Describe important networked application architectures

Assignment Help Computer Network Security
Reference no: EM131669099

Assignment: Network Presentations

Purpose

The purpose of this assignment is to develop skills in analysis of Networked Applications and analyse the application interface in considering user experience. After completion of this assignment, student will be able to achieve the following Unit Learning Outcomes:

a. Use various technologies and techniques for networked application management, deployment and performance tuning.
b. Describe important networked application architectures and technologies.
c. Describe security and other management issues for networked applications
d. Analyse performance and deployment related issues for networked applications
e. Employ industry relevant tools and techniques for managing networked applications

Word limit: 1200-2000 words.

Instructions:

Each group have to select two of the following topicsone from each tablegiven below (Table-1 and Table-2). Read three or more articles about each topic. These articles can be from the web, books or journals.

- Task 1

Write a report about one topic from the first table covering and detailing the areas to be explored.Make sure to identify features of each topic area in consideration with user centric design and user experiences. Write a section at the end of the report on future work that can be considered to improve on user interface.

- Task 2

Provide a PowerPoint presentation about a topic from the second table. The presentation should have at least 10 slides and students should talk for 8 -10 minutes. Both students should participate in the demonstration.

Further instructions:

- Do not copy and paste, all slides and the report materials have to be written in your own words.
- Do notuse Wikipedia as neither source nor reference.
- Read 2 or 3 articles from the web, books, journals, etc for each topic then rewrite it using your own words.
- Use IEEE style referencing, and be sure and properly reference any diagrams/ graphics.
- In all cases, concentrate on the aspects of the topic that concern NAM.
- Build on the topics that we discuss in lecture and labs in BN208.

Submissions:

Each group has to submit one-word document which includes task 1 and task 2.

At the end of task 1, copy the slides from task 2 and paste it into the same document then upload it to the Moodle.

Table -1 Choose any ONE Topic.

S.no

Topic

Areas to be explored for a topic

1

E-mail

  • A technical overview of the topic.
  • Background and related areas.
  • The significance of the topic to present and future networked applications in consideration with user experience.
  • Benefits, drawbacks, advantages, disadvantages, remaining problems and limitations.

 

 

2

Instant Messaging

3

Remote login such as Telnet and SSH

4

Multi-user networked games

5

Internet Phone

6

Real time videos conferencing

Table -2                Choose any ONE Topic.

S.no

Topic

Area to be explored

1

Virtualization with respect to VMware

Explore   Virtualization, VirtualMachines, and Architecture   of   Virtual   Machines   along   with protocols, techniques, and frameworks for Networked Application Management (NAM).

 

Virtualization with respect to Citrix

Explore   Virtualization, VirtualMachines, and Architecture   of   Virtual   Machines   along   with protocols, techniques, and frameworks for Networked Application Management (NAM).

2

Server Virtualization

Explore   Server   Virtualization   and   its   relevant middleware, and corresponding protocols for NAM. How does Server Virtualization benefit IT services over Non-Server-Virtualization?

3

Applications Virtualization

Explore applications Virtualization and its relevantmiddleware, and corresponding protocols for NAM. How does applications Virtualization benefit IT services over Non-applications -Virtualization?

4

Network Virtualization

Explore NetworkVirtualization, explain the concepts, how it works, corresponding protocols for NAM. How does network Virtualization benefit IT services over Non- Network -Virtualization?

Reference no: EM131669099

Questions Cloud

Think again about the workers opportunities : Think again about the workers opportunities. Does their betterment also mean what’s best for your business?
Research security best practices and provide a presentation : It was recently reported that security breaches are on the rise within your small- to medium-sized business network.
Firm on equity markets is measured by which financial? ratio : The attractiveness of a firm on equity markets is measured by which financial? ratio?
Fed into the growth of the american musical theatre : Discuss the various musical idioms (jazz, ragtime, and vaudeville, so forth) that fed into the growth of the American musical theatre.
Describe important networked application architectures : Describe important networked application architectures and technologies. Describe security and other management issues for networked applications.
Case study is hypothetical : Donna, first year university student obtained a job with a large garden nursery to tend plants and shrubs, place orders and serve customers.
Differences between database tables and database views : Discuss the similarities and the differences between database tables and database views.
Building electronic computers : Explain why binary circuits are preferred over other approaches when building electronic computers. (Hint: You can answer this in one word.)
Internal operations and external environment : How should a business store, access, and distribute data and information about its internal operations and external environment? Please add a reference!!!

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd