ITC544 IT Fundamentals Assessment 4: Network Protocols, SDLC & ITSM

Verified

Added on  2025/05/03

|22
|2643
|365
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
ITC544 - IT FUNDAMENTALS - ASSESSMENT 4 -
ASSIGNMENT 2: NETWORK PROTOCOLS, SDLC
& ITSM
STUDENT ID-
STUDENT NAME-
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction......................................................................................................................................4
Q1....................................................................................................................................................5
Q2....................................................................................................................................................7
Q3..................................................................................................................................................10
Q4..................................................................................................................................................13
Q5..................................................................................................................................................15
Q6..................................................................................................................................................17
Q7..................................................................................................................................................19
Conclusion.....................................................................................................................................21
Document Page
List of Figures
Figure 1: IP Instruction Model........................................................................................................8
Figure 2: TCP Protocols Models.....................................................................................................9
Figure 3: Method of Agile.............................................................................................................12
Figure 4: Compression between the method of agile and software evolutionary process.............15
Figure 5: Business model...............................................................................................................17
Figure 6: Failure reasons for project..............................................................................................19
Figure 7: Company goal behalf of budget function.......................................................................21
Document Page
Introduction
IP system is the application to determine the network working. TCP is the internet application for
the transmissions the information from one network path function to second one subject of the
internet application. Agile is the method for manufacturing the network of the computer for user
demand. Development of the software is the key to introduce the software application for user
application. If the association not generated the required product on that time product threat is
failing.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Q1
(1.1) For IPV4
File range is equal to = 1024 Byte
Payload range is equal to =128 Byte
Range of 20 bytes assist the TCP function in a file protocol header
Range of 20 bytes in the IPV4 in a file protocol header
Combination in 40 bytes protocol analysis for IP or TCP file application header
1024 file bytes is justified for the subject of 8 file segment
Analyses for 128 file byte
{40 plus the 128} and multiply by the 8
Result outcome is 1344 file byte
Overhead function in the IP protocol and TCP protocol is located through the 1344 file byte
The complete calculation for the overhead application
Range of structure file us equal to the 1024 file byte
Range of the sent data application is equal to the 1344 file byte
1344 is multiplies through the 100 and it should be divided with the subject of 1024
Result outcome is equal to 131.25%
Function protocol for the overhead application is equal to the 131.25 minuses to the 100
Result outcome is the function of = 31.25
Document Page
(1.2) For IPV6
File range justifies the 1024 Bytes
Payload range justifies the 28 byte
60 is multiplied through(20 is plus with 40) in the TCP protocol file composed header
Divided the 1024 byte use of the 8 file segments
For every file 128 range byte
{60 is plus with the 128} and multiplies to the 8
Result outcome justifies the 1504 file byte
1504 analysis of the IP protocol and TCP protocol file overhead
For the resulting outcome
File range justifies the 1024 byte
Send file data is equal to 1504 range byte
1504 is multiplied with the 100 and then divided through the 1024 file range
Result outcome justifies the 146.87%
The function of the overhead application protocol is analysis through the 146.87 minus with the
100
Result outcome is 46.87
Document Page
Q2
Connectionless IP Subject protocol: The subject of the connection is the term in which justifies
the IP parameter for communication standard in the system of the network. The connectionless
IP subject is the term in which the transmitting range of the information data should be transfer
to one internet network function to another network function. In this term, all the communication
network is introduced through the one connection of the network application. The user
information protocol is transmitting through the one point function and manage the order for
networking application. This infrastructure is defining the user information through the capture
of internet design. The complete information protocol is transferred through the small range of
the user information data packets from one design structure to the different design structure.
The main application of the Connectionless IP Subject protocol:
(1) Information of Network: For this subject capture the user information through the web
record, user email, internet information browser and application of the internet design. The gain
information is subdivided to the range of information data packets for analysis of the data
structure.
(2) Address of network: This object is providing the proper information of the data packets of
the user demand. The complete design structure of the data packets is transmitted to the gateway
of the network. This type of complete received information protocol is gain through the internet
network gateway application.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 1: IP Instruction Model
TCP application protocol for the connection of oriented function: This object analysis the
user data information for the interchange purpose. In this design structure network of computer is
connected to the IP function to gain the user complete information. The path function of this
subject is capturing the network of computer information for delivery purpose. The basic aim of
the structure is to provide the complete transmission protocol for the user data file.
Communication panel should be increased when the information is moved from one network
design to structure of other network protocol.
Application of Stack Protocol: In this term capture the complete information of the user data
information packets from the IP network application. This design justifies the information
protocol to the small part of the user data information function. The basic concept or basic design
of this structure is to create a communication design network to gain complete information. In
this design protocol, all the user data information is move according to the network system
application. During this mechanism of manufacturing a communication network infrastructure
design to move the information to second place.
Document Page
Figure 2: TCP Protocols Models
Document Page
Q3
Method of Agile: Method of agile is the term to determine the protocol of the project.
Improvement of the market value is part of the method of agile. For the user, requirement
justifies the demand for the business structure requirement. Progress of development is the
subject for introducing the demand for project and operation flexibility for the business process.
Justification of product is the design structure for increasing the market demand. The protocol of
the network change is the requirement of the user product on behalf of market value. When the
market structure determines the method of agile on that time capacity range of the user product is
very high. Complete outcome application result is located the user application regarding the
product.
Method of agile determines the interface design application with the use of technology.
Development of the product software design structure is an analysis of the product range for user
demand. In this application method rate of the construction is very low and very simple to
understand the implemented rate.
Working criteria for the method of agile:
(1) Working efficiency should be increased through the requirement of user demand.
(2) Method of agile determines the communication level for his user or client service. The
function of this system is locating the protocol of the communication range for the project.
(3) The capacity of working in the method of agile is very high and simple to use for the user
side.
(4) Design infrastructure of the method of agile is very high quality and analysis the complete
record for the user function.
(5) Technical assessment reduces the working criteria for the interface design.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The main advantage of the method of agile
The satisfaction rate of the user is very high and follows the rapid protocol.
Data delivery is managing behalf of a user application.
Communication framework is very simple and design of construction is simple for the
read.
Design construction is very high quality and determines the complete information of the
requirement of the project.
Justify the technical application parameter for the user communication design.
The disadvantage of the method of agile:
The product life cycle is very low.
Information protocol not provides the design instructor.
Customer representation is very low and the outcome result is low.
Resources of the information protocol are not clear.
Program of high level justifies the decision making an application for the product
development life cycle.
Document Page
Figure 3: Method of Agile
chevron_up_icon
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]