Cloud hardware project 1 and ch5 questions
This commit is contained in:
parent
75ff89644d
commit
e013dcbed6
Binary file not shown.
@ -0,0 +1,9 @@
|
||||
Assesment is not a constraint, as it does not prevent me from reaching design requirements.
|
||||
|
||||
Potentially constrained by the quality of data in the database
|
||||
|
||||
Constrained by the efficacy of static filters
|
||||
|
||||
Try to fit Gantt chart on one page
|
||||
|
||||
Extra Gantt chart week at end?
|
@ -0,0 +1,25 @@
|
||||
import numpy as np
|
||||
import scipy as sp
|
||||
import matplotlib.pyplot as plt
|
||||
|
||||
|
||||
def u(n):
|
||||
return np.heaviside(n, 1)
|
||||
|
||||
|
||||
def ideal_lowpass(omega, omega_c):
|
||||
return np.where(np.abs(omega) <= omega_c, 1, 0)
|
||||
|
||||
|
||||
def main():
|
||||
omega_c = 0.4*np.pi
|
||||
omega = np.arange(0, np.pi, 0.05*np.pi)
|
||||
|
||||
h_lpf = ideal_lowpass(omega, omega_c)
|
||||
|
||||
plt.plot(omega, h_lpf)
|
||||
plt.show()
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
@ -0,0 +1,16 @@
|
||||
---
|
||||
title: ECE09488 Assignment #5
|
||||
author: Aidan Sharpe
|
||||
date: March 13th, 2025
|
||||
---
|
||||
|
||||
1. c
|
||||
2. b
|
||||
3. d
|
||||
4. c
|
||||
5. d
|
||||
6. a
|
||||
7. a & c
|
||||
8. a
|
||||
9. a
|
||||
10. b
|
Binary file not shown.
@ -0,0 +1,37 @@
|
||||
---
|
||||
title: ECE09488 Assignment #5
|
||||
author: Aidan Sharpe
|
||||
date: March 13th, 2025
|
||||
geometry: margin=1in
|
||||
---
|
||||
|
||||
### 1. Which VPN topology is the best fit for a connection between an on-prem database and a cloud based application?
|
||||
c. Point-to-site
|
||||
|
||||
### 2. Which network configuration must be adjusted to support VXLAN and GENEVE?
|
||||
b. UDP
|
||||
|
||||
### 3. What type of virtual network can peer many other virtual networks to allow communication between all connected networks?
|
||||
d. Hub
|
||||
|
||||
### 4. Why are VLANs restricted to layer 3 communications?
|
||||
c. VLAN tags are added at layer 2.
|
||||
|
||||
### 5. Suppose you have a large cluster of web servers in one availability zone and a much smaller cluster in a different availability zone. You want to make sure your larger cluster takes a larger portion of the website traffic. Which load-balancing method is the best fit?
|
||||
d. Weighted round robin
|
||||
|
||||
### 6. What would you need to change in your VPC configurations to ensure VM instances use DNS servers hosted by your organization?
|
||||
a. Scope options
|
||||
|
||||
### 7. At what level is an IP address space typically defined in the public cloud?
|
||||
a. VPC
|
||||
c. Subnet
|
||||
|
||||
### 8. What misconfiguration will result in failed health checks from a load balancer's server cluster?
|
||||
a. Incorrect IP address
|
||||
|
||||
### 9. Which load-balancing method is the best fit for a server cluster where workloads can be highly unpredictable in the time required to complete each series of tasks?
|
||||
a. Least connection
|
||||
|
||||
### 10. Which utility will help you identify the port a network service is using?
|
||||
b. ss
|
BIN
8th-Semester-Spring-2025/cloud-hardware/project-4-2.png
Normal file
BIN
8th-Semester-Spring-2025/cloud-hardware/project-4-2.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 60 KiB |
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-1.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-1.pdf
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-2.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-2.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-3.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-3.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-4.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-4.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-5.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-5.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-6.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-6.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-7.pdf
Normal file
BIN
8th-Semester-Spring-2025/weapon-systems/lectures/L-7.pdf
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user