Term Assignments


ICT Service Management COIT 20246

Due date:Thursday Week 11 (2PM AEST)
Part:Written Assessment
Weighting:30% of the total assessment. 
Submission:Electronic (see course website for details)
Assignments Detail


It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. 

DO NOT copy content directly from either the text or Internet resources:  this assignment is to be in your own words.  You will lose marks if you do not use your own words!

Please complete your assignment using this submission template file, inserting your responses where indicated.

DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers.


There are ten (10) tasks, one for each week:  the tasks are detailed below.  There is a table to complete for each task.  Please fill in the information required.  An example of a completed task is below.  Note the first response is good – so aim for something like this.  The second response is not acceptable, so if you submit anything like it, you won’t pass the assignment!  The reasons?  Poor resource selection (Wikipedia), no Harvard reference and a block cut and paste from the site (no citation, no original content).


TaskFind two resources that explain aspects of IT Service Management.

Good Response

Title and Reference:


Ibaraki, S 2014, online, COBIT versus ITIL, viewed 29/01/2015, <http://blogs.technet.com/b/cdnitmanagers/archive/2014/04/06/cobit-versus-itil.aspx&gt;


This resource is a blog entry discussing the differences between CoBIT and ITIL.  I chose this resource as there is a lot of confusion about the way in which ITSM is applied and the distinction between the CoBIT and ITIL implementations is frequently unclear.  Ibaraki explains that CoBIT provides the governance and metric structures while ITIL delivers on the actual mechanics and “how-to” processes.  The author makes an interesting observation that it is wrong to simplify COBIT as providing the ‘why’ and ITIL providing the ‘how’ because both ITSM mechanisms have considerable overlap and both need to be used at the same time.  I found this article very useful in explaining the differences and similarities between these two aspects of ITSM.

Bad Response

Title and Reference:
h t t p ;// example .com


These pages talk about ITSM.  It says that IT service management (ITSM) refers to the entirety of activities – directed by policies, organized and structured in processes and supporting procedures – that are performed by an organization or part of an organization to plan, deliver, operate and control IT services offered to customers. It is thus concerned with the implementation of quality IT services that meet the needs of customers and is performed by the IT service provider through an appropriate mix of people, processes,es and information technology.

Note:  Each resource summary should be a maximum of 300 words.

Week 1


Significant advances in very-large-scale integration (VLSI) circuit technologies have enabled the implementation of complete computing systems on a single chip. Find and summarise ONE resource (within the last two years) that describes the use of VLSI technology.

Title and Reference:

VLSI: Development and Basic Principles of IC Fabrication.

Electronics For You 2019, VLSI: Development and Basic Principles of IC Fabrication. [online] Available at: m a.com


The article describes the uses of VLSI technology in the current situation, their sizes, technical information, and assemblies to produce chips. I chose this article as it consists of a brief design of what is a VLSI chip, some theories supporting that VLSI improvement will last in the near future and continue in the advancement of technology.

The article describes the development of VLSI (Very Large Scale Integration) started in 1970s with the advancement of complex semiconductors. VLSI also termed as Large Scale mix consists of a large number of chips inside a single chip.

VLSI also called a microcontroller has various functions combining all the functions of CPU, ROM, and RAM in a single chip outstanding from the integrated circuits, which consisted a few amounts of transistors through the years.

Some of the basic advantages of VLSI include reduction in the size and increased operating speed of circuits; reduction in the effective cost of the devices. Requires less power than discrete component higher reliability and relatively occupies a smaller area.

I found this resource useful as it successfully talks about the uses and planning of VLSI with their backend implementation, which enables to gather different components together for packaging.

Week 2


Real-time operating systems are computer systems that guarantee a certain capability within a specified time constraint. Find and summarise ONE resource that describes the benefits of real-time operating systems for the telecommunication industry.

Title and Reference:

The Role of the Realtime Operating System (RTOS) in Mobile.

Mistry, R. 2019, The Role of the Realtime Operating System (RTOS) in Mobile. [online] Qualcomm Developer Network. Available at: a. com[Accessed 25 Nov. 2020].


The article describes real-time operating systems (RTOS), an important component to ensure predictable and timely execution on embedded devices. I chose this article because it provides a predictable executable pattern to ensure that processing is consistent with a time-constrained system time constraint.

This article classifies RTOS as a soft meeting time-constrained time-frame with a pre-emission period within a few milliseconds. The firm has some time constraints that are not rigid and may not yet be acceptable due to undesired effects. Use cases with a hard time-limit set timeframe and pre-emption period less than a few micro-seconds preferably. Qualcomm Technologies has processors like Qualcomm Hexagon DSP, own embedded RTOS on Qualcomm Snapdragon 8 Series mobile platforms, which are common operating systems such as throttle synchronization, cross-border communication, memory management, multi-threading, mutex, semiforce, timer Functionality as follows. All its underlying systems and barrier handling for target application for better security and stability.

In RTOS, task scheduling is based on a high-priority process performed on low-priority processes, but still uses a pre-emptive task scheduling method based on some priority levels were placing critical service requests within a kernel call Goes and all other service requests are treated as. External processes and threads, thus, do not have any issue of latitudes as all processes and threads occur in a timely manner and ensure shared system resources are protected from concurrent access while maintaining a rapid and predictable response.

I found this article useful because developers can write user programs designed to use QuRT in assembly using the Hexagon DSP SDK and use the QuRT API to use RTOS services. Each user program uses a global heap containing main thread call stack, data and text sections, and the ability to allocate additional stacks and threads.

Week 3


The Cloud of Things combines cloud computing and the Internet of Things (IoT). It unifies the breadth and reaches of IoT with the vast compute and storage capabilities of the cloud. Find and summarise ONE resource that describes the security challenges in adopting this technology

Title and Reference:

IoT Security Challenges With Data and the Cloud.

Carr, R. 2020, IoT Security Challenges With Data and the Cloud. [online] Zettaset. Available at: https://www.zettaset.com/blog/iot-security-challenges-data-and-cloud/ [Accessed 7 Dec. 2019].


This is a blog post resource discussing the challenges of IoT security with data and the cloud. I chose this article because it addresses security gaps, gathers and analyses new security concerns and exponentially more information with a growing population.

The blog’s main concern is solving IoT-related security issues, so it advises professionals to share information and collaborate with their peers. Free distribution of data and knowledge is one of the best protections that the IoT professional has against hackers, as they continue to develop technologies that are evolving.

The Internet of Things (IoT) is a network of physical objects connected to the Internet that transmit and receive information, which is becoming increasingly common, so hackers will find more targets. Another security concern is “hubs”, which are interconnection points for multiple IoT devices, which when unencrypted, open multiple devices at once to keep their information.

Developers are mainly focused on speeding up the development of a product rather than spending time on security, for example security CCTV cameras and baby monitors are often shipped without built-in security, and they run on outdated software.

Some IoT devices do not have enough hard drive space to make updates or attachments to the Linux kernel, as manufacturers prioritize cost savings over security, which is why websites such as Twitter and Netflix took over in 2016. This resource is useful because it creates a dangerous security environment for many companies that do not know how to secure their devices in areas where security is built, security and security for cloud devices. Each device is unique because the IoT data encryption solution does not work on every device, making it difficult to protect the client’s sensitive personal information, making it wise to use an intelligent IoT data encryption solution

Week 4


Ethernet is a layer 2 protocol that defines wiring and signaling standards for the physical layer of TCP/IP. Find and summarise ONE resource (within the last two years) that describes the uses of ONE other layer 2 protocol that is not discussed in the textbook.

Title and Reference:

IPv6 Neighbor Discovery Protocol Explained

ComputerNetworkingNotes, 2018. IPv6 Neighbour Discovery Protocol Explained. [online] Available at: a . com[Accessed 19 Dec. 2019]


Blog Internet Protocol Version 6 (IPV6) Neighbour Discovery (NT) is a set of messages and processes defined in RFC 4861 that determines the relationships between neighboring nodes and router request and message redirection. I chose this article because it describes the ND that changes the Address Determination Protocol (ARP), the Internet Controlled Message Protocol (ICMP) router detector, and the ICMP routing message used in IPv4.

In the article the author describes the presence of five different NT news. A router request (ICMPV6 type 133) sent by IPv6 hosts to detect the presence of IPV6 routers on the connection. A host sends a multicast router request message to trigger IPv6 routers to respond promptly rather than waiting for an unsolicited router advertisement.

IPv6 switches send spontaneous router advertising messages pseudo-seldom, meaning that the interval between spontaneous ads is random when there are different ad switches in a single link – and the router has requested the message because the router has received the request.

IPv6 sends a neighbour request message to find the link-layer address of the on-link IPv6 node to confirm the sender’s predetermined link-layer address. An IPv6 node sends a neighbouring advertising message in response to a neighbour request message informing the neighbour of changes in the role of the link layer address or nodes. The redirection message is sent through the IPV6 router to inform the initial host of the best first hop address for a specific destination.

I found this article useful because NT provides additional functionality such as resolving the connection layer address of a neighbouring node to which an IPv6 packet is sent, determining when the neighbor node’s link-layer address is changed, and whether the neighbour is still achievable. , Auto-configuring addresses, address prefixes, routes, and other configuration parameters.

Week 5


Organizations are now implementing the next-generation firewalls that go far beyond the traditional stateful packet inspection firewalls. Find and summarise ONE resource that describes at least three advantages of the next-generation firewalls over the traditional stateful packet inspection firewalls.

Title and Reference.

5 Benefits of Next-Generation Firewalls.

Network Computing, 2017, 5 Benefits of Next-Generation Firewalls. [online] Available at:a .com[Accessed 18 Dec. 2019].


The resource is a blog post discussing the next generation of firewalls (NGFW). As modern cyberattacks and hacking methods improve, we need to build the next generation of firewalls for better security. I chose this article because it discusses why traditional algorithms that follow web protocols are not smart enough to distinguish between different types of web traffic and are unable to analyse network-packet data.

The blog describes drawbacks of traditional firewall, including basic packet filtering, network and port address translation, data link and traffic layer restrictions, common use on a network to control application access and track specific threats. Blocking ports or services. However, because network connectivity is so complex, many applications use many different ports, making it difficult to identify the encoded port. They need a security tool for each new threat, leading to additional costs and efforts to maintain and update each of these devices.

The benefits of NGFW are numerous as it provides all the functionality of traditional firewalls, including integrated behavior detection (IDS) and intrusion protection system (IPS), detecting attacks based on traffic behavior analysis, threat signatures or malicious activity facilitating deeper inspection and improving packet-content filtering of network traffic up to the application layer. The application alert helps monitor traffic from layer 2 to 7 and is smart enough to determine what is being sent or received. If content is within the policy, it will be sent further, otherwise blocked, for example, allowing users to access Facebook, but blocking Facebook chats. NGFWs provide streamlined infrastructure with integrated antivirus, spam filtering, deep packet scrutiny and application control to reduce infrastructure issues using only one device or console. This resource is useful because NGFW promises deep study capabilities and better control over the personal application network.

Week 6


Internet of Things (IoT) is designed to enable advanced services by interconnecting physical and virtual things based on, existing and evolving, interoperable information and communication technologies to a shared pool of configurable computing resources. Find and summarise ONE resource (within the last five years) that explains the importance of quality of service (QoS) metrics in IoT.

Title and Reference:

The Basics Of QoS. [online] Network Computing.

Froehlich, A, 2016, The Basics Of QoS. [online] Network Computing. Available at: a.com[Accessed 21 Jan. 2020].

The resource discusses the importance of QoS for supporting the growth in the Internet of Things (IoT). I chose this article as it explains how QoS works especially in the voice, video, and manufacturing sectors, and benefits the end user’s experience.

The article describes applications running on networks that are quite sensitive which commonly use UDP protocol with losing packets as opposed to TCP protocol which retransmits the protocol. If our network has a lot of bandwidth and no traffic that bursts above what we can handle, we won’t have a problem with packet loss, delay, or jitter (variation in delay of a streaming application).

But, in many enterprise networks, there will be times where links become overly congested to the point where routers and switches start dropping packets because they are coming in/out faster than what can be processed. if that’s the case, our streaming applications are going to suffer.

 QoS helps manage packet loss, delay, and jitter on network infrastructure by managing a finite amount of bandwidth for the application that needs a higher priority and identifying the traffic as Class of service (COS) and Differentiated Services Code Point (DSCP).

COS will mark a data stream in the layer 3 packet header. After categorizing data steams into different groups, we can use that information to place policy on those groups in order to provide preferential treatment of some data streams over others which is called queuing.

I found this article useful as it clarifies any delay in the identification of a problem can result in manufacturing mistakes costing thousands of dollars each second so QoS ensures information flows in a timely manner where data stream can take priority in the network.

Week 7


A Social Network Service (SNS) is a kind of web service for establishing a virtual connection between people with similar interests or activities. SNS is, however, prone to security and privacy threats that target every user of the social networking sites. Find and summarise ONE resource (within the last five years) that describes a recent attack or security breach in an SNS application.

Title and Reference:

The How, Why and What Next of Facebook’s Latest Data Breach.

Hutchinson, A, 2018. The How, Why and What Next of Facebook’s Latest Data Breach. [online] Social Media Today. Available at: a. com [Accessed 4 Jan. 2020].

This source is a blog post describing the latest attack or security breach on Facebook and it was reported on Twitter. I chose this article because it explains how popular social media hacks have impacted people in terms of data security.

Officially explained that Facebook has 50 million security vulnerabilities, and attackers exploited vulnerabilities in Facebook’s code, which “affected” viewing, allowing people to see what their profile looked like, allowing them to access tokens and then their accounts Can be used to take. Access tokens are equivalent to digital keys that keep people logged in to Facebook, so they don’t need to re-enter the password every time they use the app. “

Hackers can access a lot of data and download information and sell it on the dark web. There is no valid report to be actually accessed, so Facebook has now disabled the view function to resolve the issue. Because of this problem, Facebook is no longer a trusted company because it is targeting customers based on audience data. Gizmodo reportedly uses Facebook’s contact information for users to do so as a data tool to help advertisers, such as mobile numbers uploaded for security purposes, plan to bring a smart speaker device that brings Facebook data tracking directly. In our home.

This article is useful because it acknowledges that even the largest technology companies may have vulnerable vulnerabilities to hackers without our permission, so be aware of what we do on these sites.

Week 8


The analytic platform is a full-featured technology solution designed to address the needs of large organizations. Find and summarise ONE resource that describes the success story of analytic platform adoption in a real organization.

Title and Reference:

Vodafone Puts Its Faith in Google Cloud for Big Data Analytics

MORRIS, I, 2019. Vodafone Puts Its Faith in Google Cloud for Big Data Analytics | Light Reading. [online] Light Reading. Available at: a .com [Accessed 8 Feb. 2020].


The article describes how Vodafone uses Google’s cloud platform to create a new customs system called Neuron using Google’s cloud and artificial intelligence (AI) capabilities.

I chose this article because it describes how a company can choose a different cloud platform to support network planning and draw conclusions from decisions about updates and maintenance.

Most companies now use Customer Care Assistants to change chatbots and use AI to manage operations and serve customers. With the growing demand for Vodafone data, Vodafone’s current large database with 600 servers in 8 clusters built on Hadoop is now described as a legacy. Vodafone converts all of its data to Google’s public cloud, where numerical data lakes are brought together in a sea of ​​data for analytics and business intelligence purposes.

The neuron mechanism is more complex and scalable than the old system. It can be used to predict spikes in broadband traffic and allow for the ability to do so. It also serves as the foundation for Vodafone’s data marine and the brains of their business, as they gain real-time analytics capabilities in Vodafone’s products and services and gain quick insights that can be used to offer customers more personalized product offer. For individual subscribers.

But Vodafone will be beyond the scope of analytics for groups and countries like Google cloud platform AWS because of the diversity in their analytics system.

As the company’s data grows larger and harder to analyze each type of data and cost, this article was useful in showing that a company with better securities and more capabilities can choose a better system, thus focusing on its target market. Vodafone chose Google Cloud to increase customer service through better service and better-quality networks.

Week 9


Joint Application Development (JAD) is a methodology that involves the client or end-user in the design and development of an application, through a succession of collaborative workshops. Find and summarise ONE resource (within the last two years) that describes the use of JAD methodology in information system development.

Title and Reference:

Joint Application Development Newline. tech, 2020. Joint Application Development. [online] Available at: a .com [Accessed 15 Jan. 2020].

The article describes how difficult the project communication becomes as more people are involved in the project and this is overcome by Joint Application Development to develop an information system. I chose this article since it states that people trained in information technology have a better understanding of the work and the existing technology, information system and business process are in isolation and are developed when all the groups co-operate equally.

The article clarifies we need JAD to design and supply the system according to the customer specifications. It is focused, concentrated, and passes in a special intended environment to manage the basic requirements.

 The participants in the JAD meeting are Facilitator, end-users, developers, tiebreakers, observers, and subject matter experts. The main person involved in JAD is the sponsor who is the head and approves of the project.

 The other person is business users, system analysts, record keepers, timekeepers. All team member has their own duties and the project sponsor and leader meet to identify the requirements of the problem. The leaders meet to complete the project charter and ultimately form a JAD group with several meetings which include discussions about phases planning, analysis, and engineering to complete a project. The resource helps to set a clear understanding of successful completion of a JAD project if all the meetings are attended, stakeholders are involved, does everyone knows about the discussions and the main important things is whether the decision made by you to solve the main problem is used by clients at right time to develop the system.

Week 10


The availability and implementation of information and communication technologies (ICT) is increasingly vital to all dimensions of a nation’s inclusive, equitable and sustainable economic development and growth strategies. Find and summarise ONE resource that describes sustainable ICT project management practice.

Title and Reference:

Risk Management in Project Management: 6 Ways to Mitigate Risk.

Kashyap, V, 2020. Risk Management in Project Management: 6 Ways to Mitigate Risk. [online] GoSkills.com. Available at: a.com [Accessed 15 Jan. 2020].


This article discusses ways to mitigate risk in Project Management. I selected this resource because it talks about how a company might fail to do a project if it does not undertake risk management guidelines, our project may end up over budget, delayed, or even come to a condition of a standstill.

This article describes Project risk as a process to identify, analyze and minimize potential problems that could negatively affect the progress of a project.

The article elucidates six steps to identify and manage risk. It includes risk management in your projects, where organizations train their staff to foresee future projects by using different risk identification methods, for example, we might identify loss of data as a risk and research the best backup software for the business.

Communicate risk to others so that can have a plan B ready, just in case if things don’t go according to the plan and it is done by explaining how it will impact your project, how likely it is to happen, and steps to mitigate it.

Prioritize the tasks to analyze risks if it is crucial as we can undertake certain steps to benefit from the project. It occurs at different levels sometimes risk that seem small could harm big in such cases we need to discover the magnitude of budget, deadlines, and product quality of a project. Implementing risk response as early as possible.

We must plan the project in such a way that there is minimal risk and can be minimized by influencing the causes or strengths of favorable factors to compensate for the effect of risks. Track risks regularly by making a report identifying the causes, effects and analyzing them after the project has been completed. The resource is useful as it describes a definite risk management plan, which helps you to prepare to deal with uncertainties and extra costs by saving valuable resources such as time, income, assets, and people.

Marking Criteria

0No Response
<=1.0Poor resource selection; resource is too broad or lacks relevance to the task; summary fails to explain what the resource was about; the relevance of the resource has not been explained.
<=2.0Good resource selection; resource is relevant to the task; a summary is adequate but may require either more detail or is too long; the relevance of the resource has been explained to some extent, but needs additional information.
<=3.0Excellent resource selection; resource is highly relevant to the task (the resource is probably highly specialized); a summary is detailed yet concise; the relevance of the resource selection has been clearly explained.
-1.0   -3.0Resource not referenced correctly/not in Harvard format

Resource not referenced/Resource cannot be traced with details provided.