Report on emergent technologies

Assignment Help JAVA Programming
Reference no: EM132438023

COIT20257 - Distributed Systems: Principles and Development - Central Queensland University

Assignment

Objectives

The purpose of this assessment item is to assess your skills attributable to the following learning outcomes and achieving the expected graduate attributes of advanced level for knowledge, cognitive, technical, and creative skills, self-management, research skills, ethical and professional responsibility, and professional level communication:
• Critique the issues involved in developing reliable, secure, and scalable distributed systems.
• Discuss the technology needs and social impact arising from ubiquitous distributed systems.
• Work independently and collaboratively in small teams

Assessment task

You are employed as a consultant engineer in ABC Technologies. Your company recognises the serious challenges it currently faces in the industry, and has developed a corporate strategy to prepare its workforce for the next decade. Your department head recognises your scholarship, and has directed you to research and present a report on emergent technologies as part of the corporate strategy. Your audience would be the department's senior staff who may not be up-to-date with these emergent technologies and their impact on future product development.

Your task is to write a technical report defining some of the theoretical aspects you have learnt and researched, and to discuss the reliability, security and scalability of two of the emergent technologies, specifically, Blockchain and IoT (Internet of Things).

Use the following guidelines to structure your report. Your report should be a complete reference for the topics you discuss in your report. Therefore, include the following topics in your report.

a) Define Distributed Systems including a diagram of system architecture. Distinguish between the client/server and peer-to-peer model.

b) Define the terms reliability, scalability, fault tolerance, fault tolerance measures, and security in relation to distributed systems.

c) Describe the following on the two emergent technologies, Blockchain and IoT: i Describe the architecture of blockchain and explain the components

ii What is the purpose of consensus algorithms? Explain the principle behind Proof of Stake (PoS) algorithm? Compare this with the bully algorithm used in process coordination.

iii What is the difference between distributed transactions and blockchain technology? iv How does Delegated Proof of Stake (DPOS) compare with election algorithm?

v What are the scalability issues in blockchain technology? vi How security is ensured in blockchain technology?

vii How privacy can be leaked?

viii What are the fault tolerance techniques used in block chain technology? ix Define IoT

x How IoT and blockchain technology can contribute to applications that can improve social inclusion and ubiquitous computing? You use an example application to explain your answer

Use the above questions to collect data while you read the articles. Then using the collected data, format your report stating the facts in a clear, concise, and coherent style, linking the ideas, but not as disparate answers. The length of your report should be about 2,500 words. Follow the given template on the website to format your article. It should have the author details and the body consisting of introduction, other topical sections, and a conclusion. You follow an article format rather than a report format with executive summary and table of contents.

You should have minimum five (5) good quality journal/conference articles or books as your reference. Use only articles published later than year 2014 (2014 - 2020). You should include in-text referencing for the references in your listing.

Report

Introduction
Introduction should have a brief description of the topics of your discussion. This section should also introduce the organisation of the report, introducing each section of your report.

As the focus is on exposing your understanding of the theoretical aspects given above, pay attention to define and explain terms which you will be using to build your argument in the later sections. You can use the prescribed Textbook and other books or articles. Use diagrams as needed.
The body containing topical sections as required. Include in-text referencing following Harvard referencing style.

Conclusion.
You should write a conclusion that will conclude the topics discussed and any suggestion of further work in this area.

References
List the references using Harvard Author-date style.

Report format
One of the objectives of completing this assessment task is to assess that you have developed the skills for the desired graduate attribute of professional level communication skills. Conforming to given standards in presentation and expressing ideas, clear and concise are expected in professional communication.

Attachment:- Distributed Systems.rar

Reference no: EM132438023

Questions Cloud

Media artifact that is available both in print-moving image : Choose media artifact that is available both in print and in moving image form. Describe both formats in detail, highlighting their similarities and differences
Describe three kinds of physical mobility : Describe three kinds of physical mobility that people in the United States enjoy today, explaining how each influences fashion demand.
Overall availability of product management : The Work-in-Process limit at the Analyzing step of the Program Kanban is based on the overall availability of Product Management, other subject matter experts
Schedule feasibility for the restaurant : Describe how you would determine the technical, economic, legal, operational, and schedule feasibility for the restaurant and its proposed computer system.
Report on emergent technologies : Critique the issues involved in developing reliable, secure, and scalable distributed systems and Discuss the technology needs and social impact arising
Report that details each of the cyber security principles : Write a summary report that details each of the cyber security principles and describes the Adversary Model, including resources, capabilities
Theme of Artemisia and Sussana : Discuss a passage or theme of "Artemisia and Sussana" by Garrard that you consider significant.
String value of the time parameter : Complete the following method that takes a String parameter that is a time in American 12 hour format, such as "06:12 PM."
List some third-party anti-virus software you are familiar : List some third-party anti-virus software you are familiar with. What positive and negative experiences have you had with them, if any?

Reviews

Write a Review

JAVA Programming Questions & Answers

  All your code should be in the main method

Write a Java test program, all your code should be in the main method, that asks the user for two numbers representing an investment value and interest rate

  Java program to demonstrate the use of jdbc

Write a Java program (non-GUI preferred) to demonstrate the use of JDBC. Write a list of animal and its characteristics to a database using JDBC

  Discusses the software development life cycle

A bug can be defined as an unexpected defect in a computer program Number of faults, flaws and imperfection can be encountered in an application developed with a given technology and platform. All these bugs should be reported to the organization ..

  Create an application containing an array

Create an application containing an array that stores 10 integers. The application should call five methods that in turn (1) display all the integers

  Python programming using vb 2017

Please I NEED HELP answering the questions below. Include the CODE OF the results of each question. solved problem, for each of the below.

  Develop both an uml diagram and the corresponding java class

Develop both an uml diagram and the corresponding java class for a New York State Win 4 lottery ticket .

  Write a program to track hourly employee arrival departure

THE JAVA SOURCE CODEWILL AWARD AN ADDITIONAL 1,500 POINTS TO PERSON WITH THE BEST ANSWER (you will be directed to another one of my previous, unanswered questions.)A company hires you to write a program to track hourly employee arrival and departure ..

  What is an illustration of a javascriptr framework in the

what is an example of a javascriptr framework? in the framework you have described what is an example of an application

  Simple java program that plays tic tac tow

Looking for a simple Java program that plays tic tac tow and using a 2D array and have A.I. Look at the attachment for the instructions.

  Command line arguments are passed to the main method

Command line arguments are passed to the main method through the array of String references (args in the main method below).

  Draw dashed lines

Write a class Lines containing a static method dashedLine to draw dashed lines, so it can write:

  Write java method which fills the array with random numbers

Write a Java method which takes an integer array parameter and fills the array with random numbers between 1 and 1000, including 1 and 1000.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd