Documente Academic
Documente Profesional
Documente Cultură
1
Contents of Course file
1. Academic Calendr
2
Academic Calendar for the Year 2019-20
Odd Semester
Date Working
S.No. Event Remarks/Displayed on
From To days
1 Start of semester 15th July 2019
2 First fortnight 15-Jul-19 26-Jul-19 10 26-Jul-19
14-Aug-
Second Fortnight 12
3 29-Jul-19 19 14-Aug-19
13-Aug-
Assignments 24-Jul-19
4 19 Unit I
16-Aug- 19-Aug-
1st Hourly Test 3
5 19 19
20-Aug- 30-Aug-
Third Fortnight 9
6 19 19 30-Aug-19
13-Sep-
Forth Fortnight 9
7 3-Sep-19 19 13-Sep-19
16-Sep-
Fifth Fortnight 12
8 19 3-Oct-19 3-Oct-19
9 Fresher Party 2018 20-Sep-19
27-Aug- 23-Sep-
Assignments
10 19 19 Unit II
12 2nd Hourly Test 4-Oct-19 7-Oct-19 3
24-Oct-
Sixth Fortnight 13
13 8-Oct-19 19 24-Oct-19
14 Entrecellance -18 18-Oct-19
29-Oct-
Diwali holidays 5
16 25-Oct-19 19
11-Nov-
Assignments 22-Oct-19
17 19 Unit III
13-Nov-
Seventh Fortnight 11
18 30-Oct-19 19 13-Nov-19
2. Syllabus
4
Total Contact Hours : 45Hours
Subject 3 0 0 3
Common to all Specializations of
Code CSO- CSE 4th Year
446 Prerequisite: Knowledge of various types of operating systems
Marks-100
Internal-60 External-40
Course Objectives
This course is intended for students to experience on the technologies included in Network
Operating System.
Gain in-depth knowledge of Windows Server 2008.
Unit Course Outcome
UNIT-I [15h]
Data Communications Concepts: Digital and Analog signals, Parallel and Serial signals Synchronous
and Asynchronous, Simplex/Half/Pull Duplex and Multiplexing.
Introduction of Computer Networks: Description of LAN, WAN, MAN, PAN and Wireless networks.
Basic terminology of Computer Networks: - Physical and Logical networks, Bridge, Switch, Hub,
Gateway, Routers, Repeaters, Modem, Network Interface Card, Physical Address/MAC Address and
Logical Address and IP Addressing and Subnet Mask.
Communication Channels: Telephone lines, Coaxial Cables, and Optical Fiber Transmission
Network Topologies: Bus Topology, Ring Topology, Star Topology, Hybrid Topology and Mesh
Topology
Reference Model:OSI Reference Model,TCP/IP reference model, Core protocols of TCP/IP,IP routing,IP
routers,Routing Tables.
UNIT-II [15h]
5
Introduction to DHCP:Introduction to DHCP,DHCP Architecture, Benefits to DHCP,DHCP Terminologies
and DHCP Server Responsibility.
UNIT-III [15h]
Text Books:
Reference Books:
1. MCTS Self Paced Training Kit (Exam 70 - 640): Configuring Windows Server 2008 Active Directory,
by Holme Dan.
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
6
The syllabus has been divided into three equal units. The paper setter is required to set ten questions in all,
three questions from each unit and a compulsory question consisting of five sub parts and based on the whole
syllabus. The candidate will be required to attempt six questions including the compulsory question number
no 1 and not more than two questions from each unit.
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
7
5. Scheme of Evaluation and attendance rules
8
IN EX
L T P
T T Total
1 Network Operating
CSO-446 3 0 0 40 60 100 3
Systems
Attendance Rules
The visible effects of taking attendance in Ist five minutes is being seen and it should be maintained by
HODs/Coordinators/Teachers.
HODs and Coordinators should ensure that the fortnight attendance record will be monitored thoroughly and
the soft copy of attendance to be maintained for exact information and for corrective measures in the future.
9
The following measure should be done for the defaulter students:
• 1 times HODs and Coordinator to take own decision
• 2 times Pro Vice-Chancellor will be notified
• 3 times Student parents to be informed
• 4 time Parents will be called to the university
HODs and Coordinators to ensure that no situation should escalate to such level
• As per rule, if any student missing classes for 10 days or 07 working days continuously then his or
her name will be struck out from the roles of University.
• Consecutive missing of 02 classes in any subject and for third absence the student’s parents will be
informed.
• In a week, if a student is misses 03 classes is any subject/paper then the parents will be informed.
Rationalization of internal evaluations (By equating avg.)
• The average marks should be between 64-66% for first, second half yearly and mid term.
• After marks will be displayed for the students.
• all evaluations to be shown to the students and the queries will be handled and resolved.
Consequences of E,F and I
• Students with ‘E’ or ‘F’ grade can appear in the concerned papers when offered in the relevant
semester by paying the examination fee.
• If the candidates with ‘E’ or ‘F’ grade want to improve internal marks, they shall have to repeat the
paper and attend classes by paying requisite fee.
• Students having ‘I’ grade have to repeat the paper by attending classes after paying requisite fee in the
summer semester.
• In rare cases if there are four or more students interested in attending a paper ( having I/E/F grades),
classes may be arranged in summer term.
• Student getting ‘E’ grade, if he/she has appeared in all internals, can request for grading by
considering zero marks for end semester exam fees.
Promotion to the next year
Undergraduate (UG) courses
• For promotion from 1st to 2nd year the student must have CGPA of 3.50 or more
• For promotion from 2nd to 3rd year the student must have CGPA of 4.00 or more at the end of second
year.
• First year students will be given a chance to improve their ‘E’ /‘F’ grades of first semester along with
second
• semester exams by paying only exam fee. Similarly students will be given a chance to improve their
‘E’/’F’ grades of second semester in summer semester by paying only exam fees
• If a student wishes to improve one’s internal marks, then he/she will have to repeat that subject by
paying subject wise fee and attending classes
• For award of degree student must have ‘D’ or higher grade in all the papers along with minimum
CGPA of 4.5
Post Graduate (PG) Courses
• Promotion from 1st to 2nd year is granted If the student has at least 4.00 CGPA
• First year students will be given a chance to improve their ‘E’ /’F’ grades of first semester along with
second semester exams by paying only exam fee. Similarly students will be given a chance to
improve their ‘E’/’F’ grades of second semester in summer semester by paying only exam fees
10
• If a student wishes to improve one’s internal marks, then he/she will have to repeat that subject by
paying subject wise fee and attending classes.
• For award of PG degree student should have ‘D’ or higher grade in all papers along with CGPA of
5.00 or more.
11
6. Lecture planning and implementation sheet
12
Lecture Multiplexing T-1:8.1 https://msd Role of To PPT
5 and 1:8.2 n.microsoft multiplex understand Video
.com/en- ing the concept
us/library/ of
bb742424. multiplexin
aspx g
Lecture Description of T- https://msd Understa To be able PPT
6 LAN, WAN, 1:8.4 n.microsoft nd types to use Video
MAN, PAN .com/en- of LAN,
us/library/ networks WAN
bb742424.
aspx
Lecture Wireless T- https://msd Use of To know PPT
7 networks 1:8.. n.microsoft wireless wireless Video
5 .com/en- networks networks
us/library/
bb742424.
aspx
Lecture Physical and T- https://msd Computer Learn about PPT
8 Logical 1:8.7 n.microsoft network Computer Video
networks .com/en- terminolog network
us/library/ ies terminologi
bb742424. es
aspx
Week 3 Lecture Bridge, Switch, T- https://msd PPT
Computer Learn about
9 Hub, Gateway, 1:10. n.microsoft network Computer Video
Routers, 2 .com/en- terminolog network
Repeaters, us/library/ ies terminologi
Modem bb742424. es
aspxv
Network T- https://msd Computer Learn about PPT
Interface Card, 1:10. n.microsoft network Computer Video
Physical 3 .com/en- terminolog network
Address/MAC us/library/ ies terminologi
Address and bb742424. es
Logical aspx
Address
Week 4 Lecture IP Addressing T- https://msd IP To get to PPT
10 and Subnet 1:10. n.microsoft Addres divide Video
Mask 4 .com/en- sing network
us/library/ into
bb742424. subnets
aspx
13
Communicatio T- https://msd use of To know PPT
n Channels: 1:10. n.microsoft Telep the types of Video
Telephone lines 5 .com/en- hone cables
us/library/ lines
bb742424.
aspx
Week 6 MST 1
Week 6 Lecture Introduction to T- https://msd Introduct Learn DNS PPT
16 DNS:DNS 4:21. n.microsoft ion to Architectur Video
Architecture 4 .com/en- DNS e
us/library/
bb742424.
aspx
14
Lecture Understanding T- https://msd Understa To be able PPT
17 the DNS 1:11. n.microsoft nd the to Video
Domain 1 .com/en- DNS understand
us/library/ hierarchy
Namespace,
bb742424.
DNS domain aspx
name hierarchy
15
Lecture Introduction to T- https://msd Introductio To learn
24 operating 1:12. n.microsoft n to Types of Video
System: 4 .com/en- operating operating
us/library/ System
Introduction to System
bb742424.
operating aspx
system, Types
of operating
System:
Mainframe,
Desktop
16
Lecture Protection T3: https://msd Role of To be able PPT
29 System, and 6.3 n.microsoft I/O to learn Video
Networking .com/en- Manage I/O
us/library/ ment Manageme
management
bb742424. compone nt
component aspx nt component
Lecture Process States Detail of Detail of Lecture
30 process process Method
manage managem
ment ent
Week
10
Lecture Process Detail of Detail of Lecture
31 Control Block process process Method
(PCB) manage managem
ment ent
Lecture CPU Detail of Detail of Lecture
32 Scheduling process process Method
Week manage managem
types
11 ment ent
17
Lecture Hardware T 3: https://msd Server To be able PPT
38 Requirement 1.1 n.microsoft side to use Video
for .com/en- program programmi
us/library/ ming in ng on
OS(Desktop,
bb742424. java server side
Server and aspx using
client ) sevlet
Lecture Workgroups T 3: https://msd Server To be able PPT
39 and Domains. 1.1 n.microsoft side to use Video
.com/en- program programmi
us/library/ ming in ng on
bb742424. java server side
aspx using
sevlet
Lecture Workgroups T 3: https://msd Server To be able PPT
40 and Domains. 1.1 n.microsoft side to use Video
.com/en- program programmi
Week us/library/ ming in ng on
14 bb742424. java server side
aspx using
sevlet
7. Schedule of Assignment
Assignment No. Date of Allotment Last date of Content of Assignment
Submission (Assignment to be allotted group-wise)
18
01 25th july 2019 13th Aug 2019 G1:A1 Set-1 Easy
Covering Unit-1
G2: A1 Set-2 Easy
G3: A1 Set-3 Easy
G4: A1 Set-4 Easy
G5: A1 Set-5 Medium
G6: A1 Set-6 Medium
G7: A1 Set-7 Medium
G8: A1 Set-8 Medium
G9: A1 Set-9 Difficult
G10: A1 Set-10 Difficult
G11: A1 Set-11 Difficult
G12: A1 Set-12 Difficult
19
G6: A3 Set-6 Medium
G7: A3 Set-7 Medium
G8: A3 Set-8 Medium
G9: A3 Set-9 Difficult
G10: A3 Set-10 Difficult
G11: A3 Set-11 Difficult
G12: A3 Set-12 Difficult
1. Depending upon the contents of the assignments date of the resubmission is be decided.
20
AT Objective Topic of the Nature Evalu Allotm Date of
No. Academic Task of ation ent / uploading
Acade Mode submission of Model
mic Week Answer
Task Sheet on
(group UIMS/
/indivi Notice
duals/ Board
field with
work marking
scheme
ST-1 To check the All subtopics Individua Step 16/8/19 19/8/19 to
analytical and included in l Markin to 24/8/19
conceptual Instruction Plan from g 19/8/19
ability of Lecture-1 to
students related Lecture-12
to
fundamentals
of Networks
Annexure 1
Date of
Serial
Week What %age can do
Topic of Tutorial Tutorial number of
more than 50% in
No. the Sheet Questions
Sheet questions in Tutorial
tutorial number given to the
distribution class
student
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
1. Tutorial sheet is related to the topics covered in lectures during the week as per scheme of study
22
2. This sheet is to be given to the students at least one week in advance from the scheduled date of
tutorial
3. Each tutorial sheet must contain at least 10 problems for 1 period tutorial. In case of tutorial periods
more than per week the number of problems should be increased in proportion to the tutorial
periods.
4. In case the number of sections are more than 1 for the same subject a common tutorial sheet can be
prepared for a maximum 4 sections.
1. Students are at liberty to prepare all questions at home, but teacher will at random give three
questions during tutorial period from the tutorial sheet
Annexure II
Quiz
23
Unit Quiz Topics Planned No of Date of What %age of
number Date Question Quiz students have more
number
than 60% right
answers
1 1 14-15
Nov
2
1. Two quiz evaluations are to be conducted in a unit i.e. six evaluations per semester.
1. A quiz may in variably contain 50 objective type questions relating to the fundamentals of the subject.
1. These quiz papers are to be scheduled and notified to the students well in advance.
Annexure IV
Surprise Test
24
Unit Date of Number of Average
Max Marks Remarks
Surprise Test questions Marks
1 08/2019 3 9
1. It is suggested that three surprise test may be conducted during the semester.
2. Date and contents of surprise tests will be decided by the concerned teacher. In no case the dates and
contents of the test are announced before the hand but contents must be what have been taught in the
class.
3. After the test attached Performa of the course file should be duly filled up and question paper must
become the part of course file.
UNIT-1
UNIT-II
UNIT-III
1. Why operating system is called resource manager? Highlight process
management and memory management in detail.
Lecture Notes
UNIT 1
25
A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a
computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on
the network.
Computer network is a system which allows communication among the computers connected in the network.
A computer network is a set of connected computers. Computers on a network are called nodes. The
connection between computers can be done via cabling, most commonly the Ethernet cable, or wirelessly
through radio waves. Connected computers can share resources, like access to the Internet, printers, file
servers, and others. A network is a multipurpose connection, which allows a single computer to do more.
A computer network is a set of computers connected together for the purpose of sharing resources. The most
common resource shared today is connection to the Internet. Other shared resources can include a printer or a
file server. The Internet itself can be considered a computer network.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these are performance,
reliability, and security.
Performance
Performance can be measured in many ways, including transit time and response time. Transit time is the
amount of time required for a message to travel from one device to another. Response time is the elapsed
time between an inquiry and a response. The performance of a network depends on a number of factors,
including the number of users, the type of transmission medium, the capabilities of the connected hardware,
and the efficiency of the software.
Performance is often evaluated by two networking metrics: throughput and delay. We often need more
throughputs and less delay. However, these two criteria are often contradictory. If we try to send more data to
the network, we may increase throughput but we increase the delay because of traffic congestion in the
network.
Reliability
In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the time it
takes a link to recover from a failure, and the network's robustness in a catastrophe.
Security:
Network security issues include protecting data from unauthorized access, protecting data from damage and
development, and implementing policies and procedures for recovery from breaches and data losses.
26
Simplex
In simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two devices
on a link can transmit; the other can only receive. Keyboards and traditional monitors are examples of
simplex devices. The key- board can only introduce input; the monitor can only accept output. The simplex
mode can use the entire capacity of the channel to send data in one direction.
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the same time. : When one device
is sending, the other can only receive, and vice versa.
The half-duplex mode is like a one-lane road with traffic allowed in both directions. When cars are traveling
in one direction, cars going the other way must wait. In a half-duplex transmission, the entire capacity of a
channel is taken over by whichever of the two devices is transmitting at the time. Walkie-talkies and CB
(citizens band) radios are both half-duplex systems.
The half-duplex mode is used in cases where there is no need for communication in both directions at the
same time; the entire capacity of the channel can be utilized for each direction.
Full-Duplex
In full-duplex mode (also called duplex), both stations can transmit and receive simultaneously.
The full-duplex mode is like a two-way street with traffic flowing in both directions at the same time. In
full-duplex mode, signals going in one direction share the capacity of the link: with signals going in the other
direction. This sharing can occur in two ways: Either the link must contain two physically separate
transmission paths, one for sending and the other for receiving; or the capacity of the channel is divided
between signals traveling in both directions.
One common example of full-duplex communication is the telephone network. When two people are
communicating by a telephone line, both can talk and listen at the same time.
The full-duplex mode is used when communication in both directions is required all the time. The capacity of
the channel, however, must be divided between the two directions.
27
Data transmission
Data transmission refers to the movement of data in form of bits between two or more digital devices. This
transfer of data takes place via some form of transmission media (for example, coaxial cable, fiber optics
etc.)
Data is transferred in the form of bits between two or more digital devices. There are two methods used to
transmit data between digital devices: serial transmission and parallel transmission. Serial data transmission
sends data bits one after another over a single channel. Parallel data transmission sends multiple data bits at
the same time over multiple channels.
Types of Transmission:
Parallel Transmission
In parallel transmission, all the bits of data are transmitted simultaneously on separate communication lines.
In order to transmit n bits, n wires or lines are used. Thus each bit has its own line.
Binary data, consisting of Is and Os, may be organized into groups of n bits each. Computers produce and
consume data in groups of bits much as we conceive ofand use spoken language in the form of words rather
than letters. By grouping, we can send data n bits at a time instead of 1. This is called parallel transmission.
The mechanism for parallel transmission is a conceptually simple one: Use n wires to send n bits at one time.
That way each bit has its own wire, and all n bits of one group can be transmitted with each clock tick from
one device to another. Figure 4.32 shows how parallel transmission works for n =8. Typically, the eight wires
are bundled in a cable with a connector at each end. Parallel transmission is used for short distance
communication.
28
Advantage of parallel transmission
It is speedy way of transmitting data as multiple bits are transmitted simultaneously with a single clock pulse.
29
2. This method is slower as compared to parallel transmission as bits are transmitted serially one after the
other.
Asynchronous Transmission
Asynchronous transmission sends only one character at a time where a character is either a letter of the
alphabet or number or control character i.e. it sends one byte of data at a time. Bit synchronization between
two devices is made possible using start bit and stop bit. Start bit indicates the beginning of data i.e. alerts the
receiver to the arrival of new group of bits. A start bit usually 0 is added to the beginning of each byte. Stop
bit indicates the end of data i.e. to let the receiver know that byte is finished, one or more additional bits are
appended to the end of the byte. These bits, usually 1s are called stop bits.
Addition of start and stop increase the number of data bits. Hence more bandwidth is consumed in
asynchronous transmission. There is idle time between the transmissions of different data bytes. This idle
time is also known as Gap. The gap or idle time can be of varying intervals. This mechanism is called
Asynchronous, because at byte level sender and receiver need not to be synchronized. But within each byte,
receiver must be synchronized with the incoming bit stream.
Merits of Asynchronous
Synchronous Transmission
Synchronous transmission does not use start and stop bits. In this method bit stream is combined into longer
frames that may contain multiple bytes. There is no gap between the various bytes in the data stream. In the
absence of start & stop bits, bit synchronization is established between sender & receiver by 'timing' the
transmission of each bit. Since the various bytes are placed on the link without any gap, it is the
responsibility of receiver to separate the bit stream into bytes so as to reconstruct the original information. In
order to receive the data error free, the receiver and sender operates at the same clock frequency.
The byte synchronization is accomplished in the data link layer, when synchronous transmission is used
between computers.
Merits of Synchronous
Demerits of Synchronous
31
Parameters Synchronous Asynchronous
Transmission Transmission
32
We use the concept of layers in our daily life. As an example, let us consider two friends who communicate
through postal mail. The process of sending a letter to a friend would be complex if there were no services
available from the post office. Figure shows the steps in this task.
In Figure we have a sender, a receiver, and a carrier that transports the letter. There is a hierarchy of tasks.
At Sender Site
Let us first describe, in order, the activities that take place at the sender site. o Higher layer. The sender writes
the letter, inserts the letter in an envelope, writes the sender and receiver addresses, and drops the letter in a
mailbox. o Middle layer. The letter is picked up by a letter carrier and delivered to the post office. o Lower
layer. The letter is sorted at the post office; a carrier transports the letter.
Carrier
The letter is then on its way to the recipient. On the way to the recipient's local post office, the letter may
actually go through a central office. In addition, it may be trans- ported by truck, train, airplane, boat, or a
combination of these.
At receiver site
At the Receiver Site o lower layer. The carrier transports the letter to the post office. o Middle layer. The
letter is sorted and delivered to the recipient's mailbox. o Higher layer. The receiver picks up the letter, opens
the envelope, and reads it.
According to this analysis, there are three different activities at the sender site and another three activities at
the receiver site. The task of transporting the letter between the sender and the receiver is done by the carrier.
33
Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection model. It was first introduced in the late 1970s. An
open system is a set of protocols that allows any two different systems to communicate regardless of their
underlying architecture. The purpose of the OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying hard- ware and software. The OSI
model is not a protocol; it is a model for understanding and designing a network architecture that is flexible,
robust, and interoperable.
The OSI model is a layered framework for the design of network systems that allows communication
between all types of computer systems. It consists of seven separate but related layers, each of which defines
a part of the process of moving information across a network.
Layered Architecture
The OSI model is composed of seven ordered layers: physical (layer 1), data link (layer 2), network (layer 3),
transport (layer 4), session (layer 5), presentation (layer 6), and application (layer 7). Figure shows the layers
involved when a message is sent from device A to device B. As the message travels from A to B, it may pass
through many intermediate nodes. These intermediate nodes usually involve only the first three layers of the
OSI model.
34
Within a single machine, each layer calls upon the services of the layer just below it. Layer 3, for example,
uses the services provided by layer 2 and provides services for layer 4. Between machines, layer x on one
machine communicates with layer x on another machine. This communication is governed by an agreed-
upon series of rules and conventions called protocols. The processes on each machine that communicate at a
given layer are called peer-to-peer processes. Communication between machines is therefore a peer-to-peer
process using the protocols appropriate to a given layer.
2. In OSI model the transport layer 2. In TCP/IP model the transport layer does not
guarantees the delivery of packets. guarantees delivery of packets. Still the TCP/IP
model is more reliable.
4. OSI model has a separate Presentation 4. TCP/IP does not have a separate Presentation
layer and Session layer. layer or Session layer.
7. OSI is a reference model around which 7. TCP/IP model is, in a way implementation of the
the networks are built. Generally it is used OSI model.
as a guidance tool.
8. Network layer of OSI model provides 8. The Network layer in TCP/IP model provides
both connection oriented and connectionless service.
connectionless service.
9. OSI model has a problem of fitting the 9. TCP/IP model does not fit any protocol
protocols into the model.
35
10. Protocols are hidden in OSI model and 10. In TCP/IP replacing protocol is not easy.
are easily replaced as the technology
changes.
11. OSI model defines services, interfaces 11. In TCP/IP, services, interfaces and protocols are
and protocols very clearly and makes clear not clearly separated. It is also protocol dependent.
distinction between them. It is protocol
independent.
Assignment-1
Set-1
1. Demonstrate the responsibilities of physical and data link layer.
3. Highlight the significance of coaxial cables and fiber optics in communication channels.
4. Define computer network. Discuss various characteristics of computer network.
Set-2
Set-3
Set-4
36
2. Differentiate between UTP and STP cables.
communication.
Set-5
Set-6
Set-7
1. Highlight any three network devices in detail with its working model.
4. Which layer of the OSI model contains the LLC sub layer and the MAC sub layer?
Explain it.
Set-8
37
4. Differentiate synchronous and asynchronous transmission with example.
Set-9
2. Differentiate subnet mask and subneting with suitable example including diagram.
Set-10
2. Give the similarity and difference in between Transmission Control Protocol and User
Data-gram Protocol.
Set- 11
Set-12
38
Question paper of MST-1 along with marking scheme
MST 1
Q1.
Security :1 Mark
Reliability :1 Mark
(any two)
(b) Differentiate between synchronous and asynchronous signals with relevant example. (2)
Synchronous signal :1 Mark
Asynchronous signal :1 Mark
(c) Specify different types of computer network. (2)
LAN/MAN/WAN/PAN :0.5 for each
39
Section –B (15 Marks Question)
Q2. Diagrammatically highlight the difference between simplex, half duplex and full duplex
systems. (15)
Diagram :3 Marks
TCP : 5 Marks
UDP : 5 Marks
Comparison : 5 Marks
Lecture Notes
UNIT 2
40
DHCP and DNS
Domain Name System (DNS) servers provide name resolution for network clients. DNS maintains (among
other things) information that links a computer's fully qualified domain name (FQDN) to its assigned IP
address(es).
While DHCP provides a powerful mechanism for automatically configuring client IP addresses, until recently
DHCP did not notify the DNS service to update the DNS records on the client; specifically, updating the
client name to an IP address, and IP address to name mappings maintained by a DNS server.
Without a way for DHCP to interact with DNS, the information maintained by DNS for a DHCP client may
be incorrect. For example, a client may acquire its IP address from a DHCP server, but the DNS records
would not reflect the IP address acquired nor provide a mapping from the new IP address to the computer
name (FQDN).
In Windows 2000, DHCP servers and clients can register with DNS to provide this update service if the DNS
server supports DNS with dynamic updates. The Windows 2000 DNS service supports dynamic updates. A
Windows 2000 DHCP server can register with a DNS server and update pointer (PTR) and address (A)
resource records on behalf of its DHCP-enabled clients using the DNS dynamic update protocol.
The ability to register both A and PTR type records lets a DHCP server act as a proxy for clients using
Microsoft Windows 95 and Windows NT 4.0 for the purpose of DNS registration. DHCP servers can
differentiate between Windows 2000 and other clients. An additional DHCP option code (option code 81)
enables the return of a client's FQDN to the DHCP server. If implemented, the DHCP server can dynamically
update DNS to modify an individual computer's resource records with a DNS server using the dynamic
update protocol. This DHCP option permits the DHCP server the following possible interactions for
processing DNS information on behalf of DHCP clients that include Option Code 81 in the DHCPRequest
message they send to the server:
● The DHCP server always registers the DHCP client for both the forward (A-type records) and reverse
lookups (PTR-type records) with DNS.
● The DHCP server never registers the name-to-address (A-type records) mapping information for
DHCP clients.
● The DHCP server registers the DHCP client for both forward (A-type records) and reverse lookups
(PTR-type records) only when requested to by the client
DHCP and static DNS service are not compatible for keeping name-to-address mapping information
synchronized. This might cause problems with using DHCP and DNS together on a network if you are using
older, static DNS servers, which are incapable of interacting dynamically when DHCP client configurations
change.
To avoid failed DNS lookups for DHCP-registered clients when static DNS service is in effect, do the
following steps:
1. If WINS servers are used on the network, enable WINS lookup for DHCP clients that use NetBIOS.
2. Assign IP address reservations with an infinite lease duration for DHCP clients that use DNS only and
do not support NetBIOS.
41
Wherever possible, upgrade or replace older, static-based DNS servers with DNS servers supporting updates.
Dynamic updates are supported by the Microsoft DNS service, included in Windows 2000.
Windows Server 2008 is designed around certain roles and features. A role is a primary duty that a server
performs. For example, you typically would point at a server and say "that's my domain controller (DC) and
DNS server." A feature is something that helps a server perform its primary duty (Windows Backup, network
load balancing). Certain roles are comprised of sub-elements called Role Services, which are distinct units of
functionality. For example, within the role of Terminal Services, is the TS Gateway and TS Licensing Role
Services.
Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program
located in another computer on a network without having to understand the network's details.
A procedure call is also sometimes known as a function call or a subroutine call.
