Project 1: explore networking in the cloud ( steps 1 trough 4, are

 ****  STEPS 1 THROUGH 4 ARE ALREADY COMPLETED, You do not need to do them again*****

( I just posted  it for you to review so you can understand the whole project )

 —- I ONLY NEED HELP WITH STEPS 5, 6, 7, AND 8. (Please upload each step separately) ——



In CCA 610: Cloud Services and Technology, you assumed the role of an IT analyst at BallotOnline, a company providing electronic voting solutions worldwide. Your proposal to begin migrating systems to the cloud has been approved.BallotOnline has now initiated preparations for the cloud deployment. The company decided to start with deeper investigations of crucial technologies enabling cloud computing. You became acquainted with the basics of these technologies in CCA 610. In this project, you will conduct more in-depth investigation of cloud networking, which makes cloud connectivity on-demand operations possible. You need to have a good understanding of this as you prepare the BallotOnline network for migration to the cloud as well as designing the appropriate network infrastructure in the cloud for BallotOnline.To do that, you will assume the role of a BallotOnline network engineer. You will explore the network protocols that enable the company and its customers to connect to the cloud, as well as technologies making it possible to create on-demand in-cloud virtual networks into which the cloud resources will be deployed.You will conduct two lab experiments exploring the TCP/IP protocols and software-defined networking. You will also perform a subnetting task to demonstrate your understanding of TCP/IP network addressing. Your final deliverable will be the technical report describing your findings and explaining the use of these technologies for BallotOnline’s cloud deployment.

Step 1: Review Networking Concepts

In this step, you will establish an understanding of networking concepts and terms. It will help the recipients of your technical report, including BallotOnline’s technical management, to become familiar with networking vocabulary and definitions.You will start with reviewing basic networking concepts such as local area network (LAN), Ethernet, and packet switching—the technique of splitting transmitted data into smaller portions and transmitting them separately. Splitting data into packets, transmitting the packets reliably, and reassembling the data is performed by networking software. It is important to know about basic networking concepts since they serve as the underlying technology for cloud computing. This will ultimately prepare you to submit your technical report for this project. ( software follows the popular model of layered design of network protocols, with each layer using the functionality of the layer below it and implementing new functionality to be used by the layer above. The technical report should include the popular internet suite of protocols—TCP/IP. Application protocols such as HTTP or SMTP are implemented in layers above TCP/IP. ( basic networking concepts include Domain Name Service, network firewalls, and Network Address Translation. As the network engineer for BallotOnline, you know that these protocols play an important role in enabling cloud computing. 

Step 2: Explore Internet Packet Switching—IP

The Internet Protocol (IP) is the workhorse of today’s internet connectivity. As the network engineer for BallotOnline, you know that today’s cloud computing is built on top of IP. Most communication between systems in the cloud is done using this protocol.IP employs the technique of packet switching, which breaks the data to be transmitted into smaller parts, called packets or datagrams, that are sent over the network independently. Understanding IP is crucial to designing and maintaining cloud deployments, which are provisioned within virtual IP networks and accessed via global internet. You will review the basic elements of IP protocol and include their brief discussion in your technical report.Network devices have a network address to allow other devices to connect to it. The network addresses used in IP are called IP addressing. BallotOnline will need IPv4 addressing to be able to provide network addresses to a cloud system and to create a virtual network in the cloud.Every system on the network must have an IP address. The assignments of IP addresses to the network systems can be done manually or dynamically through a Dynamic Host Configuration Protocol (DHCP) server. As the network engineer for BallotOnline, you know that manually assigning IP addresses is time-consuming and should only be used on a small number of systems where the IP address will not change frequently. ( numeric addresses are not human-friendly, a domain/machine naming convention defines human-readable names for internet hosts. An internet-based service called DNS (Domain Name System) provides translation between the IP addresses and the domain names. In general, people will use the domain names when addressing a system on the internet instead of using its IP address. You will need to explain in the technical report how DNS is used alongside IP addresses.  As the network engineer for BallotOnline, you also know the importance of IP routing, the mechanism used to route the IP packets across the internet from the sender to the recipient. IP routing of IP packets is accomplished by network routers, which determine the next destination for each packet and are able to learn new routes. ( (

Step 3: Investigate Internet Transport—TCP

As robust as the IP protocol is, it does not perform the actual transmission of the data. In this step, you will investigate the network protocol called Transmission Control Protocol (TCP), responsible for creation, reliability of delivery, and proper assembling of data packets. In addition to IP, TCP is also widely used on the internet, especially for any network communication where it is essential to confirm receipt of the transmission. Many of the network protocols used to implement cloud computing use both TCP and IP. You will review TCP’s workings and discuss them in your final technical report. In general, there is no guarantee that a data packet will reach its destination. Packets can get lost or corrupted during transmission, and there are network applications where you need assurance that the packets have reached their destination. To achieve reliability, TCP establishes connections between communicating hosts, using port numbers to refer to applications on these hosts. Then, packets are created, sequenced, transmitted, acknowledged, and retransmitted if missing or containing errors. Finally, at the destination, they are reassembled into the original messages. To synchronize the flow of packets between sender and receiver, and avoid packet congestion in case of varying speeds, TCP uses sliding windows for packets remaining in processing at a given time, at both the sender and receiver ends. (

Step 4: Review Advantages of IP Subnetting

One of the drawbacks of IPv4 is the maximum number of network devices it can support. IPv4 addressing uses a 32-bit network address. This allows for 232, or a little over 4 billion devices. However, today there are significantly more devices on the internet. Even though the more robust IPv6 version has been introduced and efforts are underway to assure wide adoption, IPv4 is still widely used. One method used to more efficiently use the IPv4 network addresses is a technique to optimize the addresses by splitting them into network addresses and host addresses within designated networks. You will need to take advantage of IP address splitting so that you can efficiently use and allocate the IPv4 network addresses that have been assigned to BallotOnline.

For a given large network, rather than addressing all the hosts using the host part of the address, subnetting allows for splitting the network into several smaller ones by borrowing the host part bits and adding them to the network bits ( ). 

It supports efficient management of local networks composed of multiple LANs. In this step, you will investigate subnetting conventions and discuss them in your final report in order to lay ground for the use of subnets by BallotOnline.As the network engineer for BallotOnline, you know that subnetting a network into several smaller and variable-sized networks will be best for the organization’s needs. BallotOnline has been assigned a network address block by the Internet Assigned Numbers Authority (IANA). ( )

Because BallotOnline has several offices around the world, you will need to subnet this network address to assign just the right number of addresses to each office location based on the number of systems at that office location. 

The following is the network address assigned by IANA and the number of offices along with their sizes: subnetted to 16 subnets and provide information for subnets #1, #4, #5, and #16

Your task is to create the appropriate number of subnets with the right size to optimize the network. Your technical report should include Classless Interdomain Routing (CIDR) notation, which allows for specifying a variable-length network as part of the IPv4 address, leaving the rest for addressing hosts within the network. ( )

+++Submission for Project 1: Subnetting+++

The first interim deliverable for Project 1 is for you to learn about subnetting and demonstrate that you know how to do this. subnetted to 16 subnets and provide information for subnets #1, #4, #5, and #16

The deliverable is for you to provide the following information for each of the subnet identified (there are four of them for each problem):

  • Network address
  • Subnet Mask
  • Range of IP Addresses available
  • Broadcast Address
  • The number of subnets that you will be able to get
  • The number of hosts that each subnet will be able to have

You will also need to show the calculation on how you get your answers.

Step 5: Capture and Analyze Network Traffic

Another skill that you will need as the network engineer for BallotOnline is being able to capture network traffic. It’s important to analyze network traffic to find and troubleshoot network issues. This method is commonly used to identify a malfunctioning network device or to detect a possible network issue, such as an ongoing network attack.  

Normally, this process can take hours, days, or even weeks, depending on the size of the network and the specific traffic that you are trying to capture and analyze.  

In this scenario, you will be provided with a captured network traffic and you will be directed to look for specific network packets.

You will use Wireshark, a popular open-source network traffic capture and analysis tool. To analyze the capture file provided to you, here is an introductory tutorial. ( ( )

FOLLOW THE STEPS in the Analyzing Network Traffic Using Wireshark Guide ATTACHED, and prepare a lab report with answers and screenshots to support your answers. 

The lab report will be attached to your final technical report to demonstrate your proficiency in using the tool to do basic network analysis.

Step 6: Explore Networks Inside the Cloud—SDN

Cloud computing defines network resources as needing to be “rapidly provisioned and released with minimal management effort or service provider interaction” (Mell & Grance, 2011), 

As cloud networks developed, it was clear that further virtualization of network devices such as switches and routers was needed.

This led to what is known as software-defined networking (SDN) technology, enabling programmatic interfaces to control functions of these devices. ( ). 

You know that it will be important for management to understand how SDN supports cloud deployments like BallotOnline’s, so it will be a key part of your technical report.

Instead of manually programming network devices to configure a LAN, cloud management systems using SDN can set these devices up to forward packets to particular destinations by “calling” SDN APIs (application programming interfaces – libraries of software routines). This allows for the creation of virtual networks in the cloud by software.

The most popular SDN standard is OpenFlow by the Open Networking Foundation (  

OpenFlow switches include SDN controllers, which maintain flow tables to control forwarding of IP datagrams, and they can learn routes as IP packets when particular source and destination addresses arrive.


Mell, P., & Grance, T. (2011). SP 800-145: The NIST definition of cloud computing. Retrieved from you participate in the discussion below, proceed to the next step. There, you will use a network simulator to show how packets are transmitted.

Software-Defined Network Discussion

*Discuss what software-defined networking is and what networking challenges it addresses. What is the role of OpenFlow protocol? 

*Describe how BallotOnline could benefit from SDN in its cloud deployment.

Explain the reasons for your opinions and how they relate to your experiences.


Step 7: Simulate a Network With Mininet

To demonstrate your understanding how network packets are transmitted in the cloud, you will use Mininet, ( a popular open-source network simulator that can be used together with Wireshark. This demonstration will be part of your technical report.  

FOLLOW THE STEPS in this Simulating a Network Using Mininet and Analyzing Packets Using Wireshark Guide. GO THIS LINK AND FOLLOW THE STEPS: (

During the lab, you will provision an EC2 instance in AWS using a preconfigured AWS Machine Image (AMI) and use the Mininet simulator in the EC2 instance to create two hosts. You will then use Wireshark to capture the packet exchanges. 



( )

You will PREPARE A LAB REPORT as per the lab guide and attach it to your final technical report.

In the next step, you will put together your technical report for BallotOnline.

Step 8: Submit Networking in the Cloud Technical Report

As your final submission, you will write a technical report about networking in the cloud.

* It will be addressed to BallotOnline technical managers to help them understand how these networking technologies will be implemented as BallotOnline migrates to the cloud.

* It will include technical review of the topics covered in the project. Follow the Networking in the Cloud Technical Report Template to cover all the topics required. 


* Make sure you provide headings to clearly identify sections of your report. 

***The technical review part of the report should be eight to 12 pages. ***

* You should also include both Project 1 lab reports (1 and 2), with incorporated feedback from Steps 5 and 7 if any.

Ib315 discussion post 1 | Management homework help

In this video, British diplomat Bruce Bucknell discusses the various manners in which globalization is defined, and shows us how globalization manifests itself in our everyday life. Ponder upon the implications of this video and then engage in an active discussion with your peers.

Due Date (-1 point for each day late, not accepted if submitted after Sunday)

  • Initial post by 11:59 p.m., Thursday, CT.
  • Response post(s) by 11:59 p.m., Sunday, CT.


  1. Complete unit readings.
  2. Watch the video The Changing Face of Globalization | Bruce Bucknell | TEDxJadavpurUniversity. (21:05)
  3. Initial Post-Answer the following questions completely and clearly
    • Share what you garnered from the video.
    • What are your thoughts on the positive and negative impacts of globalization?
    • Support your response with at least one credible reference.

Effective leadership and power – 200 words | LDR300 Innovative Leadership | University of Phoenix

Respond to the following in a minimum of 200 words: 

Discuss the relationship between power and leadership. 

  • What power must a leader have in order to lead effectively? 
  • How can a leader acquire that power? 
  • What mechanisms can be put in place to prevent the leader from abusing his or her power? 

Share a real or imagined example of a leader in a specific situation (such as the leader of a project team, the head of the marketing department, the CEO of a company, etc.) to explain and support your answers.

Business requirement document | Computer Science homework help

The CEO and CIO have accepted your recommendations for implementing an EDMS for the Hollywood Organic Co-op’s five sites. They have requested that you develop a business requirements document (BRD) that details the requirements and design for an enterprise EDMS.

Begin working on the information that must be included in the final business requirements document due in Week 6.

Write a 2- to 3-page requirements document draft that addresses creating a new EDMS to be used by your company to store and track all e-documents.

Identify the types of e-documents and other content that can be created (e.g., letters, spreadsheets, reports, or paper images).

For each type of e-document, provide an example e-document that may exist in the Hollywood Organic Co-op organization.

Define the key personnel within the Hollywood Organic Co-op organization who require access to the EDMS.

Describe appropriate logical access controls for the EDMS based on the roles within the organization who require access to each type of e-document.

Note: You may format this assignment in a bulleted list, document table, or other method of your choice in a Microsoft® Word document. A narrative or formal paper is not required.

Infograph and 400-550 word letter


The purpose of this assignment is to analyze the effect of domestic and international regulatory agencies and court systems on business transactions and dispute resolution.

Read the following scenario:

You are the CEO of Bonner, a U.S.-based farm equipment corporation. Bonner recently announced the release of an innovative new tractor with technology based on a patented invention developed by Bonner’s engineers. Bonner’s vice president, who is aware of the upcoming product offering, bought 100,000 shares of Bonner stock prior to the announcement. You found out about the vice president’s stock purchase on the day of the announcement.

One week after the announcement, Bonner received a letter from a German farm equipment corporation, accusing Bonner of patent infringement based on the new tractor’s technology. 

Bonner’s board of directors asked you to assess the vice president’s liability for the stock purchase and the company’s options for resolving the German corporation’s patent infringement claim.

Prepare an infographic for the board (e.g., Piktochart®, Publisher, Glogster®, Microsoft® PowerPoint®, etc.) in which you discuss the following:

  • Compare the resolution of the patent dispute in a U.S. court with the resolution of the dispute using the World Intellectual Property Organization’s (WIPO) dispute resolution program. Search the internet to review WIPO’s dispute resolution program. (Information about WIPO’s dispute resolution program may be located on their website by searching the Internet for WIPO).
  • Assess the liability of Bonner’s vice president for purchasing the corporation’s stock prior to the announcement of the new tractor. 
  • Assess whether Bonner has any legal or ethical duties to disclose the stock purchase, and if so, to whom?
  • Discuss risk management procedures Bonner can adopt to avoid or reduce situations like these from happening in the future.

Create a 350- to 525-word letter in response to the German farm equipment company in which you:

  • Explain why Bonner is the owner of the invention
  • Discuss the intellectual property rights owned by Bonner in the invention
  • Suggest a method of dispute resolution (e.g., arbitration, mediation, litigation, WIPO dispute resolution), why that method would be desirable for resolving the dispute, and how and where the dispute resolution should be held (United States, foreign country, online, etc.). 

Cite a minimum of two references.

Format your assignment according to APA guidelines. 

Research methods in criminal justice – chapter 12 questions.


Required Textbook: Hagan, Frank E., Research Methods in Criminal Justice and Criminology, Pearson Education, Inc., 2014. ISBN: 978-0-13-300861-6.

Answer the Review Questions at the end of Chapter 12: APA Formatting, no plagiarism, answer in an essay format and like teaching others.

1. Describe the steps in the data management process. How does each step build on the others in  producing valid data for analysis? 

2. Graphic displays have sometimes been employed to lie with statistics. How is this done, and how might readers avoid being misled by such displays? 

3. What are some useful hints in reading a table? Although it is certainly not exciting, why is table reading an important subject? How was this illustrated by Wilbanks’ examination of interracial crime in the NCS? 

4. What does the process of elaboration involve? How does such a process enable one to take into account (or control for) rival causal factors.

Intergenerational communication from a hospitality standpoint, based | hospitality

Students will write an essay on the topic of intergenerational communication from a hospitality standpoint, based on the principles contained in the book ReGenerations by J. Stolling. This report must be at least 2200 words in length and must contain 8 scholarly references.

Overall the essay is about comparing the different types of communication in the workforce, I would like the essay to compare baby boomers and Millennials and how they interact with each other. 

Report | engineering | Arizona State University

This is a technical report, you need to read some papers,  There are about 27 papers attached. You don’t have to read all of them You just read want you want and on the word file, the professor already told the technical level of these papers

Class diagram and sequence diagram

As the head of information systems for a college you are tasked with developing a new student 

registration system. The college would like a new client-server system to replace its much older system 

developed around mainframe technology. The new system will allow students to register for courses 

and view report cards from personal computers attached to the campus LAN. Professors will be able to 

access the system to sign up to teach courses as well as record grades.

Due to a decrease in federal funding, the college cannot afford to replace the entire system at once. The 

college will keep the existing course catalog database where all course information is maintained. This 

database is an Ingres relational database running on a DEC VAX. Fortunately the college has invested in 

an open SQL interface that allows access to this database from college’s Unix servers. The legacy system 

performance is rather poor, so the new system must ensure that access to the data on the legacy system 

occurs in a timely manner. The new system will access course information from the legacy database but 

will not update it. The registrar’s office will continue to maintain course information through another 


At the beginning of each semester, students may request a course catalogue containing a list of course 

offerings for the semester. Information about each course, such as professor, department, and 

prerequisites, will be included to help students make informed decisions.

The new system will allow students to select four course offerings for the coming semester. In addition, 

each student will indicate two alternative choices in case the student cannot be assigned to a primary 

selection. Course offerings will have a maximum of ten students and a minimum of three students. A 

course offering with fewer than three students will be canceled. For each semester, there is a period of 

time that students can change their schedule. Students must be able to access the system during this 

time to add or drop courses. Once the registration process is completed for a student, the registration 

system sends information to the billing system so the student can be billed for the semester. If a course 

fills up during the actual registration process, the student must be notified of the change before 

submitting the schedule for processing.

At the end of the semester, the student will be able to access the system to view an electronic report 

card. Since student grades are sensitive information, the system must employ extra security measures to 

prevent unauthorized access.

Professors must be able to access the on-line system to indicate which courses they will be teaching. 

They will also need to see which students signed up for their course offerings. In addition, the professors 

will be able to record the grades for the students in each class.

Give below are the UML Use Case Diagram and Use Case Specifications (Descriptions). Your task is to 

draw the Sequence and Class Diagram(s).