The Best Assignment Help

mit

MIT BN203 BN205 BN206 and BN208

MIT BN203 BN205 BN206 and BN208

Assessment Details and Submission Guidelines
Trimester T2 2018
Unit Code BN203
Unit Title Network Security 1
Assessment Type Individual Assessment
Assessment Title Identify emerging threats and mitigation strategies in Information Systems
Purpose  of the The purpose of the assignment is to identify the emerging threats and
assessment (with mitigation strategies in Information Systems . Students will be able to complete
ULO Mapping) the following ULOs:
b.  Identify  common  emerging  threats,  attacks,  mitigation  and
countermeasures in networked information systems
Weight 15%
Total Marks 50
Word limit 1000 – 1500
Due Date 30st August, 2018 (23:55)
Submission All work must be submitted on Moodle by the due date along with a
Guidelines completed Assignment Cover Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
(Body) font and 2 cm margins on all four sides of your page with appropriate
section headings.
Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly to the School’s Administration
Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit
this application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic Academic Misconduct is a serious offence. Depending on the seriousness of
Misconduct the case, penalties can vary from a written warning or zero marks to
exclusion from the course or rescinding the degree. Students should make
themselves familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
ProcedureFor further information, please refer to the Academic Integrity
Section in your Unit Description.

 

 

 

 

 

 

 

 

 

Type

 

 

 

assessment (with ULO Mapping)

 

 

to demonstrate their achievements in them:

 

Demonstrate project leadership skills; identify and assess risk in designing and executing major projects;

 

Reflect on current project management ethics, research, theory and practice;

 

 

 

 

 

 

 

 

Guidelines All work must be submitted on Moodle by the due date along with a completed
Assignment Cover Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font
and 2 cm margins on all four sides of your page with appropriate section headings.
Reference sources must be cited in the text of the report, and listed appropriately
at the end in a reference list using APA referencing style.
If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly to the School’s Administration Officer, in
Melbourne on Level 6 or in Sydney on Level 7.  You must submit this application
three working days prior to the due date of the assignment. Further information is
available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-
guidelines/specialconsiderationdeferment
Misconduct Academic Misconduct is a serious offence. Depending on the seriousness of the
case, penalties can vary from a written warning or zero marks to exclusion from
the course or rescinding the degree. Students should make themselves familiar
with the full policy and procedure available at: http://www.mit.edu.au/about-
mit/institute-publications/policies-procedures-and-guidelines/Plagiarism –
Academic-Misconduct-Policy-Procedure. For further information, please refer to
the Academic Integrity Section in your Unit Description.

 

 

 

 

 

 

 

 

 

 

 

 

 

Prepared by: Samira Baho      Moderated by: Dr Karthik Nagarajan                 July, 2018

BN205                                                        Network Project Management                             Page 2 of 8

 

Purpose of the assessment:

 

As a project manager, your career will be driven by decisions, often dozens or more per day. Some decisions are small and barely noticed while others are more prominent and could have serious ramifications on yourself, your organisation and your stakeholders. Decisions like this will most likely require deep thought as they involve people, resources and the environment. Sometimes these factors are in conflict, creating a dilemma and significant riskswhere your awareness of Ethical issues in a professional setting will be vital.

To guide ethical behaviour and help with tough decisions, the Project Management Institute (PMI) has developed a Code of Ethics and Professional Conduct and an Ethical Decision-Making Framework. This assessment will require you to use your knowledge of the PMI code and framework and apply it in a real life case study.

 

Occidental Engineering Case Study

 

 

 

Michael McFarland, S.J.

 

Wayne Davidson is a software engineer in the aerospace division of Occidental Engineering, a large engineering firm. For the past two years he has been working as a test engineer for Operation Safe Skies, a project to build a prototype of the next generation air traffic control system. This project, which is funded by a contract from the Federal Aviation Agency (FAA), is a very important one for Occidental. With all the cutbacks in defence spending, the aerospace division has been losing business. The Safe Skies project has provided much needed business, and could lead to a much larger contract if successful. Mindful of its strategic importance, the company had bid very aggressively for the original contract. In fact they had “low-balled” it, bidding less than it would take to do the work properly. They felt that was the only way they could beat out their competitors, who were just as hungry for the work. Because of their somewhat shaky financial position, the company was not willing to take a loss on the project, so the project has been underfunded and understaffed. Nevertheless those working on the project have made a heroic effort, working eighteen hour days seven days a week to meet the deadline, because they know how much it means to the company, not to mention their own jobs. They are now very close to success.

 

A version of the prototype has been completed and turned over to Wayne for testing. He has run extensive simulations on it and found that it works as it should except for one little problem. When there are too many aircraft in the system, it will sometimes lose track of one or more of them. The “forgotten” aircraft will simply disappear from the screen, there will be no trace of it anywhere, and it will be ignored by all of the collision avoidance and other safety tests. Wayne has been working with the software designers to identify the cause of the problem, and they have traced it to a subtle error in memory allocation and reuse. They are confident that they can fix it, but it will take a month or more to do the redesign, coding and testing.

 

Wayne meets with his boss, Deborah Shepherd, the project manager, to discuss the implications. She tells him that what he is asking for is impossible. The contract requires that the company deliver a fully certified, working version of the software in three days for system integration and test. The government has developed a new, get-tough policy on missed deadlines and cost overruns, and Occidental is afraid that if they miss this deadline, the government will make an example of them. They would be subject to fines and the loss of the remainder of the prototype contract; and they might not be allowed to bid on the contract for the full system. This would have a devastating effect on the aerospace division, resulting in thousands of lost jobs.

 

They consider whether they can do a quick patch to the software before turning it over, but Wayne adamantly refuses to release any code that has not been tested thoroughly. There is always a chance that the patch would interact with some other part of the program to create a new bug.

 

Prepared by: Samira Baho                             Moderated by:                                                 Dr Karthik Nagarajan      July, 2018

BN205                                                        Network Project Management                             Page 3 of 8

 

“Then we’ll have to deliver the software as is,” Deborah says. “I can’t jeopardize this project or the jobs of my people by missing that deadline.”

 

“We can’t do that!” exclaims Wayne. “That’s like delivering a car with defective brakes.”

 

“Don’t worry,” Deborah reassures him. “We have contacts in the FAA, so we know their testing plans. They will do a lot of simulations to make sure the software works with the hardware and has all the functionality in the specs. Then they will do live tests, but only at a small airport, with a backup system active at all times. There is no way they will overload the system in any of this. After that they will have some change requests. Even if they don’t, we can give them an updated version of the program. We can slip the bug fix in there. They will never see the problem. Even if they do, we can claim it was a random occurrence that would not necessarily show up in our tests. The important thing is no one is in any danger.”

 

“Maybe they won’t find the bug, but I know it’s there. I would be lying if I said the system passed all the necessary tests. I can’t do that. Anyway, it would be illegal and unprofessional.”

 

“You can certify that it is safe, because it is, the way they are going to use it.”

 

And so he does. In the end Wayne signs off on the software. It is delivered to the FAA and makes it through all the preliminary tests, including live tests at a small airport in the Midwest. As a result of these tests, the FAA requests some changes in the user interface, and when Occidental delivers the new software it includes a robust solution to the problem of the disappearing aircraft. No one outside of Deborah’s group ever learns of the problem. In fact Occidental’s success with the prototype leads to major contracts for air traffic control software, giving much-needed business to the aerospace division. This saves hundreds of jobs, and allows the company to add hundreds more.

 

Wayne Davidson, however, takes early retirement once the prototype project is finished, in order to write a book on software testing. He feels that the book should have a chapter on ethics, but he can never bring himself to write it.

 

What do you think about Wayne’s decision? Was it ethical?

 

 

References:

 

 

Michael McFarland, S.J., a computer scientist, is the former president of College of the Holy Cross and was a visiting scholar at the Markkula Ethics Center. June 2012

Available at: http://www.onlineethics.org/Resources/Cases/OccidentalEng.aspx [Accessed 07 November, 2017]

BN205 Network Project Management

Task

Prepare a report of about 1000 words that gives an ethical analysis of the issues raised in the case study. Your report should at least include the following:

Executive Summary

You should provide a brief summary of your main findings and research so that the reader can know its main purpose.

Introduction

o In this section you should (briefly) state the case study being analysed. You should also discuss the purpose and scope of the report and the sources of the information that you have used. That is, you should provide an overview of what you intend to write about in your report, so that the reader can anticipate how you are going to present the material and what it will consist of.

Analysis of the case study

o  Identify the ethical issues that arise in this case study.

o Identify the potential consequences to the stakeholders of accepting this aggressive bid and risks involved in this project.

o Identify the potentialbreaches of the Project Management Institute (PMI) ethical standards by the Project team. Examine the PMI code and identify requirements that are relevant to this case study.

o Deborah and Wayne are attempting to resolve the ethical dilemma that they have. Having completed your ethical analysis recommendations as to how they should proceed.

Conclusion

o Provide short concluding comments that remind the reader the main purpose of the assessment, how you went about addressing the ethical issues of the case study, what references you used and what the main findings were.

BN205 Network Project Management

Submission guidelines:

The report should have a consistent, professional, and well-organized appearance. Create the report (Minimum 1000 Words).

  1. Your report should include the following:

The cover page must identify students’ (name and number), teaching staff, and assignment.

The report must include executive summary, table of contents, introduction, discussions (with heading/sub-headings to address the requirements listed above), conclusion and references.

Reference sources (APA style) must be cited in the text of the report, and listed appropriately at the end in a reference list.

  1. The assignment must be submitted in soft (electronic) copy on Moodle drop box. The pages of the assignment must be clear on each page
BN205 Network Project Management Page 6 of 8
Marking criteria:
Marks are allocated as follows:
Section to be included in the report Description of the section Marks
Executive summary -A brief summary of your main findings and
research so that the reader can know its 5
main purpose.
-In this section you should (briefly) state the
case study being analysed. You should also
Introduction discuss the purpose and scope of the report
and the sources of the information that you 5
have used. That is, you should provide an
overview of what you intend to write about
in  your  report,  so  that  the  reader  can
anticipate how you are going to present the
material and what it will consist of.
– Identify the PM ethical issues in the case 8
study.
-Identify   the   potential   risks   to   the 8
Analysis of the case study stakeholders  of  accepting  this  aggressive
bid.
–  Identify  the  potential  breaches  of  the
Project Management Institute (PMI) ethical 10
standards by the Project team. Examine the
PMI code and identify requirements that
are relevant to this case study.
Deborah  and  Wayne  are  attempting  to
Recommendations resolve the ethical dilemma that they have. 5
Having  completed  your  ethical  analysis,
provide  advice  as  to  how  they  should
proceed.
Provide  short  concluding  comments  that
Conclusion remind the reader the main purpose of the 5
assessment,   how   you   went   about
addressing the ethical issues of the case
study, what references you used and what
the main findings were.
Reference and appendices APA Style 2
Report logical structure, grammar and spelling 2
Total Marks 50

 

BN205 Network Project Management Page 7 of 8
Marking Rubric for Assignment 1: Total Marks 50
Grade HD D CR P < 50%
Mark 80  % 70%-69% 60%-69% 50%-59%
+
Executive Summary Complete in Complete in most Incomplet Incomplete in Incomplete in
/5 all respects; respects; reflects e in many most respects; all aspects;
reflects all most requirements respects; does not reflect does not
requirement reflects requirements reflect
s few requirements
requirem
ents
Introduction Demonstrates a Demonstr Demonstrates an Demonstrates Does not
/5 sophisticated ates an acceptable an inadequate demonstrate
understanding of accomplis understanding of understanding d
the case study hed the topic(s) and of the case understandin
and issues understan issues study and g to the
ding of issues topics and
the case issues.
study and
issues
Case Study Analysis Presents an Presents a Presents a Presents an Analysis not
/26 insightful and thorough superficial incomplete related to
thorough analysis analysis of analysis of analysis of the the case
of all issues most issues some of the issues study
identified; identified; issues identified presented.
includes all includes most identified;
necessary necessary omits
information information necessary
information
Makes Makes appropriate Makes Makes little or No
appropriate connections appropriate but no connection connection
and powerful between the issues somewhat vague between the between the
connections identified and the connections issues issues
between the risk between the identified and identified PM
issues management/code issues and the risk the risk concepts
identified and of ethics concepts management/cod management/c studied
the risk studied in PM. e of ethics ode of ethics
management/c concepts studied concepts
ode of ethics in PM. studied in PM.
concepts
studied in PM.
usion Presents Presents specific, Presents Presents realistic No
detailed, realistic, and realistic or or appropriate Recommendati
/10 realistic, and appropriate appropriate recommendatio ons presented
appropriate recommendations recommendatio ns with little, if
recommendatio supported by the ns supported by any, support
ns clearly information the information from the
supported by presented and presented and information
the information PM concepts PM concepts presented and
presented and PM concepts
PM concepts
presentation Writing Writing is Writing lacks Writing is Report
demonstrates a accomplished in clarity or unfocused, unfocused,
/2 sophisticated terms of clarity conciseness rambling, or contains
clarity, and conciseness and contains contains grammatical
conciseness, and and contains only numerous serious errors; and spelling
correctness; a few errors; errors; gives lacks detail and errors. Very
includes includes sufficient insufficient relevant data hard to
thorough details details and detail and and understand.
and relevant relevant data and relevant data information;
data and information; well- and poorly
information; organized information; organized
extremely well- lacks
organized organization

 

BN205 Network Project Management Page 8 of 8
/2 Uses APA Uses APA Reflect Does not use APA No Reference
guidelines s guidelines
accurately and guidelines with incomp
consistently to minor violations lete
cite sources to cite sources knowle
dge of
APA

Assignment Description

Objective of this assessment is to identify common emerging threats and attacks, and suggest appropriate mitigation and countermeasures strategies for networked information systems.

Scenario

You are the principal Security Architect for Mindvision Corporation, a firm with four regional offices and 50 employees located across Australia. The corporation has detected an ongoing cyber-attacks from last few days effecting their network and day-to-day operational services. Your role (based on the chosen topic below) is to liaise between business stakeholders and technologists. Translating potential emerging threats and attacks faced by Corporation and providing feasible countermeasures so corporation can take security decisions more effectively.

Your deliverable for this assessment is to write a report for any ONE of the following topics:

IP security

Secure remote access

Network devices security Cloud computing

Intrusion prevention system Firewall security

DDoS attack detection and prevention

The report must address the following criteria:

An Executive Summary at the beginning of the report which provides a clear statement of the emerging threats and attacks being assessed. Identify and explain emerging threats based on vulnerabilities and consequences derived from Networked Information Systems.

Discuss potential damages these threats and vulnerabilities could cause if exploited. What are the challenges and issues faced by corporation to control these threats?

Discuss the impact of financial difficulties and budget constraints while selecting security counter measures.

Provide detail mitigation and countermeasure strategies that will impact the networked information system.

Marking criteria:

Example of marking criteria is shown in following table. Marks are allocated as follows:

Section to be Description of the section Marks
included in the report
Executive Summary Student should describe purpose of report and 5
statement of threats and attacks being discussed in
report.
Identification of Student should identify and discuss in detail relevant 10
threats and attacks security threats and attacks for the selected topic
Potential damages Student  should list down  and  explain potential 10
damages these threats could cause if exploited
Challenges/Issues Student should identify and relate challenges/issues 10
faced by corporation to control these threats such as
financial difficulties and budget constraints.
Mitigation and Student should discuss mitigation and 5
countermeasure countermeasure  strategies  relevant  to  threats
strategies identified in earlier part of this report
Summary/Conclusion Student should conclude how these threats and 5
mitigation  strategies  is  going  to  impact  the
networked information systems
Reference style Follow IEEE reference style 5
Total 50

Marking Rubric:

Grade Mark

HD DI CR P Fail
40-50 35-39 30-34 25-29 <25
Excellent Very Good Good Satisfactory Unsatisfactory

Executive Summary/5

Identification of threats and attacks/10

Potential damages/10

Challenges /Issues /10

Mitigation and countermeasure strategies /5

Summary/Conclusion/5

Concise and Summary is Generally Some
relevant and relevant relevance and
specific to the
soundly and briefly
topic
analyzed. analyzed. presented.
Demonstrated Demonstrated Demonstrat Demonstrate
ed  ability d  ability to
excellent ability excellent
to think think critically
to think critically ability to think
critically and did not
and sourced critically but
and sourced source
reference did not source
reference reference
material reference
material material
appropriately for material
appropriate appropriately
identification of appropriately
ly
threats
In depth use of a Evidence of Use of some Limited
relevant evidence of
good range of using relevant
literature to using relevant
relevant literature to
address the literature to
literature to address the
points. address the
address the points.
point
points.
Logic is clear and Consistency Mostly Adequate
consistent cohesion and
easy to follow logical and
logical and conviction
with strong convincing
convincing
arguments
Thorough and Good Enough Limited
comprehensive explanation of explanation explanation to
explanation of the solutions of the the solution of
the solutions, to to the problem solution to the problem
the problem defined the problem defined.
defined. defined
All elements are Conclusive Components Most
present and very present with present and components
well integrated. good cohesive mostly well present but
integrated not well
summarized

This is not relevant to the assignment topic.

Did not demonstrate ability to think critically and did not source reference material appropriately

No evidence and literature to address points as required.

Argument is confused and disjointed

No explanation for mitigation provided or discussed

Conclusion lacks relevance

Reference style Clear styles with Clear Generally Sometimes Lacks consistency
/5
excellent source referencing good clear with many errors
of references. style referencing referencing
style style
Assessment Details and Submission Guidelines
Unit Code BN206
Unit Title System Administration
Assessment Type Individual Assignment
Assessment Title Assignment-1: Server management systems and tools (T2-2018)
Purpose of the assessment (with ULO Mapping) This assignment is designed to assess students’ knowledge and skills related to the following learning outcomes:a)      Understand various server management systems

b)      Manage emerging tools and techniques for system management

Weight 15%
Total Marks 40
Word limit 1000-1200 words
Due Date Week 7, Thursday, by 11:55PM through Moodle (Melbourne and Sydney)
Submission Guidelines ·      All work must be submitted on Moodle by the due date along with a title Page.·      The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.

·      Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Extension ·      If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS.  You must submit this application three (3) working days prior to the due date of the assignment. Further information is available at:http://www.mit.edu.au/aboutmit/institutepublications/policiesproceduresandguidelines/specialconsiderationdeferment

 

Without a granted special consideration, late submissions will be subject to penalty as per the information on late penalty in the unit description.

Academic Misconduct  ·      Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.

Purpose of the Assessment:

This assignment has two parts: (i) command line tools and techniques for server management, and (ii) server management systems. The parts combined, the assignment provides students with opportunity to undertake work on the above topics and develop an understanding and professional skills required to manage and maintain network servers.

By doing this assignment, students will get an opportunity to enquire some of the server Operating System features, and basic tools used in LINUX servers. They will also get an idea of various tasks performed by the system administrators.  In addition to that, the overview of the modern day operating systems is also necessary to keep up with the current technological trend.