RPC uses the client-server model. The requesting program is a client and the service providing program
is the server. Like a regular or local procedure call, an RPC is a synchronous operation requiring the
requesting program to be suspended until the results of the remote procedure are returned. However, the
use of lightweight processes or threads that share the same address space allows multiple RPCs to be
performed concurrently.
RPC is designed to mitigate these issues by providing a common interface between applications. RPC
serves as a go–between for client/server communications. RPC is designed to make client/server
interaction easier and safer by factoring out common tasks, such as security, synchronization, and data
flow handling, into a common library so that developers do not have to dedicate the time and effort into
developing their own solutions.
RPC is a client/server technology in the most generic sense. There is a sender and a receiver; data is
transferred between them. This can be classic client/server (for example, Microsoft Outlook communicating
with a server running Microsoft Exchange Server) or system services within the computer communicating
with each other. The latter is especially common. Much of the Windows architecture is composed of services
42
that communicate with each other to accomplish a task. Most services built into the Windows architecture
use RPC to communicate with each other.
Assignment-2
Set-1
1. Define DHCP. Describe the various benefits of DHCP.
2. What is Remote Procedure Call? Explain its architecture.
Set-2
Set-3
1. Why Remote Procedure calls are important for a network? Justify the statement.
2. Clarify the concept of static and dynamic address allocation in DHCP.
3. Summarize the main task of DNS.
4. Discuss common terminologies associated with DHCP.
Set-4.
1. What is DHCP? Explain its benefits.
3. How does RPC works? Write down merits and demerits of RPC.
4. Diagrammatically describe the DNS architecture with example.
Set-5
1. Write short note on DNS? Describe domain name hierarchy in detail.
2. Write down the sequence of events during remote procedure call.
3. Explain the working of RPC. Also explain the architecture of RPC.
4. How many types of DNS queries are used? Explain it.
Set-6
43
Set-7
1. How can you configure the DHCP server so that it provides certain devices with the same IP address
each time the address is renewed?
2. Diagrammatically describe the DNS architecture with example.
3. How many types of queries DNS does? Explain it.
4. With the help of an example, Scrutinize DHCP Architecture.
Set-8
1. Define RPC. Describe the architecture of RPC in detail.
2. Why DHCP is important? Demonstrate the working of DHCP.
3. Describe DHCP terminology in detail.
4. Discuss the working of DHCP along with its responsibilities.
Set-9
1. What are the uses of various DNS components .
2. What are the uses of namespace to support DNS?
3. Explain the concept of Name Servers in DNS support.
4. What is the use of resolver in DNS support?
Set-10
Set-11
1. Explain DHCP Terminologies and Responsibilities.
2. Highlight the concept of DNS? Briefly scrutinize domain name hierarchy.
3. Conclude the sequence of events during remote procedure call.
4. Summarize DHCP’s purpose diagrammatically. Scrutinize the handshaking process of DHCP.
Set-12
1. .Explain the architecture of RPC.
2. Explain Domain controller.
3. Conclude the sequence of events during remote procedure call.
44
Question paper of MST-2 along with marking scheme
45
Lecture Notes
Computers running Windows on a network must be part of a workgroup or a domain. Computers running
Windows on home networks can also be part of a homegroup, but it's not required.
Computers on home networks are usually part of a workgroup and possibly a homegroup, and computers on
workplace networks are usually part of a domain.
All computers are peers; no computer has control over another computer.
Each computer has a set of user accounts. To log on to any computer in the workgroup, you must
have an account on that computer.
There are typically no more than twenty computers.
A workgroup is not protected by a password.
All computers must be on the same local network or subnet.
One or more computers are servers.
Network administrators use servers to control the security and permissions for all computers on the
domain.
This makes it easy to make changes because the changes are automatically made to all computers.
Domain users must provide a password or other credentials each time they access the domain.
If you have a user account on the domain, you can log on to any computer on the domain without needing
an account on that computer.
You probably can make only limited changes to a computer's settings because network administrators
often want to ensure consistency among computers.
There can be thousands of computers in a domain.
The computers can be on different local networks.
In a Windows network, a domain is a group of server computers that share a common user account database.
A user at a client computer can log in to a domain to access shared resources for any server in the domain.
46
Each domain must have at least one server computer designated as the domain controller, which is ultimately
in charge of the domain.
Most domain networks share this work among at least two domain controllers, so that if one of the
controllers stops working, the network can still function.
A peer-to-peer network can’t have a domain because it doesn’t have a dedicated server computer to act as a
domain controller. Instead, computers in a peer-to-peer network are grouped in workgroups, which are
simply groups of computers that can share resources with each other. Each computer in a workgroup keeps
track of its own user accounts and security settings, so no single computer is in charge of the workgroup.
To create a domain, you have to designate a server computer as the domain controller and configure user
accounts. Workgroups are much easier to administer. In fact, you don’t have to do anything to create a
workgroup except decide on the name you want to use.
Although you can have as many workgroups as you want on a peer-to-peer network, most networks have just
one workgroup. That way, any computers on the network can share resources with any other computer on the
network.
One of the most common mistakes when setting up a peer-to-peer network is misspelling the workgroup
name on one of the computers.
For example, suppose you decide that all the computers should belong to a workgroup named MYGROUP. If
you accidentally spell the workgroup name MYGRUOP for one of the computers, that computer will be
isolated in its own workgroup. If you can’t locate a computer on your network, the workgroup name is one of
the first things to check.
Assignment-3
Set-1
1. Difference between server and client.
2. Differentiate multiprogramming and multiprocessing.
3. CPU scheduling is important. Clarify it.
4. Clarify the concept of file management. Give a detailed description about the file allocation methods.
Set-2
1. Demonstrate the role of operating system acts as memory manager.
2. What is the role of operating system acts as memory manager.
3. Write down the CPU scheduling criteria to pick the best algorithm. Illustrate RR scheduling algorithm
in detail.
4. Differentiate multiprogramming, multiprocessing and multitasking.
Set-3
1. Differentiate symmetric and asymmetric multiprocessing system.
47
2. CPU scheduling is important. Clarify it.
3. Give a details description about the components of operating system.
4. Give a detailed description about different types of operating system.
Set-4
1. Differentiate soft and hard real time system.
2. Why CPU switching is important. Exemplify FCFS and SJF scheduling algorithms in detail with
example.
3. Construct the diagram of process states. Exemplify it.
4. Why CPU switching is important. Exemplify FCFS and SJF scheduling algorithms in detail with
example.
Set-5
1. Exemplify workgroup with example.
2. Why CPU switching is important. Exemplify FCFS and SJF scheduling algorithms in detail with
example.
3. Why operating system is called resource manager? Highlight process management and memory
management in detail.
4. Give a details description about the components of operating system.
Set-6
1. Illustrate the hardware requirements for desktop systems.
2. Describe the difference between domain admin groups and enterprise admin groups.
3. Comparison between local, global and universal groups.
4. How memory is managed by the operating system? Differentiate paging and segmentation.
Set-7
1. Differentiate soft and hard real time system.
2. In what respect are distributed computing systems better than parallel processing systems. Discuss
both.
3. How memory is managed by the operating system? Differentiate paging and segmentation.
4. Differentiate Hard and soft real time systems. State the one example of each.
Set-8
1. Differentiate symmetric and asymmetric multiprocessing system.
2. Highlight the concept of file management. Give a detailed description about the file allocation
methods.
3. Why operating system is called resource manager? Highlight process management and memory
management in detail.
4. Discuss the types of CPU scheduling. Explain the scheduling criteria to check the best algorithm.
Set-9
1. Operating system is called resource manager. Justify it.
2. Why CPU switching is important. Exemplify FCFS and SJF scheduling algorithms in detail with
example.
3. Tabulate the different types of OS along with its functionality.
48
4. Differentiate Hard and soft real time systems. State the one example of each.
Set-10
1. Differentiate preemptive and non-preemptive scheduling.
2. Write down the types of CPU scheduling. In particular, exemplify CPU scheduling algorithms.
3. Give a details description about the components of operating system.
4. Describe clustering systems in detail along with its benefits. Also discuss the types of clustering
system.
Set-11
4. How memory is managed by the operating system? Differentiate paging and segmentation.
Set-12
3. Highlight the concept of file management. Give a detailed description about the file allocation
methods.
4. Describe the difference between domain admin groups and enterprise admin groups.
49
Sample Question Bank
50
PPT’s to be uploaded
PPT’s uploaded on UIMS
51
Students Result Analysis after MST-1/MST-2/End Semester Examination
MST-1
MST-2
52
1. Topics on advancement in the subject 3 lectures
Lectur Window T 3: https://msd Explain To be able PPT
e 41 Server 2008 13.1 n.microsoft the to work on Video
.com/en- installati Window
us/library/b on and Server
b742424.as configura 2008
px tion
Lectur Active T 3: https://msd Use of To be able PPT
e 42 Directory 13.2 n.microsoft Activity to use AD
Advanced .com/en- Directory and its
Topics us/library/b component
b742424.as s
px
53
Result Analysis Sheet
E-Code E-1435
Division CSE
Semester 7
Average Marks :
Highest Marks :
Lowest Marks :
Less than 40
40-50
51-60
61-70
71-80
81-90
91-100
Total
A+
54
A
B+
C+
Observations by Faculty:
Here we have whole range of grades, but some students got fail in the subject. Subject is easy but
students did not show their interest in studies due to placements.
Suggestions and steps that will be taken to improve the result in future:
If students skip their classes due to any reason like placements, interviews, then there should be extra
classes for those students
Date:
55
56