Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Question: Objective: This segment of the project (i.e., Part A of ITSU3009) aims to provide the students an opportunity to carry out in-depth study on a specific emerging area in Networking. The students are expected to do this assignment individually and present their findings in the form of a brief review report.

On completing the assignment students get trained in keeping pace with recent advances through literature review and self development which is an essential skill for any practicing ICT professional since the ICT field evolves rapidly and every ICT professional is expected to pursue life-long learning and self updates.

Duration: The project should take typically 2-3 weeks of study. Students are provided extra time to submit to accommodate for any exigencies.

You should submit your report ON OR BEFORE 22nd Saturday April 2017 midnight (11:59 PM) via Moodle submission link of ITSU3009 Unit.

Project Scope: Select one out of topics listed in Appendix overleaf. Conduct a literature survey and summarise your findings. Write a short report based on the information you collected. The report should be about 1000 words except references, figure and table names and table of contents. A 10% variation in the number of words is permitted.

Your report should summarize your understanding of the chosen topic in your own words. You should not merely copy and paste from other sources. You are required to conduct a literature search over internet, books or journals or product vendor documents; most of which are available over internet in open source in abundance for the topics listed.

You should divide your report into appropriate sections such as Introduction, Body with appropriate sub sections, Conclusion and references. All material referred to prepare the report has to be placed in  reference at the end of the report.

If you are in doubt please contact the ITSU3009 Project 2 lecturers/advisors for clarification. However, the study has to be carried out by you based on your own reading and understanding and the unit advisors are permitted only to provide pointers and not actually teach you the technical content.

Contact session for this would be during the timetabled hours weekly.

LIST OF TOPICS

Each student should choose ANY ONE topic from the list below and carry out the assignment. You may be required to give two preferences to your unit lecturer out of which one may be assigned.

1. Choose one ‘Infrastructure as a Service (IaaS)' offering of your choice. (Popular examples are Amazon Web Services, Verizon InfraCloud, GoGrid and RackSpace.) For your choice of IaaS offering, research the literature and describe how to accomplish the following:

a. provision virtual servers,

b. set up a firewall

c. scale your infrastructure to meet increasing demand. Summarise and report your findings.

2. Conduct literature survey on topic 'Self-healing IOT sensors'. Carry out a research on the available literature and describe the following:

a. Characteristics of self-healing sensors

b. Metrics involved

c. Processing technology stack for these sensors

d. Eco-system and business values these sensors bring. Summarise and report your findings.

3. Based on a survey of literature and research study, describe and classify the various types of malware. Taking one example briefly highlight the security measures that a network administrator should take to prevent malware based threats.

4. Based on literature survey on the Software Defined Network, define how the OpenFlow communication interface deals with various network devices such as switches, routers, hypervisor and virtual images. Document your findings regarding the factors to be considered while designing OpenFlow protocol and OpenFlow Controller.

5. A cloud-computing service company effectively leases compute servers to multiple companies. Each such customer is sometimes referred to as a "tenant". Explain why it is important for the network traffic associated with different tenants to be isolated from one another. Describe the isolation techniques and research how this is done using a cloud service provider such as Amazon. Summarise your findings.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92276930

Have any Question?


Related Questions in Computer Network & Security

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Autonomous consumptionnbsp 660marginal propensity to

Autonomous consumption  = 660 Marginal propensity to consume  = 0.8 Autonomous taxation  = 200 Income tax rate =  0.2 Planned investment  = 500 Government spending  = 500 Autonomous net exports  = 300 NX  = 0.04 Calculat ...

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

Question a small company is assigned the class c network

Question : A small company is assigned the class C network 205.67.35.0. You need to divide this network to provide subnets for three departments using fixed-length subnetting. The departments are approximately the same s ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

How would you explain the concept of a quality adjusted

How would you explain the concept of a quality adjusted life year? When is it appropriate to use "QALYs" instead of simply improved life expectancy as the outcome measure in an economic evaluation?

Part - athe assignmentwrite a critique review of the

Part - A The assignment Write a critique / review of the following paper: Mark Pollitt Eoghan Casey David-Olivier Jaquet-Chiffelle Pavel Gladyshev, "A Framework for Harmonizing Forensic Science Practices and Digital/Mult ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As