Compare and contrast different approaches to system analysis

Assignment Help Computer Network Security
Reference no: EM132308930

Cloud Based Smart Application Management

Purpose of the assessment

This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

c. Analyse and model system functionality and behaviour.
d. Compare and contrast different approaches to system analysis and design, such as object-oriented, agile, and service oriented techniques
e. Analyse and model the functional and non-functional requirements of a software system
f. Design and deploy functional solutions, such as initiating, analysing and implementing system plans

Assignment Specifications

The assignment helps students to develop fundamental knowledge on cloud computing along with different types of services provided.They get a deep understanding on different cloud service provides and their offers based on the services that are requested by an organization. Also this assignment helps students in better understanding the difference in working of the SOA and cloud based applications.

Smart Application Management

Requirements:

Consider any of the smart applications such as an Integrated cloud-based smart home management system, healthcare management applications etc. Write a report on the following:

• Write an introduction to the cloud computing environment with its advantages and disadvantages
• Identify one application and model the functional requirements including the system behavior
• The challenges faced in the development and deployment process of the cloud environment
• Provide insights about the performance management of cloud applications from the perspective of:
- Communication over the internet
- Providing private and public instances
- Application performance components

Analysis:

• Identify appropriate cloud service providers to build the application. Justify your opinion based on the comparison of the services provided by the two cloud providers. Which service provider performed better and why?

• Explain how this applications would be different in terms of the functional requirements if it was to be designed using a Service Oriented Architecture (SOA)

• Conclusion
• References

Reference no: EM132308930

Questions Cloud

Develop data models and map database system : Data model development and implementation - develop data models and map Database System into a standard development environment to gain understanding of data
Complete the information-level design for a database : MN405 - Data and Information Management - Data model development and implementation - Melbourne Institute of technology -
Discuss the importance of cloud computing : MN502 - Overview of Network Security - Security in Networked Systems - Discuss the importance of cloud computing in today's world. Explain four service models
Analyze different types of human behaviour in the workplace : Bachelor of Business : OGBH201: Organisational Behaviour-Kent Institute Australia :To develop and apply skills in critical thinking, complex problem solving.
Compare and contrast different approaches to system analysis : MN611 - System Architecture - Melbourne Institute of technology - Cloud Based Smart Application Management - Compare and contrast different approaches to system
Overall parameters of a networking related project : Analyse project issues, conduct post-project review (i.e., lessons learned) and make recommendations for improvements for future projects
Economic analysis and selection method of the design : Discuss the possibilities or all available options and substantiate why you chose the option that you have designed. All technical and economic details
Write a short reflection as part of the report : ITECH1103- Big Data and Analytics - Write a description of the dataset and project, and its importance for the organization. Discuss the main benefits of using
Describe the relationship between language and culture : BBUS1003-Business Communication-Australian Institute of Higher Education:Briefly describe the relationship between language and culture.Discuss the research.

Reviews

len2308930

5/20/2019 4:45:21 AM

Analysis Justification on the best cloud provider (reasons for preferences of one over the other) Functional requirements of the same application in SOA 15 15 Conclusion Provide a conclusion based on your findings 5 Reference style Follow “IEEE – Transactions on networking” reference style (should have both in-text citation and reference list) 5 Total 80

len2308930

5/20/2019 4:45:13 AM

For example, your system enhancements could include increasing the level of fault tolerance, decreasing the time to recovery, or adding features to increase scalability, security and QoS. Questions Description Marks Requirements Introduction to cloud computing Describe the application and its functional requirements including the quality of design and interface Challenges faced in the application development Performance Management 5 15 5 15

len2308930

5/20/2019 4:45:04 AM

Can you able to do this assignment as per required criteria that is mentioned in above attached file and what amount will you charged for this assignment. I need this assignment get done properly. Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd