Ask Computer Network & Security Expert

Case Study 1:

Conduct an online research to obtain an array of data over a period of time for a trend of your interest. For example, the data could be the number of smartphone users from 2005 to 2012, or the number of Verizon's FTTH subscribers from the launch of their FiOS service to 2012, or the number of security breaches on government agencies from 2000 to 2012, or the number on worldwide Internet users from 1992 to 2012, or the number of satellites launched by the US since Sputnik.

We want to enter the data array into Excel, and plot the corresponding graph showing the variation of the data in time, labeling the vertical axis (data) as Y, and the horizontal axis (time) as X. X could be in years, months, days, etc.
We want to use Excel graphing, and the Trendline utility to extract a function Y(X) to model the data variation; for example, Y(X)=0.25X+12.2 is a straight line model; or Y(X)=X2+2X+1 is a quadratic model, X>0. Once we extract the Y(X) model equation, we can use it to estimate a prediction (forecasting) of the trend Y into a near future X.

Write a Word document to describe the subject briefly, present the data acquired (in a table), show the resulting Excel graph and the Y(X) model obtained by Trendline analysis, and discuss the data and model. Then, use the Y(X) model extracted to do some prediction (forecasting) of your data trend Y into the near future. The Trendline feature of Excel allows you to display the Y(X) model equation on the plot itself.

The document is required to:

include the data set used (in table form, with source referenced)
include the Excel plots, with proper labeling, and showing the Y(X) model equation directly on the plots
be at least 3 pages long (excluding name and references page), double spaced, 11 point font
have at least 3 references, listed and cited in APA format

The final report, upon submission for grading, should be processed automatically by turnitin.com for plagiarism check (max score is 15%). You may rework the paper, and resubmit it to improve the score.

Case Study 2:

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6.

Let's consider that you've been appointed as the IPv6 transition manager at a relatively small branch of a government agency (e.g., a branch of the Social Security agency in a medium-size town). Your main responsibility is to produce a plan with a timetable for achieving compliance with the IPv6 mandate. The plan should specify the guidelines, solutions, and technologies for supporting IPv6 throughout the agency branch. The plan should include the following, among other things:

Summary of the applicable government IPv6 mandate

Brief description of the networking facility at the branch (LANs, servers, routers, etc.)

Summary of the main IPv6-related RFCs that pertain to the IPv6 support

Cooperation with ISPs and equipment vendors to implement IPv6 support

Summary of the solutions and technologies to be employed in implementing IPv6 (e.g., dual-stack, tunneling, translation)

Timetable for completion of IPv6 transition

Plan for testing the IPv6 compliance in expectation of an audit by the government

The deliverable is a report (in Word) of 6 to 10 pages, excluding the name and biblio pages, with 3 to 5 solid references (APA format), at least. The use of drawings and other graphics is highly recommended.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91356471
  • Price:- $35

Guranteed 24 Hours Delivery, In Price:- $35

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As