COIT20246: CPU/GPU, AI OS, IaaS, IPv6, Malware & SDN - Week 1-6

Verified

Added on  2023/06/05

|12
|4121
|339
Homework Assignment
AI Summary
This assignment provides a detailed exploration of various computer science topics through a series of weekly tasks. Week 1 contrasts CPUs and GPUs, highlighting non-graphics applications of GPUs. Week 2 investigates the potential of AI in operating systems, focusing on AI's ability to enhance OS functionality and user interaction. Week 3 compares Amazon Web Services (AWS) with other Infrastructure as a Service (IaaS) providers, such as IBM, Oracle and Alibaba, detailing the differences in their offerings. Week 4 delves into the IPv6 protocol, contrasting it with IPv4. Week 5 analyzes the WannaCry ransomware attack, examining its infection methods and preventative measures. Finally, Week 6 explores the OpenFlow protocol and its role in enabling Software-Defined Networking (SDN).
Document Page
COIT 20246 ASSIGNMENT SUBMISSIONS
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this assignment is to
be in your own words. You will lose marks if you do not use your own words!
Please complete your assignment using this submission template file, inserting your responses
where indicated.
DO NOT delete the marking criteria page – changes are permitted to the formatting of other
pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to
complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses how Central Processing Units (CPUs) function but is silent on
another processing component of modern computers, the Graphics Processing Unit
(GPU). Find and summarise ONE resource that describes what a GPU is and how it
differs from a CPU. The resource (and your summary) should discuss at least one
non-graphics related use for GPUs.
Science Node. 2018. GPUs versus CPUs, Part 1. [online] Available at:
https://sciencenode.org/feature/gpus-versus-cpus-part-1.php [Accessed 26 Sep.
2018].
The foremost determination of this segment of the paper is to focus on the
functionalities of CPU and GPU. This unit help in understanding the basic
fundamental difference between the two types of processing units. The resources
used in this section helps in understanding the non-graphics functionality of the
GPU. The main objective of choosing this resource is that it guides the readers to
understand the working functionalities of the two different processing units. The
most essential point of discussion is regarding the specifications of CPU and GPU. In
CPU there are numerous processing cores which are used by different activities of a
computer system such as the rendering of the complex 3D graphics in the most
recent computer games. GPU which is also known as the Graphics Processing Unit is
defined as the type of microprocessor which is optimised to display graphics of any
program (Science Node. 2018). The clock speed of the GPU is much slower than the
CPU. The exquisite property of GPU is that it can consider huge batches of data and
information use them for different types of purposes as per requirement. Compared
to CPU, GPU have more cores which are effectively used by them for performing
different types of threads and processes. The chosen resource helps in successfully
guiding the readers about the functionalities of both the CPU and the GPU, the
specifications of the both these processing units are compared for different cases.
The extensive uses of GPU are much common in bigger gaming computers where the
graphics play a huge role to play. The resource provides in depth knowledge about
the application and specifications of the different processing units for all the backend
functionalities of computer systems.
Document Page
Week 2
One of the potential next advances in Operating Systems (OSes) will be Artificial
Intelligence (AI) capabilities. Find and summarise ONE resource that discusses how
AI could change the way OSes function and/or interact with users.
Medium. 2018. Which Ai Operating System (AiOS) to Choose for your Business in
2018. [online] Available at: https://medium.com/@carldombrowski/which-ai-
operating-system-aios-to-choose-for-your-business-in-2018-5d63620d08bb
[Accessed 25 Sep. 2018].
The prime objective of this resource is to discuss the AI capabilities of the advanced
operating systems. The designing and development of the latest operating systems
are done in such a way that that it do not have any type of compatibility issues with
the operating systems which are installed in the computer systems. The main reason
behind the selection of this resources is that this resource provides an in depth
knowledge about the compatibility issues of AI and different operating systems. All
the specification of AI such as understanding, learning, analysing and executing are
described in details in this resource. All the complexities associated with the
operating system such as the starvation of the resources and the process
synchronisation which have a negative impact on a computer systems are described
in a professional way in this resource. The effectiveness or the advantages of
application of AI in different OS are stated in the segment such as the effective
process management and uniform resource management. The different types of
operating systems used in portable devices such as tablets and mobile phones are
used for different types of purposes such as the automatic detection of location.
Multiple actions can be performed in a browser of the latest operating system with
AI enabled applications (Medium. 2018). The AI enabled operating systems includes
a card system in a micro format for dealing with different types of static as well as
dynamic data. Most of the latest AI enabled operating system and applications
provides specifications such as automatic spelling and grammar check as well as
recommendations regarding any kind of programs specially in computer games or
designing a framework with the help of a programming language. The resource is
used to understand and minimise the compatibility issues of the AI enabled
operating system.
Document Page
Week 3
The text discusses how Netflix uses Amazon Web Services (AWS) as a Cloud Service
Provider (CSP) for Infrastructure as a Service (IaaS). Find and summarise ONE
resource that describes ONE other commercial IaaS provider that is NOT Google. The
resource and your summary should describe how the IaaS differs from AWS.
Hern, A. 2018. Amazon Web Services: the secret to the online retailer's future
success. [online] the Guardian. Available at:
https://www.theguardian.com/technology/2017/feb/02/amazon-web-services-the-
secret-to-the-online-retailers-future-success [Accessed 25 Sep. 2018].
The foremost purpose of this resource is to understand the different types of cloud
service providers and its utilization in the different business organisation. This
particular resource is selected as it gives an in depth knowledge about the most used
cloud services around the world such as IBM, Oracle and Alibaba. The total
approximated revenue of IBM form their cloud service department is around $10
billion USD every year and the rate is increasing every due to their enhanced service.
Customer satisfaction one of their main reason behind their huge success. This
resource focuses on the Amazon Web Services which is formerly known as IaaS, it is
a category of cloud service. IaaS is the most widely used cloud service provider in the
world. The functionality of Amazon Web Service is integrated with the virtual
machines which helps the clients to get their desired services from the cloud service
providers according to business situations (Hern 2018). Each specification of Amazon
Web Service can be entirely customised by the users according to their needs and
situations. The most essential discussion of this category is that is states the prime
differences between Amazon Web Service and IaaS. This resource states that the
conventional IaaS was used to store huge blocks of data, AWS is the modified version
of IaaS. The composition of IaaS is that is made up of automated and scalable
resources. The users of the cloud service platforms are given login credentials by
which they can access their account and manage their accounts. This resource is
helpful in understand the composition of cloud service providers, and also the
different types of cloud service providers and the main reasons behind their success.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 4
IPv4 is discussed in the text, yet the emerging IPv6 protocol is only mentioned
briefly. Find and summarise ONE resource that describes the IPv6 protocol. The
resource and your summary should describe how IPv6 differs from IPv4.
Parr, B. 2018. IPv4 & IPv6: A Short Guide. [online] Mashable. Available at:
https://mashable.com/2011/02/03/ipv4-ipv6-guide/#Lb6LwmAfmOqJ [Accessed 25
Sep. 2018].
The prime reason behind selecting this resource is that it guides the readers to know
about the difference between the two types of protocols such as the IPv4 and IPv6.
The two specifications of the protocols described in details in this resource. The total
possible address by IPv6 is 7.9×1028 times to that of the earlier version of the
Internet based protocol. One of the prime features of Ipv6 is that it provides end to
end datagram transmission across different computer network protocols. IPv4 is the
fourth generation internet protocols which are actively used for identification of
devices on a computer network with the help of any addressing system. IPv4 which
is the mostly used internet protocol all over the world are used in the inter
connected network systems of packet switching communication of computer
networks. The prime benefit of using IPv6 is its automatic configuration property and
the prevention of the private address collisions as they are the first ones to provide
these properties. The flexibility of this IP is much more than the other protocols. The
security provided by this version of the internet protocol is much more than the
other versions of the internet protocol (Parr 2018). The previous version of the
internet protocol did not supported these features which makes this protocol as one
of the most widely accepted protocols all over the world. The multicast routing
feature provided by this version of the internet protocol is better than all the
previous versions of the internet protocols. The resource will be helping the readers
to analyse the advantages and disadvantages of the two types of internet protocols.
Document Page
Week 5
WannaCry and NotPetya were two of the most significant malware attacks of 2017.
Find and summarise ONE resource that describes how ONE of these pieces of
malware work. Note that the resource should focus on ONE of these, NOT both.
Fruhlinger, J. 2018. What is WannaCry ransomware, how does it infect, and who was
responsible?. [online] CSO Online. Available at:
https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-
ransomware-how-does-it-infect-and-who-was-responsible.html [Accessed 25 Sep.
2018].
This resource will help the readers to understand about the different types of cyber security
issue in computing industry. The resource mainly highlights on the application of the major
cyber security in the form of Ransome ware. This cyber threat was very common in 2017
when it infected those of computer systems all over the world. More than 130 countries all
over the world were impacted by this deadly phenomenon where data were hostaged by
the cybercriminal and those essential data were only given access to the users in exchange
of bit coins worth millions. This malware attacks were most common in the Microsoft
Windows system users who do not update their operating systems. The prevention of this
attacks were proposed by the Microsoft Corporation in the form of patches which helped
the impacted computers to a significant way (Fruhlinger 2018). The other type of
preventive measure against this cyber security is the application of the Kill Switch which
helps in preventing the spreading of the virus from one computer system to another or from
one network to another. This resource helps in understanding the methodology of this virus
as well as it guides the readers against the preventive steps of this virus. The resource
illustrates the importance of updating the versions of operating system which provide some
sort of security to the systems from the external threats. This resource also helps in
understanding the importance of the firewall and the other anti-virus software which plays a
huge role considering the cyber securities.
Document Page
Week 6
OpenFlow is a protocol that enables Software-Defined Networking (SDN). Find and
summarise ONE resource that describes how OpenFlow works and/or how it enables
SDN.
Open Networking Foundation. 2018. Open Datapath - Open Networking Foundation.
[online] Available at:
https://www.opennetworking.org/technical-communities/areas/specification/open-
datapath/ [Accessed 25 Sep. 2018].
This resource is chosen due to its in-depth data about the application of the Open
Flow protocol which is one of the most important types of communication protocol
in the software enabled environment. According to this resource, flow protocol
technology is as type of expertise which enables the software defined networking.
The different types of working principals of Open Flow protocol are stated in this
resource in an efficient way which is one of the main reasons behind selecting this
resource. The process through which the open flow protocol enables the software
defined networking is described in this paper with prime importance in this resource.
All the internal functionalities of open flow protocol are highlighted in this resource
which helps the readers to understand its mechanism in details. The controller which
communicates with the switches through the open flow protocol and imposing
guidelines on the movement are described in this resource. The resources guides to
understand the features of the protocol such as the reduced latency, speed, number
of hops (Open Networking Foundation. 2018). All the functionalities of the protocol
from the initial to the final stages are described this resource. The resource is useful
to understand the activity of the SDN controller for interaction process between
different types of network system such as the router and switches. The involvement
of different types of memories such as the physical and virtual memory and their
adaptability in different types of market environment are focussed in this resource.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 7
Historically, organisations have been able to improve business processes by
implementing Information Systems. However, as these systems age they can
negatively impact on organisational agility and can ultimately prove problematic.
Such systems are broadly referred to as Legacy Systems. Find and summarise ONE
resource that discusses the impacts of legacy systems on organisations. The
resource and your summary should clearly identify problems with maintaining legacy
systems.
Goldstein, P. 2018. How Your Agency Should Think About Legacy System
Modernization. [online] Technology Solutions That Drive Government. Available at:
https://fedtechmagazine.com/article/2018/03/how-your-agency-should-think-
about-legacy-system-modernization-perfcon [Accessed 26 Sep. 2018].
The main reason behind the selection of this resource is to understand the impact of the
different types if information Systems in different types of business processes.
This resource helps in understanding the problem associate with the application of the
legacy systems. The resource helps in understanding the good and bad effects of the latest
information system for business purposes. The chief purpose behind the selection of this
resource is that it highlights the effectiveness of the legacy systems as well as it highlights
the importance of the implementation strategies by which these information systems are
incorporated in to the business organizations for performing different types of
functionalities (Goldstein 2018). This resource helps in understand all the probable issues
and challenges related to the incorporation of new information systems in a business
enterprise. The main purpose of the information systems in different business organisation
is to optimise the current infrastructure and make the professional unit much more
productive. The issues related with the legacy systems are also evenly discussed in the
resource. The resource helps in understanding the different types of legacy systems used by
the global organisations, the effectiveness of the functionality of the legacy systems are the
main topic of discussion this resource. The usage and implementation of the legacy systems
are discussed in details in the resource.
Document Page
Week 8
With the advent of mass data collection and storage has come the use of these
datasets for data mining and analysis. Recently, Cambridge Analytica and Facebook
have come under intense scrutiny for their use of user data, allegedly in order to
influence the US 2016 election. Find and summarise ONE resource that describes
what Cambridge Analytica did and why their services were so controversial.
Vox. 2018. The Facebook and Cambridge Analytica scandal, explained with a simple
diagram. [online] Available at:
https://www.vox.com/policy-and-politics/2018/3/23/17151916/facebook-
cambridge-analytica-trump-diagram [Accessed 25 Sep. 2018].
The foremost reason behind selecting this resource is that it focuses on the negative impacts
of the data breaching, this resource considers both the recent as well as the old incidents.
These resources help us to know about the famous data breach of Facebook during the
general elections of 2016. This resource examined the violators of the case Cambridge
Analytica who was accused of having a major influence regarding the outcome of the results.
His method was helpfully for the leader of the opposition Mr Donald Trump to win the
election and become the president of the United States of America. This changed the whole
scenario for many countries due to the foreign policies of United States. This resource is
helpful to understand the importance of data protection and data piracy. The unethical
issues related to the data protection are highlighted in this paper with prime importance.
The illegal activities of Cambridge Analytica are focussed in this paper (Vox. 2018). The
resource focussed on the 50 million Facebook profiles which were used in the famous data
breach act and also the violations of the Facebook rules and regulations. The resource also
stated about the preventive measures taken by Facebook to ensure security to all the users
all around the world after those controversial data breaches in 2016.
Document Page
Week 9
Load (or performance) testing is a critical step in the information systems
development process. The purpose of this testing is to simulate the peak expected
load on a system to ensure both hardware and software can operate effectively and
meet key metrics. To do this, specialised performance testing tools are used. Find
and summarise ONE resource that describes ONE such tool. The resource (and your
summary) should include information on the principle uses and features of the tool.
Smartbear.com. 2018. What Is Load Testing?. [online] Available at:
https://smartbear.com/learn/performance-testing/what-is-load-testing/ [Accessed
25 Sep. 2018].
The main purpose of selecting this resource is to gather in-depth knowledge about
the different types of performance testing tools used in the developmental process
of information systems. The apache Jmeter is defined as the type of load testing
tools which are used in different types of organisations all over the world. The main
reason behind selecting this resource is to know about the functionality of each
performance testing tools specially the JMeter. JMeter is an open source java
application which is used to load the behaviour of the test functions and study its
performance for the growth and development of the concerned organisation. This
report focuses on the different specifications of the JMeter. All the internal and
external mechanisms of the JMeter are discussed in a brief way in this resource
which is one of the reasons selecting this resource. The different features of this
tools are also described in this paper such as the JDBC database, File Transfer
Protocol, LDAP, HTTPS, Switch Mode Transfer Protocol, SOAP services, IMAP, POP3,
shell scripts, Transmission Control Protocol . Every bigger corporation can use this
type of performance testing tool to maintain the efficiency and productivity of the
corporation (Smartbear.com. 2018). This type of load testing tools is also helpful
from both the perspective of the organisation as well from the perspectives of the
clients which gets services from the organisations. This tool is used both in the
design phase and in the developmental phase of the construction phase.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 10
While information systems and technology deliver many benefits to society, there is
a high incidence of failure in attempting to implement them. These IS/IT
implementation project failures frequently result in substantial financial losses. Find
and summarise ONE resource that describes ONE example of an Australian IT/IS
project that has failed. Note that the resource should focus on ONE single example
and it and your summary should clearly explain the cause(s) of the failure.
Philipson, G. 2018. Cargo cult dooms project to failure. [online] The Sydney Morning
Herald. Available at: https://www.smh.com.au/technology/cargo-cult-dooms-
project-to-failure-20051129-gdmj4v.html [Accessed 25 Sep. 2018].
The foremost purpose of selection of this resource is that it gives in-depth
knowledge about the major IT failure in Australian soil which costed the Australian
Cargo Management millions of dollar and its affects were very much severe for their
economic slowdown as the cargo containers were travelling all over the country due
to malfunctioning of their newly incorporated cargo management system. The prime
cause of this failure is the compatibility issues between the new cargo management
system and the Australian IT polices which were not updated for a long period of
time (Philipson 2018). Considered as one of the biggest IT failure all over the world,
this failure costed around 250 million AUD for the Australian Cargo Management.
This resource helps in understanding the causes of the IT failure as well as the
impacted areas of Australia. The security issues of the goods due to the faulty data
which was circulated in the entire Australian soil are discussed in this resource with
clarity so that similar IT accidents can be prevented in any parts of the world. This
resource helps in understanding the challenges faced by the cargo management
system in Australia after the major IT failure. According to this resource, the most
impacted cities of Australia are Brisbane, Perth, Melbourne and Sydney. Along with
the cargo management system all the associated goods carrier services departments
which had a direct negative impact after the major failure is focussed in this paper.
This resource helps in understanding the impact of this IT failure on the Australian
economy.
Document Page
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the task;
summary fails to explain what the resource was about; the relevance and/or
usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is adequate
but may require either more detail or is too long; the relevance and/or
usefulness of the resource has been explained to some extent, but needs
additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the resource
is probably highly specialised); summary is detailed yet concise; the relevance
and usefulness of the resource selection has been clearly explained.
Key
Deductions
-3
-2
-1
Link URL to resource not provided / does not work OR
Reference/URL provided does not link to resource (and resource cannot be
located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is not of
resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples rather than
focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]