Research complex distribution systems

Assignment Help Computer Networking
Reference no: EM13984479 , Length:

Complex Distribution System Control

I'm sorry Dave, I'm afraid I can't do that.

-HAL 9000, a fictional sentient computer from the 1968 film 2001: A Space Odyssey

Science fiction movies have fuelled stories and images of a dystopian world full of sentient, complex distributed systems gone out of control. Fortunately, many actual technological futurists do not foresee such events occurring.

A present concern that continues to grow, however, is how to keep malicious attacks from occurring within complex distribution systems. While the foreseeable future does not include sentient robots, network managers do worry that their complex systems may be taken over by other intruders-from insiders to corporate spies to foreign governments.

In this Discussion, you will analyse a complex distribution system for security vulnerabilities, and compare potential solutions to choices made by a Fortune 500 company.

To prepare for this Discussion:

Choose and research three complex distribution systems (but do not choose power plant or airplane cockpit).

To complete this Discussion:

Post: Critique each of the three complex distribution systems you selected. Define how well defended each system is from attack. List possible vulnerabilities and outcomes (both to the system and to society) of a vulnerability breach. Compare one of your choices to administration of a Fortune 500 Company Network. Compare and contrast technological similarities, differences, vulnerabilities and management mobility.

ISO Network Management Model

The ISO Network Management Model helps IT managers view management as functional areas, allowing clearer decision making and security strategy processes.

The ISO network management model's five functional areas are listed below (Cisco, no date):

• Fault Management-Detect, isolate, notify and correct faults encountered in the network.

• Configuration Management-Configuration aspects of network devices such as configuration file management, inventory management and software management.

• Performance Management-Monitor and measure various aspects of performance so that overall performance can be maintained at an acceptable level.

• Security Management-Provide access to network devices and corporate resources to authorised individuals.

• Accounting Management-Usage information of network resources.

Reference:

Cisco (No Date) ‘Network management', Network management system: best practices white paper [Online]. Available from:https://www.cisco.com/c/en/us/support/docs/availability/high-availability/15114-NMS-bestpractice.html#networkmanage (Accessed: 29 April 2014).

In this Discussion, you will consider each of these five areas, and scenarios in which there is some ambiguity about the correct decision regarding each area.

To complete this Discussion

Post: Submit an essay in which you imagine you are a Senior Network Administrator. Describe your encounter with five scenarios; each uniquely corresponded to one of five ISO functional areas, where you would be in a ‘grey area' about a decision to be made. For each scenario, recommend one different networking tool that might be beneficial.

Verified Expert

This task is about Complex Distribution Systems and Functional Areas of ISO Network Management Models. There are two different reports on these topics with 500 words each. APA style referencing is done in both files..

Reference no: EM13984479

Questions Cloud

Based on the quantity theory of money : The Equation of Exchange is given as MV = PY , where M= the nominal money supply, V= the velocity of money, P= the price level and Y=real GDP. What is the Monetarists’ argument (based on the quantity theory of money) about an increase in M? Explain a..
Discount rate and rate of interest paid on excess reserves : How could the discount rate and the rate of interest paid on excess reserves (IOER) theoretically be used by the Fed to create a “ceiling” and “?oor” for the Fed funds rate? How is the exchange rate between two currencies determined under the gold st..
How much rental loss : How much rental loss can she deduct against other income sources without regard to the at-risk rules?
Create set of cases for accompanying dentist office system : Create a set of use cases for the accompanying dentist office system, but do not bother to identify the steps within each use case. (Just complete the information at the top of the use case form.) When new patients are seen for the first time, the..
Research complex distribution systems : Research complex distribution systems - you will analyse a complex distribution system for security vulnerabilities, and compare potential solutions to choices made by a Fortune 500 company.
Imply a market supplied by a small number of large firms : Explain why the cost structure associated with many kinds of information goods and services might imply a market supplied by a small number of large firms. (At the same time, one internet business such as grocery home deliveries have continually suff..
Minimum-wage legislation is less likely to adverse effects : Minimum-wage legislation is less likely to have adverse effects on employment when the:
What are the disciplinary procedures at local union level : What are the disciplinary procedures at the local union level that would most commonly be followed when a member has a breach of the standards of conduct in the union’s bylaws? What are six of these types of breaches?
What should be the marginal cost of a monopoly firm : What should be the marginal cost of a monopoly firm selling textbooks to students in a small town and is currently maximizing profit by charging a price of $48 a book and the elasticity of demand is 3/2?

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Attacks and defenses to session key establishment protocols

Illustrate attacks and defenses to these session key establishment protocols at all levels, including one or both of communicating machines being compromised.

  Write a plan like digital evidence for investigation

You decide to carry out an investigation. Write a plan for this investigation. The plan should include: digital evidence source identification, recovery, collection, documentation, and report.

  Discuss the possibility of setting up a wireless network

Imagine you are a wireless network contractor and you are meeting with a potential client over lunch to discuss the possibility of setting up a wireless network in the client's building.

  Reasons to prevent outsider obtaining free network acces

List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network.

  Describe the tcp/ip address maintenance process planned

Describe the TCP/IP address maintenance process planned for the system. Maintenance should include assignment of new addresses and a periodic review of currently assigned addresses

  Sketch and analyze the network associated with a problem

Sketch and analyze the network associated with this problem. That is, determine the earliest and the latest start and finish and the slack for each activity. Also determine the critical path and the overall project completion time.

  Nternet access methods are the dsl modem and the cable modem

In not less than 300 words, discuss in a comparative sense the broadband access solutions, with particular attention to FTTH as an ultimate contender.

  Sketch the existing wan

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store? [Short answer]

  Explaining system development life cycle

What is the system development life cycle and what are the best ways to bring social networking to life within this cycle?

  Use a search engine to identify

Use a search engine to identify the positions of Google and Apple regarding cell phone tracking. What reasons do the give for tracking cell phones? What limitations do you think they might support?

  Develop a visual rendering depicting your design

Assignment: Component Interface for an Emergency Control Room, Develop a visual rendering depicting your design through the use of Microsoft Visio or its open source alternative, Dia

  Small internet works prepare a network simulation you will

small internet works prepare a network simulation. you will first be build the existing office network. next you will

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd