AI Report Order_6364776_IT_640_5-3_Milestone_Two
pdf
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
640
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
11
Uploaded by raelleee
Universitas Negeri Surabaya The State University of Surabaya
Quick Submit
Quick Submit
IT 640 (5-3 Milestone Two)
Chei Chei
Document Details
Submission ID
trn:oid:::1:2715946953
Submission Date
Oct 14, 2023, 7:05 PM GMT+7
Download Date
Oct 14, 2023, 7:08 PM GMT+7
File Name
Order_6364776_IT_640_5-3_Milestone_Two.docx
File Size
20.5 KB
9 Pages
1,585 Words
10,279 Characters
Page 1 of 11 - Cover Page
Submission ID trn:oid:::1:2715946953
Page 1 of 11 - Cover Page
Submission ID trn:oid:::1:2715946953
How much of this submission has been generated by AI?
0%
of qualifying text in this submission has been determined to be
generated by AI.
Caution: Percentage may not indicate academic misconduct. Review required.
It is essential to understand the limitations of AI detection before making decisions about a student's work. We encourage you to learn more about Turnitin's AI detection capabilities before using the tool.
Frequently Asked Questions
What does the percentage mean?
The percentage shown in the AI writing detection indicator and in the AI writing report is the amount of qualifying text within the submission that Turnitin's AI writing detection model determines was generated by AI.
Our testing has found that there is a higher incidence of false positives when the percentage is less than 20. In order to reduce the likelihood of misinterpretation, the AI indicator will display an asterisk for percentages less than 20 to call attention to the fact that the score is less reliable.
However, the final decision on whether any misconduct has occurred rests with the reviewer/instructor. They should use the percentage as a means to start a formative conversation with their student and/or use it to examine the submitted assignment in greater detail according to their school's policies.
How does Turnitin's indicator address false positives?
Our model only processes qualifying text in the form of long-form writing. Long-form writing means individual sentences contained in paragraphs that make up a longer piece of written work, such as an essay, a dissertation, or an article, etc. Qualifying text that has been determined to be AI-generated will be highlighted blue on the submission text.
Non-qualifying text, such as bullet points, annotated bibliographies, etc., will not be processed and can create disparity between the submission highlights and the percentage shown.
What does 'qualifying text' mean?
Sometimes false positives (incorrectly flagging human-written text as AI-generated), can include lists without a lot of structural variation, text that literally repeats itself, or text that has been paraphrased without developing new ideas. If our indicator shows a higher amount of AI writing in such text, we advise you to take that into consideration when looking at the percentage indicated.
In a longer document with a mix of authentic writing and AI generated text, it can be difficult to exactly determine where the AI writing begins and original writing ends, but our model should give you a reliable guide to start conversations with the submitting student.
Disclaimer
Our AI writing assessment is designed to help educators identify text that might be prepared by a generative AI tool. Our AI writing assessment may not always be accurate (it may misidentify both human and AI-generated text) so it should not be used as the sole basis for adverse actions against a student. It takes further scrutiny and human judgment in conjunction with an organization's application of its specific academic policies to determine whether any academic misconduct has occurred.
Page 2 of 11 - AI Writing Overview
Submission ID trn:oid:::1:2715946953
Page 2 of 11 - AI Writing Overview
Submission ID trn:oid:::1:2715946953
1 IT 640 (5-3 Milestone Two) Name Institution Instructor Course Date Page 3 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Page 3 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2 IT 640 (5-3 Milestone Two) SNHU Energy Inc., a moderate-scale oil and gas enterprise, primarily concentrates on uncovering and drilling oil-oriented resources. The company envisions transitioning from a solely exploratory entity to one that offers transportation and refinement of its discoveries. This crucial leap demands a robust communication infrastructure within 12 to 18 months. Based in Dallas, Texas, SNHU Energy Inc. operates in the central United States with a workforce of 120, projected to grow by 50% annually for the next two years. An initial evaluation of the current logical and physical network design will be conducted to identify connectivity, traffic patterns, and requisite changes for expansion. The existing network architecture encompasses an array of devices such as phones, switches, routers, computers, server farms, WAP encryption, as well as video and conferencing systems. From my viewpoint, the allocation of routers, users, and server farms exhibits an imbalanced workload distribution. I would certainly reconsider this network structure should I have the opportunity to redesign it. Physical Network Upon closely assessing the network topology's physical diagram, which encompasses devices and connections spanning Dallas to Memphis offices, it's evident that essential apparatus such as routers, switches, firewalls, and internet are employed at both locations. A multi-layer switch can function dually –
as a switch and a router –
and outshine hubs and routers when it comes to network expediency. As for network safety, a switch proves to be an intelligent option as it complicates virtual circuit analysis with the aid of network monitors (Liebert, 2011). The current quantity of routers is inadequate to provide sufficient security; thus, I recommend increasing their number to ensure vital apparatus like server farms are better guarded with specific routers and firewalls. Access to server-based data will necessitate authentication Page 4 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Page 4 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
3 measures like two-factor authentication. By employing routers, we can segregate internal networks into multiple zones and establish connections with other routers across various locations while forming distinct zones. Each office possesses one router connected to all others due to their awareness of network segments' accessibility. The goal within the local ecosystem is to share the broadcast domain effectively (Landsberger, 2020). To fully comprehend a network architect's role, one must first understand the core network architecture concept. Network architecture refers to the blueprint of a computer network combining physical components, functional structures, configurations, operation protocols, and processes. A holistic network architecture diagram offers a comprehensive view of the entire existing network with accurate representations of accessible resources. It embraces communication hardware elements, cable and device categories, structural arrangements and topologies, physical and wireless linkages, implemented areas, and respective plans. Additionally, software regulations and communication protocols form an integral part of the network architecture design process (IBM, 2023). Ultimately the responsibility of orchestrating this architecture rests in the hands of a proficient network manager or administrator who collaborates with adept network engineers and other design professionals. Network Traffic Upon analyzing the traffic flow captured by Wireshark, it's evident that four primary types of traffic pose challenges: VOIP, SQL, network management, and remote access. In the data, we can see 9 TCP connections, which could be potential clients visiting the company website or employees working on it (CompTIA, 2020). Moreover, 14 RTP connections might include internet voice and video services for both in-house and external users (IBM, 2023). Additionally, 8 MySQL connections involve operations from IT and accounting departments Page 5 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Page 5 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
4 managing data and processing billing tasks. Interestingly, only one SSH connection is responsible for secure network activities such as remotely accessing business machines. All of these vital traffic patterns could pose risks to the company's core operations. Notably, RTP (Real-Time Transport Protocol) –
supporting video, audio, and media –
is currently consuming the largest chunk of traffic. To counteract this issue and enhance stability, we could set up a dedicated server to host databases separately from applications. This approach may prevent situations where database downtime affects other systems (Aronoff & Kim, n.d.). Furthermore, I'll make sure to arrange offsite server backups that won't be subjected to direct queries, thereby keeping them safe and secure. Examining a Wireshark capture reveals extensive database searches utilizing MySQL. These searches can potentially retrieve millions of records and resulting processing times may vary based on the volume of simultaneous queries. Inefficient queries could lead to database overloads and crashes. While some experts might suggest increasing bandwidth as a solution, this approach could actually worsen the issue in most cases. Regarding internet usage within a company, several fundamental needs must be addressed. Firstly, it is crucial to provide customers and in-house staff with access to information such as order details, product descriptions, recruitment updates, and other pertinent data via the website. Secondly, seamless communication through video and audio channels should be facilitated for both internal and external parties via the internet. Another essential requirement involves supporting email communications (Bourgeois & Bourgeois, 2014). Moreover, an effective online infrastructure should enable data manipulation. Lastly, remote access to the organization's resources through an external WAN is needed for employees working outside the Page 6 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Page 6 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5 premises. All these factors must be taken into consideration when optimizing a company's online presence and infrastructure. Performance Issues A breakdown in communication between the Dallas and Memphis routers significantly hampers business operations. Even a brief disruption in network connectivity can adversely affect user productivity. Hindered employee efficiency not only results in financial setbacks for the company but also stunts growth through the loss of prospective clientele. Instances of connection losses wreak havoc on crucial programs, leading to extensive data loss (Khan, 2021). For instance, the human resources department faced hurdles accessing payroll applications, causing delays in payroll completion. Moreover, disconnection issues disrupt email correspondence and video-conferencing sessions. Network users must grapple with lag as they wait for connectivity to catch up with their workflow pace. The Memphis office's reliance on a single router further compounds the problem
—
should their router or switch malfunction, the entire office suffers. During network performance management, it's crucial to address potential constraints that warrant immediate attention. Network failures remain a critical limitation in both Wireshark diagrams and infrastructure designs. Data queues contribute to network performance degradation by amplifying latency and causing jittering issues. Since queues essentially act as temporary storage facilities, smaller queues holding larger amounts of data temporarily may have no choice but to discard essential information when overwhelmed (IBM, 2023). Another factor influencing network performance is data transmission speed, determined by bandwidth capacity
—
the broader the bandwidth, the more data that can be transmitted simultaneously. Finally, routing convergence demands Page 7 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Page 7 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
6 adequate memory storage. Failures in these developments lead to undesirable consequences within the network infrastructure. A significant factor contributing to performance hiccups may be the vast distances separating networks. Indeed, the space between varying networks should not be overlooked, as it serves a critical function. For those extensive networks spanning great lengths, employing optimized applications can boost packet delivery speed significantly, making for seamless interactions (Smith & Ruiz, 2020). Consequently, in the face of inadequate processing time owing to subpar infrastructure, it becomes paramount to invest in high-performance CPUs as a remedy. Security Issues A high-security communication channel is rendered futile if it fails to meet capacity and accessibility standards. To establish an optimal network path, it's crucial to emphasize network performance and security throughout the development stage of a communication network. This balance is evident in the collaboration between robust security enterprises and influential networking corporations. Utilizing firewalls allows for the monitoring of inbound and outbound traffic, in addition to identifying patterns (Tariq et al., 2023). Firewalls can be customized to permit specific traffic while denying others, along with approving particular IP addresses. These firewalls inhibit malware proliferation and the spread to alternate networks. Essentially, firewalls operate as network security apparatuses that scrutinize incoming and outgoing network traffic, determining whether specific traffic should be allowed or blocked based on established security protocols. Consequently, if the network fails, so too does the firewall. Equally significant to security as anti-virus software, firewalls hinder malware from disseminating through a network and guard against hackers attempting to infiltrate individual devices. Disabling a firewall Page 8 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Page 8 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
7 exposes a company to vulnerabilities, facilitating virus intrusion on connected devices and enabling hackers to remotely launch malicious code. A better option for the firm would be a wide-area network due to its capacity to interconnect two distinct locations. As the organization expands, the bandwidth of a wide-area network (WAN) connection can be adapted accordingly. To maintain a secure network, it's essential that all employees adhere to a comprehensive network security strategy. Page 9 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Page 9 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8 References
Aronoff, B., & Kim, O. (n.d.). Real-Time Transport Protocol (RTP) and Related Quality of Service (QOS) Issues
. Retrieved October 14, 2023, from https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=8534b7a27bd81943d2
8485fe2edcb9ca6cb4fb09 Bourgeois, D., & Bourgeois, D. T. (2014). Chapter 5: Networking and Communication. Pressbooks.pub
. https://pressbooks.pub/bus206/chapter/chapter-5-networking-and-
communication/ CompTIA. (2020). What Is Wireshark and How to Use It | Cybersecurity | CompTIA
. CompTIA. https://www.comptia.org/content/articles/what-is-wireshark-and-how-to-use-it IBM. (2023). The Fundamentals of Networking | IBM
. Www.ibm.com. https://www.ibm.com/topics/networking Khan, H. (2021, April 19). The Causes & Effects of Poor Communication in the Workplace
. Simpplr. https://www.simpplr.com/blog/2021/causes-effects-poor-communication-
workplace/ Landsberger, D. (2020, October 23). What Is Network Segmentation and Why It Matters?
CompTIA. https://www.comptia.org/blog/security-awareness-training-network-
segmentation Liebert, M. A. (2011). Abstracts from The American Telemedicine Association Sixteenth Annual International Meeting and Exposition. Telemedicine and E-Health
, 17
(4), A-1-A-
122. https://doi.org/10.1089/tmj.2011.9993 Smith, S. M., & Ruiz, J. (2020). Challenges and Barriers in Virtual teams: a Literature Review. SN Applied Sciences
, 2
(6). Springer. https://doi.org/10.1007/s42452-020-2801-5 Page 10 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Page 10 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
9 Tariq, U., Ahmed, I., Bashir, A. K., & Shaukat, K. (2023). A critical cybersecurity analysis and future research directions for the internet of things: A comprehensive review. Sensors
, 23
(8). https://doi.org/10.3390/s23084117 Page 11 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953
Page 11 of 11 - AI Writing Submission
Submission ID trn:oid:::1:2715946953