Prior to beginning work on this interactive assignment, read the The Differences

Prior to beginning work on this interactive assignment, read the The Differences

Prior to beginning work on this interactive assignment, read the The Differences Between Routers, Switches and HubsLinks to an external site. and the Topology- Definition and Types of TopologyLinks to an external site. and the Topology- Definition and Types of TopologyLinks to an external site. online articles, and review any relevant
information in this week’s lecture. For this interactive assignment you will take on the role of an IT employee for a small family-owned business consisting of an owner, an office manager, a secretary, and four agents. Please review the scenario before drafting your post.
Scenario
The company has asked you to implement a network to improve how they conduct business within the organization. The company occupies a two-story building in an office park. Their volume of business had been stable for the past three years, but has recently begun to increase. To handle the increased business volume, two new agents will be hired, along with a team of web designers and developers to create a web presence. Everyone in the company has a computer, but the business manager has the only printer. These computers are not connected by any form of network. When agents need to print a document, they must first copy the file to a USB stick and then carry it to the business manager’s computer, where they are finally able to print it. Similarly, when staff members want to share data, the only means available is to copy the data to a USB stick and insert it into another computer.
Recently, problems have arisen with the current setup. The business manager is spending too much time printing other people’s documents, and it is frequently unclear which copy of a given document is the latest version.
After carefully reviewing the scenario, research a minimum of two additional credible sources that address the topics. (Access the MISM Credible Resource Guide for assistance with finding appropriate credible professional resources.)
Design a network for this company to support file, print, and web services. In a separate attachment, create a high-level network diagram that captures your solution. The diagram needs to show at minimum the cloud (Internet Service Provider), router, switch(es), printer(s), server(s), end-user computers, and how they all connect to one another.
Explain the key differences among hubs, switches, and routers.
Explain how and why the hubs, switches and routers you’ve included in your diagram will be utilized on your network.
Apply standard principles of design to recommend the network topology that would be most suitable for the business needs outlined, and defend your choice with a comparison explanation among the different topology types.
Evaluate the networking needs of the company and suggest either a peer-to-peer or server-based network, and provide the rational for your choice.
Finally, suggest at least two ways to segment this small office network, and evaluate the associated benefits and limitations. Apply telecommunication and network technical knowledge to support your choices.
A Topology of the network defines the manner in which the network devices are arranged and connected to each other in a network. It defines the shape of communication network. There are five common types of network Topologies.
Bus Topology
Ring Topology
Star Topology
Tree Topology
Mesh Topology
Bus Topology/ Linear Topology
In a bus topology a single main cable connects each node (computers) which allows single line of computers accessing it from end-to-end. each node is connected to two others except those in end. The network operating system keeps track of a unique electronic address for each node in the network, and manages the flow of data based on this addressing scheme. This topology is often found in a client / server systems, where one of the machines on the network is designated as file server.
In linear bus topology, all computers are connected by a single length of cabling with a terminator at each end. the bus topology is the simplest and most widely used network design.
https://www.lifewire.com/home-networking-4781492
https://networkandprotocols.blogspot.com/2011/10/topology-definition-and-types-of.html
Week Two Lecture
This week covers the Open System Interconnection (OSI) model. Many things in the networking world will become clearer for you once you understand the OSI model. This is because the OSI is so large that it touches on many interrelated topics. There are five layers in the OSI model that will be discussed in this lecture. In ordinal order they are: physical, data, network, transport, and application.
The first layer is the physical layer. This is where you find simple hubs, because all they do is connect devices for communication. The second layer in the OSI model is the data layer, which handles hardware addresses like the MAC address. Switches operate at this layer because they can process information based on MAC address. Figure 1 shows that computer X wants to send a packet to computer Y. The packet is sent to the local switch (Switch A), which then decides how to forward the information. This is based on the destination address which sends it to switch B. Then switch B needs to make a forwarding decision so it sends the packet to switch F, which is the local switch to computer Y; switch F then delivers the packet to computer Y.
A data packet contains the sender’s message along with the address of the sending computer, as well as the address of the receiving computer. Just like the paper envelop we use to mail our letters, it has a destination address and a return address. As a result of this methodology, networks today are referred to as packet-switched networks.
AU-ISM640-W2WLImage1
Figure 1. Physical and data links. Reprinted from Data communications and computer networks, by C. M. White, 2015, Boston, MA: Cengage Learning
One problem in connecting to different types of switches and networks is that they often use incompatible data link technologies. They organize packets in different ways, and have incompatible addressing systems. To handle these issues, the networking layer was created to address the incompatibilities of disparate networking technologies. Note that the networking layer is also interchangeable with the internet layer, which in this case is an abbreviated version of inter-networking and refers to communications between disparate network topologies. The networking (internet) layer is the third layer of the OSI model, and it is this layer that the universal identifier the Internet Protocol (IP) address calls home. The networking layer is concerned with universal addressing, packet formatting, and moving the packets across an internet.
The fourth level of the OSI model is the transport layer. The transport layer, which is above the networking layer, is only concerned with what happens on the source host and destination host. On the source host, the transport layer takes application messages and divides them into small units called segments. It passes each segment down to the internet layer, which places each segment into a single packet and sends the packet on its way. On the destination host, the internet layer program removes the segment and passes the segment up to the transport layer program. The transport layer program reassembles the segments into the original application message and passes the message to the appropriate application program.
This slide shows the relationship between the networking layer and the transport layer.
AU-ISM640-W2WLImage2
Figure 2. Transport and Internet layers. Reprinted from Data communications and computer networks, by C. M. White, 2015, Boston, MA: Cengage Learning
The transport layer has a number of other important functions. It typically provides error correction, which means that packets that are damaged or lost in transmission are re-transmitted. The transport layer also causes the source host to reduce its transmission rate if there is congestion. Overall, you can think of it like this: the internet layer is a best-effort service that tries to get packets through but may fail in the process. It may even deliver packets out of sequence. So what steps in to save the day? The transport layer usually is the fix-up layer that supplies the functionality that the internet layer lacks.
The final layer of the OSI model this lecture will address is the application layer. This layer controls communication between the two application programs that are communicating. For example, when browsers talk to webservers, this requires application layer standards likes HTTP or HTTPS to specify the communication. There are many applications and many of them have their own standards. As a result of this large number of applications, there are more application layer standards than there are standards at other layers, for example, email uses standards like SMTP, which stands for simple mail transfer protocol. To transfer files we use the FTP standard which stands for file transfer protocol. So again, many applications, and many protocols.
in summary, these are the five layers discussed in this lecture. Figure 3 shows how the five layers fit together. Each layer provides services to the layer above it. The bottom two layers provide transmission through single networks. The internet and transport layer provide host-to-host transmission through an internet to multiple networks consisting of diverse topologies. Finally, the application layer provides application to application communication and is the visual manifestation and results of the data communication process.
AU-ISM640-W2WLImage3
Figure 3. OSI Model. Reprinted from Data communications and computer networks, by C. M. White, 2015, Boston, MA: Cengage Learning
Reference
White, C. (2015). Data communications and computer networks: A business user’s approach (8th ed.). Boston, MA: Cengage Learning.

You have a small retail store and decide to create a database to track sales. Yo

You have a small retail store and decide to create a database to track sales. Yo

You have a small retail store and decide to create a database to track sales. You have information about recent sales that you want to use for testing the database. In this Assignment, you will continue to use the data in the Sales Data document from previous weeks to create a database.
To complete this assignment:
1. Read Chapter 8 of the eBook (I’ve uploaded all necessary materials)
2. Install your choice of software for creating a database:
A. Option 1: MySQL open-source software and supporting documentation.
I. Oracle. (n.d.). MySQL Workbench community downloadsLinks to an external site. [Software]. https://dev.mysql.com/downloads/workbench/
Note: Select your operating system (Microsoft Windows or II. MacOS) from the drop-down menu.
III. MySQL. (n.d.). MySQL documentationLinks to an external site.. https://dev.mysql.com/doc/
IV. MySQL. (n.d.). Chapter 11: Data typesLinks to an external site.. https://dev.mysql.com/doc/refman/8.0/en/data-types.html
V. MySQL. (n.d.). Chapter 13: SQL statementsLinks to an external site.. https://dev.mysql.com/doc/refman/8.0/en/sql-statements.html
B. Option 2: MS SQL Express software and supporting documentation.
I. Microsoft. (n.d.). Try SQL Server on-premises or in the cloudLinks to an external site.. https://www.microsoft.com/en-us/sql-server/sql-server-downloads
Note: Scroll for the free MS SQL Express download.
II. Microsoft Learn. (2022, November 18). Data typesLinks to an external site. (Transact-SQL). https://learn.microsoft.com/en-us/sql/t-sql/data-types/data-types-transact-sql?view=sql-server-ver16
III. Microsoft Learn. (2022, November 18). Transact-SQL statementsLinks to an external site.. https://learn.microsoft.com/en-us/sql/t-sql/statements/statements?view=sql-server-ver16
IV. Microsoft Learn. (2023, March 3). CREATE TABLELinks to an external site. (Transact-SQL). https://learn.microsoft.com/en-us/sql/t-sql/statements/create-table-transact-sql?view=sql-server-ver16
3. Review the “DDL and DML Commands” PDF document in the Week 4 Learning Resources. This resource shows the Data Definition Language (DDL) commands used by MS SQL and MySQL to create databases and tables and the Data Manipulation Language (DML) commands to insert data into tables that you create. Once you install the database management system that you select, copy these commands into Microsoft SQL Studio Manager for MS SQL and WorkBench for MySQL.
4. To help you can also search for tutorial videos to review the creation of the databases, tables, and insert data into the tables.
5. Create the tables for the data provided in the Sales Data document, located in the Learning Resources. The tables should include the primary and foreign keys. Provide the SQL statements.
6. Insert the data into the tables. Provide the SQL statements.
7. Show the contents of each table. Provide the SQL statements.
8. Submit a document of 2–4 pages in Microsoft Word and APA format in which you do the following:
9. Complete each task in Steps 1–3 and provide the required statements and documentation (e.g., screenshots).
Can you make it 2.5 pages instead, out of courtesy for the long-standing relationship? Minimum of 5 resources in APA format.

First, review the critical elements listed in Section III of the Final Project G

First, review the critical elements listed in Section III of the Final Project G

First, review the critical elements listed in Section III of the Final Project Guidelines and Rubric and reflect on your work in SIMnet.
In your journal, reflect on your experience in the module assignments to address the following:
Describe how you plan to account for the organizational roles and experience level of your audience as you prepare your presentation.
Describe how the educational level of the viewers will impact your presentation.

Using the APT32 source that I have attached, write 3 pages to complete the follo

Using the APT32 source that I have attached, write 3 pages to complete the follo

Using the APT32 source that I have attached, write 3 pages to complete the following tasks:
Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.
Consider the hardware and software solutions deployed today in the context of defense-in-depth.
Elaborate on why these devices are not successful against the APTs.

The purpose of this assignment is to give you the opportunity to develop and pra

The purpose of this assignment is to give you the opportunity to develop and pra

The purpose of this assignment is to give you the opportunity to develop and practice the
type of 21st century skills that are critically important for IT professionals in the workplace.
These skills include critical thinking, problem solving, communication, teamwork, and
lifelong learning.
Comments from Customer
Discipline: IT in Global/Local Cultures

This assignment is to demonstrate your capability to write Python Program by cal

This assignment is to demonstrate your capability to write Python Program by cal

This assignment is to demonstrate your capability to write Python Program by calculating
Grading for the class.
Hi, Class,
This is our Term Project – Signature Assignment
Data file is in Class Content Area
This assignment is to ask you to write a Python program conduct Grading for the class -1.
Input Read the input score data from an external file given by Dr. Liu
This data file is arranged as following format (colon as delimeter)
Name. : ID : (Test1-Score) : (Test2- Score) : (HW- Score) : (Project-Score)
The percentage for semester is as following:
Test1 – 20%
Test2 – 20%
HW – 40%
Project – 20%
Processing: Computation
The total semester score = 20% * Test1 + 20% * Test2 + 40% * HW + 20% * Project
Once the total semester score is computed, use this number to determine the
Semester Grade by the following Rubric:
Total_Score > = 90. The Grade will be A
90 > Total_Score > = 80. The Grade will be B
80> Total_Score > = 70. The Grade will be C
70> Total_Score > = 60. The Grade will be D
60> Total_Score The Grade will be F
Output:
After all these steps, your program will print out the output into an External File – the Format will be like the following:
For example:
Name. ID. (Test1) (Test2) (HW) (Project) TotalScore Grade
Peter Pan. 01 80 80 80 80 80 B
Then repeat for another student until all data in the given data file is done.
Comments from Customer
Discipline: Programming of All

