Prepared by: Mr. Ameet Kumar XXXXXXXXXXModerated by: Dr. Fariza Sabrina July 2018 Assessment Details and Submission Guidelines Trimester T2 2018 Unit Code BN208 Unit Title Networked Application...

1 answer below »
Network applications


Prepared by: Mr. Ameet Kumar Moderated by: Dr. Fariza Sabrina July 2018 Assessment Details and Submission Guidelines Trimester T2 2018 Unit Code BN208 Unit Title Networked Application Assessment Type Individual written report and demonstration – Assignment 1 Assessment Title Emerging trends in Network Technology and its Applications Purpose of the assessment (with ULO Mapping) This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in following. b. Apply socio-technical contexts in modern network applications and management; c. Utilise common and emerging types of middleware to design and manage networked applications; Weight 15% of the total assessments Total Marks 50 Word limit 2000 Due Date 31/08/2018 Friday, Week 7, demonstrate during laboratory class and submit report on Moodle Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of the page with appropriate section headings.  Reference sources must be cited in the text of the report and be listed appropriately at the end in IEEE referencing style. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS at least three working days before the assessment due date. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures- and-guidelines/specialconsiderationdeferment Academic Misconduct Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or cancellation of the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies-procedures-and-guidelines/Plagiarism-Academic- Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in the Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure BN208 Networked Application Assignment 1 Page 2 of 4 Prepared by: Mr. Ameet Kumar Moderated by: Dr. Fariza Sabrina July, 2018 Assignment 1 Specification Description Applications of all kinds are critical to the daily operations of enterprises all over the world. While hypervisor virtualization technology has become the standard for managing applications, software components, containers enable IT professionals to install, run, maintain, and upgrade applications and their surrounding environments quickly, consistently, and more efficiently than their hypervisor counterparts. This is making Containers a popular topic for many IT professionals, and is increasing traction in the enterprise. Write a report addressing following question with the help of figures and example scenarios. 1. What is a Data Centre and discuss different operation performed in data centre, how data centres divided in Different tiers based on what criteria’s? Give example of few famous Australia based Data centres. 2. What is Hypervisor-Based Server Virtualization Technology, its use and explain at least two examples of it. Also, compare both examples based on their features and limitations. 3. What is container-based virtualization and why we need it? Discuss at least two examples of it and also, compare both examples based on their features and limitations. Instructions: Students need to read three to four articles about hypervisor virtualization technology, Data Centre and container-based virtualization applications to explore how these technologies work and their different features. Students can choose to research about any vendor application. Demonstration: Students should prepare presentation slides and take screen shots of slide and paste at the end of assignment draft. The tutor will ask each student 2-3 questions from submitted work. The demonstration from each student should not be more than 8 minutes. Task 1 Write a report covering and detailing above applications while emphasizing on the following aspects:  Field and Purpose of the application  Working model of the application  Scalability issues  Features and Weaknesses of the application  Socio-Technical aspects Task 2 Prepare a PowerPoint presentation discussing the main features of the given applications. The PowerPoint presentation should have at least 10 slides and students should present for 6-8 minutes during lab time in Week 8. BN208 Networked Application Assignment 1 Page 3 of 4 Prepared by: Mr. Ameet Kumar Moderated by: Dr. Fariza Sabrina July, 2018 Further instructions: - Do not use Wikipedia as neither source nor reference. - Read articles from the books or the ones published in journals and conferences for each topic and then rewrite those using your own words. - Use IEEE style referencing, and make sure to properly reference any diagrams/ graphics. Submissions: Students has to submit only one word document on Moodle which includes task 1 and task 2. At the end of task 1, copy the slides from task 2 and paste it into the same document then upload it on Moodle. Marking criteria: Section to be included in the report Description of the section Marks Introduction Brief introduction about given technologies and outline of the complete report 5 Task 1 Discussion of the following aspects of given applications: Purpose Working Scalability Features and Weaknesses Socio-Technical aspects 20 Task 2 The PowerPoint presentation evaluation will be based on: - Quality of presentation (layout, structure, organisation etc.) - Quality of content and information - Presenters knowledge of the topic and ability to answer the questions 15 Conclusion A complete summary of the report including all important findings 5 Reference style IEEE reference style 5 Total 50 BN208 Networked Application Assignment 1 Page 4 of 4 Prepared by: Mr. Ameet Kumar Moderated by: Dr. Fariza Sabrina July, 2018 Marking Rubric Grades Excellent Very Good Good Satisfactory Unsatisfactory Introduction Concise and specific to the given technologies. Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. Not relevant to the assignment topic. Analysis and Understanding of Technologies Demonstrates excellent ability to think critically and source reference material appropriately. Demonstrates ability to think critically and source reference material appropriately. Demonstrates fair ability to think critically and source reference material appropriately. Demonstrates ability to think critically but does not source reference material appropriately. Does not demonstrate ability to think critically and does not source reference material appropriately. Demonstratio n Logic is clear and easy to follow with strong arguments. Consistency, logical and convincing. Mostly consistent logical and convincing Adequate cohesion and conviction. Argument is confused and disjointed. Conclusion Concluded each topic specifically to the given technologies. Discussed the major areas of given topics Concluded in general Some areas were not relevant Not relevant to given topics IEEE Reference style Clear styles with excellent source of references. Clear referencing style. Generally good referencing style. Sometimes clear referencing style. Lacks consistency with many errors.
Answered Same DayAug 16, 2020BN208

Answer To: Prepared by: Mr. Ameet Kumar XXXXXXXXXXModerated by: Dr. Fariza Sabrina July 2018 Assessment Details...

Ankit answered on Aug 26 2020
155 Votes
Introduction
A Data centre is an office where computing and networking asset is centralized for the aim of gathering, storing, managing, distributing or giving access to huge volume of data. The privacy and dependability of data centres and its data is very first concern for business. The designs of data centre are distinct which is categorized as enterprise data centre and internet facing data centre.  [Paloaltonetwork
s]
Tier Division of data centres is also called standardised methodology from Uptime Institute to decide the accessibility, or uptime in an office. There are various points to decide in which tier data centre comes under. The range of data centre is from tier 1 to tier 4 with every tier consolidating the bottom tiers necessities.
A hypervisor is a technique that isolates a PC's OS and software’s from their fundamental material assets. The hypervisor operates the idea of virtualization that permit the real host device to work different virtual devices as visitors in order to support increase the successful utilization of computer assets, for example, bandwidth of server, data transfer capacity, memory and CPU cycles. The hypervisor Based Server virtualization is as yet used to effectively convey endless apps or tools over the entirely scope of situations. [Shaw 2017]
Container virtualization is different from hypervisor based virtualization as Container virtualization is very secure in terms of design as compared to hypervisor based virtualization. Container provides best control on undisclosed assets. The base for Container virtualization is host OS but not the hypervisor. As opposed to virtualization the equipment that needs complete virtualized OS for every user. It virtualized the OS itself by allocating the kernel of host OS and their assets with all the host and different containers. Container-based virtualization is an answer for the issue of how to inspire application to run dependably when migrated from one computing platform onto the next. [Badola 2015]
The main purpose of this document is to discuss different techniques such as data centre, Hypervisor-Based Server Virtualization Technology and container-based virtualization. The document focus on various operations performed in data centre. The document also focuses on Hypervisor-Based Server Virtualization Technology and container-based virtualization with their features, limitation and discusses the working of both.
Data centre and its different operation
A Data centre is an office where computing and networking asset is centralized for the aim of gathering, storing, managing, distributing or giving access to huge volume of data. The data centre operations is huge phrase which consists of various tasks and processes within data centre. There are different data centre operations that is performed in the organization that vary from simple to difficult operations. Different operations performed in data centre as listed below:
a) Infrastructure operations: The different Infrastructure operations in data centre consist of deployment, maintaining, data storage, server updating, checking and network assets.
b) Security operations: The different Security operations in data centre consist of security tools, devices and techniques which give both physical and logical security within data centre.
c) Management operations: The different management operations in data centre consist of building, implementation and controlling of policies within data centre.
d) Other operations: These types of operations consist of checking whether power is supplied to data centre office and cooling devices are operational.
“Division of data centres in different tiers based on different criteria”
Tier Division of data centres is also called standardised methodology from Uptime Institute to decide the accessibility, or uptime in an office. There are various points to decide in which tier data centre comes under. The range of data centre is from tier 1 to tier 4 with every tier consolidating the bottom tiers necessities. Each tier is dynamic as Tier I is the easiest and Tier IV is the strongest. III tier of data centre is a typical business answer for broad data centre service vendor. IV tier of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here