MIT BN203 BN205 BN206 and BN208
Assessment Details and Submission Guidelines | |||||||||
Trimester | T2 2018 | ||||||||
Unit Code | BN203 | ||||||||
Unit Title | Network Security 1 | ||||||||
Assessment Type | Individual Assessment | ||||||||
Assessment Title | Identify emerging threats and mitigation strategies in Information Systems | ||||||||
Purpose of | the | The purpose of the assignment is to identify the emerging threats and | |||||||
assessment | (with | mitigation strategies in Information Systems . Students will be able to complete | |||||||
ULO Mapping) | the following ULOs: | ||||||||
b. Identify common emerging threats, attacks, mitigation and | |||||||||
countermeasures in networked information systems | |||||||||
Weight | 15% | ||||||||
Total Marks | 50 | ||||||||
Word limit | 1000 – 1500 | ||||||||
Due Date | 30st August, 2018 (23:55) | ||||||||
Submission | All work must be submitted on Moodle by the due date along with a | ||||||||
Guidelines | completed Assignment Cover Page. | ||||||||
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri | |||||||||
(Body) font and 2 cm margins on all four sides of your page with appropriate | |||||||||
section headings. | |||||||||
Reference sources must be cited in the text of the report, and listed | |||||||||
appropriately at the end in a reference list using IEEE referencing style. | |||||||||
Extension | If an extension of time to submit work is required, a Special Consideration | ||||||||
Application must be submitted directly to the School’s Administration | |||||||||
Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit | |||||||||
this application three working days prior to the due date of the assignment. | |||||||||
Further information is available at: | |||||||||
http://www.mit.edu.au/about-mit/institute-publications/policies- | |||||||||
procedures-and-guidelines/specialconsiderationdeferment | |||||||||
Academic | Academic Misconduct is a serious offence. Depending on the seriousness of | ||||||||
Misconduct | the case, penalties can vary from a written warning or zero marks to | ||||||||
exclusion from the course or rescinding the degree. Students should make | |||||||||
themselves familiar with the full policy and procedure available at: | |||||||||
http://www.mit.edu.au/about-mit/institute-publications/policies- | |||||||||
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- | |||||||||
Procedure. For further information, please refer to the Academic Integrity | |||||||||
Section in your Unit Description. |
Type
assessment (with ULO Mapping)
to demonstrate their achievements in them:
Demonstrate project leadership skills; identify and assess risk in designing and executing major projects;
Reflect on current project management ethics, research, theory and practice;
Guidelines | All work must be submitted on Moodle by the due date along with a completed | ||||
Assignment Cover Page. | |||||
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font | |||||
and 2 cm margins on all four sides of your page with appropriate section headings. | |||||
Reference sources must be cited in the text of the report, and listed appropriately | |||||
at the end in a reference list using APA referencing style. | |||||
If an extension of time to submit work is required, a Special Consideration | |||||
Application must be submitted directly to the School’s Administration Officer, in | |||||
Melbourne on Level 6 or in Sydney on Level 7. You must submit this application | |||||
three working days prior to the due date of the assignment. Further information is | |||||
available at: | |||||
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and- | |||||
guidelines/specialconsiderationdeferment | |||||
Misconduct | Academic Misconduct is a serious offence. | Depending on the seriousness of the | |||
case, penalties can vary from a written warning or zero marks to exclusion from | |||||
the course or rescinding the degree. Students should make themselves familiar | |||||
with the full policy and procedure available at: http://www.mit.edu.au/about- | |||||
mit/institute-publications/policies-procedures-and-guidelines/Plagiarism – | |||||
Academic-Misconduct-Policy-Procedure. For further information, please | refer to | ||||
the Academic Integrity Section in your Unit Description. | |||||
Prepared by: Samira Baho Moderated by: Dr Karthik Nagarajan July, 2018
BN205 Network Project Management Page 2 of 8
Purpose of the assessment:
As a project manager, your career will be driven by decisions, often dozens or more per day. Some decisions are small and barely noticed while others are more prominent and could have serious ramifications on yourself, your organisation and your stakeholders. Decisions like this will most likely require deep thought as they involve people, resources and the environment. Sometimes these factors are in conflict, creating a dilemma and significant riskswhere your awareness of Ethical issues in a professional setting will be vital.
