have demonstrated in your packet tracer file (created in task 8).
    Users have complained that none of them can print. Using the packet tracer file, troubleshoot this issue and identify what might be causing this.
    Assume that the printer is mechanically functional and has no physical defect.
    Identify and discuss. The answer should be based on Task 4.
    Task 10
    “Shine Dental” needs to store an image of all workstations and server in one location.
    Backups need to run each night, two copies of the backups need to be maintained at Shine Dental premises, and another copy will be stored on the cloud.
    You have decided to install NAS (Network Attached Storage) as a solution. How many hard drives would you install in NAS, and what raid Level would you use and why?
    Provide a cost-effective solution for the business. Performance is not essential.
    What media would you use to connect NAS to the network, and how would you connect it.
    For demonstration purposes, you can include a server in packet tracer, label it as NAS, and assign it 56th usable IP address to NAS. You must provide a relevant screenshot as an example
    • GET SOLUTION FOR THIS ASSIGNMENT

      CLICK HERE TO MAKE YOUR ORDER

      TO BE RE-WRITTEN FROM THE SCRATCH

      NO PLAGIARISM

      • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
      • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
      • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
      • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
      • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
      • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. Designing a solution for Small Office Home Office (SOHO) network Mark
      • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

      Get Professionally Written Papers From The Writing Experts 

      Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
       
Categories
Writers Solution

Network Reconfiguration: Update the network using the Network Layout Table in the Project Three Network Reconfiguration Specifications spreadsheet.

You will use the  Sandbox lab to complete this project. Note: You must complete this project in one sitting, as the lab environment is non-persistent. Be aware of your time as you complete the lab. You can extend your lab when the time warning appears. 

 You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned. 

 I. Network Reconfiguration: Update the network using the Network Layout Table in the Project Three Network Reconfiguration Specifications spreadsheet. Include screenshots of the following: 

A. Network diagram 

B. Port assignment and VLAN assignment for each switch.

 Traffic Flow Configuration: Shape the traffic flow using the Firewall Traffic Shaping Goals in the Project 

Three Network Reconfiguration Specifications spreadsheet. Include screenshot(s) of the following:

 A. Configure a firewall rule to allow port 80 HTTP from the WAN to the web server. 

B. Configure a firewall rule to allow port 443 HTTPS from the WAN to the web server.

C. Configure a firewall rule to block port 80 HTTP from the WAN to any other system.  

 D. Configure a firewall rule to block port 443 HTTPS from the WAN to any other system. 

 III. Organizational Security Strategy 

A. Explain how the security posture of the organization has been improved by the restructuring. 

B. Describe how the tenets of the CIA triad (confidentiality, integrity, and availability) are affected by the restructuring. 

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. Network Reconfiguration: Update the network using the Network Layout Table in the Project Three Network Reconfiguration Specifications spreadsheet.
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

perceptron learning method and design an artificial neural network

The objective of this project is to use the perceptron learning method and design an artificial neural network (ANN) to train a simple system (single layer perceptron) for the recognition of handwritten digits (0, 1, …, 9).

Design a fully connected network structure of 784 input nodes and 10 output nodes.The input to your single layer network architecture will be a set of binary pixels representing a 28×28 image of handwritten digits. The output should indicate which of the digits (0,….,9) is in the input image.

Use the MNIST database of handwritten digits available on Blackboard-Homepage-Handwritten Digits Dataset.

Select a subset of the MNIST database consisting around 500 images of handwritten digits (0,…,9) for training the system, and use another 100 images for testing the system. Create binary or bipolar images of handwritten digits from gray scale images available in MNIST by simple thresholding (indicate the threshold value you used).

Plot a learning curve that illustrates the mean square error versus iterations.

(One iteration: apply all the training inputs once to the network and compute the mean square error).

Plot the percentage error in testing your handwritten digit recognition system as a bar chart.

(Mean error occurred while testing each digit with the test data).

Task #1: Repeat this experiment for different learning rate parameters (at least 3 experiments. Start

with a large value and gradually decrease to a small value).

Task #2: Repeat Task #1 with a large database. The first 10000 images for training (image indexes

from 0-9999) and test with another 1000 images (image indexes from 20001-21000).

Task #3: Repeat Task #2 with multilevel data (without thresholding the input data, normalize the

input data, use sigmoid function for output thresholding). What can you note comparing with part 2?

Task #4: Compare your results with the SVM results (what you have got from the last project).

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. design an artificial neural network
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays