COIT 20246 Assignment: MIMD, SIMD, IoT, Deadlock, IPv6, Dual Stack

Verified

Added on  2022/11/09

|16
|5014
|252
Homework Assignment
AI Summary
This COIT 20246 assignment comprises ten tasks, each focusing on a specific week's topic. The assignment requires students to find and summarize online resources related to various computer science concepts. Week 1 focuses on comparing MIMD and SIMD architectures, highlighting their differences in instruction and data streams and their implications for parallel processing. Week 2 addresses deadlock prevention algorithms, specifically the one-shot algorithm, explaining its mechanisms to avoid resource allocation issues. Week 3 explores the Internet of Things (IoT) applications in smart farming, detailing how IoT technologies are used to improve agricultural practices. Week 4 examines technologies for running IPv4 and IPv6 simultaneously, focusing on dual stack technology. The summaries provide detailed explanations of each resource, including their relevance, key points, and usefulness in understanding the concepts. The assignment underscores the importance of citing and referencing materials using the Harvard format and emphasizes the use of original words rather than direct copying from resources.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Example
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used – both positively and negatively – in the future.
2
Document Page
Week 1
The text discusses different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource and your summary must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
SIMD and MIMD
techdifferences.com. (2019) Difference between SIMD and MIMD [ONLINE]
Available from https://techdifferences.com/difference-between-simd-and-mimd.html
[Accessed 16/09/2019].
Summary:
This resource states various areas amid MIMD and SIMD architectures and I
prefer this resource as it explicitly defines both MIMD and SIMD in details with
its associated aspects i.e. instruction and data stream.
The author has described SIMD (Single Instruction stream, Multiple Data
stream) as an arrangement of parallel architecture where a single instruction
is executed to a cluster of the data stream. On the contradictory side, MIMD
(Multiple Instruction Multiple Data Stream) comprises of systems having
various processing units and data streams. There is more efficiency in MIMD
as compare to SIMD, however, is considered as one of the most complex
configurations.
MIMD and SIMD can be differentiated in terms of mechanism and processing
as there is a synchronous mechanism in SIMD, whereas, in MIMD, there is
asynchronous processing in relation with numerous communication driver.
There is also requirement of less memory in case of SIMD as only one copy
of program is kept. However, MIMD requires more amount of memory and so
also costlier than SIMD due to decryption of each memory element. Ultimately
in overlapping of uniform control unit, SIMD provider’s higher performance but
MIMD performs greater in non-uniform CU overlap. Therefore, both have
processing used for Multiprocessor Machines equal importance in their respective
area processing used for Multiprocessor Machines in different architectures.
I can effectively say that this article is valuable as it clearly states about MIMD
and SIMD with providing a clear glimpse to choose which architecture is
better in which area. It also highlights some major similarities and
3
Document Page
dissimilarities.
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Deadlock Prevention Algorithms
cs.uregina.ca. (2018) One-shot Algorithm [ONLINE] Available from:
http://www2.cs.uregina.ca/~hamilton/courses/330/notes/synchro/deadlock-
ex.html [Accessed 31/08/2019].
Summary:
This resource states various sorts of algorithms in deadlock prevention and I
prefer this resource as the algorithms are stated in series of steps making any
user easier to understand.
One-shot Algorithms with example –
if process P has ever acquired any resources before, then
refuse the request
else if any resource R1, ... Rn does not exist then
refuse the request
else
{
if any resource R1, ... Rn is not free, then
wait until all resources R1, ... Rn are free
end if
grant process P exclusive access to resources R1, ... Rn
}
end if
For example,
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Think an individual requires board and marker to write.
Person P1 needs board and marker and person P2 also needs board
and marker.
Board and marker are requested by person P1 and person P2 also
requests market and board.
From one of P1 and P2, only one will be granted the resources.
Suppose it is P1. Hence, it is mandatory for P2 to wait.
Board and marker will be used by person P1 until ended.
Now, board and marker will be released by person P1.
Because the resources that P2 was waiting for are free, P2 is approved
both the board and marker.
Person P2 uses the board and market until end.
The board and marker will be released by Person P1.
P2 will be allowed to use both marker and board as the resources that
P2 waiting for are free.
Until end, the board and marker will be used by person P2.
At last, Board and markers will be released by person Ps.
This article is beneficial it clearly states the deadlock prevention algorithms
with explaining an effective example.
5
Document Page
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected
embedded technologies that allow us to monitor and control our environment. Find
and summarise ONE resource that describes applications of the Internet of things
in the field of Smart Farming. The resource and your summary must focus on
application of IoT ONLY in the field of smart farming.
Title, Link and Reference:
Internet of things in the field of Smart agriculture
Gorli, R. and G, Y. (2017). Future of Smart Farming with Internet of Things. Journal of
Information technology and Its Applications. 2(1). pp.27-38.
(https://www.researchgate.net/publication/323244229_Future_of_Smart_Farming_with_Int
ernet_of_Things )
Summary:
This resource offers clear meaning of IoT and its various uses in agriculture
area. I prefer this resource as it accurately defines many IoT applications
relying on farming and its impact in future.
The resource defines that IoT has the capability to influence the industries
doing technological advancements, urban and rural areas and the world
where we consumer various things in the marketplace. From future
perspectives, there will be noteworthy rise in the farming practices to satisfy
the needs of world population. Considering statistical reports, the population
of the world by 2030 will be increased by 7.3 billion.
Adopting IoT based farming can help in various situation such as
environmental issues, as it can create smart farming concept linked to IoT
benefit in reducing waste and increasing productivity. Smart farming can be
defined as adopting of IT technology in the agriculture such as sensors that
help in observing crops in the area from perspective of light and humidity,
soil moisture and so forth. Some of the significant use in IoT farming
includes smart greenhouse, drones, watching of livestock and precise
farming. For example, many types of fertilizers can be spread by drones
during the agriculture practice and it can also be used for various types of
security purposes. Executing various application in association with IoT in
greenhouse can be said as more effective than conventional means as it
consistently evaluation the condition of all the parameters requirements for
6
Document Page
the corps production.
The resource was found to be beneficial as it explicitly defines about many
IoT applications that can be exploited in future to save environment and
farming.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that
describes about the technologies that are used to run both protocols
simultaneously over the same internet infrastructure.
Title, Link and Reference:
Dual Stack to run on both IPv6 and IPv4
Jain, V., Tiwari, D., Singh, S. and Sharma, S. (2018) Impact of IPv4, IPv6 and Dual Stack
Interface over Wireless Networks. International Journal of Computer Network and
Information Security, 10(4), p.65.
(https://www.researchgate.net/publication/324477841_Impact_of_IPv4_IPv6_and_Dual_St
ack_Interface_over_Wireless_Networks)
Summary:
This resource states about the technology that can run both protocols
simultaneously and the name of this technology is dual stack. I prefer this
article as it starts with explaining about dual stack technology from various
perspectives and undertake many diagrams for effective gaining information
about the technology and its association with IPv6 and IPv4.
Over time, implementation of IPv6 protocol has been significantly increased
and the old protocol i.e. IPv4 applications use is decreasing considering
front end and back end network in relation with front and back end
applications.
Considering background, IPv6 deployments increase over time, the natural
next step will be decreasing the role of IPv4 and back ends networks of
management and front end applications.
Dual stack technology enables a device interface to operate both IPv4 and
IPv6 protocols so it can communicate with both types of networks. Along
with the infrastructure, both of protocol is totally executed and every aspect
of it needs to comprise both IPv6 and IPv4. With regards to this, systems,
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
switchers, routers and other devices drive Ip4 and Ip6 in Dual-IP stacks with
gaining effective assistance from various significant vendors of networks
and operating systems. Dual Stack can be proved to be an ultimate
resolution however there are two execution barriers faced by companies
and ISPs. For instance, there are various challenges associated to software
and hardware updates in the existing infrastructure network that has the
power to deploy Ipv6. In addition, there is also requires activation of IPv6 on
various network elements and to meet the needs, the existing network must
be reformed.
This resource can be accommodating as it gets me aware about various
related concepts of dual stack technology and with connection to the two
mentioned protocols.
Week 5
Network security has become a major concern of the ICT world, and user
authentication is one of the popular tools to assure network security. Find and
summarise ONE resource that describes any ONE authentication mechanism
except password. The resource and your summary should focus purely on ONLY
ONE type of authentication mechanism.
Title, Link and Reference:
Authentication Mechanism
Saevanee, H., Clarke, N., Furnell, S. and Biscione, V. (2015) Continuous user
authentication using multi-modal biometrics. Computers & Security, 53(1), pp.234-246.
(https://pearl.plymouth.ac.uk/bitstream/handle/10026.1/3033/2014Saevanee10263960PhD.
pdf?sequence=1)
Summary:
This resource states about one of the standardised authentication
mechanism known as biometric authentication and I prefer this resource as
it clearly defines various types of biometric authentication and their
applications.
Biometric authentication mechanism system includes various means to
assure network security such as fingerprint scan, face scan, retina scan and
voice recognition. Its uses and accessibility can be measured by various
smartphone companies’ practices as they are using this security
mechanism with hardware support in the smartphones. Not only this, it is
8
Document Page
also used by various other industries too in relation to secure their product
as per consumer convienience.
Through a secured cryptographic protocol, individual local authentication to
the device can be communicated to a server within standard architecture. It
shows that the days of username and password combinations are coming to
an end due to this next-generation authentication mechanism.
Biometric authentication has been extensively viewed as the most foolproof
or at least the hardest to spoof authentication mechanism relying on several
physical characteristics of the user. Some of the major types of biometrics
include signature dynamics, typing patterns, eye scans, fingerprint
recognition, facial and voice recognition. However, due to the ease of use
and convenience, fingerprint authentication is becoming technology of
greatest choice. For instance, many numbers of computer peripherals and
notebook PCs are coming with built-in fingerprint options allowing user to
retain encrypted passwords as their unique fingerprint style with offering two
factor authentication.
This resource can be accommodating as it gets me aware about different
types of biometric authentication mechanism and its importance in
comparison with conventional authentication mechanism systems.
9
Document Page
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary should describe A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
National Australia Bank Security Breach
Anantharaman, M. (2019) Australia's NAB says 13,000 customers' personal data breached
[ONLINE] Available from https://www.reuters.com/article/us-nab-cyber/australias-nab-says-
13000-customers-personal-data-breached-idUSKCN1UL16P [Accessed 16/09/2019].
Summary:
This online resource states of data breach at Australia fourth largest financial
institution i.e. National Australia Bank and I prefer this resource as it is
happening just 3 months back and the issue was a human error.
In July (2019), National Australia Bank publicly states the data breach with
contacting 13,000 customers who were being impacted including with their
personal information provided into their account was set up uploaded without
authorisation, to the servers of two data service organisations.
The Chief Data Officer at National Australia Bank has stated that the issue
was human error and in breach of NAB data security policies. He also stated
that the information that was uploaded includes names of the customers, their
contact information, DOB and in some scenarios, it also included the
government identity number.
However, the data service organisations informed the institution that the
information they received was deleted within two hours.
All the 13, 000 users whose information was uploaded were calling, emailing
and writing by NAB individually with a special support team in place available
to them 24/7. The institution was also found to conceal the cost of
independent, improved fraud detection identification services for affected
users. In addition, there were also no casualty or sign that the information has
been further disclosed or copied.
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
This resource can be said to be beneficial as it can help other business firms
to look into their security protocols as being a big institution in finance
industry, the security measures and standards have been failed.
Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary should describe similarities and difference between
e-commerce and e-business.
Title, Link and Reference:
e-commerce, e-business
Mazzarol, T., 2015. SMEs engagement with e-commerce, e-business and e-marketing. Small
enterprise research, 22(1), pp.79-90.
(https://www.researchgate.net/publication/276927460_SMEs_engagement_with_e-
commerce_e-business_and_e-marketing)
Summary:
This resource states about various relationships between e-business and e-
commerce and I prefer this article as it explicitly defined how e-commerce is
known to be e-business and what are the key variations and similarities.
To maintain online existence, both e-commerce and e-business adopt the
applications of service-oriented website. The main aim of e-commerce
webpage for any user or business firm is to make the product sell in the
marketplace however on the other side, customers get necessary information
through the e-business webpage regarding about service or product so that to
takeout a better purchase decision. This shows that only online transactions
occurred in e-commerce unlike e-business which includes extensive choice
and arrays of other activities. E-commerce and e-business both operate over
internet and where all business proprietor receives all significant benefits in
terms establishing user base and earning revenue. For instance, using e-
commerce facilities, business can sell their products globally with receiving
payments through electronic medium and deliver consumers a sense of
convenience. On the other hand, E-business has automated and streamlined
internal processes for e-commerce and thus raise levels of collaborations.
This resource can be said to be helpful as it helps to know the exact
relationship and differences of information in summarised form. For instance,
11
Document Page
whenever I will go in future for online shopping, I can give name to the activity
as e-commerce and whenever I went for comparing two products or brands
(like to decide which brand laptop should be purchased), it can be called as e-
business activity.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud.
Find and summarise ONE resource that describes the success story of adapting
SAP HANA by another local or international company. The resource, and your
summary, should focus on the story about ONE single company (which is not ARI
company).
Title, Link and Reference:
SAP S/4HANA implementation in ENEL
sap.com. (2018) How does a global energy provider scale in the cloud to meet goals and
compliance [ONLINE] Available from https://d.dam.sap.com/m/x9k6ZDv/ENEL_%20How
%20Does%20a%20Global%20Energy%20Provider%20Scale%20in%20the%20Cloud
%20to%20Meet%20Goals%20and%20Compliance_.pdf [Accessed 17/09/2019].
Summary:
This resource defines the importance of adopting SAP S/4HANA to gain
high development. I prefer this because ENEL organisation recently
adopted this platform to meet its compliance and thus help in gaining
contemporary information in relation to this new platform.
ENEL, an international utilities giant, initiated an innovative program to
transfer its IT environment from on premise to the cloud and enable its
digital transformation. With implementing SAP S/4HANA, the company aim
to enhance its billing cycle speed with the purpose of handling more than
one million printed statements per hour and fulfil with authorities of Italian
regulatory. However, it was a challenge to implement this cloud based
solution but ENEL depends on association with SAP Digital Business
Service to manage this transition.
Some of the key benefits for the company with implementing of this platform
include – decrease billing process time by 50%, improve cash flow, increase
processing of invoice, decrease the number of exception and enhance
12
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]