networking related paper

CSE50 S20 Final Exam Jianxiao Chen

Jianxiao Chen
1665315
CSE50
Jun 8, 2020

CSE50 S20 Final Exam – The iPremier Company

Question 1
I think Qdata is an IaaS model. A typical IaaS provides a company with a cloud

computing infrastructure, including servers, networks, operating systems, and storage. Ipremier
companies used their own platforms and applications within Qdata’s infrastructure. Qdata, which
hosts most of iPremier’s computer equipment and Internet connections, offers a hybrid solution
for IPremier by combining colocation cage with Qdata’s Facility, according to Exhibit1.

Question 2

2.1
TCP Protocol is a three-way handshake protocol. The user sends a SYN request to

iPremier and then iPremier sends a SYN-ACK back to the user for confirmation. When the user
replies back the ACK, communication can occur. However, when an IPremier does not receive a
response from the user when it makes an ACK reply acknowledgement, it sends another ACK
acknowledgement within a period of time. If iPremier receives a large number of SYNs from
malicious users while waiting for a certain amount of ACK replay, the network queue will jam.
If the queue overflows, the real user will not be able to access the IPremier website.

2.2
Because when a hacker sends a SYN flood attack, TCP protocol routing is done by the

Web Server. Other Networking Elements are not in the TCP layer, thus they are not affected.
Only the Web Server in the TCP Layer will be targeted.

Question 3

DNS stands for Domain Name System. The main function of DNS is to translate domain
names into IP Addresses, which computers can understand. When a user tries to access another
computer on a network, an architecture must be in place to map names to address many name
resolution methodologies that exist on a computer (Fullerton).

DNS only identifies the domain name and converts it to IP Address, which does not
affect other network activities. DOS does not need DNS to attack because DOS works by
sending large amounts of data rather than attacking the security of the system.

5555

CSE50 S20 Final Exam Jianxiao Chen

Question 4
Inner join
The INNER JOIN selects all rows from both participating tables as long as there is a

match between the columns. An SQL INNER JOIN is the same as a JOIN clause, combining
rows from two or more tables. In this case, “Customers” and “Orders” are the two tables, and the
inner join is where both table data match the same.

Above is Pictorial presentation example of inner join (Bunoob.com)

Left outer join
SQL left outer join is also known as SQL left join. Suppose, we want to join two tables:

customers and orders. SQL left outer join returns all rows in the left table customers and all the
matching rows found in the right table orders. It means the result of the SQL left join always
contains the rows in the left table.

Above is Pictorial presentation example of left outer join (Bunoob.com)

Question 5

5.1
1) the internet router at the QData facility

a) Layer 3, Network Layer
b) Layer 2, Data Link Layer
c) Layer 1, the Physical Layer to internet router at the QData facility

5

CSE50 S20 Final Exam Jianxiao Chen

2) the router/firewall in the iPremier “cage” at QData
a) transformaport Layer and Network Layer.
b) Layer 4, transport Layer
c) Layer 3, Network Layer, reach the router/firewall in the iPremier “cage” at QData

3) the ethernet switch
a) Layer 4, transport Layer
b) Layer 3, Network Layer
c) Layer 2, Data Link Layer to the ethernet switch

4) an iPremier web server in the web server cluster
a) Layer 4, transport Layer
b) Layer3, Network Layer, reach the iPremier web server in the web server cluster.

5.2
Package going through the internet router to the router/firewall in iPremier “cage”, then

to the ethernet switch, finally arrive at iPremier web server in the cluster.

1010

CSE50 S20 Final Exam Jianxiao Chen

Question 6
6.1 four business processes

1. Emergency procedures
the company emergency procedures are not updated in a timely manner,
employees cannot consult and make corresponding responses without the
procedures.

2. The permission processes
When the iPremier employee wanted to enter the Colo Data Center, it was
blocked and had to go through the chain of command.This increases the time to
deal with emergencies like Ddos.

3. The technical architecture updating policy
The iPremier company focused on growing as their first priority, As a result, they
did not focus on updating or moving the date and services to a better facility.

4. clear reporting lines processes
During the attack, because everyone received similar reports, but still calling
around. A lot of rescue time was delayed in communicating information.

6.2 Change to the business processes
1. Emergency procedures

The company needs to regularly update a set of emergency procedures and
corresponding employees beed have access to such procedures on time and deal
with any known forms of attack.

2. The permission processes
Ipremier needs to gain maximum permission and access with partner companies
to avoid the unnecessary time spent going through the reporting process.

3. The technical architecture updating policy
For a company that needs to use the network servers, the iPremier company needs
to periodically upgrade its system or move its servers to a better facility. It may
cost more, but it will protect the company from attack in case of big losses.

4. Clear reporting lines processes
When iPremier Company has a very clear reporting line, it will enable all relevant
personnel to know everything in the shortest time to save unnecessary time.This
will make companies more efficient in responding to cyber attacks and minimize
losses.

1010

CSE50 S20 Final Exam Jianxiao Chen

Question 7

Advantages Disadvantages

Microsoft Azure (Paas) -Strong security
End users are covered with
Azure, as is the platform,
which reduces the risk of data
loss.

-Must have platform expertise
Moving on-premise servers to
the cloud is going to be
expensive. It also affects the
computing power.

-Hybrid infrastructure
It will be easier to move from
Qdata to Azure detect, then
respond to threats in the cloud
and on-premises with faster
speed.

-Limit adapt system
It is hard to adapt to a wider
variety of systems on Azure.

Amazon Web Servers (Iaas) -Easy to use
AWS is very clear on how to
use it, even for beginners

-Security Limitations
Amazon Web servers limite
some of its features which
cannot be changed, security is
one of them.

-Supported more servers
Compared to Qdata, Amazon
provides more nice features
for companies to better
improve their business.

-Higher cost
The fee that Amazon Web
Servers charges are higher
than Microsoft Azure.

iPremier (own data center) -self-customized
IPremier can customize its
own systems and operations
to suit its own work
environment

-Highest cost
The iPremier own data center
will cost more than AWS and
Azure.

-Full control/supervise
The company can have
absolute supervisory capacity
and the permission to
maintain the system

-week facility
Premier employees are not
computer professionals. if
they want to create their own
Data Center, they need more
professional people, which
cost more, or it will be much
easier to be attacked.

First of all, we can exclude iPremier’s own data Center. Despite full control and

customization, the absence of a strong security system can be deadly to a web company, and it is

10

CSE50 S20 Final Exam Jianxiao Chen

expensive. On the other hand, Azure will be cheaper and have stronger security systems but less
service capacity than AWS. AWS is relatively expensive and security management is limited.
But AWS is much more maneuverable than Azure. We can also see from the figure that AWS
accounts for a larger share of the market (RightScale). So I recommend using Amazon Web
Servers.

Question 8

8.1
function

1. Internal function
a. financial team

i. A handover budget and subsequent financial management
2. External function

a. Research team
i. Collect all the materials needed for the servers transition, and

compare the solutions given by AWS to finally choose the feasible
solution

b. Qdata team
i. Mainly contact the corresponding company for the handover

procedures
c. AWS team

i. Mainly contact the corresponding company for the handover
procedures

3. Support function
a. Human resource team

5

CSE50 S20 Final Exam Jianxiao Chen

i. Personnel deployment is necessary to ensure successful implement
this transition without personnel chaos

b. Emergency response team
i. In case any technology emergency happened during transition.

c. technical team
i. Mainly responsible for the transition of technical support

d. logistics team
i. Responsible for purchasing items and communicating with

technical and financial teams.
8.2
For Scrum, teams need to make a Product backlog at the beginning, then they will enter

the sprint. For the sprint circle, the team will plan together and then carry out implementation,
and conduct review and retrospective meetings after the completion of the stage. In the process
of repeating the sprint, each time would get feedback to make the next plan out a better plan. In
retrospect, the meeting was able to effectively track the progress of the project.

8.3
XDR collects and correlates data across email, endpoints, servers, cloud workloads, and

networks, enabling visibility and context into advanced threats. Threats can then be analyzed,
prioritized, hunted, and remediated to prevent data loss and security breaches (Cisco).

While SYN flood attack is usually designed to paralyze the system by transferring large
amounts of junk files or email. XDR can filter external information and prevent malware attacks
through AI technology. Every time a bug or attack occurs, XDR is recorded to prevent it from
happening again. Also, XDR has some protection and repair capabilities. It can help employees
recover from the system from attacke much quicker.

10
9.5
Burnout velocity need to be explained for full sore

CSE50 S20 Final Exam Jianxiao Chen

Reference

Bunoob “​SQL join​” https://www.runoob.com/wp-content/uploads/2019/01/sql-join.png
Access Jun 8, 2020

Brandon Gaille “​15 Microsoft Azure Advantages and Disadvantages​”
https://brandongaille.com
Access Jun 8, 2020

Cisco “​What Is Extended Detection and Response (XDR)​”
https://www.cisco.com/c/en/us/products/security/what-is-xdr.html#~how-xdr-works
Access Jun 8, 2020

Dinesh Kumar “​ASSURING RELIABLE AND SECURE IT SERVICE​”
https://www.slideserve.com/dinesh/assuring-reliable-and-secure-it-service
Access Jun 8, 2020

DataFlair team, “​AWS Advantages & Disadvantages”
https://data-flair.training/blogs/aws-advantages/
Access Jun 8, 2020

Sean Fullerton “​The Function of DNS​”
https://www.informit.com/articles/article.aspx?p=130969&seqNum=3
Access Jun 8, 2020

Stephen watts “​SaaS vs PaaS vs IaaS: What’s The Difference and How To Choose​”
https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choos
e/
Access Jun 8, 2020

CSE50 S20 Final Exam Jianxiao Chen

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 929 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code GURUH