Write a research report on network technology

Assignment Help Computer Networking
Reference no: EM13960660

Option 1 - Research Report

You are required to write a research report on a chosen Network Technology/ Protocol/Topic (not already covered on the course) from the following list:

Intelligent Transport systems (ITS)

802.16 (WiMax) VOIP

Mobile Ad Hoc Networks (MANET) Network Security

Security Management Network Management Vehicle Networks

Vehicle Ad hoc Networks (VANET)

The main objective of the research report is for you to demonstrate that you can take your existing knowledge of networks and use this to understand, and critically review, an area of networks you are not familiar with. In the rapidly changing field of Networks this is an important skill for anyone working in the networks industry.

The report should be between 3000 - 5000 words (exceeding the limit will affect the mark). Note that you must research the area, distil any information, which you gather and then present this in your own words, although it is acceptable to copy diagrams from sources, provided these are referenced. The report should be structured so that the technical description, critical review and related aspects are clearly visible as major sections of the report, as these are the basis of the marking scheme.

Make sure you are familiar with the University's policies on plagiarism and late submission. The report must be submitted through Turnitin on BlackBoard. Turnitin will automatically produce a report detailing any (every) similarities found with other work. A hard copy must also be submitted through Student Support Centre (GH0.4a), as normal. It is expected that normal conventions are used to produce the report, including referencing other work correctly.

A random sample of students may be asked to attend a viva. At the viva you will be questioned on what you have written in the report and therefore it is important that you only include concepts and information which you understand.

You are expected to structure your report with Technical Description, Critical Review, Related Aspects as major subsection headings. This helps you focus on the marking scheme. Failure to address these will mean you do not get marks for this section. The Technical Description must provide sufficient details that explain how the chosen technology works, not just about how it is used - how it is used could be part of the Related Aspects section.

Option 2 - Network Programming

Specification

You are required to develop a File Transfer network application (similar to, but not as comprehensive as, ftp) using sockets. Ideally the application should support simultaneous uploads/downloads of files from multiple remote clients to a server. You must provide a client and server.

The deliverables are:

1. Definition of a set of requirements/functionality for the application. You are encouraged to carry out a short evaluation of similar applications and use this evaluation to decide on the requirements.

2. Implementation of the requirements and thus the working application.

3. Testing documentation for one non trivial requirement given in 1 above - I am looking for evidence that you know how to properly test the application, not a comprehension test specification.

4. Evaluation of the work. This should be a short (1-2 pages) critical review of your achievements - covering things like the problems which you encountered (and your solutions), aspects of the application which work well, suggestions about future enhancements, etc. - essentially the strengths and weaknesses of your application.

5. A demonstration of the working application. You will be asked questions about the implementation at the demo.

Reference no: EM13960660

Questions Cloud

Airport biometrics in case of facial recognition and fingerp : A c report about airport biometrics in case of facial recognition and fingerprints comparing the cost and the effectiveness of both technologies and giving a recommendation which is better
Rganizations involved in providing global security services. : Do you the think the organization's leadership is effective? Explain your response.
What amount should it report as the cumulative : What amount should it report as the cumulative effect of changing the estimated bad debt rate?
Determine the carbon concentration ratio : Determine the carbon concentration ratio, CC (x. t)/Cc,s, at a depth of 10 mm after 1 hour of carburization.
Write a research report on network technology : Write a research report on a chosen Network Technology/ Protocol/Topic - Implementation of the requirements and thus the working application and demonstration of the working application.
Determine the kinetic energy of the system before bob jumps : Determine the Kinetic energy of the system before Bob jumps on (KEo), after Bob jumps on(KE'), and after Bob moves the mass in part c (KE'').
How would you describe the culture of organization : Why does it function so well to illustrate the culture of the company?
Use the correspondence between heat and mass : From the analogy, show that the time dependence of the mass flux of carbon into the plate may be expressed as n''C = pC,s (DC  Fe/t)1/2. Also, obtain an expression for the mass of carbon per unit area entering the iron plate over the time period t.
Explain the concept of artificial intelligence : Remember, all quotations, paraphrased material, images, graphics and statistics must be referenced in your report, so make note of all sources while compiling your research!Attachments

Reviews

Write a Review

Computer Networking Questions & Answers

  Centralize and reduce the servers in the it wing of the

1. what are the business goals?2. what are the business constraints?3. what are the technical goals?4. what are the

  Assignment on mister network engineer

Use IP addresses to describe your configuration. Explain the impact that each of your configurations has on the security of the entire network.

  For aes with a 128 bit block length and a 128-bit key length

For AES with a 128 bit block length and a 128-bit key length, what is the output of the first round of AES if the plaintext consists of 128 1's and the first subkey also consists of 128 ones?

  Evaluate the technology and connectivity

You are to write a memo covering 15 points on which you will evaluate the technology, connectivity, and functioning of the company's computer networks

  Identity intended recipient of data-statistical multiplexor

When data is transmitted using a statistical multiplexor, the individual units of data must have some form of address that tells the receiver the identity of the intended recipient of each piece of data.

  What is the purpose of the address resolution protocol

What is the purpose of the address resolution protocol (ARP). What is the purpose of the dynamic host control protocol (DHCP)

  Should you develop a standard package solution for customers

Should you develop a standard package solution for each of your customers? What advantages accrue from a standard solution? What are the disadvantages?

  Assume that you are an administrator for a growing company

imagine you are an administrator for a growing company. your company decides to purchase another company that designs

  What will be difference between the tcp segments which the

a client pc has two simultaneous connections to the same webserver application program on a webserver. yes. this is

  Exercise 1 read the following papers and provide a 2 to 3

exercise 1 read the following papers and provide a 2 to 3 paragraph summary of main pointsa read and summarize big

  Define communications including connectivity

Define communications, including connectivity, the wireless revolution, and communication systems. Discuss communication channels, including physical connections and wireless connections.

  Prevent from the loss of confidentiality caused by malware?

1. Cybercirminals can use malware to steal files and information from computer, if this happens have loss of confidentiality. Explain how antivirus can be help to prevent from the loss of confidentiality caused by malware?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd