COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words!
Please complete your assignment using this submission template file, inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name Tupal ben Priyank Patel
Student Number 12045048
Tasks
Week 1
Task There have been huge advances in the development of storage technologies since the early days of computing. Explain the benefits of two mass storage technologies namely: storage area network and network-attached storage.
Summary Title and Reference:
Storage solutions (SAN & NAS)
INFO ADVANTAGE, Storage solutions (SAN & NAS), viewed 20/12/2016,
Summary:
This resource is a commercial site explaining the merits of storage area network(SAN) and network attached storage(NAS). I choose this resource because it gives sufficient information to remove my confusion. This resource explains us as major benefits of Storage area network are availability, reliability, scalability, performance, manageability and return on data management. First one availability is sole copy of information which can be accessed by everywhere through many paths. Secondly, reliability guarantees minimum fault rate and capacity of recovery from breakdown is provided. Scalability refers as any devices can be added easily and it is independent from each other. It do not disturb the whole system. In addition to, performance is an overall outcome of SAN system. It has fiber channel which has one hundred MB per second bandwidth and low overhead. Manageability refers as ability of emerging software and proactive fault identification and correction. What is more, return of information management merits of SAN deliver low cost of purchase and high return of data arrangement. SAN developed for providing transmitting data over a network from one storage device to other or a host. When it is necessary to share expensive devices, SAN is very beneficial and cost effective technology.
Network attached storage technology is stand for NAS. First of all, it can transmit any type of network file because it comprises more than one mass storage machines and an engine. Secondly, NAS uses file system devise driver with file access protocol like NFS (network file system), block of massage server and CIFS (common internet file system), hence the storage capacity and scalability rises. What is more, NAS technology is grown up and interoperable. Apart from these, NAS is comparatively cost efficient technology because of its capability of consuming any well-known network transport protocol such as gigabit Ethernet network, IP network and so on. I found this article is very useful as it helps to understand us the benefits of SAN and NAS.
Week 2
Task Real-time operating systems are used to serve real-time applications which process data as it comes in, without buffering delays. Provide specific examples on the use of specific real-time operating systems that are not mentioned in the textbook.
Summary
Title and Reference:
QNX operating system
Salesforce World Tour Sydney 2004, QNX operating system, viewed 15/12/2016,
Summary:
• This resource is a organizational site, providing a perfect example of real time operating system. I choose this resource because it gives me enough details about the qnx operating system. This resource tells us that qnx is basically developed for dangerous working. There are some field where qnx is used like set top boxes, engine control and measurement where evaluating data in real time, networking field and embedded system. It can support software for Linux. The qnx is capable for developing software, controlling industrial robots, limiting reaction timing and so on. The first version of it was qnx 4.0 then it was renamed as ‘QNX window’ and ‘X Window’. During this time, behavior of reacting GUI was improved.it provides stable base for many application aoms with rum time memory protection and error detection. Qnx is also more useful in reserved use where minimum hardware needs and easy client interface is required. There is also possible to create qnx application with the use of qnx moment development suite. The use of this suite is only for 30days. It comprising bunching framework for developing network based application for treating distributed. QNX neutrino ropes representation of 3D pictures, multi-layer client interfaces. QNX neutrino has many benefit as it has great consistency and little danger.
• Instrument of higher safet
• Imitation is measurable and precious
• Faster picture backing GPU
• Wide panel provision.
I found this article is very useful as it has gained my knowledge about qnx operating system.
.
Week 3
Task Cloud computing has gained a wide acceptance for organisations as well as individuals by introducing computation, storage and software based services. Explain the security and privacy issues in relation to the use of the cloud computing in the health sector.
Summary Title and Reference:
Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems
Rodrigue, J 2013, online, Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems, viewed 28/12/2016,
Summary:
This resource is a journal, discussing about the problems, which are created in health record system in health sector regarding to privacy and security. I choose this resource because it provides full description to eradicate my confusions about this topic. The author Joel JPC Rodrigues suggest that we should first examined privacy and security related issues before starting cloud computing in the health sector. As the Spanish law suggest that the author in health sector the electronic health record should be defined as the certification, which comprise details regarding to clinical evolution of the patient during his process. Then this records are taken as privacy of users. This law keep this records as “specially protected” data. This type of law is made as protecting the privacy of sensitive patient. But this kind of law has their own issues as in this case, the patient permission is necessary to access this details. Secondly, to maintain privacy and security is not a simple. Due to data migration process, its complexity is increasing. What is more, in the United State, HIPAA made PHI (Protected Health Information) have to obtainable to deliver medical cure of patient. Adding entities in this rule, the use of health information must be agreed by patient. In addition, these, this rule need those entities which is use PHI the least amount of information is required to fulfill their requirements.so more precision is necessary to maintain security and privacy policy. The cloud service provider, healthcare provider or clinical center can tell cheat with the both parties. When the all data are moved to the internet, the health provider give some information to some exterior threats, so there is a fear of dilatation or stealing data. The data required encryption and control. I found this article is valuable because it shows the privacy and security problems due to crowdsourcing in the health sector
Week 4
Task In TCP/IP, the application layer contains the set of protocols used in the process-to-process communications across a computer network. Discuss the common standards at the application layer.
Summary Title and Reference:
TCP/IP Protocol Architecture
Microsoft TechNet, TCP/IP Protocol Architecture, viewed 20/12/2016,
Summary:
This is a library resources, giving us the knowledge about the protocol which used in application layer of TCP/IP model. I choose this resource because it provides full details of common protocol. This resource gives the name of protocols which are used in the application layer are HTTP, FTP, SMTP, TELNET, DNS, RIP, SNMP. The following protocols are used for transferring information.
HTTP: HTTP is stand for Hypertext Transfer Protocol, which is taken to use in application layer for transferring files which are in the form of HTML. These files create The Web pages’ pf the WWW (World Wide Web).
FTP: The full name of this protocol is File Transfer Protocol. This protocol exchange file between Two devices with authentication.
SMTP: This protocol stands for simple mail transfer protocol. It is taken for transferring postal communication and affection.
TELNET: This is the Terminal emulation protocol, which is used to log on distance network host.
According to this resource, following protocol are used for arrangement and consumption of TCP/IP network.
DNS: This protocol is stand for Domain Name System. The host name of IP address is resolved by this protocol.
RIP: This the Routing Information Protocol which is used for updating routing details of wide area networks or internet. It is also used for transferring information on IP network
SNMP: The full name of this protocol is Simple Network Management Protocol, which is used between network components (routers, bridges, hubs) and comfort of network arrangement.
I found this resource is precious as it give me a wealthy knowledge about the application layer protocol in TCP/IP model.
Week 5
Task Adware is one of the top malicious threats today and has become from being merely an annoyance to a major security threat for organizations. This malware program is designed to render advertisements on end user systems. Provide specific examples of adware attacks and their implications.
Summary Title and Reference:
Spyware and Adware
Aycock, J 2011, Spyware and adware, Springer, Alberta.
Summary:
This resource is a e-book, providing sufficient knowledge about the topics. I choose this one due to its specifications about the adware. According to resource the adware examples are following:
• downloading a free record or program LIKE music document, amusement, game, activity that contains adware
• opening an MAIL connection COMPRISING an adware electronic dangerous are included in email connection, when such emails are opened in devices hence adware enter in it.
• visiting a infected webpage with a web program, which have adware threats.
• When user download, distributed document sharing programming which has already constructed adware dangerous.
• Some description of software’s is misleading. The attacking may be created by answering a question of downloading and accessing such software.
When adware enters in PC or laptop it tremendously affects the devices’ performance. Following are some implication of adware attacks.
• The adware can change the operating system of devices and
Its avoidance is more difficult.
• Adware also create some process itself so, it is too hard to remove the display advertisements.
• Adware is a poor software that may instable the system and performance of devices.
• When adware comes in PC it uses some parts of internet connection speed for displaying advertising hence it slow down legitimate traffic to the internet.
• Sometimes it also downloads other software by itself without any permission
As this resource give me valuable solution of my question hence it is very helpful for me.
Week 6
Task Internet of Things (IoT) is a paradigm that is rapidly gaining ground in the scenario of modern wireless telecommunications. IoT is used to connect networked information systems and business processes. "Availability" and "Reliability requirements" are some of the key quality of service (QoS) metrics. Explain the impacts of Availability and Reliability requirements on IoT performance.
Summary Title and Reference:
What does reliability have to do with the Internet of Things?
Andershen, J 2015, What does reliability have to do with the Internet of Things?, viewed 01/01/2017,
Summary:
This resource is an article, introducing contribution of reliability and availability features on the performance of internet of things. I choose this resource because it provides useful knowledge about the topic. The author of this resource is Jason Andersen. He suggests us many layer is available to augment the quality of internet. He stated that what steps are taken to maintain reliability on IOT. First one is devices are exact terminal in the system. Access network contains network layer which is used by devices to take first access point. Another is control layer, it can comprise lots of methodologies. Last is back end services where the data analysis and data combination and other centralized services are done. The Back-End layer is arranged by IT team, so it can be used as reliable and available for another layer. But differed in only control layer has different method so there is a necessary to think about reliability.
According to the author, keeping reliability is not a simple method. In traditional system, Back end layer is main factor to deliver to real time support to the end system (devices like tablet or PC). But in IOT it can be handled in control layer. Control layer included application sitting like Process Control Application, fulfillment application and Messaging application. So, control layer is main part of IOT for reliability requirements.
In availability, this term can be defined as highest level of fault tolerance for all security application. Planning to get suitable level of availability and keeping requirements for all security application is the key to obtaining balance real time availability. High availability comprises both hardware and software methodology to decreasing downtime. This resource explain us the effect of availability and reliability on internet so, this is valuable for us.
Week 7
Task A mobile crowdsourcing system is a new form of commercial crowdsourcing system. Provide specific examples of organizations which use mobile crowdsourcing system to successfully improve their business operation.
Summary Title and Reference:
5 Examples of Companies Innovating with Crowdsourcing
Jartese, 2013,online,5 Examples of Companies Innovating with Crowdsourcing, viewed 10/01/1017,
Summary: This resource is a blog entry, providing examples of some company which uses mobile crowdsourcing. I choose this resource because it is the perfect solution about my confusion. The author of tis resource is jartese. He discussed about five examples of company which has gained their business by using mobile crowdsourcing. The five examples are Coca-Cola, Nokia, Unilever, Gen-mils, Anheuser-Busch (AB).
Coca-Cola- It is a popular company uses the mobile crowdsourcing. Coke is now become a open business model and gained top position in professional crowdsourcing. Coke finds crowdsourcing online suggestion for marketing its manufactures much better and also for helping the social network.
Nokia- Its project idea introduces as a global community devoted for opening innovation. For improving the viability of Nokia products, it focuses on customer -derived collaboration over two hundred nations. As it uses consumer experiences its ideas project is valuable. It is also help them to innovate new products they seek from Nokia. Nokia share customer reviews of crowdsourced idea with ideas project participants.
Uniliver- This is also another example which use mobile crowdsourcing. It finds external contribution from partner outsides the region. bringing for crowdsourced ideas, details, reviews and analysis has been emerged as a viable and wealthy resource of enterprise details. It is successful process for creating innovating solutions for number of corporate and social problems.
Gen (general)mil- It finds ideas that help to provide successful innovation in any operational area. It is open source enough surviving that ant one visit the website and submit its proposal.
Anheuser-Busch (AB)– AB has developed sizeable in reads in crowdsourcing dewier is easily US’s best selling beer , The site of AB has strong trailers for opening invention chances with the solid. This resource give us perfect examples of our demands, so it is very precious.
Week 8
Task The adoption of big data technology by organizations has led to better value creation at the customer and enterprise ends. Provide specific examples on the use of big data for value creation in sustainable organizations.
Summary Title and Reference:
Creating competitive advantage using big data
Peter ,B 2013, online, Creating competitive advantage using big data, viewed 15/01/2017,
Summary: This resource is journal introducing us about the big data in big companies. I choose this resource due to its healthiness information. The author of this resource is Peter Bell. He says that almost all companies use big data But he mention about those companies who have gained its business by using big data. The most common example of such big data companies are, first one is Dell and second one is ICBC (industrial and commercial bank of china.)
The author mention that, initially the Dell company was using CTO(configure-to-order) business model. But it was stopped by 2007 and after that it commenced business by using prescriptive big data analytics. By using it, Dell got a abundant of history which are purchased by the customers. By taking use of these history dell makes millions of combinations of possible product configuration. Then Dell captured about three quarter of Dell desktop and notebook. In present, half of the Dell’s sells are made by this configuration.
Industrial and Commercial Bank of China(ICBA), which is the largest bank of the world has many branches about 16,000 throughout china. ICBC is accredited more than one billion US dollars in bond gained by using Suzhou with this system to improve division locations. More than five hundred employees have been trained to use the system by ICBC to use the system. ICBC consumes data of public field and contain several controlling on IP (grew by IBM). Resulting is, for sometime ICBC should be helped by this work. This resource explains us the advantages of big data in big organisation which is perfect for our question so, it is very useful.
Week 9
Task Software development activities such as requirement analysis, design, implementation, testing, and maintenance are carried out within a software development life cycle in an organization. Discuss the main benefits of using agile process over incremental process.
Summary Title and Reference:
Agile Vs. Waterfall: Evaluating the Pros And Cons
MIKOLUK, K 2013, ONLINE, Agile Vs. Waterfall: Evaluating The Pros And Cons, viewed 18/01/2017,
Summary:
This is a blog resource describing in-depth merits of agile process. I choose this one because it compares agile method to other incremental process. The author, Kasia Mikolik, differentiate both processes according to its merits and demerits. For experimental software design, agile is better option. The case in which the requirements and aims are not clearly defined, agile method is appropriate choice. Evolving new requirements for growth is easy in agile methodology. In this method, the interaction and communication collaboration is more precious than design. Through the developing process, different designer work on separate module. In the last part of the process all designer does co-operating work to make solid software piece. Agile methodology suggests an iterative approach to software design. The whole work is divided into smaller parts in that designer work on. No predetermined action is there in agile methodology. So, it’s popularity increased for the last several years. In addition to these, through the lifecycle, testing is inspecting of current products as it is developing, so adjustment is necessary and possible to remove any issue in product. Agile has excellent visibility for stakeholders that their requirements are effectively engaged. Hence, clear visibility ensuring that any plan can be made at early possibility thus it reduced the risk management. What is more, agile has high flexibility or agility as change is accepted in it and stakeholders are involved in decision making team so it has a new scope. The cost is also fixed in agile method. According to the author, these all benefits of agile method leads to high customer satisfaction ratio. This is an valuable merits that make much more positive work- relation. With the use of agile method is more enjoyable and leads to make right product. According to these information, this resource is very helpful.
Week 10
Task Information technology is perceived as a potential solution for healthcare organizations to improve their services in the face of increased demand. Discuss organizational issues, with examples, in the adoption and implementation of information technology.
Summary Title and Reference:
Systemic Problems in Information Technology Adoption and Use: A Systems Thinking Perspective
Raza S & Standing, C online, Systemic Problems in Information Technology Adoption and Use: A Systems Thinking Perspective, viewed 25/01/2017,
Summary:
This resource is an article describing the problems created by IT adopting in organization. I choose this resource because it is perfect match with my confusion and giving me valuable knowledge as well. The author of this resource is Syed Arshad Raza and Craig Standing telling us that adopting information technology by an organization is a part of the process if information system implementation. How to understanding a information technology is still a big question. For this, the focus should be measured potential perception of technology perception initially based on five characteristics of innovation according to the author. The Autor believe that the problems may be Psychological, social and organizational and it cannot be solved by critical path method or joint application method. He mentions that the basic difficulty related motivating, difficulties in structural staff and competing stakeholder.
This article represents two example of issues. These issues related to barrier or failures. Its consideration led to system thinking characteristics like, organizational system is complicated philosophy, to learn an effective organization system is dynamic, it necessary to measure a scale of the system and so on.
First one is in medium and small- sized organization, outsourced information system become unsuccessful. In this case, system contains enterprise stakeholders and agent as well. This issue introduces asymmetric information (keeping information private) and lack of compromise.
Second is issues created in health sector where user team comprises doctors, nurses, administrators and patients. In this case issues created as scarcity of teaching and backing, privacy issue, scarcity of expertise and system incorporation and conservatism as well. This resource provides us several examples of companies which have adopter Information technology and have faced some issues as well.
MARKING SHEET - DO NOT DELETE
(Up to 3 marks per weekly task)
Criteria 0 No Response
<=1.0 Poor resource selection; resource is too broad or lacks relevance to the task; summary fails to explain what the resource was about; the relevance of the resource has not been explained.
<=2.0 Good resource selection; resource is relevant to the task; summary is adequate but may require either more detail or is too long; the relevance of the resource as been explained to some extent, but needs additional information.
<=3.0 Excellent resource selection; resource is highly relevant to the task (the resource is probably highly specialised); summary is detailed yet concise; the relevance of the resource selection has been clearly explained.
Key
Deductions -1.0
-3.0 Resource not referenced correctly/not in Harvard format
Resource not referenced/Resource cannot be traced with details provided.
Week Marks Awarded Comments
1 2.5
2 1.5
3 1.5
4 1.5
5 0.5
6 2.5
7 2
8 3
9 0
10 1.5
TOTAL 16.5