logo

Mastering Network Protocols and ITSM

5 Pages1251 Words1 Views
   

Added on  2022-12-19

About This Document

This document provides information about network protocols, SDLC, and ITSM. It covers topics such as TCP, Rapid Application Development (RAD), Agile method, scope creep, and fact-finding techniques. It also discusses the Real-time Glucose Monitoring System.

Mastering Network Protocols and ITSM

   Added on 2022-12-19

ShareRelated Documents
Running head: NETWORK PROTOCOLS, SDLC & ITSM
Network Protocols, SDLC & ITSM
Student's Name
Institutional Affiliation
Mastering Network Protocols and ITSM_1
NETWORK PROTOCOLS, SDLC & ITSM
1. Transmission Control Protocol (TCP) is inferred to as a standard which gives a definition
of the establishment and maintenance of any conversation over a given network where
application can share and transmit data. A 3-way handshake is needed in TCP since both the
client and the server need to perform synchronization of the number of their sequence segment
that was used in their transmission. In this case, the client sends an SYN segment having a
sequence number that has been set to a value that is random to the server. This is mainly done to
request for a proof that the segment can get through.
It is then acknowledged by the server which then sends two packets having sequence numbers.
One packet is the ACK to show that the SYN got through and the other packet is the SYN for
requesting its ACK. When the two packets combine they form SYN-ACK packet. When the
ACK gets through successfully, the server will know that packets can be sent to the client. This
makes the 3-way handshake more convenient than a 2-way handshake.
2. Rapid Application Development (RAD) is a Software Development Life Cycle (SDLC)
model. It makes the adoption of waterfall model of the SDLC and it is aimed at software
development within a short period. The phases that make up the SDLC RAD model are Business
Modeling, Data modeling, Process Modeling, Application Generation and the last phase Testing
and Turnover.
Under the Business Modeling, product design is done. With Data Modeling, there is a
refinement of information gathered from the Business Model. In Process Modeling, information
flow for the business function is achieved after transforming data object from the Data Modeling
phase. At the Application Generation phase, there is conversion of data models and process to
Page 2 of 5
Mastering Network Protocols and ITSM_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Fundamentals: Network Protocols and SDLC
|7
|1323
|303

Assignment On Network Protocols And Sdlc
|5
|965
|22

Network Protocols and SDLC
|6
|1613
|71

IT Fundamentals Report 2022
|7
|1435
|22

IT Project Management Question Answer 2022
|7
|1042
|20

IT Fundamentals Question Answer 2022
|8
|1902
|17