logo

Information and Communication Technology Assignment

   

Added on  2021-06-17

9 Pages4236 Words92 Views
COIT 20246 ASSIGNMENT SUBMISSIONDue date:Thursday Week 11 (2PM AEST)Part:Written AssessmentWeighting:30% of total assessment. Submission:Electronic (see course website for details)InstructionsIt will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words!Please complete your assignment using this submission template file, inserting your responses where indicated.DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers.Please fill in the following details:Student NameStudent NumberTutor’s Name
Information and Communication  Technology Assignment_1
TasksThere are ten (10) tasks, one for each week: the tasks are detailed below. There is atable to complete for each task. Please fill in the information required. Note: Each resource summary should be around 200-300 words.Week 1The text discusses how modern CPUs function. Recently a critical flaw in microprocessor design has been discovered that allows two extremely serious security exploits: Spectre and Meltdown. Find and summarise ONE resource that describes how either of these exploits work. The resource (and your summary) should focus on what is occurring in the CPU that allows these exploits to occur.Title and Reference:Simakov, N.A., Innus, M.D., Jones, M.D., White, J.P., Gallo, S.M., DeLeon, R.L. and Furlani, T.R., 2018. Effect of Meltdown and Spectre Patches on the Performance of HPC Applications.arXiv preprint arXiv:1801.04329.Summary:There are two types of vulnerability known as Meltdown and Spectre, which all the computer chips possesses since the last 20 years. Both the malware are incorporated with the manufacturing of the chip. If the malware are used fully, then the attacker can get all the previous accessed data that were protected completely. This flaw of manufacturing defect was detected by the researchers very later on 2017 and came into public in 2018. There are actually three different types of vulnerability with a particular CVE number for each type (Simakov et al. 2018). Two malware are combined together as Spectre and the third one is known as Meldown. There are many virus programs that are involved with these vulnerability for gaining the access of data that should not be accessible to any other third parties. But attacker uses two techniques to see the data that are present in the chip previously by using two techniques known as caching and speculative execution. The Meltdown and the Spectre gives way to dangerous attacks that can take place. For example, the code of JavaScript on a particular website can use the malicious Spectre fortricking a web browser in revealing the password and user information stored in. The attackers can also exploit with the Meltdown malware in viewing the data that are owned by some other users and even can view data of some other virtual server that is hosted on samehardware. This can be very dangerous for hosts of cloud computing. Week 2Prior to 1985, there were very few Operating Systems (OSes) that used Graphical User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of these GUI operating systems. The OS must have been release prior to 1985 so cannot be Microsoft Windows. Title and Reference:Alles, M.G., Kogan, A. and Vasarhelyi, M.A., 2018. Putting continuous auditing theory into practice: Lessons from two pilot implementations. InContinuous Auditing: Theory and Application(pp. 247-270). Emerald Publishing Limited.Summary:Pilot is basically a single-user, and a multitasking operating system that is originally designed by Xerox PARC in the year 1977. The Pilot operating system was written with a programming language known as Mesa Programming Language, with a total of 24,000 lines of coding. The Pilot operating system was firstly designed for a single user system that has highly configurednetworked environment of some other Pilot system. The Pilot operating system was mainly designed for IPC (Inter-process communication) through the interface of Pilot stream (Alles, Kogan and Vasarhelyi 2018). The Pilot is a combination of virtual memory and a file storage in one subsystem and is mainly uses the architecture of manager or the kernel for managing its resources and system. The designers of Pilot Operating system is a non-preemptive modelfor multitasking. But, later it was converted to a preemptive system that are based on
Information and Communication  Technology Assignment_2
monitors. This operating system uses a debugger, which can debug even a frozen snapshot in the disk of the operating system.A traditional Pilot workstation usually runs on three operating systems at a time with three different disk volumes known as Co-Co-Pilot, Co-Pilot, and inferior copy of the Pilot that basically runs on third disk volume. The debugger of the Pilot operating system was coded only for reading and writing the variables for a program stored on separate disk volumes. The architecture of Pilot that was designed was very unique because the developer was allowed to use a single-step of operating system code along with semaphore locks. The Pilot operating system was used for Xerox Star workstation. Week 3Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks that are characterised by linking devices over large distances. Devices (including simple sensors) typically can only communicate at very low bit rates, however, the communication and associated electronics consume very little power. As such, LPWAN devices can be battery powered and operate independently for many months or even years. Find and summarise ONE resource that describes ONE platform or technology that implements a LPWAN. Title and Reference:Bardyn, J.P., Melly, T., Seller, O. and Sornin, N., 2016, September. IoT: The era of LPWAN isstarting now. InEuropean Solid-State Circuits Conference, ESSCIRC Conference 2016: 42nd(pp. 25-30). IEEE.Summary:The LPWAN network is not only a single technology. LPWAN is a group of different types of low-power technology, along with technologies of Wide Area Network that takes different forms and shapes. The LPWAN technology basically uses a licensed as well as unlicensed frequencies and then includes the proprietary or some open standard options. One type of LPWAN is unlicensed Sigfox. This is one of the widely used LPWAN in the modern network topologies. The Sigfox uses a public network of about 868 MHz or a network of 902 MHz bands (Bardyn et al. 2016). This is technology of ultra-narrowband technology that allows single operator for each country. The Sigfox is able to deliver messages of over 30 to 50 km distance in rural areas and 3 to 10 km distance in urban areas. The Sigfox can also travel to adistance of 1,000 km in application of line-of-site and the packet size is mostly limited to about150 messages including 12 bytes per day. The packet of downlink are smaller that limits to only four messages of about 8 bytes on each day. The sending back of the endpoints can be prone to the interference. The second type of technology in LPWAN is the RPMA (Random Phase Multiple Access). This technology serves a shorter distance of maximum of about 50 km and offers a bidirectional communication compared to Sigfox. This technology runs on a 2.4 GHz of spectrum and is prone to the interference that is received from physical structures, Bluetooth, and Wi-Fi. The RPMA has a high power consumption compared to other LPWAN networks. Week 4Voice over IP (VoIP) is a group of hardware and software technologies that allow users to communicate via voice and video over the Internet. VoIP uses a number of different softwareprotocols, depending on the application. Find and summarise ONE resource that describes ONE of these VoIP protocols.Title and Reference:De Pessemier, T., Stevens, I., De Marez, L., Martens, L. and Joseph, W., 2016. Quality assessment and usage behavior of a mobile voice-over-IP service.Telecommunication Systems,61(3), pp.417-432.Summary:One of the protocol that is used in VoIP (Voice over Internet Protocol) is the IETF standard of protocol. The IETF standard protocol is used for establishing the connection of VoIP. The IETF is basically a control protocol on application layer that is used for creating, terminating
Information and Communication  Technology Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT 20246 Assignment Submission
|9
|3329
|56

COIT 20246 Information and Communication Technology
|13
|4605
|108

Desklib Assignment Submission Template
|13
|4367
|386

Desklib SEO Suggestions
|14
|4303
|163

COIT 20246 : Information and Communication Technology
|9
|4199
|51

Desklib SEO Suggestions
|9
|4156
|238