Computing network management

Assignment Help Computer Networking
Reference no: EM132721520

Computing Network Management

Please read the entire Coursework specification carefully before starting the Coursework. If any aspect of what you are being asked to do is not clear, seek advice and assistance from the Module Coordinator.

Coursework Description

In computing, a benchmark is the act of running a computer program, a set of programs, or other operations, in order to assess the relative performance of an object (PC, Server).

As organisations come to rely more on computerised processes for daily business functions, it's essential to know how well your devices and network are performing. For example, a simple network test or ping test can tell you what your upload and download speed is at a given moment. However, without a baseline or benchmark to compare it to, you won't know whether it's faster or slower than usual. In this respect, your benchmark is the ‘normal' standard against which other tests can be measured.

The aim of this coursework is to test the performance of a data collection tool(s) across a range of Linux distributions and hypervisors. Your task, as a network analyst, is to conduct a benchmarking exercise to compare the use of a data collection tool (of your choice) across two Linux distributions and two hypervisors (again of your choice). A few examples are provided below

You should design an experiment which allows you to conduct a fair comparison of each Linux distribution and hypervisor, and which is quantifiable, serving as a point of reference with which to compare the distributions/hypervisors.

You are free to choose which metrics you use to quantify performance, but as an example, your experiment could include metrics such as CPU utilisation and Memory (RAM) usage.

The deliverables for this coursework are described below:

Deliverable 1: Benchmark Report (in Microsoft Word) containing:
1. 1.1. Analysis of the project. This analysis should be based on:
o - a review of the literature relating to benchmarking of Linux distributions and Hypervisors;
o - a description of your experimental design and methodology;
o - a description of your implementation.
2. 1.2. Results and Analysis.
o - a presentation of your benchmark results;
o - analysis and discussion of the findings, including their significance in relation to previous research
3. 1.3. Recommendations.
o - reflect on work in 1.1 and 1.2;
o - provide recommendations of which combination of data collection tool, hypervisor and distribution you recommend.
Your report should be professionally structured, and written to a technical audience, including:
o Titlepage;
o Contents page;
o Executive Summary;
o Appropriateinformationfor1.1,1.2 and1.3above(2500wordsmax);
o Concluding remarks;
o A list of references.
Deliverable 2: Evidence log (in Excel) containing the detailed results of all experiments, including analysis of the data, and any tables/graphs generated.

Attachment:- Network management.rar

Reference no: EM132721520

Questions Cloud

Outcomes of the disease in patients : Based on your knowledge of this disease, what form of treatment was used to successfully avoid the worst outcomes of the disease in these patients?
Coexistence of different types of cancer : What are the requirements to state that the staging of tissue is type 3A? Is the coexistence of 4 different types of cancer in the same tissue enough to justify
What you have learned during the course : There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts.
Prepare the acquisition analysis in relation to acquisition : Hugh Ltd has an incremental borrowing rate of 10%. Prepare the acquisition analysis in relation to the above acquisition by Hugh Ltd
Computing network management : Benchmark is the act of running a computer program, a set of programs, or other operations, in order to assess the relative performance of an object
Discuss the structure of two different report styles : Present and discuss the structure of two different report styles. Give for each one the basic outline and the target reader groups. Support your discussion.
How would the bond issue reported in the fund financial : Temp County issued $3,00,000 in general, How would the bond issue reported in the fund financial statements and the government-wide financial statements?
Organize the transactions data in accounts : Issued 850 shares of $9 par common stock for $26 per share. Organize the transactions data in accounts under the accounting equation
Explain how management accountant can use big data : Explain how management accountant can use big data and data analytics in product related decisions. One of the applications of Management Accounting

Reviews

Write a Review

Computer Networking Questions & Answers

  Design a modern network for a private high school

You are required to design the network you would recommend and how it would be configured - Design a Modern Network for a Private High School.

  Explain the use of the technique to secure and manage wlan

Explain the use(evaluation)of the technique to secure and/or manage WLAN. oDiscuss dual bands and its advantages oSecurity implications

  Find the most challenging crimes

Find the most challenging crimes that could be based on P2P networks and write a report on how to do forensic investigations on these crimes.

  Discuss ways a business can balance competing drivers

List and describe at least 2 competing drivers and discuss ways a business can balance these 2 competing drivers. Please explain why you made your choices.

  Q1 explain clientserver architecture including fat and thin

q1. explain clientserver architecture including fat and thin clients middleware and clientserver tiers.q2. make use of

  Describe how vpn could increase the security of transmission

Scan the Web for various commercial encryption algorithms. Find one that you feel may be "snake oil." Write a brief paper explaining your opinion.

  What is the server port number for data download

Use Wireshark tool to capture packets when you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet.

  Ip address using vlsm subnet masking

Subnet the given IP address using VLSM subnet masking and draw a 4 column table showing the subnets, the host range for each subnet, the broadcast address for each subnet and, finally, the subnet mask in dotted decimal format. Assume that subnet z..

  Organization security plan

Identify threats and vulnerabilities.

  What is the cidr notation for the network id now

Starting with the network ID 192.16.20.0/24, what is the default Class C subnet mask for this network? Write this information both in decimal and in binary.

  What type of queue is implemented at the router

What type of queue is implemented at the router - What is the delay for each class of traffic? Justify by calculations.

  Diagram the interaction between the client and the server

Explain the process that occurs between a client and Web server by describing the functionality of the OSI reference model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd