ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Basic Architecture And Protocols of Internet

Verified

Added on  2022/09/07

|9
|2257
|29
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
RUNNING HEAD: INTERNETWORKING Page 0 of 9
Internetworing
Report
DECEMBER 30, 2019
Student name

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTERNETWORKING Page 1 of 9
Ans-1 a.
OSI network reference model has used for connecting different systems using basic
architecture and protocols. Moreover, there is some work of each protocol, which can be
managed basic services of a network. OSI protocol stack has included the presentation and
session layer for work (Medhi & Ramasamy, 2017). The session layer has created for
managing dialogue for data transfer and access to various things. It has secured all the things
using a set of rules, which is necessary to secure all the sessions. Moreover, the TCP/IP
protocol stack has merged the applications of telnet and FTP protocols in the application
layer (Paquet, 2013).
The main advantage of merging of session and presentation layer into the application
layer in the TCP/IP model is proper work based on the applications. Basically, protocols have
used to manage the session and presentation of data and networks. In addition, data
encryption and decryption can be done at the application layer, as users have used browser
for request and response (Rouse, 2008). Thus, it is easy to merge-common processes in the
same layer. There are various works, which cannot be separated based on their importance. It
has reduced packet size as well because of the extra header of each layer has attached with
the data as well. It is better in a practical process to transfer data at high speed. It is easy for
error control, flow control, and congestion control (Sunshine, 2013).
TCP/IP model has used various techniques to optimized various things, which has
created traffic and a slow rate of transmission. Moreover, the OSI model is a reference model,
which is not used for practical work (Paquet, 2013). However, the TCP/IP model has
included various functions and protocols from the OSI model. Telnet and FTP protocols are
used for specific purposes, which has not required another layer. Thus, TCP/IP has improved
the way of packet transmission (Dye, McDonald, & Rufi, 2007). There is a disadvantage of
merging of the session and presentation layer, which is separation is necessary for the
security and privacy of data and information (Tanenbaum, 2014). In addition, error control
is better at the application, as data has formatted in a proper manner at the application layer
using proper protocols. Many techniques have used for the formatting of various frames and
segments.
Document Page
INTERNETWORKING Page 2 of 9
In addition, there are some basic needs of session management, which can be handled
at the end of the application layer using client and server-side programs. It can be better at the
application layer. It has not required an additional header for this work. Thus, the TCP/IP
model has reduced these layers form a practical model. It will be better for the sender and
receiver. In addition, there are many benefits of merging those layers, which is helpful in the
management packets in a network (Dye, McDonald, & Rufi, 2007).
c. In the TCP segment, 16 bits have used for the offset field, which starts from zero
and maximum all 1’s. thus, it will be limited to 2^16 = 65,536 (Forouzan, 2007).
Ans-2
a.
IT Service Management (ITSM) can be managed by various processes of a firm with
high accuracy and performance. In addition, ITSM is a new trend in the market, which has
used for managing, various services, such as service strategies, service improvement, and
many more (Software-Developer, 2019).
Source: (Technology-berkeley, 2019)
ITSM has included emerging technologies and innovations, which has provided
various benefits to the company. It has improved various things in a firm. It can manage all
the things using technological innovations. Most of the business functions will be managed
using ITSM, as it has provided various roles and responsibilities to different people in a firm,
which can use policies to manage all the things.
Document Page
INTERNETWORKING Page 3 of 9
In addition, asset management is a good thing in the ITSM, which can manage all the
resources of a firm in a proper manner. Besides, ITSM has provided new technologies, which
has used for project management, such as agile methodologies. In addition, there are various
departments, which can be used for managing various things in a company. Moreover, ITSM
is including an advance level of services, such as knowledge management. Moreover, a firm
can use ITSM for managing their internal and external stakeholders. It is the best way to
perform better in the market (Technology-berkeley, 2019).
ITSM refers daily to all the activities concerned in designing, creating, delivering,
helping and managing the lifecycle of IT services. Properly, of the direction it does, but what
is IT services? think about any piece of technology you operate at your workplace – your pc,
the apps hooked up on it, the printer that your complete team makes use of, or the choice day-
to-day reset your password even after the primary 15 times. They’re all offerings supplied by
means of your IT crew. In different words, IT offerings. Even though the most commonplace
notion of ITSM among IT users (employees) is just “IT assist”, ITSM goes manner beyond
resolving troubles. Your IT crew is accountable for giving up-day-to-day-give up control of
those offerings. they might use ITSM software to successfully control these offerings. With
that primary advent out of the manner, look at out this video in which Stephen Mann sums up
ITSM and its relationship with the commercial enterprise.
b.
ITSM has used for managing various things, which can be managed using
technologies and innovations. In addition, Incident Manager (IM) should manage all the
incidents, which has reported by employees and other things. IM must use policies to manage
the security and privacy of various business functions. ITSM has offered various services to
the assets and resources of a firm, which is valuable for the company (Kovács, 2019).
Moreover, the ITSM system has used for the management of technical and non-technical
business problems of a firm. It will be a better way to optimize issues and challenges in a
firm. Moreover, technological innovations have provided better solutions for business
problems. Moreover, basic business processes can be managed according to their respective
processes.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTERNETWORKING Page 4 of 9
Source: (Software-Developer, 2019)
Change Manager (CM) has managed resistance of change, which is created form
various stakeholders of a firm. Moreover, it is the responsibility of a CM to manage various
issues in a firm because of a change in the systems, which can be resolved using training and
educations. CM can use policies to improve the knowledge of their employees, which can
resist the change as well. ITSM has designed to manage all the functions of an organization
in a proper manner. It is useful in IT alignment, which is necessary for the utilization of
assets in a proper manner (Kovács, 2019).
Change management is tough work for a person, as he or she requires proper
leadership skills and technical skills to manage their followers. It is a huge task in front of a
person to manage a number of people using rules and regulations. In addition, basic issues of
change can be resolved as soon as possible, as they can create huge issues in front of a firm.
ITSM has provided various options to manage and collaborate with all the employees for
changing in the business functions, as it is beneficial in better profit and revenue
(Technology-berkeley, 2019). The change manager should consider all the points to avoid
the firm in difficult and complex conditions.
Document Page
INTERNETWORKING Page 5 of 9
c.
The waterfall model and V-shaped cycle model have included some limitation, which
has overcome in the Spiral model, such as incremental processes and looping. It has reduced
such types of issues, which has occurred at the end of the software development cycle. It can
be a serious thing to resolve various things (Amritansh, 2019). The waterfall model has
provided many advantages in the case of a large-scale project. However, failure chances will
be more with this approach. Thus, most of the small and medium scale firms have used the
spiral and V-shaped cycle model, which has provided better outcomes and less chance of
failure.
The spiral model is the aggregate of each sequential version and the prototype
version. The spiral version is particularly designed for projects which might be huge in size
and calls for ordinary improvements. The spiral model is much like the incremental model
however more emphasis on danger evaluation, engineering, and evaluation. It has provided
better results in the SDLC. Thus, firms have used this model for project management.
d.
There is some basic difference between the waterfall model and the V-shaped model
of SDLC, as both models have worked in different ways (Lithmee, 2018). There are many
factors, which can be used for comparing two SDLC models. Techniques have changed as
per the demand of clients, as failure makes a huge impact on various things of a firm, such as
financial, reputation, and more. To save time and money, agile methodologies can be used for
managing various things. In addition, basic things can be changed using testing at various
places, such as analysis, designing, development, and others. It will improve the outcomes of
the project. Moreover, companies have used various things to manage all the processes
(Kovács, 2019).
Furthermore, the waterfall model has used to manage a large number of processes and
functions of a firm, which has used for most of the things. There are many advantages to the
SDLC model in the improvement of various things. Software development is a huge process
that can require many resources to complete the work in a proper manner. Many things can
be reduced using a V-shaped model that can be used for managing all the things in a proper
manner.
Document Page
INTERNETWORKING Page 6 of 9
Waterfall model V-shaped model
It has used testing after
completion of
development
It has used testing after each model.
It is a linear sequential
design technique
It is using sequential technique in a v shape
It is a continuous process It is a simultaneous model
Defect rate is higher Defect rate is lower, as testing is complete after each phase
The success rate is low The success rate of the project is high as compared to the
waterfall model

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTERNETWORKING Page 7 of 9
References
Amritansh. (2019). Difference between V-model and Waterfall model. Retrieved from
https://www.geeksforgeeks.org/: https://www.geeksforgeeks.org/difference-between-
v-model-and-waterfall-model/
Dye, M., McDonald, R., & Rufi, A. (2007). Network Fundamentals, CCNA Exploration
Companion Guide. Indianapolis, USA: Cisco press.
Forouzan, A. (2007). Data communications & networking (8th ed.). New Delhi: Tata
McGraw-Hill Education.
Kovács, I. (2019, April 30). ITSM Analytics. Retrieved from https://medium.com:
https://medium.com/starschema-blog/itsm-analytics-7b14a585f0f1
Lithmee. (2018, April 14). Difference Between Waterfall Model and V Model. Retrieved from
https://www.differencebetween.com: https://www.differencebetween.com/difference-
between-waterfall-model-and-vs-v-model/
Medhi, D., & Ramasamy, K. (2017). Network routing: algorithms, protocols, and
architectures. Morgan Kaufmann.
Paquet, C. (2013). Network Security Concepts and Policies. Retrieved november 2, 2019,
from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3
Rouse, M. (2008). TCP/IP (Transmission Control Protocol/Internet Protocol) . Retrieved
from https://searchnetworking.techtarget.com:
https://searchnetworking.techtarget.com/definition/TCP-IP
Software-Developer. (2019, December 29). What Is ITSM and What Does It Mean for
Software Developers? Retrieved from https://www.computercareers.org/:
https://www.computercareers.org/what-is-itsm-and-what-does-it-mean-for-software-
developers/
Sunshine, C. (2013). Computer network architectures and protocols. New Jersy: Springer
Science & Business Media.
Tanenbaum, A. S. (2014). Computer networks. Harlow, Essex: Pearson.
Document Page
INTERNETWORKING Page 8 of 9
Technology-berkeley. (2019, December 30). IT Service Management. Retrieved from
https://technology.berkeley.edu: https://technology.berkeley.edu/ITSM
1 out of 9
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]