To guide ethical behaviour and help with tough decisions, the Project Management Institute (PMI) has developed a Code of Ethics and Professional Conduct and an Ethical Decision-Making Framework. This assessment will require you to use your knowledge of the PMI code and framework and apply it in a real life case study.
Occidental Engineering Case Study
Michael McFarland, S.J.
Wayne Davidson is a software engineer in the aerospace division of Occidental Engineering, a large engineering firm. For the past two years he has been working as a test engineer for Operation Safe Skies, a project to build a prototype of the next generation air traffic control system. This project, which is funded by a contract from the Federal Aviation Agency (FAA), is a very important one for Occidental. With all the cutbacks in defence spending, the aerospace division has been losing business. The Safe Skies project has provided much needed business, and could lead to a much larger contract if successful. Mindful of its strategic importance, the company had bid very aggressively for the original contract. In fact they had “low-balled” it, bidding less than it would take to do the work properly. They felt that was the only way they could beat out their competitors, who were just as hungry for the work. Because of their somewhat shaky financial position, the company was not willing to take a loss on the project, so the project has been underfunded and understaffed. Nevertheless those working on the project have made a heroic effort, working eighteen hour days seven days a week to meet the deadline, because they know how much it means to the company, not to mention their own jobs. They are now very close to success.
A version of the prototype has been completed and turned over to Wayne for testing. He has run extensive simulations on it and found that it works as it should except for one little problem. When there are too many aircraft in the system, it will sometimes lose track of one or more of them. The “forgotten” aircraft will simply disappear from the screen, there will be no trace of it anywhere, and it will be ignored by all of the collision avoidance and other safety tests. Wayne has been working with the software designers to identify the cause of the problem, and they have traced it to a subtle error in memory allocation and reuse. They are confident that they can fix it, but it will take a month or more to do the redesign, coding and testing.
Wayne meets with his boss, Deborah Shepherd, the project manager, to discuss the implications. She tells him that what he is asking for is impossible. The contract requires that the company deliver a fully certified, working version of the software in three days for system integration and test. The government has developed a new, get-tough policy on missed deadlines and cost overruns, and Occidental is afraid that if they miss this deadline, the government will make an example of them. They would be subject to fines and the loss of the remainder of the prototype contract; and they might not be allowed to bid on the contract for the full system. This would have a devastating effect on the aerospace division, resulting in thousands of lost jobs.
They consider whether they can do a quick patch to the software before turning it over, but Wayne adamantly refuses to release any code that has not been tested thoroughly. There is always a chance that the patch would interact with some other part of the program to create a new bug.
Prepared by: Samira Baho Moderated by: Dr Karthik Nagarajan July, 2018
BN205 Network Project Management Page 3 of 8
“Then we’ll have to deliver the software as is,” Deborah says. “I can’t jeopardize this project or the jobs of my people by missing that deadline.”
“We can’t do that!” exclaims Wayne. “That’s like delivering a car with defective brakes.”
“Don’t worry,” Deborah reassures him. “We have contacts in the FAA, so we know their testing plans. They will do a lot of simulations to make sure the software works with the hardware and has all the functionality in the specs. Then they will do live tests, but only at a small airport, with a backup system active at all times. There is no way they will overload the system in any of this. After that they will have some change requests. Even if they don’t, we can give them an updated version of the program. We can slip the bug fix in there. They will never see the problem. Even if they do, we can claim it was a random occurrence that would not necessarily show up in our tests. The important thing is no one is in any danger.”
“Maybe they won’t find the bug, but I know it’s there. I would be lying if I said the system passed all the necessary tests. I can’t do that. Anyway, it would be illegal and unprofessional.”
“You can certify that it is safe, because it is, the way they are going to use it.”
And so he does. In the end Wayne signs off on the software. It is delivered to the FAA and makes it through all the preliminary tests, including live tests at a small airport in the Midwest. As a result of these tests, the FAA requests some changes in the user interface, and when Occidental delivers the new software it includes a robust solution to the problem of the disappearing aircraft. No one outside of Deborah’s group ever learns of the problem. In fact Occidental’s success with the prototype leads to major contracts for air traffic control software, giving much-needed business to the aerospace division. This saves hundreds of jobs, and allows the company to add hundreds more.
Wayne Davidson, however, takes early retirement once the prototype project is finished, in order to write a book on software testing. He feels that the book should have a chapter on ethics, but he can never bring himself to write it.
What do you think about Wayne’s decision? Was it ethical?
References:
Michael McFarland, S.J., a computer scientist, is the former president of College of the Holy Cross and was a visiting scholar at the Markkula Ethics Center. June 2012
Available at: http://www.onlineethics.org/Resources/Cases/OccidentalEng.aspx [Accessed 07 November, 2017]
BN205 Network Project Management
Task
Prepare a report of about 1000 words that gives an ethical analysis of the issues raised in the case study. Your report should at least include the following:
Executive Summary
You should provide a brief summary of your main findings and research so that the reader can know its main purpose.
Introduction
o In this section you should (briefly) state the case study being analysed. You should also discuss the purpose and scope of the report and the sources of the information that you have used. That is, you should provide an overview of what you intend to write about in your report, so that the reader can anticipate how you are going to present the material and what it will consist of.
Analysis of the case study
o Identify the ethical issues that arise in this case study.
o Identify the potential consequences to the stakeholders of accepting this aggressive bid and risks involved in this project.
o Identify the potentialbreaches of the Project Management Institute (PMI) ethical standards by the Project team. Examine the PMI code and identify requirements that are relevant to this case study.
o Deborah and Wayne are attempting to resolve the ethical dilemma that they have. Having completed your ethical analysis recommendations as to how they should proceed.
Conclusion
o Provide short concluding comments that remind the reader the main purpose of the assessment, how you went about addressing the ethical issues of the case study, what references you used and what the main findings were.
BN205 Network Project Management
Submission guidelines:
The report should have a consistent, professional, and well-organized appearance. Create the report (Minimum 1000 Words).
- Your report should include the following:
The report must include executive summary, table of contents, introduction, discussions (with heading/sub-headings to address the requirements listed above), conclusion and references.
Reference sources (APA style) must be cited in the text of the report, and listed appropriately at the end in a reference list.
- The assignment must be submitted in soft (electronic) copy on Moodle drop box. The pages of the assignment must be clear on each page
BN205 | Network Project Management | Page 6 of 8 | ||
Marking criteria: | ||||
Marks are allocated as follows: | ||||
Section to be included in the report | Description of the section | Marks | ||
Executive summary | -A brief summary of your main findings and | |||
research so that the reader can know its | 5 | |||
main purpose. | ||||
-In this section you should (briefly) state the | ||||
case study being analysed. You should also | ||||
Introduction | discuss the purpose and scope of the report | |||
and the sources of the information that you | 5 | |||
have used. That is, you should provide an | ||||
overview of what you intend to write about | ||||
in your report, so that the reader can | ||||
anticipate how you are going to present the | ||||
material and what it will consist of. | ||||
– Identify the PM ethical issues in the case | 8 | |||
study. | ||||
-Identify the potential risks to the | 8 | |||
Analysis of the case study | stakeholders of accepting this aggressive | |||
bid. | ||||
– Identify the potential breaches of the | ||||
Project Management Institute (PMI) ethical | 10 | |||
standards by the Project team. Examine the | ||||
PMI code and identify requirements that | ||||
are relevant to this case study. | ||||
Deborah and Wayne are attempting to | ||||
Recommendations | resolve the ethical dilemma that they have. | 5 | ||
Having completed your ethical analysis, | ||||
provide advice as to how they should | ||||
proceed. | ||||
Provide short concluding comments that | ||||
Conclusion | remind the reader the main purpose of the | 5 | ||
assessment, how you went about | ||||
addressing the ethical issues of the case | ||||
study, what references you used and what | ||||
the main findings were. | ||||
Reference and appendices | APA Style | 2 | ||
Report logical structure, grammar and spelling | 2 | |||
Total Marks | 50 |
BN205 | Network Project Management | Page 7 of 8 | ||||
Marking Rubric for Assignment 1: Total Marks 50 | ||||||
Grade | HD | D | CR | P | < 50% | |
Mark | 80 % | 70%-69% | 60%-69% | 50%-59% | ||
+ | ||||||
Executive Summary | Complete in | Complete in most | Incomplet | Incomplete in | Incomplete in | |
/5 | all respects; | respects; reflects | e in many | most respects; | all aspects; | |
reflects all | most requirements | respects; | does not reflect | does not | ||
requirement | reflects | requirements | reflect | |||
s | few | requirements | ||||
requirem | ||||||
ents | ||||||
Introduction | Demonstrates a | Demonstr | Demonstrates an | Demonstrates | Does not | |
/5 | sophisticated | ates an | acceptable | an inadequate | demonstrate | |
understanding of | accomplis | understanding of | understanding | d | ||
the case study | hed | the topic(s) and | of the case | understandin | ||
and issues | understan | issues | study and | g to the | ||
ding of | issues | topics and | ||||
the case | issues. | |||||
study and | ||||||
issues | ||||||
Case Study Analysis | Presents an | Presents a | Presents a | Presents an | Analysis not | |
/26 | insightful and | thorough | superficial | incomplete | related to | |
thorough analysis | analysis of | analysis of | analysis of the | the case | ||
of all issues | most issues | some of the | issues | study | ||
identified; | identified; | issues | identified | presented. | ||
includes all | includes most | identified; | ||||
necessary | necessary | omits | ||||
information | information | necessary | ||||
information | ||||||
Makes | Makes appropriate | Makes | Makes little or | No | ||
appropriate | connections | appropriate but | no connection | connection | ||
and powerful | between the issues | somewhat vague | between the | between the | ||
connections | identified and the | connections | issues | issues | ||
between the | risk | between the | identified and | identified PM | ||
issues | management/code | issues and the risk | the risk | concepts | ||
identified and | of ethics concepts | management/cod | management/c | studied | ||
the risk | studied in PM. | e of ethics | ode of ethics | |||
management/c | concepts studied | concepts | ||||
ode of ethics | in PM. | studied in PM. | ||||
concepts | ||||||
studied in PM. | ||||||
usion | Presents | Presents specific, | Presents | Presents realistic | No | |
detailed, | realistic, and | realistic or | or appropriate | Recommendati | ||
/10 | realistic, and | appropriate | appropriate | recommendatio | ons presented | |
appropriate | recommendations | recommendatio | ns with little, if | |||
recommendatio | supported by the | ns supported by | any, support | |||
ns clearly | information | the information | from the | |||
supported by | presented and | presented and | information | |||
the information | PM concepts | PM concepts | presented and | |||
presented and | PM concepts | |||||
PM concepts | ||||||
presentation | Writing | Writing is | Writing lacks | Writing is | Report | |
demonstrates a | accomplished in | clarity or | unfocused, | unfocused, | ||
/2 | sophisticated | terms of clarity | conciseness | rambling, or | contains | |
clarity, | and conciseness | and contains | contains | grammatical | ||
conciseness, and | and contains only | numerous | serious errors; | and spelling | ||
correctness; | a few errors; | errors; gives | lacks detail and | errors. Very | ||
includes | includes sufficient | insufficient | relevant data | hard to | ||
thorough details | details and | detail and | and | understand. | ||
and relevant | relevant data and | relevant data | information; | |||
data and | information; well- | and | poorly | |||
information; | organized | information; | organized | |||
extremely well- | lacks | |||||
organized | organization |
BN205 | Network Project Management | Page 8 of 8 | |||
/2 | Uses APA | Uses APA | Reflect | Does not use APA | No Reference |
guidelines | s | guidelines | |||
accurately and | guidelines with | incomp | |||
consistently to | minor violations | lete | |||
cite sources | to cite sources | knowle | |||
dge of | |||||
APA |
Objective of this assessment is to identify common emerging threats and attacks, and suggest appropriate mitigation and countermeasures strategies for networked information systems.
Scenario
You are the principal Security Architect for Mindvision Corporation, a firm with four regional offices and 50 employees located across Australia. The corporation has detected an ongoing cyber-attacks from last few days effecting their network and day-to-day operational services. Your role (based on the chosen topic below) is to liaise between business stakeholders and technologists. Translating potential emerging threats and attacks faced by Corporation and providing feasible countermeasures so corporation can take security decisions more effectively.
Your deliverable for this assessment is to write a report for any ONE of the following topics:
IP security
Secure remote access
Network devices security Cloud computing
Intrusion prevention system Firewall security
DDoS attack detection and prevention
The report must address the following criteria:
An Executive Summary at the beginning of the report which provides a clear statement of the emerging threats and attacks being assessed. Identify and explain emerging threats based on vulnerabilities and consequences derived from Networked Information Systems.
Discuss potential damages these threats and vulnerabilities could cause if exploited. What are the challenges and issues faced by corporation to control these threats?
Discuss the impact of financial difficulties and budget constraints while selecting security counter measures.
Provide detail mitigation and countermeasure strategies that will impact the networked information system.
Marking criteria:
Example of marking criteria is shown in following table. Marks are allocated as follows:
Section to be | Description of the section | Marks | ||||
included in the report | ||||||
Executive Summary | Student should describe purpose of report and | 5 | ||||
statement of threats and attacks being discussed in | ||||||
report. | ||||||
Identification of | Student should identify and discuss in detail relevant | 10 | ||||
threats and attacks | security threats and attacks for the selected topic | |||||
Potential damages | Student should list down and explain potential | 10 | ||||
damages these threats could cause if exploited | ||||||
Challenges/Issues | Student should identify and relate challenges/issues | 10 | ||||
faced by corporation to control these threats such as | ||||||
financial difficulties and budget constraints. | ||||||
Mitigation and | Student | should | discuss | mitigation | and | 5 |
countermeasure | countermeasure strategies relevant to threats | |||||
strategies | identified in earlier part of this report | |||||
Summary/Conclusion | Student should conclude how these threats and | 5 | ||||
mitigation strategies is going to impact the | ||||||
networked information systems | ||||||
Reference style | Follow IEEE reference style | 5 | ||||
Total | 50 | |||||
Grade Mark
HD | DI | CR | P | Fail |
40-50 | 35-39 | 30-34 | 25-29 | <25 |
Excellent | Very Good | Good | Satisfactory | Unsatisfactory |
Identification of threats and attacks/10
Potential damages/10
Challenges /Issues /10
Mitigation and countermeasure strategies /5
Summary/Conclusion/5
Concise and | Summary is | Generally | Some | |
relevant and | relevant | relevance and | ||
specific to the | ||||
soundly | and | briefly | ||
topic | ||||
analyzed. | analyzed. | presented. | ||
Demonstrated | Demonstrated | Demonstrat | Demonstrate | |
ed ability | d ability to | |||
excellent ability | excellent | |||
to think | think critically | |||
to think critically | ability to think | |||
critically | and did not | |||
and sourced | critically but | |||
and sourced | source | |||
reference | did not source | |||
reference | reference | |||
material | reference | |||
material | material | |||
appropriately for | material | |||
appropriate | appropriately | |||
identification of | appropriately | |||
ly | ||||
threats | ||||
In depth use of a | Evidence of | Use of some | Limited | |
relevant | evidence of | |||
good range of | using relevant | |||
literature to | using relevant | |||
relevant | literature to | |||
address the | literature to | |||
literature to | address the | |||
points. | address the | |||
address the | points. | |||
point | ||||
points. | ||||
Logic is clear and | Consistency | Mostly | Adequate | |
consistent | cohesion and | |||
easy to follow | logical and | |||
logical and | conviction | |||
with strong | convincing | |||
convincing | ||||
arguments | ||||
Thorough and | Good | Enough | Limited | |
comprehensive | explanation of | explanation | explanation to | |
explanation of | the solutions | of the | the solution of | |
the solutions, to | to the problem | solution to | the problem | |
the problem | defined | the problem | defined. | |
defined. | defined | |||
All elements are | Conclusive | Components | Most | |
present and very | present with | present and | components | |
well integrated. | good cohesive | mostly well | present but | |
integrated | not well | |||
summarized | ||||
Did not demonstrate ability to think critically and did not source reference material appropriately
No evidence and literature to address points as required.
Argument is confused and disjointed
No explanation for mitigation provided or discussed
Conclusion lacks relevance
Reference style | Clear styles with | Clear | Generally | Sometimes | Lacks consistency | |
/5 | ||||||
excellent source | referencing | good | clear | with many errors | ||
of references. | style | referencing | referencing | |||
style | style | |||||
Assessment Details and Submission Guidelines | |
Unit Code | BN206 |
Unit Title | System Administration |
Assessment Type | Individual Assignment |
Assessment Title | Assignment-1: Server management systems and tools (T2-2018) |
Purpose of the assessment (with ULO Mapping) | This assignment is designed to assess students’ knowledge and skills related to the following learning outcomes:a) Understand various server management systems b) Manage emerging tools and techniques for system management |
Weight | 15% |
Total Marks | 40 |
Word limit | 1000-1200 words |
Due Date | Week 7, Thursday, by 11:55PM through Moodle (Melbourne and Sydney) |
Submission Guidelines | · All work must be submitted on Moodle by the due date along with a title Page.· The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. · Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. |
Extension | · If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application three (3) working days prior to the due date of the assignment. Further information is available at:http://www.mit.edu.au/about–mit/institute–publications/policies–procedures–and–guidelines/specialconsiderationdeferment Without a granted special consideration, late submissions will be subject to penalty as per the information on late penalty in the unit description. |
Academic Misconduct | · Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. |
This assignment has two parts: (i) command line tools and techniques for server management, and (ii) server management systems. The parts combined, the assignment provides students with opportunity to undertake work on the above topics and develop an understanding and professional skills required to manage and maintain network servers.
By doing this assignment, students will get an opportunity to enquire some of the server Operating System features, and basic tools used in LINUX servers. They will also get an idea of various tasks performed by the system administrators. In addition to that, the overview of the modern day operating systems is also necessary to keep up with the current technological trend.
Task 1: Server management with Linux commands (15 Marks)
Q1. Managing Linux servers requires skills in using command line tools. Consult various sources of information to gain an understanding of why Linux System Administrators must be proficient in using Linux command line tools as opposed to graphical user interface (GUI) based tools. Write down your understanding on this in your own words in one (1) paragraph. Your submission will be checked for originality using the Turnitin similarity checking software, and if it is detected that your paragraph has a high level of similarity with other sources, you will score zero marks for this answer. Remember to use at least two (2) citations and references (list at the end of the document along with your other references) in your paragraph. (6 Marks)
Q2. Use the following commands on a Linux machine running any flavour of Linux (e.g., Ubuntu, Kali), and document the following for each command: (3 Marks * 3=9 Marks)
Commands:
- ifconfig
- netstat
- lsof
- What the command is used for
- Syntax of the command
- A valid screenshot with appropriate figure number and caption showing how you explored the command on your Linux system. Figure 1 shows an example of a valid screenshot where the user who used the command is clearly displayed. This is required for checking the originality of your work. Do the following before using any of the above commands to achieve this:
- On the Linux terminal, use the following commands one after the other:
cd <your name> (You are changing directory to the newly created directory)
Figure 1: Example of a valid screenshot showing the name of the user (User: Jahan)
Task 2: Server management Systems (25 Marks)
Every server operating system has its own server management features included. Select and research one (1) topic from the list below, and write a report containing the following sections. Your submission will be checked for originality using the Turnitin similarity checking software, and if it is detected that your report has high level of similarity with other sources, you may score zero marks for this part.
List of topics (choose 1):
- CentOS
- Windows nano server
- Red hat enterprise Linux
Investigate your chosen topic by reading articles and technical configuration from any source other than Wikipedia. These articles can be searched online or from a journal. Provide a Report to share your understanding (between 1000-1200 words limit), which should include the following sections:
- Introduction
- Background information/history of development
- Technical details and features
- Target platform
- Advantages and Disadvantages
- Conclusion
- References (minimum 5 references)
Submit one document containing all of your answers for both Task 1 and Task 2. Your submission should include the following:
- A cover page (topic name and assignment title), identifying student (name and ID), name of the lecturer and name of the tutor.
- The assignment must use 11-pt Calibri (Body) font and at least 1.5 cm line spacing with appropriate section headings.
- Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE reference style.
- It should follow standard report f.
Marks are allocated as follows:
Section to be included in the report | Description of the section | Marks |
Task-1 (15 Marks) | ||
Q1 | A paragraph of student’s own understanding on the topic, written using own words. | 6 |
Q2 | For each tool: purpose, syntax, original screenshot | 3 marks * 3=9 |
Task 2 (25 Marks) | ||
Introduction | Introduction to the Topic, and structure of the report | 2 |
Background information/history of development | Details on background including the history of development | 3 |
Technical details and features | Detail explanation of the topic with features of the topic | 7 |
Target platform | Information and explanation on the computer platforms that are the targets for your chosen OS | 3 |
Advantages and Disadvantages | Listings and discussions of advantages and disadvantages of your chosen OS | 5 |
Conclusion | A conclusion to summarise the report findings | 3 |
References | IEEE reference style, and relevant references onlyAt least seven (7) references | 2 |
Total for assignment | 40 |
GradeMark | HD32-40 | DI28-31 | CR24-27 | P20-23 | Fail<20 |
Excellent | Very Good | Good | Satisfactory | Unsatisfactory | |
Q1 /6 | A paragraph of student’s own understanding on the topic, written using own words, with appropriate citation and references | Topics are relevant and soundly analysed. | Generally relevant but understanding reported is incomplete or partial. | Some relevance and briefly presented, citation ORreferences missing. | (This is not relevant to the assignment topic) or (no citations and references). |
Q2/9 | Excellent presentation of purpose, syntax, original screenshots for ALL commands | Very good presentation of purpose, syntax, original screenshots for ALL commands | Good presentation of purpose, syntax, original screenshots for ALL commands | Unclear presentation of purpose, syntax, with some original screenshots | Unclear presentation of purpose, syntax, with all non-original screenshots |
Introduction /2 | Excellent introduction of topic and clear structure of report provided | Very good introduction of topic and clear structure of report provided | Good introduction of topic and report structure provided to some extent | Somewhat relevant introduction, or no structure of report provided | Irrelevant introduction |
Background information/history of development /3 | Excellent background information/history of development provided | Very good background information/history of development provided | Good background information/history of development provided | Somewhat relevant background information/history of development | Irrelevant background information/history of development |
Technical details and features /7 | Highly valid and appropriate | Valid and appropriate | Generally valid and appropriate | Somewhat valid | Not valid |
Target Platform /3 | Clear listing of and excellent information and explanation about the target computer platforms for the chosen OS | Clear listing of and good information and explanation about the target computer platforms for the chosen | Clear listing of and some information or explanation about the target computer platforms for the chosen | Good listing of target platform, lacks information and/or explanation. | Absent or wrong platforms listed. |
Advantages/ Disadvantages /5 | Excellent list of advantages and disadvantages with clear explanations | Good list of advantages and disadvantages with clear explanation | List of advantages and disadvantages with some explanation | List of advantages and disadvantages with no explanation | Absent or irrelevant answer. |
Conclusions/3 | A very powerful conclusion | Very good conclusion | Good conclusion | Conclusion has some relevance | Irrelevant or no conclusion |
References /2 | Clear styles with excellent source of references. At least seven (7) references listed and used | Clear referencing style At least seven (7) references listed and used | Generally good referencing style Less than seven (7) references listed and used | Sometimes clear referencing style Inadequate number of references | Lacks consistency with many errors And/or No references (mark decided based on the above two criteria) |
Assessment Details and Submission Guidelines | |||||||||
Trimester | T2 2018 | ||||||||
Unit Code | BN208 | ||||||||
Unit Title | Networked Application | ||||||||
Assessment Type | Individual written report and demonstration – Assignment 1 | ||||||||
Assessment Title | Emerging trends in Network Technology and its Applications | ||||||||
Purpose of the | This assignment assesses the following Unit Learning Outcomes; students should | ||||||||
assessment (with | be able to demonstrate their achievements in following. | ||||||||
ULO Mapping) | b. Apply socio-technical contexts in modern network applications and | ||||||||
management; | |||||||||
c. Utilise common and emerging types of middleware to design and manage | |||||||||
networked applications; | |||||||||
Weight | 15% of the total assessments | ||||||||
Total Marks | 50 | ||||||||
Word limit | 2000 | ||||||||
Due Date | 30/08/2018 Thursday, Week 7, demonstrate during laboratory class and submit report | ||||||||
on Moodle | |||||||||
Submission | · All work must be submitted on Moodle by the due date along with a completed | ||||||||
Guidelines | Assignment Cover Page. | ||||||||
· The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font | |||||||||
and 2 cm margins on all four sides of the page with appropriate section headings. | |||||||||
· Reference sources must be cited in the text of the report and be listed | |||||||||
appropriately at the end in IEEE referencing style. | |||||||||
Extension | If an extension of time to submit work is required, a Special Consideration Application | ||||||||
must be submitted directly on AMS at least three working days before the assessment | |||||||||
due date. Further information is available at: | |||||||||
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures- | |||||||||
and-guidelines/specialconsiderationdeferment | |||||||||
Academic | Academic Misconduct is a serious offence. Depending on the seriousness of the case, | ||||||||
Misconduct | penalties can vary from a written warning or zero marks to exclusion from the course | ||||||||
or cancellation of the degree. Students should make themselves familiar with the full | |||||||||
policy and procedure available at: http://www.mit.edu.au/about-mit/institute- | |||||||||
publications/policies-procedures-and-guidelines/Plagiarism-Academic- | |||||||||
Misconduct-Policy-Procedure. For further information, please refer to the Academic | |||||||||
Integrity Section in the Unit Description. |
Assignment 1 Specification
Description
Applications of all kinds are critical to the daily operations of enterprises all over the world. While hypervisor virtualization technology has become the standard for managing applications, software components, containers enable IT professionals to install, run, maintain, and upgrade applications and their surrounding environments quickly, consistently, and more efficiently than their hypervisor counterparts. This is making Containers a popular topic for many IT professionals, and is increasing traction in the enterprise.
Write a report addressing following question with the help of figures and example scenarios.
- What is a Data Centre and discuss different operation performed in data centre, how data centres divided in Different tiers based on what criteria’s? Give example of few famous Australia based Data centres.
- What is Hypervisor-Based Server Virtualization Technology, its use and explain at least two examples of it. Also, compare both examples based on their features and limitations.
- What is container-based virtualization and why we need it? Discuss at least two examples of it and also, compare both examples based on their features and limitations.
Instructions: Students need to read three to four articles abouthypervisor virtualization technology, Data Centre and container-based virtualization applications to explore how these technologies work and their different features. Students can choose to research about any vendor application.
Demonstration: Students should prepare presentation slides and take screen shots of slide and paste at the end of assignment draft. The tutor will ask each student 2-3 questions from submitted work. The demonstration from each student should not be more than 8 minutes.
Task 1
Write a report covering and detailing above applications while emphasizing on the following aspects:- Field and Purpose of the application
- Working model of the application
- Scalability issues
- Features and Weaknesses of the application
- Socio-Technical aspects
Prepare a PowerPoint presentation discussing the main features of the given applications. The PowerPoint presentation should have at least 10 slides and students should present for 6-8 minutes during lab time in Week 8.
BN208 Networked Application Assignment 1
Further instructions:
- Do not use Wikipedia as neither source nor reference.
- Read articles from the books or the ones published in journals and conferences for each topic and then rewrite those using your own words.
- Use IEEE style referencing, and make sure to properly reference any diagrams/ graphics.
Students has to submit only one word document on Moodle which includes task 1 and task 2. At the end of task 1, copy the slides from task 2 and paste it into the same document then upload it on Moodle.
Marking criteria:
Section to be included in the | Description of the section | Marks |
report | ||
Introduction | Brief introduction about given technologies and | 5 |
outline of the complete report | ||
Task 1 | Discussion of the following aspects of given | 20 |
applications: | ||
Purpose | ||
Working | ||
Scalability | ||
Features and Weaknesses | ||
Socio-Technical aspects | ||
Task 2 | The PowerPoint presentation evaluation will be | 15 |
based on: | ||
– Quality of presentation (layout, structure, | ||
organisation etc.) | ||
– Quality of content and information | ||
– Presenters knowledge of the topic and ability to | ||
answer the questions | ||
Conclusion | A complete summary of the report including all | 5 |
important findings | ||
Reference style | IEEE reference style | 5 |
Total | 50 | |
Marking Rubric
Grades | Excellent | Very Good | Good | Satisfactory | Unsatisfactory |
Introduction | Concise and | Topics are | Generally | Some | Not relevant to the |
specific to the | relevant and | relevant and | relevance and | assignment topic. | |
given | soundly | analysed. | briefly | ||
technologies. | analysed. | presented. | |||
Analysis and | Demonstrates | Demonstrates | Demonstrates | Demonstrates | Does not |
Understanding | excellent ability | ability to think | fair ability to | ability to think | demonstrate ability to |
of | to think critically | critically and | think critically | critically but | think critically and |
Technologies | and source | source | and source | does not | does not source |
reference | reference | reference | source | reference material | |
material | material | material | reference | appropriately. | |
appropriately. | appropriately. | appropriately. | material | ||
appropriately. | |||||
Demonstratio | Logic is clear and | Consistency, | Mostly | Adequate | Argument is confused |
n | easy to follow | logical and | consistent | cohesion and | and disjointed. |
with strong | convincing. | logical and | conviction. | ||
arguments. | convincing | ||||
Conclusion | Concluded each | Discussed the | Concluded in | Some areas | Not relevant to given |
topic specifically | major areas of | general | were not | topics | |
to the given | given topics | relevant | |||
technologies. | |||||
IEEE | Clear styles with | Clear | Generally | Sometimes | Lacks consistency |
Reference | excellent source | referencing | good | clear | with many errors. |
style | of references. | style. | referencing | referencing | |
style. | style. |
mit
No comments:
Post a Comment