Compare and contrast the differences between unix

Assignment Help Basic Computer Science
Reference no: EM13833276

1. A few of the main topics discussed in Module 1 are: 

  • ICMP
  • IP Fragmentation
  • Traceroute

Share any (additional) information not discussed in CSEC640 Module 1 regarding the above topics. For example, the followings topics are not discussed in Module1 but can be used to supplement the concepts and ideas presented in the module.      

  1. Compare and contrast the differences between Unix (or Linux) and Window Traceroute.  All the codes for each ICMP error message are not fully listed and explained.  
  2. Identify a few scenarios in which ICMP error messages are generated?
  3. What available tools employ ICMP or Traceroute? What are the advantages/disadvantages of such tools? 
  4. Module 1 demonstrates how an IP datagram is fragmented. However, the module does not show an IP reassembly process.
  5. And many more other topics...... (you are encouraged to come up with your own).  

2. TCP is a reliable transport protocol. Research the TCP protocol and choose one TCP topic and write a tutorial, detailed instructions on the use of an IP related topic .  If the topic you have chosen has already been discussed in CSEC640 Module1, enhance or elaborate on it. Please do not discuss any security issues this week.  TCP security will be discussed later.  ***Here is a list of topics:

  • TCP error control mechanism (e.g., delayed packets, duplicate packets, retransmission, etc.).
  • TCP Flow control mechanism.
  • TCP congestion control mechanism.
  • TCP state transition diagram.
  • Many more.

Reference no: EM13833276

Questions Cloud

Example of a metaphor in my forbidden face : example of a metaphor in My Forbidden Face
A number of random positive and negative charges : Write a Vpython program that traces the path of an electron through a number of random positive and negative charges.
Great recession the administration has largely policies : classical economists believe that. keynesian economists believe that. in dealing with the "great recession", the obama administration has largely followed the policies of ____________
What is the molarity of naoh in a solution : What is the molarity of NaoH in A solution
Compare and contrast the differences between unix : Compare and contrast the differences between Unix (or Linux) and Window Traceroute.  All the codes for each ICMP error message are not fully listed and explained.  Identify a few scenarios in which ICMP error messages are generated?What available too..
Executive compensation schemes and employee benefits : Analyse the annual reports of your chosen companies in light of the standard requirements -  Compare and contrast the two annual reports, identify the differences in disclosures of executive compensation schemes and employee benefits.
How has change in capital-labor ration affected efficiency : The country Panjim has been growing at the rate of 8 percent annually following a series of economic growth reforms. Adelphia, a neighboring country, is also growing rapidly,  How has the change in capital-labor ration affected efficiency? What propo..
Calculate the gauge pressure of the gas in a container : Calculate the gauge pressure of the gas in a container
Explain the three different types of elasticity of demand : Explain the 3 different types of elasticity of demand. Use supply and demand analysis to illustrate the effects of a specific or per unit tax on consumers and producers of petrol.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Techniques in discovering requirements for a system

What are some of the techniques in discovering requirements for a system? Which ones work best? Which ones are the most economical?

  Review the code of ethics of the institute of electrical

Review the code of ethics of the Institute of Electrical and Electronics Engineer (IEEE) and National Society of Professional Engineers (NSPE).

  It will be more difficult for them to create exploits

Security through obscurity...this expression suggests that proprietary software is more secure because it is closed. If hackers cannot see the code, then it will be more difficult for them to create exploits...or so the thinking goes.

  Example of weighted directed grap with weight function

Provide an example of weighted directed graph G = (V, E) with weight function ω:E→R and source vertex s such that G satisfies following property.

  Types of legal ownership

Types of Legal Ownership

  Write a program to print a business travel expenses

Write a program to print a business travel expenses attachment for an income tax return. The program should request as input the name of the organization visited, the dates and location of the visit, and the expenses for meals and entertainment, a..

  Develop the logic for a program

The exact number of household records has not yet been determined, but you know that Marengo has fewer than 300 households. Develop the logic for a program that allows a user to enter each household size and dtermine the mean and median household ..

  Finding whether two machines are equivalent

Consider the problem of finding whether two of these machines are equivalent. Formulate this problem as the language, and illustrate that it is undecidable.

  Write a class encapsulating a course

I must include a constructor, the accessors and mutators, and methods toString and equals. As part of this assignment, I have to write a client class to test all the methods

  Enable the organization to extend database functionality

What are three considerations that would enable the organization to extend database functionality and reliability, and enhance data transaction performance.  Support your answer with technical considerations that could be implemented to leverage data..

  Explaining software maintenance service to customers

Service Consultants, a software service company, provides software maintenance service to customers of a software vendor. Which side do you think should have won? why?

  Find out winner in card game

When there is tie, nobody loses. If first two cards total 8 or 9, hand is called a "natural" and it wins automatically, unless both hands have equal value "naturals", in which case it's a tie.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd