logo

IT Project Management Question Answer 2022

   

Added on  2022-10-04

7 Pages1042 Words20 Views
Running Head: IT Project Management 0
IT
Project
manage
ment
Report
Student name

IT Project management 1
Q - 1
The computer network has required authentication for security of the
network and another credential. Authentication protocol has provided full
security to both sides of the nodes (Tanenbaum, 2014). There are some
important factors of authentication on the access to data and information in
a network. In addition, two-way handshake and three-way handshake
technique of authentication are providing security to the network. There is
some basic need for authentication and security of the network. Two-way
authentication has used to create a connection between two nodes in which
a node send SYN message to connect with the other node.
The next node sends acknowledgement of the session and connection
is ready for transmission of data. In addition, there is some basic information
about the data is sending with the header nodes. There are some issues with
the two-way handshake method, which is not sending acknowledgment for
the proper connection of the node and its live status.

IT Project management 2
Moreover, the three-way handshake protocol has provided three
segments for creating a connection between server and client. In addition,
there is three-segment, which are SYN, SYN=ACK, and ACK.
All these segments have used for showing a proper connection and
guarantee of that connection. A client sends a request for the connection
from the server using SYN menace. The server sends an ACK to confirm the
connection and server have required the ACK from the client for confirmation
of the client.
There are many benefits of the 3-way handshake protocol in favor of
security of the network. In addition, there are some basic concepts of
security, which includes authentication of the users as well. It is the best way
for more security from hackers. However, it has created high level of traffic
in the network form ACK segments, which is not necessary.
Q- 2
Rapid Application Development (RAD) is a new approach to software
development in which development process has stabled from various
objectives to complete the project in the given time (Peltola, Melchels,

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Protocols and SDLC
|6
|1613
|71

IT Fundamentals Report 2022
|7
|1435
|22

IT Fundamentals: Network Protocols and SDLC
|7
|1323
|303

Project Management Answer 2022
|7
|1190
|13

Mastering Network Protocols and ITSM
|5
|1251
|1

Assignment On Network Protocols And Sdlc
|5
|965
|22