COIT 20246 Assignment: Modern Computing Architecture and Networks

Verified

Added on  2020/04/01

|17
|4104
|228
Homework Assignment
AI Summary
This assignment, submitted for COIT 20246, addresses several key areas within computer science, including computing architecture, operating systems, network protocols, and security. The student analyzes resources on quantum computing, operating system development, internet evolution, Layer 2 protocols, and hacking incidents. The assignment involves summarizing articles on Scott Aaronson's work on quantum computing, James MacKinnon's article on the Linux operating system, and resources on virtualization, the TPA transport protocol, and the Anonymous Philippines hackers. The student also examines a resource on future networking technologies, specifically focusing on the impact of data center fires. Each section requires the student to summarize a resource, providing titles, references, and brief explanations of the selected materials and their relevance to the course topics, demonstrating an understanding of the evolution and current state of computer science and networking.
Document Page
1
COIT 20246
Name
Course
Professor
School
City
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Document Page
3
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference: The limits of Quantum computers
Aaronson, S., 2008. The limits of quantum computers. Scientific American, 298(3), pp.62-69. Accessed
At: http://www.cs.virginia.edu/~robins/The_Limits_of_Quantum_Computers.pdf
Summary:
The limits of Quantum which is written by Scott Aaronson talks about the
quantum computers that are an exceptional when it comes to efficiency when
performing various tasks. This emerging technology may lead to new fundamental
physical principles. This topic of quantum computing has been the emerging and
widely talked topic in 21st Century. In quantum computing there is use of the
computational process that utilizes the quantum mechanical concepts that is totally
new comparison to what is used in the digital computer.
I have selected this resource article since it offers completely new concepts
and there has been development in the quantum computing field especially in the
Architecture part and the link associated to the other computing technologies.
Additionally, this subject would offer insight on the security aspects and the future
development in the Quantum computer subject.
The main information that has been covered in this resource is the quantum computer systems
that seeks to take advantage of the strange rules of the quantum regulations when it comes to
processing of the data in numerous ways in which are not possible to the basic standard computers.
Furthermore, this resource emphasizes on how exactly numerous problems could be solves such as
factoring the integers. The resource in addition has covered on data for the analysis on the
quantum computers which surpasses the conventional computers.
The article has been very useful particularly to me since I will be able to know the
exotic alteration especially in the laws of physics that are useful especially in
Document Page
4
construction of the quantum computers.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONE such individual. The individual should have had a significant
influence on the writing or development of operating systems.
Title and Reference: Linux operating system
MacKinnon, J.G., 1999. V_sX, t'AI. J. Appl. Econ, 14, pp.443-452. Accessed At:
http://qed.econ.queensu.ca/pub/faculty/mackinnon/papers/linux-review.pdf
Summary:
The individual who has written on this article is James Mackinnon. The article is regarding the
Linux operating system. The resources is focused on the Linux distribution for Debian GNU. This
distribution involves the following; the flash, Java in addition to a few of the widely used without any
cost closed source software. In the article it clearly expound on the open source software as well as the
program where the source code is free particularly from the internet. The concentrate of the article is
on Debian since it comes with some very useful packages as comparison to the other distributions of
the Linux. It has been found that this distribution is very suitable especially for the econometricians. It
is non-commercial and there are very many volunteer across the globe who are involved in maintain it.
The purpose as to why I selected this distribution is because of the fact that it
is not for commercial purpose and it is one of the most familiar compared to the other
kind. Additionally, one is able to understand this distribution much easier since there
are many individuals who are solely devoted to make it easier.
The main point which are highlighted in this resource are on the features as
well as the merit of the distribution. One of the merit is that it can be much easier to
install Debian GNU especially when the hardware has been obviously identified
which is well supported. A few of the further merits are the distribution is
significantly stable and one is able to multitask. In the article it highlight various
advantages as well as the features of the distribution. Moreover, there is also the
concepts on the applicability of this distribution particularly to the econometric as
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
well as the software for statistics.
This resource has been useful since it has provide an insight on the different
types of features and merits of the Debian GNU distribution. Being a learner am able
to understand the different types of distribution particularly in the Linux operating
system.
Document Page
6
Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONE of the networks that led to the development of the
modern Internet.
Title and Reference: Bare-metal performance
Gordon, A., Amit, N., Har'El, N., Ben-Yehuda, M., Landau, A., Schuster, A., & Tsafrir, D. (2012).
ELI: bare-metal performance for I/O virtualization. ACM SIGPLAN Notices, 47(4), 411-422. Accessed
At: http://hypervisorconsulting.com/pubs/eli/eli.pdf
Summary:
This resource which I looked at highlights about the virtualization hypervisor software to the
various forms. The article has provided insights on differences between the hosted and the bare-metal
virtualization hypervisor that has various uses.
The reason as to why I choose this article is that it offers information in regards to the concept
of virtualization. It has provided various features along with the advantage on the use of this form two
of the virtualization item. This resource assist one in comprehending the variations that happen
between the hosted and the bare-metal virtualization hypervisor additionally, from the resource it is
possible to understand the best use of each virtualization software, its costs and the features. The
resource has also offered the major virtualization vendors as well as the advantages and disadvantages
of each to permit one consider diverse features for the hosted virtualization before one takes a decision.
The major key information that are discussed on the resource article is how an
individual could choose virtualization on things to consider for example the cost,
characteristics as well as the merit of each of them.
This resource has been very helpful especially in the provision of an awareness on the kind of
two virtualization software program on the market. Furthermore, it has aided me to identify the ideal
choice of the virtualization depending on components for example the characteristics, advantages as
well as the costs.
Week 4
Document Page
7
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference: TPA a transport protocol layer for the Ad hoc Networks
Anastasi, G., Ancillotti, E., Conti, M. and Passarella, A., 2005, June. TPA: a transport protocol for ad
hoc networks. In Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE
Symposium on (pp. 51-56). IEEE. Accessed At: http://cnd.iit.cnr.it/andrea/docs/iscc05.pdf
Summary:
This resource article task highlights on the TPA transport protocol application for what is
regarded as the Ad hoc Networks. The author resource highlights on the TPA that was adapted, for the
sole attribute on the MANET environment. Such kind of protocol is only found to the complete new
congestion control approach that is created in approach to reduce on the variety of ineffective
transmission thus there would be certainly power consumption. This article has elaborated on the
congestion control method to be able to reduce variety for inefficiency transmission thus there is
certainly consumption of power. This article has elaborated on the concept of TPA protocol when it
comes to the static scenario that TCP highlights on the sound efficiency. When it comes to the
stimulation performance it highlights that even just situation the TPA outperforms on TCP. Moreover,
it is evidence that the research has majorly focused on the transport protocol on its customization
particularly on the MANET environment that provides dependable especially in well-connected
oriented kind of route changes that may arise as a result of the mobility of the nodes.
I have selected this resource because of the fact that it is possible to learn the
solutions for the poor performance when it comes to aspect such as the mobile Ad hoc
networks while using TCP control. This research offer alternatives to solving issues
and enhancement of the performances to the protocol as regards to dependence of
TCP. The use of the TPA protocol provides solutions especially on the issue of
congestion in the redesign of control mechanism hence implementation
retransmissions, which are useful in the conversing of the power.
The main key information would be to examine how the TPA protocol is helpful especially in
solving of the problems for the poor efficiency particularly in the mobile Ad Hoc Networks. This
resource provides majorly specializes in the TPA performance assessment by means of the provision of
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
connection that could be dependably oriented type of the service compared to the other layer protocol.
The resource continues to be very useful as I have learnt how you can improve on the poor
performance that are exhibited in the mobile Ad Hoc Networks. Additionally, one is able to learn about
the other kind of protocol apart from the major known one UDP or TCP.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference: Philippines Voter Data Leak
Leisha (2016), ‘Philippines elections hack leaks voter data’. Accessed At:
http://www.bbc.com/news/technology-36013713
Summary:
This resource is about how the hackers breached into the government asset on
Philippines Commission on Elections and stole personal information, which included
the fingerprint data as well as the passport data that belonged to over seventy million
individuals. This was the worst data leak that happened in 2016, the hackers
responsible for this are called Anonymous Philippines and Lulsec. The article
highlights further that the entire database of 340 GB of the Comelec was linked
online.
I have selected this resource article since it offers insights when it comes to
the issue of the cyber security threats particularly to the state department. These
hackers compromised the data of the Philippines commission on the elections.
The main key information on the resource was the aspect of the cyber security
attack in the Philippines commission on the elections and the responsible individuals
for the attack were Anonymous Philippines and Lulsec.
The resource is useful since one is able to learn scenarios on how the breach of
Document Page
9
system occurs as well as approaches to be able to keep the system secure via the
encryption mechanism or perhaps other security measures to keep the asset more
secure from the vulnerability that could be exploited by these individuals.
Document Page
10
Week 6
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Title and Reference: Fire knockdown data center
Sebastian M., 2017. Australian data center fire knocks out unisuper. Accessed At:
http://www.datacenterdynamics.com/content-tracks/security-risk/australian-data-center-fire-knocks-
out-unisuper/98300.fullarticle
Summary:
This resource article is about how fire left the Australian superannuation provider UniSuper in
accessing their accounts after at Port Melbourne data center. This fire triggered partial system to shut
down. There was a number of their systems and the services were impacted. This organization offer
superannuation services to more than four hundred thousand workers of the Australia higher education
as well as the research sector which has more than 56.8 billion Australian dollars in terms of assets.
This resource article has been selected since it highlights how numerous
incidences have happened in the information centers where there volume of data that
are lost as a result of the fire. The data which is provided in this resource also
highlights on how fire and the catastrophic impacts it could do particularly for the
vital government services might bring down the centers of the data.
The main key point that have been highlighted in the resource is that
Australian provider UniSuper were left in accessing their accounts after there was the
incident of fire from compromising on their ICT infrastructure. This event caused this
crucial limited to the outage of the telephony system and the member online portal
from being affected.
The resource has been useful since it give one to think about the big question
over the safety of the data. Moreover, it provides insight on ways to prevent data from
being affected from similar incident such as minimizing the data center from impact
of fire with the suppression systems.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
Week 7
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
Title and Reference: Crowdsourcing in NATO organization
Negoitescu, D., and Blaydes, M., 2014. Crowdsourcing solution is Nato Ready? The Three Swords
Magazine. Accessed At: http://www.jwc.nato.int/images/stories/threeswords/crowdsourcing.pdf
Summary:
The resource article is about crowding in the NATO organization. In the
article it highlights that crowdsourcing has been new and very powerful way when it
comes to utilizing of the social media to be able to solve problems. This article is all
about the NATO organization that utilizes the crowdsourcing technologies. It
highlights how they are using such technology especially to their politico-military
activities. Based on the views of the author, he believes that the use of such
technology could be applied to many of the business with the sole purpose of solving
various problems. The use of the crowdsourcing technology enable increase on the
forces of the connectivity and the member resource.
I have selected on this resource article since it highlights on how to adopt to
the crowdsourcing technologies particularly to the connectivity of individuals as well
as solving of the problems. The focus is to why organization needs to adopt on crowd
sourcing technologies as well as the benefits to the firms.
This resource has proved to be very useful as the information it offers the benefits which are
associated to the crowdsourcing technology particularly on the social networking. The usage of this
technological know-how permit the business to have the ability to coordinate on the human endeavour,
that help in the social interaction in addition to empower on the creativity together with dealing with
the problem that are prospective issues in the business .
This resource highlights on how exactly the transformational power tool for example
Document Page
12
the in the domain of selection of the action in addition to the content creation.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Title and Reference: Wong Hack
James T., (2017). Wonga hack: How to know if you are affected and what to do about it. Accessed At:
http://www.telegraph.co.uk/technology/2017/04/10/wonga-hack-know-affected-do/
Summary:
The resource is about the massive data theft for the Wonga organization in
which could have hit as many as two hundred and forty five thousand customers that
included the account numbers as well as the sort codes.
The information which was stolen was the customer account numbers as well as the
sort codes. According to Wonga they believed that the full names, the email addresses
as well as the phone numbers along with four digits of their debit card was also stolen.
I have selected this resource due to the fact that this is a big issue especially in
the business today. This highlights how the breach of the data took place in the Wong
organization. The data of the client was breached and some usually information was
stolen.
The key aspect of this resource article has been the compromise of the
customer data which has caused negative effects particularly to the brand of the
organization. Moreover, in this organization has highlighted that their obligation has
been to protect the information of the customer and they are working with the security
organization and the law enforcement to be able to determine on the level of the
damage that was caused and how they could resolve it to prevent similar situation in
future.
Document Page
13
This resource has proved to be very useful since I have been able to learn
various ways that the company could their data safe and the appropriate approaches
that exists to prevent the occurrence of such events.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
14
Week 9
One of the greatest success stories in application development in recent times has been the
popularity of mobile apps. Find and summarise a resource that describes the story of ONE
successful mobile app developer.
Title and Reference: Downfall of Kodak Company
Mui C., 2012. How Kodak failed. Accessed At:
https://www.forbes.com/sites/chunkamui/2012/01/18/how-kodak-failed/
Summary:
The resource is about the strategic failure of Kodak to adapt to the technology lead to the
downfall of the company. This was the cause of the Kodak decade long decline to the digital
photography which destroyed on their business model. In this resource it highlights how the
management of Kodak was unable to see the digital photography as the disruptive technology, and they
failed in adapting to the established business model with the use of the digital photography which had
potential capability.
I have chosen this resource to provide an insight on the importance of adapting
to changes in new innovation especially to the disruptive technology. The
organization should adapt to the changes in technology especially in this era where
there has been revolution of the technology in every sector.
The main key ideas of the resource is about how the new technology
(disruptive) can impact an organization either positively or negatively. Kodak
organization failed in taking decisive action to be able to combat on the challenges in
the business through adapting to the digital photograph technology. The organization
did little in preparing for the later disruption. They did not prioritize their problem
towards turning them to opportunities for the advancement of the technology rather
than the founder George Eastman, investing in color film rather than the digital
photography.
This resource is useful since it offers some insights on the use of poor
strategies particularly in the digital era might impact on the business in negative way.
The organization lack of adapting to this new technology lead to its long decline
Document Page
15
downfall.
Week 10
While information systems and technology deliver many benefits to society, they can also
result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a
resource that describes ONE example of where the use of an information system or
technology has led to negative consequences for humans.
Title and Reference: Myki ticketing system failure
Alex. W., and Matt. J., 2015. Myki ticketing system failure revealed in leaked business case. Accessed
At: http://www.heraldsun.com.au/news/victoria/myki-ticketing-system-failures-revealed-in-leaked-
business-case/news-story/b114ea522aa55a4fe8f39190690bb557
Summary:
The resource is about Myki project which involved the Victorian transport Ticketing
Authority which they intended to replace the Melbourne existing ticketing system with the use off the
smartcard system that would enable the passengers to touch on and off to all the trams, trains as well as
in the buses through the transport grid in Metropolitan. The project was a failure as it suffered various
issues from initial beginning since the assembled TTA members they lacked sufficient skills when it
came to dealing with the important ICT project as they lacked detailed knowledge of the transport
ticketing environment.
I have chosen this resource since it provide insights as to why the complex big
ICT project fail. In this case the failure was because of lack of the TTA members
lacked skills to deal with the project. There was also the issue of unnecessary
complexities of the contract as the TTA as well as the selected vendor negotiated on
the outcomes that entailed on the documentation exchanged between the parties via al
the process of tendering.
The major key point on this resource is it offers some insight on why major
ICT project fails such as this case of Myki system which failed and it cost significant
amount of money which was above the previous projected cost.
This resource article highlights how the big and complex ICT project such as
Document Page
16
Myki failed as a result of lack of expertise of TTA members in dealing with major
project. From the resource I have learnt that any slight failure of a single component
of a major project could lead to the entire failure or delay in the project completion.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
17
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
chevron_up_icon
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]