Task 1:  Server management with Linux commands (15 Marks)

Q1. Managing Linux servers requires skills in using command line tools. Consult various sources of information to gain an understanding of why Linux System Administrators must be proficient in using Linux command line tools as opposed to graphical user interface (GUI) based tools. Write down your understanding on this in your own words in one (1) paragraph. Your submission will be checked for originality using the Turnitin similarity checking software, and if it is detected that your paragraph has a high level of similarity with other sources, you will score zero marks for this answer. Remember to use at least two (2) citations and references (list at the end of the document along with your other references) in your paragraph.                                                                                                                  (6 Marks)

Q2. Use the following commands on a Linux machine running any flavour of Linux (e.g., Ubuntu, Kali), and document the following for each command:                              (3 Marks * 3=9 Marks)

Commands:

  1. ifconfig
  2. netstat
  3. lsof

For each command, document the following:

  1. What the command is used for
  2. Syntax of the command
  3. A valid screenshot with appropriate figure number and caption showing how you explored the command on your Linux system. Figure 1 shows an example of a valid screenshot where the user who used the command is clearly displayed. This is required for checking the originality of your work. Do the following before using any of the above commands to achieve this:
    • On the Linux terminal, use the following commands one after the other:

mkdir <your name>     (Replace <your name> with your own name!)

cd <your name>     (You are changing directory to the newly created directory)

Figure 1: Example of a valid screenshot showing the name of the user (User: Jahan)

Task 2:  Server management Systems   (25 Marks)

Every server operating system has its own server management features included. Select and research one (1) topic from the list below, and write a report containing the following sections. Your submission will be checked for originality using the Turnitin similarity checking software, and if it is detected that your report has high level of similarity with other sources, you may score zero marks for this part.

List of topics (choose 1):

  • CentOS
  • Windows nano server
  • Red hat enterprise Linux

Report sections:

Investigate your chosen topic by reading articles and technical configuration from any source other than Wikipedia. These articles can be searched online or from a journal. Provide a Report to share your understanding (between 1000-1200 words limit), which should include the following sections:

  • Introduction
  • Background information/history of development
  • Technical details and features
  • Target platform
  • Advantages and Disadvantages
  • Conclusion
  • References (minimum 5 references)

Submission Guidelines:

Submit one document containing all of your answers for both Task 1 and Task 2. Your submission should include the following:

  • A cover page (topic name and assignment title), identifying student (name and ID), name of the lecturer and name of the tutor.
  • The assignment must use 11-pt Calibri (Body) font and at least 1.5 cm line spacing with appropriate section headings.
  • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE reference style.
  • It should follow standard report f.

Marking criteria

Marks are allocated as follows:

Section to be included in the report Description of the section Marks
Task-1 (15 Marks)
Q1 A paragraph of student’s own understanding on the topic, written using own words. 6
Q2 For each tool: purpose, syntax, original screenshot 3 marks * 3=9
Task 2 (25 Marks)
Introduction Introduction to the Topic, and structure of the report 2
Background information/history of development Details on background including the history of development 3
Technical details and features Detail explanation of the topic with features of the topic 7
Target platform Information and explanation on the computer platforms that are the targets for your chosen OS 3
Advantages and Disadvantages Listings and discussions of advantages and disadvantages of your chosen OS 5
Conclusion A conclusion to summarise the report findings 3
References IEEE reference style, and relevant references onlyAt least seven (7) references 2
Total for assignment 40

Marking Rubric

GradeMark HD32-40 DI28-31 CR24-27 P20-23 Fail<20
Excellent Very Good Good Satisfactory Unsatisfactory
Q1

/6

A paragraph of student’s own understanding on the topic, written using own words, with appropriate citation and references Topics are relevant and soundly analysed. Generally relevant but understanding reported is incomplete or partial. Some relevance and briefly presented, citation ORreferences missing. (This is not relevant to the assignment topic) or (no citations and references).
Q2/9 Excellent presentation of purpose, syntax, original screenshots for ALL commands Very good presentation of purpose, syntax, original screenshots for ALL commands Good presentation of purpose, syntax, original screenshots for ALL commands Unclear presentation of purpose, syntax, with some original screenshots Unclear presentation of purpose, syntax, with all non-original screenshots
Introduction

/2

Excellent introduction of topic and clear structure of report provided Very good introduction of topic and clear structure of report provided Good introduction of topic and report structure provided to some extent Somewhat relevant introduction, or no structure of report provided Irrelevant introduction
Background information/history of development

 

/3

Excellent background information/history of development

provided

Very good background information/history of development

provided

Good background information/history of development

provided

Somewhat relevant background information/history of development

 

Irrelevant background information/history of development

 

Technical details and features

/7

Highly valid and appropriate Valid and appropriate Generally valid and appropriate Somewhat valid Not valid
Target Platform

/3

Clear listing of and excellent information and explanation about the target computer platforms for the chosen OS Clear listing of and good information and explanation about the target computer platforms for the chosen Clear listing of and some information or explanation about the target computer platforms for the chosen Good listing of target platform, lacks information and/or explanation. Absent or wrong platforms listed.
 Advantages/ Disadvantages

 

/5

Excellent list of advantages and disadvantages with clear explanations Good list of advantages and disadvantages with clear explanation List of advantages and disadvantages with some explanation List of advantages and disadvantages with no explanation Absent or irrelevant answer.

 

Conclusions/3 A very powerful conclusion Very good conclusion Good conclusion Conclusion has some relevance Irrelevant or no conclusion
References

/2

Clear styles with excellent source of references.

At least seven (7) references listed and used

Clear referencing style

At least seven (7) references listed and used

Generally good referencing style

Less than seven (7) references listed and used

Sometimes clear referencing style

 

Inadequate number of references

Lacks consistency with many errors

And/or

 

No references (mark decided based on the above two criteria)

 

 

 

 

Assessment Details and Submission Guidelines
Trimester T2 2018
Unit Code BN208
Unit Title Networked Application
Assessment Type Individual written report and demonstration  Assignment 1
Assessment Title Emerging trends in Network Technology and its Applications
Purpose of the This assignment assesses the following Unit Learning Outcomes; students should
assessment (with be able to demonstrate their achievements in following.
ULO Mapping) b. Apply socio-technical contexts in modern network applications and
management;
c. Utilise common and emerging types of middleware to design and manage
networked applications;
Weight 15% of the total assessments
Total Marks 50
Word limit 2000
Due Date 30/08/2018 Thursday, Week 7, demonstrate during laboratory class and submit report
on Moodle
Submission ·  All work must be submitted on Moodle by the due date along with a completed
Guidelines Assignment Cover Page.
·  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font
and 2 cm margins on all four sides of the page with appropriate section headings.
·  Reference sources must be cited in the text of the report and be listed
appropriately at the end in IEEE referencing style.
Extension If an extension of time to submit work is required, a Special Consideration Application
must be submitted directly on AMS at least three working days before the assessment
due date. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-
and-guidelines/specialconsiderationdeferment
Academic Academic Misconduct is a serious offence. Depending on the seriousness of the case,
Misconduct penalties can vary from a written warning or zero marks to exclusion from the course
or cancellation of the degree. Students should make themselves familiar with the full
policy and procedure available at: http://www.mit.edu.au/about-mit/institute-
publications/policies-procedures-and-guidelines/Plagiarism-Academic-
Misconduct-Policy-ProcedureFor further information, please refer to the Academic
Integrity Section in the Unit Description.

BN208 Networked Application                                     Assignment 1                                                                      Page 2 of 4

Assignment 1 Specification

Description

Applications of all kinds are critical to the daily operations of enterprises all over the world. While hypervisor virtualization technology has become the standard for managing applications, software components, containers enable IT professionals to install, run, maintain, and upgrade applications and their surrounding environments quickly, consistently, and more efficiently than their hypervisor counterparts. This is making Containers a popular topic for many IT professionals, and is increasing traction in the enterprise.

Write a report addressing following question with the help of figures and example scenarios.

  1. What is a Data Centre and discuss different operation performed in data centre, how data centres divided in Different tiers based on what criteria’s? Give example of few famous Australia based Data centres.
  2. What is Hypervisor-Based Server Virtualization Technology, its use and explain at least two examples of it. Also, compare both examples based on their features and limitations.
  3. What is container-based virtualization and why we need it? Discuss at least two examples of it and also, compare both examples based on their features and limitations.

Instructions: Students need to read three to four articles abouthypervisor virtualization technologyData Centre and container-based virtualization applications to explore how these technologies work and their different features. Students can choose to research about any vendor application.

Demonstration: Students should prepare presentation slides and take screen shots of slide and paste at the end of assignment draft. The tutor will ask each student 2-3 questions from submitted work. The demonstration from each student should not be more than 8 minutes.

Task 1

Write a report covering and detailing above applications while emphasizing on the following aspects:

  • Field and Purpose of the application
  • Working model of the application
  • Scalability issues
  • Features and Weaknesses of the application
  • Socio-Technical aspects

Task 2

Prepare a PowerPoint presentation discussing the main features of the given applications. The PowerPoint presentation should have at least 10 slides and students should present for 6-8 minutes during lab time in Week 8.

BN208 Networked Application Assignment 1

Further instructions:

  • Do not use Wikipedia as neither source nor reference.
  • Read articles from the books or the ones published in journals and conferences for each topic and then rewrite those using your own words.
  • Use IEEE style referencing, and make sure to properly reference any diagrams/ graphics.

Submissions:

Students has to submit only one word document on Moodle which includes task 1 and task 2. At the end of task 1, copy the slides from task 2 and paste it into the same document then upload it on Moodle.

Marking criteria:

Section to be included in the Description of the section Marks
report
Introduction Brief introduction about given technologies and 5
outline of the complete report
Task 1 Discussion of the following aspects of given 20
applications:
Purpose
Working
Scalability
Features and Weaknesses
Socio-Technical aspects
Task 2 The PowerPoint presentation evaluation will be 15
based on:
– Quality of presentation (layout, structure,
organisation etc.)
– Quality of content and information
– Presenters knowledge of the topic and ability to
answer the questions
Conclusion A complete summary of the report including all 5
important findings
Reference style IEEE reference style 5
Total 50

BN208 Networked Application Assignment 1

Marking Rubric

Grades Excellent Very Good Good Satisfactory Unsatisfactory
Introduction Concise and Topics are Generally Some Not relevant to the
specific to the relevant and relevant and relevance and assignment topic.
given soundly analysed. briefly
technologies. analysed. presented.
Analysis and Demonstrates Demonstrates Demonstrates Demonstrates Does not
Understanding excellent ability ability to think fair ability to ability to think demonstrate ability to
of to think critically critically and think critically critically but think critically and
Technologies and source source and source does not does not source
reference reference reference source reference material
material material material reference appropriately.
appropriately. appropriately. appropriately. material
appropriately.
Demonstratio Logic is clear and Consistency, Mostly Adequate Argument is confused
n easy to follow logical and consistent cohesion and and disjointed.
with strong convincing. logical and conviction.
arguments. convincing
Conclusion Concluded each Discussed the Concluded in Some areas Not relevant to given
topic specifically major areas of general were not topics
to the given given topics relevant
technologies.
IEEE Clear styles with Clear Generally Sometimes Lacks consistency
Reference excellent source referencing good clear with many errors.
style of references. style. referencing referencing
style. style.

The Best Assignment help is one of the best website for assignment help. For more details you may contact us at thebestassignmenthelp@gmail.com

mit

visit at

HI6026 Audit, Assurance and Compliance

:

Leave a Comment

Your email address will not be published. Required fields are marked *