Assignment title: Information


MN504 - Networked Applications T1-2016 Assignment Two: Individual Assignment Two Submission Due: Week 11 and Presentation in Week 12 Total Marks : • 15 marks for Report (15%) • 5 marks for Presentation (5%) • 5 marks for PBL (5%) Purpose of the assessment: The purpose of this assignment is to develop skills in critical thinking, reasoning, problem solving in regards to Networked Applications Management (NAM). This assignment will provide scope to explore and learn working mechanisms of cutting-edge tools and technologies with regard to NAM. Student will develop skills of critically understanding problems, conceptualising possible solutions to the problems, and exploring possible NAM related tools to justify the strength of their claimed solutions. The assignment will also require analysing capability to relate networked application protocols with the underlying networked infrastructure with a view to managing networked applications. This assignment provides students with opportunity to demonstrate problem solving capability in the domain of cutting edge distributed systems. Submission guidelines: 1. A submitted work must include the following: • A cover page, identifying student (name and number), teaching staff, and assignment. • The assignment must use 12 point font size minimum and at least single line spacing with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list (IEEE). • It should follow standard academic reporting guidelines. • The written report should be between 6-8 pages in length, • The page numbers of the assignment must include in each page. • Resulting works need to be presented to a wide group of invited guests (students and teachers) 2. The assignment must be submitted in soft (electronic) copy under Moodle which will be check by turnitin. Assignment will be marked on Moodle. Students must submit on Moodle within the deadline. 3. A student will select a topic to explore its designated areas as presented in the following table; students are advised to explore the topic area(s) by reviewing the literature; students participating in the PBL are taught how to do the critical thinking for review literature; and literature is available in the internet as papers, book chapters, and independent scholarly reports by experts, and research based videos. Areas are organised in line with the lecture, for example, Topic 1 from Wk2/Sld4, 17, 18 means that the idea of the topic and its associated areas are from the Lecture 2 or Week2, and the slides of the week are 4, 17, and 18. If a group of two students can collaborate on the areas of a topic, there must have clear descriptions of individual contribution and collaborative contribution. SL Topic Area to be explored In line with the lecture slides (Wk#/Sld#) 1 Elastic Caching over Typical Web Caching And Web Proxy Caching Explore by reviewing Typical Web Caching Techniques and Technologies and their strength and weakness? Find a problem case study in the topic, and apply your critical thinking on the Architecture Style, Protocols, and underlying infrastructure and configuration for Networked Application Management (NAM) in regards to Elastic Caching over Typical Web Caching And Web Proxy Caching? Comparative tabular representation of Elastic Caching over Typical Web Caching and Web Proxy Caching. Wk2/Sld4,17,18 Wk7/Sld15 Wk11/Sld30-32 2 Skype, GoogelTalk, Yahoo Messenger, TeamViewer, Vibre, and WhastApp Explore by reviewing the Techniques and Technologies behind the networked applications for instant text, voice and video message over internet? Find a problem case study in the topic, and apply your critical thinking on the Architecture Style, Protocols, and underlying infrastructure requirement and configuration to support and manage Skype, GoogelTalk, Yahoo Messenger, TeamViewer? Comparative tabular representation of Skype, GoogelTalk, Yahoo Messenger, TeamViewer. Wk2/Sld19,21, 22 3 SOA Explore by reviewing and comparing Service Oriented Architecture (SOA) based networked applications, protocols, techniques, management frameworks towards meeting real-world continuously rising business needs. Find a problem case study in the topic, and apply your critical thinking to solve the problem with your deep learning on the above areas. Wk2/Sld36-40 4 Virtualization With respect to Citrix Explore by reviewing Virtualisation, Virtual Machines, and Architecture of Virtual Machines along with protocols, techniques, and frameworks for networked applications management. Find a problem case study in the topic, and apply your critical thinking to solve the problem with your deep learning on the above areas. Wk3/Sld17-24 5 Remote Desktop Access Explore by reviewing the underlying mechanism, middleware, protocols, and flow chart based software interaction processes for accessing remote desktop and resources in a networked computer; Find a problem case study in the topic along the area of trouble shooting a remote computer or remote-tutor-assisted teaching-learning, and apply your critical thinking to solve the problem with your deep learning on the above areas. Wk4/Sld9-26 Wk10/Sld38 6 Streaming live and interactive Audio and Video Explore by reviewing the underlying mechanism, middleware, protocols of streaming live Audio and Video in distributed Cloud Environment. One example of such networked application management tool for live audio and video is CloudFront; critically list the others tools, techniques, protocols with comparative discussions for solving diverse requirements. What are the Metrics that are related to performance of audio and video transfer and sharing? Find a problem case study in the topic, and apply your critical thinking to solve the problem with your deep learning on the above areas. Wk4/Sld36-47 Wk9/Sld33 Wk10/Sld6, 23, 24 7 File Sharing Explore by reviewing the algorithms and protocols for networked applications management for file and content sharing over internet? How are the issues like Replication, Concurrency, and Synchronization managed in File sharing over DropBox, GoogleDrive, One Drive, Simple Storage Service (S3)? Find a problem case study in the topic, and apply your critical thinking to solve the problem with your deep learning on the above areas. Wk5/Sld4-34 Wk6/Sld12-19, 36-43, wk7/Sld37 Wk11/Sld26-29 8 Network File System, Hadoop File System Explore by reviewing the underlying architecture style, protocol, and networked application management for handling large scale data processing? Find a problem case study in the topic, and apply your critical thinking to solve the problem with your deep learning on the above areas. Wk11/Sld18-26 9 Elastic Beanstalk (EB) For Networked Application Management and Deployment Explore by reviewing the Rapid Network Application Management with EB. What are the protocols and underlying mechanisms of Elastic Beanstalk? What are other Networked Application Management And Deployment Systems? How do the underlying architecture, infrastructure, and protocols function for Elastic Beanstalk and other systems? Find a problem case study in the topic, and apply your critical thinking to solve the problem with your deep learning on the above areas. Not clearly found in Lecture Slides (LS) since LS are based on Old version of the Book used. 10 Elastic Compute Cloud for Web Servers supported with Elastic Load Balancing Explore by reviewing the software and/or Middleware interaction, protocols, and algorithms for rapid server provisioning and deployment? Find a problem case study in the topic along the line of how multiple web servers are integrated or consolidated to meet diverse network traffics from Networked Applications, and apply your critical thinking to solve the problem with your deep learning on the above areas. Wk4/Sld4-9 Wk7/Sld5, 6, 16-28, Wk10/Sld26, Wk11/Sld2,19 11 Large Scale Data with Hadoop, Elastic Block Storage, and Simple Storage Service Explore by reviewing the algorithms and protocols for networked applications management for large scale data with Hadoop, Elastic Block Storage, and Simple Storage Service? What are the architectural and functional characteristics of Elastic Block Storage and Simple Storage Service in Networked Application Management? Find a problem case study in the topic, and apply your critical thinking to solve the problem with your deep learning on the above areas. Wk10/Sld 25 12 UTorrrent (Peer to Peer Networked Application Computing) Explore by reviewing the algorithms and protocols behind the Utorrent Content Sharing. What are the underlying Architecture Style on which the uTorrent Networked Application is managed? Find a problem case study in the topic, and apply your critical thinking to solve the problem with your deep learning on the above areas. Wk11/Sld34 Extensions : Requests for an extension, accompanied by supporting documentation, must be received by the student in writing before 3 working days from the due date else penalties may apply for late submission without an approved extension. Special consideration form is available on level 6 reception. Penalties : Academic misconduct such as cheating and plagiarism may incur penalties ranging from a reduced result to program exclusion. Marking guidelines and Recommendations It is recommended to • prepare and present your findings in IEEE-formatted structure. • present the hyperlinks to the source materials for each section of your works. • participate in the class to learn how to do the above tasks (i and ii). Item Marks Writing with quality (proofreading your work is highlighly recommended) 1 An Open-ended approach to investigating/exploring relevant aspects of the Topic, its questions and issues highlighted in the above table. 5 Finding a case study problem in the areas of your topic 2 Justify how your investigation contributes to the problem by analyzing and comparing an existing investigation by others. 3 Showing and reflecting your deep and critical thinking throughout your entire scholarly represented written and demonstrated works (a smooth flow of ideas in the sections and subsection is highly recommended). 3 Referencing the contemporary works 1 Presentation (2.5) in week 11/12 and PBL(5) throughout the semester and class participation (2.5). 10 Total 25 Submission guidelines: 4. Your report should include the following: • A cover page, identifying student (name and number), teaching staff, and assignment. • The assignment must use 12 point font size minimum and at least single line spacing with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list(Follow IEEE). • It should follow standard of academic report guidelines. • The written report should between 6-8 pages in length, with each student contributing at least five pages regarding their role and findings. 5. Assignment will be marked on Moodle. Students must submit on Moodle within the deadline. Assignment Overview and General instruction of Assignment: You lecturer will allocate a protocol to you from Table 1 on random selection basis. Download the wireshark trace file from given Hyperlink for the allocated protocol and use Wireshark to analyse the trace for QoS and overall performance. Prepare a report which should address the following: • How the protocol works, including its strengths and weaknesses. • Analysis of the traffic in the trace, using the appropriate features in Wireshark to identify level of QoS and overall performance of the protocol in given traces. • The student need to also pair with one of their friend who is working on a protocol from same group and compare between each other's trace to identify best and worst performance in terms of QoS and overall performance. Table 1: Protocol details and tracefile download link Group Protocol name Trace name Hyperlink to download Details I - Peer-to-peer IRC SkypeIRC.cap http://wiki.wireshark.org/SampleCaptures#General_.2F_Unsorted Some Skype, IRC and DNS traffic BitTorrent BitTorrent.Transfer1.cap http://wiki.wireshark.org/SampleCaptures#Peer-to-peer_protocols Here's a capture with a few BitTorrent packets; it contains some small packets I got whilst downloading something on BitTorrent. BitTorrent BITTORRENT.pcap http://wiki.wireshark.org/SampleCaptures#Peer-to-peer_protocols Capture file of two torrent clients communicating without DHT or peer exch. II - NFS Lightweight Directory Access Protocol (LDAP) ldap-controls-dirsync-01.cap http://wiki.wireshark.org/SampleCaptures#Lightweight_Directory_Access_Protocol_.28LDAP.29 Sample LDAP PDU with DIRSYNC CONTROLS NFS Protocol Family nfs_bad_stalls.cap http://wiki.wireshark.org/SampleCaptures#NFS_Protocol_Family An NFS capture containing long stalls (about 38ms) in the middle of the responses to many read requests. This is useful for seeing the staircase effect in TCP Time Sequence Analysis. Lightweight Directory Access Protocol (LDAP) ldap-krb5-sign-seal-01.cap https://wiki.wireshark.org/SampleCaptures#Lightweight_Directory_Access_Protocol_.28LDAP.29 Sample GSSAPI-KRB5 signed and sealed LDAP PDU Table 1, Continued… Group Protocol name Trace name Hyperlink to download Details III. Streaming protocols Stream Control Transmission Protocol (SCTP) sctp-www.cap https://wiki.wireshark.org/SampleCaptures#Stream_Control_Transmission_Protocol_.28SCTP.29 Chunks that carry HTTP messages between Apache2 HTTP Server and Mozilla. Stream Control Transmission Protocol (SCTP) sctp-addip.cap https://wiki.wireshark.org/SampleCaptures?action=fullsearch&context=180&value=cloud&titlesearch=Titles#Stream_Control_Transmission_Protocol_.28SCTP.29 Sample SCTP ASCONF/ASCONF-ACK Chunks that perform Vertical Handover. IV. SIP and RTP SIP and RTP SIP_CALL_RTP_G711.pcap https://wiki.wireshark.org/SampleCaptures#SIP_and_RTP Sample SIP call with RTP in G711 SIP and RTP MagicJack+ short test call.pcap https://wiki.wireshark.org/SampleCaptures#SIP_and_RTP A complete telephone call example V. Networking protocols BGP bmp.pcap https://wiki.wireshark.org/SampleCaptures#Routing_Protocols BGP Monitoring Protocol, including Init, Peer Up, Route Monitoring Network News Transfer Protocol (NNTP) nntp.pcap https://wiki.wireshark.org/SampleCaptures#Network_News_Transfer_Protocol_.28NNTP.29 A capture of the NNTP protocol (a KNode client retrieving few messages from two groups on a Leafnode server). Network Time Protocol MicrosoftNTP.cap https://wiki.wireshark.org/SampleCaptures?action=fullsearch&context=180&value=cloud&titlesearch=Titles#Network_Time_Protocol (Microsoft Network Monitor) 2 Packets containing a synchronisation to the Microsoft NTP server. Marking criteria: Marks are allocated as follows: Section to be included in the report Description of the section Introduction A technical overview of the project Analyse the protocol in terms of QoS and overall network performance The significance of the project to given performance parameters. Appropriateness of finding Relate MN504 content and compare appropriate distributive system parameters. Comparison The student need to also pair with one of their friend who is working on a protocol from same group and compare to identify best and worst performance in terms of QoS and overall performance. Conclusion Draw conclusion of the report Reference style IEEE style Poor writing Inadequate structure, careless presentation, or the report exceeds the word limit by more or less than 10% Plagiarism Type of plagiarism - Copy from other student - Copy from internet source/textbook without acknowledgement. - Copy from other sources without acknowledgement. Demonstration only. Each student needs to be able to demonstrate the successful completion of their designated role and a set of tasks allocated to them. Extensions: Requests for an extension, accompanied by supporting documentation, must be received by the student in writing before 3 working days from the due date else penalties may apply for late submission without an approved extension. Special consideration form is available on Level 7 Reception. Penalties: Academic misconduct such as cheating and plagiarism may incur penalties ranging from a reduced result to program exclusion. Marking Rubric for Assignment: Total Marks20 Student Name: Student Id: Submission Due: …./…../2014 Date Submitted:.…/…/ 2014 Marker's Name: Mark Achieved: /20 Grade Mark HD 80-100% DI 70-79% CR 60-69% P 50-59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory Introduction /1 Followed formal report standard perfectly and introduced the project clearly. Followed formal report standard and introduced the project Somehow followed standard and relate to the project. Some relevance. This is not relevant to the assignment project. Analyse the project. /5 Analyse is highly appropriate and highly justified in terms of given performance parameters. Analyse is appropriate and justified in terms of given performance parameters. Analyse is appropriate and partially justified in terms of given performance parameters. Analyse is appropriate and not justified in terms of given performance parameters. Analyse is not appropriate and not justified in terms of given performance parameters. Appropriateness of finding /6 Analysed and linked very well and integrated in the basis of given distributed system parameters. Analysed and linked well and integrated in the basis of given distributed system parameters. Analysed and linked and integrated in the basis of given distributed system parameters. Analysed and partially linked and integrated in the basis of given distributed system parameters. Not linked and not integrated in the basis of given distributed system parameters. Conclusion /2 Summarized well. Summarized Summarized but did not cover entire report. Some effort of summarization Not summarized Reference style /1 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Comparison /5 Successful comparison and well understanding of the outcome. Successful comparison and understanding of the outcome. Partially compared and partially understanding of the outcome. Partially compared and did not understanding of the outcome. did not compare. Poor writing Inadequate structure, careless presentation, or the report exceeds the word limit by more or less than 10% -2 Plagiarism Type of plagiarism - Copy from other student - Copy from internet source/textbook - Copy from other sources -20