Sunday, March 24, 2019

MIT BN203 BN205 BN206 and BN208

MIT BN203 BN205 BN206 and BN208

    Assessment Details and Submission Guidelines
Trimester T2 2018
Unit Code BN203
Unit Title Network Security 1
Assessment TypeIndividual Assessment
Assessment TitleIdentify emerging threats and mitigation strategies in Information Systems
Purpose  oftheThe purpose of the assignment is to identify the emerging threats and
assessment(withmitigation strategies in Information Systems . Students will be able to complete
ULO Mapping)the following ULOs:
    b.  Identify  common  emerging  threats,  attacks,  mitigation  and
    countermeasures in networked information systems
Weight 15%     
Total Marks 50       
Word limit 1000 – 1500     
Due Date 30st August, 2018 (23:55)
          
Submission  All work must be submitted on Moodle by the due date along with a
Guidelines  completed Assignment Cover Page.
    The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
    (Body) font and 2 cm margins on all four sides of your page with appropriate
    section headings.
   Reference sources must be cited in the text of the report, and listed
   appropriately at the end in a reference list using IEEE referencing style.
Extension If an extension of time to submit work is required, a Special Consideration
    Application must be submitted directly to the School’s Administration
    Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit
    this application three working days prior to the due date of the assignment.
    Further information is available at:
    http://www.mit.edu.au/about-mit/institute-publications/policies- 
    procedures-and-guidelines/specialconsiderationdeferment
     
Academic Academic Misconduct is a serious offence. Depending on the seriousness of
Misconduct   the case, penalties can vary from a written warning or zero marks to
    exclusion from the course or rescinding the degree. Students should make
    themselves familiar with the full policy and procedure available at:
    http://www.mit.edu.au/about-mit/institute-publications/policies- 
    procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- 
    ProcedureFor further information, please refer to the Academic Integrity
      
    Section in your Unit Description.









Type



assessment (with ULO Mapping)


to demonstrate their achievements in them:

Demonstrate project leadership skills; identify and assess risk in designing and executing major projects;

Reflect on current project management ethics, research, theory and practice;








Guidelines  All work must be submitted on Moodle by the due date along with a completed
  Assignment Cover Page.
  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font
   and 2 cm margins on all four sides of your page with appropriate section headings.
  Reference sources must be cited in the text of the report, and listed appropriately
   at the end in a reference list using APA referencing style.
   If an extension of time to submit work is required, a Special Consideration
   Application must be submitted directly to the School’s Administration Officer, in
   Melbourne on Level 6 or in Sydney on Level 7.  You must submit this application
   three working days prior to the due date of the assignment. Further information is
   available at:
   http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-
   guidelines/specialconsiderationdeferment
Misconduct  Academic Misconduct is a serious offence.Depending on the seriousness of the
  case, penalties can vary from a written warning or zero marks to exclusion from
   the course or rescinding the degree. Students should make themselves familiar
   with the full policy and procedure available at: http://www.mit.edu.au/about-
   mit/institute-publications/policies-procedures-and-guidelines/Plagiarism –
   Academic-Misconduct-Policy-Procedure. For further information, pleaserefer to
   the Academic Integrity Section in your Unit Description.
      













Prepared by: Samira Baho      Moderated by: Dr Karthik Nagarajan                 July, 2018
BN205                                                        Network Project Management                             Page 2 of 8

Purpose of the assessment:

As a project manager, your career will be driven by decisions, often dozens or more per day. Some decisions are small and barely noticed while others are more prominent and could have serious ramifications on yourself, your organisation and your stakeholders. Decisions like this will most likely require deep thought as they involve people, resources and the environment. Sometimes these factors are in conflict, creating a dilemma and significant riskswhere your awareness of Ethical issues in a professional setting will be vital.
To guide ethical behaviour and help with tough decisions, the Project Management Institute (PMI) has developed a Code of Ethics and Professional Conduct and an Ethical Decision-Making Framework. This assessment will require you to use your knowledge of the PMI code and framework and apply it in a real life case study.

Occidental Engineering Case Study



Michael McFarland, S.J.

Wayne Davidson is a software engineer in the aerospace division of Occidental Engineering, a large engineering firm. For the past two years he has been working as a test engineer for Operation Safe Skies, a project to build a prototype of the next generation air traffic control system. This project, which is funded by a contract from the Federal Aviation Agency (FAA), is a very important one for Occidental. With all the cutbacks in defence spending, the aerospace division has been losing business. The Safe Skies project has provided much needed business, and could lead to a much larger contract if successful. Mindful of its strategic importance, the company had bid very aggressively for the original contract. In fact they had “low-balled” it, bidding less than it would take to do the work properly. They felt that was the only way they could beat out their competitors, who were just as hungry for the work. Because of their somewhat shaky financial position, the company was not willing to take a loss on the project, so the project has been underfunded and understaffed. Nevertheless those working on the project have made a heroic effort, working eighteen hour days seven days a week to meet the deadline, because they know how much it means to the company, not to mention their own jobs. They are now very close to success.

A version of the prototype has been completed and turned over to Wayne for testing. He has run extensive simulations on it and found that it works as it should except for one little problem. When there are too many aircraft in the system, it will sometimes lose track of one or more of them. The “forgotten” aircraft will simply disappear from the screen, there will be no trace of it anywhere, and it will be ignored by all of the collision avoidance and other safety tests. Wayne has been working with the software designers to identify the cause of the problem, and they have traced it to a subtle error in memory allocation and reuse. They are confident that they can fix it, but it will take a month or more to do the redesign, coding and testing.

Wayne meets with his boss, Deborah Shepherd, the project manager, to discuss the implications. She tells him that what he is asking for is impossible. The contract requires that the company deliver a fully certified, working version of the software in three days for system integration and test. The government has developed a new, get-tough policy on missed deadlines and cost overruns, and Occidental is afraid that if they miss this deadline, the government will make an example of them. They would be subject to fines and the loss of the remainder of the prototype contract; and they might not be allowed to bid on the contract for the full system. This would have a devastating effect on the aerospace division, resulting in thousands of lost jobs.

They consider whether they can do a quick patch to the software before turning it over, but Wayne adamantly refuses to release any code that has not been tested thoroughly. There is always a chance that the patch would interact with some other part of the program to create a new bug.

Prepared by: Samira Baho                             Moderated by:                                                 Dr Karthik Nagarajan      July, 2018
BN205                                                        Network Project Management                             Page 3 of 8

“Then we’ll have to deliver the software as is,” Deborah says. “I can’t jeopardize this project or the jobs of my people by missing that deadline.”

“We can’t do that!” exclaims Wayne. “That’s like delivering a car with defective brakes.”

“Don’t worry,” Deborah reassures him. “We have contacts in the FAA, so we know their testing plans. They will do a lot of simulations to make sure the software works with the hardware and has all the functionality in the specs. Then they will do live tests, but only at a small airport, with a backup system active at all times. There is no way they will overload the system in any of this. After that they will have some change requests. Even if they don’t, we can give them an updated version of the program. We can slip the bug fix in there. They will never see the problem. Even if they do, we can claim it was a random occurrence that would not necessarily show up in our tests. The important thing is no one is in any danger.”

“Maybe they won’t find the bug, but I know it’s there. I would be lying if I said the system passed all the necessary tests. I can’t do that. Anyway, it would be illegal and unprofessional.”

“You can certify that it is safe, because it is, the way they are going to use it.”

And so he does. In the end Wayne signs off on the software. It is delivered to the FAA and makes it through all the preliminary tests, including live tests at a small airport in the Midwest. As a result of these tests, the FAA requests some changes in the user interface, and when Occidental delivers the new software it includes a robust solution to the problem of the disappearing aircraft. No one outside of Deborah’s group ever learns of the problem. In fact Occidental’s success with the prototype leads to major contracts for air traffic control software, giving much-needed business to the aerospace division. This saves hundreds of jobs, and allows the company to add hundreds more.

Wayne Davidson, however, takes early retirement once the prototype project is finished, in order to write a book on software testing. He feels that the book should have a chapter on ethics, but he can never bring himself to write it.

What do you think about Wayne’s decision? Was it ethical?


References:


Michael McFarland, S.J., a computer scientist, is the former president of College of the Holy Cross and was a visiting scholar at the Markkula Ethics Center. June 2012
Available at: http://www.onlineethics.org/Resources/Cases/OccidentalEng.aspx [Accessed 07 November, 2017]
BN205 Network Project Management
Task
Prepare a report of about 1000 words that gives an ethical analysis of the issues raised in the case study. Your report should at least include the following:
Executive Summary
You should provide a brief summary of your main findings and research so that the reader can know its main purpose.
Introduction
o In this section you should (briefly) state the case study being analysed. You should also discuss the purpose and scope of the report and the sources of the information that you have used. That is, you should provide an overview of what you intend to write about in your report, so that the reader can anticipate how you are going to present the material and what it will consist of.
Analysis of the case study
o  Identify the ethical issues that arise in this case study.
o Identify the potential consequences to the stakeholders of accepting this aggressive bid and risks involved in this project.
o Identify the potentialbreaches of the Project Management Institute (PMI) ethical standards by the Project team. Examine the PMI code and identify requirements that are relevant to this case study.
o Deborah and Wayne are attempting to resolve the ethical dilemma that they have. Having completed your ethical analysis recommendations as to how they should proceed.
Conclusion
o Provide short concluding comments that remind the reader the main purpose of the assessment, how you went about addressing the ethical issues of the case study, what references you used and what the main findings were.
BN205 Network Project Management
Submission guidelines:
The report should have a consistent, professional, and well-organized appearance. Create the report (Minimum 1000 Words).
  1. Your report should include the following:
The cover page must identify students’ (name and number), teaching staff, and assignment.
The report must include executive summary, table of contents, introduction, discussions (with heading/sub-headings to address the requirements listed above), conclusion and references.
Reference sources (APA style) must be cited in the text of the report, and listed appropriately at the end in a reference list.
  1. The assignment must be submitted in soft (electronic) copy on Moodle drop box. The pages of the assignment must be clear on each page
BN205Network Project ManagementPage 6 of 8
Marking criteria:    
Marks are allocated as follows:    
Section to be included in the report Description of the sectionMarks
Executive summary  -A brief summary of your main findings and 
  research so that the reader can know its5
   main purpose.
   -In this section you should (briefly) state the 
   case study being analysed. You should also 
Introduction  discuss the purpose and scope of the report 
  and the sources of the information that you5
   have used. That is, you should provide an
   overview of what you intend to write about 
   in  your  report,  so  that  the  reader  can 
   anticipate how you are going to present the 
   material and what it will consist of. 
   – Identify the PM ethical issues in the case8
   study. 
   -Identify   the   potential   risks   to   the8
Analysis of the case study  stakeholders  of  accepting  this  aggressive
  bid. 
   –  Identify  the  potential  breaches  of  the 
   Project Management Institute (PMI) ethical10
   standards by the Project team. Examine the
   PMI code and identify requirements that 
   are relevant to this case study. 
   Deborah  and  Wayne  are  attempting  to 
Recommendations  resolve the ethical dilemma that they have.5
  Having  completed  your  ethical  analysis,
   provide  advice  as  to  how  they  should 
   proceed. 
   Provide  short  concluding  comments  that 
Conclusion  remind the reader the main purpose of the5
  assessment,   how   you   went   about
   addressing the ethical issues of the case 
   study, what references you used and what 
   the main findings were. 
Reference and appendices  APA Style2
Report logical structure, grammar and spelling  2
   Total Marks50

BN205 Network Project ManagementPage 7 of 8 
Marking Rubric for Assignment 1: Total Marks 50    
GradeHDDCRP< 50% 
Mark80  %70%-69%60%-69%50%-59%
  
