Information Technology fundamentals Assignment1

   

Added on  2022-10-02

10 Pages2372 Words28 Views
Running head: REPORT ON INFORMATION TECHNOLOGY FUNDAMENTALS.
REPORT
ON
INFORMATION TECHNOLOGY FUNDAMENTALS
Name of the Student
Name of the University
Author Note:
Information Technology fundamentals Assignment1_1
Information Technology fundamentals1
Question 1: Explain why we need a 3-way handshake in TCP? Why not just 2-way?
Answer:-
Let us take an example of a TCP conversation in between Bobbie and Alice
Bobbie----->Alice SYNchronize with the specific initial sequence number Y
Bobbie<-----Alice Receiving the syn and acknowledge that it is ready for [Y+1]
Bobbie<-----Alice SYNchronize with the particular initial number Y
Bobbie<-----Alice The syn has been received and it has been acknowledged and is ready for
[Y+1]
It has been noticed that there are basically four events which have been clearly occurring:
1. Bobbie is picking up an ISN and it is being SYNchoronised with Alice.
2. Bobbie ACKowledging the ISN
3. Bobbie is picking up the ISN and SYNchronizing it with Alice
4. Bobbie is ACKnowledging the ISN
The specific two events which are placed in the middle may be occurring within the
same packet. The three way handshake will be ending up as:
Alice <--- Bobbie SYN
Alice ---> Bobbie SYN ACK
Alice <--- Bobbie ACK
Now, coming to the specific question that what is the reason behind not utilising the
two way handshake is that the handshake of two way will be actually allowing one single
party for specifically establishing an ISN and there will be some other party which will be
ready for acknowledging it and this means that only one single party will be able to send the
Information Technology fundamentals Assignment1_2
Information Technology fundamentals2
data (Nakhila et al., 2015). But it is to be remembered that TCT is a protocol which is bi-
directional which means that both the ends must be capable of sending data in a reliable way.
Both the parties must be establishing an ISN and they must be properly acknowledging the
ISN of the other (Kolahi et al., 2014). Hence, it is much better to possess three packets in the
total initiation procedure of the connection of TCP.
Question 2: What is RAD? List an advantage and a disadvantage of using RAD.
Answer:-
RAD or the Rapid Application Development is basically the adoption of the specific
model of waterfall and it has its main target towards the development of the software within a
very short period of time (Namazi‐Rad & Steel, 2015). The RAD model will be comprising
of the phases:
1. Modelling of business
2. Modelling of data
3. Modelling of process
4. Generation of application
5. Testing and the turnover
It will be focusing upon the source of input-output and the information’s main
destination and it will be greatly emphasizing upon the delivery of various projects in smaller
pieces (Nordstrom, 2015). All the main features of the model of RAD will be involving the
focus upon the reutilization of various procedures, code as well as various templates.
Advantages:
1. It is very much adaptable as well as flexible towards any kind of alternations.
2. It is very much useful whenever the overall risk of the project is to be lowered.
Information Technology fundamentals Assignment1_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Fundamentals of Information Technology
|9
|2033
|489

IT Fundamentals: Network Protocols and SDLC
|7
|1323
|303

IT Fundamentals Report 2022
|7
|1435
|22

IT Fundamentals Question Answer 2022
|8
|1902
|17

Network Protocols and SDLC
|6
|1613
|71

Mastering Network Protocols and ITSM
|5
|1251
|1