Examples of Traditional Mass Storage and NAS or SAN Storage Technologies
Verified
Added on  2023/04/04
|16
|4045
|292
AI Summary
This article discusses examples of traditional mass storage such as magnetic disk and solid-state drives, and explores NAS and SAN storage technologies. It provides an overview of the key features and differences between NAS and SAN.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: IT Write Up0 IT Write Up ICT Services Management Student Details: 5/27/2019
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ICT Services Management Week 1 The text discusses examples of traditional mass storage such as magnetic disk and solid-state drives. While these still underpin most mass storage, in corporate environments, they are often accessed via Network Attached Storage (NAS) or Storage Area Network (SAN) technologies. Find and summariseONEresource that describesEITHERNAS or SAN storage technologies. The resource and your summary must focus on either NAS or SAN,NOT BOTH. Network Attached Storage: Liu, C. & Chen, H., 2009. Network Attached Storage.U.S. Patent Application, 29(250), p.435. Summary: The selected resource written by(Liu & Chen, 2009)is all about network attached storage which isa useful way of mass storage. It has been selected to understand the key features of NAS while comparing it with other mass storage techniques like solid-state drives, magnetic disk as well as SAN.The author of the article narrated network attached storage technologies to explain its significance in mass storage over a network server. Main points of this article suggest that NAS act as a data storage device based on file-level which is linked to a TCP/IP network, or Ethernet. The article states that NAS generally utilizes CIFS and NFS protocols, even when the choices like HTTP are available. Additionally, key information which has been presented by this paper suggest that NAS is exactly like an operating system (OS) as a mutual folder through which employees and persons can access data files using the NAS as they access from any other file on the network(Liu & Chen, 2009). However, this resource highlighted NAS as LAN-dependent; thus if the LAN goes down then the NAS will also go down. Apart from this, the chosen study on NAS revealed that NAS does not work as quick as block SAN, yet high-speed LANs can easily be utilized for overcoming every performance and latency issue.Chosen resourcehighlighted the major differences amid NAS and SAN like fabric, protocols, data processing, performance, scalability, price, and ease of management. In this way, this resource was useful as it was detailed on NAS while offering the details of the usability of NAS over alternative storage technologies from focusing on NAS unique mass storage capabilities. 1
Week 2 Operating systems use file managers to interact with mass storage devices. However, the way in which data is stored and retrieved is dictated by the file system. There are many types of file systems used by modern operating systems. Find and summariseONEresource that describesONEsuch file system that isNOTFAT, FAT32 or ExFAT. The resource, and your summary must focus onA SINGLEfile system. Analysis and implementation of NTFS file system based on computer forensics : Kai, Z., En, C. & Qinquan, G., 2010. Analysis and implementation of NTFS file system based on computer forensics.Second International Workshop on Educational Technology and Computer Science, 1, pp.325-28. Summary: The selected resource article is about NTFS type of file system that is typically based upon computer forensics. This article has been chosen because the author has presentedanillustrateddetailedresearchontheanalysisaswellasthe implementation of NTFS files system. The analysis done in this paper has covered the major process through which operating systems interact with mass storage devices in the digital era.This paper has highlighted the ways in which mass data is stowed as well as retrieved by the different kinds of the file system. The research paper written by(Kai et al., 2010),included a study about NTFS file systembeingaNewTechnologyFileSystemthroughcomprisingtheprimary features of the NTFS file system within the different OS. While assessing the chosen article’s main findings it has been found that name conventions of the files in NTFS can contain up to 255 characters provided they are not case sensitive. Moreover, the major points in the study written by(Kai et al., 2010)suggestedthat file names in NTFS file system can contain all of the characters excluding / “> < * | :. On the other hand, this paper has explained the NTFS system being a secure system for storing files as well as folders safely for a long time. Key info covered in this study is suggesting that stowed data in the form of files and folders are more secure than those of the FAT file system. Hence, the selected resource was useful to understand the key features and importance of NTFS file system over others. 2
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Week 3 The National Broadband Network (NBN) is currently being rolled-out across Australia and there is a mix of technologies that are being used to deliver Internet services (for example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and summariseONEresource that describesONEof these delivery technologies. The resource, and your summary, must focus onA SINGLEtechnology. BroadbandpolicyandruralandculturaldividesinAustralia: Ewing, S., Rennie, E. & Thomas, J., 2015. Broadband policy and rural and cultural divides in Australia. Digital divides : The new challenges and opportunities of e-inclusion, pp.107-24. Summary: The chosen resource is all about the new technology FTTN which is being utilized by the National Broadband Network (referred to as NBN) for delivering Internet services all over the region. The article written by(Ewing et al., 2015)has been chosen because it is containing a concrete studyabout FTTN which is a new technology used by broadband providers of Australia. The authors(Ewing et al., 2015)describedFTTN as Fiber to the node which is one of the great options to provide broadband telecommunications services into multiple destinations of Australia. In addition to that, FTTN helps in providing broadband connections along with the rest data services through utilizing a common network box which is often known as a node. FTTN technology is often called as fiber to the neighborhood. Post researching the major points covered by this resource it has been found that FTTNcan easily serve a hundred customers, therefore, these must be available in miles radiuses. Additionally, key findings of FTTN in this paper are suggestingthatconsumerproximitytowardsthenodesanddeliveryprotocols decides the data rates of the internet for its users. The study revealed that both the FTTC and FTTN provide fiber optics Internet for many of the Australian internet users at relatively low expenses. Therefore, theselected study has covered major benefits of FTTN as it is having the capability of delivering internet data all across efficient as well as bigger fiber optic lines without any speed limitation. 4
Week 4 The Internet is made up of many interconnected servers and networks. Users are increasingly aware and concerned that their Internet communications can be intercepted and monitored.Toris one technology that allows users to obscure or hide online their online activities. Find and summariseONEresource that describes what Tor is and how it works. The resource, and your summary, must focus purely on Tor. An Examination of Tor Technology Based Anonymous Internet: Chrane, C. & Kumar, S., 2015. An Examination of Tor Technology Based Anonymous Internet. Proceedings of the 15th informing Science Institute International Conference. Summary: The chosen study was written by(Chrane & Kumar, 2015)effectivelydemonstrated an examination of the Tor technology of accessing the internet anonymously. For narrating on Tor technology, this study has been chosen for the reason that all possible key attributes of the Tor technology being one of the finest ways for continuing using the internet being a hidden personality. The selected resource suggested thatTor browserunblock all websites for you while giving access to the deep web to anyone. Besides,Tor Services works like an online router, which is utilized for underpass the internet connection and bounce it off from several anonymous servers those are known as ‘nodes,’ in order to obscure an individual’s Web identity. The research conducted in this selected resource is suggesting that Tor technology can effectively defend a person’s identity with the help of multiple covers of anonymity. In other words, it can be said that Tor is more hidden than other proxy servers. In proxy servers, only one gap exists among the surfer and the server but Tor is not at all same like proxy servers but it is a better version. This resource has explained that Torbrowseroffersadd-ons,however,theadd-onsmayseemslowrelatively. Therefore, an article written by(Chrane & Kumar, 2015)hassuccessfully examined the many operative ways to use Tor technology through downloading the free Tor browserwhich includesTorconnectionsoftware and the browserdesignedfor optimizing privacy of its users. 5
Week 5 An emerging form of malware is cryptojacking (also known as malicious cryptomining). Find and summarise ONE resource that describes what cryptojacking is and how it works. The resource, and your summary should focus purely on cryptojacking and NO OTHER form(s) of malware. What is cryptojacking? How it works and how to help prevent it: Symantec Corporation, 2019.Malware. [Online] Available at:https://us.norton.com/internetsecurity- malware-what-is-cryptojacking.html[Accessed 20 May 2019]. Summary: This resource is about a trending form of malware, cryptojacking that is also known as malicious cryptomining. This resource is explaining about cryptojacking and its working as well. In this context, chosen article study majorly included the definition of cryptojacking along with the procedure of how the malware works. Besides, the resource has presented guidelines about preventing procedure of this malware for keepingthedatasafeandsecure.Theauthor(SymantecCorporation,2019) explained that cryptojacking and cryptomining is clearly an unauthorized usage of a computer,laptop,tablet,smartphoneorotherconnectedhomedevicesbythe cybercriminals in order to mine for the cryptocurrency purposes. Additionally, this study has contained the results of Symantec’s internet security report about