University IT Fundamentals Assignment: Network and ITSM Analysis
VerifiedAdded on 2022/08/23
|7
|1272
|17
Homework Assignment
AI Summary
This IT Fundamentals assignment delves into key networking and IT service management (ITSM) concepts. It begins with an analysis of the OSI model, highlighting its advantages over TCP/IP and explaining subnet masking and maximum segment sizes. The assignment then examines emerging trends in ITSM, including the increasing role of artificial intelligence (AI), machine learning, and enhanced security. It defines the roles of incident and change managers within ITSM. Furthermore, the document compares and contrasts software development life cycle models, specifically the waterfall, V-shaped, and spiral models, discussing their applications in various project scenarios. The assignment also includes references to relevant literature.

Running head: IT FUNDAMENTALS
INFORMATION TECHNOLOGY FUNDAMENTALS
Name of the Student:
Name of the University:
Author note:
INFORMATION TECHNOLOGY FUNDAMENTALS
Name of the Student:
Name of the University:
Author note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1IT FUNDAMENTALS
Question 1:
a) The layer division in the OSI model divides the system into small logical layers such that
the issues in the layers of networking services can be solved by divide and rule
methodology. Thus it is justified to say that the division of the network is beneficial.
The advantages of the OSI model over the TCP/IP model are given below:
Clear distinction between the services, interfaces and protocols can be seen and
distinguished in the OSI model, which is not available in the TCP/IP protocols.
Proper separation is not present in the TCP/IP protocol.
The TCP/IP makes use of the Internet network, whereas the OSI model makes use of
the network layer for defining the standard of routing.
In the OSI model, the physical and the data link layer is completely separate which
again have several advantages over the other protocol.
The OSI model supports the connection oriented services along with the
connectionless support.
Question 1:
a) The layer division in the OSI model divides the system into small logical layers such that
the issues in the layers of networking services can be solved by divide and rule
methodology. Thus it is justified to say that the division of the network is beneficial.
The advantages of the OSI model over the TCP/IP model are given below:
Clear distinction between the services, interfaces and protocols can be seen and
distinguished in the OSI model, which is not available in the TCP/IP protocols.
Proper separation is not present in the TCP/IP protocol.
The TCP/IP makes use of the Internet network, whereas the OSI model makes use of
the network layer for defining the standard of routing.
In the OSI model, the physical and the data link layer is completely separate which
again have several advantages over the other protocol.
The OSI model supports the connection oriented services along with the
connectionless support.

2IT FUNDAMENTALS
b) The maximum number of subnets and hosts in a specific network is defined by its subnet
mask. The subnet mask segments the IP address into a networking part. CIDR mask can
be used and the sum of number of ones and the number of zeroes is equal to 32.
Therefore, the number of subnets can be determined by:
Number of subnets = 2(number of ones) [If CIDR is used]
And if the CIDR is not used then the number of ones is calculated by:
Number of Subnets = 2(number of ones in mask- number of ones in class)
For example, if an address is considered as 149.25.3.5/22
By CIDR, number of ones in the subnet mask = 22
Number of zeroes is 32 – 22 = 10.
The number of subnets in first situation = 222 = 4 194 304
In second situation, the number of subnets = 2(22-16) = 26 = 64.
b) The maximum number of subnets and hosts in a specific network is defined by its subnet
mask. The subnet mask segments the IP address into a networking part. CIDR mask can
be used and the sum of number of ones and the number of zeroes is equal to 32.
Therefore, the number of subnets can be determined by:
Number of subnets = 2(number of ones) [If CIDR is used]
And if the CIDR is not used then the number of ones is calculated by:
Number of Subnets = 2(number of ones in mask- number of ones in class)
For example, if an address is considered as 149.25.3.5/22
By CIDR, number of ones in the subnet mask = 22
Number of zeroes is 32 – 22 = 10.
The number of subnets in first situation = 222 = 4 194 304
In second situation, the number of subnets = 2(22-16) = 26 = 64.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3IT FUNDAMENTALS
c) The maximum size of TCP/IP segment is 65536 bytes. This is because, the maximum
word size in the IP is 2 byte. 1 byte is equal to 8 bits. Therefore, 2 ^ 16 is equal to 65536
bytes.
It is often refer to as 65535 as the count is included in it as well. As zero is the largest
number and we start at zero, this is counted as 65535 bytes instead of the 65536.
Question 2:
a) The upcoming trends and predictions in the ITSM are,
Further enhancement of the artificial intelligence in the some of the specific ITSM
and in the IT support task. This will also include the involvement of the Machine
Learning technology which will helps in solving the tasks which are repetitive in
nature.
Phrases and the words such as the “employee/customer experience”, “value” and
“outcomes of the business” will be considered to be the larger part of the ITSM.
The security will be further enhanced in the ITSM with some of the strong
network security protocol.
ITSM will help in the growth and development of the digital transformation.
Helps in close monitoring of the services.
Micro services disruption ITSM and practises for tooling (Krishnan & Ravindran,
2017).
b) Role of incident manager in ITSM: the responsibility of the incident manger is to
respond to the incidents that are taking place in the organization. The necessary steps for
the restoration of the disrupted services is undertaken by the incident manager as well.
c) The maximum size of TCP/IP segment is 65536 bytes. This is because, the maximum
word size in the IP is 2 byte. 1 byte is equal to 8 bits. Therefore, 2 ^ 16 is equal to 65536
bytes.
It is often refer to as 65535 as the count is included in it as well. As zero is the largest
number and we start at zero, this is counted as 65535 bytes instead of the 65536.
Question 2:
a) The upcoming trends and predictions in the ITSM are,
Further enhancement of the artificial intelligence in the some of the specific ITSM
and in the IT support task. This will also include the involvement of the Machine
Learning technology which will helps in solving the tasks which are repetitive in
nature.
Phrases and the words such as the “employee/customer experience”, “value” and
“outcomes of the business” will be considered to be the larger part of the ITSM.
The security will be further enhanced in the ITSM with some of the strong
network security protocol.
ITSM will help in the growth and development of the digital transformation.
Helps in close monitoring of the services.
Micro services disruption ITSM and practises for tooling (Krishnan & Ravindran,
2017).
b) Role of incident manager in ITSM: the responsibility of the incident manger is to
respond to the incidents that are taking place in the organization. The necessary steps for
the restoration of the disrupted services is undertaken by the incident manager as well.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4IT FUNDAMENTALS
Role of Change Manager in ITSM: The responsibility of the change manager is to
implement change based on the priority of the business. Convening the change advisory
board meetings (CAB). The change manger ensures that the projects are meeting their
objectives within the given time and budget.
c) The waterfall model is the easiest one as the next step begins only after the previous steps
is completely done (Lemke, 2018).
The V-shape model, also known as the verification and the validation model, is a
sequential model. It is similar to the waterfall model, as the last step is verified before
proceeding with the other.
The Spiral model on the other hand, helps in the analysis of the risk, enhancing
the avoidance of risk. The other two models mentioned before delivers single product; in
case of the spiral model, individual iterations provides a rough assumption of the product
that will be delivered (Balaji & Murugaiyan, 2012). The large systems prefers the spiral
model over waterfall model due to its ability to identify risks in every steps.
d) The major points of comparison between the waterfall model and V model are:
The waterfall model is linear sequential approach whereas the V model have V-
shape sequential approach.
The v model is a simultaneous process where as the waterfall model is a
continuous process.
The testing phase of the model occurs only after the completion of the
development phase which is the reason that the defects are identified in the end
and cannot be changed easily (Singh, Muthukrishnan & Sanpini, 2019). Whereas
the risks are identified in the V shaped model in each of the iteration and can be
Role of Change Manager in ITSM: The responsibility of the change manager is to
implement change based on the priority of the business. Convening the change advisory
board meetings (CAB). The change manger ensures that the projects are meeting their
objectives within the given time and budget.
c) The waterfall model is the easiest one as the next step begins only after the previous steps
is completely done (Lemke, 2018).
The V-shape model, also known as the verification and the validation model, is a
sequential model. It is similar to the waterfall model, as the last step is verified before
proceeding with the other.
The Spiral model on the other hand, helps in the analysis of the risk, enhancing
the avoidance of risk. The other two models mentioned before delivers single product; in
case of the spiral model, individual iterations provides a rough assumption of the product
that will be delivered (Balaji & Murugaiyan, 2012). The large systems prefers the spiral
model over waterfall model due to its ability to identify risks in every steps.
d) The major points of comparison between the waterfall model and V model are:
The waterfall model is linear sequential approach whereas the V model have V-
shape sequential approach.
The v model is a simultaneous process where as the waterfall model is a
continuous process.
The testing phase of the model occurs only after the completion of the
development phase which is the reason that the defects are identified in the end
and cannot be changed easily (Singh, Muthukrishnan & Sanpini, 2019). Whereas
the risks are identified in the V shaped model in each of the iteration and can be

5IT FUNDAMENTALS
prevented simultaneously, thus the defects are much lesser than the waterfall
model.
In smaller business and smaller project like the development of a plane website
for a business or an organization, the waterfall model can be used. But for the projects
which involves a lot of processes and mechanism, or for project which involves
multiple steps of development, the spiral model is preferred.
prevented simultaneously, thus the defects are much lesser than the waterfall
model.
In smaller business and smaller project like the development of a plane website
for a business or an organization, the waterfall model can be used. But for the projects
which involves a lot of processes and mechanism, or for project which involves
multiple steps of development, the spiral model is preferred.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6IT FUNDAMENTALS
References:
Balaji, S., & Murugaiyan, M. S. (2012). Waterfall vs. V-Model vs. Agile: A comparative study
on SDLC. International Journal of Information Technology and Business
Management, 2(1), 26-30.
Bohuslava, J., Martin, J., & Igor, H. (2017, January). TCP/IP protocol utilisation in process of
dynamic control of robotic cell according industry 4.0 concept. In 2017 IEEE 15th
International Symposium on Applied Machine Intelligence and Informatics (SAMI) (pp.
000217-000222). IEEE.
Goralski, W. (2017). The illustrated network: how TCP/IP works in a modern network. Morgan
Kaufmann.
Krishnan, G., & Ravindran, V. (2017, June). IT service management automation and its impact
to IT industry. In 2017 International Conference on Computational Intelligence in Data
Science (ICCIDS) (pp. 1-4). IEEE.
Lemke, G. (2018). The Software Development Life Cycle and Its Application.
Singh, N. K., Muthukrishnan, P., & Sanpini, S. (2019). Software Development. In Industrial
System Engineering for Drones (pp. 167-213). Apress, Berkeley, CA.
Steyerberg, E. W. (2019). Validation of prediction models. In Clinical prediction models (pp.
329-344). Springer, Cham.
References:
Balaji, S., & Murugaiyan, M. S. (2012). Waterfall vs. V-Model vs. Agile: A comparative study
on SDLC. International Journal of Information Technology and Business
Management, 2(1), 26-30.
Bohuslava, J., Martin, J., & Igor, H. (2017, January). TCP/IP protocol utilisation in process of
dynamic control of robotic cell according industry 4.0 concept. In 2017 IEEE 15th
International Symposium on Applied Machine Intelligence and Informatics (SAMI) (pp.
000217-000222). IEEE.
Goralski, W. (2017). The illustrated network: how TCP/IP works in a modern network. Morgan
Kaufmann.
Krishnan, G., & Ravindran, V. (2017, June). IT service management automation and its impact
to IT industry. In 2017 International Conference on Computational Intelligence in Data
Science (ICCIDS) (pp. 1-4). IEEE.
Lemke, G. (2018). The Software Development Life Cycle and Its Application.
Singh, N. K., Muthukrishnan, P., & Sanpini, S. (2019). Software Development. In Industrial
System Engineering for Drones (pp. 167-213). Apress, Berkeley, CA.
Steyerberg, E. W. (2019). Validation of prediction models. In Clinical prediction models (pp.
329-344). Springer, Cham.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



