logo

Network Protocols, SDLC & ITSM

Answering questions related to network protocols, SDLC, and ITSM

9 Pages2605 Words80 Views
   

Added on  2022-12-20

About This Document

This document discusses network protocols, SDLC, and ITSM. It covers topics such as file transfer, TCP/IP protocol stack, agile software development, Apple's product development process, project failure causes, and budget planning for software procurement.

Network Protocols, SDLC & ITSM

Answering questions related to network protocols, SDLC, and ITSM

   Added on 2022-12-20

ShareRelated Documents
Running head: NETWORK PROTOCOLS, SDLC & ITSM
Network Protocols, SDLC & ITSM
Name of the Student
Name of the University
Author note
Network Protocols, SDLC & ITSM_1
NETWORK PROTOCOLS, SDLC & ITSM1
1. (i) IN this step, it is firstly assumed that both of the clients would be making use of
IPv4 Protocol that is based on transferring of file.
Provided data:
Size of file = 1024 bytes
Size of payload = 128 bytes
The TCP header would be comprised of 20 bytes
The IPv4 header would be comprised of 20 bytes
Hence, the entire TCP/IP header would be composed of 40*(20 + 20) bytes
The bytes would be divided into 1024 bytes that would consist of 8 segments each of 128
bytes.
Then, (40 + 128)*8 = 1344 bytes.
Hence, a total of 1344 bytes would be sent including of the TCP/IP overhead.
(ii) The size of file = 2048 bytes
Size of the payload = 512 bytes
The total number of datagrams required for transfer of entire file is:
Number of datagrams = (File size/Payload Size) = (2048/512) bytes = 4 bytes.
2. Whenever a user would issue a certain command, they would make use of the TCP/IP
application layer protocol that can be defined as a chain of events that would be highly set in
motion. The message or command of the user would mainly pass through the protocol stack that
Network Protocols, SDLC & ITSM_2
NETWORK PROTOCOLS, SDLC & ITSM2
would be entirely be based on a local machine (Goralski, 2017). It would then pass across the
network media based on the protocols of the recipient. The TCP/IP protocol at each of the layer
would be present within the sending host and would thus add information to the original data. As
the command of the user would make their way through the entire protocol stack, the protocols
present at each of the layers would be able to interact with the sending hots. It would also
interact with the connected peers based on the side of the receiving host.
The packet can be considered as the basic unit of information that can be transferred
across the internet network. This would mostly consist of a header with the addresses of the
sending and receiving hosts (Mileva & Panajotov, 2014). A body with the data would be
transferred. As the entire set of packets would travel through the TCP/IP protocol stack, the
protocols present at each of the layers would either add or remove the fields from the basic
header. When a certain protocol present on the sending host would host the addition of data to
the packet header, the entire process could be called as the encapsulation of data. Moreover, each
of the layers that would consist of a common term based on the altered packet.
3. One of the major advantage of the agile method for the development of software
projects, it can be discussed that it would prove maximum benefits for the growth of the project.
Based on the implementation of the agile mode of software development, it would be highly easy
for collaborating with the entire team and thus bring in changes towards the project. The project
managers would thus be responsible for bringing in the features of adaptability to various
situations of changes (Domann et al., 2014). This can also be defined as the key advantages of
choosing the agile methodology. Based on the following over the agile methodology, the
software teams would be able to deliver the best kind of business results after the development of
Network Protocols, SDLC & ITSM_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Protocols, SDLC & ITSM.
|9
|1764
|2

Network Protocols, SDLC & ITSM
|14
|3637
|342

TCP/IP Model, Software Development Process and ITSM
|8
|1316
|229

Network Protocols, SDLC & ITSM
|7
|1244
|424

TCP/IP Model, Software Development Process and ITSM
|8
|1638
|454

Networking Fundamentals
|7
|1169
|201