FinalProject IT 505-JaclynBarnsley
-
Upload
jaclyn-barnsley -
Category
Documents
-
view
34 -
download
0
Transcript of FinalProject IT 505-JaclynBarnsley
ORDER OF OPERATIONS
• Set-up countdown announcement by group for the whole company
• Upgrading network to a ring topology, with fiber-optic cables, and new
switches and routers and a back-up server for reliability and continued
efficiency
• Use database ‘Upgrade Report’ to implement operating system upgrades on
listed dates
• Install Bitdefender as recommended in ‘Information Assurance’ presentation
• Block third party cookies on all upgraded computers (see tutorial)
• Set company’s website as the homepage on all web browsers (see tutorial)
Running head: PROGRAMMING REPORT 2
Programming Report 2016
In order to announce the upcoming operating system upgrade to each group of
employees in an efficient and time sensitive manner JavaScript source code will be utilized to
facilitate a digital announcement on each employee’s computer. There are five basic
components of the JavaScript coding language that are the constructs of JavaScript source code.
Those five components are syntax, variables, control structures, data structures and tools. These
five basic components are put together by the programmer to compose the code that is the list
of instructions for the computer to follow. This report will give detailed information into the
syntax, variables, control structures, data structures and tools that compose JavaScript code,
while also detailing the changes made to the JavaScript code that will announce this company’s
operating system upgrade that is coming up next month.
Syntax
JavaScript programs are composed of a list of instructions that tell the computer what to
do with the images and words that are on our screens. The list of instructions are composed of
statements or lines of data that are composed of variables, operators, expressions and keywords
and sometimes comments (JavaScript Statements, 2016). These JavaScript statements are
separated by semicolons (JavaScript Statements, 2016). The order in which these instructions
come together is called syntax. This is exhibited in Figure 1in lines 7-14 of the given code, all
of these are executable JavaScript statements that when executed in order present how many
days are left until the upgrade for that particular group. Syntax is important to consider when
combining data types (JavaScript Syntax, 2016).
Variables
JavaScript values are either literals or variables (JavaScript Syntax, 2016). Literals are
fixed values. Rules for JavaScript literals are: numbers are written with or without decimal
Running head: PROGRAMMING REPORT 3
points, and strings are text written within double or single quotes (JavaScript Syntax, 2016).
For example, in Figure 2 a literal number would be the number 24 in line 8 (which represents
the hours in a day), and a string would be “June 6, 2016” on line 6 of the code. Variables are
used to store data values. The term ‘var’ is used to declare a variable and an equal sign (=) is
used to assign a given data value to variables (JavaScript Syntax, 2016). For example in the
code provided on line 6 in Figure 2 the variable ‘today’ is declared as a variable and given the
identifier ‘today’ by the simple statement: var today; and then, to determine the value of
‘today’, the statement would read: var today = new Date(“June 6, 2016”); this tells the
computer that the variable ‘today’ has the value of June 6, 2016. This facilitates the functions
that come later in the code, because every time the computer sees ‘today’ it knows it stands for
‘June 6, 2016’.
Data Structures. JavaScript pre-defined primitive data types are: number, string,
Boolean, undefined and null. These can combine to make the composite data types object,
arrays and functions. JavaScript operators tell the computer how it is to use the given data
types. In JavaScript the equal sign is an “assignment operator,” and is used to assign data values
to variables (JavaScript Syntax, 2016). In line 11 of Figure 2 the division operator is used
between two string data types to calculate days left until the upgrade the expression reads as
such: var day = timeLeft / msPerDay;. The use of operators enables the calculation of the given
data types to provide the needed value of how many days it will be until the upgrade will take
place.
Control Structures. “The control structures within JavaScript allow the program flow to
change within a unit of code or function. These statements can determine whether or not given
statements are executed, as well as repeated execution of a block of code (Sheppy, 2016).”
Often control structures are written within an expression such as line 5 in Figure 2 says <script
Running head: PROGRAMMING REPORT 4
type= “text/javascript”>. This expression controls how the computer deciphers the script type.
JavaScript expressions are a combination of values, variables, and operators that then compute
to a value (JavaScript Syntax, 2016). The computation of an expression is called an evaluation.
Line 9 of the code that is provided in the included screenshots in Figures 2-7 contains the
expression: UpgradeDay.getTime( ) - today.getTime( )); this expression evaluates to the time
left until upgrade day or more specifically it evaluates to ‘var timeLeft’. Expressions can
contain both numbers and strings and in this case the expression on line 9 is evaluating the
value of the difference of two strings, this value represents a calculable number of days.
Without control structures and carefully constructed expressions the script couldn’t be
translated by the computer and the script could not be executed.
Tools. JavaScript keywords are tools used to identify the action that needs to be
performed (JavaScript Syntax, 2016). In JavaScript the word var is a keyword that declares
something to be a variable. In Figures 1-7 you can see the keyword var used at the beginning of
lines 7 through 12 of the given code. There are many more keywords that are not included in
these screenshots such as ‘break’, ‘function’, and ‘continue’ to name just a few. They all
determine a specific JavaScript action that is to be taken (JavaScript Statements, 2016).
Conclusion
Syntax, variables, data structures, control structures and tools are five components of
JavaScript code that combine to allow the computer to calculate the code to show how many
days are left until the company will upgrade their computers. Updating the given code will
enable us to announce the operating system upgrade to all of our employees in an orderly and
efficient manner.
Running head: PROGRAMMING REPORT 5
References
JavaScript Syntax. (2016). Retrieved from: http://www.w3schools.com/js/js_syntax.asp
JavaScript Statements. (2016). Retrieved from: http://www.w3schools.com/js/js_statements.asp
Sheppy, S. (2016). Retrieved from: https://en.wikibooks.org/wiki/JavaScript/Control_structures
Running head: PROGRAMMING REPORT 6
Figures
Figure 1. This is the original JavaScript code before modifications.
Running head: PROGRAMMING REPORT 7
Figure 2. In the variable (today) on line 6 of the code the date string was modified to read “June
6, 2016” as this was the date that the script was written and the variable UpgradeDay (on line 7)
was changed to “July 11, 2016” as this was the initial upgrade day for Group 1. These dates can
be modified to reflect future dates as needed.
Running head: PROGRAMMING REPORT 8
Figure 3. JavaScript adds the data values for the variables ‘UpgradeDay’ and ‘today’ to the
empty parenthesis on line 9 and evaluates the expression to compute how many days are left
until the upgrade. The ‘Web View’ at the bottom of the screen is the announcement for Group 1.
Running head: PROGRAMMING REPORT 9
Figure 4. In this screenshot the data was modified by adding 2 days to the Initial Upgrade Date
(UpgradeDay) in line 7, changing the date from “July 11, 2016” to “July 13, 2016”. The ‘Web
View’ on the bottom of the screen shows Group 2’s updated notification for their designated
upgrade day.
Running head: PROGRAMMING REPORT 10
Figure 5. In this screenshot the data was modified by adding 5 days to the Initial Upgrade Date
(UpgradeDay) in line 7, changing the date from “July 11, 2016” to “July 16, 2016”. The ‘Web
View’ on the bottom of the screen shows Group 3’s updated notification.
Running head: PROGRAMMING REPORT 11
Figure 6. In this screenshot the data was modified by adding 8 days to the Initial Upgrade Date
(UpgradeDay) in line 7, changing the date from “July 11, 2016” to “July 19, 2016”. The ‘Web
View’ on the bottom of the screen shows Group 3’s updated notification.
Running head: PROGRAMMING REPORT 12
Figure 7. In this screenshot the data was modified by adding 10 days to the Initial Upgrade
Date (UpgradeDay) in line 7, changing the date from “July 11, 2016” to “July 21, 2016”. The
‘Web View’ on the bottom of the screen shows Group 3’s updated notification.
NETWORK REPORT 2016 2
Company Network Report 2016
As this company has grown and evolved, it seems to have outgrown its existing network
and a network upgrade is recommended to enable optimal performance of the local area network
(LAN). To help ensure a smooth transition, a careful look at both the current networks
components and the new network requirements is necessary. This report will help to determine
what new equipment and configurations are necessary to ensure that the new network fully
supports both the current and future needs of this company.
The computer network that has been set up for this company is a client/server based local
area network setup in bus topology. The computers on the top of the diagram shown in figure 1
are connected to an Ethernet cable that serves as the backbone to the network and creates the
connections between the client computers and the host server, router and printers. As represented
in the diagram in figure 1, each department has one connection to the network for all three client
computers. To explain the connection further, when all of the employees in department 1 want to
access the internet all of their computers send their signals through the same Ethernet cable
backbone and then accesses the internet through the only available router and firewall. This is the
same scenario for all three departments. This same Ethernet cable backbone accesses the printers
and the host server for all three departments in the diagram in figure 1. This single connection for
multiple clients can make it difficult to troubleshoot problems that could be happening on only
one client device. The bus LAN topology is efficient for small networks of computers and is an
effective way to connect a small network in a linear fashion. However, with each new computer
added, the network efficiency is degraded and if the main cable is damaged the network could
fail. Network failures can cost this company significant losses in productivity and income. In the
diagram provided (see Figure 1) there are three departments with three client computers in each
NETWORK REPORT 2016 3
department, this is a rather small LAN for the 20 computers that we now have operating on this
network. This network report pinpoints the critical components that are missing from our
company’s Ethernet LAN that could threaten the reliability and the security of our computer
network, and potentially lead to a network failure, losses in employee productivity and a possible
security breach.
Reconfiguring the Network Topology
When considering what critical components needed to be added to this company’s LAN.
The network topology was my first consideration. For greater reliability, efficiancy and
scalability of the network I would recommend reconfiguring the network in a way that would
support signal redundancy. With network topology such as a ring network if one part of the
network fails the signal can be sent back around the ring in the opposite direction which means
that recovery speeds are very fast and the effects of the failure are limited to the one client
connected to the failed cable (Barstz, 2013). “Another group of elementary network topologies
includes star topologies. This network structure is an important building block of the existing
computer- communication systems, especially when considering the relatively small-sized
customers’ subnetworks. It usually consists of a gateway (the central vertex of a star) and several
client devices. Hence, it provides a convenient way of setting up a local network. On the other
hand, the lack of redundant connections (e.g., additional edges creating a cycle) makes it prone
to network failures occurring in the physical layer. To improve network dependability in the case
of a failure of a single gateway, network operators usually rely on a double-star topology with
two gateways.” (Kamisinski et al, pp 23-24) The ring topology is more reliable and more readily
allows the addition of more computers which would be beneficial to the company if we were to
bring in any new employees in the future. Costs and benefits should be considered before
NETWORK REPORT 2016 4
choosing either topology. To ensure the continued reliability of the LAN upgrades to the
topology do need to be made.
Enhanced Cabling
My second consideration when reviewing the network was enhancing the Ethernet
cabling itself. As our company has grown the cabling has not been upgraded to accommodate
more data traffic. Replacing the older unshielded twisted-pair cables with fiber-optic cables
would ensure greater speeds and reliability of the network signal. Fiber-optic cables are not
susceptible to electromagnetic interference (EMI) and can transmit data faster and farther than
copper wire. Depending on the type of fiber-optics, distance limitations can be several miles
(Reid & Lorenz, 2008).
Switches. Another critical component that is currently not available on our LAN is a
network switch. “Most business networks today use switches to connect computers, printers and
servers within a building or campus. A switch serves as a controller, enabling networked devices
to talk to each other efficiently. Through information sharing and resource allocation, switches
save businesses money and increase employee productivity (Deidricks, 2014).” A managed
network switch can be configured to offer greater flexibility and capacity than an unmanaged
switch. You can monitor and adjust a managed switch locally or remotely, to give you greater
network control. Although both a hub and a switch can provide connectivity at the access layer
of a network, switches should be chosen for connecting devices to a LAN. Switches generally
are more expensive than hubs, but the enhanced performance makes them cost-effective. “A
managed device can be monitored for performance and security and typically provides
enhancements to the monitoring and security features. For example, with a managed switch,
ports can be turned on or off as required to control access. In addition, administrators can control
NETWORK REPORT 2016 5
which computers or devices are allowed to connect to a port (Reid & Lorenz, 2008, p. 64).” It is
recommended to create redundant connections with more than one switch in case of failure there
will always be a backup. It is critical to add this component to ensure reliability and efficiency of
the network as a whole.
Router. “Switches and routers are the building blocks for all business communications,
from data to voice and video to wireless access. They can improve profitability by enabling your
company to increase productivity, trim business expenses, and improve security and customer
service. Switches create a network. Routers connect networks. A router links computers to the
Internet, so users can share the connection. A router acts as a dispatcher, choosing the best path
for information to travel so it's received quickly (Deidricks, 2014).” Once the switch has been
purchased it is important to select an upgraded router that can handle 20 client devices at once.
This small network was initially built using a low-end integrated router to connect wired users.
This type of device is designed to support small networks, usually consisting of a few wired
hosts. As we have outgrown the capabilities of our existing network devices, we must upgrade to
more-capable devices (Reid & Lorenz, 2008). Including a new router that can easily handle
increased use of the internet, and greater network traffic. An option that I would recommend
would be an Integrated Service Router or ISR. “An ISR was designed with multiple services to
accommodate the demands of small to medium-sized businesses and branch offices of large
organizations. An ISR is designed for ease of use. It can quickly and easily enable end-to-end
protection for users, applications, network endpoints, and wireless LANs (Reid & Lorenz, 2008,
p 65).”
Server. To create a fully reliable computer network we will need something to backup the
current server in case of failure. A server is what serves information to the other computers. If
NETWORK REPORT 2016 6
our single server crashes or malfunctions with no backup that information will be inaccessible. A
single WINS server can adequately service 10,000 clients which is enough for a small network.
To provide additional fault tolerance, you should configure a second computer running
Windows 2000 and use it as a secondary (or backup) WINS server for clients (How many servers
to use, 2016).
Conclusion. Upon further inspection of our company’s Ethernet LAN it is recommended
to upgrade the network to better handle the upcoming operating system upgrade as well as to
increase the efficiency, reliability and scalability of the current network. Upgrading to a ring
topology, with fiber-optic cables, and new switches and routers and a back-up server would
increase the speed of production and ease of access to the network as a whole. This increase in
productivity could have a tremendously positive impact on the profits of this company both now
and in the future.
NETWORK REPORT 2016 7
References
Barstz, D. (2013). Redundancy puts backbone into the ring topology. Schneider Electric Blogs
Retrieved from: http://blog.schneider-electric.com/machine-and-process-
management/2013/10/02/redundancy-puts-backbone-ring-topology/
Diedricks, I. (2014). Understanding the different types of Ethernet switches. Cisco blogs: Small
business. Retrieved from: http://blogs.cisco.com/smallbusiness/understanding-the-
different-types-of-ethernet-switches
How many servers to use. (2016). Retrieved from: https://technet.microsoft.com/en-
us/library/cc959251.aspx.
Kamisinski, A. Cholda, P. & Jajszczyk, A. (2015). Assessing the structural complexity of
computer and communication networks. ACM Computing Surveys Vol 47, 4, Article 66,
36 pages. DOI: http://dx.doi.org/10.1145/2755621
Reid, A. & Lorenz, J. (2008). Chapter 3: Planning a network upgrade. Working at a Small-to-
Medium Business or ISP, CCNA Discovery Learning Guide,1/e (pp. 49-72). Indianapolis,
IN. Cisco Press. Retrieved from: http://catalogue.pearsoned.co.uk/samplechapter/
1587132109.pdf
What is a network switch? Retrieved from: http://www.cisco.com/cisco/web/solutions/
small_business/resource
1 Database Report
Database Report By Jaclyn Barnsley
1 Changing the ‘UpgradeDate’ Field’s Data type
1.a: After accessing the employee database tables, I first double-clicked on the ‘Upgrade
Information’ table on the left side of the screen.
2 Database Report
1.b: The ‘Upgrade Information’ table contains a list of computer ID’s (number data type) that is
matched with the computer’s upgrade group (short text data type), as well as each computer’s
current operating system (short text data type) and what operating system they will be upgrading
to (short text data type). When first accessing this table the ‘Upgrade Date’ field was an empty
text field. I selected the ‘UpgradeDate’ column and went up to the ‘Fields’ Tab at the top of the
screen and changed the ‘Data Type’ to ‘Date/Time’ then proceeded to add all the corresponding
upgrade dates in accordance with the group number that was listed. The results are shown below.
3 Database Report
2 The Other Tables and Their Data fields
2.a: Then I proceeded to open all of the other tables to view their contents. The ‘Computer
Information’ Table contained (from left to right) Computer ID (number data type), Location
(short text data type), Employee ID (number data type), Advanced Software Packet (yes/no data
type). This table is shown below.
4 Database Report
2.b: Then when inspecting the ‘EmployeeInformation’ Table it was notable that the data fields
contained a mix of number data types and short text data types. The fields from left to right read
‘Employee ID’ (number data type), ‘Last Name’ (short text data type), ‘First Name’ (short text
data type), ‘Job Title’ (short text data type), ‘Office Phone’ (number data type), ‘Mobile Phone’
(short text data type). Also the ‘Employee ID’ column was not listed in the same order as the
‘ComputerInformation’ table, this would effect a query if I were to combine the tables.
5 Database Report
2.c: The fourth and final table was the ‘Job Titles’ table this table contained one column of job
titles that was created using the short text data type. The ‘Job Title’ field is highlighted in blue
below.
6 Database Report
Creating the Query
3 The design view of the completed Query
3.a: In the screen shot below the completed ‘UpgradeReport’ query is showing in design view.
Looking carefully at the screen shot, the ‘ComputerInformation’ Table is visibly linked to the
‘EmployeeInformation’ table through two different fields. At the bottom of the screen you can
see that this query is using ‘Computer ID’ data and ‘Employee ID’ data from the
‘ComputerInformation’ table. The ‘Last Name’ data and ‘First Name’ data from the ‘Employee
Information’ table and the ‘Upgrade Group’, ‘Upgrade Date’, ‘Current OS Version’, ‘Upgrade
OS Version’ data from the ‘UpgradeInformation’ table. This report will detail the steps that were
taken to combine this data into the one query, that is seen below.
7 Database Report
3.b: In order to sync up the computer ID’s with the employee ID’s, to enable listing the
employee names (short text data type) alongside the employee ID’s (number data type), I had to
first create a relationship between the ‘Computer ID’ field in the ‘ComputerInformation’ table
and the ‘Computer ID’ field in the ‘Upgrade Information’ table.
3.c: Clicking on the ‘Database Tools’ tab at the top of the screen, then clicking on relationship,
the two ‘Computer ID’ Fields were added and linked, one from the ‘ComputerInformation’ table
the other from the ‘UpgradeInformation’ table. This created the relationship link that is shown in
the screen shot below.
8 Database Report
3.d: These ‘Computer ID’ fields were exactly the same in both tables so creating the relationship
between them linked the two tables to enable the organized query that is shown below in ‘Query
1.’
9 Database Report
3.e: The next step was to sync up the Employee ID numbers from the ‘ComputerInformation’
table with the ‘Employee ID’ numbers in the ‘EmployeeInformation’ table. I also wanted to sync
the names of the employees with the ‘Employee ID’ numbers listed in order with the ‘Computer
ID’ numbers. I created a query between the ‘Employee ID’ field in ‘Query 1’ and the ‘Employee
ID’ field from ‘EmployeeInformation.’ I also included the ‘Last Name’ and ‘First Name’ field
from ‘EmployeeInformation.’ This effectively organized the employee ID’s in the order of the
computer ID’s and put the employee’s names in order as well. The design and spreadsheet view
of the ‘Query 2’ results are shown below.
Design View
11 Database Report
4 Conclusion: The Completed Upgrade Report
4.a: After creating a relationship link between the two ‘Computer ID’ fields and syncing up the
two ‘Employee ID’ Fields and the employee names through ‘Query 2’, I was able to effectively
combine three of the data tables: ‘ComputerInformation,’ ‘EmployeeInformation’ and
‘UpgradeInformation’ into one query. The ‘UpgradeReport’ query needed to be easily read and
utilized by the Help desk and creating these links between the data fields kept the combined data
organized and useful. The spreadsheet view of the completed ‘UpgradeReport’ is shown below.
WHAT IS INFORMATION ASSURANCE?• Information assurance: is used to describe a system of
technologies that are put into place to protect the data within a
computer or a network of computers.
• Antivirus software, internet security software, Anti-Malware, Anti-
Spyware, and firewalls are all different types of technologies
that provide information assurance for personal computers and
networks.
• The 2016 Ponemon Institute Cost of a Data Breach Study found that “the average
consolidated total cost of a [company] data breach is $4 million. The study also reports that
the cost incurred for each lost or stolen record containing sensitive and confidential
information increased from a consolidated average of $154 to $158. In addition to cost
data, the global study puts the likelihood of a material data breach involving 10,000 lost or
stolen records in the next 24 months at 26 percent (Ponemon, 2016).”
WHAT ARE THE RISKS?• Currently there are thousands of different types of threats such as:
malware, viruses, spyware, adware, trojans, ransomware, worms,
and rootkits on the web that are ready to deceptively invade our
computers.
• A breach could cost the company quite a bit of money to recover
our losses
• In February of 2014 a self-replicating piece of malware, known as The Moon was able to
bypass authentication and exploited -execution weaknesses in Linksys/Cisco home routers,
and it affected millions around the world. This malware exploited flaws in the routers to
enable cybercrime techniques for stealing log-in information and for gaining access to other
data storage. Since it was identified, other similar home and small business router back doors
have been discovered in Netgear, Netis/Netcore and other Cisco models. Making it
essential to have an updated network router and a security suite in place to protect our
company from a data breach (Porembo, 2014).
HOW DO WE PROTECT OURSELVES?
• In addition to updating our network configuration and hardware, installing a current Small
Business Security Suite during the operating system upgrade is essential to protecting this
companies data, computers and our bottom line
• Bitdefender’s Gravity Zone Business Security is one of the best information assurance software
suite’s on the market in 2016.
• If implemented it will protect our computers, network and server against viruses, spyware,
worms, trojans, rootkits, and ransomware
• Provides an additional firewall and web protection
• Allows for the simplified and efficient management of network security
• Scalability
• Available at www.bitdefender.com/SmallBusiness
REFERENCES
• Ponemon, L. (2016). The 2016 Ponemon Institute cost of a data breach study.
Retrieved from: https://securityintelligence.com/media/2016-cost-data-
breach-study/
• Poremba,S. (2014). The top 5 information security breaches no one is talking about.
Retrieved from: http://www.forbes.com/sites/sungardas/2014/09/24/the
-top-5-information-security-breaches-no-one-is-talking-
about/#11e42bc57f99
TUTORIAL: How to Manage Cookies On Microsoft Edge:
by Jaclyn Barnsley
STEP 1: How to Block Third Party cookies in Microsoft Edge:
A. Click on the More (…) icon in the upper right hand corner of the browser
B. Then select Settings at the bottom of the drop down menu
C. Scroll down to Advanced Settings, select View Advanced Settings
D. Under Privacy and Services scroll down to Cookies
E. Choose the option you want from the drop down menu (Block all cookies blocks all
cookies that websites try to save to your computer. Block only third party cookies
blocks third party cookies, which are saved by external web services, such as ads
embedded on webpages you have navigated to.)
F. To ensure privacy during web browsing select Block Only Third Party Cookies
Blocking all cookies could stop certain websites from downloading and limit the abilities of the
web browser while allowing third party cookies would allow the collection of browsing
information for the purpose of interest-based advertising.
STEP 2: How to enable cookies (not recommended)
A. Follow steps A through E from STEP 1 above
B. Select Don’t block cookies from the drop down menu
STEP 3: How to clear cookies saved on your device:
A. Go to More (…) > Settings
B. Under Clear browsing data, select Choose what to clear,
C. Then select the Cookies and saved website data check box.
TUTORIAL: How to make our website the homepage:
By Jaclyn Barnsley
STEP 1: Create a desktop link for easy access to the browser
A. Click on the window icon in the lower left corner of the screen
B. Select All Apps
C. Scroll down to Microsoft Edge
D. Select the icon and drag it and drop it onto the desktop
E. Click on the newly created link to access the web browser
STEP 2: How to set the homepage on Microsoft Edge
Follow the below steps to set the homepage on the browser
A. Click on the More (…) icon next to the feedback icon present on top right corner of the
browser.
B. Click on Settings from the drop down menu.
C. Select A specific page or pages under open with.
D. Click on the option down to the A specific page or pages and select Custom from the
drop down menu.
E. You can Enter our web address (www.companyxyz.com) in the text box by clicking on
+ button.
F. Close the browser and open it again for the changes to take effect.
G. When finished setting the page move the icon on the desktop to the left side of the screen
in line with the other icons.