COIT20246 Information and Communication Technology Assignment Help

COIT20246 Information and Communication Technology Assignment Help

COIT20246 Information and Communication Technology Assignment Help

Week 1

Task

 Benefits of storage area network and network-attached storage

Summary:-

Storage area network is network providing for storage of devices. It runs on local area network or wide area network is the solution for mass storage having a collection of storage disk drives. It can help the business to store a large amount of business data in one single storage appliances. SAN allows recovering the multiple applications at the time of disaster, San is a better solution for business who is running a number of servers on different applications and those applications are an inevitable part of business process. SAN is beneficial for those applications to require large storage.

COIT20246 Information and Communication Technology Assignment Help

Network attached storage is storage device system which can be easily attached anywhere where the network is available. It enables the multiple users to connect to the network simultaneously. It has an easy accessibility on the TCP/IP Ethernet based network. It reduces the expenses to be incurred in HBA adapters, switches, unlike in SAN system. NAS also does not require any specialized skill or expertise for setting up this system.

Week 2

Task

Specific examples on the use of specific real-time operating system

Summary:-

The real-time operating system is an operating system which without any delay enables the real-time applications to process in a very shorter time.

LynxOS: - Lynox is one the productive operating system which is highly useful in business in their operating system.

OSE- OSE is an operating system environment. It helps to identify and classify separate machines or administrative rights.

QNX- QNS is also widely used software which is framed for embedded system which is running on various tracks.

RTLinux: - RTLinux is operating system is a preemptive process which takes care of the entire system. It helps the hard real time property to be in control robots and other time sensitive instruments through the use of RTLinux.

VxWorks:-It is an operating system which real time used in the embedded systems.

Windows CE: - It is developed by Microsoft Company used as an operating system for embedded family of products.

Week 3

Task

Explain the security and privacy issues in relation to use of cloud computing in health sector

Summary:-

Healthcare sectors are increasingly using Information technology aiming to improve their services and cost. Availability of right information at the right time is the primary need of health care services. Cloud computing is offering for quick accessing of information and medical data anywhere with the help of internet.  Cloud computing allows the distribution of information on the computers connected to the internet everywhere. There is a risk of leak of Medical data of the patients through cloud computing. Data of the patients maintained using cloud computing may have personal or private information which must be secure and safe. The personal information of the patients may be hamper using cloud computing. Healthcare services are also legally bound to safeguard the personal data of patients, there now- compliances will lead to huge amount of penalties.

Healthcare services suffer a risk of data security and privacy of the patients, lack of trust using cloud computing in managing the information of patients.

Week 4

Task

Explain the security and privacy issues in relation to use of cloud computing in health sector

Summary:-

Application layer is a useful sensor management protocol helpful to transparent the sensor management network management applications

SMTP –Simple mail transfer protocol is helpful in electronic mail services. It acts as a protocol. It helps to the exchange the mail from different users.

TELNET- the Terminal network is an application for client server, helpful to access the application program on a computer having a remote system.

FTP- FTP is file transfer protocol helps in copying the file receive from one host to another.

MIME- MIME is a multipurpose internet mail extensions enables to transfer the all the multimedia messages easily.

POP-post office protocol is used to filter the emails and separate them to the different folders.

HTTP- It is used to connect with data on the World Wide Web.

DNS-Domain name system is a system which helps to generate domain using different platforms.

Week 5

Task

Examples of adware attacks and their implications

Summary:-

There are many adware attacks found while using a computer. These attacks are associated with many risks which can leak the user information. The hackers use this path to misuse the information of users. Internet surfing involves the many attacks which stop the computer. This attack can have control on the personal computers. Most adware is found to be useful to some extent but some lead to having control on your hard drive and software. Adware also has a risk of virus in the system. Some adware destroys the information of the user. Creation of pop-up window and many other windows get created while using the internet. They have an attached virus which can destroy all the information of the users of the internet.

Week 6

Task

Impacts of availability and reliability requirements on IOT requirements

Summary:-

There are many attacks found while using a computer. These attacks are associated with many risks which can leak the user information. The hackers use this path to misuse the information of users. Internet surfing involves the many attacks which stop the computer. This attack can have control on the personal computers. Most adware is found to be useful to some extent but some lead to having control on your hard drive and software. Adware also has a risk of virus in the system. Some adware destroys the information of the user. Creation of pop-up window and many other windows get created while using the internet. They have an attached virus which can destroy all the information of the users of the internet.

Week 7

Task

Organization using mobile crowdsourcing system to successfully improve their business operation

Summary:-

The crowdsourcing system is used in business to perform the same task in the different system. Tasks are allocated to people connected through a network.

Freelancer is a Company which is using mobile crowdsourcing. The company obtains real time information which facilitates the Company to know the trends in the market, opinions of the customer regarding the products and services. Companies have achieved high sales and decrease in operational cost with the use of mobile crowdsourcing. Uber-Company is using mobile crowdsourcing system in its business function. Cost reduction and improvement in its information management are the benefits which have improved Company’s overall performance. Uber customer relations have improved due to mobile crowdsourcing. Opinions and other feedbacks can be discovering via mobile crowdsourcing which helps in strengthening customer relations. It also helps the Company to use the innovative ideas collected from different source. The Company is online transportation network Company which is using mobile crowdsourcing in most of the functions. Uber has connected his various customers by registering them in the mobile app of the Company. This has increase the customer base of the Company and marketing of new products and services is now easy through mobile crowdsourcing.

