COIT 20246 ASSIGNMENT SUBMISSION Due date: Part: Written Assessment Weighting: 30% of total assessment. Submission: Electronic (see course website for details) Instructions It will be necessary to use...

1 answer below »
Hi, I have attached a file. Please, make sure all requirements are fulfilled.Thank You.


COIT 20246 ASSIGNMENT SUBMISSION Due date: Part: Written Assessment Weighting: 30% of total assessment. Submission: Electronic (see course website for details) Instructions It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. Each task requires you to collect and summarise one (1) publicly available online resource.  The resource summaryshould be around 200-300 words. You should collect interesting and relevant resources that address the task.  The resources should be easy to read and describe the topic/technology concisely and simply.   The resources must be specific to the topic (i.e. just focus on a single technology or topic and not be about multiple topics).  These can include (but are not limited to) online magazine/news articles, technical reports or documentation. Important - Academic resources such as journals, conference papers or books will generally be unsuitable for this assignment as they are generally not publicly available, are not concise, are not necessarily easy to read and often don’t focus specifically on the assignment topic(s).  The resources should be substantial (producing a 300 word summary from a 400 - 500 word resource is inappropriate) and only contain information directly pertinent to the task.  You cannot use the resource more than once in the assignment.  The textbook and sites such as, but not limited to, Wikipedia, Techtarget, and HowStuffWorks are not suitable resources. DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words! Please complete your assignment using this submission template file, inserting your responses where indicated. DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers. Please fill in the following details: Student Name Student Number Tutor’s Name Tasks There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required. Note: Each resource summary should be around 200-300 words. Week 1 The text discusses how modern CPUs function. Recently a critical flaw in microprocessor design has been discovered that allows two extremely serious security exploits: Spectre and Meltdown. Find and summarise ONE resource that describes how either of these exploits work. The resource (and your summary) should focus on what is occurring in the CPU that allows these exploits to occur. Title and Reference: Summary: Week 2 Prior to 1985, there were very few Operating Systems (OSes) that used Graphical User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of these GUI operating systems. The OS must have been release prior to 1985 so cannot be Microsoft Windows. Title and Reference: Summary: Week 3 Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks that are characterised by linking devices over large distances. Devices (including simple sensors) typically can only communicate at very low bit rates, however, the communication and associated electronics consume very little power. As such, LPWAN devices can be battery powered and operate independently for many months or even years. Find and summarise ONE resource that describes ONE platform or technology that implements a LPWAN. Title and Reference: Summary: Week 4 Voice over IP (VoIP) is a group of hardware and software technologies that allow users to communicate via voice and video over the Internet. VoIP uses a number of different software protocols, depending on the application. Find and summarise ONE resource that describes ONE of these VoIP protocols. Title and Reference: Summary: Week 5 One of the many uses of cryptography has been the development of the blockchain. Blockchains are commonly used as the basis for maintaining the data integrity of crypto currencies, though have many, many more applications. Find and summarise ONE resource that describes how blockchains work. Note that the resource should focus on the blockchain mechanism, NOT crypto currencies. Title and Reference: Summary: Week 6 One controversial practical application of network traffic management is in the contravention of the principle of “net neutrality”. Find and summarise ONE resource that describes what net neutrality is and how its contravention could impact on individual and business users of the Internet. Title and Reference: Summary: Week 7 Information Systems have led to greater and greater degrees of automation in the workplace. There is currently extensive speculation on which jobs will cease to be performed by humans in the near future. Find and summarise ONE resource that discusses jobs that are likely to not exist in the future due to ICT based automation. Note that the resource must clearly link the loss of the job(s) to advances in ICT. Title and Reference: Summary: Week 8 With the advent of mass data collection and storage has come the use of these datasets for machine learning. Find and summarise ONE resource that describes what machine learning is and how it is being used. Title and Reference: Summary: Week 9 Critical to application development are the languages used to implement the specifications. Find and summarise ONE resource that describes ONE programming language that has been developed since 2008. The resource (and your summary) should include information on the principle uses and features of the language. Title and Reference: Summary: Week 10 While information systems and technology deliver many benefits to society, they can also result in negative effects and outcomes. One recent controversy, the propagation of fake news and its influence on elections, has been linked to a type of software called a “bot”. Find and summarise ONE resource that describes what bots are and how they can be used for disseminating misinformation and affecting human behaviour. Title and Reference: Summary: MARKING SHEET - DO NOT DELETE Criteria 0 No Response<=1 poor="" resource="" selection;="" resource="" is="" too="" broad="" or="" lacks="" relevance="" to="" the="" task;="" summary="" fails="" to="" explain="" what="" the="" resource="" was="" about;="" the="" relevance="" and/or="" usefulness="" of="" the="" resource="" has="" not="" been="" explained.=""><=2 good="" resource="" selection;="" resource="" is="" relevant="" to="" the="" task;="" summary="" is="" adequate="" but="" may="" require="" either="" more="" detail="" or="" is="" too="" long;="" the="" relevance="" and/or="" usefulness="" of="" the="" resource="" has="" been="" explained="" to="" some="" extent,="" but="" needs="" additional="" information.=""><=3 excellent resource selection; resource is highly relevant to the task (the resource is probably highly specialised); summary is detailed yet concise; the relevance and usefulness of the resource selection has been clearly explained. key deductions -3 -2 -1 reference/url provided does not link to resource (and resource cannot be located or determined from details provided) or reference/url provided does not relate to the summary (i.e. summary is not of resource content / contains content not contained in the resource) resource is generic and/or covers multiple technologies/examples rather than focuses on a single technology/example resource not referenced correctly/not in harvard format week marks awarded 1 2 3 4 5 6 7 8 9 10 total comments: excellent="" resource="" selection;="" resource="" is="" highly="" relevant="" to="" the="" task="" (the="" resource="" is="" probably="" highly="" specialised);="" summary="" is="" detailed="" yet="" concise;="" the="" relevance="" and="" usefulness="" of="" the="" resource="" selection="" has="" been="" clearly="" explained.="" key="" deductions="" -3="" -2="" -1="" reference/url="" provided="" does="" not="" link="" to="" resource="" (and="" resource="" cannot="" be="" located="" or="" determined="" from="" details="" provided)="" or="" reference/url="" provided="" does="" not="" relate="" to="" the="" summary="" (i.e.="" summary="" is="" not="" of="" resource="" content="" contains="" content="" not="" contained="" in="" the="" resource)="" resource="" is="" generic="" and/or="" covers="" multiple="" technologies/examples="" rather="" than="" focuses="" on="" a="" single="" technology/example="" resource="" not="" referenced="" correctly/not="" in="" harvard="" format="" week="" marks="" awarded="" 1="" 2="" 3="" 4="" 5="" 6="" 7="" 8="" 9="" 10="" total="">
Answered Same DayApr 14, 2020COIT20246Central Queensland University

