logo

COIT 20246 Information and Communication Technology

13 Pages4605 Words108 Views
   

Added on  2021-06-15

COIT 20246 Information and Communication Technology

   Added on 2021-06-15

ShareRelated Documents
COIT 20246 ASSIGNMENT SUBMISSIONDue date:Thursday Week 11 (2PM AEST)Part:Written AssessmentWeighting:30% of total assessment. Submission:Electronic (see course website for details)InstructionsIt will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words!Please complete your assignment using this submission template file, inserting your responses where indicated.DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers.Please fill in the following details:Student NameSANTOSHI KHADKAStudent Number12086896Tutor’s NameZAKIULLAH KHAN
COIT 20246 Information and Communication Technology_1
TasksThere are ten (10) tasks, one for each week: the tasks are detailed below. There is atable to complete for each task. Please fill in the information required. Note: Each resource summary should be around 200-300 words.Week 1The text discusses how modern CPUs function. Recently a critical flaw in microprocessor design has been discovered that allows two extremely serious security exploits: Spectre and Meltdown. Find and summarise ONE resource that describes how either of these exploits work. The resource (and your summary) should focus on what is occurring in the CPU that allows these exploits to occur.Title and Reference:Meltdown and Spectre: How chip hacks work’BBC News. 2018.Meltdown and Spectre: How chip hacks work’. [online] Available at: http://www.bbc.com/news/technology-42564461 [Accessed 22 May 2018].Summary:The article focuses on the discussion about the vulnerabilities called spectra and meltdown. The reason for choosing this article is that this site provides the workings of spectra and meltdown.The CPU of the computer shuffles data between the different parts of the memory and the computer chips. This work is done by the kernel of the computer. The main objective of the CPU is to provide necessary data to the users and performs the operation as fast as possible. The newly discovered vulnerability works when the data is in cache and is managed by the processor. The main feature of the Spectra is to make the programs to perform the unnecessary tasks and makes a way to leak the important data (BBC News 2018). On the other hand the meltdown uses the memory used by kernel to collect the information, which is not desirable. The spectra and meltdown, both the vulnerabilities are of “speculative execution” in nature. The speculative execution allows the pre determined result generation beforethe execution of the memory processes. This action can allow the hackers to controlthe processing of the instructions and to get the sensitive data regarding the system. According to the experts the individuals are not at the higher risks zone. However, the companies providing services to the others can be largely affected from these vulnerabilities. In order to mitigate the effect of the vulnerabilities the patches has been provided. However, the use of patches indicates the degradation of the speed and the performance of the CPU. The reduction of the performance of the CPU may not be noticeable for the individuals however, the circumstances of reduced performance may be noticed in the large organizations.The article provides an insight about the workings and the definition of these two security vulnerabilities. It also provides a view about the risks associated with these
COIT 20246 Information and Communication Technology_2
vulnerabilities and the ways for the elimination of the vulnerabilities.Week 2Prior to 1985, there were very fewOperating Systems (OSes) that used Graphical User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of these GUI operating systems. The OS must have been release prior to 1985 so cannot be Microsoft Windows. Title and Reference:History of Computers and Computing, Birth of the modern computer, Personal computer, Xerox AltoHistory-computer.com. 2018.History of Computers and Computing, Birth of the modern computer, Personal computer, Xerox Alto’. [online] Available at: http://history-computer.com/ModernComputer/Personal/Alto.html [Accessed 22 May 2018].Summary:The article give sthe details about the Xerox Alto. The reason for choosing this articleis that it provides the detailed view of the first operating system developed before 1985 that supports the graphical user interface.Xerox Alto developed by Xerox PARC in 1972 was the first attempt to the development of the operating system that uses graphical user interface (History-computer.com 2018). The development of Xerox Alto influences the design and the working principal of the personal computer at a great level. However, the project of developing such operating was not commercialized. Xerox Alto operating system was used in the universities and the research purpose. That operating system cannot be purchased by anybody for the individual use. The operating system was influenced by the on-line system(NLS). The features of the original Xerox Alto are-Memory- 128 KBHard drive- Cartridge hard drive of 2.5 MB which was removable.Three button mouse5.8 MHz CPU.The display was bit mapped and black and white in nature.The PARC Altos can be connected through the local area network using the Ethernet. The application software supported in this operating system is written in theBCPL code followed by the Smalltalk and the Mesa programming language. The processor used for running this operating system is bit slices processor made by the Texas Instruments (74181 chip). This article is helpful as it describes the details about the first operating system that attempted the graphical user interface. The article deals with the both hardware and software specification needed for the operating system which gives an overview about the working of this operating system.Week 3
COIT 20246 Information and Communication Technology_3
Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks that are characterised by linking devices over large distances. Devices (including simple sensors) typically can only communicate at very low bit rates, however, the communication and associated electronics consume very little power. As such, LPWAN devices can be battery powered and operateindependently for many months or even years. Find and summarise ONE resource that describes ONE platform or technology that implements a LPWAN. Title and Reference:LPWA network technologies and standards: LPWAN wireless IoT guide’i-SCOOP. 2018.LPWA network technologies and standards: LPWAN wireless IoT guide’. [online] Available at: https://www.i-scoop.eu/internet-of-things-guide/lpwan/ [Accessed 22 May 2018].Summary:This article describes the application of the Low-Powered Wide-Area Networks in thefield of IoT. The reason for choosing this article is that both the IoT and LPWAN are the emerging concepts. The paper describes overview of the solutions provided by the LPWAN in the field of IoT along with the various approaches and the facts about the deployment of the implementation.There is a difference between LPWA and LPWAN. LPWAN refers to the standards which denotes low power wide area network. There are certain questions about the deployment methods and the usages of the LPWAN (i-SCOOP 2018). However, theuse of this network standard is becoming popular for the IoT( internet of things). Oneof the main adjective of the IoT is to provide service using low power consumption. The low power consumption can be achieved through the use of the LPWAN. In most of the cases, the industrial IoT uses a mix , which is using the conventional network along with the use of fixed line( a usage of LPWAN) in order to communicate.One of the major drawbacks of using LPWAN is the confusion of the application regarding LPWAN. The selection of the particular LPWAN offerings depends on the requirement specification for the company.There are various LPWAN standards such as non-cellular and the unlicensed band which are out of the licensed standard. The article provides a bunch of rich information about the overview and the standards of using LPWAN for the IoT. It also defines the future of this technology and the possibilities which are growing around this technology.Week 4Voice over IP (VoIP) is a group of hardware and software technologies that allow users to communicate via voice and video over the Internet. VoIP uses a number of different softwareprotocols, depending on the application. Find and summarise ONE resource that describes ONE of these VoIP protocols.Title and Reference:The Session Initiation Protocol - The Internet Protocol Journal
COIT 20246 Information and Communication Technology_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Desklib Assignment Submission Template
|13
|4367
|386

Desklib SEO Suggestions
|14
|4303
|163

Desklib SEO Suggestions
|25
|5817
|401

Information and Communication Technology Assignment
|9
|4236
|92

COIT 20246 : Information and Communication Technology
|9
|4199
|51

Desklib SEO Suggestions
|9
|4156
|238