University IT Fundamentals Assignment: Network and ITSM Analysis

Verified

Added on  2022/08/23

|7
|1272
|17
Homework Assignment
AI Summary
This IT Fundamentals assignment delves into key networking and IT service management (ITSM) concepts. It begins with an analysis of the OSI model, highlighting its advantages over TCP/IP and explaining subnet masking and maximum segment sizes. The assignment then examines emerging trends in ITSM, including the increasing role of artificial intelligence (AI), machine learning, and enhanced security. It defines the roles of incident and change managers within ITSM. Furthermore, the document compares and contrasts software development life cycle models, specifically the waterfall, V-shaped, and spiral models, discussing their applications in various project scenarios. The assignment also includes references to relevant literature.
Document Page
Running head: IT FUNDAMENTALS
INFORMATION TECHNOLOGY FUNDAMENTALS
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1IT FUNDAMENTALS
Question 1:
a) The layer division in the OSI model divides the system into small logical layers such that
the issues in the layers of networking services can be solved by divide and rule
methodology. Thus it is justified to say that the division of the network is beneficial.
The advantages of the OSI model over the TCP/IP model are given below:
Clear distinction between the services, interfaces and protocols can be seen and
distinguished in the OSI model, which is not available in the TCP/IP protocols.
Proper separation is not present in the TCP/IP protocol.
The TCP/IP makes use of the Internet network, whereas the OSI model makes use of
the network layer for defining the standard of routing.
In the OSI model, the physical and the data link layer is completely separate which
again have several advantages over the other protocol.
The OSI model supports the connection oriented services along with the
connectionless support.
Document Page
2IT FUNDAMENTALS
b) The maximum number of subnets and hosts in a specific network is defined by its subnet
mask. The subnet mask segments the IP address into a networking part. CIDR mask can
be used and the sum of number of ones and the number of zeroes is equal to 32.
Therefore, the number of subnets can be determined by:
Number of subnets = 2(number of ones) [If CIDR is used]
And if the CIDR is not used then the number of ones is calculated by:
Number of Subnets = 2(number of ones in mask- number of ones in class)
For example, if an address is considered as 149.25.3.5/22
By CIDR, number of ones in the subnet mask = 22
Number of zeroes is 32 22 = 10.
The number of subnets in first situation = 222 = 4 194 304
In second situation, the number of subnets = 2(22-16) = 26 = 64.
Document Page
3IT FUNDAMENTALS
c) The maximum size of TCP/IP segment is 65536 bytes. This is because, the maximum
word size in the IP is 2 byte. 1 byte is equal to 8 bits. Therefore, 2 ^ 16 is equal to 65536
bytes.
It is often refer to as 65535 as the count is included in it as well. As zero is the largest
number and we start at zero, this is counted as 65535 bytes instead of the 65536.
Question 2:
a) The upcoming trends and predictions in the ITSM are,
Further enhancement of the artificial intelligence in the some of the specific ITSM
and in the IT support task. This will also include the involvement of the Machine
Learning technology which will helps in solving the tasks which are repetitive in
nature.
Phrases and the words such as the “employee/customer experience”, “value” and
“outcomes of the business” will be considered to be the larger part of the ITSM.
The security will be further enhanced in the ITSM with some of the strong
network security protocol.
ITSM will help in the growth and development of the digital transformation.
Helps in close monitoring of the services.
Micro services disruption ITSM and practises for tooling (Krishnan & Ravindran,
2017).
b) Role of incident manager in ITSM: the responsibility of the incident manger is to
respond to the incidents that are taking place in the organization. The necessary steps for
the restoration of the disrupted services is undertaken by the incident manager as well.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4IT FUNDAMENTALS
Role of Change Manager in ITSM: The responsibility of the change manager is to
implement change based on the priority of the business. Convening the change advisory
board meetings (CAB). The change manger ensures that the projects are meeting their
objectives within the given time and budget.
c) The waterfall model is the easiest one as the next step begins only after the previous steps
is completely done (Lemke, 2018).
The V-shape model, also known as the verification and the validation model, is a
sequential model. It is similar to the waterfall model, as the last step is verified before
proceeding with the other.
The Spiral model on the other hand, helps in the analysis of the risk, enhancing
the avoidance of risk. The other two models mentioned before delivers single product; in
case of the spiral model, individual iterations provides a rough assumption of the product
that will be delivered (Balaji & Murugaiyan, 2012). The large systems prefers the spiral
model over waterfall model due to its ability to identify risks in every steps.
d) The major points of comparison between the waterfall model and V model are:
The waterfall model is linear sequential approach whereas the V model have V-
shape sequential approach.
The v model is a simultaneous process where as the waterfall model is a
continuous process.
The testing phase of the model occurs only after the completion of the
development phase which is the reason that the defects are identified in the end
and cannot be changed easily (Singh, Muthukrishnan & Sanpini, 2019). Whereas
the risks are identified in the V shaped model in each of the iteration and can be
Document Page
5IT FUNDAMENTALS
prevented simultaneously, thus the defects are much lesser than the waterfall
model.
In smaller business and smaller project like the development of a plane website
for a business or an organization, the waterfall model can be used. But for the projects
which involves a lot of processes and mechanism, or for project which involves
multiple steps of development, the spiral model is preferred.
Document Page
6IT FUNDAMENTALS
References:
Balaji, S., & Murugaiyan, M. S. (2012). Waterfall vs. V-Model vs. Agile: A comparative study
on SDLC. International Journal of Information Technology and Business
Management, 2(1), 26-30.
Bohuslava, J., Martin, J., & Igor, H. (2017, January). TCP/IP protocol utilisation in process of
dynamic control of robotic cell according industry 4.0 concept. In 2017 IEEE 15th
International Symposium on Applied Machine Intelligence and Informatics (SAMI) (pp.
000217-000222). IEEE.
Goralski, W. (2017). The illustrated network: how TCP/IP works in a modern network. Morgan
Kaufmann.
Krishnan, G., & Ravindran, V. (2017, June). IT service management automation and its impact
to IT industry. In 2017 International Conference on Computational Intelligence in Data
Science (ICCIDS) (pp. 1-4). IEEE.
Lemke, G. (2018). The Software Development Life Cycle and Its Application.
Singh, N. K., Muthukrishnan, P., & Sanpini, S. (2019). Software Development. In Industrial
System Engineering for Drones (pp. 167-213). Apress, Berkeley, CA.
Steyerberg, E. W. (2019). Validation of prediction models. In Clinical prediction models (pp.
329-344). Springer, Cham.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]