Compare and contrast different approaches to system analysis

Assignment Help Computer Network Security
Reference no: EM132308930

Cloud Based Smart Application Management

Purpose of the assessment

This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

c. Analyse and model system functionality and behaviour.
d. Compare and contrast different approaches to system analysis and design, such as object-oriented, agile, and service oriented techniques
e. Analyse and model the functional and non-functional requirements of a software system
f. Design and deploy functional solutions, such as initiating, analysing and implementing system plans

Assignment Specifications

The assignment helps students to develop fundamental knowledge on cloud computing along with different types of services provided.They get a deep understanding on different cloud service provides and their offers based on the services that are requested by an organization. Also this assignment helps students in better understanding the difference in working of the SOA and cloud based applications.

Smart Application Management

Requirements:

Consider any of the smart applications such as an Integrated cloud-based smart home management system, healthcare management applications etc. Write a report on the following:

• Write an introduction to the cloud computing environment with its advantages and disadvantages
• Identify one application and model the functional requirements including the system behavior
• The challenges faced in the development and deployment process of the cloud environment
• Provide insights about the performance management of cloud applications from the perspective of:
- Communication over the internet
- Providing private and public instances
- Application performance components

Analysis:

• Identify appropriate cloud service providers to build the application. Justify your opinion based on the comparison of the services provided by the two cloud providers. Which service provider performed better and why?

• Explain how this applications would be different in terms of the functional requirements if it was to be designed using a Service Oriented Architecture (SOA)

• Conclusion
• References

Reference no: EM132308930

Questions Cloud

Develop data models and map database system : Data model development and implementation - develop data models and map Database System into a standard development environment to gain understanding of data
Complete the information-level design for a database : MN405 - Data and Information Management - Data model development and implementation - Melbourne Institute of technology -
Discuss the importance of cloud computing : MN502 - Overview of Network Security - Security in Networked Systems - Discuss the importance of cloud computing in today's world. Explain four service models
Analyze different types of human behaviour in the workplace : Bachelor of Business : OGBH201: Organisational Behaviour-Kent Institute Australia :To develop and apply skills in critical thinking, complex problem solving.
Compare and contrast different approaches to system analysis : MN611 - System Architecture - Melbourne Institute of technology - Cloud Based Smart Application Management - Compare and contrast different approaches to system
Overall parameters of a networking related project : Analyse project issues, conduct post-project review (i.e., lessons learned) and make recommendations for improvements for future projects
Economic analysis and selection method of the design : Discuss the possibilities or all available options and substantiate why you chose the option that you have designed. All technical and economic details
Write a short reflection as part of the report : ITECH1103- Big Data and Analytics - Write a description of the dataset and project, and its importance for the organization. Discuss the main benefits of using
Describe the relationship between language and culture : BBUS1003-Business Communication-Australian Institute of Higher Education:Briefly describe the relationship between language and culture.Discuss the research.

Reviews

len2308930

5/20/2019 4:45:21 AM

Analysis Justification on the best cloud provider (reasons for preferences of one over the other) Functional requirements of the same application in SOA 15 15 Conclusion Provide a conclusion based on your findings 5 Reference style Follow “IEEE – Transactions on networking” reference style (should have both in-text citation and reference list) 5 Total 80

len2308930

5/20/2019 4:45:13 AM

For example, your system enhancements could include increasing the level of fault tolerance, decreasing the time to recovery, or adding features to increase scalability, security and QoS. Questions Description Marks Requirements Introduction to cloud computing Describe the application and its functional requirements including the quality of design and interface Challenges faced in the application development Performance Management 5 15 5 15

len2308930

5/20/2019 4:45:04 AM

Can you able to do this assignment as per required criteria that is mentioned in above attached file and what amount will you charged for this assignment. I need this assignment get done properly. Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Network Security Questions & Answers

  Explain one of the cryptography standards

Imagine that you are explaining encryption standards to a nontechnical audience. Use one of the following to help explain one of the cryptography standards: Flow chart

  Define copyright trade secrecy and patents as they related

Define copyright trade secrecy and patents as they related

  Describe details regarding the impact of the attack

describe details regarding the impact of the attack to include financial losses, number of individuals affected, and effect on the reputation of organization.

  What level of excess reserves does the bank now have

The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a $20,000 increase in reserves in return.

  Ethics associated with future global cyber security issues

Interconnectedness Cybersecurity Poses to Society and the Pursuit of Commerce - What three policy points should be included in a proposed model for a GLOBAL cybersecurity policy that will help mitigate the effects of cyber-warfare, cyber-crime, and..

  Determine the legal and ethical considerations

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  Case study - personal computer security threats

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack.

  Project management to suppress the dissemination

The general method is to encourage timely communication of news to project stakeholders. However, can you envisage conditions where it may be necessary,

  Draw a message sequence diagram

Cookie Stealing Attack - Advanced Network Security - COIT20262 - malicious student user must now perform a cookie stealing attack to masquerade as the normal

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company

  Differences between a network and a stand-alone environment

Describe at least 4 differences between a network and a stand-alone environment which make a network more vulnerable to security attacks

  Discuss privacy issues as they are related to computers

Discuss privacy issues as they are related to computers / networks / the Internet. What is privacy? Why is it important? Does the law afford any expectations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd