Reference no: EM133801449
Emerging Network Technologies
Security Challenges in Fog Computing
Assessment Overview
Assessment 1: Technology blog Each student will be assigned a set of topics that cover facets of emerging networking technologies. They will create a short ‘news' item on the allocated topic aimed at evaluating the technology including a description, underpinning concepts, and potential use/impact/concerns, etc.
Assessment 2a: Report
Students will research an emerging network technology and create a report critically appraising that technology.
Assessment 2b: Presentation
The report generated in part A will be presented in a plenary session to the class.
Assessment 3: Research Report Student will prepare a report on a specific topic related to an emerging technology. Topics can be allocated or negotiated. Get It Done Today!
E.g., IoT. Example topics include but are not limited to:
IoT in the mining
IoT supporting aged care
IoT and the finance industry
Security in IoT
Assessment 4: Pecha Kucha (Individual)
Students will present their finding from assignment 3 in a Pecha Kucha
presentation.
* Assessment 3: Research Report
Detail
The aim of this assessment is to provide students with an opportunity to demonstrate their understanding of emerging technologies and their potential impact on industries, society, and the environment. Students will conduct research on a specific topic related to an emerging technology, critically evaluate the relevant literature, and produce a report.
Each student will prepare a research report on a specific topic related to an emerging technology. The topics will be allocated or negotiated with the instructor. Example topics include but are not limited to:
IoT in Smart Manufacturing (Industry 4.0)
IoT in Environmental Monitoring
IoT in Transportation and Logistics
IoT in agriculture
IoT in Smart Cities
IoT and Data Privacy Concerns
IoT in Energy Management
Fog Computing in Autonomous Vehicles
Fog Computing in Industrial IoT (IIoT)
Fog Computing in Smart Grid Management
Fog Computing in Retail
Security Challenges in Fog Computing
Fog Computing in Smart Agriculture
Fog Computing in healthcare
Fog Computing and Edge AI
The report should include an introduction, literature review, analysis and discussion, and conclusion.
* Assessment 4: Pecha Kucha
Detail
Students will create a Pecha Kucha presentation based on their research report from Assessment 3. The presentation should be structured to cover the main points of your research reports, highlighting the key findings and conclusions.
The Pecha Kucha presentation is a concise and dynamic presentation style, where students present their research findings in 20 slides, with each slide lasting 20 seconds. This format ensures that the presentation is fast-paced and engaging, keeping the audience interested and focused.
Instructions:
Each student will prepare a Pecha Kucha presentation on their research report topic.
The presentation should consist of 20 slides, with each slide lasting 20 seconds. The slides should be visually engaging and contain concise and impactful content.
The presentation should include an introduction, a brief overview of the research topic, and the key research findings and conclusions.
The presentation should be delivered in a clear and concise manner, with appropriate tone and pace.
Students are encouraged to rehearse their presentation several times to ensure a smooth delivery.
Note: Need only Assessment 3 and Assessment 4.