COURSEWORK ASSESSMENT SPECIFICATION
Module Title: Computer Networks & Operating Systems
Module Number: KF7023
Module Team Kezhi Wang
Bo Wei Name(s):
Academic Year: 201 9-2020
% Weighting (to
100% overall module):
Coursework Title: Individual Report
Module Information :
Dates and Mechanisms for Assessment Submission and Feedback
Date of Hand -out to Students: Monday 21 October 201 9
Mechanism for Hand -out to Students: via Blackboard
Date and Time of Submission by Student: by 16:00 Monday 06 January 20 20
Mechanism for Submission of Work by Student: via Turnitin only
Date by which Work, Feedback and Marks will be returned to Students: in four
Mechanism for return of assignment work, feedback and marks to students:
via email or Blackboard .
Learning Outcomes Addressed
Knowledge & Understanding:
1. Apply in -depth knowledge and demonstrate critical understanding of the concepts and
principles of computer networks and operating systems, including security, and their
application in a range of current and emerging t echnologies .
Intellectual / Professional skills & abilities: 2. Systematically identify and analyse complex computer networking and operating system
problems and apply a range of relevant technologies in the design and specification of
3. Demonstrate awareness of the impact of operating systems and networks on professional
practice and related legal, ethical, security and social issues .
Personal Values Attributes (Global / Cultural awareness, Ethics, Curiosity):
4. Effectively communicate com puter networks and operating systems subject research and
practical work through a portfolio assignment .
The assessment consists of two entries : one is for “Computer Organ ization and Operating Systems”, and
the other is for “ Networking, In ternet and Security ”. Each entry consists of three components:
Evaluation Report , Pos ter and Practical work . You should attempt both entries . The assignment has
to be submitted via T urnitin ONLY. Don’t email it to the module tutor or submit a hard copy in the office
because they will be ignored .
1. Evaluation Report
You are one of a team of newly graduated software engineers working on a project to build a distributed
information system for a business of your own choice that would employ new and emerging technologies.
It is preferable to choose a business of your own choice though you can choose a business from the
examples given below as well ( in Appendix I) .
In each entry, choose one topic from each of the two subjects (in Appendix II ). W rite an Evaluation
Report for each entry. S pecifically:
• one evaluation report for entry “Computer Organization and Operating Systems” , choosing
one topic from “Computer Organization” and one top ic from “Operating Systems”
• one evaluation report for entry “Networking, Inte rnet and Security” choosing one topic from
“Networking” and one top ic from “Internet and Security” .
The evaluation reports MUST be related to this particular chosen business. General discussions a bout the
topics that ignore the scenario context will not be successful. Furthermore, it should be focused on the
computing aspects of the information system rather than on the investigation of the business aspects of
the chosen business. Any further inclu sion of the background and functional elaboration of the business
case scenario should be kept to a minimum and only included to justify the relevant computing aspects
being presented and discussed. Ensure your report contains clear and justified conclusio ns which
highlight the importance of the recommendation being made for both current provision and future
sustainability and operational relevance for the business.
Each evaluation report will be normally 1,500 -1,700 words and should include at least FOUR peer
reviewed references (journal papers) cited in your text. Questions of professional practice and relevant
legal, ethical and social issues are expected to be reflected briefly but adequately in each of the evaluation
reports. See Appendix V for guidan ce n otes .
Make a Poster A3 paper format about each of the Evaluation Reports, i.e. one poster for “Computer
Organization and Operating Systems” evaluation report and one poster “Networking , Internet and
Security” e valuation report (Each poster will be normally 100 words).
3. Practical Work
Produce a Practical Work for each of the subject areas “Computer Organization and Operating
Systems” and “Net working, Internet and Security” ( Appendix II I). It should comprise the seminar
work all relevant tasks with an appropriate reflection and possible emphasis on the critical analysis.
Screen snapshots are expected to provide an evidence of the seminar work conducted in the class. It
should not just have the advantages; the disadvantages are equally as good for the evaluation.
For “Computer Organization and Operating Systems” practical work , students should select one
topic from C omputer Organization and one topic from Operating System (Appendix II I). For
“Networking, Internet and Security” practical work , students should select one topic from
Networking and one topic from Internet & Security (Appendix II I). The practical work do not have
to be related to the evaluation report. (Each p ractical work will be normally 600 -700 words).
Overall the whole assessment is expected not amount to more than 5,0 00 words excluding references .
Ent ry Structure
The assessment is made up of two entries, each constituting 50 percentage of the whole
assignment mark. Each entry should have the followi ng structure and include the following:
1. Evaluation report
1. Abstract: This will give an overview of the issues you are addressing and the ove rview
of the evaluation report . ( ~ 200 words)
2. Background: Introduces the project and the topics used. This will give a background to the
area as a mini literature review. Remember to reference sources rather than using literal
quotes. ( ~ 650 words)
3. Advantages: A reasoned and referenced discussion of associated with the chosen topic. ( ~
4. Disadvantages: A re asoned and referenced discussion of associated with the chosen topic.
(~ 250 words)
5. Legal and Ethical: Professional practice and relevant legal, ethical and social issues ( ~
6. Conclusions: This will give reasoned support for your recommendation ba sed on the relative
importance of the advantages compared to the disadvantages. Furthermore it will discuss the
likely importance of the topics in the computing industry over the next few years. ( ~ 200
7. References: Each evaluation report should incl ude at least four peer reviewed
2. Poster A3 paper format presenting the evaluation report findings. It is recommended to have a proper
academic structure – Introduction (30%), Analysis (discussion etc. 50%) and Co nclusions (20%) .
3. Practical Work of selected relevant to the entry subje ct seminars’ practical work ( Appendix II I). It
is recommended to have a proper academic structure – Introduction (30%), Analysis (discussion etc.
50%) and Co nclusions (20%) .
Your assessment is an INDIVIDUAL piece of work.
You should note that, according to the university assessment regulations:
If any assessment component is not completed, students will be failed in the module even if the
module pass mark has been achieved.
Your work, for all parts of the assignment, must be your own and, where you have used words from
someone else (quotations), they should be correctly quoted and referenced in accordance with the
Harvard System. You should also bear in mind that in cases of collu sion both the originator of the
work and the individual who copied it will be investigated and, if it is confirmed, both will be
regarded as being guilty of academic misconduct. Cases of suspected academic misconduct (such as
collusion or plagiarism) will be dealt with in accordance with the Assessment Regulations for
Northumbria Awards (ARNA).
The criteria and marks provided for eac h entry are as:
Criteria Mark (%)
Abstract (~ 200 words)
Evaluation Report Background (~ 650 words) :
Literature survey, reference material quality
Advantages (~ 250 words) 10
Disadvantages (~ 250 words) 10
Legal and Ethical (~ 150 words) 10
Conclusions(~ 200 words) 10
Practical Work (~ 700 words) 20
Poste r (~ 100 words) 20
Academic Depth and Relevance to the Learning Outcomes, Scenario
Relevance (Appendix IV for General Criteria)
Appendix I Possible B usinesses Examples
A protected and consistent universal resource management E-based system for project
manager and resources in an organization to manage resource bookings and to track
organization res ources . The system customers may have three possible access types which
include the internet, mobile phone and the central point. The system should be able to
handle registration and two levels of access permissions: User login access level and admin
level of access for management . It should also provide calenda r view for users and admin ,
and provide data visualiz ation on booking.
A Guide to the Project Management Body of Knowledge, (2008). 4th Edition. Newtown Square,
Pennsylvania: Project Management Institute (PMI). ISBN 978 -1-933890 -51 -7.
A web -based scalable and vigorous Citizen Advice Bureau (CAB) services infrastructure.
It should offer a facility for users to get information about the service, to contact and get
advice, their campaign , policy work and others :
Beynon -Davies, Paul, (2013) Business information systems, eBook. English. Published
Basingstoke: Pal grave Macmillan, Second edition
A confidential and ubiquitous system infrastructure for a distributed Customer Banking
Service comprising a t least two of the four possible types of transaction: ATM (cash
dispenser or cash machine), in the branch, mobile and on -line banking. The system has to
be able to handle the customers’ banking transactions and additionally has to offer facilities
for the customers to get information about the service, to contact an adviser to get assistance
and so on.
Appendix II : Subject/Topics for Evaluation Report
Ope r ating Sys te ms Or ganiz a tion
Entry: Computer Organization and Operating Systems
Alternatives to Intel microprocessors for distributed information systems
Hardware I/O and external storage, performance characteristics and
Processor for Internet Based Information Systems (e.g. architecture,
characteristics, interesting design features, applications etc.)
Harvard and von Neumann architectures
OS alternatives to Microsoft for distributed information systems
System software hierarchy
OS issue s (e.g. scheduling, memory allocation, architecture)
Android OS for Internet (e.g. services, functions, components,
principles, processing environments etc.)
Mobile computing device and their operating systems
Cloud Computing at OS aspects (Types, Architecture, Services and Platforms)
Android vs. iOS OS principles usability methodology framework and
applications development feasibility
Internet and Security
Entry: Networking, Internet and Security
Network Architectures including OSI and Internet, Intranet and Extranets
Wireless and Mobile Networks for Internet (e.g. Architecture, 802.11, OSI impact.)
Major internet protocols and technologies (e.g. TCP/IP, FTP, SMTP, HTTP)
iOS vs. Android at networking for mobile and ubiquitous computing
Wireless and Mobile Networks for Internet (e.g. security, availability and reliability)
Cloud Comput ing at Data Communications & Networking layers
Encryption technologies for data storage and data transmission
Internet Security in Many Layers Security Technologies (e.g. IPSec, security
in IEEE 802.11, TLS, SSL etc.)
System security and protection (Encryption, Firewalls, RAID)
Architectures for Web and Quality Web Systems
SOAP (Simple Object Access Protocol) and Web services
Alternative web technologies (ASP, CGI, CSS, HTML, PHP, XML, XSL,
WML, AJAX, etc.)
Predicting and preventing intrusion over the network and Internet
Android vs. iOS Internet and Security (to include Architecture reflections)
Information Security and Secure Internet Infrastructure
Cloud Computing at Services and Security
Appendix III: Subject/Topics for Practical Work
1. JASP toolkit
2. Digital Works
1. Linux Operating System - bobcat
2. Virtual Machines
3. Ubuntu Operating System
1. Getting Familiar with Cisco Router
2. Router Configuration Tutorial
Internet & Security
1. Internet Tools & Protocols part I
2. Internet Tools & Protocols part II & part III
3. Security and GnuPG
All items should comprise the work outlined in the seminar as much as possible with the appropriate
depth and evidence of the work done. Screen snapshots are expected to provide an evidence of the
Appendix IV General Criteria
General criteria that is applied as a percentage to each component of the assessment.
Percentage General Criteria
A very poor contribution showing little awareness of subject area.
Lack of clarity. Communication of knowledge is either inarticulate and
(0 – 29%) or irrelevant. Literal quotations may have replaced student written
content to the extent that it is not possible to determine what the
student has understood.
Knowledge is limited or superficial. Some awareness of concepts and
(30 – 39%) critical appreciation are apparent, but there are major omissions or
misunderstandings. Writing is not clear and there is no argument.
Knowledge is barely adequate. Writing is fluent, but description and or
(40 – 49%)
assertion are mostly used rather than argument or logical reasoning.
A basic understanding of the key issues is demonstrated, but
insufficient focus is evident in the work presented.
Knowledge base is up -to-date and relevant to an appropriate breadth and
depth for level 7. The student has demonstrated the ability to apply
(50 – 59%) theory and concepts, across domains and identify their
interrelationship. A critical appreciation is demonstrated, which is
supported by appropriate references. Writing is clear if a little uneven.
As above but there is clear evidence of independent thought and
(60 – 69%)
reasoned conclusions. Literature is fully supported by citation using
appropriate references and there is development of a critical
appreciation of opposing arguments. Presentation of work is fluent,
focused and accurate.
Exceptional scholarship is demonstrated. There is a sustained
ability to confront the current limits of knowledge in a relevant area,
(70 –100%) or applied „real world‟ contexts where demands of theory and
practice may conflict. Argument is fluent, sustained, and convincing.
Clearly exceeds taught material.
Appendix V Guidance Notes
Your evaluation reports should include:
• A description of the specific problem you will be investigating;
• A literature survey related to the problem area putting the current evaluation report
• Academic references and citations to the references in the text. These are
• An identification and justification of the detail requirements of the evaluation
• A critical discussion of the possible approaches and technologies that could be
used for the evaluation report work, leading to the selection and justification of
the actual approach
• A legal and ethical analysis of the problem scenario .
Your analysis should include a discussion of the wider issues; critically examine the methods that
might be used in solvin g the problem and any constraints . You are expected to support your
argument by exploring academic literature, which is seminal and up to date.
The literature survey will be a very important component of the analysis. In producing it you will
have to research articles and books relating to your evaluation report. As you write the review you
will be expected to reference the work of others in order to support the points you are making
about your own work. The review should not be just a list of all the material you have read, nor
simply quotes of other authors. You must write the review in your own words.
Take care to ensure that the material presented relates to the subject of the evaluation report.
Any discussion should be related to your specific pro blem. Plain “bookwork” descriptions will
not attract good marks.
Academic depth might be achieved through a combination of the following work:
A literature survey;
Critical evaluation of a technique;
Survey of an application area;
Analysis and solution of a technical problem;
Justification of the choice of a technology;
A good foundation for an evaluation report is the building of a relationship between theory and
practice. A common formula for an evaluation report involves a surve y of existing work and the
established theory, a hypothesis and some work to test or prove the theory. Although your
evaluation report may fall outside this well -trodden path, attainment of the highest assessment
level will require you to survey existing w ork in the area of the evaluation report and to reflect
on where your evaluation report fits in this framework.
A note on plagiarism
Ways of making references from sources.
There are about 3 levels of using materials from source of reference:
(1) Quotations – You are allowed to reproduce a small amount of text from the source. For
example: “In effect, XML turns every web page into a programmable mini -database.” [Gates 1998]
Quotation marks must be used, as the text is ‘wo rd for word’ the same as in the original source. In
addition to quotation marks, the source of reference must be clearly indicated as in [Gates1998].
Obviously, only a very small amount of quotations are allowed in your report. (Say not more than a
total o f 10 lines in a report of about 7 pages) A line or two of text copied from source, without
quotation marks, will be considered as plagiarism.
(2) Rewrite or paraphrase – You read the material from a source and have rewritten it in your
own words after digesti ng / understanding it. In this case, you still have to indicate your source of
reference, e.g. [Gates 1998] say at the end of a sentence or paragraph. Obviously, details of [Gates
1998] should be included in the list of references towards the end of your r eport. In practice,
references should be indicated throughout your report, as your knowledge about the topic of your
report are largely acquired from your collection of articles (source of reference).
(3) Bibliography – to include possible sources of backgrou nd knowledge that you might have
acquired some time ago that you could not precisely remember the source. A list of bibliography
is to include previous readings that might have some background influence on your mind, but
nothing specifically identified.