cryptojacking threats. Various important ways into which cryptojacking occurs have been explained in this paper. In this way, we found that by using malicious emails are used to install cryptomining codes on a computer so that cryptojackingcanbedone.Theresourcewrittenbytheauthor(Symantec Corporation,2019)hasnarratedtheimportantwaysofdetectingcryptojacking through assessing their symptoms for the prevention and treatment. Besides, the main findings of this resource suggested that a high processor usage or overheating of the devices are the signs of a cryptojacking act(Symantec Corporation, 2019). Therefore through highlighting the cryptomining activities, this paper has presented solutions for many of them. Hence, the author of this resource has explained about themalwareprotectionsoftwareuseinordertopreventcryptojackingor cryptomining. Week 6 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Redundancy is a critical aspect of network design, implemented in order to cope link or equipment failure. One frequent cause of failure is damage to fiber optic cables that connect countries and/or continents. Find and summarise ONE resource that describes ONE example of such a cable being cut or damaged. The resource, and your summary should describe the impacts of A SINGLE EXAMPLE of a link failure. Note that the failure must relate to a link that connects countries and/or continents. City of Meadville responsible for fiber optic cable cut that has caused widespread phone outages: The Meadville Tribune, 2014.City of Meadville responsible for fiber optic cable cut that has caused widespread phone outages. [Online] Available at: https://www.meadvilletribune.com/news/local_news/city-of-meadville-responsible-for-fiber-optic- cable-cut-that/article_62cdbdd5-7481-5dbc-9dd2-0704a77f4c84.html[Accessed 20 May 2019]. Summary: The selected resource is all about redundancy which is a modern engineering concept. In general, redundancy is the replication of important devices as well as functions of any system in order to increase the reliability of that system. Besides, this paper has represented the redundancy concept as the backup or fail-safe, for considerably improving real system performance. In this context, the selected study successfully demonstrated a real example of redundancy while focusing on the aspects of network designing of connecting continents and countries. In other words, it can be said that redundancy is important for making the whole system reliable throughadvanceplanningandpreparation.Hence,thechosenresourcehas highlightedan example where a fiber optics cable got down or damaged due to cutting and damage occurred during some work. The above example of this incident is depicting that even when adhering to proper maintenanceagendas,fiberopticcablemayeasilygetdowninsomecritical circumstances(The Meadville Tribune, 2014). Foran instance, the Meadville Tribune presented a casethat narrated upon the efforts of fixing a fiber optics cable which was damaged by the city officials during a road maintenance act within the city of Meadville,PA.Thus,theselectedarticleexplainedanincidentoftheCityof Meadville where fiber optic cable got damaged and hence caused severe mobile phone outages in the city and outside(The Meadville Tribune, 2014).Therefore, this selected resource has effectively demonstrated the major importance of the concept of redundancy within a network inter-connecting countries or continents worldwide. 7
Week 7 Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning systems) have become critical to the operation of modern organizations. Over this time, ES/ERPs have evolved and continue to change in response to new demands and emerging technologies. Find and summariseONEresource that discusses emerging or future trends for ES/ERPs. The resource should be recent (published since the beginning of 2017) and it and your summary should clearly identify how ES/ERPs are or are about to, change. Title and Reference: Ranjan, S., Jha, V. & Pal, P., 2017. Application of emerging technologies in ERP implementation in Indian manufacturing enterprises: an exploratory analysis of strategic benefits.The international journal of advanced manufacturing technology, 88(1-4), pp.369-80. Summary: The chosen resource is all about enterprise systems which are often termed as enterprise resource planning systems. The author of this article has highlighted the significance of the ERP systems for the day-to-day operations in modern global organizations(Ranjan et al., 2017). It has been found that ERPs have completely changed as wellas continuously changingin response to novel demands and trending technologies.We have selected these resources as it is covering all major findingsof ERP systems as per the updated resources and research. In addition, many important emerging trends in the context of ES within modern organizations have been covered. In this way, a major significance of the article is that identifying the emerging trends in ES will offer several opportunities of learning about what people should do in their workplaces in order to achieve the preferred responses with the help of an ERP system implementation(Ranjan et al., 2017).In this context, an important trend is demands based ERP purchases so that requirements can be fulfilledeffectively.Thediscussiontookplaceinachosenresourcehasalso highlighted another trend that CRM is at the highest priority in a recent global business environment. Apart from this, the author has done an increasing focus on businessintelligenceERPsbeinganemergingtrendintechnology-oriented organizations. In this way, the paper’s findings suggested that cumulative needs for specialized ERP services are trending in these days which require ERP implementation to be 8
adopted from the perspective of better growth of the modern organizations. Week 8 Databases, mass data storage, and interrogation technologies underpin virtually all Information Systems and applications. However, the same tools also make it easier for data breaches to occur in government departments or private companies/organizations. In simple terms, a data breach is where private information is illegally obtained or disclosed.Find and summariseONEresource that describesONEexample of a data breach that has occurred since the beginning of 2017.The resource and your summary should focus purely onA SINGLE EXAMPLEof a data breach. Equifax and the latest round of identity theft roulette: Berghel, H., 2017. Equifax and the latest round of identity theft roulette.Computer, 50(12), pp.72-76. Summary: In the era of digital technologies containing online databases, mass data as well as interrogation technologies, the selected resource is mainly about a real-time data breach. Here,(Berghel, 2017)researched one of the huge data breaches which have been occurred in 2017.The author of this article(Berghel, 2017)conveyeda data breach of Equifaxwhich has shaken the whole nation’s trust and faith. In this context, during September2017,the American creditmonitoring firmEquifax has been exposed a huge data and info breach that majorly influenced more than 143 million consumers of the Equifax. Key information covered in this study is suggesting that data breach by Equifax was happened beacause of a vulnerability in within an open sourcesoftware (OSS)utilised by the firm Equifax(Berghel, 2017).The vulnerable open source software as allowed attackers and hackers for retrieving the confidential data files as well as important info about the Equifax company.In addition to that, Equifaxbreached info was including customer names, Social Security numbers, addresses, birth dates. This discussion has explained that more than 200,000 credit card numbers along with their 200,000 documents containing personal-identifying data about the consumers have been exposed to hackers in this mass data breach (Berghel, 2017).It has been found that post thedisclosure of the Equifax data breach, the CEO, Richard Smith, published a video of confession and apology (Berghel, 2017).In this way, this article has detailed the fact that data breach of the Equifax company has not been handled well and hence hugely criticized by the all 9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Week 9 Agile development is an iterative and incremental approach to delivering systems - it is particularly useful where the requirements are unclear or evolving. Scrum is a framework for undertaking agile development. Find and summariseONEresource that describesScrum. The resource, and your summary should focus purely on Scrum and discuss some of its key features and attributes. Requirements engineering in Scrum framework: Darwish, N. & Megahed, S., 2016. Requirements engineering in Scrum framework.International Journal of Computer Applications, 149(8). Summary: The selected resource is all about a scrum framework in order to understand agile development. In this era, agile development is an incremental method of delivering the requirements which are evolving and unclear. The research article written by (Darwish & Megahed, 2016)has been chosen because it has covered all important points and information about the Scrum framework. the discussion conducted by (Darwish & Megahed, 2016)is suggestingthat the scrum framework evolves sustain complex products effectively.The author also presented that scrum is a framework where individuals may resolve complex adaptive problems, through productively as well as creatively delivering products which carry maximum possible values. In additiontothat,thechosenresourcehassuccessfullyexplainedtheScrum frameworkbeingaproceduralframeworkthatcanbeusedforaccomplishing complex and sustainable product development. It has been found that Scrum is a tactic of developing sustainable products; at the same time with the help of this framework, one can service above than 2 processes and techniques. As per the study conducted by(Darwish & Megahed, 2016),the Scrum framework generates the relative efficacy of any product’s management as well as growth development practices for improving organizational revenues. Apart from this, the main finding of this paper is suggesting that the Scrum framework contains Scrum teams with the associated roles, events, artifacts, and rules as well. Thus, post studying the chosen resource it can be summarised thatScrum being a process- oriented framework describes particular events and roles in the context of agile development.Therefore,theScrumframeworkmightbeadaptedfromany organization, based on their requirements, provided that elementary scrum rules, as 11
well as regulations, are not breached. Week 10 The textbook discusses activities associated with project management. However, it could be argued that project governance is equally important, especially in very large projects. Find and summariseONEresource that describes what project governance is and what activities it entails. The resource, and your summary should focus purely on project governance. What is project governance and what are its origins? : Ahola, T., Ruuska, I., Artto, K. & Kujala, J., 2014. What is project governance and what are its origins? International Journal of Project Management, 32(8), pp.1321-32. Summary: The article chosen over the topic project governance has described the main concept of PG as well as its origins. The selected article is written by(Ahola et al., 2014)and it seemed useful because itexplained the PG concept being set of three key functions contains set directions, makes directions and project oversights. While usingchosenresearchstudyfindings,(Aholaetal.,2014)hasexplainedthe significanceofaleaderintotheprocessofPGforanybigorsmallproject completion. A leader knows the right thing to do for the successful achievement of the projects. In additionto that,the research paperfocused on the requirements of setting direction by considering small-term as well as long-term goals. The author states that PG includes tools of governance in order to effectively ensure compliance while using an implementation standard(Ahola et al., 2014).Besides, this study revealed that PG mechanism is usually ineffective if there is no relation among groups that are tangled into a relevant project. The main findings of this article are suggesting that the roles of PG framework are listing three PG entailments containing executive sponsor, steering committee, as well as project manager(Ahola et al., 2014).In this way, this study has successfully demonstrated an understanding of the concept of PG from the perspective of modern organizational projects(Ahola et al., 2014). Furthermore, it has been found that PG is a basic process for accomplishing a project successfully and within the set timelines. 12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References Ahola, T., Ruuska, I., Artto, K. & Kujala, J., 2014. What is project governance and what are its origins?International Journal of Project Management, 32(8), pp.1321-32. Berghel, H., 2017. Equifax and the latest round of identity theft roulette.Computer, 50(12), pp.72-76. Chrane, C. & Kumar, S., 2015. An Examination of Tor Technology Based Anonymous Internet.Proceedings of the 15th informing Science Institute International Conference. Darwish, N. & Megahed, S., 2016. Requirements engineering in scrum framework. International Journal of Computer Applications, 149(8). Ewing, S., Rennie, E. & Thomas, J., 2015. Broadband policy and rural and cultural divides in Australia.Digital divides : The new challenges and opportunities of e- inclusion, pp.107-24. Kai, Z., En, C. & Qinquan, G., 2010. Analysis and implementation of NTFS file system based on computer forensics.Second International Workshop on Educational Technology and Computer Science, 1, pp.325-28. Liu, C. & Chen, H., 2009. Network Attached Storage.U.S. Patent Application, 29(250), p.435. Ranjan, S., Jha, V. & Pal, P., 2017. Application of emerging technologies in ERP implementation in Indian manufacturing enterprises: an exploratory analysis of strategic benefits.The international journal of advamced manufacturing technology, 88(1-4), pp.369-80. Symantec Corporation, 2019.Malware. [Online] Available at: https://us.norton.com/internetsecurity-malware-what-is-cryptojacking.html [Accessed 20 May 2019]. The Meadville Tribune, 2014.City of Meadville responsible for fiber optic cable cut that has caused widespread phone outages. [Online] Available at: https://www.meadvilletribune.com/news/local_news/city-of-meadville-responsible- for-fiber-optic-cable-cut-that/article_62cdbdd5-7481-5dbc-9dd2-0704a77f4c84.html [Accessed 20 May 2019]. 13
MARKING SHEET - DO NOT DELETE Criteria 0No Response <=1Poor resource selection; resource is too broad or lacks relevance to the task; summary fails to explain what the resource was about; the relevance and/or usefulness of the resource has not been explained. <=2Good resource selection; resource is relevant to the task; summary is adequate but may require either more detail or is too long; the relevance and/or usefulness of the resource has been explained to some extent, but needs additional information. <=3Excellent resource selection; resource is highly relevant to the task (the resource is probably highly specialised); summary is detailed yet concise; the relevance and usefulness of the resource selection has been clearly explained. Key Deductions -3 -2 -1 Reference/URL provided does not link to resource (and resource cannot be located or determined from details provided) OR Reference/URL provided does not relate to the summary (i.e. summary is not of resource content/contains content not contained in the resource) OR Multiple resources used for a single task Resource is generic AND/OR covers multiple technologies/examples rather than focuses on a single technology/example Resource not referenced correctly/not in Harvard format WeekMarks Awarded 1 2 3 4 14