Network System: Remote Desktop, Virtual Machine, and File Operations
VerifiedAdded on 2022/10/01
|44
|5505
|482
AI Summary
This guide covers the basics of network systems, including remote desktop, virtual machine, and file operations. It includes step-by-step instructions for installation and configuration of Putty, Xming, and VirtualBox. The guide also covers file transfer, renaming, and deletion.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
TITLE: NETWORK SYSTEM
NETWORK SYSTEM
i
NETWORK SYSTEM
i
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
Page
TITLE................................................................................................................…………... ……..i
TABLE OF CONTENTS .............................................................................................………….ii
ABSTRACT ........................................................................................……………………………iii
INTRODUCTION ........................................................................................................................ .v
Task 1
Sub-task 1
Remote Desktop………………………………………………………………………………. ..1
Sub-task 2
Remote desktop operation……………………………………………………………………... 10
Sub-task 3
Operation of remote computer from the local computer…………………………………….… 12
Task 2
Remote Connections
Sub-task 1
Setting up remote connection of the two computers for file operations………………….…...14
Sub-task 2
File Operations………………………………………………………………………………..15
Task 3
Virtual Machine
Sub-task 1
Virtual Machine set up on VirtualBox………………………………………………………..18
Sub-task 2
Virtual Machine Network set up……………………………………………………………..24
Task 4
IPv4 subneting…………………………………………………………………………..…..27
Task 5
Reflections…………………………………………………………………………………..29
CONCLUSION …………………………………………………………………………....30
REFERENCES ............................................................................................................….…31
ii
Page
TITLE................................................................................................................…………... ……..i
TABLE OF CONTENTS .............................................................................................………….ii
ABSTRACT ........................................................................................……………………………iii
INTRODUCTION ........................................................................................................................ .v
Task 1
Sub-task 1
Remote Desktop………………………………………………………………………………. ..1
Sub-task 2
Remote desktop operation……………………………………………………………………... 10
Sub-task 3
Operation of remote computer from the local computer…………………………………….… 12
Task 2
Remote Connections
Sub-task 1
Setting up remote connection of the two computers for file operations………………….…...14
Sub-task 2
File Operations………………………………………………………………………………..15
Task 3
Virtual Machine
Sub-task 1
Virtual Machine set up on VirtualBox………………………………………………………..18
Sub-task 2
Virtual Machine Network set up……………………………………………………………..24
Task 4
IPv4 subneting…………………………………………………………………………..…..27
Task 5
Reflections…………………………………………………………………………………..29
CONCLUSION …………………………………………………………………………....30
REFERENCES ............................................................................................................….…31
ii
Abstract
Users can move files from local to remote computer only if they are privileged during the session.
In this case, one cannot have full control of the remote computer for file transfers hence it is only
possible under some circumstances. It will also depend on the administrator permission that has
granted you over the file upload to the remote computer or to download them from the local
computer. It will only be possible on certain directories because of restrictions on some paths on the
remote or local systems. File transfer is easy since one can drag and drop them or use upload and
download button. If you right click on the file you would like to transfer, menu will pop-up where
there are several options such as creating a new directory; rename, deleting or opening the
files.Windows operating systems have desktop connection. If two or more computers are connected
using internet, then you will be able to accessseveral network resources from the one computer to
other. It is only possible if you have login from both systems (Aaqib, and Sharma, 2019, pp. 441-
447).
iii
Users can move files from local to remote computer only if they are privileged during the session.
In this case, one cannot have full control of the remote computer for file transfers hence it is only
possible under some circumstances. It will also depend on the administrator permission that has
granted you over the file upload to the remote computer or to download them from the local
computer. It will only be possible on certain directories because of restrictions on some paths on the
remote or local systems. File transfer is easy since one can drag and drop them or use upload and
download button. If you right click on the file you would like to transfer, menu will pop-up where
there are several options such as creating a new directory; rename, deleting or opening the
files.Windows operating systems have desktop connection. If two or more computers are connected
using internet, then you will be able to accessseveral network resources from the one computer to
other. It is only possible if you have login from both systems (Aaqib, and Sharma, 2019, pp. 441-
447).
iii
Introduction
First, you have to locate the files you would like to delete from the local computer. You have to use
internet connection gain access and right click on the file you would like to delete. The menu will
pop-up where you will choose the delete option. I used putty emulator software to log into Linux
server from a Window OS. It was fine to use alone but when i combine with Xming then it was a
nice compliment. Xming is a software used mainly for graphic displays in a remote Linux servers. It
was more efficient when I combined the two. It was simple to use them since i just install and
follow some few instructions. I also used Graphical User Interface which is available in Linux
platform to edit files. During the session, i was privileged to move my files. Unfortunately, I didn’t
control the remote computer during file upload and download from local computer. GUIs are
mainly available in Linux platform. The most used and common is Nautilus (GNOME) and Dolphin
(KDE). They are both flexible and powerful. They can be operated as follows (Zhang,.., 2019, pp.
89-97):
v
First, you have to locate the files you would like to delete from the local computer. You have to use
internet connection gain access and right click on the file you would like to delete. The menu will
pop-up where you will choose the delete option. I used putty emulator software to log into Linux
server from a Window OS. It was fine to use alone but when i combine with Xming then it was a
nice compliment. Xming is a software used mainly for graphic displays in a remote Linux servers. It
was more efficient when I combined the two. It was simple to use them since i just install and
follow some few instructions. I also used Graphical User Interface which is available in Linux
platform to edit files. During the session, i was privileged to move my files. Unfortunately, I didn’t
control the remote computer during file upload and download from local computer. GUIs are
mainly available in Linux platform. The most used and common is Nautilus (GNOME) and Dolphin
(KDE). They are both flexible and powerful. They can be operated as follows (Zhang,.., 2019, pp.
89-97):
v
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Task 1
Sub-task 1
Remote Desktop
How to access Linux server from Windows using Putty & Xming
How to configure Putty & Xming
Putty and Xming can be configurations is simple step procedures that can be done without so much
complexity. Using Putty Window that is basically emulator software, one can log into a Linux
server. It can be used alone or with Xming since they can compliment each other. Xming is mainly
used to display graphics such as images from the remote Linux servers (Praptodiyono,.., 2019).
Installation and configurations of Xming
1) Download & install Xming
You will have to download free version of the Xming on google using the following link
http://www.straightrunning.com/XmingNotes/ and then just follow instructions of installing.
3) Download & install Xming Fonts
Xming Fonts can be downloaded and installed using the fellow link
http://www.straightrunning.com/XmingNotes/
4) XMing Configurations
In the directory select XLaunch.exe and configure it as shown bellow:
1
Sub-task 1
Remote Desktop
How to access Linux server from Windows using Putty & Xming
How to configure Putty & Xming
Putty and Xming can be configurations is simple step procedures that can be done without so much
complexity. Using Putty Window that is basically emulator software, one can log into a Linux
server. It can be used alone or with Xming since they can compliment each other. Xming is mainly
used to display graphics such as images from the remote Linux servers (Praptodiyono,.., 2019).
Installation and configurations of Xming
1) Download & install Xming
You will have to download free version of the Xming on google using the following link
http://www.straightrunning.com/XmingNotes/ and then just follow instructions of installing.
3) Download & install Xming Fonts
Xming Fonts can be downloaded and installed using the fellow link
http://www.straightrunning.com/XmingNotes/
4) XMing Configurations
In the directory select XLaunch.exe and configure it as shown bellow:
1
5) First, choose Multiple Windows then next.
6) Choose Start client as shown below and press next.
2
6) Choose Start client as shown below and press next.
2
7) Click Next
8) Click Save Configuration.
3
8) Click Save Configuration.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
9) Now save configuration on config.xlaunch.
How to Install and Configure Putty
1) Download
Use the following website http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe
The file being downloaded will automatically be installed. You may choose to create shortcut on
desktop (Isa,.., 2019, pp. 45-51).
2) Configuration of Putty
First, open putty.exe and you will see the following:
1) Download
Use the following website http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe
The file being downloaded will automatically be installed. You may choose to create shortcut on
desktop (Isa,.., 2019, pp. 45-51).
2) Configuration of Putty
First, open putty.exe and you will see the following:
5
3) In Saved Sessions, you can put your chosen name of server then save.
3) In Saved Sessions, you can put your chosen name of server then save.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4) Click the name of the server then Load
6
6
5) Configuring X11.
Tick enable box of X11 forwarding as shown below with MIT-Magic-Cookie-1 then open.
Tick enable box of X11 forwarding as shown below with MIT-Magic-Cookie-1 then open.
6) Login
Using command line you can log into your account.
7
Using command line you can log into your account.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7) password Input.
You will have to use the same password which you had created. Press enter when you finish putting
password.
You will have to use the same password which you had created. Press enter when you finish putting
password.
8) Verification
use the following commands:
which firefox
which xclock
8
9
use the following commands:
which firefox
which xclock
8
9
Sub-task 2
Remote desktop operation
Graphical User Interface
GUIs are mainly available in Linux platform. The most used and common is Nautilus (GNOME)
and Dolphin (KDE). They are both flexible and powerful. They can be operated as follows
(Zhang,.., 2019, pp. 89-97):
1) Click on Nautilus.
2) Locate the file and right-click .
3) Select the “Move To” on the option.
4) Choose file destination.
5) Finally, click Select.
10
Remote desktop operation
Graphical User Interface
GUIs are mainly available in Linux platform. The most used and common is Nautilus (GNOME)
and Dolphin (KDE). They are both flexible and powerful. They can be operated as follows
(Zhang,.., 2019, pp. 89-97):
1) Click on Nautilus.
2) Locate the file and right-click .
3) Select the “Move To” on the option.
4) Choose file destination.
5) Finally, click Select.
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
If you need to move multiple files, you can select all the files you want by using Ctrl button. Righ-
click on one of the files selected . This is the most easy way of in multiple files instate of moving
one by one (Almasan,.., 2019).
11
click on one of the files selected . This is the most easy way of in multiple files instate of moving
one by one (Almasan,.., 2019).
11
Sub-task 3
Operation of remote computer from the local computer
Windows operating systems have desktop connection. If two or more computers are connected
using internet, then you will be able to access several network resources from the one computer to
other. It is only possible if you have login from both systems (Salman,.., 2019, March, pp. 25-34).
How to Setup:
1) Log in first to the remote PC, then type "Allow Remote" on search function.
2) Click "Allow remote access to your computer" and also Select Users button.
3) You will finally access using name you had already created.
4) Make sure to turn off sleep mode. Internet connectivity is required for RDC to work when both
systems are powered.
12
Operation of remote computer from the local computer
Windows operating systems have desktop connection. If two or more computers are connected
using internet, then you will be able to access several network resources from the one computer to
other. It is only possible if you have login from both systems (Salman,.., 2019, March, pp. 25-34).
How to Setup:
1) Log in first to the remote PC, then type "Allow Remote" on search function.
2) Click "Allow remote access to your computer" and also Select Users button.
3) You will finally access using name you had already created.
4) Make sure to turn off sleep mode. Internet connectivity is required for RDC to work when both
systems are powered.
12
13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Task 2: Remote Connections
Sub-task 1
Setting up remote connection of the two computers for file operations
Download PuTTY
Use the following steps to download and an open PuTTY:
1) Download PuTTY from the PuTTY website only to get the right version and original software.
Ensure that you comply with all the license requirements by accepting it.
2) Launch by following instructions after the downloads is complete (Bailey, 2019).
Configure connection
In the PuTTY Configuration window, use the following values:
1) In name field, enter the Internet Protocol (IP).
2) Click Open if you are sure all the information you have put is correct (Elder,.., 2019).
Enter your username and password
Terminal will only prompts you for your username and password if you accept the warning.
Ensure you log in as the root user if its your first time.
If the information is correct, a shell prompt will be displayed as a show of acceptance:
14
Sub-task 1
Setting up remote connection of the two computers for file operations
Download PuTTY
Use the following steps to download and an open PuTTY:
1) Download PuTTY from the PuTTY website only to get the right version and original software.
Ensure that you comply with all the license requirements by accepting it.
2) Launch by following instructions after the downloads is complete (Bailey, 2019).
Configure connection
In the PuTTY Configuration window, use the following values:
1) In name field, enter the Internet Protocol (IP).
2) Click Open if you are sure all the information you have put is correct (Elder,.., 2019).
Enter your username and password
Terminal will only prompts you for your username and password if you accept the warning.
Ensure you log in as the root user if its your first time.
If the information is correct, a shell prompt will be displayed as a show of acceptance:
14
Sub-task 2
File Operations
1) Moving of files
Users can move files from local to remote computer only if they are privileged during the session.
In this case, one cannot have full control of the remote computer for file transfers hence it is only
possible under some circumstances. It will also depend on the administrator permission that has
granted you over the file upload to the remote computer or to download them from the local
computer. It will only be possible on certain directories because of restrictions on some paths on the
remote or local systems (Aaqib, and Sharma, 2019, pp. 441-447).
File transfer is easy since one can drag and drop them or use upload and download button. If you
right click on the file you would like to transfer, menu will pop-up where there are several options
such as creating a new directory; rename, deleting or opening the files.
15
File Operations
1) Moving of files
Users can move files from local to remote computer only if they are privileged during the session.
In this case, one cannot have full control of the remote computer for file transfers hence it is only
possible under some circumstances. It will also depend on the administrator permission that has
granted you over the file upload to the remote computer or to download them from the local
computer. It will only be possible on certain directories because of restrictions on some paths on the
remote or local systems (Aaqib, and Sharma, 2019, pp. 441-447).
File transfer is easy since one can drag and drop them or use upload and download button. If you
right click on the file you would like to transfer, menu will pop-up where there are several options
such as creating a new directory; rename, deleting or opening the files.
15
2) File renaming from local to remote computer
Renaming of files is an easy task in windows version. It is done by right clicking on the file that you
would like to rename then you have to directly name it according to the name you prefer (Shimpi,..,
2019).
Renaming of files is an easy task in windows version. It is done by right clicking on the file that you
would like to rename then you have to directly name it according to the name you prefer (Shimpi,..,
2019).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16
3) Downloading files in remote to local computer
1) Connect remote computer that it contains the file you would like to download.
2) Click on the advanced workflows node on the left pane which contains the file.
3) On the right pane it will display files and you can choose the one you would like to download.
4) Deleting files from local on remote computer.
First, you have to locate the files you would like to delete from the local computer. You have to use
internet connection gain access and right click on the file you would like to delete. The menu will
pop-up where you will choose the delete option (Ivanov,.., 2019).
3) Downloading files in remote to local computer
1) Connect remote computer that it contains the file you would like to download.
2) Click on the advanced workflows node on the left pane which contains the file.
3) On the right pane it will display files and you can choose the one you would like to download.
4) Deleting files from local on remote computer.
First, you have to locate the files you would like to delete from the local computer. You have to use
internet connection gain access and right click on the file you would like to delete. The menu will
pop-up where you will choose the delete option (Ivanov,.., 2019).
17
Task 3: Virtual Machine
Sub-task 1
Virtual Machine set up on VirtualBox
We will have a look at creation of virtual machine in VirtualBox. Windows operating systems have
desktop connection. If two or more computers are connected using internet, then you will be able to
access several network resources from the one computer to other. It is only possible if you have
login from both systems. GUIs are mainly available in Linux platform. The most used and common
is Nautilus (GNOME) and Dolphin (KDE). They are both flexible and powerful. They can be
operated as follows. Putty and Xming can be configurations is simple step procedures that can be
done without so much complexity. Using Putty Window that is basically emulator software, one can
log into a Linux server. It can be used alone or with Xming since they can compliment each other.
Xming is mainly used to display graphics such as images from the remote Linux servers (Cath,..,
2019).
Click on new button on the toolbar on the console screen.
Task 3: Virtual Machine
Sub-task 1
Virtual Machine set up on VirtualBox
We will have a look at creation of virtual machine in VirtualBox. Windows operating systems have
desktop connection. If two or more computers are connected using internet, then you will be able to
access several network resources from the one computer to other. It is only possible if you have
login from both systems. GUIs are mainly available in Linux platform. The most used and common
is Nautilus (GNOME) and Dolphin (KDE). They are both flexible and powerful. They can be
operated as follows. Putty and Xming can be configurations is simple step procedures that can be
done without so much complexity. Using Putty Window that is basically emulator software, one can
log into a Linux server. It can be used alone or with Xming since they can compliment each other.
Xming is mainly used to display graphics such as images from the remote Linux servers (Cath,..,
2019).
Click on new button on the toolbar on the console screen.
Type the name of the virtual machine
Choose the amount of memory for virtual machine and remember to leave enough for OS operation.
Choose the amount of memory for virtual machine and remember to leave enough for OS operation.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Accept on create new virtual hard drive
19
Click on default VDI to accept unless you have specific files.
19
Click on default VDI to accept unless you have specific files.
Click on next button after accepting dynamically allocated
20
You can use default, location, size and name of virtual disk by click create button.
20
You can use default, location, size and name of virtual disk by click create button.
Click on system section
21
Click unchecked “Floppy” option
21
Click unchecked “Floppy” option
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Click storage and in attribute section click CD/DVD icon. Choose ISO image you want to install.
Click start on VM highlights
Click start on VM highlights
VM will boot into installation as usual where you can proceed. In our case, it is Oracle Linux 6.
23
23
Sub-task 2
Virtual Machine Network set up
Practice 1- Setting up a Virtual Network
1. Deactivation of Ethernet interfaces
virtpc1@virtpc1:~$ ifconfig –a
enp0s3, enp0s8, lo
virtpc1@virtpc1:~$ ifconfig –s
enp0s3, lo
virtpc1@virtpc1:~$ sudo ifconfig enp0s3 down
virtpc2@virtpc2:~$ ifconfig –a
enp0s3, lo
virtpc2@virtpc2:~$ ifconfig –s
enp0s3, lo
virtpc2@virtpc2:~$ sudo ifconfig enp0s3 down
virtpc3@virtpc3:~$ ifconfig –a
enp0s3, enp0s8, lo
virtpc3@virtpc3:~$ ifconfig –s
enp0s3, lo
5. Using route command
Virtual Machine Network set up
Practice 1- Setting up a Virtual Network
1. Deactivation of Ethernet interfaces
virtpc1@virtpc1:~$ ifconfig –a
enp0s3, enp0s8, lo
virtpc1@virtpc1:~$ ifconfig –s
enp0s3, lo
virtpc1@virtpc1:~$ sudo ifconfig enp0s3 down
virtpc2@virtpc2:~$ ifconfig –a
enp0s3, lo
virtpc2@virtpc2:~$ ifconfig –s
enp0s3, lo
virtpc2@virtpc2:~$ sudo ifconfig enp0s3 down
virtpc3@virtpc3:~$ ifconfig –a
enp0s3, enp0s8, lo
virtpc3@virtpc3:~$ ifconfig –s
enp0s3, lo
5. Using route command
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
virtpc1@virtpc1:~$ route
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s3
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s8
virtpc2@virtpc2:~$ route
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s3
virtpc3@virtpc3:~$ route
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s3
192.168.3.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s8
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s3
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s8
virtpc2@virtpc2:~$ route
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s3
virtpc3@virtpc3:~$ route
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s3
192.168.3.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s8
Practice 2- Enabling Routing
1. Using the route command
For virtpc1
#route add -net 192.168.3.0/24 gw 192.168.1.3 dev enp0s3
For virtpc2
#route add default gw 192.168
For virtpc3
#route add -net 192.168.2.0/24 gw 192.168.1.1 dev enp0s3
For virtpc4
#route add default gw 192.168.3.3
2. Using the sysctl command to switch on IP forwarding
virtpc1@virtpc1:~$sysctl net.ipv4.ip_forward
sysctl net.ipv4.ip_forward = 0
virtpc1@virtpc1:~$sudo sysctl net.ipv4.ip_forward=1
sysctl net.ipv4.ip_forward = 1
virtpc3@virtpc3:~$sysctl net.ipv4.ip_forward
sysctl net.ipv4.ip_forward = 0
virtpc3@virtpc3:~$sudo sysctl net.ipv4.ip_forward=1
sysctl net.ipv4.ip_forward = 1
1. Using the route command
For virtpc1
#route add -net 192.168.3.0/24 gw 192.168.1.3 dev enp0s3
For virtpc2
#route add default gw 192.168
For virtpc3
#route add -net 192.168.2.0/24 gw 192.168.1.1 dev enp0s3
For virtpc4
#route add default gw 192.168.3.3
2. Using the sysctl command to switch on IP forwarding
virtpc1@virtpc1:~$sysctl net.ipv4.ip_forward
sysctl net.ipv4.ip_forward = 0
virtpc1@virtpc1:~$sudo sysctl net.ipv4.ip_forward=1
sysctl net.ipv4.ip_forward = 1
virtpc3@virtpc3:~$sysctl net.ipv4.ip_forward
sysctl net.ipv4.ip_forward = 0
virtpc3@virtpc3:~$sudo sysctl net.ipv4.ip_forward=1
sysctl net.ipv4.ip_forward = 1
To create the network set up on topology, you must create new VM. By use default functions in
Ubuntu server, it appears as shown below (Chalakudi,.., 2019).
We have to clone Ubuntu servers to create environment for PC and routers on our emulated
network. Right click on Ubuntu server and select clone.
24
Ubuntu server, it appears as shown below (Chalakudi,.., 2019).
We have to clone Ubuntu servers to create environment for PC and routers on our emulated
network. Right click on Ubuntu server and select clone.
24
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Check the box as shown below and press next.
Check linked clone and press clone.
25
Repeat process for VM you want.
Check linked clone and press clone.
25
Repeat process for VM you want.
26
Task 4
IPv4 subneting
AS Number Location Department Users
1 Brisbane Campus
Building 1
Legal 120
Accounting 370
Brisbane campus
Building 2
HQ 1580
Engineering 200
2 Melbourne Sales 75
Sydney Sales 110
3 Perth Operation1 2150
Operation2 975
Sales 575
By use of the following formula:
Hints:
2^6= 64; 2^7= 128; 2^8= 256; 2^9= 512; 2^10 = 1, 024; 2^11 = 2,048; 2^12 = 4,096.
For scenario number 1:
Under Brisbane campus building 1 , we will have 7 subnets under the legal department and 9
subnets under accounting departments. At the building 2, we will have 11 subnets in HQ and 8
subnets in engineering department. The distribution of the subnets is based on the number of users
and since the we use 2^n where n is the number of subneting. The value got means that is the
number of users that are supposed to use that subnet. The number of users must be within the range
of the n value not less but if its more then it is okay. In our case on building1 120 ranges within n=7
and 370 is n=9. In building2, 1580 users fits 11 subnets.
For scenario 2:
Under Melbourne sales, we will have 7 subnets and 7 in Sydney sales. This subnets are distributed
accordingly where the subnets are not below the number of users when they share. The distribution
of the subnets is based on the number of users and since the we use 2^n where n is the number of
subneting. The value got means that is the number of users that are supposed to use that subnet. In
both cities it means that the value of n= 7 hence it will fit 75 and 110 users.
For scenario 3:
Under Perth, we will have 12 subnets under operations1 and 10 subnets in both operations2 and
sales. The distribution of the subnets is based on the number of users and since the we use 2^n
where n is the number of subneting. The value got means that is the number of users that are
supposed to use that subnet. In Perth the subnets are distributed to fit the users.
IPv4 subneting
AS Number Location Department Users
1 Brisbane Campus
Building 1
Legal 120
Accounting 370
Brisbane campus
Building 2
HQ 1580
Engineering 200
2 Melbourne Sales 75
Sydney Sales 110
3 Perth Operation1 2150
Operation2 975
Sales 575
By use of the following formula:
Hints:
2^6= 64; 2^7= 128; 2^8= 256; 2^9= 512; 2^10 = 1, 024; 2^11 = 2,048; 2^12 = 4,096.
For scenario number 1:
Under Brisbane campus building 1 , we will have 7 subnets under the legal department and 9
subnets under accounting departments. At the building 2, we will have 11 subnets in HQ and 8
subnets in engineering department. The distribution of the subnets is based on the number of users
and since the we use 2^n where n is the number of subneting. The value got means that is the
number of users that are supposed to use that subnet. The number of users must be within the range
of the n value not less but if its more then it is okay. In our case on building1 120 ranges within n=7
and 370 is n=9. In building2, 1580 users fits 11 subnets.
For scenario 2:
Under Melbourne sales, we will have 7 subnets and 7 in Sydney sales. This subnets are distributed
accordingly where the subnets are not below the number of users when they share. The distribution
of the subnets is based on the number of users and since the we use 2^n where n is the number of
subneting. The value got means that is the number of users that are supposed to use that subnet. In
both cities it means that the value of n= 7 hence it will fit 75 and 110 users.
For scenario 3:
Under Perth, we will have 12 subnets under operations1 and 10 subnets in both operations2 and
sales. The distribution of the subnets is based on the number of users and since the we use 2^n
where n is the number of subneting. The value got means that is the number of users that are
supposed to use that subnet. In Perth the subnets are distributed to fit the users.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Task 5
Reflections
I used putty emulator software to log into Linux server from a Window OS. It was fine to use alone
but when i combine with Xming then it was a nice compliment. Xming is a software used mainly
for graphic displays in a remote Linux servers. It was more efficient when I combined the two. It
was simple to use them since i just install and follow some few instructions. I also used Graphical
User Interface which is available in Linux platform to edit files. During the session, i was privileged
to move my files. Unfortunately, I didn’t control the remote computer during file upload and
download from local computer.
29
Reflections
I used putty emulator software to log into Linux server from a Window OS. It was fine to use alone
but when i combine with Xming then it was a nice compliment. Xming is a software used mainly
for graphic displays in a remote Linux servers. It was more efficient when I combined the two. It
was simple to use them since i just install and follow some few instructions. I also used Graphical
User Interface which is available in Linux platform to edit files. During the session, i was privileged
to move my files. Unfortunately, I didn’t control the remote computer during file upload and
download from local computer.
29
Conclusion
File transfer is easy since one can drag and drop them or use upload and download button. If you
right click on the file you would like to transfer, menu will pop-up where there are several options
such as creating a new directory; rename, deleting or opening the files. Windows operating systems
have desktop connection. If two or more computers are connected using internet, then you will be
able to access several network resources from the one computer to other. It is only possible if you
have login from both systems (Salman,.., 2019, March, pp. 25-34).
30
File transfer is easy since one can drag and drop them or use upload and download button. If you
right click on the file you would like to transfer, menu will pop-up where there are several options
such as creating a new directory; rename, deleting or opening the files. Windows operating systems
have desktop connection. If two or more computers are connected using internet, then you will be
able to access several network resources from the one computer to other. It is only possible if you
have login from both systems (Salman,.., 2019, March, pp. 25-34).
30
Reference
Sadry, N., Western Digital Technologies Inc, 2019. Methods and systems for privileged execution
support for file system commands on a storage device. U.S. Patent Application 16/126,579.
Almasan, R.I., Freed, J. and Wang, K., American Express Travel Related Services Co Inc, 2019.
Decreasing downtime of computer systems using predictive detection. U.S. Patent Application
15/813,953.
Isa, F.M., Saad, S., Fadzil, A.F.A. and Saidi, R.M., 2019. Comprehensive Performance Assessment
on Open Source Intrusion Detection System. In Proceedings of the Third International Conference
on Computing, Mathematics and Statistics (iCMS2017) (pp. 45-51). Springer, Singapore.
Praptodiyono, S., Sofhan, R., Pramudyo, A.S., Firmansyah, T. and Osman, A., 2019. Performance
comparison of transmitting jumbo frame on Windows and Linux System. TELKOMNIKA, 17(1),
pp.68-75.
Chalakudi, S. and Yin, M., American Express Travel Related Services Co Inc, 2019. Systems and
methods for data file transfer balancing and control on blockchain. U.S. Patent Application
15/682,180.
Cath, A., Acharya, M., Crameri, O., Lecoultre, R.J. and Krishnamurthy, K., Cisco Technology Inc,
2019. Isolation of untrusted code in operating system without isolation capability. U.S. Patent
Application 10/216,926.
Ivanov, D., Mitevski, M., Gelev, E., Pavlov, D. and Mitsov, G., VMware Inc, 2019. Methods and
apparatus for deploying a distributed system using operating system virtualization. U.S. Patent
Application 15/638,636.
Salman, H., Uddin, M.N., Acheampong, S. and Xu, H., 2019, March. Design and Implementation of
IoT Based Class Attendance Monitoring System Using Computer Vision and Embedded Linux
Platform. In Workshops of the International Conference on Advanced Information Networking and
Applications (pp. 25-34). Springer, Cham.
Zhang, T., Ju, L., Zhai, J., Song, Y., Song, J. and Ma, C., 2019. miRLocator: A Python
Implementation and Web Server for Predicting miRNAs from Pre-miRNA Sequences. In Plant
MicroRNAs (pp. 89-97). Humana Press, New York, NY.
Shimpi, S.S., Colton, T.C., Varma, M.G., Moriarty, G.S., Peters, M.B. and Jandhyala, P.D.,
American Express Travel Related Services Co Inc, 2019. Predictive Communication System. U.S.
Patent Application 15/719,327.
Aaqib, S.M. and Sharma, L., 2019. Evaluation and Comparison of Security Mechanisms In-Place in
Various Web Server Systems. In Software Engineering (pp. 441-447). Springer, Singapore.
Bailey, B., 2019. NASA IV&V's Cyber Range for Space Systems.
Elder, D.J., Kennedy, D.B., Kurman, M. and Mahabir, J., American Express Travel Related Services
Co Inc, 2019. Point Value Exchange System. U.S. Patent Application 15/674,315.
31
Sadry, N., Western Digital Technologies Inc, 2019. Methods and systems for privileged execution
support for file system commands on a storage device. U.S. Patent Application 16/126,579.
Almasan, R.I., Freed, J. and Wang, K., American Express Travel Related Services Co Inc, 2019.
Decreasing downtime of computer systems using predictive detection. U.S. Patent Application
15/813,953.
Isa, F.M., Saad, S., Fadzil, A.F.A. and Saidi, R.M., 2019. Comprehensive Performance Assessment
on Open Source Intrusion Detection System. In Proceedings of the Third International Conference
on Computing, Mathematics and Statistics (iCMS2017) (pp. 45-51). Springer, Singapore.
Praptodiyono, S., Sofhan, R., Pramudyo, A.S., Firmansyah, T. and Osman, A., 2019. Performance
comparison of transmitting jumbo frame on Windows and Linux System. TELKOMNIKA, 17(1),
pp.68-75.
Chalakudi, S. and Yin, M., American Express Travel Related Services Co Inc, 2019. Systems and
methods for data file transfer balancing and control on blockchain. U.S. Patent Application
15/682,180.
Cath, A., Acharya, M., Crameri, O., Lecoultre, R.J. and Krishnamurthy, K., Cisco Technology Inc,
2019. Isolation of untrusted code in operating system without isolation capability. U.S. Patent
Application 10/216,926.
Ivanov, D., Mitevski, M., Gelev, E., Pavlov, D. and Mitsov, G., VMware Inc, 2019. Methods and
apparatus for deploying a distributed system using operating system virtualization. U.S. Patent
Application 15/638,636.
Salman, H., Uddin, M.N., Acheampong, S. and Xu, H., 2019, March. Design and Implementation of
IoT Based Class Attendance Monitoring System Using Computer Vision and Embedded Linux
Platform. In Workshops of the International Conference on Advanced Information Networking and
Applications (pp. 25-34). Springer, Cham.
Zhang, T., Ju, L., Zhai, J., Song, Y., Song, J. and Ma, C., 2019. miRLocator: A Python
Implementation and Web Server for Predicting miRNAs from Pre-miRNA Sequences. In Plant
MicroRNAs (pp. 89-97). Humana Press, New York, NY.
Shimpi, S.S., Colton, T.C., Varma, M.G., Moriarty, G.S., Peters, M.B. and Jandhyala, P.D.,
American Express Travel Related Services Co Inc, 2019. Predictive Communication System. U.S.
Patent Application 15/719,327.
Aaqib, S.M. and Sharma, L., 2019. Evaluation and Comparison of Security Mechanisms In-Place in
Various Web Server Systems. In Software Engineering (pp. 441-447). Springer, Singapore.
Bailey, B., 2019. NASA IV&V's Cyber Range for Space Systems.
Elder, D.J., Kennedy, D.B., Kurman, M. and Mahabir, J., American Express Travel Related Services
Co Inc, 2019. Point Value Exchange System. U.S. Patent Application 15/674,315.
31
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Slapp III, R.J., E&C HOLDING COMPANY LLC, 2019. Virtual classroom management delivery
system and method. U.S. Patent Application 10/187,192.
Richards, G., Yeoh, W., Chong, A. Y. L., & Popovič, A. (2019). Business intelligence effectiveness
and corporate performance management: an empirical analysis. Journal of Computer Information
Systems, 59(2), 188-196.
Hill, G., Al-Aqrabi, H., Lane, P., & Aagela, H. (2019, January). Securing Manufacturing Business
Intelligence for the Industrial Internet of Things. In Fourth International Congress on Information
and Communication Technology (p. 174). Springer Verlag.
Popovič, A., Puklavec, B., & Oliveira, T. (2019). Justifying business intelligence systems adoption
in SMEs: Impact of systems use on firm performance. Industrial Management & Data Systems,
119(1), 210-228.
Isazad Mashinchi, M., Ojo, A., & Sullivan, F. J. (2019, January). Analysis of Business Intelligence
Applications in Healthcare Organizations. In Proceedings of the 52nd Hawaii International
Conference on System Sciences.
Anderson, C. (2019). Business Intelligence. In Data Science in Practice (pp. 97-118). Springer,
Cham.
Vidal-García, J., Vidal, M., & Barros, R. H. (2019). Computational business intelligence, big data,
and their role in business decisions in the age of the internet of things. In Web Services: Concepts,
Methodologies, Tools, and Applications (pp. 1048-1067). IGI Global.
Herschel, R. T. (2019). Business Intelligence. In Advanced Methodologies and Technologies in
Business Operations and Management (pp. 578-588). IGI Global.
Olszak, C., Goyal, S., & Zurada, J. (2019, January). Introduction to the Minitrack on Business
Intelligence and Big Data for Innovative and Sustainable Development of Organizations. In
Proceedings of the 52nd Hawaii International Conference on System Sciences.
Shah, S., SHAH, K. R., & Shah, J. N. (2019). U.S. Patent Application No. 16/135,218.
Alm, A. (2019). Internet of Things mesh network: Using the Thread networking protocol.
Peixiao, L. I. N., Chopra, A., Wing, D. G., Ganti, V., Corde, C., & Patil, A. (2019). U.S. Patent
Application No. 16/112,648.
Laborde, R., Bulusu, S. T., Wazan, A. S., Barrère, F., & Benzekri, A. (2019, April). Logic-based
methodology to help security architects in eliciting high-level network security requirements. In
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (pp. 1610-1619). ACM.
Yu, H., Qi, H., & Li, K. (2019). WECAN: an Efficient West-East Control Associated Network for
Large-Scale SDN Systems. Mobile Networks and Applications, 1-11.
Wnuk, P., Kościelny, J. M., Syfert, M., & Ciepiela, P. (2019, March). The Issue of Adaptation of
Diagnostic System to Protect Industrial Control Systems Against Cyber Threads. In Conference on
Automation (pp. 258-267). Springer, Cham.
32
system and method. U.S. Patent Application 10/187,192.
Richards, G., Yeoh, W., Chong, A. Y. L., & Popovič, A. (2019). Business intelligence effectiveness
and corporate performance management: an empirical analysis. Journal of Computer Information
Systems, 59(2), 188-196.
Hill, G., Al-Aqrabi, H., Lane, P., & Aagela, H. (2019, January). Securing Manufacturing Business
Intelligence for the Industrial Internet of Things. In Fourth International Congress on Information
and Communication Technology (p. 174). Springer Verlag.
Popovič, A., Puklavec, B., & Oliveira, T. (2019). Justifying business intelligence systems adoption
in SMEs: Impact of systems use on firm performance. Industrial Management & Data Systems,
119(1), 210-228.
Isazad Mashinchi, M., Ojo, A., & Sullivan, F. J. (2019, January). Analysis of Business Intelligence
Applications in Healthcare Organizations. In Proceedings of the 52nd Hawaii International
Conference on System Sciences.
Anderson, C. (2019). Business Intelligence. In Data Science in Practice (pp. 97-118). Springer,
Cham.
Vidal-García, J., Vidal, M., & Barros, R. H. (2019). Computational business intelligence, big data,
and their role in business decisions in the age of the internet of things. In Web Services: Concepts,
Methodologies, Tools, and Applications (pp. 1048-1067). IGI Global.
Herschel, R. T. (2019). Business Intelligence. In Advanced Methodologies and Technologies in
Business Operations and Management (pp. 578-588). IGI Global.
Olszak, C., Goyal, S., & Zurada, J. (2019, January). Introduction to the Minitrack on Business
Intelligence and Big Data for Innovative and Sustainable Development of Organizations. In
Proceedings of the 52nd Hawaii International Conference on System Sciences.
Shah, S., SHAH, K. R., & Shah, J. N. (2019). U.S. Patent Application No. 16/135,218.
Alm, A. (2019). Internet of Things mesh network: Using the Thread networking protocol.
Peixiao, L. I. N., Chopra, A., Wing, D. G., Ganti, V., Corde, C., & Patil, A. (2019). U.S. Patent
Application No. 16/112,648.
Laborde, R., Bulusu, S. T., Wazan, A. S., Barrère, F., & Benzekri, A. (2019, April). Logic-based
methodology to help security architects in eliciting high-level network security requirements. In
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (pp. 1610-1619). ACM.
Yu, H., Qi, H., & Li, K. (2019). WECAN: an Efficient West-East Control Associated Network for
Large-Scale SDN Systems. Mobile Networks and Applications, 1-11.
Wnuk, P., Kościelny, J. M., Syfert, M., & Ciepiela, P. (2019, March). The Issue of Adaptation of
Diagnostic System to Protect Industrial Control Systems Against Cyber Threads. In Conference on
Automation (pp. 258-267). Springer, Cham.
32
Yu.E. Khokhlov, F.S. Voroiskiy, "Projecting of distributed logical library network LibWeb",
Telematics 97: Materials of All-Russian scientific methodical conference, pp. 26-30, 1996.
V.A. Kozlov, Creation of single information space of Russia by applying international standards
//Standards and Quality, pp. 2, 1996.
NIST Special Publication 500 220, Computer System Laboratory (CSL), October. 1994.
Yakubov M. Kh, Information flows management in the network of distributed data bases of
documental information on the basis of imitation modeling. Informational announcement 264,
Tashkent:Publishing house FAN, 1981.
B. Haines, T. Kramer, "802.11 Wireless - Infrastructure Attacks" in Seven Deadliest Wireless
Technology Attacks, New York:Elsevier, pp. 01-05, 2010.
Chen, J.-C., Wang, Y.-P.: Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and
empirical experience. IEEE Communication Magzine 43(12), s26–s32 (2005)
M. Gast, "Introduction to Wireless Networks" in 802.11 Wireless Networks: The Definitive Guide,
New York:O'Reilly, pp. 01-06, 2002.
S. Sobh, Tarek, "Wi-Fi Networks Security and Accessing Control" in , International Journal of
Computer Network and Information Security (IJCNIS), vol. 5, no. 7, pp. 9, 2013.
M. Le. Tung, Liu Ren Ping, Hedlev Mark, "Rogue access point detection and localization", Personal
Indoor and Mobile Radio Communications (PIMRC) 2012 IEEE 23rd International Symposium on.
IEEE, 2012.
Ivy, J., Lee, S. B., Franz, D., & Crumpton, J. (2019). Seeding Cybersecurity Workforce Pathways
With Secondary Education. Computer, 52(3), 67-75.
Petit, J. (2019). Automated Vehicles Cybersecurity: Summary AVS’17 and Stakeholder Analysis. In
Road Vehicle Automation 5 (pp. 171-181). Springer, Cham.
Chothia, T., Novakovic, C., Radu, A. I., & Thomas, R. J. (2019). Choose Your Pwn Adventure:
Adding Competition and Storytelling to an Introductory Cybersecurity Course. In Transactions on
Edutainment XV (pp. 141-172). Springer, Berlin, Heidelberg.
Ahmad, T. (2019). Technology Convergence and Cybersecurity: A Critical Analysis of Cybercrime
Trends in India. 27th Convergence India Pragati Maidan, 29-31.
Harris, M. A., & Martin, R. (2019). Promoting Cybersecurity Compliance. In Cybersecurity
Education for Awareness and Compliance (pp. 54-71). IGI Global.
Denning, D. E. (2019). Is Quantum Computing a Cybersecurity Threat?. American Scientist,
107(2), 83-85.
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of
cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of
Information Management, 45, 13-24.
33
Telematics 97: Materials of All-Russian scientific methodical conference, pp. 26-30, 1996.
V.A. Kozlov, Creation of single information space of Russia by applying international standards
//Standards and Quality, pp. 2, 1996.
NIST Special Publication 500 220, Computer System Laboratory (CSL), October. 1994.
Yakubov M. Kh, Information flows management in the network of distributed data bases of
documental information on the basis of imitation modeling. Informational announcement 264,
Tashkent:Publishing house FAN, 1981.
B. Haines, T. Kramer, "802.11 Wireless - Infrastructure Attacks" in Seven Deadliest Wireless
Technology Attacks, New York:Elsevier, pp. 01-05, 2010.
Chen, J.-C., Wang, Y.-P.: Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and
empirical experience. IEEE Communication Magzine 43(12), s26–s32 (2005)
M. Gast, "Introduction to Wireless Networks" in 802.11 Wireless Networks: The Definitive Guide,
New York:O'Reilly, pp. 01-06, 2002.
S. Sobh, Tarek, "Wi-Fi Networks Security and Accessing Control" in , International Journal of
Computer Network and Information Security (IJCNIS), vol. 5, no. 7, pp. 9, 2013.
M. Le. Tung, Liu Ren Ping, Hedlev Mark, "Rogue access point detection and localization", Personal
Indoor and Mobile Radio Communications (PIMRC) 2012 IEEE 23rd International Symposium on.
IEEE, 2012.
Ivy, J., Lee, S. B., Franz, D., & Crumpton, J. (2019). Seeding Cybersecurity Workforce Pathways
With Secondary Education. Computer, 52(3), 67-75.
Petit, J. (2019). Automated Vehicles Cybersecurity: Summary AVS’17 and Stakeholder Analysis. In
Road Vehicle Automation 5 (pp. 171-181). Springer, Cham.
Chothia, T., Novakovic, C., Radu, A. I., & Thomas, R. J. (2019). Choose Your Pwn Adventure:
Adding Competition and Storytelling to an Introductory Cybersecurity Course. In Transactions on
Edutainment XV (pp. 141-172). Springer, Berlin, Heidelberg.
Ahmad, T. (2019). Technology Convergence and Cybersecurity: A Critical Analysis of Cybercrime
Trends in India. 27th Convergence India Pragati Maidan, 29-31.
Harris, M. A., & Martin, R. (2019). Promoting Cybersecurity Compliance. In Cybersecurity
Education for Awareness and Compliance (pp. 54-71). IGI Global.
Denning, D. E. (2019). Is Quantum Computing a Cybersecurity Threat?. American Scientist,
107(2), 83-85.
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of
cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of
Information Management, 45, 13-24.
33
Linkov, V., Zámečník, P., Havlíčková, D., & Pai, C. W. (2019). Human Factors in the Cybersecurity
of Autonomous Cars: Trends in Current Research. Frontiers in Psychology, 10, 995.
Dameff, C. J., Selzer, J. A., Fisher, J., Killeen, J. P., & Tully, J. L. (2019). Clinical Cybersecurity
Training Through Novel High-Fidelity Simulations. The Journal of emergency medicine, 56(2),
233-238.
Mcdonald, J., Hansen, D., Balzotti, J., Tanner, J., Winters, D., Giboney, J., & Bonsignore, E. (2019,
January). Designing Authentic Cybersecurity Learning Experiences: Lessons from the Cybermatics
Playable Case Study. In Proceedings of the 52nd Hawaii International Conference on System
Sciences.
Cohen, S. A. (2019). Cybersecurity for Critical Infrastructure: Addressing Threats and
Vulnerabilities in Canada.
Ricci, J., Breitinger, F., & Baggili, I. (2019). Survey results on adults and cybersecurity education.
Education and Information Technologies, 24(1), 231-249.
Lédeczi, Á., Zare, H., & Stein, G. (2019, February). NetsBlox and Wireless Robots Make
Cybersecurity Fun. In Proceedings of the 50th ACM Technical Symposium on Computer Science
Education (pp. 1290-1290). ACM.
Jalali, M. S., Razak, S., Gordon, W., Perakslis, E., & Madnick, S. (2019). Health Care and
Cybersecurity: Bibliometric Analysis of the Literature. Journal of medical Internet research, 21(2),
e12644.
6
Addae, J. H., Sun, X., Towey, D., & Radenkovic, M. (2019). Exploring user behavioral data for
adaptive cybersecurity. User Modeling and User-Adapted Interaction, 1-50.
Zong, S., Ritter, A., Mueller, G., & Wright, E. (2019). Analyzing the Perceived Severity of
Cybersecurity Threats Reported on Social Media. arXiv preprint arXiv:1902.10680.
Li, N. and Mahalik, N.P., 2019. A big data and cloud computing specification, standards and
architecture: agricultural and food informatics. International Journal of Information and
Communication Technology, 14(2), pp.159-174.
Alnafessah, A. and Casale, G., 2019. Anomaly Detection for Big Data Technologies. In 2018
Imperial College Computing Student Workshop (ICCSW 2018). Schloss Dagstuhl-Leibniz-Zentrum
fuer Informatik.
Mehta, S. and Kaur, P., 2019. Scheduling Data Intensive Scientific Workflows in Cloud
Environment Using Nature Inspired Algorithms. In Nature-Inspired Algorithms for Big Data
Frameworks (pp. 196-217). IGI Global.
Yan, H., Yu, P. and Long, D., 2019, January. Study on Deep Unsupervised Learning Optimization
Algorithm Based on Cloud Computing. In 2019 International Conference on Intelligent
Transportation, Big Data & Smart City (ICITBS) (pp. 679-681). IEEE.
Yao, Y., 2019. Emerging Cloud Computing Services: A Brief Opinion Article. In Cloud Security:
Concepts, Methodologies, Tools, and Applications (pp. 2213-2218). IGI Global.
34
of Autonomous Cars: Trends in Current Research. Frontiers in Psychology, 10, 995.
Dameff, C. J., Selzer, J. A., Fisher, J., Killeen, J. P., & Tully, J. L. (2019). Clinical Cybersecurity
Training Through Novel High-Fidelity Simulations. The Journal of emergency medicine, 56(2),
233-238.
Mcdonald, J., Hansen, D., Balzotti, J., Tanner, J., Winters, D., Giboney, J., & Bonsignore, E. (2019,
January). Designing Authentic Cybersecurity Learning Experiences: Lessons from the Cybermatics
Playable Case Study. In Proceedings of the 52nd Hawaii International Conference on System
Sciences.
Cohen, S. A. (2019). Cybersecurity for Critical Infrastructure: Addressing Threats and
Vulnerabilities in Canada.
Ricci, J., Breitinger, F., & Baggili, I. (2019). Survey results on adults and cybersecurity education.
Education and Information Technologies, 24(1), 231-249.
Lédeczi, Á., Zare, H., & Stein, G. (2019, February). NetsBlox and Wireless Robots Make
Cybersecurity Fun. In Proceedings of the 50th ACM Technical Symposium on Computer Science
Education (pp. 1290-1290). ACM.
Jalali, M. S., Razak, S., Gordon, W., Perakslis, E., & Madnick, S. (2019). Health Care and
Cybersecurity: Bibliometric Analysis of the Literature. Journal of medical Internet research, 21(2),
e12644.
6
Addae, J. H., Sun, X., Towey, D., & Radenkovic, M. (2019). Exploring user behavioral data for
adaptive cybersecurity. User Modeling and User-Adapted Interaction, 1-50.
Zong, S., Ritter, A., Mueller, G., & Wright, E. (2019). Analyzing the Perceived Severity of
Cybersecurity Threats Reported on Social Media. arXiv preprint arXiv:1902.10680.
Li, N. and Mahalik, N.P., 2019. A big data and cloud computing specification, standards and
architecture: agricultural and food informatics. International Journal of Information and
Communication Technology, 14(2), pp.159-174.
Alnafessah, A. and Casale, G., 2019. Anomaly Detection for Big Data Technologies. In 2018
Imperial College Computing Student Workshop (ICCSW 2018). Schloss Dagstuhl-Leibniz-Zentrum
fuer Informatik.
Mehta, S. and Kaur, P., 2019. Scheduling Data Intensive Scientific Workflows in Cloud
Environment Using Nature Inspired Algorithms. In Nature-Inspired Algorithms for Big Data
Frameworks (pp. 196-217). IGI Global.
Yan, H., Yu, P. and Long, D., 2019, January. Study on Deep Unsupervised Learning Optimization
Algorithm Based on Cloud Computing. In 2019 International Conference on Intelligent
Transportation, Big Data & Smart City (ICITBS) (pp. 679-681). IEEE.
Yao, Y., 2019. Emerging Cloud Computing Services: A Brief Opinion Article. In Cloud Security:
Concepts, Methodologies, Tools, and Applications (pp. 2213-2218). IGI Global.
34
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Manacero, A., Lobato, R. and Cavenaghi, M., 2019. AMFC Tool: Auditing and Monitoring for
Cloud Computing. Economics of Grids, Clouds, Systems, and Services, p.126.
Dabas, C. and Aggarwal, J., 2019. An Intensive Review of Data Replication Algorithms for Cloud
Systems. In Emerging Research in Computing, Information, Communication and Applications (pp.
25-39). Springer, Singapore.
35
Cloud Computing. Economics of Grids, Clouds, Systems, and Services, p.126.
Dabas, C. and Aggarwal, J., 2019. An Intensive Review of Data Replication Algorithms for Cloud
Systems. In Emerging Research in Computing, Information, Communication and Applications (pp.
25-39). Springer, Singapore.
35
1 out of 44
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.