Good programmers are able to analyze a task and describe it succinctly, accurate

Good programmers are able to analyze a task and describe it succinctly, accurate

Good programmers are able to analyze a task and describe it succinctly, accurately, and unambiguously. Even tasks that you perform without much thought are surprisingly complex when you stop and consider all of their components. For example, using the self-checkout lane at a grocery store—a simple task completed by thousands of people every day—requires you to: (1) Select items in your basket; (2) scan the UPC codes; (3) convey the item to the bagging area; (4) bag your groceries; and (5) submit payment for your purchases.
A program is an ordered list of instructions that prepares the computer (or, in the case of the grocery example, the shopper and new user of the self-checkout lane) to complete a task. Good instructions are mindful of the target audience, and the less you assume the reader already knows about a process, the more useful the instructions are to a wider audience.
If you have not used the self-checkout lane at a grocery store before, you act as your own cashier. You scan and weigh your items, bag them, and pay for them, while being guided by a digitized voice prompting you to complete each step.
Consider the pseudo code in the Week 1 Discussion Code (txt) that describes the self-checkout procedure. While it is comprehensive, it is also organized. It groups instructions related to the same task into a block of text, and then adds comments and explanations using specific conventions:
• Actions defined by a group of steps have descriptive names, including SelectItem, ScanBarCode, and PayingWithCredit.
• Blocks of instruction are contained within braces: { and }.
• // means that the rest of the line is a comment Intended for people, not an instruction to the computer.
• When /* is used at the beginning of a line, it signifies that the entire line is a comment and will be ignored by the computer.
• The symbols /** and */ start and end comments that extend over multiple lines. These are used to describe processes within your program.
The code in Week 1 Discussion Code (txt) includes line numbers along the left side of the page. These are not part of the program, but they make it easy to refer to specific commands and instructions within the program.
To prepare for this Discussion:
Think about one task you perform so often; it is nearly automatic. Break that task down into its component parts, and then write a “program” that resembles the grocery self-checkout code provided to describe your task.
Submit your task program which includes:
• At least three major steps, listed in chronological order
• Specific instructions that describe each step
• Conditions that direct the flow of the program, such as “if-then,” “while,” or “until.”
• Comments that explain your program
• Line numbers
For this assignment you will use the steps of a person’s morning routine to complete the assignment. Below are some YouTube videos of morning routines that are similar to mine:
1. https://www.youtube.com/watch?v=Hzc1OS6BHSo&pp=ygUgNWFtIG1vcm5pbmcgcm91dGluZXMgYmxhY2sgd29tYW4%3D
2. https://www.youtube.com/watch?v=rV23pQTYG5I
Please have 3 references minimum.

In a previous assignment you identified 10 potential jobs. Pick the job/company

In a previous assignment you identified 10 potential jobs. Pick the job/company

In a previous assignment you identified 10 potential jobs. Pick the job/company you would most like to interview for from that list.
2. Download the Interview Preparation Worksheet Download Interview Preparation Worksheet.
3. Save with the naming protocol: Interview_Preparation_YourName.docx.
4. Complete all sections and upload to Canvas.
The first section will be research. You want to walk into any interview with a full grasp of the company. A perennial favorite interview question is: “Tell me what you know about our company.” It reveals how well the candidate has prepared for and understood what the company was all about.
The second section is preparing three questions that you might like to ask during your interview. Make sure these questions are related to the job or department that you would be working for. Don’t ask general, non-related questions as these can be seen as pandering.
I attache the 10 companies and my resume below, you can pick up one from the company list.