M. Thibodeaux

Information Technology

There are five core technologies that are the foundation for the successful operation of modern systems. These technologies are Computer Programs and Programming, Computer Networks, Databases, Web Technologies, and Information Assurance. Each technology contributes an essential role to achieve the overall result. The larger the system, the more complicated the requirements and functionality because there is an increase in the necessary components, programming, and demand on the system to operate at peak efficiency. The samples shared below are from my graduate program.

Telecommunication and Networking

Traffic Flow Diagram

A network operator is primarily responsible for monitoring bandwidth across a network.


Network speed and bandwidth (measured in bits-per-second) refers to the maximum amount of traffic that the link can handle. The third term applicable to network traffic utilization is throughput. Throughput is measured as it's transferred between application endpoints.


Network architecture includes the entire layout of a network as well as all devices (hardware), programs and applications (software), protocols for communication, and data transmission mediums (wired and/or wireless). Cybersecurity measures, applications, and devices will make the network secure, keep it secure as it grows, and aid in disaster recovery.

Databases

Guy's Adventure

Good database design begins with the construction of the conceptual model of the database. The entity-relationship (E-R) model is the most common way that database professionals capture the conceptual model of the data. The model uses E-R diagrams to represent the entities within the enterprise that are represented in the data.


The relational model relies on two integrity rules: entity integrity and referential integrity. It is important to understand and appreciate these integrity rules. These rules are critical to ensuring the overall integrity of the data in the database and the ability of the database to represent the underlying information accurately and consistently for the enterprise.


The logical model, as shown here, outlines the attributes for each of the entities to sort the data and ensure nothing is left out.

Information Assurance

Info Assurance

An information assurance plans serves to provide a structured description of the goals and objectives of an organization's information security. The benefit of creating and maintaining an information assurance plan is to protect the organization from malicious attack, provide disaster recovery protocols in the event of a breach, proffer resources and training for personnel, and monitor and prepare for threats.


The importance of ensuring confidentiality, integrity, and availability of information is the purpose of the information assurance plan outline. There are two more vital requirements, authentication and nonrepudiation, for computer/user interaction that serve to ensure that the users are the intended senders and receivers.


Address Resolution Protocol (ARP) Spoofing is an OSI model Layer 2 query-response protocol. This type of spoofing attack occurs over a Local Area Network (LAN); the attacker uses a false ARP and is able to substitute their own MAC address with the IP address of a valid computer or server that's part of the network. This type of attack is aimed at stealing sensitive information, and can also facilitate other attacks including Denial of Service, Session Hijacking, and Man-in-the-Middle attacks.

Object Oriented Programming

UML

Substantial software projects are often developed and implemented by utilizing accepted software engineering principles like modularity, encapsulation, and reusability. Following established object-oriented principles when writing a program results in modular solutions composed of well-formed classes that can be extended and reused, culminating in an enduring program that solves a problem.


Skills were developed in applying object-oriented concepts to solve software problems and implement solutions, algorithm design for problem solving, and topics of data structures as they are related to the algorithms that use them. The image here shows the UML for the Recipe Box developed using Java in the NetBeans IDE. There are three classes, RecipeBox, Recipe, and Ingredient.