Conduct literature survey on topic self-healing iot sensors

Assignment Help Computer Networking
Reference no: EM131468191

Question: Objective: This segment of the project (i.e., Part A of ITSU3009) aims to provide the students an opportunity to carry out in-depth study on a specific emerging area in Networking. The students are expected to do this assignment individually and present their findings in the form of a brief review report.

On completing the assignment students get trained in keeping pace with recent advances through literature review and self development which is an essential skill for any practicing ICT professional since the ICT field evolves rapidly and every ICT professional is expected to pursue life-long learning and self updates.

Duration: The project should take typically 2-3 weeks of study. Students are provided extra time to submit to accommodate for any exigencies.

You should submit your report ON OR BEFORE 22nd Saturday April 2017 midnight (11:59 PM) via Moodle submission link of ITSU3009 Unit.

Project Scope: Select one out of topics listed in Appendix overleaf. Conduct a literature survey and summarise your findings. Write a short report based on the information you collected. The report should be about 1000 words except references, figure and table names and table of contents. A 10% variation in the number of words is permitted.

Your report should summarize your understanding of the chosen topic in your own words. You should not merely copy and paste from other sources. You are required to conduct a literature search over internet, books or journals or product vendor documents; most of which are available over internet in open source in abundance for the topics listed.

You should divide your report into appropriate sections such as Introduction, Body with appropriate sub sections, Conclusion and references. All material referred to prepare the report has to be placed in  reference at the end of the report.

If you are in doubt please contact the ITSU3009 Project 2 lecturers/advisors for clarification. However, the study has to be carried out by you based on your own reading and understanding and the unit advisors are permitted only to provide pointers and not actually teach you the technical content.

Contact session for this would be during the timetabled hours weekly.

LIST OF TOPICS

Each student should choose ANY ONE topic from the list below and carry out the assignment. You may be required to give two preferences to your unit lecturer out of which one may be assigned.

1. Choose one ‘Infrastructure as a Service (IaaS)' offering of your choice. (Popular examples are Amazon Web Services, Verizon InfraCloud, GoGrid and RackSpace.) For your choice of IaaS offering, research the literature and describe how to accomplish the following:

a. provision virtual servers,

b. set up a firewall

c. scale your infrastructure to meet increasing demand. Summarise and report your findings.

2. Conduct literature survey on topic 'Self-healing IOT sensors'. Carry out a research on the available literature and describe the following:

a. Characteristics of self-healing sensors

b. Metrics involved

c. Processing technology stack for these sensors

d. Eco-system and business values these sensors bring. Summarise and report your findings.

3. Based on a survey of literature and research study, describe and classify the various types of malware. Taking one example briefly highlight the security measures that a network administrator should take to prevent malware based threats.

4. Based on literature survey on the Software Defined Network, define how the OpenFlow communication interface deals with various network devices such as switches, routers, hypervisor and virtual images. Document your findings regarding the factors to be considered while designing OpenFlow protocol and OpenFlow Controller.

5. A cloud-computing service company effectively leases compute servers to multiple companies. Each such customer is sometimes referred to as a "tenant". Explain why it is important for the network traffic associated with different tenants to be isolated from one another. Describe the isolation techniques and research how this is done using a cloud service provider such as Amazon. Summarise your findings.

Reference no: EM131468191

Questions Cloud

What disparities do we know exist for this disease : What research questions have not been studied that may provide new, insightful information regarding this health problem
Targets environmental health practitioners : Does the American Public Health Association (APHA) have a membership section that targets environmental health practitioners?
Should henry accept the gift : Henry is in a position to influence the selection of suppliers for the large volume of equipment that his firm purchases each year.
Dynamic programming to find the replacement policy : Use dynamic programming to find the replacement policy that minimizes the cost of owning and operating the machinery for the next 6 years
Conduct literature survey on topic self-healing iot sensors : Objective: This segment of the project (i.e., Part A of ITSU3009) aims to provide the students an opportunity to carry out in-depth study on a specific emerging
Use quotations from a modest proposal : Which sentences correctly use quotations from "A Modest Proposal"?
Bike riding sweet sixteen : Mary is aware that Dina has recently exhibited sometimes violent and delusionary nature diagnosed as schizophrenia and has attacked persons in neighborhood
Transformational attribute of carly fiorina : Select one transformational attribute of Carly Fiorina that positively affected the leader's organization. How did your leader illustrate this attribute?
What defense or defenses can carl reasonably raise : What tort claim or claims can Ned reasonably bring against Carl, and what defense or defenses can Carl reasonably raise?

Reviews

Write a Review

Computer Networking Questions & Answers

  Calculate its nearest neighbor distance dmin

Calculate its nearest neighbor distance DMIN and farthest neighbor distance DMAX. Calculate ratio r = DMAX/DMIN. Repeat this 100 times for each d, and report he average r for each d in a table.

  How does content caching differ from content delivery

How does content caching differ from content delivery?- Why do you think some organizations were slow to adopt a building-block approach to network design?

  Decision tree

One major issue for any decision tree algorithm is how to choose an attribute based on which the data set can be categorized and a well-balanced tree can be created. The most traditional approach is called the ID3 algorithm proposed by Quinlan in 198..

  How rtsp vary from http in-band-out-of-band traffic

Describe how does RTSP vary from HTTP (a) in sustaining client state information; (b) in terms of in-band, out-of-band traffic?

  Describing the bigtable and dynamo network storage

You have been asked by your CIO to prepare a white paper of 3-4 pages APA formatted describing the BigTable and Dynamo network storage architectures

  Find total bandwidth if frequency division multiplexing used

Twenty-four voice signals are to be multiplexed and transmitted over twisted pair. Determine total bandwidth needed if frequency division multiplexing is used?

  What purpose does a firewall play in an organization

What are some things we need to evaluate when protecting our network? What purpose does a firewall play in an organization

  How wi fi differ from shared ethernet in terms of topology

How does Wi-Fi differ from shared Ethernet in terms of topology, media access control, and error control, Ethernet frame?

  Create a report exploring the stages involved in a specific

create a report exploring the stages involved in a specific attack of your choice against a computing system.select and

  Traditional internet applications

Traditional Internet Applications, What details does an application protocol specify, What are the two main email access protocols

  What extent should there be regulation of content on net

what extent should there be regulation of content on the Internet

  Write the assessment for riordan manufacturing

Write the assessment for Riordan Manufacturing using the service request SR-rm-011 Adding Wireless to the WAN found in the Virtual Organizations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd