Cloud hardware project 1 and ch5 questions
This commit is contained in:
parent
75ff89644d
commit
e013dcbed6
Binary file not shown.
@ -0,0 +1,9 @@
|
|||||||
|
Assesment is not a constraint, as it does not prevent me from reaching design requirements.
|
||||||
|
|
||||||
|
Potentially constrained by the quality of data in the database
|
||||||
|
|
||||||
|
Constrained by the efficacy of static filters
|
||||||
|
|
||||||
|
Try to fit Gantt chart on one page
|
||||||
|
|
||||||
|
Extra Gantt chart week at end?
|
@ -0,0 +1,25 @@
|
|||||||
|
import numpy as np
|
||||||
|
import scipy as sp
|
||||||
|
import matplotlib.pyplot as plt
|
||||||
|
|
||||||
|
|
||||||
|
def u(n):
|
||||||
|
return np.heaviside(n, 1)
|
||||||
|
|
||||||
|
|
||||||
|
def ideal_lowpass(omega, omega_c):
|
||||||
|
return np.where(np.abs(omega) <= omega_c, 1, 0)
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
omega_c = 0.4*np.pi
|
||||||
|
omega = np.arange(0, np.pi, 0.05*np.pi)
|
||||||
|
|
||||||
|
h_lpf = ideal_lowpass(omega, omega_c)
|
||||||
|
|
||||||
|
plt.plot(omega, h_lpf)
|
||||||
|
plt.show()
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
@ -0,0 +1,16 @@
|
|||||||
|
---
|
||||||
|
title: ECE09488 Assignment #5
|
||||||
|
author: Aidan Sharpe
|
||||||
|
date: March 13th, 2025
|
||||||
|
---
|
||||||
|
|
||||||
|
1. c
|
||||||
|
2. b
|
||||||
|
3. d
|
||||||
|
4. c
|
||||||
|
5. d
|
||||||
|
6. a
|
||||||
|
7. a & c
|
||||||
|
8. a
|
||||||
|
9. a
|
||||||
|
10. b
|
Binary file not shown.
@ -0,0 +1,37 @@
|
|||||||
|
---
|
||||||
|
title: ECE09488 Assignment #5
|
||||||
|
author: Aidan Sharpe
|
||||||
|
date: March 13th, 2025
|
||||||
|
geometry: margin=1in
|
||||||
|
---
|
||||||
|
|
||||||
|
### 1. Which VPN topology is the best fit for a connection between an on-prem database and a cloud based application?
|
||||||
|
c. Point-to-site
|
||||||
|
|
||||||
|
### 2. Which network configuration must be adjusted to support VXLAN and GENEVE?
|
||||||
|
b. UDP
|
||||||
|
|
||||||
|
### 3. What type of virtual network can peer many other virtual networks to allow communication between all connected networks?
|
||||||
|
d. Hub
|
||||||
|
|
||||||
|
### 4. Why are VLANs restricted to layer 3 communications?
|
||||||
|
c. VLAN tags are added at layer 2.
|
||||||
|
|
||||||
|
### 5. Suppose you have a large cluster of web servers in one availability zone and a much smaller cluster in a different availability zone. You want to make sure your larger cluster takes a larger portion of the website traffic. Which load-balancing method is the best fit?
|
||||||
|
d. Weighted round robin
|
||||||
|
|
||||||
|
### 6. What would you need to change in your VPC configurations to ensure VM instances use DNS servers hosted by your organization?
|
||||||
|
a. Scope options
|
||||||
|
|
||||||
|
### 7. At what level is an IP address space typically defined in the public cloud?
|
||||||
|
a. VPC
|
||||||
|
c. Subnet
|
||||||
|
|
||||||
|
### 8. What misconfiguration will result in failed health checks from a load balancer's server cluster?
|
||||||
|
a. Incorrect IP address
|
||||||
|
|
||||||
|
### 9. Which load-balancing method is the best fit for a server cluster where workloads can be highly unpredictable in the time required to complete each series of tasks?
|
||||||
|
a. Least connection
|
||||||
|
|
||||||
|
### 10. Which utility will help you identify the port a network service is using?
|
||||||
|
b. ss
|
BIN
8th-Semester-Spring-2025/cloud-hardware/project-4-2.png
Normal file
BIN
8th-Semester-Spring-2025/cloud-hardware/project-4-2.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 60 KiB |
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-1.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-1.pdf
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-2.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-2.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-3.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-3.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-4.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-4.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-5.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-5.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-6.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-6.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-7.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-7.pdf
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user