COIT 20246 ASSIGNMENT SUBMISSION Due date: Thursday Week 11 (2PM AEST) Part: Written Assessment Weighting: 30% of total assessment. Submission: Electronic (see course website for details) Instructions...

1 answer below »

COIT 20246 ASSIGNMENT SUBMISSION
























Due date:



Thursday Week 11 (2PM AEST)



Part:



Written Assessment



Weighting:



30% of total assessment.



Submission:



Electronic (see course website for details)






Instructions


It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format.



DO NOT
copy content directly from either the text or Internet resources: this assignment is to be in your own words.
You will lose marks if you do not use your own words!


Please complete your assignment using
this
submission template file, inserting your responses where indicated.



DO NOT delete the marking criteria page
– changes are permitted to the formatting of other pages including the headers and footers.




























Please fill in the following details:




Student Name







Student Number







Tutor’s Name








































Tasks




There are ten (10) tasks,
one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required.


Note: Each resource summary should be around 200-300 words.





















Week 1



The text discusses how modern CPUs function. Recently a critical flaw in microprocessor design has been discovered that allows two extremely serious security exploits: Spectre and Meltdown. Find and summarise
ONE

resource that describes how either of these exploits work. The resource (and your summary) should focus on what is occurring in the CPU that allows these exploits to occur.



Title and Reference:






This should include the URL of the resource>



Summary:



























Week 2



Prior to 1985, there were very few Operating Systems (OSes) that used Graphical User Interfaces (GUIs). Find and summarise
ONE
resource that describes
ONE
of these GUI operating systems. The OS must have been release
prior to 1985
so cannot be Microsoft Windows.



Title and Reference:






This should include the URL of the resource>



Summary:



























Week 3



Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks that are characterised by linking devices over large distances. Devices (including simple sensors) typically can only communicate at very low bit rates, however, the communication and associated electronics consume very little power. As such, LPWAN devices can be battery powered and operate independently for many months or even years. Find and summarise
ONE
resource that describes
ONE
platform or technology that implements a LPWAN.



Title and Reference:






This should include the URL of the resource>



Summary:





























Week 4



Voice over IP (VoIP) is a group of hardware and software technologies that allow users to communicate via voice and video over the Internet. VoIP uses a number of different software protocols, depending on the application. Find and summarise
ONE
resource that describes
ONE
of these VoIP protocols.



Title and Reference:






This should include the URL of the resource>



Summary:



























Week 5



One of the many uses of cryptography has been the development of the blockchain. Blockchains are commonly used as the basis for maintaining the data integrity of crypto currencies, though have many, many more applications. Find and summarise
ONE
resource that describes how blockchains work. Note that the resource should focus on the blockchain mechanism,
NOT
crypto currencies.



Title and Reference:






This should include the URL of the resource>



Summary:



























Week 6



One controversial practical application of network traffic management is in the contravention of the principle of “net neutrality”. Find and summarise
ONE
resource that describes what net neutrality is and how its contravention could impact on individual and business users of the Internet.



Title and Reference:






This should include the URL of the resource>



Summary:

































Week 7



Information Systems have led to greater and greater degrees of automation in the workplace. There is currently extensive speculation on which jobs will cease to be performed by humans in the near future. Find and summarise
ONE
resource that discusses jobs that are likely to not exist in the future due to ICT based automation. Note that the resource must clearly link the loss of the job(s) to advances in ICT.



Title and Reference:






This should include the URL of the resource>



Summary:



























Week 8



With the advent of mass data collection and storage has come the use of these datasets for machine learning. Find and summarise
ONE
resource that describes what machine learning is and how it is being used.



Title and Reference:






This should include the URL of the resource>



Summary:



























Week 9



Critical to application development are the languages used to implement the specifications. Find and summarise
ONE
resource that describes
ONE
programming language that has been developed
since 2008. The resource (and your summary) should include information on the principle uses and features of the language.



Title and Reference:






This should include the URL of the resource>



Summary:

































Week 10



While information systems and technology deliver many benefits to society, they can also result in negative effects and outcomes. One recent controversy, the propagation of fake news and its influence on elections, has been linked to a type of software called a “bot”. Find and summarise
ONE
resource that describes what bots are and how they can be used for disseminating misinformation and affecting human behaviour.



Title and Reference:






This should include the URL of the resource>



Summary:









































































































MARKING SHEET - DO NOT DELETE




Criteria




0



No Response







Poor resource selection; resource is too broad or lacks relevance to the task; summary fails to explain what the resource was about; the relevance and/or usefulness of the resource has not been explained.







Good resource selection; resource is relevant to the task; summary is adequate but may require either more detail or is too long; the relevance and/or usefulness of the resource has been explained to some extent, but needs additional information.







Excellent resource selection; resource is highly relevant to the task (the resource is probably highly specialised); summary is detailed yet concise; the relevance and usefulness of the resource selection has been clearly explained.




Key
Deductions




-3





-2
-1



Reference/URL provided does not link to resource (and resource cannot be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is not of resource content / contains content not contained in the resource)


Resource is generic AND/OR covers multiple technologies/examples rather than focuses on a single technology/example


Resource not referenced correctly/not in Harvard format




Week




Marks Awarded




1







2







3







4







5







6







7







8







9







10







TOTAL







Comments:







Answered Same DayMay 21, 2020COIT20246Central Queensland University

Answer To: COIT 20246 ASSIGNMENT SUBMISSION Due date: Thursday Week 11 (2PM AEST) Part: Written Assessment...

Sundeep answered on May 22 2020
152 Votes
Week 1
    
    Title and Reference:
A killer flaw
side-channel, R. (2018). Reading privileged memory with a side-channel. [online] Googleprojectzero.blogspot.in. Available at: https://googleprojectzero.blogspot.in/2018/01/reading-privileged-memory-with-side.html [Accessed 18 Apr. 2018].
    Summary:
The CPU time schedule for data cache can be used in a wrong way and can be efficiently used to make the efficient use of leaking the information out of the problem which may lead to random access of memory and causes to the vulnerability passing through all th
e security boundaries at various points and contexts. 3 known errors have been verified until now. These are:
- Variant 1: bounds check bypass (CVE-2017-5753)
- Variant 2: branch target injection (CVE-2017-5715)
- Variant 3: rogue data cache load (CVE-2017-5754)
The core principles behind the variable 1 is determined by a POC in the user space on the INTEL Haswell Xeon CPU, the AMD PRO CPU, an ARM Cortex A57 and the the AMD FX CPU too. The capability to understand and analyse data in the code working within the same area of implementation minus the level the crossings which would take place.
The POC assigned to the Variant 1 the one which is running with normal user privileges and working with the kernel which belongs to Linux with a config which is distro-standard is capable of performing reads in a 4GiB range. In the virtual memory of the Intel Haswell Xeon CPU. If the BPF JIT in the kernel is active, in the config mode which is not default, it would also be working on the works on the AMD PRO CPU. around 2000 bytes per second is the speed at which the kernel virtual memory would read On the Intel Haswell Xeon CPU around after 4 seconds of the startup time
    Week 2
    
    Title and Reference:
LISA, a modern computer in olden times
Lisa, A. (2018). Apple Lisa - Mac History. [online] Mac History. Available at: http://www.mac-history.net/apple-history-2/apple-lisa/2007-10-12/apple-lisa [Accessed 18 Apr. 2018].
    Summary:
1980 was the year when the world saw a new beginning, Apple Lisa was one of the few computers that were being designed. The acronym :LISA” stood for “Local Integrated Software Architecture” , plus it was the name of Steve Job’s [ co –founder of apple ]daughter.
It was the year 1978 when project LISA was initiated and it evolved into being a project design which was a powerful computer in itself. It had a graphical user interface that would be targeted towards business customers. It was in the year 1980 that Steve jobs was pushed out of the LISA project and hence Steve jobs joined the MAC project. The Lisa was a more advanced and heavily expensive than the MAC project. It included the cooperative multitasking, protected memory, and a more sophisticated hard disk. The LISA had a built in screensaver and also included an advanced 2mb of Ram, a higher resolution display and also expansion slots. There were many years to go before these features were to be implemented in the MAC. An example would be that the protective memory did not appear in MAC until MAC X OS which was released in the year 2001. The complexity of LISA OS and the weight of the programmes used up Motorola’s 5Mhz 68000 microprocessor, so the system felt sluggish, mainly while scrolling the documents
    Week 3
    
    Title and Reference:
LPWAN’s Modern use in IOT
i-SCOOP. (2018). Internet of Things network technologies: LPWAN wireless IoT guide. [online] Available at: https://www.i-scoop.eu/internet-of-things-guide/lpwan/ [Accessed 18 Apr. 2018].
    Summary:
There are multiple cases in the history of technology which uses LPWAN. In the current technological advancement stage, LPWAN is used in the IOT devices. There are multiple cases, specially in industrial use of IOT where LPWAN’s are used. The applications need cheap mobile low power with long range of connectivity. Due to cellular technology being very much exoensive, it was not suitable for the IOT devices. The IOT developers started building their own netweork with the low bandwidth. A whole new ecosystem consisting of partners and supporters is present which also includes the major telecomm firms and the industry experts and giants. The LoRA alliance was formed by Semtech. It was Semtech which patented the CSS technology which was the source for generation of LoRA wide area network. Similarly, Sigfox was developed which is based on a different model structure. It is using a different technology for its sigfox network but the parent company which is also Sigfox utilises an entirely different business model. Weightless(SIG) is one of the major players in the IOT ecosystem which uses LPWAN. Weightless represents a group of companies and not a single entity. It is an organisation which does not work for profit and has dedicated its work in finding the ‘best’ IOT connectivity device technology. Ingenu is the last player in the IOT space. Ingenu was previously known as RPMA which is a short form of Random Phase Multiple Access. Machine to Machine is the strong point of Ingenu and works on the biggest IOT Networks.
The IOT devices would make the homes and the offices smarter and would make the technology use of the LPWAN and create a network of the smart devices
    Week 4
    
    Title and Reference:
The Session Initiation Protocol
Cisco. (2018). The Session Initiation Protocol - The Internet Protocol Journal - Volume 6, Number 1. [online] Available at: https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-23/sip.html [Accessed 18 Apr. 2018].
    Summary:
The Session...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here