Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Prepared by: Mr. Ameet Kumar XXXXXXXXXXModerated by: Dr. Fariza Sabrina July 2018 Assessment Details and Submission Guidelines Trimester T2 2018 Unit Code BN208 Unit Title Networked Application...

1 answer below »
Prepared by: Mr. Ameet Kumar XXXXXXXXXXModerated by: Dr. Fariza Sa
ina July 2018


Assessment Details and Submission Guidelines
Trimester T2 2018
Unit Code BN208
Unit Title Networked Application
Assessment Type Individual written report and demonstration – Assignment 1
Assessment Title Emerging trends in Network Technology and its Applications
Purpose of the
assessment (with
ULO Mapping)
This assignment assesses the following Unit Learning Outcomes; students should
e able to demonstrate their achievements in following.
b. Apply socio-technical contexts in modern network applications and
management;
c. Utilise common and emerging types of middleware to design and manage
networked applications;
Weight 15% of the total assessments
Total Marks 50
Word limit 2000
Due Date XXXXXXXXXX/08/2018 Friday, Week 7, demonstrate during laboratory class and submit report
on Moodle
Submission
Guidelines
 All work must be submitted on Moodle by the due date along with a completed
Assignment Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body) font
and 2 cm margins on all four sides of the page with appropriate section headings.
 Reference sources must be cited in the text of the report and be listed
appropriately at the end in IEEE referencing style.
Extension If an extension of time to submit work is required, a Special Consideration Application
must be submitted directly on AMS at least three working days before the assessment
due date. Further information is available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-
and-guidelines/specialconsiderationdeferment
Academic
Misconduct

Academic Misconduct is a serious offence. Depending on the seriousness of the case,
penalties can vary from a written warning or zero marks to exclusion from the course
or cancellation of the degree. Students should make themselves familiar with the full
policy and procedure available at: http:
www.mit.edu.au/about-mit/institute-
publications/policies-procedures-and-guidelines/Plagiarism-Academic-
Misconduct-Policy-Procedure. For further information, please refer to the Academic
Integrity Section in the Unit Description.





http:
www.mit.edu.au/about
http:
www.mit.edu.au/about
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
BN208 Networked Application Assignment 1 Page 2 of 4
Prepared by: Mr. Ameet Kumar XXXXXXXXXXModerated by: Dr. Fariza Sa
ina July, 2018


Assignment 1 Specification
Description
Applications of all kinds are critical to the daily operations of enterprises all over the world. While
hypervisor virtualization technology has become the standard for managing applications, software
components, containers enable IT professionals to install, run, maintain, and upgrade applications
and their su
ounding environments quickly, consistently, and more efficiently than their hypervisor
counterparts. This is making Containers a popular topic for many IT professionals, and is increasing
traction in the enterprise.

Write a report addressing following question with the help of figures and example scenarios.

1. What is a Data Centre and discuss different operation performed in data centre, how data
centres divided in Different tiers based on what criteria’s? Give example of few famous
Australia based Data centres.
2. What is Hypervisor-Based Server Virtualization Technology, its use and explain at least
two examples of it. Also, compare both examples based on their features and limitations.
3. What is container-based virtualization and why we need it? Discuss at least two examples
of it and also, compare both examples based on their features and limitations.


Instructions: Students need to read three to four articles about hypervisor virtualization technology,
Data Centre and container-based virtualization applications to explore how these technologies work
and their different features. Students can choose to research about any vendor application.

Demonstration: Students should prepare presentation slides and take screen shots of slide and paste
at the end of assignment draft. The tutor will ask each student 2-3 questions from submitted work.
The demonstration from each student should not be more than 8 minutes.

Task 1

Write a report covering and detailing above applications while emphasizing on the following aspects:

 Field and Purpose of the application
 Working model of the application
 Scalability issues
 Features and Weaknesses of the application
 Socio-Technical aspects

Task 2
Prepare a PowerPoint presentation discussing the main features of the given applications. The
PowerPoint presentation should have at least 10 slides and students should present for 6-8 minutes
during lab time in Week 8.
BN208 Networked Application Assignment 1 Page 3 of 4
Prepared by: Mr. Ameet Kumar XXXXXXXXXXModerated by: Dr. Fariza Sa
ina July, 2018
Further instructions:

- Do not use Wikipedia as neither source nor reference.
- Read articles from the books or the ones published in journals and conferences for each
topic and then rewrite those using your own words.
- Use IEEE style referencing, and make sure to properly reference any diagrams/ graphics.

Submissions:
Students has to submit only one word document on Moodle which includes task 1 and task 2. At
the end of task 1, copy the slides from task 2 and paste it into the same document then upload it on
Moodle.


Marking criteria:
Section to be included in the
eport
Description of the section Marks
Introduction Brief introduction about given technologies and
outline of the complete report
5
Task 1 Discussion of the following aspects of given
applications:
Purpose
Working
Scalability
Features and Weaknesses
Socio-Technical aspects
20
Task 2 The PowerPoint presentation evaluation will be
ased on:
- Quality of presentation (layout, structure,
organisation etc.)
- Quality of content and information
- Presenters knowledge of the topic and ability to
answer the questions
15
Conclusion A complete summary of the report including all
important findings
5
Reference style IEEE reference style 5
Total 50


BN208 Networked Application Assignment 1 Page 4 of 4
Prepared by: Mr. Ameet Kumar XXXXXXXXXXModerated by: Dr. Fariza Sa
ina July, 2018
Marking Ru
ic
Grades Excellent Very Good Good Satisfactory Unsatisfactory
Introduction Concise and
specific to the
given
technologies.
Topics are
elevant and
soundly
analysed.
Generally
elevant and
analysed.
Some
elevance and
iefly
presented.
Not relevant to the
assignment topic.
Analysis and
Understanding
of
Technologies

Demonstrates
excellent ability
to think critically
and source
eference
material
appropriately.
Demonstrates
ability to think
critically and
source
eference
material
appropriately.
Demonstrates
fair ability to
think critically
and source
eference
material
appropriately.
Demonstrates
ability to think
critically but
does not
source
eference
material
appropriately.
Does not
demonstrate ability to
think critically and
does not source
eference material
appropriately.
Demonstratio
n
Logic is clear and
easy to follow
with strong
arguments.
Consistency,
logical and
convincing.
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction.
Argument is confused
and disjointed.
Conclusion Concluded each
topic specifically
to the given
technologies.
Discussed the
major areas of
given topics
Concluded in
general
Some areas
were not
elevant
Not relevant to given
topics
IEEE
Reference
style
Clear styles with
excellent source
of references.
Clear
eferencing
style.
Generally
good
eferencing
style.
Sometimes
clear
eferencing
style.
Lacks consistency
with many e
ors.
Answered Same Day Aug 16, 2020 BN208

Solution

Ankit answered on Aug 26 2020
158 Votes
Introduction
A Data centre is an office where computing and networking asset is centralized for the aim of gathering, storing, managing, distributing or giving access to huge volume of data. The privacy and dependability of data centres and its data is very first concern for business. The designs of data centre are distinct which is categorized as enterprise data centre and internet facing data centre.  [Paloaltonetworks]
Tier Division of data centres is also called standardised methodology from Uptime Institute to decide the accessibility, or uptime in an office. There are various points to decide in which tier data centre comes under. The range of data centre is from tier 1 to tier 4 with every tier consolidating the bottom tiers necessities.
A hypervisor is a technique that isolates a PC's OS and software’s from their fundamental material assets. The hypervisor operates the idea of virtualization that permit the real host device to work different virtual devices as visitors in order to support increase the successful utilization of computer assets, for example, bandwidth of server, data transfer capacity, memory and CPU cycles. The hypervisor Based Server virtualization is as yet used to effectively convey endless apps or tools over the entirely scope of situations. [Shaw 2017]
Container virtualization is different from hypervisor based virtualization as Container virtualization is very secure in terms of design as compared to hypervisor based virtualization. Container provides best control on undisclosed assets. The base for Container virtualization is host OS but not the hypervisor. As opposed to virtualization the equipment that needs complete virtualized OS for every user. It virtualized the OS itself by allocating the kernel of host OS and their assets with all the host and different containers. Container-based virtualization is an answer for the issue of how to inspire application to run dependably when migrated from one computing platform onto the next. [Badola 2015]
The main purpose of this document is to discuss different techniques such as data centre, Hypervisor-Based Server Virtualization Technology and container-based virtualization. The document focus on various operations performed in data centre. The document also focuses on Hypervisor-Based Server Virtualization Technology and container-based virtualization with their features, limitation and discusses the working of both.
Data centre and its different operation
A Data centre is an office where computing and networking asset is centralized for the aim of gathering, storing, managing, distributing or giving access to huge volume of data. The data centre operations is huge phrase which consists of various tasks and processes within data centre. There are different data centre operations that is performed in the organization that vary from simple to difficult operations. Different operations performed in data centre as listed below:
a) Infrastructure operations: The different Infrastructure operations in data centre consist of deployment, maintaining, data storage, server updating, checking and network assets.
) Security operations: The different Security operations in data centre consist of security tools, devices and techniques which give both physical and logical security within data centre.
c) Management operations: The different management operations in data centre consist of building, implementation and controlling of policies within data centre.
d) Other operations: These types of operations consist of checking whether power is supplied to data centre office and cooling devices are operational.
“Division of data centres in different tiers based on different criteria”
Tier Division of data centres is also called standardised methodology from Uptime Institute to decide the accessibility, or uptime in an office. There are various points to decide in which tier data centre comes under. The range of data centre is from tier 1 to tier 4 with every tier consolidating the bottom tiers necessities. Each tier is dynamic as Tier I is the easiest and Tier IV is the strongest. III tier of data centre is a typical business answer for
oad data centre service vendor. IV tier of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here