Desklib - Online Library for Study Material

Verified

Added on  2023/03/31

|12
|3703
|336
AI Summary
Desklib is an online library that offers study material, solved assignments, essays, and dissertations. This document provides information about COIT 20246 Assignment Submission, including the due date, part, weighting, and submission details. It also includes instructions, tasks, and summaries for each week. The subjects covered include traditional mass storage, file systems, broadband network technologies, Tor, cryptojacking, and fiber optic cable damage.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference: Security Enhancement in Wireless Menu Card with
Network Attached Storage
Saxena, S., Gupta, N. and Gupta, S., 2016. Security Enhancement in Wireless Menu
Card with Network Attached Storage. IITM Journal of Management and IT, 7(1),
pp.3-7.
http://iitmjanakpuri.com/journals/Volume_7_Issue_1_January-June_2016.pdf#page=5
Summary:
The essence of this elected resource identifies the role of Network Attached Storage
(NAS) in enhancing the security of wireless menu card.. It has been determined that,
development of different portable devices and cellular technology together offers
potential framework of various business applications. This resource demonstrates
how the security of a food menu chain can be enhanced more after incorporating a
NAS to it. This technology is mainly used to operate large data storage area. This
system will utilize wi fi storage which will be virtually implemented through cloud
storage. The customers of the system are allowed to use personal digital assistance
like smart mobile phones, laptops, tablets etc for booking order. In order words, it can
be said that successful implementation of the system will provide security, reliability,
flexibility, scalability and portability as well. Apart from that, this application can also
save the time and money both during the application. The chances of man made
errors also get reduced with this application. The system gives a better
communication channel between the project owners and the clients. The current
business process of the company also changes a lot because of the changing
pattern of information access from the system. The wireless connection also
supports the framework and web application. The five details applications that are
done by the admin with this application include admin access, login, menu update,
details checking and logout.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title and Reference: A new file system for flash storage.
https://www.usenix.org/conference/fast15/technical-sessions/presentation/lee
Lee, C., Sim, D., Hwang, J. and Cho, S., 2015. F2FS: A new file system for flash
storage. In 13th {USENIX} Conference on File and Storage Technologies ({FAST}
2
Document Page
15) (pp. 273-286).
Summary:
This resource sis selected for this section as it demonstrates the details of F2FS, a
new file system mainly used for the flash storage. This fine system is build up on the
basis of appends logging and the key design level decisions are made keeping in
mind the characteristics of flash storage. The resource elaborates the details ideas of
its design, data structure, resulting expected performance and algorithm as well.
Different level experiments are being conducted to understand the application ad
expectation from the file system. The results will highlight all desirable performance
for the F2FS based on the state of art mobile system. The resource also elaborates
the outperformance of EXT4 under the synthetic workload which applicable up to
iozone and SQlite. It is also determined that the excessive timeline for several
workload can be reduced by almost 40% with the file system. In any kind of server
system the application of F2FS is much better than the EXT4. However, it is
determined that random writes is not good for the flash storage devices. The
developers are required to design and develop a completely new file system to
leverage the usage of NAND flash solution. Overall the resources discusses the
details benefits that can be obtained with this application
3
Document Page
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference: The national broadband network: What difference will it
make to broadband availability in Australia
Sübspeck, S., Campbell, L.H. and Hinton, K., 2018. The national broadband network:
What difference will it make to broadband availability in Australia?. Australian Journal
of Telecommunications and the Digital Economy, 6(1), p.1.
https://telsoc.org/sites/default/files/tja/pdf/141-article_text-1346-1-11-20180328-
revised5jul2018.pdf
Summary:
The content of this particular selected resource identifies the application of FTTN
technology. It has been has been identified that with the application of this
technology huge difference will occur in the broadband availability in Australia. The
FTTN nodes are used to give broadband connections and also other data services
via a common network box that is known as node. More than any other optic line it
can transfer more data with much security. It used coaxial or else twisted paired
cable to give delivery to multiple numbers of consumers The broadband service
providers of Australia offers bottom up analysis of broadband availability in Australia
without and with NBN. The availability of the broadband services is considered based
on speed access and continuous evolvement. It is identified that the initial
deployment took place in the year of 2010 and the entire planning as changed by
2013 with multi technology mix approach with Fibre to the Node and broadband
satellite. The FTTN and fixed wireless gives a maximum of access speed. It also
elaborates that the only large scale FTTN deployment in other Canberra suburbs
was the Transact network. The resource also elaborates that, like others here als0o
the FTTN is designed and developed for delivering data services with the help of a
common pillar and network box. The process combines the concept of both existing
and current technologies.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
Title and Reference: Comparative analysis of blockchain technologies and
TOR network
https://ieeexplore.ieee.org/abstract/document/8242004
Moubarak, J., Filiol, E. and Chamoun, M., 2017, October. Comparative analysis of
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
blockchain technologies and TOR network: Two faces of the same reality?. In 2017
1st Cyber Security in Networking Conference (CSNet) (pp. 1-9). IEEE.
Summary:
This journal resource is comparative analysis paper that analyses the role TOR is
internet user’s security and also its comparison with the blockchain technology. Tor
network structure is made up of various volunteers nodes that are known as relay.
The relay is referred to as a computer inside tor which is listed mainly in the main
directory of the system. It receives the signal from another relay and passes the
signal to other path based on the requirements. For the different requested path new
path generates but no one can report on the traffic regarding the relay that has been
handled. The resource mainly compares the application security that can be obtained
by the consumers with both of the technologies. The comparative results identified
that he working principle of both the approaches are not much different but based on
the working scenario the owners should select the most suited security approach. It
has been determined that the Tor technology is nowadays one of the most widely
used technologies that help to keep the users secured from the external users and
hackers as well. It has been determined that security breaches and challenges can
explore different system drawbacks that may lean an entire computing operation
towards failure.
5
Document Page
Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title and Reference: Cryptojacking injection
https://www.tandfonline.com/doi/abs/10.1080/10919392.2019.1552747
Zimba, A., Wang, Z. and Mulenga, M., 2019. Cryptojacking injection: A paradigm
shift to cryptocurrency-based web-centric internet attacks. Journal of Organizational
Computing and Electronic Commerce, 29(1), pp.40-59.
Summary:
The resource which is nominated for this section elaborates the role of Cryptojacking
and also identified it as a paradigm shift to website centric internet attacks or attacks
on Cryptocurrency. These days the internet hackers use both the technology called
Cryptojacking and crypto mining for hacking internet user’s personal and financial
confidential information without taking their permission. Most of the companies
where the business is designed based on e commerce technology are facing the
issues of Cryptojacking and crypto mining simultaneously. This resource elaborates
and evaluates the Cryptojacking injection which is a state of art web centric attack
vector within the landscape of crypto mining attack. The process of Cryptojacking is
referred to as an authorized usage of some other person’s computer for mining
Cryptocurrency. The hackers use this technology to either get the victim click on to
the injected link or by infecting an online add with the help o javascript code. The
codes of crypto mining work in the background and the information stored in the
victim’s machine are hacked by the hackers. This technology is no where different
from the phising attack. In this process the victims mostly receives a link an as soon
as the victim click on to the link a pop up window opens and complex mathematical
codes started running to the victim’s computer.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference: Disaster-aware submarine fiber-optic cable deployment for
mesh networks
https://ieeexplore.ieee.org/abstract/document/7277101/
Msongaleli, D.L., Dikbiyik, F., Zukerman, M. and Mukherjee, B., 2016. Disaster-
aware submarine fiber-optic cable deployment for mesh networks. Journal of
Lightwave Technology, 34(18), pp.4293-4303.
Summary:
The resource nominated for week 7, details the disaster aware submarine fiber optic
cable deployment for mesh networks. The resource identifies that with increasing
rate of social and economical reliance the survivability of the network system are
6
Document Page
getting roughly interrupted. A major reason for which the network system get
damaged or the fiber optical cut damage occurs are either natural disaster or disaster
made by men. The manmade disaster can still be controlled but the natural disaster
cannot be controlled easily. This resource illustrates that a disaster resilient
submarine cable deployment can reach major cost saving while the disaster will
strike. During the selection of path and cable lines the developers are required to put
major focus on. Use of best mesh topology network is very helpful for such
deployment. The cable companies are required to pay enough to the cable industry
to avoid the disaster and damage accordingly. If has been analyzed that the
developers are required to pay high cost to recover such disaster of fiber optical
damage. Different practical experiences are also being identified in this journal article
and in addition to this, the net cost that would be required to implement such
changes are also elaborated in this paper. The resources also measure the cluster
coefficient versus cost.
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference: Interconnected Enterprise Systems− A Call for New Teaching
Approaches
Schneider, B., Asprion, P.M. and Grimberg, F., 2018, June. Interconnected
Enterprise Systems− A Call for New Teaching Approaches. In International
Conference on Computational Science (pp. 318-331). Springer, Cham.
https://link.springer.com/chapter/10.1007/978-3-319-93713-7_26
Summary:
The essence of the nominated resource demonstrates the interconnected enterprise
system which is a call for new teaching approach. it is determined that one of the
most prominent ESP type is ERP. The resource is aimed to delimit as well as
increase he current ES’/ERP system towards iES. It helps to derive the
recommendations for other new teaching approaches for iES in the digital ages. The
resource identifies since the last decades the use of enterprise resource planning g
system has gained incredible success in the global market place. Most the large
business owners have started using the concept of enterprise system to manage the
business processes and their details applications. Thus journal identifies the role of
ERP system in developing new teaching approach. These days, online learning
process is becoming a very popular process among elders and kids as well. The
learners get opportunity to discuss over a technical platform regarding their questions
and queries. If they wish to ask further then also they are allowed to take part in the
online discussion forum where they can ask their questions and answers will be
given by the tutors end. This process has increases the overall learning efficiency. It
will help to raise awareness among the teachers and the learners.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference: Did the Target data breach change consumer assessments of
payment card security
https://www.ingentaconnect.com/content/hsp/jpss/2017/00000011/00000002/
art00004
8
Document Page
Greene, C. and Stavins, J., 2017. Did the Target data breach change consumer
assessments of payment card security?. Journal of Payments Strategy &
Systems, 11(2), pp.121-133.
Summary:
The journal paper implies that in the previous resea4ch it has been identified that, the
perception payment security directly affects the consumers, where as this journal
elaborates that whether the target data breach of 2013 had any impact over the
perception over the consumers cards. These days most of the businesses starting
from small to medium are using the concept of online payment processes using
cards. As soon as the card numbers and the cvv numbers are entered by the
consumers the customer details are immediately tracked. As soon as the personal
information are obtained by the cyber attackers they get access to the credit cards
and they can used they gate access to used the similar details to buying new
products and services online. This incident it not obsolete these days rate of such
attacks are growing every days and from the beginning of 2017 the rate of the attack
as reached by 50%. Different security aspects are being used by different companies
but lacks of technical support are failing to lead the process secured from the
external cyber attackers. The services providers are needed to look into this matter
seriously and should use cryptographic technologies to secure personal and financial
information of the cardholders and the card details as well
9
Document Page
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference: Multi-Agent System for intelligent Scrum project management
https://content.iospress.com/articles/integrated-computer-aided-engineering/ica491
Lin, Y., Descamps, P., Gaud, N., Hilaire, V. and Koukam, A., 2015. Multi-Agent
System for intelligent Scrum project management. Integrated Computer-Aided
Engineering, 22(3), pp.281-296.
Summary:
The resource journal article that is nominated for evaluating the details scrum project
management methodology, details the multi agent system for scrum project
management. This resource elaborates that scrum project management is referred to
as project delivery approach that is used by the project managers and project
stakeholders to manage and deliver any software development projects. The process
framework used for scrum project management methodology is very light weighted
and lesser complex as well. This process is completely incremental and iterative
process which implies that through the project development phases are
interconnected to each other but still after completion of one phase additional
changes can e incorporated to the system if required. The incremental process
allows the project delivers to deliver a much scalable and flexible system to the
clients. This project management approach is about conjugation and collaboration of
team members. It helps to bring all the project team members together and motivate
them so that they can contribute as much they expected earlier. The process helps to
increase the business values. The projects implemented using this process are
mostly error free and user friendly as well. In other words, the consumers
successfully receives that products that actually they wish to gain from as per their
primary project objectives.
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference: The relationship between project governance and project
success
Joslin, R. and Müller, R., 2016. The relationship between project governance and
project success. International Journal of Project Management, 34(4), pp.613-626.
https://www.sciencedirect.com/science/article/abs/pii/S0263786315000551
Summary:
This selected resource elaborates the relationship between the project management
10

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
practices and the way through which a project can be governed towards the
expected outcome with the application of the prcatices. In order to govern any project
towards the primary project objectives both the project manager and project team
members are require to play active roles. Any one of the project team members is
found to giving lesser contribution to the project progress then the entire project will
fail to meet the expected benefits. The identified journal resource also identifies that
project efficiency, organizational benefits, future potential, project impact and
stakeholders satisfaction are also related to the project governance, If the project is
not properly leaded or governed towards the expected line then the project will result
either overrunning budget or delay in implementation. Bothe of these aspects is loss
for project owners and project clients as well. The relationships between the project
team members are needed to be positive and there much not be any kind of internal
team conflict. Internal team conflict may hamper communication and team
collaboration. If the team fails to show coordination among each other then workload
will not be distributed uniformly. It will again cause project failure. In order to obtain
long terms project success and global sustainable growth the project managers are
to govern or lead the project
11
Document Page
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
12
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]