ADVANCED WIRELESS TECHNOLOGIES

Task Different antenna, such as yagi, horn, and celluar antennas, etc. has different merits. Research these technologies in details and pay specific attention to how they are used as well their strengths and weakness. Provide an opinion regarding which antenna types will become the dominant players in the future of medium- and long-distance wireless links…

READ MORE

DESCRIBE THE CONTEXT OF AN INFORMATION SYSTEM

Task Background: Headspace is an organisation that works with youth aged 12 to 25 who experience mental ill health. Depression and anxiety are the most common mental health problems, although there are many others as well. Youth suicide in regional NSW for the age groups 16 to 24 has been particularly alarming, especially amongst Indigenous…

READ MORE

Analysis of Protocols with Wireshar

Question 1. Analysis of Protocols with Wireshark [12 marks] Objective: Gain a good understanding of common Internet protocols as well as using packet capture software (Wireshark) For  this  question  you  must  use  virtnet (as  used  in  the  workshops)  to  study  Internet applications with Wireshark.   This assumes you have already setup and are familiar with virtnet. See…

READ MORE

Drive2Impress is a small business

Task Overview of business case: Drive2Impress is a small business that sells cars in Canberra. Drive2Impress can obtain cars from several different suppliers. Drive2Impress keeps its cars in several showrooms across the city. At this stage customers cannot view the available cars online so to order they must visit one of the showrooms. Customers call Drive2Impress…

READ MORE

COMPLETE A DIFFERENT SECTION OF THE GIVEN PROJECT

Assessment details for: Portfolio 1 (10 marks). What You Need to Do   At the end of each week, you will complete a different section of the given project as specified in Background section above. Each of the weekly Individual Case Project, found at the end of each chapter, will contribute progressively toward the completion of…

READ MORE

STAKEHOLDERS AND BENEFITS OF THE STAKEHOLDERS

Abstract:Recent researchers shows that the issues related to the railway automation have been underestimated. Only the attacks like denial in services affect the railway automation, fortunately, but due to the growing trends of commercial IT and information systems or privatization and security, the threats would also increaserisk in future. Until today, there isno researchavailable which…

READ MORE