COIT20246 Assignment: In-depth Analysis of Network Technologies

Verified

Added on  2023/03/31

|12
|3678
|456
Homework Assignment
AI Summary
This COIT20246 assignment solution provides detailed summaries of various network and storage technologies based on provided topics. It covers Network Attached Storage (NAS) using resources discussing NFS implementation, and delves into file systems beyond FAT, FAT32, and ExFAT, focusing on forensic analysis of the exFAT file system. The solution also examines National Broadband Network (NBN) delivery technologies, with a focus on Fibre to the Node (FTTN). An analysis of Tor is presented, explaining its function in obscuring online activities. The assignment further explores cryptojacking, its mechanisms, and its end-to-end analysis. Lastly, it touches upon network redundancy, specifically focusing on the impact of damaged fiber optic cables connecting countries. Each summary includes the resource's main points, key information, and its usefulness in understanding the respective technology, with proper citation in Harvard format.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name Please fill
Student Number Please fill
Tutor’s Name Please fill
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title:
Energy Storage for Active Network Management on Electricity Distribution Networks
with Wind Power
Reference:
Carr, S., Premier, G.C., Guwy, A.J., Dinsdale, R.M. and Maddy, J., 2013. Energy
storage for active network management on electricity distribution networks with wind
power. IET Renewable Power Generation, 8(3), pp.249-259.
Summary:
This paper is for introducing the method to implement the Network File System (NFS)
protocol for the network or block packets that are larger for transferring over to
Network Attach Storage (NAS) from the customers who are highly available. A
method for inducing the NFS for the communication in between the storage for the
application that are highly available. An OPF detailing including vitality stockpiling
has been created and used to break down the utilization of vitality stockpiling as an
ANM part on power appropriation systems with wind control. This paper is chosen
because this paper describes the NAS and NFS process clearly and at the end it
provide a clear conclusion about the entire paper. The paper provides a brief idea
about the implementation of the NAS for the cluster that are highly available. The
paper provides pictures and diagrams to give clear assumption. the interaction that is
critical between an appliance and a NAS client that involves the transferring of the
data within very short duration as well as volume. The NAS storage has been limited
to the appliance enclosure size. This article also provide the guide to how the large
blocks can be transferred. The capabilities are well described in this paper.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title:
2018. Forensic Analysis of the exFAT artefacts
Reference:
Vandermeer, Y., Le-Khac, N.A., Carthy, J. and Kechadi, T., 2018. Forensic Analysis
of the exFAT artefacts. arXiv preprint arXiv:1804.08653.
Summary:
The paper is about the File Allocation Table that is known as FAT file system. It is
utilized commonly in the storage devices that are embedded like Secure Digital (SD)
cards, Multimedia Cards (MMC), NOR, Micro SD cards, as well as the NAND flash
memories. The Extend File Allocation Table (ExFAT) which is the future file system
2
Document Page
for the devices that are embedded. This paper is selected because this paper gives a
brief idea about the ExFAT, all the topics are covered clearly. A FAT file system is a
file system that is used widely and one of the most common file systems. FAT file
systems are used in personal computers, tablets, digital cameras, mobile phones as
well as in the other devices that are embedded. However the ExFAT file system is
not having the compatibility with the FAT file system however, it uses the concept of
the cluster for storing the directory or file data as well as the File Allocation Table for
storing the cluster chain of the directory. The report includes a brief introduction and
an well described conclusion about the entire discussion. This paper also provide
diagrams and tables to support the arguments properly. The “CLUSTERS
ALLOCATION OPTIMIZATIONS FOR FILE WRITE OPERATION” is well described
in this report.
3
Document Page
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title:
The End of Australia’s National Broadband Network.
Reference:
Sorensen, L. and Medina, A., 2016. The End of Australia’s National Broadband
Network.
Summary:
The purpose of this paper is to outline the forces of the key market driving that is
behind the needs of the DSL that are high speed as well as the major consideration
that is for the providers of the services are highlighted in this paper. In this paper it is
also described that many of the vectoring features and the capabilities. One of the
hybrid network that is known as the Fibre to the node (FTTN) where one node can be
utilized for making interaction that is between the copper wire link that is existing and
the optical fiber link that is from the CO. Required discount access is proposed to
improve retail rivalry by having the officeholder give the hidden framework and
different organizations offering retail administration over that foundation. In the event
that the end is to profit buyers, the arrangement must be assessed as far as
inclusion, cost, and improved quality to buyers. TThis paper is selected because
FTTN is well described in this paper. The paper provide a brief introduction about the
topic, also the authors have use charts, pictures and diagrams for supporting the
arguments. The FTTN is an architecture that is deployed for covering an entire
distribution area. The paper also provides five considerations for supporting the
arguments.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
Title: Heat shock factor 1 mediates the longevity conferred by inhibition of TOR and
insulin/IGF-1 signaling pathways in C. elegans
Reference:
Seo, K., Choi, E., Lee, D., Jeong, D.E., Jang, S.K. and Lee, S.J., 2013. Heat shock
factor 1 mediates the longevity conferred by inhibition of TOR and insulin/IGF1
signaling pathways in C. elegans. Aging cell, 12(6), pp.1073-1081.
Summary:
The main purpose of this paper is to reveal that the power of the Tor technology as
well as the future ability for thriving revolves that is around the expansion of it. This
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
paper is selected because it briefly describes the Tor technology and provide detail
description for proper understanding the tor technology. One of the ways for
protecting the information in for keeping the information in the internet anonymous.
Through the internet that is anonymous, the authors want to mean that the ability for
being online over the internet in a manner that is private. Throughout the previous
two decades, various qualities and pathways that impact maturing have been found
utilizing model living beings including yeast, Caenorhabditis elegans, and Drosophila
melanogaster. A significant number of these qualities and pathways have been
appeared to control life expectancy in well evolved creatures too. The browsers that
are related to Tor technology are fastly growing as well as these are at the forefront
of the internet that is anonymous. This paper also describes motivation and the
background of the tor technology. The article also provides graphs and charts to
support the arguments. The Tor might be credible internet browser and a networking
tool that is anonymous.
5
Document Page
Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title: End-to-End Analysis of In-Browser Cryptojacking
Reference:
Saad, M., Khormali, A. and Mohaisen, A., 2018. End-to-end analysis of in-browser
cryptojacking. arXiv preprint arXiv:1809.02152.
Summary:
In this paper the authors have performed content currency as well as the code base
analysis for the crypto jacking. At present the crypto currencies that are block chain
based have emerged like one of the innovations in the systems that are distributed
through enabling one distributed and transparent storage that are related to the
transaction. For preventing the abuse as well as for improving the trustworthiness
that are within the cryptocurrencies and the several mechanisms like the pow and
pos. The possibility of in-program mining began in the beginning of Bitcoin. Bitcoin
Plus is one case of a dialog on supplanting advertisements with Bitcoin program
miners. It was additionally contended that program-based mining gives more
prominent adaptability and decentralization as the obstruction to passage is
brought down to any unmodified PC with a web association. Not long after there was
an ascent in Bitcoin JavaScript diggers, for example, JSMiner. In parallel to the
advancing innovation, aggregate activity risen using mining pools. A mining pools
is a group of individual excavators. Members get a cut of work for mining the present
square in the interest of the pool. On the off chance that an individual from the pool
mines the square, the square reward is part among the members of the pool ace rata
as indicated by their computational exertion This paper is selected because it
describes the end to end analysis of the crypto jacking. This paper provides charts
and arguments for supporting the arguments. The utilization of the crypto jacking as
one of the replacements for advertising.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title: In-Network Outlier Detection in Wireless Sensor Networks
Reference:
Branch, J.W., Giannella, C., Szymanski, B., Wolff, R. and Kargupta, H., 2013. In-
network outlier detection in wireless sensor networks. Knowledge and information
systems, 34(1), pp.23-54..
Summary:
The main purpose of this paper is to provide an overview of the issues of the broad
researchers as well as the challenges that are involved in the design of the WSNs
6
Document Page
that are presented. Along with this the primary issues that are including the
specialized software, hardware is also described in this paper. WSNs join the
capacity to detect, figure, and organize their exercises with the capacity to impart
results to the outside world. They are reforming information gathering in a wide range
of conditions. In the meantime, the structure and arrangement of these systems
makes one of a kind research This paper is selected because Redundancy is well
described in this paper which is one of the most critical aspects of the network
designing. Several issues and challenges that are related to the redundancy for
pertaining to several WSNs which are experienced from the researchers, have been
presented in this work. WSNs join the capacity to detect, figure, and organize their
exercises with the capacity to impart results to the outside world. They are reforming
information gathering in a wide range of conditions. In the meantime, the structure
and arrangement of these systems makes one of a kind research.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title: Critical Success Factors in Enterprise Resource Planning Systems: Review of
the Last Decade
Reference:
Shaul, L. and Tauber, D., 2013. Critical success factors in enterprise resource
planning systems: Review of the last decade. ACM Computing Surveys
(CSUR), 45(4), p.55.
Summary:
The purpose of this paper is to examining the studies for the investigation of the
critical success factors for the implementation of the Enterprise resource planning
systems. This paper is selected because the paper elaborates the ERP system very
well. The paper provides a brief introduction about the topic and provides an
overview of the previous IT as well as the ERP studies. In this paper the authors
have provided charts and tables for supporting the arguments of them. Attribution
hypothesis depends on how individuals perceive occasions and its connections to
their conduct and considering. Concurring to attribution hypothesis, individuals
Endeavor to investigate why and what other individuals do, and may trait at least one
causes to that conduct. An individual's inward attribution is acting in a persuading
route due to certain qualities about the individual i.e., disposition, character or
character, while outer attribution makes the determination that an individual is acting
in a certain route in view of certain attributes about the condition the individual is in
The authors have also provided the limitations of the paper as well as suggests some
recommendation for the future. The implementations of the ERP systems have been
considered for being one of the most complex COTS projects.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Title: Cyber Insurance, Data Security, and Blockchain in the Wake of the Equifax
Breach
Reference:
DiGrazia, K., 2017. Cyber Insurance, Data Security, and Blockchain in the Wake of
the Equifax Breach. J. Bus. & Tech. L., 13, p.255.
8
Document Page
Summary:
The purpose of this paper is to discuss the data breach event of the Equifax that was
happen in the year 2017. The IOT is having somewhat of one of the amorphous
definitions that are depending on the govt agency for providing the definition. This
paper is selected because the paper describes the data breach event briefly as well
as to describes the definition of the data breach very well. The cyber-attacks that are
on the ICS are one of the paramount concerns to the national security of us. Digital
assaults on ICS are of principal worry to our national security and seen as one of the
biggest risks. As operational control innovation moves toward becoming regressively
associated with the web, it opens the entryway for terrible on-screen characters to
control physical processes.ICS are commonly characterized as the "various sorts of
control frameworks and related instrumentation, which incorporate the gadgets,
frameworks, systems, and controls used to work or potentially computerize
mechanical processes. “They can likewise be found in pretty much every field
believable, including producing, nourishment what's more, refreshment, HVAC the
executives, fermenting, and even pharmaceuticals the information of the breach is
including the full names, date of births as the numbers of the social security. The
data that was stolen is including around 200000 credit card number as well as almost
2000000 documents that are considered as the additional documents that contains
the information for the personal identification.
9
Document Page
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title: Agile Software Development Methods: Review and Analysis
Reference:
Abrahamsson, P., Salo, O., Ronkainen, J. and Warsta, J., 2017. Agile software
development methods: Review and analysis. arXiv preprint arXiv:1709.08439.
Summary:
The purpose of this paper is to do review and analysis of the Agile Software
Development Methods. The field of the development of the software is not the shy to
introduce the methodologies that are new. The goal of this paper is to start filling the
gap by reviewing systematically the literature on the development of the agile
software methodologies. This paper is selected because the author has briefly
describes the agile methodologies which is an iterative as well as incremental
approach for the delivering systems. The authors have provided tables, figures and
charts in their paper for better understanding of the agile development. the deft
development underscores the relationship and commonness of programming
designers and the human job reflected in the agreements, instead of standardized
procedures and improvement devices. In the current dexterous practices, this shows
itself in close group connections, close workplace game plans, and different methods
boosting cooperation. The author has done a systematic literature review for the
agile methodologies. The life cycle of the XP is consisting five phases that are
Exploration, Planning, Iterations to Release, Product ionizing, Maintenance and
Death. The agile development is a people-centric view to software development.
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title:
Adaptive Water Governance Project: Assessing Law, Resilience and Governance in
Regional SocioEcological Water Systems Facing a Changing Climate
Reference:
Cosens, B., Gunderson, L. and Chaffin, B., 2014. The Adaptive Water Governance
Project: Assessing Law, Resiliance and Governance in Regional Socio-Ecological
Water Systems Facing a Changing Climate. Idaho L. Rev., 51, p.1.
Summary:
The purpose of this paper is to present some of the findings from working on the
concept research programme that is on the front end management as well as the
governance of the primary project that are related to the public investments. One of
the large as well as increasing sharing of the activities are taking places in the public
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
as well as in the private sectors. The paper is selected because it describes the
project governance very well. The authors have provided charts and diagrams for
supporting the augments of them. A second crossing over idea from the versatility
writing, anarchy, gives a dynamic cross-scale focal point through which both social-
natural frameworks and their frameworks of administration can be viewed. Anarchy
depicts the presence of frameworks in a settled, interconnected, chain of importance
in different phases of development, breakdown, development and reorganization.
AWG Project working portrayal of Adaptive Governance is that it empowers society
to explore the dynamic, multi-scalar nature of social biological frameworks. Versatile
administration is fitting when the framework is mind boggling the projects have been
exposed to the uncertain to verify the degrees as well as it is often utilized for
explaining the features of it. The paper reports from different case studies of the
primary public projects. Clearly, projects may fail even when formal rules for planning
and decision making have been adhered to.
11
Document Page
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
12
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]