logo

IT Fundamentals Report 2022

7 Pages1435 Words22 Views
   

Added on  2022-10-01

IT Fundamentals Report 2022

   Added on 2022-10-01

ShareRelated Documents
Running head: IT FUNDAMENTALS
IT FUNDAMENTALS
Name of the Student
Name of the University
Author Note
IT Fundamentals Report 2022_1
1IT FUNDAMENTALS
Answer to question 1:
A handshake that is three-way is a methodology that is used in a network of Internet
protocol/transmission control protocol in order to create a connection between the client and
server. A three-stage method needs both the server and the client to interchange SYN and
then acknowledge the packets before the actual communication of data begins. A handshake
that is three-way is also called a transmission control protocol handshake.
A handshake that is three-way is used to create a socket connection of transmission control
protocol. It works when:
A node of the client sends a data packet that is SYN over a network of IP to a server on
the same or external network.
The target server must have ports that are opening that can accept and then initiate
connections that are new. When the server that is present receives the SYN packet from
the node of the client, it responds and then returns a receipt of confirmation.
The node of the client receives the SYN from the server that is present and then responds
back with a packet of ACK.
Three packets are involved in the initiation process of a full connection of
Transmission Control protocol. The three ways is required, as both parties need in order to
synchronize their segment of the numbers in sequences that are used during their
ccommunication.
The two-way handshake is not used in Transmission Control protocol because the
handshake that is two-way will allow only one of the parties in order to establish an ISN, and
the other party to acknowledge it, which means only one party, can only send data. However,
the TCP is a protocol of communication that is bi-directional that means either ends need to
IT Fundamentals Report 2022_2
2IT FUNDAMENTALS
send the data reliably. Both parties that are present require establishing an ISN and both the
parties require acknowledging the ISN of the other party.
Answer to question 2:
The full form of RAD is Rapid Application Development that is used to refer to
development of software that is adaptive. The approaches of Rapid Application Development
to the software development put emphasis that are less on planning and gives emphasis on the
adaptive procedure. The prototypes are used in place of the specifications of the designs.
RAD is suited well for the development of software that is driven by the requirements of user
interface. The builders of the graphical user interface are sometimes called tools of the rapid
application development. The other approach to the rapid development consists of the agile,
spiral and other models.
The advantages and the disadvantages are:
Advantages Disadvantages
It is flexible and adaptable to changes It cannot be used for the projects that are
smaller in size
It is useful when the overall risk of the
project is reduced.
Not all the applications are compatible with
rapid application development.
Due to prototyping in nature, there is a
probability of defects that are lesser.
Reduced scalability occurs because an
application that is developed in RAD begins
as a prototype and then it evolves into an
application that is finished.
With less number of people, the productivity
can be increased in short time.
It requires designers or developers that are
highly skilled.
IT Fundamentals Report 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Fundamentals: Network Protocols and SDLC
|7
|1323
|303

Network Protocols and SDLC
|6
|1613
|71

IT Fundamentals Question Answer 2022
|8
|1902
|17

Information Technology fundamentals Assignment1
|10
|2372
|28

IT Project Management Question Answer 2022
|7
|1042
|20

Assignment On Network Protocols And Sdlc
|5
|965
|22