 +     
Executive SummaryComplete inComplete in mostIncompletIncomplete inIncomplete in 
/5all respects;respects; reflectse in manymost respects;all aspects; 
reflects allmost requirementsrespects;does not reflectdoes not 
 requirement reflectsrequirementsreflect 
 s few requirements 
   requirem   
   ents   
IntroductionDemonstrates aDemonstrDemonstrates anDemonstratesDoes not 
/5sophisticatedates anacceptablean inadequatedemonstrate 
understanding ofaccomplisunderstanding ofunderstandingd 
 the case studyhedthe topic(s) andof the caseunderstandin 
 and issuesunderstanissuesstudy andg to the 
  ding of issuestopics and 
  the case  issues. 
  study and    
  issues    
Case Study AnalysisPresents anPresents aPresents aPresents anAnalysis not 
/26insightful andthoroughsuperficialincompleterelated to 
thorough analysisanalysis ofanalysis ofanalysis of thethe case 
 of all issuesmost issuessome of theissuesstudy 
 identified;identified;issuesidentifiedpresented. 
 includes allincludes mostidentified;   
 necessarynecessaryomits   
 informationinformationnecessary   
   information   
 MakesMakes appropriateMakesMakes little orNo 
 appropriateconnectionsappropriate butno connectionconnection 
 and powerfulbetween the issuessomewhat vaguebetween thebetween the 
 connectionsidentified and theconnectionsissuesissues 
 between theriskbetween theidentified andidentified PM 
 issuesmanagement/codeissues and the riskthe riskconcepts 
 identified andof ethics conceptsmanagement/codmanagement/cstudied 
 the riskstudied in PM.e of ethicsode of ethics  
 management/c concepts studiedconcepts  
 ode of ethics in PM.studied in PM.  
 concepts     
 studied in PM.     
usionPresentsPresents specific,PresentsPresents realisticNo 
detailed,realistic, andrealistic oror appropriateRecommendati 
/10realistic, andappropriateappropriaterecommendatioons presented 
 appropriaterecommendationsrecommendations with little, if  
 recommendatiosupported by thens supported byany, support  
 ns clearlyinformationthe informationfrom the  
 supported bypresented andpresented andinformation  
 the informationPM conceptsPM conceptspresented and  
 presented and  PM concepts  
 PM concepts     
presentationWritingWriting isWriting lacksWriting isReport 
demonstrates aaccomplished inclarity orunfocused,unfocused, 
/2sophisticatedterms of clarityconcisenessrambling, orcontains 
 clarity,and concisenessand containscontainsgrammatical 
 conciseness, andand contains onlynumerousserious errors;and spelling 
 correctness;a few errors;errors; giveslacks detail anderrors. Very 
 includesincludes sufficientinsufficientrelevant datahard to 
 thorough detailsdetails anddetail andandunderstand. 
 and relevantrelevant data andrelevant datainformation;  
 data andinformation; well-andpoorly  
 information;organizedinformation;organized  
 extremely well- lacks   
 organized organization   

BN205 Network Project ManagementPage 8 of 8
      
/2Uses APAUses APAReflectDoes not use APANo Reference
guidelinessguidelines 
 accurately andguidelines withincomp  
 consistently tominor violationslete  
 cite sourcesto cite sourcesknowle  
  dge of  
   APA  
Assignment Description
Objective of this assessment is to identify common emerging threats and attacks, and suggest appropriate mitigation and countermeasures strategies for networked information systems.
Scenario
You are the principal Security Architect for Mindvision Corporation, a firm with four regional offices and 50 employees located across Australia. The corporation has detected an ongoing cyber-attacks from last few days effecting their network and day-to-day operational services. Your role (based on the chosen topic below) is to liaise between business stakeholders and technologists. Translating potential emerging threats and attacks faced by Corporation and providing feasible countermeasures so corporation can take security decisions more effectively.
Your deliverable for this assessment is to write a report for any ONE of the following topics:
IP security
Secure remote access
Network devices security Cloud computing
Intrusion prevention system Firewall security
DDoS attack detection and prevention
The report must address the following criteria:
An Executive Summary at the beginning of the report which provides a clear statement of the emerging threats and attacks being assessed. Identify and explain emerging threats based on vulnerabilities and consequences derived from Networked Information Systems.
Discuss potential damages these threats and vulnerabilities could cause if exploited. What are the challenges and issues faced by corporation to control these threats?
Discuss the impact of financial difficulties and budget constraints while selecting security counter measures.
Provide detail mitigation and countermeasure strategies that will impact the networked information system.
Marking criteria:
Example of marking criteria is shown in following table. Marks are allocated as follows:
Section to be Description of the section Marks
included in the report      
   
Executive SummaryStudent should describe purpose of report and5
 statement of threats and attacks being discussed in 
 report.     
   
Identification ofStudent should identify and discuss in detail relevant10
threats and attackssecurity threats and attacks for the selected topic 
   
Potential damagesStudent  should list down  and  explain potential10
 damages these threats could cause if exploited  
   
Challenges/IssuesStudent should identify and relate challenges/issues10
 faced by corporation to control these threats such as 
 financial difficulties and budget constraints.  
       
Mitigation andStudentshoulddiscussmitigationand5
countermeasurecountermeasure  strategies  relevant  to  threats 
strategiesidentified in earlier part of this report  
   
Summary/ConclusionStudent should conclude how these threats and5
 mitigation  strategies  is  going  to  impact  the 
 networked information systems   
     
Reference styleFollow IEEE reference style  5
       
   Total  50
       
Marking Rubric:
Grade Mark
HDDICRPFail
40-5035-3930-3425-29<25
ExcellentVery GoodGoodSatisfactoryUnsatisfactory
Executive Summary/5
Identification of threats and attacks/10
Potential damages/10
Challenges /Issues /10
Mitigation and countermeasure strategies /5
Summary/Conclusion/5
Concise andSummary isGenerallySome 
relevant andrelevantrelevance and 
specific to the
soundlyandbriefly 
topic
analyzed.analyzed.presented. 
 
     
DemonstratedDemonstratedDemonstratDemonstrate 
ed  abilityd  ability to 
excellent abilityexcellent
to thinkthink critically 
to think criticallyability to think
criticallyand did not 
and sourcedcritically but
and sourcedsource 
referencedid not source
referencereference 
materialreference
materialmaterial 
appropriately formaterial
appropriateappropriately 
identification ofappropriately
ly  
threats   
    
     
In depth use of aEvidence ofUse of someLimited 
relevantevidence of 
good range ofusing relevant
literature tousing relevant 
relevantliterature to
address theliterature to 
literature toaddress the
points.address the 
address thepoints.
 point 
points.  
    
     
Logic is clear andConsistencyMostlyAdequate 
consistentcohesion and 
easy to followlogical and
logical andconviction 
with strongconvincing
convincing  
arguments   
    
     
Thorough andGoodEnoughLimited 
comprehensiveexplanation ofexplanationexplanation to 
explanation ofthe solutionsof thethe solution of 
the solutions, toto the problemsolution tothe problem 
the problemdefinedthe problemdefined. 
defined. defined  
     
All elements areConclusiveComponentsMost 
present and verypresent withpresent andcomponents 
well integrated.good cohesivemostly wellpresent but 
  integratednot well 
   summarized 
     
This is not relevant to the assignment topic.
Did not demonstrate ability to think critically and did not source reference material appropriately
No evidence and literature to address points as required.
Argument is confused and disjointed
No explanation for mitigation provided or discussed
Conclusion lacks relevance
Reference styleClear styles withClearGenerallySometimesLacks consistency 
/5
excellent sourcereferencinggoodclearwith many errors 
 
 of references.stylereferencingreferencing  
   stylestyle  
       
Assessment Details and Submission Guidelines
Unit CodeBN206
Unit TitleSystem Administration
Assessment TypeIndividual Assignment
Assessment TitleAssignment-1: Server management systems and tools (T2-2018)
Purpose of the assessment (with ULO Mapping)This assignment is designed to assess students’ knowledge and skills related to the following learning outcomes:a)      Understand various server management systems
b)      Manage emerging tools and techniques for system management
Weight15%
Total Marks40
Word limit1000-1200 words
Due DateWeek 7, Thursday, by 11:55PM through Moodle (Melbourne and Sydney)
Submission Guidelines·      All work must be submitted on Moodle by the due date along with a title Page.·      The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.
·      Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension·      If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS.  You must submit this application three (3) working days prior to the due date of the assignment. Further information is available at:http://www.mit.edu.au/aboutmit/institutepublications/policiesproceduresandguidelines/specialconsiderationdeferment

Without a granted special consideration, late submissions will be subject to penalty as per the information on late penalty in the unit description.
Academic Misconduct ·      Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.
Purpose of the Assessment:
This assignment has two parts: (i) command line tools and techniques for server management, and (ii) server management systems. The parts combined, the assignment provides students with opportunity to undertake work on the above topics and develop an understanding and professional skills required to manage and maintain network servers.
By doing this assignment, students will get an opportunity to enquire some of the server Operating System features, and basic tools used in LINUX servers. They will also get an idea of various tasks performed by the system administrators.  In addition to that, the overview of the modern day operating systems is also necessary to keep up with the current technological trend.
Task 1:  Server management with Linux commands (15 Marks)
Q1. Managing Linux servers requires skills in using command line tools. Consult various sources of information to gain an understanding of why Linux System Administrators must be proficient in using Linux command line tools as opposed to graphical user interface (GUI) based tools. Write down your understanding on this in your own words in one (1) paragraph. Your submission will be checked for originality using the Turnitin similarity checking software, and if it is detected that your paragraph has a high level of similarity with other sources, you will score zero marks for this answer. Remember to use at least two (2) citations and references (list at the end of the document along with your other references) in your paragraph.                                                                                                                  (6 Marks)
Q2. Use the following commands on a Linux machine running any flavour of Linux (e.g., Ubuntu, Kali), and document the following for each command:                              (3 Marks * 3=9 Marks)
Commands:
  1. ifconfig
  2. netstat
  3. lsof
For each command, document the following:
  1. What the command is used for
  2. Syntax of the command
  3. A valid screenshot with appropriate figure number and caption showing how you explored the command on your Linux system. Figure 1 shows an example of a valid screenshot where the user who used the command is clearly displayed. This is required for checking the originality of your work. Do the following before using any of the above commands to achieve this:
    • On the Linux terminal, use the following commands one after the other:
mkdir <your name>     (Replace <your name> with your own name!)
cd <your name>     (You are changing directory to the newly created directory)
Figure 1: Example of a valid screenshot showing the name of the user (User: Jahan)
Task 2:  Server management Systems   (25 Marks)
Every server operating system has its own server management features included. Select and research one (1) topic from the list below, and write a report containing the following sections. Your submission will be checked for originality using the Turnitin similarity checking software, and if it is detected that your report has high level of similarity with other sources, you may score zero marks for this part.
List of topics (choose 1):
  • CentOS
  • Windows nano server
  • Red hat enterprise Linux
Report sections:
Investigate your chosen topic by reading articles and technical configuration from any source other than Wikipedia. These articles can be searched online or from a journal. Provide a Report to share your understanding (between 1000-1200 words limit), which should include the following sections:
  • Introduction
  • Background information/history of development
  • Technical details and features
  • Target platform
  • Advantages and Disadvantages
  • Conclusion
  • References (minimum 5 references)
Submission Guidelines:
Submit one document containing all of your answers for both Task 1 and Task 2. Your submission should include the following:
  • A cover page (topic name and assignment title), identifying student (name and ID), name of the lecturer and name of the tutor.
  • The assignment must use 11-pt Calibri (Body) font and at least 1.5 cm line spacing with appropriate section headings.
  • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE reference style.
  • It should follow standard report f.
Marking criteria
Marks are allocated as follows:
Section to be included in the reportDescription of the sectionMarks
Task-1 (15 Marks)
Q1A paragraph of student’s own understanding on the topic, written using own words.6
Q2For each tool: purpose, syntax, original screenshot3 marks * 3=9
Task 2 (25 Marks)
IntroductionIntroduction to the Topic, and structure of the report2
Background information/history of developmentDetails on background including the history of development3
Technical details and featuresDetail explanation of the topic with features of the topic7
Target platformInformation and explanation on the computer platforms that are the targets for your chosen OS3
Advantages and DisadvantagesListings and discussions of advantages and disadvantages of your chosen OS5
ConclusionA conclusion to summarise the report findings3
ReferencesIEEE reference style, and relevant references onlyAt least seven (7) references2
Total for assignment40
Marking Rubric
GradeMarkHD32-40DI28-31CR24-27P20-23Fail<20
ExcellentVery GoodGoodSatisfactoryUnsatisfactory
Q1
/6
A paragraph of student’s own understanding on the topic, written using own words, with appropriate citation and referencesTopics are relevant and soundly analysed.Generally relevant but understanding reported is incomplete or partial.Some relevance and briefly presented, citation ORreferences missing.(This is not relevant to the assignment topic) or (no citations and references).
Q2/9Excellent presentation of purpose, syntax, original screenshots for ALL commandsVery good presentation of purpose, syntax, original screenshots for ALL commandsGood presentation of purpose, syntax, original screenshots for ALL commandsUnclear presentation of purpose, syntax, with some original screenshotsUnclear presentation of purpose, syntax, with all non-original screenshots
Introduction
/2
Excellent introduction of topic and clear structure of report providedVery good introduction of topic and clear structure of report providedGood introduction of topic and report structure provided to some extentSomewhat relevant introduction, or no structure of report providedIrrelevant introduction
Background information/history of development

/3
Excellent background information/history of development
provided
Very good background information/history of development
provided
Good background information/history of development
provided
Somewhat relevant background information/history of development
Irrelevant background information/history of development
Technical details and features
/7
Highly valid and appropriateValid and appropriateGenerally valid and appropriateSomewhat validNot valid
Target Platform
/3
Clear listing of and excellent information and explanation about the target computer platforms for the chosen OSClear listing of and good information and explanation about the target computer platforms for the chosenClear listing of and some information or explanation about the target computer platforms for the chosenGood listing of target platform, lacks information and/or explanation.Absent or wrong platforms listed.
 Advantages/ Disadvantages

/5
Excellent list of advantages and disadvantages with clear explanationsGood list of advantages and disadvantages with clear explanationList of advantages and disadvantages with some explanationList of advantages and disadvantages with no explanationAbsent or irrelevant answer.
Conclusions/3A very powerful conclusionVery good conclusionGood conclusionConclusion has some relevanceIrrelevant or no conclusion
References
/2
Clear styles with excellent source of references.
At least seven (7) references listed and used
Clear referencing style
At least seven (7) references listed and used
Generally good referencing style
Less than seven (7) references listed and used
Sometimes clear referencing style

Inadequate number of references
Lacks consistency with many errors
And/or

No references (mark decided based on the above two criteria)




   Assessment Details and Submission Guidelines
          
TrimesterT2 2018
          
Unit CodeBN208
          
Unit TitleNetworked Application
          
Assessment TypeIndividual written report and demonstration  Assignment 1
          
Assessment TitleEmerging trends in Network Technology and its Applications
          
Purpose of theThis assignment assesses the following Unit Learning Outcomes; students should
assessment (withbe able to demonstrate their achievements in following.
ULO Mapping) b. Apply socio-technical contexts in modern network applications and
 management;
 c. Utilise common and emerging types of middleware to design and manage
 networked applications;
Weight15% of the total assessments
          
Total Marks50       
          
Word limit2000      
          
Due Date30/08/2018 Thursday, Week 7, demonstrate during laboratory class and submit report
 on Moodle
Submission·  All work must be submitted on Moodle by the due date along with a completed
Guidelines Assignment Cover Page.
  ·  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font
   and 2 cm margins on all four sides of the page with appropriate section headings.
 ·  Reference sources must be cited in the text of the report and be listed
  appropriately at the end in IEEE referencing style.
Extension If an extension of time to submit work is required, a Special Consideration Application
  must be submitted directly on AMS at least three working days before the assessment
  due date. Further information is available at:
   http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-
   and-guidelines/specialconsiderationdeferment  
   
Academic Academic Misconduct is a serious offence. Depending on the seriousness of the case,
Misconduct penalties can vary from a written warning or zero marks to exclusion from the course
  or cancellation of the degree. Students should make themselves familiar with the full
  policy and procedure available at: http://www.mit.edu.au/about-mit/institute-
       
  publications/policies-procedures-and-guidelines/Plagiarism-Academic- 
  Misconduct-Policy-ProcedureFor further information, please refer to the Academic
    
  Integrity Section in the Unit Description.
BN208 Networked Application                                     Assignment 1                                                                      Page 2 of 4
Assignment 1 Specification
Description
Applications of all kinds are critical to the daily operations of enterprises all over the world. While hypervisor virtualization technology has become the standard for managing applications, software components, containers enable IT professionals to install, run, maintain, and upgrade applications and their surrounding environments quickly, consistently, and more efficiently than their hypervisor counterparts. This is making Containers a popular topic for many IT professionals, and is increasing traction in the enterprise.
Write a report addressing following question with the help of figures and example scenarios.
  1. What is a Data Centre and discuss different operation performed in data centre, how data centres divided in Different tiers based on what criteria’s? Give example of few famous Australia based Data centres.
  2. What is Hypervisor-Based Server Virtualization Technology, its use and explain at least two examples of it. Also, compare both examples based on their features and limitations.
  3. What is container-based virtualization and why we need it? Discuss at least two examples of it and also, compare both examples based on their features and limitations.

Instructions: Students need to read three to four articles abouthypervisor virtualization technologyData Centre and container-based virtualization applications to explore how these technologies work and their different features. Students can choose to research about any vendor application.

Demonstration: Students should prepare presentation slides and take screen shots of slide and paste at the end of assignment draft. The tutor will ask each student 2-3 questions from submitted work. The demonstration from each student should not be more than 8 minutes.

Task 1

Write a report covering and detailing above applications while emphasizing on the following aspects:
  • Field and Purpose of the application
  • Working model of the application
  • Scalability issues
  • Features and Weaknesses of the application
  • Socio-Technical aspects
Task 2
Prepare a PowerPoint presentation discussing the main features of the given applications. The PowerPoint presentation should have at least 10 slides and students should present for 6-8 minutes during lab time in Week 8.
BN208 Networked Application Assignment 1
Further instructions:
  • Do not use Wikipedia as neither source nor reference.
  • Read articles from the books or the ones published in journals and conferences for each topic and then rewrite those using your own words.
  • Use IEEE style referencing, and make sure to properly reference any diagrams/ graphics.
Submissions:
Students has to submit only one word document on Moodle which includes task 1 and task 2. At the end of task 1, copy the slides from task 2 and paste it into the same document then upload it on Moodle.
Marking criteria:
Section to be included in theDescription of the sectionMarks
report  
   
IntroductionBrief introduction about given technologies and5
 outline of the complete report 
   
Task 1Discussion of the following aspects of given20
 applications: 
 Purpose 
 Working 
 Scalability 
 Features and Weaknesses 
 Socio-Technical aspects 
   
Task 2The PowerPoint presentation evaluation will be15
 based on: 
 – Quality of presentation (layout, structure, 
 organisation etc.) 
 – Quality of content and information 
 – Presenters knowledge of the topic and ability to 
 answer the questions 
   
ConclusionA complete summary of the report including all5
 important findings 
   
Reference styleIEEE reference style5
   
 Total50
   
BN208 Networked Application Assignment 1
Marking Rubric
GradesExcellentVery GoodGoodSatisfactoryUnsatisfactory
      
IntroductionConcise andTopics areGenerallySomeNot relevant to the
 specific to therelevant andrelevant andrelevance andassignment topic.
 givensoundlyanalysed.briefly 
 technologies.analysed. presented. 
Analysis andDemonstratesDemonstratesDemonstratesDemonstratesDoes not
Understandingexcellent abilityability to thinkfair ability toability to thinkdemonstrate ability to
ofto think criticallycritically andthink criticallycritically butthink critically and
Technologiesand sourcesourceand sourcedoes notdoes not source
 referencereferencereferencesourcereference material
 materialmaterialmaterialreferenceappropriately.
 appropriately.appropriately.appropriately.material 
    appropriately. 
DemonstratioLogic is clear andConsistency,MostlyAdequateArgument is confused
neasy to followlogical andconsistentcohesion andand disjointed.
 with strongconvincing.logical andconviction. 
 arguments. convincing  
ConclusionConcluded eachDiscussed theConcluded inSome areasNot relevant to given
 topic specificallymajor areas ofgeneralwere nottopics
 to the givengiven topics relevant 
 technologies.    
IEEEClear styles withClearGenerallySometimesLacks consistency
Referenceexcellent sourcereferencinggoodclearwith many errors.
styleof references.style.referencingreferencing 
   style.style. 
The Best Assignment help is one of the best website for assignment help. For more details you may contact us at thebestassignmenthelp@gmail.com
mit
visit at

HI6026 Audit, Assurance and Compliance

:

MKT703 SAMPLE

                        MARKETING AND STRATEGY Table of contents   Introduction ................................