Write a research paper on the topic that you chose in Module 2:
Topic 2: Internet of Things,
For the topic you chose in Module 2, describe the current technologies in use. Review how the technology works. Research the future of these technologies. How will they change businesses and our lives?
Paper Requirements:
Your project (paper) will comprise 2500 to 3000 words (not including title and reference pages). Please make sure you double-space your Final Research Project. Your project (paper) must be formatted according to APA guidelines as a Word document, double-spaced, and aligned with all text. You must support your materials by using at least five (5) appropriate, properly cited sources in addition to your course textbook.
Formatting: Times New Roman, 12-font, with one-inch margins. You MUST follow the assignment directions. Please proofread your project before turning it in. It is strongly suggested that you use a Grammarly checker. Here is an abstract below please write according to that references. Thank you
Category: Networking
NSTRUCTIONS Write a research paper on the topic “Internet of Things” with Abstra
NSTRUCTIONS
Write a research paper on the topic “Internet of Things” with Abstract with 350 words
Describe the current technologies in use. Review how the technology works. Research the future of these technologies. How will they change businesses and our lives?Paper Requirements:
Your project (paper) will comprise 2500 to 3000 words (not including title and reference pages). Please make sure you double-space your Final Research Project. Your project (paper) must be formatted according to APA guidelines as a Word document, double-spaced, and aligned with all text. You must support your materials by using at least five (5) appropriate, properly cited sources in addition to your course textbook.
Formatting: Times New Roman, 12-font, with one-inch margins. You MUST follow the assignment directions. Please proofread your project before turning it in. It is strongly suggested that you use a Grammarly checker.
CIT 470: Advanced Network & System Administration Nagios Implementation Introduc
CIT 470: Advanced Network & System Administration
Nagios Implementation
Introduction:
This lab will introduce you to installing the monitoring tool Nagios. The free version, Nagios Core, will be used.
Requirements:
Please configure Nagios on your server to monitor one of your clients. It should monitor the following (the instructions for monitoring these are given in the documentation):
Monitor the following system resources on the monitored client:
oCPU
oMemory
oDisk usage
oSwap disk
Monitor the following services on your monitored client:
oHTTP
oSSH
In addition to specific resources and service, be sure to monitor the following on the monitored client:
oTotal number of processes running.
oCurrent logged-in users.
Do not configure Nginx; the web functionality of Nagios works without it.
After configuring Nagios, use the server’s web interface to generate a Trends report for the client’s ping responses. When forming your report, specify the Service report type, the PING service, and the report period of Today.
Documentation & Tips:
We strongly recommend using the following article to help you install Nagios and monitor a client machine:
How To Install and Configure Nagios on CentOS 8 (howtoforge.com)
Here are some tips to keep in mind as you work on the lab:
When you work on installing the plugins on your Nagios client (Step 7 of the guide above), you will need to install the Remi Repository on the client (the link is in Step 2 of the guide above). Do this on the client before running the dnf command in Step 4.
For the documentation given above, do not add the code that monitors the root partition. It will not work due to the NPRE command in the document being invalid.
Although you are monitoring for HTTP, it will show up as failed in the Services page of Nagios. Even if port 80 or the http service is allowed through the client’s firewall, this will still be the case. This is due to the client not having Apache or another webserver software installed. You are monitoring HTTP simply to demonstrate what a failed service looks like in Nagios.
If the Total Processes target for the client receives a Critical status, do not worry about it. Leave your configurations as they are.
Your trend report will have very little to no data due to your installation being very recent. You should see a high percentage (if not 100%) for the OK status if you configured everything correctly.
Submission Instructions:
When you are finished, submit your Word document containing the following:
The list of commands you used to install Nagios.
A screenshot of your server’s Nagios home page after initially starting the Nagios service on the server.
A screenshot of the Hosts page in the server’s Nagios web interface, showing the client and the server (localhost) being monitored.
One or more screenshots of the Services page in the server’s Nagios web interface, showing the results from both the client and the server (localhost).
A screenshot of the report chart for the PING service monitoring the client’s availability.
On your first day of work as a junior engineer, network users are complaining th
On your first day of work as a junior engineer, network users are complaining that cannot access any network services. One smart user indicates that she ran a command and noticed the following IP address 169.254.1.1. Answer the following questions based on the brief USE CASE given above.
1) What does the address indicate?
2) List 3 possible causes for the address given, briefly explain them and suggest solutions
3) What CLI command did the smart user use to determine the address given?
4) What CLI command can be used to test the network to ensure connectivity is restored based on the solution you gave?
CIT 470: Advanced Network & System Administration Syslog Configuration Introduct
CIT 470: Advanced Network & System Administration
Syslog Configuration
Introduction:
In this lab, you will configure syslog on two VMs, with one (the server) being configured to accept remote logs and the other (the client) to send them to the server. You will write two scripts to configure many of these settings. While you are permitted to use any programming language, bash is strongly recommended; it will make performing the tasks below easier.
Requirements:
Part 1: Server Configuration
On one of your VMs, configure it to accept remote logs from TCP port 514 (do not configure the firewall yet). In root’s home directory, create a file named remotelog.conf and copy the content from the documentation below into it (make sure you replace the given port with 514).
After you create the file, please create a script that performs the following:
Verify that the root user is signed in. If it is not, terminate the script.
Disable SELinux on the VM. Use text transformation to do this.
Ensure the rsyslog service is running.
oCreate a verification check to do this. If the service is found to not be running, start and enable it. If it is running, just enable it.
Open TCP port 514 on the firewall. Restart it after doing so.
Move the remotelog.conf file from root’s home directory to the appropriate location (check the documentation).
Restart the rsyslog service after making your configurations.
Part 2: Client Configuration
On a different VM, configure it to send its syslog messages to the syslog server. In root’s home directory, create a file named 10-remotelog.conf and copy the content from the documentation below into it (make sure you replace the given port with 514 and provide the server’s IP address in place of the given domain name).
After you create the file, please create a script that does the following:
Verify that the root user is signed in. If it is not, terminate the script.
Install the ipcalc utility on the VM (use the -y option to ensure the install happens automatically).
After this, have the script give the user the option to either perform the configuration steps below or send a test syslog message to the server.
oFor the user response, ask him or her to provide words such as “configure” and “test”, or letters such as “c” and “t”.
§You may support both words and letters if you wish, but it is not required.
oMake sure that the option the user selects is the only one performed. For example, if the user selects “test”, the configuration steps below should not be run.
If the user selects the test option, the script should do the following:
oRequest your syslog server’s IP address from the user and store it as a variable.
oVerify the IP address with ipcalc -c to ensure only valid ones are used. If the address is valid, have the script continue. If it is not, terminate the script.
oSend a test message using the logger command. This message should include your client’s IP address.
If the user selects the configuration option, the script should do the following:
oDisable SELinux on the VM. Use text transformation to do this.
oEnsure the rsyslog service is running.
§Create a verification check to do this. If the service is found to not be running, start and enable it. If it is running, just enable it.
oCopy the 10-remotelog.conf file from root’s home directory to the appropriate location mentioned in the documentation.
oRestart the rsyslog service after making your configurations.
If the user provides an invalid option, tell him or her and exit the script.
Documentation & Tips:
We strongly recommend the following documentation to complete this lab. Note that other guides contain configuration methods that no longer work, so we recommend this one:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_basic_system_settings/configuring-logging_configuring-basic-system-settings
oUse the steps that configure the server and client to use TCP. Skip the optional steps to use a custom port, as well as the others for TLS and UDP.
Here are some tips to keep in mind as you work on this lab:
To edit the SELinux files with your scripts, consider using Python’s replace() function or the sed command if writing with bash.
To check if the rsyslog service is running, consider using the exit status or the output of a command that can check it. The systemctl command has specific options that make the former easy to do.
Submission Instructions:
When you are finished, submit a Word document that contains the following:
The text you copied into both configuration files you made in root’s home directory.
The text from both of your scripts.
After configuring everything, send a logger message from the client, then run the following command on the server and capture its output with the following command:
ocat /var/log/remote/msg/[hostname]/cit470.log
§Replace hostname with your client’s name (this will most likely be localhost).
§If cit470.log does not exist, use root.log.
oThis screenshot should show one or more timestamped messages from the client’s logger commands.
oIf you are having trouble receiving the messages, reboot both VMs, then try again.
Do some Internet research on flow control in data communications networks. Ident
Do some Internet research on flow control in data communications networks. Identify common examples of why flow control is needed and how it ensures reliable data transfer between senders and receivers. Provide 2-3 references. Instructions:
The total word count must be 250 to 300
Please also respond to at least two of your classmates with a meaningful reply of 150 words or greater Please provide references and in-text citations for your original postings in APA format.
Assignment Topic: Research frequency-division multiplexing. Identify three every
Assignment Topic:
Research frequency-division multiplexing. Identify three everyday examples of FDM use. Each of these examples shows how FDM is used and how it works. Summarize your findings in a brief paper.
Instructions (from the syllabus):
Cases allow you to demonstrate your understanding and ability to apply course concepts. You must use at least two (2-3) appropriate sources (other than your course textbook) that are correctly cited in APA style; do not solely use the case itself to support your position. You are strongly encouraged to use the following outline so that your analysis is organized appropriately:
Identify both the key issues and the underlying issues. In identifying the issues, you should be able to connect them to the principles which apply to this situation.
Discuss the facts which affect these issues. The case may have too much information. In your discussion, you should filter the information and discuss facts pertinent to the abovementioned issues.
Discuss your proposed solution/recommendation to the problem and include how you would implement it. What actions would you propose to correct the situation based on the knowledge you have gained in this course? Support your recommendation by citing references in the text and the supplementary readings. You should also draw on references such as business periodicals and journals. Remember that an ANALYSIS is more than simply a SUMMARY of the Writing Assignment.
Discuss follow-up and contingency plans (if necessary). How will the organization know that your proposed solution is working? What should they do if it does not work?
Word count is 500 words, not including references and figures. References must be in the APA style.
1-For multipoint configuration, only one device at a time can transmit. Why and
1-For multipoint configuration, only one device at a time can transmit. Why and what is that terminology called. Explain in maximum 2 paragraphs and cite your work? (10 Point)
2- Cost-2-Cost is a famous radio show broadcast from Los Angeles, California. The broadcast use AM stereo at 1320 kHz by the time it reaches Maryland, Rockville WWDC-F2 (@101.1 kHz) Monday – to Saturday from 1AM to 6AM and Sunday off day. What is the antenna height required to capture the station wavelength. Explain your Answer and calculations in details Do Not give only the final answer or short explanation you will not get a grade. (10 points)
3- Hulu and YouTube offer regular TV broadcast, and Time Shift service for their customers. As promotion to encourage subscribers to the service providers. FXX movie channel broadcast a new 4K movie with Dolby Atmos for subscribers. Answer the following Questions and Explain your Answer and calculations in details Do Not give only the final answer or short explanation you will not get a grade. (20 points)
What is the required bandwidth to watch a 4K HDR10 12-Bit color movie stream? (10 points)
How much data is needed for the Time Shift of 1.5 hour and what is the compressed Value in? (10 points
Need to explain the details the steps of your answer and calculations.
Need to mention references and citations for all the above questions
Q1)List the different network management standards mentioned in the slides? Whic
Q1)List the different network management standards mentioned in the slides? Which of them is the most widely implemented?
Q2)1. What is the purpose of the network layer in the OSI model? 2. How does network layer handle errors?
Q3)1. What is the difference between MDB and MIB? 2. Give two examples of managed object.
Q4)
1. What is the figure below? 2. Explain the information giving in the figure.
Scenario: Your sister just moved into a new home and needs you to help her get a
Scenario:
Your sister just moved into a new home and needs you to help her get all of her computer devices connected to the network and the Internet.
Your sister and her family have the following devices:
2 laptops: one for work, one for gaming and video streaming
2 mobile devices: one Apple-iPad, one Samsung Android tablet
2 mobile phones: one iPhone, one Android phone
3 wireless security cameras
1 Amazon Alexa
2 wireless printers
2 smart TVs that can be used as projectors
Instructions:
For this assignment, you must diagram a network depicting the physical device configuration of your sister’s home network using cloud services for data storage and sharing. (Use a graphical software tool like Visio or DIA to draw the network diagram.)
You must then create a second diagram of the floor layout with all appliances and computer device distributions.
Embed both diagrams into a paper and indicate how the router and each device should be configured so they have access to the Internet and file-sharing capability.
Length: 3-5 page pager with an embedded original network diagram
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards,