COIT 20246 Assignment: Modern Computing and Networking Trends

Verified

Added on  2019/11/20

|12
|4128
|172
Homework Assignment
AI Summary
This assignment, submitted for COIT 20246, explores various aspects of computing and networking. It begins with summaries of resources on key figures like Sanjay Ghemawat (MapReduce) and Bill Gates (operating systems). The assignment then delves into the history of the internet, focusing on the networks that led to its development. It also examines Layer 2 protocols, including Cisco Discovery Protocol (CDP), and discusses famous hackers like Kevin Mitnick. Finally, the assignment concludes with an exploration of future networking technologies and trends, such as no-touch interfaces. Each task involves summarizing a resource, providing insights into the evolution and future of computer science and networking.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date:
Thursday Week 11 (2PM AEST)
Part:
Written Assessment
Weighting:
30% of total assessment.
Submission:
Electronic (see course website for details)
Instructions

It will be necessary to use literature/online resources to complete this assignment,

please ensure you cite and reference any such materials using the Harvard format.

DO NOT
copy content directly from. either the text or Internet resources: this
assignment is to be in your own words.
You will lose marks if you do not use your
own words!

Please complete your assignment using
this submission template file, inserting your
responses where indicated.

DO NOT delete the marking criteria page
– changes are permitted to the formatting
of other pages including the headers and footers.

Please fill in the following details:

Student Name

Student Number
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a

table to complete for each task. Please fill in the information required.

Note: Each resource summary should be around 200-300 words.

Week 1

The text discusses the elements of modern computing architecture however is largely

silent on the individuals who played a role in its development. Find and summarise a

resource that describes
ONE such individual. The individual should have had a
significant influence on the development of computers and/or components of modern

computing architecture.

MapReduce Approach

Reference:
Wheeler, D. 2017. [online] Available at:
https://www.dwheeler.com/innovation/innovation.html [Accessed 16 Sep. 2017].

Link:
https://www.dwheeler.com/innovation/innovation.html
Summary:

Sanjay Ghemawat and Jeffrey Dean revealed the massively-parallel MapReduce

In 2004
, which is a programming model that can be helpful in enabling processing
and generates a large amount of data sets with a large collection of parallel machines,

even though in an easy programming way. This approach explains that developers

“specify a map function that processes a key/value pair to generate a set of

intermediate key/value pairs, and a reduce function that merges all intermediate

values associated with the same intermediate key.” An input reader, a compare

function, a partition function, an output writer, and a compare function are being

specified by the developers. The output gained is then fed into the presented

framework of the MapReduce that enables the execution of those definitions on the

conceivably large distributed collection in order to handle the complications like the

failures in the computers or in the networks. It was noted that “many real world tasks

are expressible in this model”. The programmers, who are inexperienced with the

distributed or parallel systems, can also use the large distributed system using

presented model in order to handle the large sets of data. These basics MapReduce

approach has been seems to be implemented into different tools like Qt Concurrent

and Handoop. Many articles have been proposed after this invention on the strategies

to implement MapReduce approaches, one of the examples is Eugene Ciurana

proposed article on how to implement MapReduce approach using Mule. This

invention was made for the goggle maps however it is being re-engineered even that it

is applicable in many projects.

Week 2

The text discusses the components and activities of operating systems however are

largely silent on the individuals who played a role in their development. Find and

summarise a resource that describes
ONEsuch individual. The individual should
Document Page
have had a significant influence on the writing or development of operating systems.
Title:
Bill Gates becomes knight but who invented the PC operating
system?

Reference:
Hennigan, M. 2017. Bill Gates becomes knight but who invented the PC
operating system?
. [online] Finfacts.ie. Available at:
http://www.finfacts.ie/irelandbusinessnews/publish/article_1000654.shtml [Accessed

16 Sep. 2017].

Link:
http://www.finfacts.ie/irelandbusinessnews/publish/article_1000654.shtml
Summary:

The first personal operating system was discovered by Kindall who had a PhD on

computer namely CP/M. His thought was that by the development of an operating

system applications introduced or created by different manufacturers would be able to

run on the same computers. This operating system (CP/M) had been sold very well in

the market, which gathered the attention of the IBM. At the same moment the biggest

computer company in the world, IBM was looking for an operating system for its

personal planned personal computer. 24 years old Bill Gates was visited by the

IBMers but he was not able to supply the required system and he directed the IBMers

to Kindall in August 1980. Kindall then met the oral agreement with the IBM as he

was reluctant to agree to the onerous conditions of that agreement related to non-

disclosure and confidentiality. After that on August 28, 1980, the Microsoft made an

agreement with the IBM that it will develop the required software for the Personal

Computers. Fellow of Gates Bill, Tim Paterson a Seattle resident had been developed

QDOS operating system, which was well aware to Gates. QDOS was bought for

$50,000. QDOS by the Microsoft, which had the same features as that of the CP/M

and later on it was improved by Microsoft and named as DOS. Parts of the QDOS had

been copied from the CP/M and were known to Kindall after some time that Bill

Gates was cheating on him but even that Kindall just signed license to the IBM rather

than taking him to the court as the Software Copyright was in its infancy.
Document Page
Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and

summarise a resource that describes
ONEof the networks that led to the development
of the modern Internet.

Title:
A Brief History of the Internet & Related Networks
Reference:
Cerf, V. 2017. A Brief History of the Internet & Related Networks |
Internet Society
. [online] Internet Society. Available at:
https://www.internetsociety.org/internet/history-internet/brief-history-internet-related-

networks [Accessed 16 Sep. 2017].

Link:
https://www.internetsociety.org/internet/history-internet/brief-history-internet-related-networks
Summary:

Variety of researches had been going-on on the technologies that would be related to

the computer networking from since 1960s. The earliest research was consist and

concentrated around the packet switching, which is a technique of dividing

conversation into small groups or isolated units that is responsible for carrying the

address of the respected destination and follows through the network without

depending on others. At branching points, computers that are specialized for the task

in the network can have the variable path taken by the packets based on the moment-

to-moment response to the link failure or network congestion. Paul Baran of the

RAND Corporation was the very first pioneer of the packet switching that was

emphasized on the methods of network organizing in manner to withstand the nuclear

attack. “Paul Baran’s research interest is the likely source of a widespread myth

concerning the ARPANET's original purpose”. Without any centralized control

system a richly interconnected set of networks had been proposed by, which are the

same properties of the today’s internet. Roger Scantlebury and Donald Davies of NPL

(National Physical Laboratory) were working on the same research in the UK and

coined the term “packet”. Symposium on the OPERATING System Principles was

going on for the very first time in ACM (Association for Computing Machinery) in

1967.
Then an IPTO program manager, Lawrence Roberts had proposed an initial
design for the first phase of ARPANET, which was a design for the packet-switched

network

Week 4

Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the

text. Find and summarise a resource that describes the features and uses of
ONE
other L2 protocol that is not discussed in the text (i.e.
NOT Ethernet).
Title:
Configuring Cisco Discovery Protocol
Reference:
Support, P., Products, E., Mainline, C. and Guides, C. 2017. [online]
Cisco. Available at:

https://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ffun_c/fcf015.html [Accessed 16 Sep. 2017].
Link:
www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf015.html
Summary:

CDPv2 is another example of Layer two data link protocol which can also be

represented as DP Version-2. This is the very recent release of the protocol that can

be helpful in tracking features using more and advanced intelligent devices. The

feature of this protocol can be stated as it can enable a reporting mechanism that can

be helpful in tracking errors at the early stages and hence can reduce costly downtime.

Technically it can be said that the gathered error messages can be forwarded to the

logging or the console server and cover the instances that does not match with the

native VLANDs on un-matching port and on connecting port duplex states between

then devices that are connecting. Referring to the
Cisco IOS Software System Error
Messages
it can be said that document for detailed examples of the error messages
sent by CDP.

Another feature of CDPv2
show commands is that it can provide a detailed output on
the VTP (VLAN Trunking Protocol) duplex mode and management domain duplex

modes of devices that are near to each other, VLANIDs of connecting ports and CDP-

related counters.

With respect to the usage of CDP it can be used to discover the platform of the

devices and obtain protocol addresses of those neighbor devices. Another use of CDP

can be stated as to display the information related to the interfaces of the router uses.

It is a protocol and media independent that can run all the Cisco-manufactured

equipment that includes bridges, routers, servers, switches, and accessed servers.

Week 5

The text mentions the role of hackers in attacks on networked infrastructure. Find and

summarise a resource that describes
ONE famous or well-known hacker.
Title:
Top 10 most famous hackers
Reference:
Telegraph.co.uk. (2017). Top 10 most famous hackers. [online] Available
at: http://www.telegraph.co.uk/technology/6670127/Top-10-most-famous-

hackers.html [Accessed 16 Sep. 2017].

Link:
http://www.telegraph.co.uk/technology/6670127/Top-10-most-famous-
hackers.html

Summary:

Kevin Mitnick

Kevin Mitnic from United States can be represented as the most famous and mentor

for the hackers of this generation. United States Department of Justice had declared

Kevin Mitnick as the most wanted computer criminal in the history of the United
Document Page
states and putted a large amount of bounty on his head. He had breached into the
databases of the top technology and telecommunication companies of the world as per

his self-styled ‘hacker poster boy’ attitude and damaged many of the intellectual

properties of the organization. The affected companies by the breaches done by him

include Fujitsu, Motorola, and Nokia who faced serious loss after the breaches. In

1995 after various attempts and lots of investment, FBI was able to track him down

and finally he was caught. He confesses all the condemned charges and accepted the

jail for five years, as the court sentenced him jail for five years. After spending five

years in the jail he got released in 2000 from the jail and started an information

security consultancy and leading a normal life by sharing the knowledge that he

gained from his activities. He is now getting paid to detect breaches and give

guidance over how to protect data. He had never called himself a hacker rather he

preferred to be called engineer and in his unique way he used to call the hacking as

“social engineering”.

Week 6

Society is increasingly reliant on networks and network technologies but they are

evolving at a rapid pace. Find and summarise a resource that describes
ONE example
of a future networking technology or trend that will impact society.

Title:
5 Trends That Will Drive the Future of Technology
Reference:
Satell, G. (2017). Forbes Welcome. [online] Forbes.com. Available at:
https://www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-

future-of-technology/#534f4f1b51ee [Accessed 16 Sep. 2017].

Link:
www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-
future-of-technology/#534f4f1b51ee

Summary:

As the technology is being developed the face of the technology will keep continue

changing with the arrival of new and innovative technologies. Regarding the

researches that are being experimented it can be said that
No-Touch Interfaces can
be the most trending and dominating technology in the future. This will eliminate the

usual behavior of individuals thinking that computer is a machine that can be operated

with hands. Similar to the early generation that get used to with the muses and

keyboards, present generation has adopted to learn it and texting at blazing speed. It

can be said that as the generation changes, new technologies are being invented and

iteration of new technologies will be requiring new skills and technique in order to

use it proficiently. It will be completely different technology than the Apple’s Siri or

OK Google or Microsoft’s Kinect and can be expected that computer adapt the

humans rather than the other way around. In little more than decade to be in the

market which will eliminate various steps during interfacing with the technology and

will save much time and also provide automation for the actions. New technologies
Document Page
with the basic recognition of the patterns has been more advancing and getting
evolved as the generation is passing, accelerating returns can be a thanks giving that is

helping the new generation to expect computer interface to become completely

distinguishable from humans and upgrading all the activities in automated manner.
In
simple language it can be said that every work will be automated by using sensors and

other Internet of Things technologies in practical world.

Week 7

The text mentions social business and the impact of the use of social networking

platforms. Find and summarise a resource that describes the history of the

development of
ONE such social media platform.
Title:
5 Social Media Monitoring Tools to Simplify Your Marketing
Reference:
Peyton, L. (2017). 5 Social Media Monitoring Tools to Simplify Your
Marketing
. [online] Socialmediaexaminer.com. Available at:
http://www.socialmediaexaminer.com/5-social-media-monitoring-tools-to-simplify-

your-marketing/ [Accessed 16 Sep. 2017].

Link:
http://www.socialmediaexaminer.com/5-social-media-monitoring-tools-to-
simplify-your-marketing/

Summary:

There is no doubt on the statement that “Social media is changing the way of business

in positive manner”. Social media helps in collecting all the information related to the

customers’ needs and demand including the responses about the product and services

that are being offered by the organization.
Viralheat Social Media Simplified is
application software that is a platform from where a businessperson can monitor the

voice of the customers or the clients. It is a very efficient fair tool that helps in

monitoring and managing the business using social media as the medium to interact

with the customers. Platforms that are supported in this software includes almost all

the social media websites that are; Google+, Twitter, Facebook, YouTube, Pinterest,

LinkedIn and several other forums and blogs.
The features that are being implemented
in it allow a user to make comparison with the search profiles and relevant terms

across the all over web including social media in manner to track the individual

products and compare it with others. For small businesses Facebook is the most

dominant social media website to interact with the customers regarding, complaints

and reviews on the products or services being offered by the organization through

interacting with them individually. It can be used to visualize the data related to the

information about the individuals in the form of a graph or a pie chart. Because the

maximum number of population connected to the Facebook it gives an opportunity to

attract more customers and increase awareness about the products or services to them

using advertisement in the form of text, audio, video or images.

Week 8

With the advent of mass data collection and storage has come data mining. Find and

summarise a resource that describes
ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
textbook.
Title:
13 Retail Companies Using Data to Revolutionize Online &
Offline Shopping Experiences

Reference:
SmartData Collective. (2017). 13 Retail Companies Using Data to
Revolutionize Shopping Experiences
. [online] Available at:
https://www.smartdatacollective.com/13-retail-companies-using-data-revolutionize-

online-offline-shopping-experienc/ [Accessed 16 Sep. 2017].

Link :
https://www.smartdatacollective.com/13-retail-companies-using-data-
revolutionize-online-offline-shopping-experienc/

Summary:

Data mining
has changed the face of the organization and customer interaction and
allowing organizations to improve their business and make good profits. Data mining

is a process of collecting data and information related to the patterns of the option

selection of the customers, who went to the online shopping websites and use that

information to predict about the choices that the customer will make comparing with

the customer with same patterns in the past. There are so many real-world examples

among which
Bonobos is one of the example that have improved its business using
data mining. Bonobos do online business and sells and attracts customers using data

mining. Data mining digs all the information if the customers’ online activities and

predict about the behaviour of the customer and offers the products that most of the

customers with same behaviour had bought the product. This prediction is helping the

Bonobos to offer the customers with the products that the individual will like to buy

and increasing its sales. Data mining is itself new in the field of technology and is

being evolved, recent upgrade in this is that it can also show the customers about the

similar product combination that recent user with same behaviour had bought from

there, which can be seen in any online shopping websites. Technically, data mining

track the cookies off the customer who is online and predict about the choices he

would make or the options he would like. After the application of data mining into the

Bonobos, the market value of the organization has been increased by 30%, which is a

very big improvement for any organization.
Document Page
Week 9
One of the greatest success stories in application development in recent times has

been the popularity of mobile apps. Find and summarise a resource that describes the

story of
ONE successful mobile app developer.
Title: and
4 Young App Developers Who Became Millionaires
Reference:
Monnapa, A. (2017). 4 Young App Developers Who Became
Millionaires
. [online] Simplilearn.com. Available at:
https://www.simplilearn.com/young-app-developers-who-become-millionaires-article

[Accessed 16 Sep. 2017].

Link:
www.simplilearn.com/young-app-developers-who-become-millionaires-article
Summary:

Nick D’Aloisio invented Summly

He is an internet entrepreneur and an English computer programmer who is known for

the application named ‘Summly’ at the age of 16 in 2011.this application can be

described as the combination of artificial intelligence technology that has been

developed with SRI International organization. Nick created an iOS application and

named it Trimmit in march 2011, which was an analytical tool that has the feature to

condense the large texts into 140, 500, or 1000 character n summarized manner. This

development was encountered by the Apple Inc., who then offered $30 million to nick

in exchange with that application and made it a noteworthy application on the Apple’s

App store and named it ‘Summly’ after redesigning according to the feedbacks gained

on Trimmit application. This re-launch was made in December 2011, which was later

become a trending application and Nick listed his name with the top application

developers. He became one of the youngest venture capital-backed entrepreneur and

self-made millionaire ever. After two years in march 2013, the application was sold to

the Yahoo! For about $30 million and he was awarded with the “Innovator of the

Year” title. After some time he realized the importance of the study and left his job to

complete his studies at Hertford College, Oxford University, where he is still studying

philosophy and computer science as his main subjects. He had also won the reward on

201Apple ceremony and honoured for his invention of providing news in short form

by collecting information from several pages.

Week 10

While information systems and technology deliver many benefits to society, they can

also result in (sometimes inadvertent) negative effects and outcomes. Find and

summarise a resource that describes
ONE example of where the use of an information
system or technology has led to negative consequences for humans.

Title:
Four Real World Examples of Information Systems Security
Failure

Reference:
Iticollege.edu. (2017). Four Real World Examples of Information Systems
Security Failure
. [online] Available at: https://www.iticollege.edu/four-real-world-
examples-information-systems-security-failure/ [Accessed 16 Sep. 2017].
Document Page
Link: www.iticollege.edu/four-real-world-examples-information-systems-security-failure
Summary:

Information system and technologies are no-doubt expanding the world for the

humans with extra comfort, ease and accuracy but there are certain issues related to it,

which can cause serious damage to the information related to the individuals. A real-

world example to explain this statement is the “An Alarming Trend In The U.S.

Government”. Many people of United states do not realize that the United States has

an alarming information systems security problem. There is the possibility that the

U.S. government will never notice that there is any issue with the systems and the

information that were saved into the system because of the high rate of breaches that

are happening into the government organization nowadays.
More than 6 times
government organizations were hacked in the year 2012 and personal and sensitive

information related to the individual were stolen or exposed including the security

numbers fingerprints and many more. In 2015 the biggest breach was happened,

which was undetected. In this breach 21.5 million people’s personal information were

stolen because of the failure in the part of the system technicians and underestimating

that the breach could happened. This series of attacks were estimated to be originated

in China and was declared the largest cyber-attack in the systems of the government

of United States and public and private sectors both were guided to be safe by

increasing protective measures related to the data breach.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MARKING SHEET - DO NOT DELETE
Criteria

0
No Response
<=1
Poor resource selection; resource is too broad or lacks relevance to the task;
summary fails to explain what the resource was about; the relevance and/or

usefulness of the resource has not been explained.

<=2
Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance

and/or usefulness of the resource has been explained to some extent, but

needs additional information.

<=3
Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;

the relevance and usefulness of the resource selection has been clearly

explained.

Key

Deductions

-3

-2

-1

Reference/URL provided does not link to resource (and resource cannot be

located or determined from details provided) OR

Reference/URL provided does not relate to the summary (i.e. summary is

not of resource content / contains content not contained in the resource)

Resource is generic AND/OR covers multiple technologies/examples rather

than focuses on a single technology/example

Resource not referenced correctly/not in Harvard format

Week
Marks Awarded
1

2

3

4

5

6

7

8

9

10

TOTAL

Comments:
Document Page
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]