Week 8

Task

Big data technology by organizations

Summary:-

Big data is the large data generated per second. Big data technology is the technology use to manage the vast and complex data effectively and efficiently.

Amazon Company is using bid data technology. The company has a big amount of customer data which is generated regularly. It has a mass amount of data related to customer names, address, payments, which has to manage on daily basis. The company is successfully using big data technology. They use the big data technology to improve its customer relations. Many Organizations overlook the collection of data generated from customers but Amazon is effectively using customer information for achieving the customer loyalty. In the online e-commerce market, Amazon is the topmost Company in its customer base and highest sales.

Reliance telecommunication is a T-mobile Company which has a large collection of data from martphones and tablet. Reliance communication uses big data technology to target the right customers. They solve their problems by analyzing the needs and requirements of the target customers. Big data is supporting the business to gain a competitive advantage over the competitors. Big data technology helping the Company to analyze the data collected from the various source.

Week 9

Task

Benefits of using agile process over incremental process

Summary:-

Agile process is an important process in developing the software life cycle. The agile process involves gathering, analyzing, designing, coding, testing of the partially software’s and then taking the feedback from customers.

The agile process can adapt to the changes, unlike incremental process which requires the use of new technology due to any change. Agile process is comfortable even for late changes to be made in software. The incremental process requires a good planning and designing but agile process adapts itself in any circumstances. The agile process focuses more on the interactions between customer rather than tools, process. The incremental process focuses on whole process and a clear definition of the system. The incremental process requires high cost than the agile process of software development.

Week 10

Task

Organization issue in adoption and implementation of information technology

Summary:-

Healthcare center is increasingly using IT in their business. IT is rapidly changing with different shapes. Hospitals deal with the patient’s personal data and information which has to keep confidential.

Many challenges are there with Healthcare organizations in using information technology:-

Data collection in hospitals is growing in large volume in hospitals, their electronic maintenance requires proper password security and responsibility.

With the increase in the use of IT in the hospital, various mandatory acts are enacted which requires safeguarding the medical information of customers.

Data storage capacity has to increase with the increased use of information technology. In order to store the data in the system, data capacity has to be timely increase and improve with efficient software solutions.

High cost involves in implementing information technology system. Government regulations have bind health care Organization to mandatorily invest in Information technology.

Reference: -

Tate J., Beck P., Ibarra H., Kumaravel S. & Miklas  L. (2016)“Introduction to Storage Area Networks” Red Books, pp-24-120-278

Padhy R. & Patra M., (2012)“Moving Towards San Storage: An Enterprise Perspective”,Journal of Global Research in Computer Science, Volume 3, pp-21-29,

Link:- https://www.redbooks.ibm.com/redbooks/pdfs/sg245470.pdf

http://www.rroij.com/open-access/moving-towards-san-storage-an-enterprise-perspective-21-29.pdf

Wang Y. (2010) “The Formal Design Model of a Real-Time Operating System (RTOS+): Conceptual and Architectural Frameworks” International Journal of Software Science and Computational Intelligence, pp- 105-122

Link:- https://pdfs.semanticscholar.org/f937/e0d24670f5c84d9576970e7bd80ce4adb989.pdf

Gavrilov G. & Trajkovik V., (2012)“Security and Privacy Issues and Requirements for Healthcare Cloud Computing”, ICT Innovations 2012 Web Proceedings ISSN 1857-7288, pp-143-152

Link:-

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.403.8984&rep=rep1&type=pdf

Maraiya K., Kant  K. & Gupta N. (2011)“Application based Study on Wireless Sensor Network”, International Journal of Computer Applications, Volume 21, pp- 9-15

Link:-

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.206.2841&rep=rep1&type=pdf

Birajdar,N., Dhuppe, M., Hegade, T., Jadhav, N, & Shelar, M., 2015, “Review Paper On Adware Detection Using Instruction Sequence Generation”, International Journal of Engineering and Techniques, Vol. 1, Issue 6, pp. 25-28.

Link:- http://www.ijetjournal.org/Volume1/Issue6/IJET-V1I6P6.pdf

Madakam, S., Ramaswamy, R., & Tripathi, S., 2015, “Internet of Things (IoT): A Literature Review”, Journal of Computer and Communications, vol 3, pp 164-173.

Link:- http://file.scirp.org/pdf/JCC_2015052516013923.pdf

Yuen M., King I.& Leung K. (2011) “A Survey of Crowdsourcing Systems” IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, pp-766-773

Link:- http://www2.cs.siu.edu/~dche2/files/130612153448.pdf

Sangeetha S. & Sreeja A. (2015), “No Science No Humans, No New Technologies No changes "Big Data a Great Revolution", International Journal of Computer Science and Information Technologies, Vol. 6 (4), pp-3269-3274

Link:- http://ijcsit.com/docs/Volume%206/vol6issue04/ijcsit2015060405.pdf

Sharma S., Sarkar D. & Gupta D. (2012)“Agile Processes and Methodologies: A Conceptual Study”, International Journal of Computer Science and Engineering, pp-892-898

Link:- http://www.enggjournals.com/ijcse/doc/IJCSE12-04-05-186.pdf

Goodman J., Gorman L. & Herrick D.(2010)“Health Information Technology: Benefits and Problems”, National Center For Policy Analysis, pp1-24

Link:- http://www.ncpa.org/pdfs/st327.pd