Analysis of Computing Architecture, Operating Systems, and Networks
VerifiedAdded on 2020/07/23
|6
|2130
|186
Homework Assignment
AI Summary
This assignment delves into various aspects of computer science, beginning with an exploration of modern computing architecture and the individuals who significantly influenced its development. It then moves on to examine operating systems, focusing on key figures in their creation and evolution. The assignment further investigates the evolution of the internet, tracing its roots from earlier networks, and analyzes a Layer Two (L2) data link protocol beyond Ethernet. Finally, it explores the role of hackers and cyber attacks on networked infrastructure, highlighting their impact on the field. Each section requires the summarization of resources, emphasizing the student's understanding and ability to articulate the concepts in their own words, supported by proper citations and references.

Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Question 1 Tasks
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Question 1 Tasks
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 1
The text discusses the elements of modern computing architecture however is largely silent on
the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference:
Computer Architecture today
Silberstein, M., 2017. Computer Architecture today. [Online] Available Through:
<https://www.sigarch.org/blog/>. [Accessed on 18th September 2017].
Summary:
From the taken blog, the efficiency of the operating systems (Oses) has been in the
spotlight of system researchers in early 60s. The OS is commonly seemed as a layer
between applications and hardware, this seems to mislead the application in CPU:
application code runs on the CPU without any OS mediation. The execution from the
application to the OS goes through two protection domains, it incurs the world switch
with its associated overhead. The numerous layers of the OS design are essential to
break its complexity. Crossing these layers might get expensive as they consume
require more data. OS is unaware of application logic and run time state, thus it offers
only general mechanism and policies that are not well suited for the specific
application. The libOSes provides an attractive and less costing alternative to
traditional OSes, particularly in high performance servers, but they pose new
requirements and provide an opportunity to revisit the existing architectural support
for OSes in order to make libOSes more robust, usable and efficient. The libOSes
which is new generation single application which caused overwhelming changes in the
hardware and the software landscape in the publications. This application gives the
high performance servers which helps in which implements exokernel design
principles on modern hardware with virtualization support. The adoption of the
libOSes is driven by the necessity of achieving maximum efficiency and becomes
practical in hardware virtualization which supports in both CPU and I/O devices. In
summary, the application of hardware and software is discussed with the new
application to make the work easier and faster.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
The text discusses the elements of modern computing architecture however is largely silent on
the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference:
Computer Architecture today
Silberstein, M., 2017. Computer Architecture today. [Online] Available Through:
<https://www.sigarch.org/blog/>. [Accessed on 18th September 2017].
Summary:
From the taken blog, the efficiency of the operating systems (Oses) has been in the
spotlight of system researchers in early 60s. The OS is commonly seemed as a layer
between applications and hardware, this seems to mislead the application in CPU:
application code runs on the CPU without any OS mediation. The execution from the
application to the OS goes through two protection domains, it incurs the world switch
with its associated overhead. The numerous layers of the OS design are essential to
break its complexity. Crossing these layers might get expensive as they consume
require more data. OS is unaware of application logic and run time state, thus it offers
only general mechanism and policies that are not well suited for the specific
application. The libOSes provides an attractive and less costing alternative to
traditional OSes, particularly in high performance servers, but they pose new
requirements and provide an opportunity to revisit the existing architectural support
for OSes in order to make libOSes more robust, usable and efficient. The libOSes
which is new generation single application which caused overwhelming changes in the
hardware and the software landscape in the publications. This application gives the
high performance servers which helps in which implements exokernel design
principles on modern hardware with virtualization support. The adoption of the
libOSes is driven by the necessity of achieving maximum efficiency and becomes
practical in hardware virtualization which supports in both CPU and I/O devices. In
summary, the application of hardware and software is discussed with the new
application to make the work easier and faster.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a

resource that describes ONE such individual. The individual should have had a significant
influence on the writing or development of operating systems.
Title and Reference:
Ajaz Ahmed 2012. An operating system for life . [Online] Available Through:
<https://www.theguardian.com/media-network/media-network-blog/2012/nov/02/
operating-system-for-life>. [Accessed on 18th September 2017].
From the taken blog, the role of an individual in operating system for life looks little
cool for the start ups due to the innovation obsessed economy. The new way to change
the technology is to work with smartness with the culture. The technology is changing
with the culture with new and smart software that comes out of nowhere to show the
better way of doing things. When the people will watch the evolution of popular digital
culture – and observe which will serve them love and are loyal to, which they get
infatuated and then bored with, which they ignore, which they actively resent – to get
the expected positive results. The organizing of set with the programs with the
resources and activities. The era of services accessed through mobile phones has
shown us that people really respond to the tools configured around to solve the
problem related to the application. The people like to do there work quickly and faster
to manage this the resources and the activities need to be managed. The part of
technology that is developed to use the sensors and cameras to understand the spatial
terrain around the car and respond accordingly, so drivers can't mistakenly move into
too-small spaces, bump into unseen objects, and won't have to correct driving lines.
The second key innovation is the replacement of all the mechanical components
between steering wheel and front wheels with electronics, for a much quicker, more
responsive, and driver-aware experience.
influence on the writing or development of operating systems.
Title and Reference:
Ajaz Ahmed 2012. An operating system for life . [Online] Available Through:
<https://www.theguardian.com/media-network/media-network-blog/2012/nov/02/
operating-system-for-life>. [Accessed on 18th September 2017].
From the taken blog, the role of an individual in operating system for life looks little
cool for the start ups due to the innovation obsessed economy. The new way to change
the technology is to work with smartness with the culture. The technology is changing
with the culture with new and smart software that comes out of nowhere to show the
better way of doing things. When the people will watch the evolution of popular digital
culture – and observe which will serve them love and are loyal to, which they get
infatuated and then bored with, which they ignore, which they actively resent – to get
the expected positive results. The organizing of set with the programs with the
resources and activities. The era of services accessed through mobile phones has
shown us that people really respond to the tools configured around to solve the
problem related to the application. The people like to do there work quickly and faster
to manage this the resources and the activities need to be managed. The part of
technology that is developed to use the sensors and cameras to understand the spatial
terrain around the car and respond accordingly, so drivers can't mistakenly move into
too-small spaces, bump into unseen objects, and won't have to correct driving lines.
The second key innovation is the replacement of all the mechanical components
between steering wheel and front wheels with electronics, for a much quicker, more
responsive, and driver-aware experience.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise
a resource that describes ONE of the networks that led to the development of the modern
Internet.
Title and Reference
An Evolution From Earlier Networks
Benjamin Hale 2016. An operating system for life . [Online] Available Through:
<http://historycooperative.org/the-history-of-social-media/>. [Accessed on 18th
September 2017].
Summary:
From the taken blog, the term social media which the most popular among the
youngsters and everyone knows about it. Even the most remote areas of the world have
at least heard of Facebook and Twitter, and are probably using them on a regular basis.
But it wasn’t always that way. It has been around a short term and even though the
people probably cannot imagine living without the use of internet. The first social
media site that was introduced in 1997 which was named as Sic degree. The site was
named after the theory of six degree separation and it allowed the users to create the
profile to connect with their friends. In the year 2000 around 100 million people had
access to the internet and became the common users of the social media. 2003 the
younger generation was becoming addicted towards the social media. They used the
website to maker and talk to friends rather going out for playing physically. In year
2005 the younger generation started using frequently the social media website called
Facebook which was introduced in 2004. The people also used twitter for writing
blogs and sharing their views on for a particular thing. The year 2010 came with
dozens of websites for providing the social media services. The flicker was the earliest
and still is one the most popular sites for photo sharing. Other sides such as
photobucket and instagram are also the famous sites for the same. The social media
consist of different platforms and all are serving the same but slightly different
purpose.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise
a resource that describes ONE of the networks that led to the development of the modern
Internet.
Title and Reference
An Evolution From Earlier Networks
Benjamin Hale 2016. An operating system for life . [Online] Available Through:
<http://historycooperative.org/the-history-of-social-media/>. [Accessed on 18th
September 2017].
Summary:
From the taken blog, the term social media which the most popular among the
youngsters and everyone knows about it. Even the most remote areas of the world have
at least heard of Facebook and Twitter, and are probably using them on a regular basis.
But it wasn’t always that way. It has been around a short term and even though the
people probably cannot imagine living without the use of internet. The first social
media site that was introduced in 1997 which was named as Sic degree. The site was
named after the theory of six degree separation and it allowed the users to create the
profile to connect with their friends. In the year 2000 around 100 million people had
access to the internet and became the common users of the social media. 2003 the
younger generation was becoming addicted towards the social media. They used the
website to maker and talk to friends rather going out for playing physically. In year
2005 the younger generation started using frequently the social media website called
Facebook which was introduced in 2004. The people also used twitter for writing
blogs and sharing their views on for a particular thing. The year 2010 came with
dozens of websites for providing the social media services. The flicker was the earliest
and still is one the most popular sites for photo sharing. Other sides such as
photobucket and instagram are also the famous sites for the same. The social media
consist of different platforms and all are serving the same but slightly different
purpose.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Find and summarise a resource that describes the features and uses of ONE other L2 protocol
that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
data link layer protocol and its function
Deepshikha Bisaria 2017. Data link layer protocol and its function . [Online]
Available Through: <https://blog.oureducation.in/data-link-layer/>. [Accessed on 18th
September 2017].
Summary:
From the taken blog, the second layer of the OSI model is data link layer. Under this
the Data Link Layer is combined with physical layer of the OSI model with some
interconnecting, which provides a connection for data transfer from one software to
other and the connection is reliable and has all the safety measures. The main
processes which are been followed in the data Link Layer are error control, flow
control, link management etc. the functions which a data link layer follows is receiving
the data which is to be transmitted to other device, from higher to lower layer of the
OSI model. The main work of the data link layer is to provide services to the network
layer. The data link layer helps to transfer the data from one device to the other. This
type of data services of the data link layer is an acknowledged connection less service
which is established between the source and destination. This type of data is
transferred from the source machine to the destination machine when it is not known
to the destination machine which means no acknowledgement is sent either from the
source side nor from the destination side. It can be said that no connection is
established or released between them and if the data is lost in between the transmission
then it cannot be recovered. The services which are properly acknowledged and sent in
bit from one side with a proper connection between the devices to know the sources
and destination.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference
Cyber Attacks Against Critical Infrastructure Are No Longer Just Theories.
Brasso, B., 2016. Cyber Attacks Against Critical Infrastructure Are No Longer Just
Theories. [Online] Available Through: <https://www.fireeye.com/blog/executive-
perspective/2016/04/cyber_attacks_agains.html>. [Accessed on 18th September 2017].
Summary:
In the security industry, there are so many discussed nightmare scenarios which caused
that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
data link layer protocol and its function
Deepshikha Bisaria 2017. Data link layer protocol and its function . [Online]
Available Through: <https://blog.oureducation.in/data-link-layer/>. [Accessed on 18th
September 2017].
Summary:
From the taken blog, the second layer of the OSI model is data link layer. Under this
the Data Link Layer is combined with physical layer of the OSI model with some
interconnecting, which provides a connection for data transfer from one software to
other and the connection is reliable and has all the safety measures. The main
processes which are been followed in the data Link Layer are error control, flow
control, link management etc. the functions which a data link layer follows is receiving
the data which is to be transmitted to other device, from higher to lower layer of the
OSI model. The main work of the data link layer is to provide services to the network
layer. The data link layer helps to transfer the data from one device to the other. This
type of data services of the data link layer is an acknowledged connection less service
which is established between the source and destination. This type of data is
transferred from the source machine to the destination machine when it is not known
to the destination machine which means no acknowledgement is sent either from the
source side nor from the destination side. It can be said that no connection is
established or released between them and if the data is lost in between the transmission
then it cannot be recovered. The services which are properly acknowledged and sent in
bit from one side with a proper connection between the devices to know the sources
and destination.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference
Cyber Attacks Against Critical Infrastructure Are No Longer Just Theories.
Brasso, B., 2016. Cyber Attacks Against Critical Infrastructure Are No Longer Just
Theories. [Online] Available Through: <https://www.fireeye.com/blog/executive-
perspective/2016/04/cyber_attacks_agains.html>. [Accessed on 18th September 2017].
Summary:
In the security industry, there are so many discussed nightmare scenarios which caused

by the cyber attack against critical infrastructure. However, there are only scenarios
seem to be develop that likely work. Recently, national security agency director
Admiral mike Rodgers that describe about the threat against critical infrastructure as
the matter. From the financial services to transportation to health care, all depend on
massive information technology network. Many of the cyber defenses used in the
critical infrastructure owners and operators to ward off attack to conduct industrial
control systems computer. Due to disruption, it can be believed that reconnaissance for
a potential future attack. Despite the increasing frequency of cyber attack targeting
critically to the infrastructure. These also highlighted industries which possess few
protocols in palace to protect against security breaches. In the chemical industry, wide
regulations on everything from occupational safety. In the environment protection,
department of homeland security recognize for cyber attack as the major threat to
industry in 2010. Regulations also managed at the company and facility level as well.
Organization also perform operations with team experts attempts to hack into the
environment. It makes successful results with engineer security features to make sure
that real hacker can not gain access to the system. There are many types of network
attack. In this way, type of risk directed at network or host computer. Network attack
usually defined as the intrusion on the network infrastructure that require to analysis
environment through collect information. In order to exploit existing open ports or
vulnerabilities it includes learning and get some information from the system.
seem to be develop that likely work. Recently, national security agency director
Admiral mike Rodgers that describe about the threat against critical infrastructure as
the matter. From the financial services to transportation to health care, all depend on
massive information technology network. Many of the cyber defenses used in the
critical infrastructure owners and operators to ward off attack to conduct industrial
control systems computer. Due to disruption, it can be believed that reconnaissance for
a potential future attack. Despite the increasing frequency of cyber attack targeting
critically to the infrastructure. These also highlighted industries which possess few
protocols in palace to protect against security breaches. In the chemical industry, wide
regulations on everything from occupational safety. In the environment protection,
department of homeland security recognize for cyber attack as the major threat to
industry in 2010. Regulations also managed at the company and facility level as well.
Organization also perform operations with team experts attempts to hack into the
environment. It makes successful results with engineer security features to make sure
that real hacker can not gain access to the system. There are many types of network
attack. In this way, type of risk directed at network or host computer. Network attack
usually defined as the intrusion on the network infrastructure that require to analysis
environment through collect information. In order to exploit existing open ports or
vulnerabilities it includes learning and get some information from the system.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.