ICT Service Management Assignment: Individual Research and Summaries

Verified

Added on  2020/02/24

|14
|3298
|48
Homework Assignment
AI Summary
This ICT Service Management assignment presents a comprehensive analysis of various topics within the field of information and communication technology. The assignment delves into the history and development of computer architecture, highlighting key individuals and milestones, and explores the evolution of operating systems, the internet, and networking protocols. It also examines the role of hackers, future networking technologies, the impact of social media, and the applications of data mining in business. Each week focuses on a specific area, requiring the student to find and summarize a relevant resource. The summaries cover topics such as the contributions of John Von Neumann to computer architecture, the development of the Linux operating system by Linus Torvalds, the evolution of the internet from ARPANET, the features of Layer 2 protocols, famous hackers like Kevin Mitnick, future networking trends, the development of social media platforms, and the use of data mining in business. The assignment aims to provide a well-rounded understanding of the ICT service management landscape.
Document Page
ICT SERVICE MANAGEMENT
Please fill in the following details:
Student Name
Student Number
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Week 1 3
Week 2 4
Week 3 5
Week 4 6
Week 5 7
Week 6 8
Week 7 9
Week 8 10
Week 9 11
Week 10 12
2
Document Page
Week 1
Week 1
The text discusses the elements of modern computing architecture however is largely
silent on the individuals who played a role in its development. Find and summarise a
resource that describes ONE such individual. The individual should have had a
significant influence on the development of computers and/or components of modern
computing architecture.
Title and Reference:
Dia.eui.upm.es. (2017). Computers: History and Development. Available from:
http://www.dia.eui.upm.es/asignatu/sis_op1/comp_hd/comp_hd.htm [Accessed on 25
Aug. 2017].
Summary:
This particular resource is about the history of computers that has included the
different stages that the computer architecture has gone through. Several different
phases of development and induction of various technologies have been mentioned in
this article. The main reason for the selection of this particular article is that the
various stages of development and advancements the computer system and
architecture has gone through has been described from beginning of its origin. The
main points that have been covered in this resource material are related to the
invention of basic systems of fast calculations. Moreover, the development of first
generation of computers by Charles Babbage has been discussed about in this article
along with its various advantages and disadvantages. Another major content of this
resource is the constant development of computers in terms of speed, capacity and
size. The five generations of computer architecture including a significant
contribution made by John Von Neumann is an interesting area to focus on in this
particular article. The concepts introduced by Neumann remained the base for
operations of different computer architectures and systems. The most significant
contribution was Electronic Discrete Variable Automatic Computer or EDVAC. The
resource was helpful because of detailed description of different computer
architecture development stages.
3
Document Page
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 2
Week 2
The text discusses the components and activities of operating systems however is
largely silent on the individuals who played a role in their development. Find and
summarise a resource that describes ONEsuch individual. The individual should
have had a significant influence on the writing or development of operating systems.
Title and Reference:
Livinginternet.com. (2017). History of Linux, Who Invented Linux, How Was Linux
Invented. Available from: http://www.livinginternet.com/i/iw_unix_gnulinux.htm
[Accessed on 25 Aug. 2017].
Summary:
The considered resource is about the invention of a revolutionary Operating System
called Linux. It is also about the different advantages of using these operating systems
in various business processes and organisations. The article has been chosen because
it has described the development of Linux Operating System from the early stages.
The resource has described the origin of Linux and its development by Linus
Torvalds. The idea of developing a Kernel called Linux originated from a Non free
system called Minix which was a Unix like System. The non free nature of this
system encouraged Linus Torvalds to develop a free operating system. He developed
device drivers access protocols for hard drives. The basic design of Linux Operating
System came out in existence in September, 1991 and was termed by Torvalds as
Version 0.01. This was followed by the induction of Version 0.12 of Linux in
January, 1992 that possessed a much stable Kernel. Finally, the introduction of
Version 2.4 of Linux OS has been mentioned that was compatible with 64 bit
processors manufactured by Intel. The most helpful content of this resource was the
discussion of different advancements and up gradation in Linux OS with every new
version.
5
Document Page
Week 3
Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONE of the networks that led to the development
of the modern Internet.
Title and Reference:
NewMedia.org. (2017). History of the Internet. Available from:
http://www.newmedia.org/history-of-the-internet.html [Accessed on 1 Sep. 2017].
Summary:
This particular article discusses about the history of internet from the initial
ARPANET to the modern Internet along with its different sub techniques. This article
is selected as it chronologically describes the evolution of internet. These sub
techniques are associated with the network in making a much more convenient usage
of the Internet and that is affordable for users. ARPANET was designed in order to
develop a communication between terminals in ARPA computer. The technology of
ARPANET allowed transferring information via ‘packets’ of small units. However,
ARPANET was a closed computer network that is transformed in the open network
system on modern age Internet. IP/TCP Protocols were developed in 1982. Along
with this, expanders and developers were able to expanding the spectrum of network.
ARPANET was then handed over to the military network of US. Following this, six
domains were created and in 1990, the first incarnation of World Wide Web occurred.
Foundation of Yahoo, and followed by Google also occurred at this time as per this
news article. This article is much helpful in understanding the evolution of modern
age internet from primitive ARPANET network. It has also mentioned the explicit
contribution of ARPANET in the evolution of Internet.
6
Document Page
Week 4
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the
text. Find and summarise a resource that describes the features and uses of ONE
other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
Cisco. (2017). Layer 2 and Layer 3 Switch Evolution - The Internet Protocol Journal
- Volume 1, No. 2. Available from:
https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/
table-contents-19/switch-evolution.html [Accessed on 4 Sep. 2017].
Summary:
This article deals with the evolution and issues related to the Layer 2 and Layer 3
switches associated with high speed connectivity in between the end stations of data
link layer. It also describes the different concepts of design of LAN and issues that are
raised in the process of evolution of Layer 2 and Layer 3 switches. By focussing on
the Layer 2 switches, it has been observed that bridging technology in involved in
Layer 2 of LAN that addresses each port and passes the MAC frames. As mentioned
in this article, Layer 2 in Cisco LAN consists of Access Layer, Distribution Layer and
Core Layer. Access Layer is the base level layer comprising its accessibility to
computers and smart phones. Distribution layer deals with the control of traffics on
switch configuration and is a bit advanced than the access layer. Core layer comprise
the most advanced part of Layer 2 switch involving swift switching to any network.
Technology is evolutionary; however, the modified version has its core in the original
version. Same thing is applicable for Layer 3 switch that is an advanced part of the
Layer 2 switch. This journal has helped in making an idea of the Layer 2 switches in a
Cisco LAN. Features as well as benefits of the same are discussed.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 5
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference:
Telegraph.co.uk. (2017). Top 10 most famous hackers. Available from:
http://www.telegraph.co.uk/technology/6670127/Top-10-most-famous-hackers.html
[Accessed on 24 Aug. 2017].
Summary:
The considered article is about the most popular hackers that have done something
unbelievable in terms of computers and network security. This has talked about the
different hackers and the chaos made by them in the internet and networking world.
As per this article, Kevin Mitnick who is also known as the self styled “Hacker poster
boy” who was also declared as the most wanted cyber criminal in the history of
United States of America. The miscreant activities of Kevin includes the hacking of
some of the most secure computer systems and networks of some leading companies
in the world like Motorola, Fujitsu and Nokia. Kevin managed to stay out of the reach
of world’s top level security agencies including FBI for a long time. However, after a
high level long pursuit, he was arrested by FBI in 1995 when he confessed to a
number of charges against him. He was sentenced for 5 years imprisonment by the
Federal Court. Kevin started a computer security agency after he was released in 2000
on parole. As per Kevin, hacking activities are actually “Social Engineering”. This
article is very useful as it has mentioned the hijacking activities of several most
wanted hackers.
8
Document Page
Week 6
Week 6
Society is increasingly reliant on networks and network technologies but they are
evolving at a rapid pace. Find and summarise a resource that describes ONE example
of a future networking technology or trend that will impact society.
Title and Reference:
Forbes.com. (2017). Forbes Welcome. Available from:
https://www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-
future-of-technology/#4fb66e4051ee [Accessed on 21 Aug. 2017].
Summary:
This specific article is about the different technologies that are under developmental
phase and are likely to appear in the near future. These technologies are likely to
impact the human lifestyle and way of browsing in a very significant manner. The
article has been selected because of the different upcoming technologies that are
about to change the way of human operations in the internet world. The most
interesting technology that has been mentioned in this article is the No Touch
Interfaces in machine operations. The article has given examples of Apple’s Siri and
Project Glass of Google. This article states that human will manage to control most of
the machines without even touching it. There are developments that are going on to
make the basic machines especially electronic devices operate through hand gestures
and voices. It can be said that Artificial Intelligence has a big role to play in the
development of this technology. Project Jarvis from Facebook aims at interlinking
several smart electronic devices and command them by voice. The article can be
considered as a very helpful one as it has stated numerous technologies that are about
to emerge and have the potential to change human lifestyle entirely.
9
Document Page
Week 7
Week 7
The text mentions social business and the impact of the use of social networking
platforms. Find and summarise a resource that describes the history of the
development of ONE such social media platform.
Title and Reference:
Forbes.com. (2017). Forbes Welcome. Available from:
https://www.forbes.com/sites/moneywisewomen/2012/08/08/the-developing-role-of-
social-media-in-the-modern-business-world/#7d5916c16fd6 [Accessed on 23 Aug.
2017].
Summary:
The article is about the different social media platforms that are widely used by
internet users around the world. It has discussed how social media platforms like
Google+, Facebook, Twitter, Instagram and many more has become an integral part
of the lifestyle of any person. The main reason for selecting the article is that the
usage and development of these social media platforms have been described along
with the advantages and disadvantages of the same. The major focus of this article has
been the three most popular social media platforms also known as the “Big Three”
that includes Twitter, Google+ and Facebook. In the modern time, most of the
celebrities, politicians as well as businessmen use Twitter as the mode of expressing
their thoughts. This platform is used by common people too as it allows them to
follow the people they want to and interact with them in a remote manner. Twitter
was developed as an application that uses 140 characters as a message that is
displayed on the homepage of people’s twitter account that follow them. This article
was very useful because of the detailed description of the roles and significances of
three most widely used social media platforms.
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 8
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the
textbook.
Title and Reference:
Forbes.com. (2017). Forbes Welcome. Available from:
https://www.forbes.com/sites/kalevleetaru/2015/11/10/visualizing-russian-sanctions-
and-chinas-economic-slowdown-through-massive-news-mining/#35fa5df6eb31
[Accessed on 2 Sep. 2017].
Summary:
Use of data mining in business involves surveillance of a large number of parameters
in conduction of business activities. This article provides an example of data mining
in business activity. This article deals with the utility of data mining in the business
operations of Google. Google specifically utilises the process of data mining in the
mass data collection and its storage procedure. In order to rank their web pages,
Google uses the country node that is sized by the score of page rank. The preliminary
reason of selecting data mining in the process of page ranking is to find out the
natural clusters within network associated with different countries. A clear framework
of network diagram is formed by the process of data mining that helps Google
identifying in the global extent of their opposition, network of recognition and
impacts of sanctions. Automated systems of the process of data mining allow Google
to calculate the time a person is visiting any particular page. Via data mining process,
the huge amount of data that is collected by surveillance is transferred into readable
format. This article is much useful as it provides the example of Google in
understanding the process of data mining in business.
11
Document Page
Week 9
Week 9
One of the greatest success stories in application development in recent times has
been the popularity of mobile apps. Find and summarise a resource that describes the
story of ONE successful mobile app developer.
Title and Reference:
Mitchell-Whittington, A. (2017). Creating a successful mobile app: Three founders
spill the beans. Brisbane Times. Available from:
https://www.brisbanetimes.com.au/national/queensland/creating-a-successful-mobile-
app-three-founders-spill-the-beans-20160503-gola03.html [Accessed on 2 Sep. 2017].
Summary:
This article deals with the success story of three young people, whose has caused a
significant development of mobile application. The article mentions about three
youngsters such as Jess Wilson, Ben Burton and Mitch Hills, who have developed
some innovative mobile applications that are user friendly and increases credibility of
smart phones. Jess Wilson is a 24-year-old creator of Stashd. This application allows
its users to browse different trends of fashion rather than brands. Purchase process is
also made simpler. Just a right swipe allows the users to select and purchase the item
desired by them. The article discusses about Ben Burton, a 25-year-old man, who is
the founder of Zeppee. This app was launched in early 2017, which allows its users to
adopt animals on choosing via the application and by swiping on the right. There is
also an option of receiving guidance from potential adopters via another website. The
article mentions about Mitch Hills, a 21 years old youngster, who launched
Aroundabout. This app allows a user to acknowledge the whereabouts regarding
seeing, eating and doing in a particular area. This article is of much useful as it
provides the learner with the success stories of three different youngsters who have
significant contribution in mobile app development.
12
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]