Project plan outlining key tasks and deliverables

Assignment Help Computer Network Security
Reference no: EM133994100

Research Methods and Project Management

It is emphasized that this unit requires a significant commitment outside of formal class contact. The learning tasks in this course may include classes (lectures, laboratories, tutorials, or seminars), required reading, the preparation of answers to set questions, exercises and problems, and self-study. In addition, students may be required to complete an assignment, test, or examination. The table below is an example of the suggested time allocations for this unit.

Brief Description
This is a core unit out of a total of 12 units in the Master of Networking (MNet) and Master of Networking Major in Cyber Security (MNet Major in CybSec). This unit addresses the MNet course learning outcomes and complements other courses in a related field by developing students' specialised knowledge in successfully completing a capstone project and applying critical skills in networking equipment such as routers, switches and servers.

This unit provides students with the experience of completing a research or industry-related capstone project in a team environment. Unlike lecture-oriented units, the capstone project is an opportunity to tackle complex problems using already acquired and developing technical and creative skills; this will often require the generation and evaluation of complex ideas at an abstract level before exploring concrete solutions. It is expected that the teams will normally continue the work from the project specification and project plan developed in MN690 as well as the application of knowledge and skills gathered throughout the course in designing, developing and testing a project solution. Students will meet with their project supervisor weekly. The teams will continue the detailed design, implementation, testing and evaluation of a substantial project. Students learn to work in a group while maintaining personal autonomy and accountability for their contributions to the team.

Learning outcomes

Demonstrate the ability to conceptualise, research, design, plan and execute a substantial capstone project

Adapt and apply the knowledge and skills acquired over the core units of the course in planning and executing a capstone project in an area related to Networking

Orally present the research background, design, implementation, results and conclusions to an audience of peers and academic staff

Through written reflective journals and project reports, demonstrate communication and technical research skills to justify and interpret problems, methodologies, conclusions and professional decisions

Demonstrate the application of knowledge and skills with a high level of personal autonomy and accountability while being part of a team-based working environment.

Assessment report: Project Detailed Design and Individual Report

ASSIGNMENT TASK
In this phase, your goal is to complete both Section 1 (Introduction) and Section 2 (Project Detailed Design) of your industry report. Ensure to attach the required documents for Appendix 1, Industry Client Information. Make sure to follow the provided final report template diligently, as it outlines the necessary structure for your report.

Introduction
Briefly describe your project, including its purpose, objectives, industry client information, and key challenges. If you completed the MN690 on a similar topic, summarise your previous work, highlighting research findings and design decisions. If you are starting with a new topic at this stage, provide background information on the project, including its scope, industry relevance, and initial requirements or constraints identified before implementation. Additionally, provide a concise outline of the report. No AI shortcuts - Just Genuine Assignment Help from Real Tutors.

Detailed Project Design
This section presents a detailed project plan outlining key tasks and deliverables to ensure effective implementation. A structured approach enhances coordination by covering critical aspects such as block diagram implementation, software and hardware requirements, team responsibilities, and weekly activities, as detailed below:

Implementation Overview
You are required to provide a high-level overview of the implementation process, outlining the chosen methodology, key project phases, and a block diagram illustrating the system architecture. This section should clearly explain how the project will be executed in alignment with the project proposal provided by the industry client.

Software and Hardware Requirements - This section outlines the essential tools and resources required for the project before detailing the execution plan. The requirements can be categorised into software and hardware specifications.

Weekly Activities and Team Responsibilities Plan- This section outlines the weekly activities timeline and team roles and responsibilities for MN692. It includes a detailed table mapping out weekly activities with a comprehensive timeline for task completion. Additionally, it defines the roles and responsibilities of each team member, ensuring clear articulation of contributions and expectations to promote effective coordination.

Reference and Presentation
Each student is required to provide at least three references from sources published within the past five years. Ensure that your report is meticulously structured, with proper formatting, accurate spelling and grammar, adherence to the IEEE reference style, and a well-designed cover page and table of contents. Before submission, thoroughly review your template and remove all provided instructional content, keeping only the section headings. This step is essential to prevent high similarity in your assessment.

Reference no: EM133994100

Questions Cloud

Describe stakeholder groups crucial to your mission : Describe stakeholder groups crucial to your mission and explain why their perspectives matter. What strategies will you use to ensure their voices are included?
Which types of records are likely to be most useful : Which types of records are likely to be most useful in revealing potential suppliers? Name two sources of information about potential suppliers.
Diagnosed with sexually transmitted infection : The nurse is caring for a female patient who is diagnosed with a sexually transmitted infection (STI).
What is the normal range for fetal heart rate : What are signs and symptoms of oncological emergencies? What are signs and symptoms of glomerulonephritis? What is the normal range for Fetal Heart Rate (FHR)?
Project plan outlining key tasks and deliverables : MN690 Research Methods and Project Management, Melbourne Institute of Technology - detailed project plan outlining key tasks and deliverables to ensure
Which study strategies discussed today do you plan to employ : Are there components to the study cycle that you had not thought of before? Which study strategies discussed today do you plan to employ? Why?
What inclusive leadership means in relation to diversity : Inclusive leadership in the classroom can present itself in many ways. Share what inclusive leadership means in relation to diversity, equity, and justice.
Promoting healthy behaviors : Promoting Healthy Behaviors this involves encouraging children and adolescents to adopt healthy habits such as regular physical activity
Specifically discriminating between red and green : He is unable to see the numbers on some of them, indicating that he has dyschromatopsia specifically discriminating between red and green.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd