Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

Investigate the different cutting-edge Computer Systems currently on-market and configure the

9 required PCs for the Company’s new project of “VA for Smart Cameras”.

The authorised and approved by the Company’s Orders and Sales (aka Finance and
Accounting) Department suppliers are currently Dell and Viglen. You need to configure and
order the required PCs from the suppliers’ websites. The 8 of the 9 configured PCs will be
used by the 8 main Research Scientists of the Research and Development (R&D) Department
of the Company and the 9th configured PC will be mainly used as a Backup Server. The
machines need to be configured for interfacing with the TI DaVinci Series of Embedded
Microcomputer (DSP) used in the Smart Camera. The TI DSP comes with various output
connectors including USB 2.0, UART, I2C, Wireless I/O, IEEE 1394 and others. Also, it
supports up to 20GB external Flash Memory Card. The configured PCs need to have provision
of Memory Flash Card Reader. Additionally, for testing the Smart Camera the PCs need to
support real-time Video Capturing via IEEE 1394 Standard Connector, e.g. FireWire, Lynx
and i.LINK, and real-time Video Processing. All the Research Scientists of the R&D
Department located in the main 2 Laboratories of the Company can exchange their files during
this large software system development using the 9th PC which is set as a Backup Server i.e.
though there are no requirements for the Backup Server to support real-time Video Capturing
and real-time Video processing there is a firm need for loads of Backup Storage space
performed in real-time. All the 9 PCs (including the Backup Server) have a requirement of
real-time Graphics/Video Cards and a minimum of 17-inch Monitors to support High-
Definition (HD) resolutions i.e. 1080p.

The “VA for Smart Cameras” project has a requirement for experimenting on optimising the
developed algorithms using the latest Quad-Core and Dual-Core Processors technologies in the
configured at least 8 PCs during the algorithms’ code deployment in the TI DSP by the
Research Scientists of the Company’s R&D Department.

The usual IEEE 802.11 Wi-Fi Internet and Email Services using the existing Company’s
network infrastructure must be supported by all 9 configured machines.

The suggested way for presenting the final selections of the configured PCs will be in a Table
Format where the PCs parts’ (items) selections are clearly shown with an additional column of
brief item’s properties, e.g. 1 TB HDD, RAID 0,1 support etc.

SECTION 2

(a) Investigate the different Operating Systems that can be used in the configured PCs. TI
DaVinci Series DSP runs on an embedded Linux OS and it is programmed using
Eclipse IDE for Linux OS. Though there is no specific demand for a Linux version,
e.g. Red Hat Enterprise, Ubuntu, OpenSUSE, investigate the different versions and
discuss your choice based on, for example, the Drivers availability, Technical Support
and Technical Forums existing for each version. However, the VA development will
©ICTM 1
be done using Matlab vR2010a under Windows environment. Make the appropriate OS
choices discussing and explaining the reasons of your selections.

(b) Discuss your selected hardware choices for the configured PCs.

(c) Make suggestions on additional Application Software required by the R&D Department
Scientists, e.g. Ulead/Corel Video Studio software package for Video editing; other
Video and Image Processing software packages etc.

Part of the project will be a remote-based Graphical User Interface (GUI) for the Smart
Cameras which the R&D Department will develop in Java and Visual Basic
programming languages as well as in XML. Make suggestions on Java and Visual
Basic IDEs and XML editor required for the development of the GUI.

Explain the reasons of your selected Application Software and briefly describe each
Application Software Package and Tool.

Visit TI main website:

http://focus.ti.com/paramsearch/docs/parametricsearch.tsp?
family=dsp&sectionId=2&tabId=1852&familyId=1300

and make suggestions on other possible Software Tools offered in the website and may
be needed for the TI DaVinci DSP development and programming.

SECTION 3

(a) Investigate the Security issues needed to be addressed during the project’s R&D.

Discuss different physical and logical Security measures, e.g. login accounts, levels of
access rights, network Firewall etc., and make specific suggestions on the different
Application Software Tools to be installed in the configured PCs for achieving
autonomously managed protection AGAINST Virus, Hacking (Spyware), and Third
Party system Intrusion (Adware).

Discuss the possibilities of network Data Encryption Software.

(b) Investigate and discuss software and hardware Testing methodologies for the
configured PCs i.e. White-Box and Black-Box Testing for hardware and software

(c) Suggest and discuss possible Backing Up Systems and Backup Rotation Schemes that
can be used during the R&D of the project.

SECTION 4
a. All or most outcomes and a. Pass requirement achieved – a. Pass and Merit Requirement
associated assessment ALL outcomes and associated achieved.
criteria have been met. criteria have been met. b. Listed ALL References.
b. Reasonable concepts on b. Listed ALL References c. First-rate concept of the subject
the subject covered by the c. Substantial concepts on the matter covered by the Sections in the
Sections in the coursework subject matter covered by the coursework has been demonstrated.
©ICTM 2
have been demonstrated in Sections in the coursework have d. Critical reflection to evaluate own
own words. been demonstrated. work and justify valid decisions for the
c. Listed All References. d. Solution solving strategies of the each of the Sections questions is
overall Unit Assignment Scenario evident.
d. TCA (in the form of
Examination) has been and the individual questions of the e. Autonomy/independence in the form
passed. different Sections have been of making the various selections of the
identified and applied. Computer System parts and OS, and the
e. Investigation of the different different Software tools needed to match
possible Computer Systems and the particular requirements of the given
OS has been done and the Project Scenario is clearly demonstrated
appropriate Computer System and together with clear evaluation of all the
OS has been chosen after various hardware and software
comparative analysis. solutions.

f. All the Computer System’s f. An overall very good presentation


selections and OS, and all the format of the submitted work, including
Software tools required have been Title Page, Contents Page and clear
presented in Table Format together Sections and questions’ headings.
with brief description of each Table Creative thinking in the form of solving
item entry. the overall Project’s scenario and
answering adequately all the Sections’
questions together with critical
discussion and explanation of the
Designed Computer System(s). All the
Computer Systems’ Testing and User
Support issues, e.g. User
Documentation, Systems’ Security,
Health & Safety etc., have been clearly
discussed.

3. Section related specific guidelines for Pass/Merit/Distinction

Pass Merit Distinction


(P1, P2, P3, P4) (M1, M2, M3, M4) (D1, D2, D3, D4)

Section 1  Use the Authorised  Pass criteria met.  Pass and Merit criteria
Suppliers by the  Present in Table met.
Company’s Sales & Format ALL the  Configure
Orders Department on- different parts of the CORRECTLY and
line Websites (Dell or required Computer adequately to match
Viglen) to configure System(s) together ALL the Project
the different parts of with brief description Scenario’s
the required Computer on some properties of requirements the
System(s). each part in a different Computer
 Present in Table separate Table Systems. Present in
Format you’re your Column. Table Format ALL the
selected Computer different parts of the
System items (parts). configured Computer
Systems together with
brief but clear
description on related
to the Scenario required
properties of each
selected part in a
separate Table Column.
©ICTM 3
Section 2  Investigate the different  Pass criteria met.  Pass and Merit criteria
OS that can be used in  Make the appropriate met.
the configured PCs. OS choices for the  Apply critical thinking
 Explain your choices configured PCs. in explaining and
for the different Explain and discuss discussing the reasons
hardware parts of the the reasons of your comparatively of your
configured PCs. OS selections. hardware parts choices
 Explain and discuss for the configured PCs.
your choices for the Apply critical thinking
different hardware in explaining and
parts of the discussing the reasons
configured PCs. comparatively of your
 Make suggestions on OS choices for the
any additional configured PCs in
Application Software respect to the Project
Packages and Tools Scenario’s
required by the R&D requirements.
Department to be  Explain and discuss
installed in the your selections of the
configured PCs. additional Application
Software Packages and
Tools required by the
R&D Department to be
installed in the
configured PCs. Give
brief description of
each selected Software
Package and Tool.
 Visit TI main website
and make suggestions
on other Software
Tools needed for the
programming and
development of the TI
DaVinci DSP.
Section 3  Investigate the different  Pass criteria met.  Pass and Merit criteria
Security issues needed  Discuss different met.
to be addressed during physical and logical  Discuss different
the R&D of the Security measures. physical and logical
Company’s new Make specific Security measures.
Project. suggestions on the Make specific
 Investigate and discuss different Application suggestions and explain
different software and Software Tools to be the use of each of the
hardware Testing installed in the different Application
methodologies for the configured PCs for Software Tools to be
configured PCs i.e. achieving installed in the
White-Box and Black- autonomously configured PCs for
Box Software and managed protection achieving
Hardware Testing. against Virus, autonomously managed
Hacking (Spyware) protection against
©ICTM 4
and Third Party Virus, Hacking
Intrusion (Adware). (Spyware) and Third
 Investigate different Party Intrusion
Backing Up Systems (Adware).
that can be used.  Discuss different
network Data
Encryption Software
packages that can be
used.
 Apply critical thinking
in making specific
suggestions on different
Backing Up Systems
that can be used taking
advantage the 9th
configured PC as a
Backup Server.
Discuss the different
Backup Rotation
Schemes that can be
used for the Company’s
new project.
Section 4  User Documentation:  Pass criteria met.  Pass and Merit criteria
List all the Application  In the User met.
Software Packages and Documentation, list  Investigate and discuss
Tools installed in the ALL the Application any Health & Safety
configured PCs Software Packages issues need to be
including the Security and Tools installed in considered during the
Software Tools and any the configured PCs dispatch and
usual text editors and including the Security installation in the two
spreadsheets. Tools and any usual Laboratories of the
 Investigate any Health text editors and configured PCs; discuss
& Safety issues need to spreadsheets. what are the Health &
be considered during Explain briefly their Safety protection
the dispatch and properties and use. policies to ensure are
installation in the two  Investigate and followed during
Laboratories of the discuss any Health & electrical and electronic
configured PCs. Safety issues need to equipment, i.e. PCs
be considered during including Monitors, use
the dispatch and in the Laboratories
installation in the two where the configured
Laboratories of the PCs will be dispatched
configured PCs. and installed.
 Discuss what are the  Apply critical thinking
maintenance needs in investigating and
for the configured discussing what
PCs and installed possible User Support
software i.e. issues may arise
hardware and currently and in future
software maintenance during the use of the
of the PCs. configured PCs and
©ICTM 5
installed System and
Application Software.

a. Make backup of your work in different media (hard disk, floppy disk, memory stick etc) to
avoid distress for loss or damage of your original copy.
b. Make an extra hardcopy of your work submitted for your own reference or later use

8. Extension and Late Submission


a. If you need an extension for a valid reason, you must request one using a coursework
extension request form available from the college. Please note that the lecturers do not have the
authority to extend the coursework deadlines and therefore do not ask them to award a
coursework extension. The completed form must be accompanied by evidence such as a
medical certificate in the event of you being sick.

b. Late submission will be accepted and marked according to the college procedure. It is noted
that late submission may result in lower grade or rejection.

©ICTM 6

You might also like