RSS

Networked Applications

25 Jan

Prepared by: your name Moderated by: A/Prof Savitri Bevinakoppa Month, year
Assessment    Details    and    Submission    Guidelines
Unit    Code MN504 T3 2016
Unit    Title Networked    Applications
Assessment    Type Group Assignment
Assessment    Title Critical    Thinking,    Reasoning    and    Problem    Solving
Purpose     of     the     assessment
(with    ULO    Mapping)
The purpose of this assignment is to develop skills in critical thinking,
reasoning, problem solving in regards to Networked Applications
Management (NAM). This assignment will provide scope to explore
and learn working mechanisms of cutting-edge tools and technologies
with regard to NAM. Student will develop skills of critically
understanding problems, conceptualising possible solutions to the
problems, and exploring possible NAM related tools to justify the
strength of their claimed solutions.
The assignment will also require analysing capability to relate
networked application protocols with the underlying networked
infrastructure with a view to managing networked applications. This
assignment provides students with opportunity to demonstrate
problem solving capability in the domain of cutting edge distributed
systems.
Weight 20%
Total    Marks 50
Word    limit 2000
Due    Date Week    11
Submission    Guidelines • All    work    must    be    submitted    on    Moodle by    the    due    date     along
with    a    completed    Assignment    Cover    Page.
• The    assignment    must    be    in MS Word    format,    1.5    spacing,    11-pt
Calibri    (Body)    font    and    2    cm    margins    on    all    four    sides    of    your    page
with    appropriate    section    headings.
• Reference    sources    must    be    cited    in    the    text    of    the    report,    and
listed     appropriately     at     the     end     in     a     reference     list     using     IEEE
referencing    style.
Extension • If     an     extension     of     time     to     submit     work     is     required,     a     Special
Consideration     Application     must     be     submitted     directly     to     the
School’s    Administration     Officer,     in     Melbourne     on     Level     6     or     in
Sydney     on     Level     7.          You     must     submit     this     application     three
working    days prior    to    the    due    date    of    the    assignment.     Further
information    is    available    at:
http://www.mit.edu.au/about-mit/institutepublications/policies-procedures-andguidelines/specialconsiderationdeferment
Academic    Misconduct         • Academic     Misconduct     is     a     serious     offence.     Depending     on     the
seriousness    of    the    case,    penalties    can    vary    from    a    written    warning    BN208 Networked Applications Page 2 of 5
Prepared by: Dr Khandakar Ahmed Moderated by: A/Prof Savitri Bevinakoppa January, 2016
or     zero     marks     to     exclusion     from     the     course     or     rescinding     the
degree.    Students    should    make    themselves    familiar    with    the    full
policy and     procedure     available     at:
http://www.mit.edu.au/about-mit/institutepublications/policies-procedures-and-guidelines/PlagiarismAcademic-Misconduct-Policy-Procedure. For     further
information, please     refer     to     the     Academic     Integrity     Section     in
your    Unit    Description.
Assessment    Cover    Sheet
Student    ID: Student    Surname: Given    Name:
Course: School:
Unit    Code: Unit    Title:
Due    Date: Date    Submitted: Campus:
Lecturer: Tutor:
All    work    must    be    submitted    on    Moodle    by    the    due    date.        If    an    extension    of    time    to    submit    work    is
required,    a    Special    Consideration    Application    must    be    submitted.    Further    information    is    available    at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-andguidelines/specialconsiderationdeferment
Academic    Misconduct
Academic    Misconduct    is    a    serious    offence.    Depending    on    the    seriousness    of    the    case,    penalties    can
vary    from    a    written    warning    or    zero    marks    to    exclusion    from    the    course    or    rescinding    the    degree.
Students     should     make     themselves     familiar     with     the     full     policy     and     procedure     available     at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-andguidelines/Plagiarism-Academic-Misconduct-Policy-Procedure. For     further     information     please
refer    to    the    Academic    Integrity    Section    in    your    Unit    Description.
Student    Declaration
I/We    declare    that:
o the     work     contained     in     this     assignment     is     my/our     own     work/group     work,     except     where
acknowledgement    of    sources    is    made;
o certify    that    this    assessment    has    not    been submitted    previously    for    academic    credit    in    this    or
any    other    course;
o I/we    have    read    the    MIT’s    Plagiarism    and    Academic    Misconduct    Policy    Procedure,    and    I/we
understand    the    consequences    of    engaging    in    plagiarism;    BN208 Networked Applications Page 3 of 5
Prepared by: Dr Khandakar Ahmed Moderated by: A/Prof Savitri Bevinakoppa January, 2016
o a    copy    of    the    original    assignment    is    retained    by    me/us    and    that    I/we    may    be    required    to
submit    the    original    assignment    to    the    Lecturer    and/or    Unit    Co-ordinator    upon    request;
I/we    have    not    plagiarised    the    work    of    others    or    participated    in    unauthorised    collaboration    when
preparing    this    assignment.
Student    Signature: Date:
Student    Name:
Assignment    Description
A group (not more than two members) will be given a topic to explore its designated areas as presented
in the following table; students are advised to explore the topic area(s) by reviewing the literature;
students participating in the PBL are taught how to do the critical thinking for review literature; and
literature is available in the internet as papers, book chapters, and independent scholarly reports by
experts, and research based videos. A group of two students will collaborate on the areas of a topic,
there must have clear descriptions of individual contribution and collaborative contribution.
SL Topic Area to be explored
1 Elastic Caching
over Typical Web
Caching
And Web Proxy
Caching
Explore by reviewing Typical Web Caching Techniques and Technologies and
their strength and weakness?
Find a problem case study in the topic, and apply your critical thinking on the
Architecture Style, Protocols, and underlying infrastructure and configuration
for Networked Application Management (NAM) in regards to Elastic Caching
over Typical Web Caching And Web Proxy Caching?
Comparative tabular representation of Elastic Caching over Typical Web
Caching and Web Proxy Caching.
2 Remote Desktop
Access
Explore by reviewing the underlying mechanism, middleware, protocols, and
flow chart based software interaction processes for accessing remote desktop
and resources in a networked computer;
Find a problem case study in the topic along the area of trouble shooting a
remote computer or remote-tutor-assisted teaching-learning, and apply your
critical thinking to solve the problem with your deep learning on the above
areas.
3 Streaming
live and interactive
Audio and
Video
Explore by reviewing the underlying mechanism, middleware, protocols of
streaming live Audio and Video in distributed Cloud Environment.
One example of such networked application management tool for live audio and
video is CloudFront; critically list the others tools, techniques, protocols with
comparative discussions for solving diverse requirements. What are the Metrics
that are related to performance of audio and video transfer and sharing?
Find    a    problem    case    study    in    the    topic,    and    apply    your    critical    thinking    to    solve
the    problem    with    your    deep    learning    on    the    above    areas.    BN208 Networked Applications Page 4 of 5
Prepared by: Dr Khandakar Ahmed Moderated by: A/Prof Savitri Bevinakoppa January, 2016
4 Virtualization
With respect to
Citrix
Explore by reviewing Virtualisation, Virtual Machines, and Architecture of
Virtual Machines along with protocols, techniques, and frameworks for
networked applications management.
Find a problem case study in the topic, and apply your critical thinking to solve
the problem with your deep learning on the above areas.
Submission guidelines:
1. A submitted work must include the following:
• All     work     must     be     submitted     on     Moodle by     the     due     date     along     with     a     completed
Assignment    Cover    Page.
• The    assignment    must    be    in MS Word    format,    1.5    spacing,    11-pt    Calibri    (Body)    font    and
2    cm    margins    on    all    four    sides    of    your    page    with    appropriate    section    headings.
• Reference    sources    must    be    cited    in    the    text    of    the    report,    and    listed    appropriately    at
the    end    in    a    reference    list    using    IEEE    referencing    style.
2. The assignment must be submitted in soft (electronic) copy under Moodle which will be
checked by Turnitin. Assignment will be marked on Moodle. Students must submit on Moodle
within the deadline.
Marking    criteria:
Example    of    marking    criteria    is    shown    in    following    table.    Marks    are    allocated    as    follows:
Section    to    be    included    in
the    report
Description    of    the    section Marks
Proof    Reading Writing    with    quality    (proofreading    your    work    is    highly
recommended)
5
Investigation An    Open-ended    approach    to    investigating/exploring
relevant    aspects    of    the    Topic,    its    questions    and    issues
highlighted    in    the    above    table.
10
Case    Study Finding a case study problem in the areas of your
topic
5
Justification Justify    how    your    investigation    contributes    to    the    problem
by     analysing     and     comparing     an     existing     investigation     by
others.
10
Critical    Thinking Showing     and     reflecting     your     deep     and     critical     thinking
throughout    your    entire    scholarly    represented    written    and
demonstrated     works     (a     smooth     flow of     ideas     in     the
sections    and    subsection    is    highly    recommended).
10
Conclusion Draw conclusion of the report 5
Reference    style Follow    IEEE    reference    style 5
Total 50
Example    Marking    Rubric    for    Assignment    #:    Total    Marks    50
Note:    The    marking    rubrics    varies    for    each    assignment
Grade
Mark
HD
40-50
DI
35-44
CR
30-34
P
25-29
Fail
<25BN208 Networked Applications Page 5 of 5
Prepared by: Dr Khandakar Ahmed Moderated by: A/Prof Savitri Bevinakoppa January, 2016
Excellent Very    Good Good Satisfactory Unsatisfactory
Proof    Reading
/5
All    topics    are
pertinent    and
covered    in    depth.
Ability    to    think
critically    and
source    material    is
demonstrated
Topics    are
relevant    and
soundly
analysed.
Generally
relevant    and
analysed.
Some    relevance
and    briefly
presented.
This    is    not
relevant    to    the
assignment
topic.
Investigation
/10
Logic    is    clear    and
easy    to    follow    with
strong    arguments
Consistency
logical    and
convincing
Mostly
consistent
logical    and
convincing
Adequate
cohesion    and
conviction
Argument    is
confused    and
disjointed
Case    Study
/5
Justification
/10
All    elements    are
present    and    very
well    integrated.
Components
present    with
good
cohesive
Components
present    and
mostly    well
integrated
Most
components
present
Proposal    lacks
structure.
Critical    Thinking
/5
Demonstrated
excellent    ability    to
think    critically    and
sourced    reference
material
appropriately
Demonstrat
ed        excellent
ability    to
think
critically    but
did    not
source
reference
material
appropriatel
y
Demonstrated
ability    to    think
critically    and
sourced
reference
material
appropriately
Demonstrated
ability    to    think
critically    and    did
not    source
reference
material
appropriately
Did    not
demonstrate
ability    to    think
critically    and
did    not    source
reference
material
appropriately
Conclusion
/5
Reference    style
/5
Clear    styles    with
excellent    source    of
references.
Clear
referencing
style
Generally    good
referencing
style
Sometimes
clear
referencing
style
Lacks
consistency
with    many
errors

 
Leave a comment

Posted by on January 25, 2017 in academic writing, Academic Writing

 

Tags:

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: