Assignment: Computing Architecture and Networking - Weeks 1-5
VerifiedAdded on  2020/07/23
|6
|2231
|33
Homework Assignment
AI Summary
This assignment comprises ten tasks, with summaries of resources related to computing architecture and networking. Week 1 focuses on the Von Neumann architecture, detailing its components and significance. Week 2 explores operating systems and their evolution. Week 3 examines the development of the Internet, specifically ARPANET. Week 4 delves into Layer 2 protocols, contrasting Ethernet with another protocol. Week 5 discusses a famous hacker, Kevin Mitnick, and his impact on cybersecurity. The assignment requires students to find and summarize resources, demonstrating their understanding of the topics and their ability to cite sources using the Harvard format. The summaries cover topics such as data transfer, networking protocols, and the evolution of computer systems, emphasizing the individuals and technologies that have shaped the field. The student successfully summarized each week's topic, providing detailed overviews and citing the resources used.

Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Question 1 Tasks
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Question 1 Tasks
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Schalk,Z 2013, 'Computing Beyond the Turing-von Neumann Architecture. Available
through <https://blogs.commons.georgetown.edu/cctp-797-fall2013/archives/194>.
[Accessed on 14th September 2017]
This blog givens knowledge on Von Neumann architecture which is a structure that
includes various parts of a computer that includes a CPU, memory and other devices
like the input and out put device. In order to make an efficient use of these elements
all these were connected together by using a system bus. It is an effective and
simple program as operating it was too easy for different users. In addition to this
information regarding the most important component which is CPU is considered as
the most import one as it includes register which has the capacity to manipulate the
present computer program. Modern computers has the capacity to perform various
task at the same time. The major thing with this structure was that programs could be
saved in similar manner as in the system of memory. This function enables programs
to load self defining codes. Other components of this architecture were:
 Memory – It is the place where all the data is saved for future use. It helps
user in getting access to the program as and when require.
 Input – It is the medium through which information is given in the computer as
to get results it is necessary that data is first input in the computer.
 Output – It consist of devises that helps in taking out the information from the
computer in different forms like printer which given a hard copy of data and
monitor which provide visual information.
The given structure was given by John von Neumann in 1945. He was a
mathematician and a physicist. This design was considered to be a simple one in
comparison to that of Harvard architecture machine. It helped in advancement of
programming as through this modern construction of computers drawback of being
fixed programmed which were not multi tasking.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONE such individual. The individual should have had a significant
influence on the writing or development of operating systems.
Ashutosh, K 2017,'Operating Systems You May Not Have Heard Of (But Should).
Available through <http://www.hongkiat.com/blog/lesser-known-operating-systems/>.
[Accessed on 14th September 2017]
The chosen blog is efficient enough as it provide all the required information regarding
operating system. It is one of the most crucial part of any computer. In order to run
different applications and software it is very necessary to have a particular operating
system which can help in continuing the program. It is a conduct that part which
recognizes the command given by different input devises like keyboard and further
provides result on the output devise which is desktop. It also makes sure that when
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Schalk,Z 2013, 'Computing Beyond the Turing-von Neumann Architecture. Available
through <https://blogs.commons.georgetown.edu/cctp-797-fall2013/archives/194>.
[Accessed on 14th September 2017]
This blog givens knowledge on Von Neumann architecture which is a structure that
includes various parts of a computer that includes a CPU, memory and other devices
like the input and out put device. In order to make an efficient use of these elements
all these were connected together by using a system bus. It is an effective and
simple program as operating it was too easy for different users. In addition to this
information regarding the most important component which is CPU is considered as
the most import one as it includes register which has the capacity to manipulate the
present computer program. Modern computers has the capacity to perform various
task at the same time. The major thing with this structure was that programs could be
saved in similar manner as in the system of memory. This function enables programs
to load self defining codes. Other components of this architecture were:
 Memory – It is the place where all the data is saved for future use. It helps
user in getting access to the program as and when require.
 Input – It is the medium through which information is given in the computer as
to get results it is necessary that data is first input in the computer.
 Output – It consist of devises that helps in taking out the information from the
computer in different forms like printer which given a hard copy of data and
monitor which provide visual information.
The given structure was given by John von Neumann in 1945. He was a
mathematician and a physicist. This design was considered to be a simple one in
comparison to that of Harvard architecture machine. It helped in advancement of
programming as through this modern construction of computers drawback of being
fixed programmed which were not multi tasking.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONE such individual. The individual should have had a significant
influence on the writing or development of operating systems.
Ashutosh, K 2017,'Operating Systems You May Not Have Heard Of (But Should).
Available through <http://www.hongkiat.com/blog/lesser-known-operating-systems/>.
[Accessed on 14th September 2017]
The chosen blog is efficient enough as it provide all the required information regarding
operating system. It is one of the most crucial part of any computer. In order to run
different applications and software it is very necessary to have a particular operating
system which can help in continuing the program. It is a conduct that part which
recognizes the command given by different input devises like keyboard and further
provides result on the output devise which is desktop. It also makes sure that when

distinct programs are running all together they do not get mix with one another and
continue to run in software separately. Apart from this one major role perform by
operating system is that it makes sure that no unauthorized user get access to the
system which is done by keeping security in form of user id or passwords. There are
different types of this method like DOS, OS/2 and windows. These are mostly present
in the personal computers. Each component is described blow in detail:
 I/O management – it helps in the administration of computer memory with an
assistance of cache and buffering.
 Networking – connection between various users of computer is kept by this
system.
The given blog discuss that how once a particular system is chosen it can be determine
that what all applications can be run on that specific PC. This method can be further
classified into various categories:
ï‚· Facilitates multi user as a number of users can use the program all together.
ï‚· It helps in working on different computers at the same time
ï‚· Helps in getting different work done from single unit
Different activities which are performed by it is also discussed by the chosen resource
which shows that author has given a deep knowledge. The text explains the different
activities performed by operating system which are given below:
ï‚· Helps in managing processor
ï‚· Management of various files
ï‚· Administration of memory
ï‚· Safety
ï‚· Aids in identifying various errors in system
ï‚· Monitor the results of system
ï‚· Keep balance in user and use of software
The first system was given by General Motors in 1956. It supported the single frame
IBM computer. His contribution was vital as the initial idea was given by him and than
further modifications were done.
continue to run in software separately. Apart from this one major role perform by
operating system is that it makes sure that no unauthorized user get access to the
system which is done by keeping security in form of user id or passwords. There are
different types of this method like DOS, OS/2 and windows. These are mostly present
in the personal computers. Each component is described blow in detail:
 I/O management – it helps in the administration of computer memory with an
assistance of cache and buffering.
 Networking – connection between various users of computer is kept by this
system.
The given blog discuss that how once a particular system is chosen it can be determine
that what all applications can be run on that specific PC. This method can be further
classified into various categories:
ï‚· Facilitates multi user as a number of users can use the program all together.
ï‚· It helps in working on different computers at the same time
ï‚· Helps in getting different work done from single unit
Different activities which are performed by it is also discussed by the chosen resource
which shows that author has given a deep knowledge. The text explains the different
activities performed by operating system which are given below:
ï‚· Helps in managing processor
ï‚· Management of various files
ï‚· Administration of memory
ï‚· Safety
ï‚· Aids in identifying various errors in system
ï‚· Monitor the results of system
ï‚· Keep balance in user and use of software
The first system was given by General Motors in 1956. It supported the single frame
IBM computer. His contribution was vital as the initial idea was given by him and than
further modifications were done.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise a
resource that describes ONE of the networks that led to the development of the modern Internet.
Shah,A 2017,'DARPA's latest idea. Available through
<https://www.pcworld.com/article/3182407/artificial-intelligence/darpas-latest-idea-
could-put-todays-turing-era-computers-at-risk.html>. [Accessed on 14th September
2017]
During the time of 1973, (DARPA) which is a agency had started an investigation
program for putting innovations and systems with a specific end goal to interlink
parcel systems of different sorts. The goal was creating correspondence conventions
which may allow organized PCs for imparting straightforwardly over different
connected bundle arrange. It is termed also as Inter-netting venture and the
arrangement of systems which turn out from the examination and was termed as
"Web". The arrangement of conventions which gets formulated through the span of
this examination exertion called the TCP (IP Transmission control
convention)/(Internet convention) convention suite. Local help for the Internet is
offered by various consortium systems and neighborhood bolster was given by each of
the exploration and instructive foundations. The net was the commitment of many
brains researchers, specialists and software engineers who made new highlights and
advancements that gets converged to end up noticeably the "data superhighway". The
chosen recourse also discussed that Nikola Tesla accompanies the possibility of
world remote framework in the time of 1900. It is a strategy to transfer electronic
information that would than end up noticeably one of the critical building squares of
the Internet. The selected blog is helpful as it also gives understanding regarding the
executable model. The primary executable model of Internet come into exist with the
improvement of ARPANET (Advanced Research Projects Agency Network) in the
time of 1960. At first financed by US Department of Defense, ARPANET had used
parcel exchanging that enabled various PC to convey on a solitary system.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Bisaria,D 2017, 'Different types of Data Link Layer- DLL Protocols. Available
through <https://blog.oureducation.in/different-types-of-data-link-layer-dll-
protocols/>. [Accessed on 14th September 2017]
In this given article data regarding various protocols of layer 2 is given among which
an unrestricted smplex protocol is the one. In order to understand this in detail it is
necessary to first understand that data is always transferred in one direction. Layers of
networks need to transmit as well as receiving the data. The given protocol involves
two parties in which one is the receiver and the other is giver. The communicator
sends the information to the collector and keeps running on the information connect
layer of the communicator's device and beneficiary gets the information from the
transmitter and it keeps running on the information interface layer of the recipient's
machine. The article is useful as it also discussed the frame of reaching which is
utilized in order to send the revert regarding the receiving of an undamaged frame. It
is a less complicated protocol as while loop is utilized by the sender in order to keep
The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise a
resource that describes ONE of the networks that led to the development of the modern Internet.
Shah,A 2017,'DARPA's latest idea. Available through
<https://www.pcworld.com/article/3182407/artificial-intelligence/darpas-latest-idea-
could-put-todays-turing-era-computers-at-risk.html>. [Accessed on 14th September
2017]
During the time of 1973, (DARPA) which is a agency had started an investigation
program for putting innovations and systems with a specific end goal to interlink
parcel systems of different sorts. The goal was creating correspondence conventions
which may allow organized PCs for imparting straightforwardly over different
connected bundle arrange. It is termed also as Inter-netting venture and the
arrangement of systems which turn out from the examination and was termed as
"Web". The arrangement of conventions which gets formulated through the span of
this examination exertion called the TCP (IP Transmission control
convention)/(Internet convention) convention suite. Local help for the Internet is
offered by various consortium systems and neighborhood bolster was given by each of
the exploration and instructive foundations. The net was the commitment of many
brains researchers, specialists and software engineers who made new highlights and
advancements that gets converged to end up noticeably the "data superhighway". The
chosen recourse also discussed that Nikola Tesla accompanies the possibility of
world remote framework in the time of 1900. It is a strategy to transfer electronic
information that would than end up noticeably one of the critical building squares of
the Internet. The selected blog is helpful as it also gives understanding regarding the
executable model. The primary executable model of Internet come into exist with the
improvement of ARPANET (Advanced Research Projects Agency Network) in the
time of 1960. At first financed by US Department of Defense, ARPANET had used
parcel exchanging that enabled various PC to convey on a solitary system.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Bisaria,D 2017, 'Different types of Data Link Layer- DLL Protocols. Available
through <https://blog.oureducation.in/different-types-of-data-link-layer-dll-
protocols/>. [Accessed on 14th September 2017]
In this given article data regarding various protocols of layer 2 is given among which
an unrestricted smplex protocol is the one. In order to understand this in detail it is
necessary to first understand that data is always transferred in one direction. Layers of
networks need to transmit as well as receiving the data. The given protocol involves
two parties in which one is the receiver and the other is giver. The communicator
sends the information to the collector and keeps running on the information connect
layer of the communicator's device and beneficiary gets the information from the
transmitter and it keeps running on the information interface layer of the recipient's
machine. The article is useful as it also discussed the frame of reaching which is
utilized in order to send the revert regarding the receiving of an undamaged frame. It
is a less complicated protocol as while loop is utilized by the sender in order to keep
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

sending data to other receiver. In this process the receiver has to wait till he does not
gets the frame.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Christensen,J 2010, 'The trials of Kevin Mitnick. Availabe through
<http://edition.cnn.com/SPECIALS/1999/mitnick.background/>. [Accessed on 14th
September 2017]
This article discussed different hackers which are involved in cybercrime. An
effective data is given regarding the hacks done by each and also shows that what all
action were taken against them. The author provide good information about Kevin
David Mitnick who is one of the most famous hacker. He describes different types of
hackers like those who are specialist in the field of damaging whole file and other
which do not go through knowledge of hacking and just effect the security by
downloading different tools of hacking. The most interesting part of this article is that
it gives the fact behind two movies which were inspired by Kevin David. He was
arrested and remained in prison for almost 2/1/2 year. There were various complaints
behind him among which computer hacking was most evident. He also used to stole
important data from computers which effected the privacy of big organization to a
great extent. He was also expert in scrambling networks of handsets which further
created problem for business enterprise which share confidential data on phones. His
biggest crime was when he did a great loss to the national defense by entering into
their security system. He was arrested by Shimomura who took great efforts to get
him arrested. Author descried the full journey of this famous hacker which shows that
the chosen resource is efficient enough to acquire complete knowledge regarding the
subject concern. Facts related to his arrest were disclosed which shows that Mitnick
was held without bail in doing unfair practices in context to computer and wire. Some
interesting facts related to his arrest were also highlighted by the author in which he
wrote that a part of society believed Mitinick arrest as an unfair act. According to
them it was an effort to set an example in society against all the other hackers so that
these activities could be minimized.
gets the frame.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Christensen,J 2010, 'The trials of Kevin Mitnick. Availabe through
<http://edition.cnn.com/SPECIALS/1999/mitnick.background/>. [Accessed on 14th
September 2017]
This article discussed different hackers which are involved in cybercrime. An
effective data is given regarding the hacks done by each and also shows that what all
action were taken against them. The author provide good information about Kevin
David Mitnick who is one of the most famous hacker. He describes different types of
hackers like those who are specialist in the field of damaging whole file and other
which do not go through knowledge of hacking and just effect the security by
downloading different tools of hacking. The most interesting part of this article is that
it gives the fact behind two movies which were inspired by Kevin David. He was
arrested and remained in prison for almost 2/1/2 year. There were various complaints
behind him among which computer hacking was most evident. He also used to stole
important data from computers which effected the privacy of big organization to a
great extent. He was also expert in scrambling networks of handsets which further
created problem for business enterprise which share confidential data on phones. His
biggest crime was when he did a great loss to the national defense by entering into
their security system. He was arrested by Shimomura who took great efforts to get
him arrested. Author descried the full journey of this famous hacker which shows that
the chosen resource is efficient enough to acquire complete knowledge regarding the
subject concern. Facts related to his arrest were disclosed which shows that Mitnick
was held without bail in doing unfair practices in context to computer and wire. Some
interesting facts related to his arrest were also highlighted by the author in which he
wrote that a part of society believed Mitinick arrest as an unfair act. According to
them it was an effort to set an example in society against all the other hackers so that
these activities could be minimized.

Week 6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





