Need Help With CIS 534 Advanced Networking Design Term Paper

Need help writing term paper.  Posted previously with different due date.  Need it early than Monday 3/16/2015.  The term paper must have Visio diagrams included.  Assignment posted below. 

 

Term Paper Project: Designing a Secure Network
Due Week 10 and worth 190 points

This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of [email protected] The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

  • Overall network diagram: One (1) page
  • Datapath diagrams: Three (3) pages (one for each diagram)
  • Write-up: six to ten (6-10) pages

Part 1

  • Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:
    • Follow the access, core, distribution layer model.
    • Include at a minimum:
      • Authentication server (i.e. Microsoft Active Directory)
      • Routers
      • Switches (and / or hubs)
      • Local users
      • Remote users
      • Workstations
      • Files share (i.e. CIFS)
      • Mail server
      • Web servers (both internal and external)
      • Firewalls
      • Internet cloud
      • Web proxy
      • Email proxy
      • FTP server (for internal-to-external transport)

 

  • Explain each network device’s function and your specific configuration of each networking device.
  • Design and label the bandwidth availability or capacity for each wired connection.

Part 2

  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user sends email to a Yahoo recipient. Local (corporate) user having email address [email protected]sends an email to [email protected]
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
  • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
  • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
  • Show user authentication when necessary.
  • Explain how your overall design protects the organization from both inside and outside attacks. Give examples. 
  • Explain how your layered design compensates for possible device failures or breaches in network security.
  • Determine whether any possible bottlenecks exist in your design.
  • Explain how to make the file transfer process more secure.

Part 3

  • Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
  • Identify network security tools and discuss techniques for network protection
  • Describe the foundational concepts of VPNs.
  • Design a secure network to address a business problem.
  • Use technology and information resources to research issues in network security design.
  • Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.

 

 

 

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Essays on ethical issues in Information System

Assignment 1: Ethical Issues in Information Systems

Due Week 6 and worth 150 points

Choose one (1) ethics issue from cybercrime, cyberfraud, identity theft, intellectual property theft. 

You may also use the Internet to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you.

Write a two to three (2-3) page research paper in which you:

  1. Summarize the issue that you have chosen.
  2. Express your own opinion of, or position on, the issue that you have chosen.
  3. Identify two to three (2-3) human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
  4. Identify at least three (3) problems related to management information systems that may arise from the issue that you have chosen. Next, propose at least one (1) solution to address each problem in question. Provide a rationale to support your response.
  5. Use at least three (3) quality references. Note: Wikipedia and other Websites do not quality as academic resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe how and why information systems are used today.
  • Evaluate the ethical concerns that information systems raise in society, and the impact of information systems on crime, terrorism, or war.
  • Explain how to secure information systems resources that focus on both human and technological safeguards.
  • Identify how to mitigate risks as well as plan for and recover from disasters.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about management information systems using proper writing mechanics.
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Econ PB 2

Problem 2:

 

Greener Grass Company (GGC) competes with its main rival, Better Lawns and Gardens (BLG), in the supply and installation of in-ground lawn watering systems in the wealthy western suburbs of a major east-coast city. Last year, GGC’s price for the typical lawn system was $1,900 compared with BLG’s price of $2,100. GGC installed 9,960 systems, or about 60% of total sales and BLG installed the rest. (No doubt many additional systems were installed by do-it-yourself homeowners because the parts are readily available at hardware stores.)

 

GGC has substantial excess capacity–it could easily install 25,000 systems annually, as it has all the necessary equipment and can easily hire and train installers. Accordingly, GGC is considering expansion into the eastern suburbs, where the homeowners are less wealthy. In past years, both GGC and BLG have installed several hundred systems in the eastern suburbs but generally their sales efforts are met with the response that the systems are too expensive. GGC has hired you to recommend a pricing strategy for both the western and eastern suburb markets for this coming season. You have estimated two distinct demand functions, as follows:

 

Qw =2100 – 6.25Pgw + 3Pbw + 2100Ag – 1500Ab + 0.2Yw

 

for the western market and

 

Qe = 36620 – 25Pge + 7Pbe + 1180Ag – 950Ab + 0.085Ye

 

for the eastern market, where Q refers to the number of units sold; P refers to price level; A refers to advertising budgets of the firms (in millions); Y refers to average disposable income levels of the potential customers; the subscripts w and e refer to the western and eastern markets, respectively; and the subscripts g and b refer to GGC and BLG, respectively. GGC expects to spend $1.5 million (use Ag = 1.5) on advertising this coming year and expects BLG to spend $1.2 million (use Ab = 1.2) on advertising. The average household disposable income is $60,000 in the western suburbs and $30,000 in the eastern suburbs. GGC does not expect BLG to change its price from last year because it has already distributed its glossy brochures (with the $2,100 price stated) in both suburbs, and its TV commercial has already been produced. GGC’s cost structure has been estimated as TVC = 750Q + 0.005Q2, where Q represents single lawn watering systems.

 

Show all of your calculations and processes. Describe your answer for each item below in complete sentences, whenever it is necessary.

 

Derive the demand curves for GGC’s product in each market.

Derive GGC’s marginal revenue (MR) and marginal cost (MC) curves in each market. Show graphically GGC’s demand, MR, and MC curves for each market.

Derive algebraically the quantities that should be produced and sold, and the prices that should be charged, in each market.

Calculate the price elasticities of demand in each market and discuss these in relation to the prices to be charged in each market.

Add a short note to GGC management outlining any reservations and qualifications you may have concerning your price recommendations.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Environmental Science homework

 

 

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Biotic and Abiotic Structure

In this assignment, you will investigate the biotic and abiotic structure and function of an ecosystem.

Choose one of the following ecosystems:

  • Tropical rainforest
  • Grassland
  • Coral Reef
  • Estuary
  • Desert

You will write a two to three page APA-style research paper about your choice of ecosystem including:

  • Where might this type of ecosystem be located? Give one specific example.
  • Describe the structure of the ecosystem: List both the abiotic components and biotic components
  • Describe the function of the ecosystem: How do the abiotic and biotic components interact in biogeochemical cycles? Describe both the carbon and nitrogen cycles
  • Describe disturbance and recovery: Describe one natural and one human caused disturbance to the ecosystem. Explain the damage to the ecosystem, including how the abiotic and biotic characteristics of the ecosystem changed.
  • Explain how ecosystems recover naturally based on resilience mechanisms and the theory of secondary succession.

 

2. In order to complete this discussion board assignment, review the occurrences at Easter Island and use this situation as a case study of poor stewardship that resulted in lack of sustainability. A discussion of Easter Island may be found in Unit 5 section of the Interactive Learning Materials area of the classroom.

Define stewardship and define sustainability. Then, select either the Amazon Rainforest (deforestation is the issue) or Bridger Teton National Forest located in Western Wyoming (possible oil drilling).

Discuss stewardship and sustainable resource use. In your discussion, describe the issues or potential problems. What are the environmental implications of deforestation if you choose the Amazon for your discussion? What are the ramifications of drilling for oil in Bridger Teton National Forest if this is your topic selection?

Can either area be conserved through wise use or should segments be preserved without any use?

 

2-3 pages

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Article and Questions

As attached

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Part 1 Consequence of Immoral Behavior

 

 

 

 

You are a member of a police review board investigating a case for internal affairs. As a group, select a case involving police misconduct or judicial misconduct/malfeasance to research. Use the library, news reports, and the Internet to locate information on the case your group has selected.

Individual portion: Each group member should research at least one of the following portions of this case:

  • Details of the case and evaluation of ethical dilemmas involved, including all key details
  • Details and evaluation of the code of conduct related to the case, including the ethical responsibility of the officer (including possible differences on how an officer acts off or on duty)
  • Details and evaluation of societal opinions of the case, including potential implications for the community or political figures

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Week 4 Assignment

Now that you have had your Project company/idea approved by your professor, it is time to write the second part of the project, which builds on Project Part 1. Using the same company your chose for Project Part I (the company that is proposing an expansion opportunity overseas), conduct research on the proposed “overseas” country.

Specifically focus on the culture and cultural exchange of the country.

For the culture, review the web site http://geert-hofstede.com/ or similar resources to compare the cultural differences between the US and the company in your project. Identify the cultural differences and consider the cultural exchange.

In addition, research and choose the best distributions method: Product/Market, Pricing, and Positioning.

To Review:  Write a 1000 word, APA style paper entitled “Strategic Audit”

In your paper Identify the following:

  • Cultural differences
  • Cultural exchange
  • Distribution Methods
  • Product/Market
  • Pricing
  • Positioning

In your paper include a title sheet and 2-3 references.  Only one reference may be found on the internet.  The other references must be found in the Grantham University online library.  Only the body of the paper will count toward the word requirement.  Please see rubric below.

Submit your work in the “W4 Dropbox for Capstone or Internship” found in the W4 Folder

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Business Policy and Strategy – CSU (Case Studies – Units I – VII)

 

 
Unit I Case Study
Read the Cohesion Case on pages 27-37 in the course textbook. Create a five- to seven-page PowerPoint presentation in which you a) briefly describe your view of McDonald’s strategic position, and b) answer Step 4 of the Assurance of Learning exercise on page 37.


Unit II Case Study


Complete the Assurance of Learning Exercise 3D on page 87 of the course textbook. In addition to completing Steps 1, 2, and 3, summarize your findings in a two-page APA formatted paper and discuss your views of McDonald’s strategic

prospects based upon your analysis of the external assessment and consideration of the opportunities to grow, as well as threats from competitors and the macro environment.

Unit III Case Study

Complete the Assurance of Learning Exercises 6A and 6B on page 205 of the textbook. Use the completed SWOT and SPACE matrices to draw conclusions regarding both the long term and short term strategies you would recommend in light of your findings. Summarize in a two-page APA formatted paper. NOTE: It is not necessary to consult other students

to complete these exercises in the textbook.

Unit IV Case Study

Complete the four elements of the McDonald’s organization chart exercise in the Assurance of Learning Exercise 7A on page 248 of the textbook. Once the organizational chart recommendation is completed, create at least one high-level objective for each functional group in the organizational chart. State your rationale for each and briefly state how each

would be measured. Compile your work into a minimum two-page APA formatted paper.

Unit V Case Study

Read the Assurance of Learning Exercise 8A and 8B on page 282 of the textbook. Prepare a product positioning map, and perform the EPS/EBIT calculations given in 8B. Discuss, in a two-page APA formatted paper, how the product positioning is aligned with McDonald’s corporate strategy. Identify potential gaps in the product line or weaknesses in

positioning. Describe the relevance of the EPS/EBIT chart and why it is significant with respect to strategy implementation.


Unit VI Case Study


Follow the instructions for the Assurance of Learning Exercise 9A on page 306 of the textbook. Create a minimum two-page APA formatted paper evaluating McDonald’s strategy. Choose at least one of McDonald’s competitors and discuss its position relative to McDonald’s. Comment on McDonald’s prospects of success against this competitor.

Unit VII Case Study

Complete the Assurance of Learning Exercise 10A on page 326 of the textbook. You will be asked to analyze and to compare and contrast the code of ethics of both Starbuck’s and McDonald’s. Summarize your analysis and findings in a two-page APA formatted paper

 

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"