Answer To: COIT 20246 ASSIGNMENT SUBMISSION Due date: Part: Written Assessment Weighting: 30% of total...

Sundeep answered on Apr 19 2020
124 Votes
Week 1
    
    Title and Reference:
A killer flaw
side-channel, R. (2018). Reading privileged memory with a side-channel. [online] Googleprojectzero.blogspot.in. Available at: https://googleprojectzero.blogspot.in/2018/01/reading-privileged-memory-with-side.html [Accessed 18 Apr. 2018].
    Summary:
The timing for the CPU data cache can be misused and it can be efficiently mistreated to leak information out of the problem which leads to the random virtual memory reading and causes to the vulnerability passing through a
ll the security boundaries at various points and contexts. Until now the 3 known errors of the variants are understood:
- Variant 1: bounds check bypass (CVE-2017-5753)
- Variant 2: branch target injection (CVE-2017-5715)
- Variant 3: rogue data cache load (CVE-2017-5754)
The basic principles behind the variant 1 is determined by a POC in the userspace on the INTEL Haswell Xeon CPU, the AMD PRO CPU, an ARM Cortex A57 and the the AMD FX CPU too. The ability to read the data inside miscalculated working within the same area of execution without the crossing of the boundaries which are specified are done by the POC.
The POC assigned to the Variant 1 the one which is running with normal user privileges and working with the kernel which belongs to Linux with a config which is distro-standard is capable of performing reads in a 4GiB range. In the virtual memory of the Intel Haswell Xeon CPU. If the BPF JIT in the kernel is active, in the config mode which is not default, it would also be working on the works on the AMD PRO CPU. around 2000 bytes per second is the speed at which the kernel virtual memory would read On the Intel Haswell Xeon CPU around after 4 seconds of the startup time
    Week 2
    
    Title and Reference:
LISA, a modern computer in olden times
Lisa, A. (2018). Apple Lisa - Mac History. [online] Mac History. Available at: http://www.mac-history.net/apple-history-2/apple-lisa/2007-10-12/apple-lisa [Accessed 18 Apr. 2018].
    Summary:
In the year 1980, Apple Lisa was one of the few computers that were being designed. The acronym :LISA” stood for “Local Integrated Software Architecture” , plus it was the name of Steve Job’s [ co –founder of apple ]daughter.
It was the year 1978 when project LISA was initiated and it evolved into being a project design which was a powerful computer in itself. It had a graphical user interface that would be targeted towards business customers. It was in the year 1980 that Steve jobs was pushed out of the LISA project and hence Steve jobs joined the MAC project. The Lisa was a more advanced and heavily expensive than the MAC project. It included the cooperative multitasking, protected memory, and a more sophisticated hard disk. The LISA had a built in screensaver and also included an advanced 2mb of Ram, a higher resolution display and also expansion slots. There were many years to go before these features were to be implemented in the MAC. An example would be that the protective memory did not appear in MAC until MAC X OS which was released in the year 2001. The complexity of LISA OS and the weight of the programmes used up Motorola’s 5Mhz 68000 microprocessor, so the system felt sluggish, mainly while scrolling the documents
    Week 3
    
    Title and Reference:
LPWAN’s Modern use in IOT
i-SCOOP. (2018). Internet of Things network technologies: LPWAN wireless IoT guide. [online] Available at: https://www.i-scoop.eu/internet-of-things-guide/lpwan/ [Accessed 18 Apr. 2018].
    Summary:
There are multiple cases in the history of technology which uses LPWAN. In the current technological advancement stage, LPWAN is used in the IOT devices. There are multiple cases, specially in industrial use of IOT where LPWAN’s are used. The applications need cheap mobile low power with long range of connectivity. Due to cellular technology being very much exoensive, it was not suitable for the IOT devices. The IOT developers started building their own netweork with the low bandwidth. A whole new ecosystem consisting of partners and supporters is present which also includes the major telecomm firms and the industry experts and giants. The LoRA alliance was formed by Semtech. It was Semtech which patented the CSS technology which was the source for generation of LoRA wide area network. Similarly, Sigfox was developed which is based on a different model structure. It is using a different technology for its sigfox network but the parent company which is also Sigfox utilises an entirely different business model. Weightless(SIG) is one of the major players in the IOT ecosystem which uses LPWAN. Weightless represents a group of companies and not a single entity. It is an organisation which does not work for profit and has dedicated its work in finding the ‘best’ IOT connectivity device technology. Ingenu is the last player in the IOT space. Ingenu was previously known as RPMA which is a short form of Random Phase Multiple Access. Machine to Machine is the strong point of Ingenu and works on the biggest IOT Networks
    Week 4
    
    Title and Reference:
The Session Initiation Protocol
Cisco. (2018). The Session Initiation Protocol - The Internet Protocol Journal - Volume 6, Number 1. [online]...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here