...Student Name _________________________________ Date _____________ SEC450 Database Traffic Load iLab Objectives In this lab, the students will examine the following objectives. • Creating Database traffic using the traffic generator • Specifying link statistics to monitor traffic flow • Running discrete event simulation (DES) • Adjusting link speeds to handle Database traffic. Scenario A small company is using the topology shown below. The Public Server is actually an offsite Database Server that contains company records. Assume that the 200.100.0.0/16 network represents the Internet. The Dallas and Chicago Servers and Hosts need to access the database server. Only users in the Dallas and Chicago LANs should be able to access the database server. Topology The last page of the lab assignment document contains a full page Topology. Remove this page and use it for reference to the topology and the IP addresses. Initial OpNet Preparation The Week 5 iLab is entitled Database Traffic Load. The following steps show how to create the project required for the Week 5 iLab. • Log into the Citrix iLab Environment (lab.devry.edu). • Click on the OpNet 17 icon. • Click the Accept button to Open OpNet 17. • Click File/Open and navigate to the F:\op_models\SEC450\SEC450.project\SEC450 file and click Open. • In OpNet 17 with the SEC450 project open, click File/Save As. • Save the project in...
Words: 1003 - Pages: 5
...At 2:40pm MT on 2/17/2016, the Credit LEAD database encountered a row lock. As a result, database connections maxed out, causing the Credit LEAD application to become unavailable at 2:48pm. A restart of the application servers was conducted at approximately 2:55pm, clearing out any row locks in the database. Application service was restored and validated at 3:11pm. Root cause appears to be related to an increased latency causing performance issues with the Credit LEAD application. Reports indicate the application servers had sufficient memory and CPU to handle the database calls. Additionally, the database showed very quick response times. There was a report of increased response times (latency) from 2:40pm to 2:52pm. However, there is no...
Words: 662 - Pages: 3
...Administration & Security II • BCIT • April 18, 2010 TABLE OF CONTENTS Summary 3 Introduction 3 Network #1 4 Detection Overview 4 IP Address Locations 6 Malicious Traffic – TCP 7 Malicious Traffic – UDP 10 Reconnaissance Traffic 11 High Risk Addresses 12 Network #2 16 Detection Overview 16 IP Address Locations 17 Network #3 18 Detection Overview 18 Detection Overview 18 Traffic Overview 19 Conclusions 20 Page 2 of 20 SUMMARY An overview of the data for all three networks shows that each network was compromised in one manner or another. For instance, network #1 had intrusive access via a Microsoft ISS web server to cmd.exe, which allowed complete access to the system. This was achieved through a buffer overflow attack against IIS. As such, the administrator of this network should ensure that all systems are fully patched in order to avoid known exploits. For network #2, an exploit via phpBB enabled access to the system. Network #3, “EXPLOI~1.RTF”, which a user must have downloaded, was executed, opening up a backdoor into the system. Unfortunately, as outlined in my conclusion, an in-depth analysis of this data was aborted partly due to time mismanagement and a very large course load for the term. INTRODUCTION This assignment consisted of the analysis of three different networks with their own associated log files and packet dumps. In total, the data to be analyzed consisted...
Words: 3055 - Pages: 13
...IMPLEMENTATION AND ANALYSIS OF A WIDE AREA NETWOK (A FEASIBILITY REPORT) BY ISAIAH ADEBAYO STUDENT’S NAME WITH 3121658 STUDENT’S NUMBER COMPUTER SYSTEMS AND NETWORKING ENGINEERING (CSN)-FULL TIME SUBMITTED TO: DR VINCENT SIYAU (SUPERVISOR) TABLE OF CONTENTS CHAPTER ONE 1.0 AIM.............................................................................................................................Page 3 1.1 OBJECTIVES.............................................................................................................Page 3 1.2 INTRODUCTION......................................................................................................Page 4 1.3 EQUIPMENTS USED............................................................................................... Page 4 CHAPTER TWO 2.0 METHODS AND PROCEDURES............................................................................Page 5 2.1 PRESENT NETWORK OVERVIEW........................................................................Page 5 2.2 MAIN OFFICE NETWORK......................................................................................Page 7 2.3 SUBNET OFFICE NETWORK.................................................................................Page 7 2.4 BUSY NETWORK SCENARIO...............................................................................Page 7 CHAPTHER THREE 3.0 PROPOSED NETWORK SCENARIO....................................................
Words: 1948 - Pages: 8
...WCDMA : KPI ANALYSIS & OPTIMIZATION Network planning& Optimization Illustration on RAN KPI-RU20 SRNC Relocation RNC Accessibility: RRC Setup & Access Rate RAB Setup & Access Rate Call Setup Success Rate PS setup success rate (NRT,HSDPA, HSUPA) SRNC UE BTS1 X Retainability: RRC Drop Rate RAB Drop Rate PS success rate (NRT, HSDPA, HSUPA) RNC Usage: Cell Availability Ave. Uplink Load Ave. Downlink Load HSDPA Throughput Cell Throughput Mobility: SHO/ISHO Success Rate SHO Overhead HDSPA/HSUPA SCC success / Date Presentation / Author rate BTS2 X Preemption Genuine Call Setup Failure Scenarios – RF issue • Interference / Dominance / Coverage • Missing neighbour – System Issue - BTS • No response to “RRC Connection Request” • “RRC Connection Reject” to “RRC Connection Request” – System issue - RNC • “CC Disconnect” after “Call Proceeding” due to “DL RRC Connection Release” – Core NW • “CM Service Abort” after “CM Service Request” – System issue (test number) • “CC Disconnect” after “CC Progress” Genuine Drop Call scenarios RF issue – Interference / Dominance / Coverage – Missing Neighbours System issue BTS – Sudden “CC Disconnect” due to “DL RRC Connection Release” – Sudden drop to idle, no disconnect messaging System issue RNC – Sudden “CC Disconnect” due to “DL RRC Connection Release” KPI Definitions The KPIs to be monitored from the RAN could be: – Cell availability – Call Setup Success Rate (CSSR) – Call Drop rate – SHO/ISHO/HSPA SCC success rate – Packet...
Words: 5805 - Pages: 24
...Load Balancing Microsoft Exchange 2013 Deployment Guide v1.0.19 Copyright © 2014 Loadbalancer.org, Inc. 1 Table of Contents About this Guide............................................................................................................................................... 4 Appliances Supported....................................................................................................................................... 4 Microsoft Exchange Software Versions Supported...........................................................................................4 Loadbalancer.org Software Versions Supported............................................................................................... 4 Exchange Server 2013..................................................................................................................................... 5 Exchange 2013 Server Roles........................................................................................................................... 5 Load Balancing Exchange 2013....................................................................................................................... 6 Load Balancing & HA Requirements............................................................................................................ 6 Client Access Array................................................................................................................................. 6 Database Availability...
Words: 8763 - Pages: 36
...The World Wide Web provides a new paradigm in computer networking for human communication, which had an impact on the delivery of information and continues to stand in rapid developments. The word Web Technology represents a discontinuity in the way applications are connected. Using the Web Technology as the basis for an application brings substantial advantages to the adopter. This report focuses on 2-tier architecture and mainly on the 3-tier architecture, which is the present web technology. This report will also review the client-side scripting and the server-side scripting. TABLE OF CONTENTS EXECUTIVE SUMMARY 2 1. Introduction 3 2. Need for technology 4 3. Terminology 5 4. 2-Tier Architecture 5 5. 3-Tier Architecture 7 6. Client Server Architecture 10 7. Conclusion 12 REFERENCES 13 1. INTRODUCTION Web sites have quickly evolved from simple, static pages to complex Web applications performing critical operations for many businesses. These applications involve dynamic data from multiple sources; ever changing and various features for e-commerce, personalization and many more. At the same time, customers and internal users have understandably come to expect and demand more and more sophistication in the Web-based applications they use every day. The result? Web application solution providers — and their client companies — face several new challenges. They must meet or exceed...
Words: 2397 - Pages: 10
...Staying Just in Time for the Holidays North Pole Workshops is faced with a multitude of demand planning, production and logistics problems. With just five weeks left until their annual delivery due date, they are under pressure to resolve short-term issues in demand fluctuations and capacity constraints, but Santa and his team are also concerned about the long-term feasibility of delivering cheer to a growing population of believers. North Pole Workshops has room to improve in all areas of the SCOR model; that is, the plan, source, make and deliver functions need to be addressed in order to improve the overall performance of the supply chain. The short-term production issues for this holiday season involve the increasing demand for the Timmy CD and the possibility of a drastic decrease in demand for the Meowrrr. However, Santa’s elves are also aware of increasing demand from China and Eastern Europe, and since those markets are assumed to be unaffected by the negative commentary on the Meowrrr, the excess product can be used as safety stock for those growing regions. Because they already have more Meowrrrs on hand than predicted demand, the production capacity of Meowrrrs can be completely turned over to the other products based on the next trend. This may be the number 2 and number 3 items for that age group (girls 8-15), but they should also do some quick analysis of TV ads in North America to determine any up-and-coming trends in December for that...
Words: 1107 - Pages: 5
...travel time, reliability, safety, comfort and security are also important, as well as environmental impacts. Trucks: In countries where large-scale intercity trucking operates efficiently in medium-income countries with predominantly flat terrain, recent experience is that the transport cost per km for a truck-trailer is between US$0.75 and US$ 1.25. For a typical load of 20 tonnes, this works out at US cents 4-6 per tonne km. By contrast efficient small-scale transport in rural areas using small trucks may have a cost of US$ 0.20-0.30 per tonne-km, although it is common for the rates to be expressed on an hourly rather than km basis. Inefficient operations may push these costs much higher. Main factors that affect trucking costs are • economies of scale in truck size, which favor the use of larger trucks, • back-haul possibilities, which depend strongly on the demand pattern, • empty running and idle time due to seasonal variations in demand, • restrictions on working hours, for example due to regulations or safety reasons, • road conditions such as mountainous terrain, deteriorated pavement and traffic congestion, • enforcement procedures along the road and at border posts, which can delay trucks and impose high unofficial payments, • standard of trucks, in terms of design and condition, which affects speed, availability and consumption rates for fuel, spares and other inputs, • availability of freight forwarding and other services, which is often poor in remote...
Words: 5263 - Pages: 22
...including the Aircraft, Airline, and Air Traffic Management are modeled as interacting control loops. The impact of Information Technologies on each of these subsystems is evaluated through the performance of these control loops. Information technologies are seen to have a significant impact on the safety, efficiency, capability, capacity, environmental impact and financial performance of the Air Transportation System and its components. T Introduction he US and International Air Transportation Systems have demonstrated remarkable growth and increased performance over the past few decades. Fig.1 demonstrates the growth in passenger and cargo traffic in international regions since 1972. Strong growth can be seen in North America and Europe which continue to dominate the passenger traffic. In addition, extraordinary growth can be seen in Asia/Pacific which has dominated the cargo traffic since the early 1990’s. Scheduled Revenue Passenger-Kilometers by Region 1400 1200 1000 RPK (billion) North America Europe Freight Tonne-Kilometers by Region 45 40 35 North America 30 FTK (billion) Europe Asia and Pacific Latin America & Caribbean Middle East Africa 800 600 400 200 0 1970 1975 1980 1985 1990 1995 2000 2005 Asia and Pacific Latin America & Caribbean Middle East Africa 25 20 15 10 5 0 1970 1975 1980 1985 1990 1995 2000 2005 Figure 1. Scheduled Passenger and Cargo Traffic by Region.1 This growth in traffic has been accompanied by an increase in safety...
Words: 6025 - Pages: 25
...Abstract AAS-Design AAS-Design is a North American fashion label specializing in luxury goods for men and women (ready-to-wear, leather accessories, shoes, luggage and hats), founded in 1990 by Abel, Angus and Satish in Virginia Beach, Virginia. Fulana inherited the company in 1995 by which time sales were up to U.S. $450,000. With John alongside her as business manager, Fulana was allowed time to implement her creativity onto design. Initial success was not instant, as they were hard to sell due to the lack of advertising and high-prices, but later become her first commercial hit. Description of technology and Communications Need: IT Department The IT Department is in the third floor of corporate building. From this place the IT department offer supports to the entire corporate building and the rest of the store in U.S. The implementation of news technology indicates the degree of business transformation varies significantly between firms. Improving processes usually involves implementing systems and process management across business function boundaries rather than within functions. IT infrastructure investments can be a constraint where systems are not compatible, or where inconsistent data models have been used in different parts of the business. (Broadbent, M., Weill, P., Clair, Don St, 1999) As companies grow, their IT Infrastructure evolves, requiring additional capacity and process efficiencies. The IT infrastructure required to support a company's operations...
Words: 4651 - Pages: 19
...Table of Content 1. Introduction………………………………………………………..…..1-2 1.1 Software Quality…………………………………………..……..2 1.2 Software Quality Assurance……………………………..……….2 1.3 Software Testing………………………………………..………2-3 2. Software Quality Assurance Tools………………………………..…….3-7 3. Selected QA Tools…………………………………………………………8 3.1 Selenium IDE…………………………………………………..9-14 3.2 FabaSoft………………………………………………………15-19 4. Future and Conclusion……………………………………………………20 1. Introduction Software Quality Assurance (SQA) Tools play a major role in common software user community and in the field of software development. SQA tools are the specially developed software tools for the purpose of assisting in the QA processes. 1.1 Software Quality The quality of software is assessed by a number of variables. These variables can be divided into external and internal quality criteria. External quality is what the user experiences when running the software in its operational mode. Internal quality refers to the aspects that are code-dependent, and are not visible to the end-user. External quality is critical to the user, while internal quality is meaningful to the developer only. When the quality comes to software quality conformance, requirement consider as software functional quality and fitness for use named as software structural quality. 1.2 Software Quality Assurance Software quality assurance (SQA) consists of a means of monitoring the software engineering process and methods used to ensure quality...
Words: 2186 - Pages: 9
...CIS210 June 16, 2014 By its very nature, the information technology field and all things related to the internet are in a constant state of improvement. Due to the high need to be able to compete in any online market successfully a company needs to be able to keep a secure, working website with an uptime as close to 100% as possible. With the very real possibility of malicious crackers trying to do damage or steal data security is of the utmost importance. One of the best ways to improve security and control is for the company to host their own website internally. The benefit’s for doing this transition will be well worth the effort but there are few points that need to be considered before making the final decision. The goal of this report is to provide information and a guide to the process of creating a secure e-commerce site with minimum downtime. Considerations: There are a few factors that need to be considered before making the move to migrate the website. * Cost-Hardware, labor, software, etc. * Security-physical and physical * Physical space- structure, square footage, additional offices etc. Solution Using the System Development Life cycle we can define an efficient way to meet our set requirements and improve the existing website. Improving on the old foundation we can minimize costs, reduce project time and save the labor costs of having to start from scratch. This way we can focus on only redesigning parts we can’t recycle and improve...
Words: 1721 - Pages: 7
...White Paper Big Data Analytics Extract, Transform, and Load Big Data with Apache Hadoop* ABSTRACT Over the last few years, organizations across public and private sectors have made a strategic decision to turn big data into competitive advantage. The challenge of extracting value from big data is similar in many ways to the age-old problem of distilling business intelligence from transactional data. At the heart of this challenge is the process used to extract data from multiple sources, transform it to fit your analytical needs, and load it into a data warehouse for subsequent analysis, a process known as “Extract, Transform & Load” (ETL). The nature of big data requires that the infrastructure for this process can scale cost-effectively. Apache Hadoop* has emerged as the de facto standard for managing big data. This whitepaper examines some of the platform hardware and software considerations in using Hadoop for ETL. – e plan to publish other white papers that show how a platform based on Apache Hadoop can be extended to W support interactive queries and real-time predictive analytics. When complete, these white papers will be available at http://hadoop.intel.com. Abstract. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 The ETL Bottleneck in Big Data Analytics The ETL Bottleneck in Big Data Analytics. . . . . . . . . . . . . . . . . . . . . . 1 Big Data refers to the large amounts, at least terabytes, of poly-structured...
Words: 6174 - Pages: 25
...Amazon Web Services ™ Amazon Web Services ™ by Bernard Golden Amazon Web Services™ For Dummies® Published by: John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, www.wiley.com Copyright © 2013 by John Wiley & Sons, Inc., Hoboken, New Jersey Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 7486008, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and may not be used without written permission. Amazon Web Services is a trademark of Amazon Technologies, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS...
Words: 121491 - Pages: 486