subneetting

 

As robust as the IP protocol is, it does not perform the actual transmission of the data. In this step, you will investigate the network protocol called Transmission Control Protocol (TCP), responsible for creation, reliability of delivery, and proper assembling of data packets. 

In addition to IP, TCP is also widely used on the internet, especially for any network communication where it is essential to confirm receipt of the transmission. Many of the network protocols used to implement cloud computing use both TCP and IP. You will review TCP’s workings and discuss them in your final technical report. 

In general, there is no guarantee that a data packet will reach its destination. Packets can get lost or corrupted during transmission, and there are network applications where you need assurance that the packets have reached their destination. To achieve reliability, TCP establishes connections between communicating hosts, using port numbers to refer to applications on these hosts. Then, packets are created, sequenced, transmitted, acknowledged, and retransmitted if missing or containing errors. Finally, at the destination, they are reassembled into the original messages. 

To synchronize the flow of packets between sender and receiver, and avoid packet congestion in case of varying speeds, TCP uses sliding windows for packets remaining in processing at a given time, at both the sender and receiver ends. 

In the next step, you will look into subnetting BallotOnline’s IP addresses.

 

One of the drawbacks of IPv4 is the maximum number of network devices it can support. IPv4 addressing uses a 32-bit network address. This allows for 232,, or a little over 4 billion devices. However, today there are significantly more devices on the internet. Even though the more robust IPv6 version has been introduced and efforts are under way to assure wide adoption, IPv4 is still widely used.

One method used to more efficiently use the IPv4 network addresses is a technique to optimize the addresses by splitting them into network addresses and host addresses within designated networks. You will need to take advantage of IP address splitting so that you can efficiently use and allocate the IPv4 network addresses that have been assigned to BallotOnline.

For a given large network, rather than addressing all the hosts using the host part of the address, subnetting allows for splitting the network into several smaller ones by borrowing the host part bits and adding them to the network bits. It supports efficient management of local networks composed of multiple LANs. In this step, you will investigate subnetting conventions and discuss them in your final report in order to lay ground for the use of subnets by BallotOnline.

As the network engineer for BallotOnline, you know that subnetting a network into several smaller and variable-sized networks will be best for the organization’s needs. BallotOnline has been assigned a network address block by the Internet Assigned Numbers Authority (IANA).

Because BallotOnline has several offices around the world, you will need to subnet this network address to assign just the right number of addresses to each office location based on the number of systems at that office location (the network address assigned by IANA and the number of offices along with their sizes will be provided in the announcement section of this class at the beginning of Week 2).

Your task is to create the appropriate number of subnets with the right size to optimize the network.

Your technical report should include Classless Interdomain Routing (CIDR) notation, which allows for specifying a variable-length network as part of the IPv4 address, leaving the rest for addressing hosts within the network.

Submit the network information in the submission box below.

 

Classless Interdomain Routing (CIDR)

Classless Interdomain Routing (CIDR) is a method to use IP addressing without being restricted to the original grouping of IPv4 (Class A, B, and C).  Using CIDR, you can create a network (or subnetwork) and size it appropriately based on the needs. 

For example, without CIDR, if you have a network with 500 hosts or systems, you cannot use a Class C network because Class C is limited to 254 hosts, so you are forced to use a Class B network, which leads to a waste of IP addresses.

Also, prior to CIDR, when specifying a network address, you will need to also provide the subnet mask. For example: 

  • Network address: 192.168.1.0
  • Subnet mask: 255.255.255.0

You need both to inform the size of the network.

With CIDR notation, instead of specifying the subnet mask, you note the number of bits used for the network hosts. For example, the same network as above would be written as:

  • Network address: 192.168.1.0/24

For more information, review the following article:

https://opensource.com/article/16/12/cidr-network-notation-configuration-linux

White Paper – Secretary of Homeland Security

For this assignment, assume you are the new Secretary of Homeland Security. You are drafting a Policy Document referred to as a “White Paper” for the Biden Administration to highlight the impact of open/closed borders in the age of COVID-19 on migration, asylum seekers, and economic recovery. In this white paper, consider the following to frame your paper. 

  • Define what YOU believe an “OPEN” vs “CLOSED” border means especially when dealing with those seeking asylum. Reminder that you can provide your opinion without using “I think” or something similar.
  • How do you believe illegal migrants can be treated humanely and with dignity/inclusion?
  • How does an “open” vs a “closed” border impact the United States economy?
  • What are your recommendations for the next 12-24 months on specific steps that the new administration needs to take? 

DO NOT answer this as if it is a four Question Exam. This is a WHITE PAPER and is a single narrative framed by these questions, but do NOT use first person (I statements). 

The typical format for a White Paper is: 

  • Define the issue
  • Analyze it
  • Summarize your findings and recommendations 

Technical Requirements

  • Paper must be at a minimum of 5-7 pages (the Title and Reference pages do not count towards the minimum limit).
  • Scholarly and credible references should be used. At least 5 sources are required for this assignment.
  • Type in Times New Roman, 12 point and double space.
  • APA Style as the sole citation and reference style used in written work submitted as part of coursework. 
  • Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.

Turnitin report required. 

Cyber Defense Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

I can think of a few different web based firms that offer online security checks. I personally do trust these types of services. Of course I would only ever use well known software like Norton or MacAfee. I’ve never heard about anything going wrong with utilizing services like these and I have definitely seen things go wrong while operating on a PC or laptop without protection. 

Norton Security offers different security options that range from Plus ($19.99), Standard ($25.99), Deluxe ($29.99), and Select ($99.48). These different options which vary by price also vary by what the plan covers. Mainly, the less expensive options have less levels of protection versus the more expensive plans which get additional benefits or areas of security. Looking at the most expensive plan, the Select Plan, the coverage options seem pretty extensive, it’s a plan I would go with if I chose to use this service. There is security for 5 different devices, PC Cloud Backup, Virus Protection, Parental Controls, Private Browsing with VPN, Stolen Funds Reimbursement, etc. This plan and coverage is pretty in depth. I would say that this type of software is one that I would trust and I would recommend to people, especially with windows computers. There have been many issues over the years with flaws in windows security allowing for data breaches via way of hackers gaining access to networks and devices. I wouldn’t want to risk something like that and I feel that most people have a lot of information stored on their devices these days, probably more information than ever before as the world continues to transform to an all electric operating system. These days most people have thousands of pictures on their devices, important scanned documents, school and medical related documents and paperwork, etc. This puts us all in a very vulnerable position because if anyone were to gain access to these devices they can steal the information, they can lock it, and they can destroy it all together. 

¹ Norton. Cyber Safety. 2021. 

Felicia 

RESPONSE 2:

There have been times in the past were I had to restore to using one of these free services to scan my system. Free tools such as Avast antivirus have been a great help in detecting some of the standard malicious software; however, this protection is limited in its capacity. If you want those additional features, it will cost you. There are many free security options out on the web, but there are even more that have been found to be malicious. Some of these rogue security applications will take names similar to those of respected developers or official-sounding names such as BitDefender 2011 or Windows XP Recovery, which will be used to trick unsuspecting users into installing them on their systems (Prakash & Parameswari, 2016). Typically deployed after a user visits a questionable website which will alert the user to possible infection and offer a link to download the free security software. Once on the system, the user will be bombarded with phony alerts stating that their system has been compromised further and would require a higher level of protection at a cost to the user. Already at this point, the user has opened themselves up to the installation of all forms of nasty malware, including rootkits, trojans, and ransomware. 

I have since moved on to other antivirus options such as McAfee since the service was free through the military. However, McAfee offers a subscription-based service, with multiple tiers, with prices ranging from $19.99 to $39.99. The standard features provided with this security solution range from its standard antivirus protection, VPN licenses, encrypted storage, and password management. Some of these services are unnecessary, such as the 128-bit encryption for storage, which encrypts data on a hard drive to protect against unauthorized viewing. The encrypted storage feature can be found on any modern system. Another feature offered is the password manager, which stores all your passwords in a single repository. It also suggests sufficiently solid passwords and automatically holds them for you. Although this makes password management a breeze, a compromise in this area could reveal all your passwords to an adversary. Luckily all this information is protected with encryption, and if the anti-malware protection is being used, it should block any malware that would capture this data. 

-Joshua

Prakash, G., & Parameswari, M. (2016). On reviewing the implications of rogue antivirus. Journal of Information Ethics, 25(2), 128-139. Retrieved from https://www-proquest-com.ezproxy2.apus.edu/scholarly-journals/on-reviewing-implications-rogue-antivirus/docview/2064887596/se-2?accountid=8289

McAfee. (n.d.). McAfee Total Protection 2021: Beyond Antivirus. McAfee. 

Slave Religion 2 pages/ Asap

1. Discuss the role religion played in the lives of enslaved African American during the antebellum period. Include the origins of the religious ceremonies practiced and the focus of their teachings.

http://www.inquiriesjournal.com/articles/372/slavery-and-religion-in-the-antebellum-south

A. Slave Religion

1. By the early 1800s, many enslaved communities had embraced evangelical Christianity; they favored the emotional styles of worship permitted in Methodist and Baptist revival churches. However, most of their religious training occurred in the slave quarters. Blacks in rural areas often did not have access to churches, and slave owners did not always allow their slaves to attend church.

2. Slaves who worshipped alongside whites or received religious instruction from them did not trust Christianity; white ministers who stressed the obedience and humility expressed in scriptural passages such as “Servants be obedient to their masters” fueled black suspicion.

3. Blacks developed their own brand of Christian ideology and practice, which historians have termed the “invisible church.” Enslaved blacks gathered in secrecy and stressed biblical values like justice, freedom, love, and equality. They favored the Old Testament stories about Moses liberating the children of Israel from slavery in Egypt.

4. Slaves also gathered in their homes or in “hush harbors” in the woods to attend religious ceremonies that incorporated African religious practices officiated by slave elders; juju and voodoo rituals were an important part of some slave communities. The “ring shout” tradition, in which congregants moved counterclockwise in a circle while shuffling their feet, singing, and clapping, is evidence that West African traditions survived in America.

READ BEFORE BIDDING

1. Please define the obfuscation process in detail.

2. Using http://www.dependencywalker.com please explain the components involved within the .dll GetCurrentProcess.dll along with how the process works. Please provide a snapshot of your findings.

3. Answer the questions relating to Lab1-2:

Q: 1. Upload the Lab01-02.exe file to http://www.VirusTotal.com/ . Does it match any existing antivirus

definitions? 

Q: 2. Are there any indications that this file is packed or obfuscated? If so, what are these

indicators? If the file is packed, unpack it if possible. 

Q: 3. Do any imports hint at this program’s functionality? If so, which imports are they

and what do they tell you? 

Q: 4. What host-or network-based indicators could be used to identify this malware on infected

machines? 

________________________________________

In this assignment, you will need to setup a virtualized environment. See the following:

https://www.osboxes.org

http://www.heaventools.com/download.html

https://www.fireeye.com/mandiant.html

https://www.wireshark.org/download.html

https://regshot.en.softonic.com

Please provide a complete writeup on how this malware could be installed on your machine. NOTE: You will need to disable any anti-virus protection as this contains live malware. It will not install onto your system. 

Analyze the malware found in the file Lab03-02.dll using basic dynamic

analysis tools. 

How can you get this malware to install itself?

How would you get this malware to run after installation? 

How can you find the process under which this malware is running?

Which filters could you set in order to use procmon to glean information? 

What are the malware’s host-based indicators? 

Are there any useful network-based signatures for this malware? 

How could you prevent this type of malware from installing on your machine?

PLEASE COPY AND PASTE QUESTIONS IN DOCUMENT AND ANSER THEM ACCORDINGLY.

P 1

Review the following lecture:

  • Regulatory vs. Allocative Health Policies (at the bottom)

Uninsured Americans

Over the next few weeks, you will explore many of the critical components of the United States healthcare system and elements that can be improved with appropriate healthcare policy. One of the most important pieces of legislation impacting healthcare is the ACA, which “provides Medicaid coverage to many low-income individuals in states that expand and Marketplace subsidies for individuals below 400% of the poverty line” (Kaiser Family Foundation, 2017, para. 1). But, while the ACA has reduced the number of uninsured Americans, there are still millions without coverage. The question is why and what can be done to address the underlying issues.

Please review the following resources and using specific information from these resources, your course resources, and additional research, address the tasks posed below:

  • Kaiser Family Foundation. (2017, September 19). Key facts about the uninsured population. Retrieved from https://www.kff.org/uninsured/fact-sheet/key-facts-about-the-uninsured-population/
  • Krueger, A. B., & Kuziemko, I. (2013). The demand for health insurance among uninsured Americans: Results of a survey experiment and implications for policy. Journal of health economics, 32(5), 780–793. Retrieved from http://www.nber.org/papers/w16978.pdf

Tasks:

  • ***Summarize the population (number, demographics, etc.) of uninsured people in the U.S.
  • ***Discuss some of the reasons for and possible financial consequences of not having health insurance.
  • ***Discuss the socioeconomic consequences of having a large uninsured population in the U.S.
  • ***Describe the changes that will occur to assist the uninsured population with the Patient Protection and ACA.

Submission Details:

  • Present your response in a 3- to 5-page Microsoft Word document formatted in APA style.
  • On a separate page, cite all sources using APA format.

Reference:

  • Kaiser Family Foundation. (2017, September 19). Key facts about the uninsured population. Retrieved from https://www.kff.org/uninsured/fact-sheet/key-facts-about-the-uninsured-population/

 

Regulatory vs. Allocative Health Policies

Regardless of their form, policies may be categorized as allocative or regulatory in nature. Allocative policies typically provide net benefits to a certain distinct group of actors at the expense of others in order to meet public objectives. For example, medical education is heavily subsidized by the government in order to prevent undersupply of physicians. Regulatory policies are designed to influence action, behaviors, and decisions of actors within a sector. Regulatory health policies include market-entry restrictions, rate or price setting controls on health service providers, quality controls on the provision of health services, market-preserving controls, and social regulation. The role of the federal government of the United States in health policy making is similar to any other policy making approach. The executive branch, under the president of the United States, implements and enforces laws written by the Congress.

The Department of Health and Human Services (HHS) is one of the fifteen executive departments and is the principal agency responsible for protecting the health of Americans. Health and social science research, disease outbreak prevention, food and drug safety, and health insurance provision come under the purview of HHS agencies. State governments, within the context of their own constitution and bill of rights, are structured similar to the federal government, operating within the state boundaries. States have constitutional authority to establish laws that protect public health and welfare. Furthermore, states, as purchasers of healthcare services, act as regulators, safety net providers, educators, as well as laboratories for experimentation with new policy. In the United States, health policy making is driven by “demanders” of policies. The most effective constituency of demanders seems to be well organized interest groups that are able to exert maximum influence on health policies.

: Pharmacotherapy for Cardiovascular Disorders

 

Assignment: Pharmacotherapy for Cardiovascular Disorders

…heart disease remains the No. 1 killer in America; nearly half of all Americans have high blood pressure, high cholesterol, or smoke—some of the leading risk factors for heart disease…

—Murphy et al., 2018

Despite the high mortality rates associated with cardiovascular disorders, improved treatment options do exist that can help address those risk factors that afflict the majority of the population today.  

Photo Credit: Getty Images/Science Photo Library RF

As an advanced practice nurse, it is your responsibility to recommend appropriate treatment options for patients with cardiovascular disorders. To ensure the safety and effectiveness of drug therapy, advanced practice nurses must consider aspects that might influence pharmacokinetic and pharmacodynamic processes such as medical history, other drugs currently prescribed, and individual patient factors.

Reference: Murphy, S. L., Xu, J., Kochanek, K. D., & Arias, E. (2018). Mortality in the United States, 2017. Retrieved from https://www.cdc.gov/nchs/products/databriefs/db328.htm

To Prepare
  • Review the Resources for this module and consider the impact of potential pharmacotherapeutics for cardiovascular disorders introduced in the media piece.
  • Review the case study assigned by your Instructor for this Assignment.
  • Select one the following factors: genetics, gender, ethnicity, age, or behavior factors.
  • Reflect on how the factor you selected might influence the patient’s pharmacokinetic and pharmacodynamic processes.
  • Consider how changes in the pharmacokinetic and pharmacodynamic processes might impact the patient’s recommended drug therapy.
  • Think about how you might improve the patient’s drug therapy plan based on the pharmacokinetic and pharmacodynamic changes. Reflect on whether you would modify the current drug treatment or provide an alternative treatment option for the patient.
By Day 7 of Week 2

Write a 2- to 3-page paper that addresses the following:

  • Explain how the factor you selected might influence the pharmacokinetic and pharmacodynamic processes in the patient from the case study you were assigned.
  • Describe how changes in the processes might impact the patient’s recommended drug therapy. Be specific and provide examples.
  • Explain how you might improve the patient’s drug therapy plan and explain why you would make these recommended improvements.

Reminder: The College of Nursing requires that all papers submitted include a title page, introduction, summary, and references. The College of Nursing Writing Template with Instructions provided at the Walden Writing Center offers an example of those required elements (available at https://academicguides.waldenu.edu/writingcenter/templates/general#s-lg-box-20293632). All papers submitted must use this formatting.

NURSE-PATIENT COMMUNICATION, INTERDISCIPLINARY COMMUNICATION, AND PATIENT SAFETY

 This assessment requires you address the following topics:

  • Define the seven principles of patient- clinician communication
  • Explain how you apply three of the seven principles to your interactions with your own patients
  • Describe the three methods being used to improve interdisciplinary communication
  • Choose the one that you think applies best to your own area of practice, or the one that your area of practice currently uses, and clearly describe how you use it.
  • Explain the ethical principles that can be applied to issues in patient-clinician communication
  • Explain the importance of ethics in communication and how patient safety is influenced by good or bad team communication

Make sure you also include a clear, separate introduction and conclusion as a part of this assignment, as these are worth separate points on the grading rubric.This assessment is aligned with course objective 6 and the module objectives. 

 

References

Minimum of four (4) total references: two (2) references from required course materials and two (2) peer-reviewed references. All references must be no older than five years (unless making a specific point using a seminal piece of information)

Peer-reviewed references include references from professional data bases such as PubMed or CINHAL applicable to population and practice area, along with evidence based clinical practice guidelines. Examples of unacceptable references are Wikipedia, UpToDate, Epocrates, Medscape, WebMD, hospital organizations, insurance recommendations, & secondary clinical databases.

Style

Unless otherwise specified, all the written assignment must follow APA 7th edition formatting, citations and references.

Number of Pages/Words

Unless otherwise specified all papers should have a minimum of 600 words (approximately 2.5 pages) excluding the title and reference pages.

 

EHR

Consider your experience and learning with regard to EHRs. If you were to design a learning program for your clinical environment centered on the use of EHRs, what would it include? How would it be taught?

2.  Obtaining data in clinical practice:

Suggest a data mining project for your practice. Which information would you like to have about your practice area that could be extracted using data mining strategies? How can you make sure that you select and develop those that best fit your data?

3.  Translating data/research into practice:

Twelve-hour shifts are problematic for patient and nurse safety, yet hospitals continue to keep the 12-hour shift schedule. In 2004, the Institute of Medicine (Board on Health Care Services & Institute of Medicine, 2004) published a report that referred to studies as early as 1988 that discussed the negative effects of rotating shifts on intervention accuracy. Workers with 12-hour shifts experienced more fatigue than workers on 8-hour shifts. In another study done in Turkey by Ilhan, Durukan, Aras, Turkcuoglu, and Aygun (2006), factors relating to increased risk for injury were age of 24 years or younger, less than 4 years of nursing experience, working in surgical intensive care units, and working for more than 8 hours.

As a clinician reading these studies, what would your next step be? Is there additional data that you need? If so, how would you obtain this data? Assuming you were part of a management team of a hospital that works 12-hour shifts, what recommendations would you give to the management team and why?

THINK about and work through the questions above, and then use the textbook and online resources to compose your response to each question individually. Remember to provide citations to acknowledge the sources of the information. Make sure you give rationale (scientific evidence and/or your clinical observation) that supports your conclusion.

Art in South Africa

 Since the beginning of Apartheid in 1948, how has the historical and political context of South Africa affected the art scene there? (make sure to reference to the Attached document to get a better idea of what this assignment should be written about) 

 Intro and conclusion should not exceed more than 3 sentences each.
Intro has to be clear about specific points to follow in the paper(thesis).
All paragraph should relate to the relevant essay topic(only focus on the topic).

I want the essay in a simple English format. No need to use complicated wording ( Since English is my second language). Please focus on answering the essay question.

The essay cannot exceed two pages (double-spaced, one-inch margins, font size 10 or 12).  Please take the time to organize your thoughts in a logical manner and cite evidence to support your analysis. In order to cite specific information or use direct quotations, use parenthesis. There should be a few, i.e., five to six minimum, such citations, from different web sources, in the body of each paper. Your introduction paragraph should not be longer than three lines and must clearly answer the essay assignment question. In other words, your introduction paragraph should establish the specific thesis points that will follow in your paper (make sure that you answer the question)

  (make sure that  intro (thesis) answers the specific assignment question.  Make sure that your first (short) paragraph establishes that thesis answer.