Analysis of Network Storage, Security, and Development

Verified

Added on  2025/05/04

|12
|4634
|166
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
COIT 20246 ASSIGNMENT SUBMISSIONS
Due date: Thursday Week 11 (2 PM AEST)
Part: Written Assessment
Weighting: 30% total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments, they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource and your
summary must focus on either NAS or SAN, NOT BOTH.
Title and Reference: Network attached storage architecture
Reference- Gibson, G.A. and Van Meter, R 2000, ‘Network attached storage
architecture’, Communications of the ACM, vol. 43, no. 11, pp.37-45.
URL Resources- https://www.cs.cmu.edu/~garth/CACM/CACM00-p37-gibson.pdf
This article follows the complete function of NAS is the simple fixed-size block. With
the help of the NAS service abstraction of the data, the path provides the interface
network mechanism. The main cause of the NAS selection is NAS provides the
software application for the specific interface disks. In the NAS mechanism
application of the web-based design is high, the capacity of the storage is high
demand according to the user requirement and this mechanism is simple to use. The
main resources of this application are reducing the capacity of waste and provide a
high rate of the availability of the user data.
Author of this article is determining the proper functionality of the NAS protocol is to
increase the sharing capacity of the user data for the client. All the pooling devices
are directly connected to the server of storages. All the user data is stored in the
attached device and reduce the waste. In the NAS mechanism according to the client
requirement create the structure of the software on the basis of the changes of the
dynamic.
In Monitor of the passive addition, NAS is the useful vendor of the network design
with the help of them improves the data sharing capacity form one network
application to another network application. Storage of the network capacity is
depending on the server application (Gibson et al. 2000, pp. 38).
Article paragraph determines the complete information of hardware component and
software component and the author justify the complete framework of the network
design with the use of them increase the storage capacity. Discovery of the
resources in the NAS protocol identifies the bandwidth of the network protocol.
I thought this article protocol is very helpful for identifying the control of the network
connection in the NAS mechanism is modified with the use of the addressing section.
The NAS mechanism is very useful for the file attributes parameters in the block of
the data application. Different type of the multiple disks is attaching with the data
centre application and increases the data transparency rate of the network junction.
2
Document Page
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource and your summary must focus on A SINGLE file
system.
Title and Reference: Directory Compaction Techniques for Space Optimizations in
ExFAT and FAT File Systems for Embedded Storage Devices.
Reference- Munegowda, K., Raju, G.T. and Raju, V.M 2014, ‘Directory compaction
techniques for space optimizations in ExFAT and FAT file systems for embedded
storage devices’, International Journal of Computer Science Issues (IJCSI), vol. 11,
no. 1, p.144.
URL Resources- file:///C:/Users/Administrator/Downloads/KMG-IJCSI-published-paper.pdf
This article justifies the proper information of the Extend file allocation Table (ExFAT)
is the device of storage in the system of file. In this mechanism 32 GB of the flash
card storage capacity for the file system. With the help of this mechanism increase
the space capacity for the user in the system of file. For the electronics instruments
use this protocol for the storage capacity of the data mechanism.
Author of this article locates the multimedia facility is provided with the help of this file
system. The main cause of the selection for this application protocol is it provides the
strong storage file capacity with less cost application. ExFAT is also in a small range
of size use much instrumentation use this file system protocol for storage capacity.
Management of flash file block algorithm is also managing through the ExFAT
application.
Monitoring of the addition passive represents the concept of this application protocol
is depending on the cluster application for store the user file data and application. A
heap of the cluster is the combination of the data bit. Status of the system file is
depending on the capacity of the bit formation in the block structure. For the different
system of operating use this file mechanism for store the information.
Paragraph of this article determines the protocol of the direction of the cluster is
justified according to the allocation of the fixed rate. ExFAT is the platform which
improves the performance of the system of the file during the data application of the
cluster protocol (Munegowda et al. 2014, pp. 144).
I analysis this article is very helpful for determining the concept of a system for
entries of the file in the system of operating and with the help of theme extension of
the file uploading is high. The cluster of the file application is determining the flat rate
in the operation system. Heap rate of the cluster protocol application rate is totally
depending on the allocation table of the file formatting system.
3
Document Page
Week 3
The National Broadband Network (NBN) is currently being rolled out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource and your summary must focus on A SINGLE technology.
Title and Reference: Regulating Service Providers' Access to an FTTN Network
Reference- Campbell, L.H. and Holmes, J.R 2008, ‘Regulating service providers' access to
an FTTN network’. Media International Australia, vol. 127, no. 1, pp.21-26.
URL Resources- https://journals.sagepub.com/doi/abs/10.1177/1329878X0812700106
This article represents the basic function of the FTTN network deployment
techniques with the help of them increase the service range of the IPTV. In this
mechanism access of the internet connection is very high so it is the main cause of
using this application protocol. The main reason for selection of this mechanism is to
increase the networking area of the internet application.
Article author summarized the complete information of this application protocol use
only one protocol medium for access to the internet. No, any additional protocol
revenue is required for the internet broadcast. When the user selects this type of
deployment rate for internet access on that time increase the network incentive plan.
Communication switch of the FTTN is totally depending on the bandwidth of the
network application.
In Monitor of the passive addition, of the protocol represent the main resources of
this technology are obtaining the pre-caching programme application for the network
protocol. FTTN create a path function in which access to the internet application is
very high and depend on the network prototype. The capacity of the internet service
depends on the condition of the network and services of IPTV. The network
broadband of this network is identifying with the extension rate of the network service
protocol (Campbell et al. 2008, pp. 22).
Article paragraph determines the basic knowledge of this application protocol is
creating a high deployment rate of the access of the internet through the network
selection. The bandwidth of the FTTN service of the internet is the part of the
network simulation and use of media platform for service increase the potential rate
of the capacity.
I thought this article is very useful for Data access rate of the internet protocol is
justified with the network application which is accessible on the service protocol.
Competitive rate of the FTTN technology is representing the delivery incentive during
the speed of the access. The network provides a protocol system with the use of the
single path function is to provide the network services for the users and his
requirement.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource and your summary must focus purely on
Tor.
Title and Reference: On the Security of the Tor Authentication Protocol
Reference- Goldberg, I 2006, ‘On the security of the tor authentication protocol’.
In International Workshop On Privacy Enhancing Technologies, (pp. 316-331).
URL Resources- https://link.springer.com/chapter/10.1007/11957454_18
This article follows the complete function of the Tor. Tor is the system of
communication in the internet protocol. The protocol of the Tor mechanism is
depending on the authentication process of the user. Tor provides the system of
communication with the use of the internet application. The main cause of Tor for
selection purpose is to increase the service of internet, high rate of browsing of web
application and protocol of the network publishing.
Author of this article is determining the working criteria of Tor protocol are dependent
on the channel of communication. During the established rate of the channel,
protocol connects to the internet protocol network and provides the communication
mechanism. The circuit of the internet node is justifying the working privacy of the
user and analysis the communication to the other user. The node of the Tor
application protocol is connected with the routers and makes the communication.
In Monitor of the passive addition, the communication application of the Tor depends
on the node function and according to the channel, condition generates the
communication step. Alice is the basic demand of the Tor communication protocol.
With the help of the proper authentication of user justify the communication
application in the Tor.
Article paragraph determines the main application for selection of the Tor protocol is
this application provides the high communication rate in the internet protocol.
Model of the Tor application depends on the node status of the communication
application. With the use of the Tor, node application increases the network circuit
and creates the communication protocol (Goldberg et al. 2016, pp. 317).
I thought this article protocol is very helpful for the resource of the Tor justifying the
communication model for the network function. The message of the instant internet is
the path function of the internet node. Service rate of the communication mechanism
protocol is totally depending on the internet connection. When the user uses this type
of service range on that time increase the communication protocol of the network
application system.
5
Document Page
Week 5
An emerging form of malware is crypto jacking (also known as malicious crypto
mining). Find and summarise ONE resource that describes what crypto jacking is
and how it works. The resource and your summary should focus purely on crypto
jacking and NO OTHER form(s) of malware.
Title and Reference: A First Look at Browser-Based Cryptojacking
Reference- Eskandari, S., Leoutsarakos, A., Mursch, T. and Clark, J 2018, ‘A first
look at browser-based Cryptojacking’. In 2018 IEEE European Symposium on
Security and Privacy Workshops (EuroS&PW), (pp. 58-66).
URL Resources- https://ieeexplore.ieee.org/abstract/document/8406561
This article justifies the proper information of the Cryptojacking is the content of web
application when the user downloads the code of JavaScript. When the customer
uses the different type of web application on that time many supplements is entered
to the network protocol. Advertising of the supplement increases the rate of the
crytojacking during the revenue application.
Author of this article locates the service rate of the network protocol is depending on
the collected storage capacity of the attackers. According to the market, efforts justify
the range of the crypto jacking for a secure manner. The measurement of the
network application is depending on the browsing rate of the network application.
Monitoring of the addition passive, Cryptojacking generates a behaviour session in
which track all the script generation method which is used in the protocol of the
internet. When the user does not justify the internet application at that time according
to the browsing of the web application justify the range of the security attacks. The
framework of this application is depending on the internet opportunity.
Paragraph of this article determines the Malware type of crypto jacking application
which decreases the service rate of the user network protocol. When the user selects
the show supplement from the internet protocol on that time malware attack on the
user profile and reduces the working speed. Cryptojacking is the type of supplement
when it enters the user network protocol on that time reduces the working speed of
the internet application. The useful resources of this application are utilized the
suspicious supplement for the information collection (Eskandari et al. 2018, pp. 59).
I analysis this article is very helpful to determining the framework of the crypto
jacking is depending on the prevention protocol of the internet selection. The working
structure of this application is depending on the utilization of the internet application.
Maximum use of the internet supplement increases the crypto jacking rate. The
baseline of this application is depending on the model of the website and according
to the website, protocol justifies the range of the crypto jacking application.
6
Document Page
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource and
your summary should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference: Damage detection in the material using disturbed fibre optic
sensor
Reference- Sounthararajah, A. and Kodikara, J 2018, ‘Damage detection in cemented
pavement materials using distributed fibre optic sensors’, In ARRB International Conference,
vol.28.
URL Resources- https://www.researchgate.net/profile/Arooran_Sounthararajah/publication/
326717972_Damage_detection_in_cemented_pavement_materials_using_distributed_fibre_optic_se
nsors/links/5b6057150f7e9bc79a71544e/Damage-detection-in-cemented-pavement-materials-using-
distributed-fibre-optic-sensors.pdf
This article represents the basic function of the network design redundancy is the
basic parameter of the network design. With the help of the optical fibre, the
application justifies the component of the material requirement.
Article author summarized the complete information of this dimensional rate of this
parameter is totally depending on the measurement rate and posting rate of the
material. Due to the defects of the internal parameter of the parts justify the damage
rate of the optical fibre.
In Monitor of the passive addition, Cross-section area of the optical fibre is
depending on the anisotropy rate of the material. Optical fibre is the material property
which uses the design of the network selection (Sounthararajah et al., 2018).
Article paragraph determines for the network design application with the help of the
fibre optics cable increase the communication parameter of the project report. The
author represents the complete path function of the optical assessment with the use
of the redundancy function.
I thought this article is very useful for Redundancy is the application path function in
which determines the concept of the damage function of the property. With the help
of this article analysis the complete working structure of the network designing with
the help of the optical application.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation of modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are or are about to, change.
Title and Reference: Interconnected Enterprise Systems − A Call for New Teaching
Approaches
Reference- Schneider, B., Asprion, P.M. and Grimberg, F 2018, ‘Interconnected
Enterprise Systems− A Call for New Teaching Approaches’, In International
Conference on Computational Science, (pp. 318-331).
URL Resource- https://link.springer.com/chapter/10.1007/978-3-319-93713-7_26
This Article function locates the basic need ER/ERPs are the enterprise chain which
justifies the growth rate of the organisation. The selection reason for this protocol is
to increase the support rate of the organisation. New technology is the baseline of
this mechanism. The resource of the system enterprise is depending on the structure
of the working planning. When the organisation select the planning function
according to the market need at that time ER manage all the parameter of the
working session.
Author of this article defines the complete concept of this application according to the
ecosystem generate the different type of technology and create a path function which
is implementing the system of enterprises. In this mechanism with the use of social
media and thing of the internet open a platform for the human requirement.
In this function transfer the different type of business protocol to increase the growth
rate of the organisation (Schneider et al. 2018, pp. 319).
Monitoring of this article provides the addition passive function of the ER/ERPs
application is increasing the growth rate of the organisation according to the market
demand. Trends of the ER/ERPs are justifying the business orientation rate on behalf
of the area requirement. A thing about the internet is the demand of the system of the
enterprise. With the help of this function understand the business requirement and
according to the market structure provide the proper implementation in the use of
technology.
Paragraph of this article analysis the changing function of the ER/ERPs is depending
on the emerging technology. With the help of this function increase the business
structure with the new technology. The implementation rate of the ER/ERPs is
depending on the changing structure of the enterprise of the business structure.
I think this article provides a helpful path function to locate the basic concept of
ER/ERPs function. With the help of the social media application justify the
requirement of the system enterprises and according to the user need to change the
technology function. The main aim of the ER/ERPs application is to increase the
growth rate of the business structure on behalf of new technology.
8
Document Page
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource and your summary should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference: international studies of Astronomy Education Research
Database
Reference- Slater, S 2018, ‘International studies of Astronomy Education Research
Database (iSTAR)’. RTSRE Proceedings, vol. 1, no. 1, pp.341-342.
URL Resources- https://rtsre.net/ojs/index.php/rtsreconfproc/article/view/27
This Article function locates the basic need of the data breach application is the
security protocol in which justifies the information access without permission of the
authentication. With the help of the database application increase the digital function
of the network protocol. With the help of the database function increase the research
area of the processing technique.
Author of this article defines the government section and private section with the help
of the database principal increase the facility of the services. With the help of the
database, the application manages the different type of object work and improves the
working protocol of the system. With the help of the database application in the data,
breach principal increase the working capacity of the object.
Monitoring of this article provides the addition passive function of the different area of
the working protocol with the use of the database application to increase the
prototype of the research unit. Database structure provides a platform in which
according to the data breach protocol manages the basic function of the network
application (Slater et al. 2018, pp. 342).
Article paragraph determines the complete function of the database provides a new
direction in the data breach application for increasing the working session of the
basic idea. The segment area of the database application is very high and according
to the research, structure determines the complete prototype of the network
selection.
I think this article provides a helpful path function to locate the basic function of the
database management is justifying the user requirement according to the market
value. The prototype of the database function is improving the working panel of the
network application. In the data breach application use of the database, protocol
generates the basic application of the network selection.
9
Document Page
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource and your summary should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference: Agile Development in Meteorological R&D: Achieving a Minimum Viable
Product in a Scrum Work Setting
Reference - Som de Cerff, W., van de Vegte, J., Boers, R., Brandsma, T., de Haij, M., van
Moosel, W., Noteboom, J.W., Pagani, G.A. and van der Schrier, G 2018, ‘Agile Development
in Meteorological R&D: Achieving a Minimum Viable Product in a Scrum Work
Setting’. Bulletin of the American Meteorological Society, vol. 99, no. 12, pp.2507-2518.
URL Resources- https://journals.ametsoc.org/doi/full/10.1175/BAMS-D-17-0273.1
This article represents the basic function of the framework of the scrum is depending
on the adaption rate of agile development. Scrum is the guided process in which
according to the performance structure of the protocol function of work justifies the
quality of the services. In this protocol according to the product idea determine the
product process.
Author of this article locates the goal of the scrum application is increasing the
product quality according to the backlog of the product. Scrum parameter justifies the
backlog of the product application on behalf of the process access parameter. With
the help of the scrum, the application creates the new effective thinks for the
development rate of the agile protocol (Som et al. 2018, pp. 2508).
Passive addition of this article determines the basic need from the effectiveness of
the framework of the agile is determined with the help of the scrum application. Agile
is the parameter in which guide the scrum for understanding the user function.
Article paragraph determines for the rate of the scrum is very lightweight and easy to
understand for the user. Development of the product is analysis through the scrum
application.
I think this article provides a basic path function of the working of the scrum. With the
help of the scrum, the application increases the process parameter of the product
and manages the quality function of the agile protocol. Scrum is the baseline of the
product for generating the high development of the agile method.
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource and your summary should focus purely
on project governance.
Title and Reference: Relationships between project governance and information
technology governance and their impact on project performance
Reference - Sirisomboonsuk, P., Gu, V.C., Cao, R.Q. and Burns, J.R 2018, ‘Relationships
between project governance and information technology governance and their impact on
project performance’. International journal of project management, vol. 36, no. 2, pp.287-300.
URL Resources- https://www.sciencedirect.com/science/article/abs/pii/S0263786317311997
This article justifies the proper information of the project management is the
application protocol with the help of them justifies the performance structure of the
product. Governance of the project application is directly related to the quality
function of the project.
Author of this article defines the alignment of the governance parameter is depending
on the project dimension rate of the governance rate. With the help of the
governance facility increase the performance vector of the project. The alignment
rate of the product is depending on the quality function of the project.
Passive addition of this article determines the in the governance activity justify the
quality activity, analysis the operation activity and justify the control mechanism of
the project quality. When the project follows the governance parameter on that time
increase the efficiency rate of the product and quality of the product should be
improved (Sirisomboonsuk et al. 2018, pp. 288).
Article paragraph determines for the main purpose of the governance of project
application is determining the performance of the project according to the project
quality.
I think this article provides a basic path function of the governance application
manages the performance structure for the product address. According to the
product, the parameter justifies the quality range of the product system.
MARKING SHEET - DO NOT DELETE
11
Document Page
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; the summary fails to explain what the resource was about; the
relevance and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; a summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); a summary is detailed yet
concise; the relevance and usefulness of the resource selection have been
clearly explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to a resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
The resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
12
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]