Explain ethical solutions toensure that the society benefits

Assignment Help Computer Networking
Reference no: EM131507029 , Length: word count:1000

Assessment Title - Essay and Power Point on Ethical issues

Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:

- Identify potential ethical and social issues related to IT administration ethics.

- Discuss ethical and social issues pertaining to ITsystems'-`administration.

- Interpret professional codes of ethics developed by various industry bodies.

- Discuss ethical behaviour in accordance with professional codes.

- Explain ethical solutions toensure that the society benefits.

Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.Assignment Description

A) Write an essay on one of the following topics. 800 - 1500 words 20 Marks
B) Prepare a PowerPoint presentation based on the above essay. 4 - 6 Slides

C) A five-minute presentation of the above in your Laboratory Class in Week 12. 10 Marks
For referencing, use APA or IEEE guidelines, but consistently.

Your topic is the one listed below based on the last digit of your student ID at MIT.

Topic

0) Being an ethical IT Professional

1) Being an ethical student of Networking Technology

2) The importance of Professional Ethics

3) How to conduct Ethical Research

4) Ethical issues related to the content available over the Internet

Literature review

Objective: The purpose of this lab assignment is to develop skills to communicate effectively and appropriately in a range of contexts to achieve high order writing skills.

Search related papers for the topic which you have chosen for presentation.
Literature review for a group should include
- 3 conference papers (Peer reviewed, published within last 5 years)

Write summaries of each paper.
Write the findings as references in IEEE reference style.

List of projects

1. Protocol based Solution for Sinkhole Attack
Security threats such as tunnelling attack, flooding attack, spoofing and wormhole attack. One such attack is the Sinkhole. This project focuses on building a protocol based solution for this attack.

2. Telephony over Wi-Fi
Voice over IP (VOIP) has been a growing technology in the modern world in internet infrastructure, which has been developed over the years due to, continues research that has been conducted. Development of such a system to the university is to improve student-teacher relationship making it more feasible.

3. Wireless Street Lighting Control and Monitoring System
Modern world is moving towards implementing traditional systems in Eco-friendly ways. Main principle is to create a system that can control and monitor the status of highway street lights within the given area and deliver the information to the user efficiently and effectively.

4. Wi-Fi Smart Robot
Robotics is one of the most trending topics at present which involves latest technologies. Ever since the invention of the robot there have been many introductions which lead to improvement of robotics. Video is used to operate the robot and it can be operated using a PC as well as the live video feedback can be viewed through a smart phone. Robot can reach unreachable places for humans.

5. Performance Evaluation of Localization Algorithms for Wireless Sensor Networks.
In this project the students would get a chance to evaluate the performance of the well established Localization Algorithms for Wireless Sensor Networks.

6. Comparative Analysis of Routing Algorithms.
This project is a research project in which, the students will get a chance to study the various routing algorithms (MANET or WSN). The outcome of the project should suggest which routing algorithm works best in which applications.

7. MIT Indoor Environment Monitoring System.
The students will get a chance to design and implement an Indoor Environment Monitoring System for Melbourne Institute of Technology. The project could be simulation or hardware based.

8. Reliable Transmission in Wireless Networks.
The students will get a chance to study a range of Wireless Communication protocols. Through simulation the students would get a chance to report various aspects of the protocols

9. Implementation of WiFi routers as a rescue network
Home Wi-Fi routers to form a backup mesh network to be used by emergency personnel in the case of a disaster or other incident that wipes out standard cell and phone systems. Initially, student should discuss the issues while implementing WiFi Routers as a rescue network. Finally, student needs to implement the network using WiFi router.

10. Implementation of software switch
Software implementation of software switches using suitable software. Student should demonstrated working software switch as a product.

11. DNS Privacy
Communication privacy is important, and is exemplified by the increasing use of transport layer security to support HTTPS and similar services. However, domain names are still typically transmitted in plaintext, e.g. when using DNS to resolve names to addresses. This project will implement in software mechanisms to hide domain names (through encryption and other mechanisms) and will assess the cost of such mechanisms.

12. Smartphone app for automated roll checking
Educators sometimes waste class time by checking a class roll manually. In this project you will develop a software app for smartphones that will allow educators to check the class roll automatically. The student smart phone should be within the room. We assumed that teacher and students have smart phones.

13. Security issues in 5G network
Description: Investigating the data security issues in the pervasive 5G network will provide insight into the burgeoning domain. In connection with cloud network and 5G network, reviewing the prominent approaches to safeguard the data will be of much interest in the investigation.

14. 5G Network Management
Description: Exploring the mechanisms to manage the 5G network with the Cloud network

15. Security issues in Internet of things
Description: Exploring the Cloud network assisted mechanism for secure inter device communications in IoT

16. Creating a SDN Network Testbed
In this project, a Software Defined Networking (SDN) testbed will be created using Zodiac FX Open Flow Switch. A Ryo/ODL controller will be used to control and manage the network.

17. Cloud network
Description: Cloud Network based infrastructure for internet of things network towards secure data and device managements.

18. Creating an IOT Application
In this project, an IOT application will be created using Texas Instrument ZigBee Toolkit with CC2530 radio standard.

Reference no: EM131507029

Questions Cloud

Which machine should the city purchase : A large city in the mid-West needs to acquire a street-cleaning machine to keep its roads looking nice year round. A used cleaning vehicle will cost $85,000.
How rsa asymmetric and aes symmetric encryptions work : Data encryption is one of the main techniques used in network security. With the aid of diagrams, show how RSA Asymmetric and AES Symmetric encryptions work.
Appropriate hardware and operating system : Name your business Decide what your email address will be Choose the most appropriate hardware and operating system
Find the breakeven percent reduction in labor hours : Refer to Problem. The best estimate for the reduction of labor hours for the new system is 17% (compared with the used system).
Explain ethical solutions toensure that the society benefits : Identify potential ethical and social issues related to IT administration ethics and Discuss ethical and social issues pertaining to ITsystems
Find sensitivity of annual profit changes in occupancny rate : A group of private investors borrowed $30 million to build 300 new luxury apartments near a large university. The money was borrowed at 6% annual interest.
Discuss and critically analyse the tribunal decision : HI6028 Taxation, Theory, Practice & Law T1, 2017 Assignment. Discuss and critically ANALYSE the court/tribunal decision
Explain social media tools that will provide highest return : Explain both the social media tools that will provide the highest return on investment, and two key performance indicator that one could use to measure success.
Explore the inside of the system unit : 1) Explore the inside of the system unit 2) Describe the various devices used to store data before and after

Reviews

len1507029

5/25/2017 3:24:17 AM

Aspects Essay PowerPoin t Presentatio n Comments Introduction /2 /2 /1 Identification /4 /4 /2 Analyse /4 /4 /2 Evaluate/justification /4 /4 /2 Conclusion /4 /4 /2 Reference style /2 /2 /1Total /20 /20 /10

len1507029

5/25/2017 3:23:59 AM

Aspects to be included in each answer Description of the section % Introduction Introduce the ethical issues 10 Identification Identify the most important ethical issues 20 Analyse Analyse above identified issues 20 Evaluate/justification Evaluate the issues and write justification of your evaluation 20 Conclusion Write clear conclusion 20 Reference style Follow APA or IEEE reference style 10 Total 100

len1507029

5/25/2017 3:23:48 AM

All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd