IT

Each question is worth 6 points, adding up to 30 (6 x 5= 30).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The use of external references is expected and highly encouraged. These include books, journals, web references, etc. Please cite references appropriately at the end of each answer. Use APA or MLA format.

Upload your answers to iLearn in Portable Document Format (PDF).

Questions:

  1. What is cloud computing from a “* as a Service” perspective? How does virtualization work on say, VirtualBox? What role does virtualization play on the cloud platform?
  2. What are some differences between using a Cat6 cable and Wi-Fi for say, watching Netflix? What security implications can you think of between the two approaches? Use layers to explain.
  3. What are the advantages of IPv6 over IPv4? Why is security often considered to be a major advantage in IPv6?
  4. What is cloud orchestration? What are some advantages of using a cloud orchestration platform (such as Juju)? What role does orchestration play in scalability of a business?
  5. What are hybrid mobile apps? What are some advantages of this approach? What role does the cloud play in hybrid mobile apps?
  6. Why is a mobile phone network called a cellular phone network? Use a diagram to describe. How is 3G cellular different from 4G (LTE) cellular? What are some new things to expect with 5G?
  7. Describe the purpose of Domain Name Service (DNS). Why is it dangerous to use a central DNS service like Dyn? What would happen if someone were to hack into the DNS systems worldwide?   
  8. Describe IoT. What are some challenges with respect to scalability and security of IoT?

FinalExam

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Hunter Dalli
May 21, 2019

#4. ​What are the primary differences between TCP and UDP. Would you recommend UDP
or TCP for a voice over IP phone call? Justify your choice.

Reliability is what set Transmission Control Protocol (TCP) and User Datagram

Protocol (UDP) protocols apart from each other. TCP mostly depend on how good the

Internet connection is. TCP ensures that any data is transmitted through Internet is

delivered the end user so long as connection doesn’t fail. UDP protocol on the other hand,

does not guarantee the delivery of any message send to reach to the end of the network

user.

Second contrast between these protocols is the order in which data is conveyed.

Any data transmitted through TCP reached the other side of the network the order it was

sent. For instance, If you send a message through the network consistently, TCP ensures

that the principal message sent will reach to the opposite side of the network first. With

UDP there is no assurance of receiving messages in the opposite end of the network in

the order it was send.

Given the above mentioned differences, I would recommend TCP over UDP

when it comes phone call use. I say this because, TCP provides better connection, it is

reliable, in TCP acknowledgment, TCP ensures that packets are transmitted in an orderly

manner. A phone call would never make sense if the data transmitted through the

network is not in order. This is why I recommend TCP over UDP. The below provide

more one-to-one contrast between TCP and UDP.

TCP UDP

Reliable Unreliable

Connection-oriented Connectionless

Segment retransmission and flow control
Through windowing

No windowing or retransmission

Segment sequencing No sequencing

Acknowledge sequencing No acknowledgment

#5. ​What are the different kinds of VPNs. Describe different scenarios where you would use
each of these approaches. How is SSL/TLS VPN different from a traditional VPN?

First let’s start defining what VPN is; Virtual Private Network (VPN) is a

network/Internet service that enable users to connect to the Internet through a server that

run by VPN companies. VPN creates encryption tunnel that ensures that every data

passing through them is well encrypted and safe.

There are two common types of VPN namely; Remote Access VPN and Site to

Site VPN. Remote Access VPN is the kind of VPN that most people use in their personal

computer. This kind of VPN allow users to connect to VPN encrypted virtual server with

the same level of encryption like the one that you might get is offices.

Site-to-Site VPN, is on site encryption system that is commonly used by big

corporations, or organizations with offices in different locations. An example would be,

when a company start to grow rapidly with offices in many locations. Whether you are

using Intranet-base or Extranet-based network you need Site-to-Site VPN or Router to

Router VPN that the computer systems in these various location can be plugged into.

SSL/TLS VPN is different from traditional VPN in a way that SSL/TLS VPN

does not require installment like traditional VPN does. SSL/TLS provides remote access

for users through web application.

#7. ​How is a public cloud platform like Amazon Web Services different from a private
cloud platform like OpenStack? What role does What role does orchestration play in
managing such cloud platforms?

Amazon Web Services(AWS) and OpenStack are big cloud computing companies

that provide many companies/organizations, and individuals around the world with a

cloud based computing platform regardless of their size. Both OpenStack and AWS are

both classified as infrastructure-as-a-service.

The main difference between OpenStack and Amazon Web Services is that

OpenStack is an open source platform that is created in the public. Everyone can see the

status of project being built and their also contribute by submitting their codes and can

add new feature into OpenStack. The public are allows to write a feedback and

suggestion on any given project. AWS on the other hand, is owned by Amazon.

Therefore, their entire projects are closed for public. It is not as easily accessible if

impossible for outside to have access to their insight projects.

If you are using OpenStack then you have provide security or encryption on your

own for your platform. If you are using Amazon Web Services then you don’t have to

worries about the security because have a whole team of security personnel that provide

security for heir entire AWS.

Orchestration helps cloud platforms by managing, interconnections, and

interactions in workload on both public and private cloud infrastructures like AWS and

OpenStack. Orchestration can also check for security and compliance among many

others.

#1. ​What is cloud computing? How does virtualization work on say, VirtualBox? What role
does virtualization play on cloud computing platforms, mobile platforms and IoT
platforms?

Cloud computing is an online computing services like servers, storage spaces,

virtual machines and many others that many companies or individuals can use as a utility.

As explained by Stephen Fry in the “cloud computing youtube video”. Companies who

provide cloud computing services are called cloud suppliers. Companies or people who

use the services charged for cloud computing usage.

Virtualization is the making of a virtual version of something, for example, a

server, a storage spaces, operation systems and more. Virtualization plays a major role in

today’s exponential usage of computers. Before virtualization people use to have

hardware to run servers on, but with virtualization all the hardware stuff is gone. The

virtual or software version of the hardware runs all of those servers on one single

machine. Virtualization is very efficient, cost effective, and it has made a storage a

commodity.

#3. ​What are the advantages of IPv6 over IPv4. Why is security often considered to be a
major advantage in IPv6. Is it ​really​ true? Explore
http://ipv6friday.org/blog/2012/03/ipv6-security-part-one/

I always thought that IPv6 provide better security through IPsec and it also

provides better authentication and data integrity than IPv4 which I thought have high

potential of carrying malware. At least from what I read from informaPLC website. And

of course, some of the article I read online indicates that with Peer-to-Peer network are

easy to create and maintain than Network Address Translation (NAT) end-to-end

connectivity that was used in IPv4 and many other good things about IPv6. Although,

some of the things like having substantially larger IP address space may be true, it is clear

that the Internet Protocol Version six (IPv6)’s new features like IPsec is just an add on to

IPv4.

With that said, it is safe to say that “there is are no differences between IPv4 and

IPv6 in terms of security”. The Internet system developers did not foresee the popularity

in the us of the Internet the way it is being used today that was why developers in the

1970s came up with only 32 bits unique IP addresses in IPv4 than IPv6’s (128 bit) IP

address space.

https://web.archive.org/web/20180512040409/http://ipv6friday.org/blog/2012/03/ipv6-security-part-one/

https://web.archive.org/web/20180512040409/http://ipv6friday.org/blog/2012/03/ipv6-security-part-one/

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP