Computer Networks & Operating Systems

Solution

Objective: Apply in-depth knowledge and demonstrate a critical understanding of the concepts and
principles of computer networks and operating systems, including security, and their
application in a range of current and emerging technologies. 

Overview: This is a very versatile assignment based on “Computer Organization and Operating Systems” and “Networking, Internet and Security”. For this assignment, students must produce a written document of size 5000 words and the proof of concept for the practical activities given for this assignment.      

 

  • List of the Practical Activities

Computer Organization
      1. JASP toolkit
      2. Digital Works
Operating Systems
     1. Linux Operating System - bobcat
     2. Virtual Machines
     3. Ubuntu Operating System
Networking
    1. Getting Familiar with Cisco Router
    2. Router Configuration Tutorial

Implementation Requirements:          

  • JASP Toolkit: For the implementation of the digital circuit.
  • Oracle Virtual Box: For installation of the Linux OS on the windows system using virtualization
  • Ubuntu Operating system: For Linux based implementation
  • Cisco packet tracer: For network topology testing

 

Sample Output:

Figure 1: Microprocessor implementation using JASP tool

 

 

 

COURSEWORK ASSESSMENT SPECIFICATION Module Title: Computer Networks & Operating Systems Module Number: KF7023 Module Team Kezhi Wang Bo Wei Name(s): Academic Year: 201 9-2020 % Weighting (to 100% overall module): Coursework Title: Individual Report Credits: 20 Module Information : http://nuweb.northumbria.ac.uk/live/webserv/mod.php?code=KF7 023&Submit=Go Dates and Mechanisms for Assessment Submission and Feedback Date of Hand -out to Students: Monday 21 October 201 9 Mechanism for Hand -out to Students: via Blackboard Date and Time of Submission by Student: by 16:00 Monday 06 January 20 20 Mechanism for Submission of Work by Student: via Turnitin only Date by which Work, Feedback and Marks will be returned to Students: in four working weeks Mechanism for return of assignment work, feedback and marks to students: via email or Blackboard . Learning Outcomes Addressed Knowledge & Understanding: 1. Apply in -depth knowledge and demonstrate critical understanding of the concepts and principles of computer networks and operating systems, including security, and their application in a range of current and emerging t echnologies . Intellectual / Professional skills & abilities: 2. Systematically identify and analyse complex computer networking and operating system problems and apply a range of relevant technologies in the design and specification of solutions . 3. Demonstrate awareness of the impact of operating systems and networks on professional practice and related legal, ethical, security and social issues . Personal Values Attributes (Global / Cultural awareness, Ethics, Curiosity): 4. Effectively communicate com puter networks and operating systems subject research and practical work through a portfolio assignment . Instructions The assessment consists of two entries : one is for “Computer Organ ization and Operating Systems”, and the other is for “ Networking, In ternet and Security ”. Each entry consists of three components: Evaluation Report , Pos ter and Practical work . You should attempt both entries . The assignment has to be submitted via T urnitin ONLY. Don’t email it to the module tutor or submit a hard copy in the office because they will be ignored . 1. Evaluation Report You are one of a team of newly graduated software engineers working on a project to build a distributed information system for a business of your own choice that would employ new and emerging technologies. It is preferable to choose a business of your own choice though you can choose a business from the examples given below as well ( in Appendix I) . In each entry, choose one topic from each of the two subjects (in Appendix II ). W rite an Evaluation Report for each entry. S pecifically: • one evaluation report for entry “Computer Organization and Operating Systems” , choosing one topic from “Computer Organization” and one top ic from “Operating Systems” • one evaluation report for entry “Networking, Inte rnet and Security” choosing one topic from “Networking” and one top ic from “Internet and Security” . The evaluation reports MUST be related to this particular chosen business. General discussions a bout the topics that ignore the scenario context will not be successful. Furthermore, it should be focused on the computing aspects of the information system rather than on the investigation of the business aspects of the chosen business. Any further inclu sion of the background and functional elaboration of the business case scenario should be kept to a minimum and only included to justify the relevant computing aspects being presented and discussed. Ensure your report contains clear and justified conclusio ns which highlight the importance of the recommendation being made for both current provision and future sustainability and operational relevance for the business. Each evaluation report will be normally 1,500 -1,700 words and should include at least FOUR peer reviewed references (journal papers) cited in your text. Questions of professional practice and relevant legal, ethical and social issues are expected to be reflected briefly but adequately in each of the evaluation reports. See Appendix V for guidan ce n otes . 2. Poster Make a Poster A3 paper format about each of the Evaluation Reports, i.e. one poster for “Computer Organization and Operating Systems” evaluation report and one poster “Networking , Internet and Security” e valuation report (Each poster will be normally 100 words). 3. Practical Work Produce a Practical Work for each of the subject areas “Computer Organization and Operating Systems” and “Net working, Internet and Security” ( Appendix II I). It should comprise the seminar work all relevant tasks with an appropriate reflection and possible emphasis on the critical analysis. Screen snapshots are expected to provide an evidence of the seminar work conducted in the class. It should not just have the advantages; the disadvantages are equally as good for the evaluation. For “Computer Organization and Operating Systems” practical work , students should select one topic from C omputer Organization and one topic from Operating System (Appendix II I). For “Networking, Internet and Security” practical work , students should select one topic from Networking and one topic from Internet & Security (Appendix II I). The practical work do not have to be related to the evaluation report. (Each p ractical work will be normally 600 -700 words). Overall the whole assessment is expected not amount to more than 5,0 00 words excluding references . Ent ry Structure The assessment is made up of two entries, each constituting 50 percentage of the whole assignment mark. Each entry should have the followi ng structure and include the following: 1. Evaluation report 1. Abstract: This will give an overview of the issues you are addressing and the ove rview of the evaluation report . ( ~ 200 words) 2. Background: Introduces the project and the topics used. This will give a background to the area as a mini literature review. Remember to reference sources rather than using literal quotes. ( ~ 650 words) 3. Advantages: A reasoned and referenced discussion of associated with the chosen topic. ( ~ 250 words) 4. Disadvantages: A re asoned and referenced discussion of associated with the chosen topic. (~ 250 words) 5. Legal and Ethical: Professional practice and relevant legal, ethical and social issues ( ~ 150 words) 6. Conclusions: This will give reasoned support for your recommendation ba sed on the relative importance of the advantages compared to the disadvantages. Furthermore it will discuss the likely importance of the topics in the computing industry over the next few years. ( ~ 200 words) 7. References: Each evaluation report should incl ude at least four peer reviewed refe rences. 2. Poster A3 paper format presenting the evaluation report findings. It is recommended to have a proper academic structure – Introduction (30%), Analysis (discussion etc. 50%) and Co nclusions (20%) . 3. Practical Work of selected relevant to the entry subje ct seminars’ practical work ( Appendix II I). It is recommended to have a proper academic structure – Introduction (30%), Analysis (discussion etc. 50%) and Co nclusions (20%) . Assessment Your assessment is an INDIVIDUAL piece of work. You should note that, according to the university assessment regulations: If any assessment component is not completed, students will be failed in the module even if the module pass mark has been achieved. Your work, for all parts of the assignment, must be your own and, where you have used words from someone else (quotations), they should be correctly quoted and referenced in accordance with the Harvard System. You should also bear in mind that in cases of collu sion both the originator of the work and the individual who copied it will be investigated and, if it is confirmed, both will be regarded as being guilty of academic misconduct. Cases of suspected academic misconduct (such as collusion or plagiarism) will be dealt with in accordance with the Assessment Regulations for Northumbria Awards (ARNA). Marking scheme The criteria and marks provided for eac h entry are as: Criteria Mark (%) Abstract (~ 200 words) 10 Evaluation Report Background (~ 650 words) : Literature survey, reference material quality and citation 10 Advantages (~ 250 words) 10 Disadvantages (~ 250 words) 10 Legal and Ethical (~ 150 words) 10 Conclusions(~ 200 words) 10 Practical Work (~ 700 words) 20 Poste r (~ 100 words) 20 Total Academic Depth and Relevance to the Learning Outcomes, Scenario Relevance (Appendix IV for General Criteria) 100% Appendix I Possible B usinesses Examples Example A A protected and consistent universal resource management E-based system for project manager and resources in an organization to manage resource bookings and to track organization res ources . The system customers may have three possible access types which include the internet, mobile phone and the central point. The system should be able to handle registration and two levels of access permissions: User login access level and admin level of access for management . It should also provide calenda r view for users and admin , and provide data visualiz ation on booking. A Guide to the Project Management Body of Knowledge, (2008). 4th Edition. Newtown Square, Pennsylvania: Project Management Institute (PMI). ISBN 978 -1-933890 -51 -7. Example B A web -based scalable and vigorous Citizen Advice Bureau (CAB) services infrastructure. It should offer a facility for users to get information about the service, to contact and get advice, their campaign , policy work and others : Beynon -Davies, Paul, (2013) Business information systems, eBook. English. Published Basingstoke: Pal grave Macmillan, Second edition Example C A confidential and ubiquitous system infrastructure for a distributed Customer Banking Service comprising a t least two of the four possible types of transaction: ATM (cash dispenser or cash machine), in the branch, mobile and on -line banking. The system has to be able to handle the customers’ banking transactions and additionally has to offer facilities for the customers to get information about the service, to contact an adviser to get assistance and so on. Appendix II : Subject/Topics for Evaluation Report Subject Ope r ating Sys te ms Or ganiz a tion Entry: Computer Organization and Operating Systems Topics Alternatives to Intel microprocessors for distributed information systems Hardware I/O and external storage, performance characteristics and application areas Processor for Internet Based Information Systems (e.g. architecture, characteristics, interesting design features, applications etc.) Harvard and von Neumann architectures OS alternatives to Microsoft for distributed information systems System software hierarchy OS issue s (e.g. scheduling, memory allocation, architecture) Android OS for Internet (e.g. services, functions, components, principles, processing environments etc.) Mobile computing device and their operating systems Cloud Computing at OS aspects (Types, Architecture, Services and Platforms) Android vs. iOS OS principles usability methodology framework and applications development feasibility Subject Networking Internet and Security Entry: Networking, Internet and Security Topics Data communications Network Architectures including OSI and Internet, Intranet and Extranets Wireless and Mobile Networks for Internet (e.g. Architecture, 802.11, OSI impact.) Major internet protocols and technologies (e.g. TCP/IP, FTP, SMTP, HTTP) iOS vs. Android at networking for mobile and ubiquitous computing Wireless and Mobile Networks for Internet (e.g. security, availability and reliability) Cloud Comput ing at Data Communications & Networking layers Encryption technologies for data storage and data transmission Internet Security in Many Layers Security Technologies (e.g. IPSec, security in IEEE 802.11, TLS, SSL etc.) System security and protection (Encryption, Firewalls, RAID) Architectures for Web and Quality Web Systems Semantic Web SOAP (Simple Object Access Protocol) and Web services Alternative web technologies (ASP, CGI, CSS, HTML, PHP, XML, XSL, WML, AJAX, etc.) Predicting and preventing intrusion over the network and Internet Android vs. iOS Internet and Security (to include Architecture reflections) Information Security and Secure Internet Infrastructure Cloud Computing at Services and Security Appendix III: Subject/Topics for Practical Work Computer Organization 1. JASP toolkit 2. Digital Works Operating Systems 1. Linux Operating System - bobcat 2. Virtual Machines 3. Ubuntu Operating System Networking 1. Getting Familiar with Cisco Router 2. Router Configuration Tutorial Internet & Security 1. Internet Tools & Protocols part I 2. Internet Tools & Protocols part II & part III 3. Security and GnuPG General guidance All items should comprise the work outlined in the seminar as much as possible with the appropriate depth and evidence of the work done. Screen snapshots are expected to provide an evidence of the seminar work. Appendix IV General Criteria General criteria that is applied as a percentage to each component of the assessment. Percentage General Criteria A very poor contribution showing little awareness of subject area. Lack of clarity. Communication of knowledge is either inarticulate and (0 – 29%) or irrelevant. Literal quotations may have replaced student written Fail content to the extent that it is not possible to determine what the student has understood. Knowledge is limited or superficial. Some awareness of concepts and (30 – 39%) critical appreciation are apparent, but there are major omissions or misunderstandings. Writing is not clear and there is no argument. Knowledge is barely adequate. Writing is fluent, but description and or (40 – 49%) assertion are mostly used rather than argument or logical reasoning. A basic understanding of the key issues is demonstrated, but insufficient focus is evident in the work presented. Knowledge base is up -to-date and relevant to an appropriate breadth and depth for level 7. The student has demonstrated the ability to apply (50 – 59%) theory and concepts, across domains and identify their interrelationship. A critical appreciation is demonstrated, which is supported by appropriate references. Writing is clear if a little uneven. Pass As above but there is clear evidence of independent thought and (60 – 69%) reasoned conclusions. Literature is fully supported by citation using appropriate references and there is development of a critical appreciation of opposing arguments. Presentation of work is fluent, focused and accurate. Exceptional scholarship is demonstrated. There is a sustained ability to confront the current limits of knowledge in a relevant area, (70 –100%) or applied „real world‟ contexts where demands of theory and practice may conflict. Argument is fluent, sustained, and convincing. Clearly exceeds taught material. Appendix V Guidance Notes Your evaluation reports should include: • A description of the specific problem you will be investigating; • A literature survey related to the problem area putting the current evaluation report into context; • Academic references and citations to the references in the text. These are considered essential • An identification and justification of the detail requirements of the evaluation report product; • A critical discussion of the possible approaches and technologies that could be used for the evaluation report work, leading to the selection and justification of the actual approach • A legal and ethical analysis of the problem scenario . Your analysis should include a discussion of the wider issues; critically examine the methods that might be used in solvin g the problem and any constraints . You are expected to support your argument by exploring academic literature, which is seminal and up to date. The literature survey will be a very important component of the analysis. In producing it you will have to research articles and books relating to your evaluation report. As you write the review you will be expected to reference the work of others in order to support the points you are making about your own work. The review should not be just a list of all the material you have read, nor simply quotes of other authors. You must write the review in your own words. Take care to ensure that the material presented relates to the subject of the evaluation report. Any discussion should be related to your specific pro blem. Plain “bookwork” descriptions will not attract good marks. Academic depth Academic depth might be achieved through a combination of the following work: A literature survey; Critical evaluation of a technique; Survey of an application area; Analysis and solution of a technical problem; Justification of the choice of a technology; A good foundation for an evaluation report is the building of a relationship between theory and practice. A common formula for an evaluation report involves a surve y of existing work and the established theory, a hypothesis and some work to test or prove the theory. Although your evaluation report may fall outside this well -trodden path, attainment of the highest assessment level will require you to survey existing w ork in the area of the evaluation report and to reflect on where your evaluation report fits in this framework. A note on plagiarism Ways of making references from sources. There are about 3 levels of using materials from source of reference: (1) Quotations – You are allowed to reproduce a small amount of text from the source. For example: “In effect, XML turns every web page into a programmable mini -database.” [Gates 1998] Quotation marks must be used, as the text is ‘wo rd for word’ the same as in the original source. In addition to quotation marks, the source of reference must be clearly indicated as in [Gates1998]. Obviously, only a very small amount of quotations are allowed in your report. (Say not more than a total o f 10 lines in a report of about 7 pages) A line or two of text copied from source, without quotation marks, will be considered as plagiarism. (2) Rewrite or paraphrase – You read the material from a source and have rewritten it in your own words after digesti ng / understanding it. In this case, you still have to indicate your source of reference, e.g. [Gates 1998] say at the end of a sentence or paragraph. Obviously, details of [Gates 1998] should be included in the list of references towards the end of your r eport. In practice, references should be indicated throughout your report, as your knowledge about the topic of your report are largely acquired from your collection of articles (source of reference). (3) Bibliography – to include possible sources of backgrou nd knowledge that you might have acquired some time ago that you could not precisely remember the source. A list of bibliography is to include previous readings that might have some background influence on your mind, but nothing specifically identified.