logo Use CA10RAM to get 10%* Discount.
Order Nowlogo
(5/5)

Identify the key features, requirements and constraints of your target aspect/focus and preferred use case

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

2122 - Project 1 A

Each student will focus on incrementally designing and building their own concept for a decentralised, distributed data fabric provider for intermittent communication, that will be used to link together fragmented silos of data/communication requirements. Examples of such scenarios include intermittently connected Internet of Things devices; mobile agents and systems, vehicular networking scenarios, underwater communications, space communications, etc. Most of the necessary concepts and technologies are mature and well established now, and can be found in approaches such as the IPFS (Interplanetary File System), Filecoin, Freenet and even Microsoft ION.

You can use these to inform you design - but you CANNOT use their code, libraries or any of their toolsets. You MUST correctly cite and reference ALL resources you refer to, employ or use in your project activities. If you fail to do so you will be zero'd for the relevant elements - potentially the whole of your project 1-3 activities.

What I would like each of you to do is to identify an element, aspect or facet of Computer Networks that we will touch on or cover in this module, and that you find of particular interest. It may be that you choose an aspect because you think it will be of use in your future career or to employers; it may be that you have always wanted to do something in that area; it may even simply be because you're curious and want to learn more about it. Choose the focus you think will most interest you across the project coursework in this module. There will be three projects during the module: Project 1 (this one); Project 2 (implementing a simple, reliable messaging infrastructure that implements the core focus and elements of your Project 1 design) and Project 3 (a small group project, where you will take the best of breed of the concepts and implementations from each member in the group, and implement and demonstrate your functional group solution towards the related aspects of the data fabric provider).

1. Preferred focus and Use Case - Identify the key features, requirements and constraints of your target aspect/focus and preferred use case (as relevant to your planned design and implementation). Demonstrate that you have appropriately considered other considerations and use cases that may be relevant to your focus.

2. Protocol Overview - Describe your design at a very high level. How do systems and your nodes/devices communicate with each other in and through your fabric provider? How do they employ and leverage the aspects and facets that you have chosen to focus on? What design decisions and optimisations did you consider?

3. Communication Model - Develop a communication concept and operational model for your system. Your communication design should be sufficient for your proposal, and proportionate to the length, duration and scale of the CSU33D03 module. Your design should include adequate and sufficient identification of and consideration of any security considerations related to your concept.

4. Module Descriptions - This should not include individual classes; instead, illustrate anticipated design interactions and trust boundaries, network relationships, and so on. Also, please identify and provide motivations for the tradeoffs that you make.

5. Summary of Algorithms - This section should discuss any communications, functionality and operationally critical algorithms that your system will use. It should provide an overview of the algorithm and a description of the operational reliability and guarantees that you hope to achieve by using your described algorithm or approach. Use pseudo code at your discretion, but real C/Python/Go/Java code is inappropriate at this juncture. If you plan to make use of any custom libraries, systems, codebases, cryptographic protocols, etc you should identify them, motivate and justify their use, and include a sufficiently detailed discussion and contextualisation here. If you plan to use off-the-shelf networking, communication, operational or crypto fabrics or implementations, explain how and why they are necessarily essential to your concept and plan, and also how you plan to make best and minimal use the functionality those platforms and systems provides.

 

(5/5)
Attachments:

Expert's Answer

582 Times Downloaded

Related Questions

. Introgramming & Unix Fall 2018, CRN 44882, Oakland University Homework Assignment 6 - Using Arrays and Functions in C

DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma

. The standard path finding involves finding the (shortest) path from an origin to a destination, typically on a map. This is an

Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t

. Develop a program to emulate a purchase transaction at a retail store. This program will have two classes, a LineItem class and a Transaction class. The LineItem class will represent an individual

Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th

. SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

. Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

582 Times Downloaded

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Um e HaniScience

551 Answers

Hire Me
expert
Muhammad Ali HaiderFinance

912 Answers

Hire Me
expert
Husnain SaeedComputer science

979 Answers

Hire Me
expert
Atharva PatilComputer science

553 Answers

Hire Me