Compare and contrast the differences between unix

Assignment Help Basic Computer Science
Reference no: EM13833276

1. A few of the main topics discussed in Module 1 are: 

  • ICMP
  • IP Fragmentation
  • Traceroute

Share any (additional) information not discussed in CSEC640 Module 1 regarding the above topics. For example, the followings topics are not discussed in Module1 but can be used to supplement the concepts and ideas presented in the module.      

  1. Compare and contrast the differences between Unix (or Linux) and Window Traceroute.  All the codes for each ICMP error message are not fully listed and explained.  
  2. Identify a few scenarios in which ICMP error messages are generated?
  3. What available tools employ ICMP or Traceroute? What are the advantages/disadvantages of such tools? 
  4. Module 1 demonstrates how an IP datagram is fragmented. However, the module does not show an IP reassembly process.
  5. And many more other topics...... (you are encouraged to come up with your own).  

2. TCP is a reliable transport protocol. Research the TCP protocol and choose one TCP topic and write a tutorial, detailed instructions on the use of an IP related topic .  If the topic you have chosen has already been discussed in CSEC640 Module1, enhance or elaborate on it. Please do not discuss any security issues this week.  TCP security will be discussed later.  ***Here is a list of topics:

  • TCP error control mechanism (e.g., delayed packets, duplicate packets, retransmission, etc.).
  • TCP Flow control mechanism.
  • TCP congestion control mechanism.
  • TCP state transition diagram.
  • Many more.

Reference no: EM13833276

Questions Cloud

Example of a metaphor in my forbidden face : example of a metaphor in My Forbidden Face
A number of random positive and negative charges : Write a Vpython program that traces the path of an electron through a number of random positive and negative charges.
Great recession the administration has largely policies : classical economists believe that. keynesian economists believe that. in dealing with the "great recession", the obama administration has largely followed the policies of ____________
What is the molarity of naoh in a solution : What is the molarity of NaoH in A solution
Compare and contrast the differences between unix : Compare and contrast the differences between Unix (or Linux) and Window Traceroute.  All the codes for each ICMP error message are not fully listed and explained.  Identify a few scenarios in which ICMP error messages are generated?What available too..
Executive compensation schemes and employee benefits : Analyse the annual reports of your chosen companies in light of the standard requirements -  Compare and contrast the two annual reports, identify the differences in disclosures of executive compensation schemes and employee benefits.
How has change in capital-labor ration affected efficiency : The country Panjim has been growing at the rate of 8 percent annually following a series of economic growth reforms. Adelphia, a neighboring country, is also growing rapidly,  How has the change in capital-labor ration affected efficiency? What propo..
Calculate the gauge pressure of the gas in a container : Calculate the gauge pressure of the gas in a container
Explain the three different types of elasticity of demand : Explain the 3 different types of elasticity of demand. Use supply and demand analysis to illustrate the effects of a specific or per unit tax on consumers and producers of petrol.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How many orders invoices were shipped

How many orders (invoices) were shipped by Speedy Express?

  Features of microsoft word

Summarize your findings of the event/issue in the article in a memo of 350-700 words

  The proliferation of mobility and mobile applications

Instructions: The proliferation of mobility and mobile applications in enterprise networks has increased the importance of mobile VPNs to provide secure communication channels to support mobile users in a wide variety of organizations

  Explain type of impact of bi software on businesses

Visit website of the vendor of your choice and research their BI (Business Intelligence) capabilities. Report to the class on your findings. What type of impact do you think the BI software you researched will have on businesses that make use of it..

  Business requirements drove the system''s initial development

Discuss how the business requirements drove the system's initial development.

  Explain radio frequency identification technology

Write discussion of radio frequency identification (RFID) technology and Information Technology Infrastructure Library (ITIL) standards.

  What is the difference between a hacker and a cracker

Should employees have the right to the expectation of privacy while using an employer's computer workstation? Why or why not? How far should an employer be able to take their investigation of off-work but online habits of employees? Should off..

  Powerpoint presentation—training program design

PowerPoint Presentation-Training Program Design

  Numerous types of wireless attacks

There are numerous types of wireless attacks that are covered in the text. Below is a list of the main attacks that are discussed. Let's discuss each attack by choosing two to discuss. When choosing which type to discuss, make sure it has not been ch..

  Object oriented programming paradigm

Discuss and explain why the object oriented programming paradigm is considered a better choice than the structured programming paradigm.

  Develop a raptor flowchart to compute the solution

Develop a Raptor flowchart to compute the solution of the equation

  How would reply to cheryls question

Do no paraphrase the two questions or sections of the case study (I already know them), rather approach assignment as an essay.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd