Sie sind auf Seite 1von 56

CHANDIGARH UNIVERSITY

UNIVERSITY INSTITUTE OF ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

Subject Name Network Operating System

Subject Code CSO-446


Branch Computer Science and Engineering (Open-Elective)
Semester 7th
Faculty Name Er. Kanwaldeep Kaur
Designation Assistant Professor

1
Contents of Course file

S.No. Item Annexure/Page no.


1 Academic calendar 3
2 Syllabus of the Subject 5
3 Time table of the Class 6
4 Time table of the concerned teacher 8-11
5 Scheme of Evaluation and attendance rules 12-15
6 Lecture planning and implementation sheet 16-23
7 Case study planning and execution sheet 25-26
8 Quiz planning and feedback 27
9 Assignment Schedule 28-29
10 Copy of Surprise tests (Record to be maintained) 30
11 MST-I and MST-II
12 Previous Question or specimen papers
13 Unit-1 31-35
1. Lecture detail
2. Tutorial sheets (based on lectures of the week.
3. Assignments (1)
4. Question paper of MST-1 along with marking
scheme.
14 Unit-2 36-41
1. Lecture detail
2. Tutorial sheets (based on lectures of the week.
3. Assignments (2)
Question paper of MST-2 along with marking scheme.
15 Unit-3 42-46
1. Lecture detail
2. Tutorial sheets (based on lectures of the week.
3. Assignments (3)
16 Sample Question Bank (for students orientation)
17 PPT’s to be uploaded 42
18 Analysis and feedback
19 Students Result Analysis after MST-1/MST-2/End
Semester Examination
20 Topics on advancement in the subject 3 lectures
21 Best Practices adopted by the faculty

1. Academic Calendr
2
Academic Calendar for the Year 2019-20
Odd Semester
Date Working
S.No. Event Remarks/Displayed on
From To days
1 Start of semester 15th July 2019
2 First fortnight 15-Jul-19 26-Jul-19 10 26-Jul-19
14-Aug-
Second Fortnight 12
3 29-Jul-19 19 14-Aug-19
13-Aug-
Assignments 24-Jul-19
4 19 Unit I
16-Aug- 19-Aug-
1st Hourly Test 3
5 19 19
20-Aug- 30-Aug-
Third Fortnight 9
6 19 19 30-Aug-19
13-Sep-
Forth Fortnight 9
7 3-Sep-19 19 13-Sep-19
16-Sep-
Fifth Fortnight 12
8 19 3-Oct-19 3-Oct-19
9 Fresher Party 2018 20-Sep-19
27-Aug- 23-Sep-
Assignments
10 19 19 Unit II
12 2nd Hourly Test 4-Oct-19 7-Oct-19 3
24-Oct-
Sixth Fortnight 13
13 8-Oct-19 19 24-Oct-19
14 Entrecellance -18 18-Oct-19
29-Oct-
Diwali holidays 5
16 25-Oct-19 19
11-Nov-
Assignments 22-Oct-19
17 19 Unit III
13-Nov-
Seventh Fortnight 11
18 30-Oct-19 19 13-Nov-19

Student's Day 2-Nov-19 Student-Teacher Interaction


19
14-Nov- 15-Nov-
Online Quiz 2
20 19 19
18-Nov- 21-Nov-
Practical Exams 4
21 19 19
Theory 22-Nov- 20-Dec-
21
22 Examination 19 19
23-Dec-
Winter Vacations
23 19 5-Jan-20 14 Students
25-Dec-
Winter Vacations
24 19 1-Jan-20 7 Faculty
25 Next semester 2-Jan-20
3
Note :- Diwali Holidays from 25th Oct 2019 to 29th Oct 2019

2. Syllabus

Network Operating System L T P C

4
Total Contact Hours : 45Hours
Subject 3 0 0 3
Common to all Specializations of
Code CSO- CSE 4th Year
446 Prerequisite: Knowledge of various types of operating systems

Marks-100

Internal-60 External-40

Course Objectives

 This course is intended for students to experience on the technologies included in Network
Operating System.
 Gain in-depth knowledge of Windows Server 2008.
Unit Course Outcome

I Understanding the concept of networks

II Understand the concept of operating System


III Configuring Windows 2008 Server

Contents of the Syllabus

UNIT-I [15h]

Data Communications Concepts: Digital and Analog signals, Parallel and Serial signals Synchronous
and Asynchronous, Simplex/Half/Pull Duplex and Multiplexing.

Introduction of Computer Networks: Description of LAN, WAN, MAN, PAN and Wireless networks.

Basic terminology of Computer Networks: - Physical and Logical networks, Bridge, Switch, Hub,
Gateway, Routers, Repeaters, Modem, Network Interface Card, Physical Address/MAC Address and
Logical Address and IP Addressing and Subnet Mask.
Communication Channels: Telephone lines, Coaxial Cables, and Optical Fiber Transmission

Network Topologies: Bus Topology, Ring Topology, Star Topology, Hybrid Topology and Mesh
Topology

Reference Model:OSI Reference Model,TCP/IP reference model, Core protocols of TCP/IP,IP routing,IP
routers,Routing Tables.

UNIT-II [15h]

Introduction to DNS:DNS Architecture, Understanding the DNS Domain Namespace,DNS domain


name hierarchy, DNS and Internet domains,DNS delegation

5
Introduction to DHCP:Introduction to DHCP,DHCP Architecture, Benefits to DHCP,DHCP Terminologies
and DHCP Server Responsibility.

Introduction to RPC: Introduction to RPC,RPC Dependencies and Interaction,RPC


Architecture,RPC Component and RPC Processes and Interaction.

UNIT-III [15h]

Introduction to operating System:Introduction to operating system,Types of operating


System:Mainframe,Desktop,Multiprocessor,Distributed,Clustered,Multiprogramming,Real time,Embedded
and Time Sharing

Operating System Components:Process Management Component,Memory Management


component,i/o Management component,File Management component,Protection System,and
Networking management component.
Comparison of OS(Desktop,Server and Client), Hardware Requirement for OS(Desktop,Server and
client), Workgroups and Domains.

Text Books:

1. Windows Server 2008 Certifications – Death to the MCSE, Scott Skinger


2. MCITP: 5-in-1 Study System, Windows Server 2008 Enterprise Administrator, Mitch Tullochwith the
Windows Server Team at Microsoft
3. Introducing Windows Server 2008, Mitch Tulloch, ISBN-13: 978-0735624214

Reference Books:
1. MCTS Self Paced Training Kit (Exam 70 - 640): Configuring Windows Server 2008 Active Directory,
by Holme Dan.

Instructions for the paper-setter

Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.

Maximum Marks = 60 Time: 3 Hrs

6
The syllabus has been divided into three equal units. The paper setter is required to set ten questions in all,
three questions from each unit and a compulsory question consisting of five sub parts and based on the whole
syllabus. The candidate will be required to attempt six questions including the compulsory question number
no 1 and not more than two questions from each unit.

Course Code-CSC-421 Introduction to Information Security

Department Teaching the


Department of Computer Science & Engineering
Subject

Program Outcome a b c d E f g h i j k

Mapping of Course
I,II,
outcome with Program
III
outcome

BS ES PD PC PE OE Project/Training
Category

Approval Date of meeting of the Board of Studies

4. Time Table of Concerned Teacher

7
5. Scheme of Evaluation and attendance rules

5th and 7th SEMESTER

S.NO SUBJECT CODE SUBJECT NAME Hours Per Marks Credits


Week

8
IN EX
L T P
T T Total
1 Network Operating
CSO-446 3 0 0 40 60 100 3
Systems

Attendance Rules

The visible effects of taking attendance in Ist five minutes is being seen and it should be maintained by
HODs/Coordinators/Teachers.
HODs and Coordinators should ensure that the fortnight attendance record will be monitored thoroughly and
the soft copy of attendance to be maintained for exact information and for corrective measures in the future.

9
The following measure should be done for the defaulter students:
• 1 times HODs and Coordinator to take own decision
• 2 times Pro Vice-Chancellor will be notified
• 3 times Student parents to be informed
• 4 time Parents will be called to the university
HODs and Coordinators to ensure that no situation should escalate to such level
• As per rule, if any student missing classes for 10 days or 07 working days continuously then his or
her name will be struck out from the roles of University.
• Consecutive missing of 02 classes in any subject and for third absence the student’s parents will be
informed.
• In a week, if a student is misses 03 classes is any subject/paper then the parents will be informed.
Rationalization of internal evaluations (By equating avg.)
• The average marks should be between 64-66% for first, second half yearly and mid term.
• After marks will be displayed for the students.
• all evaluations to be shown to the students and the queries will be handled and resolved.
Consequences of E,F and I
• Students with ‘E’ or ‘F’ grade can appear in the concerned papers when offered in the relevant
semester by paying the examination fee.
• If the candidates with ‘E’ or ‘F’ grade want to improve internal marks, they shall have to repeat the
paper and attend classes by paying requisite fee.
• Students having ‘I’ grade have to repeat the paper by attending classes after paying requisite fee in the
summer semester.
• In rare cases if there are four or more students interested in attending a paper ( having I/E/F grades),
classes may be arranged in summer term.
• Student getting ‘E’ grade, if he/she has appeared in all internals, can request for grading by
considering zero marks for end semester exam fees.
Promotion to the next year
Undergraduate (UG) courses
• For promotion from 1st to 2nd year the student must have CGPA of 3.50 or more
• For promotion from 2nd to 3rd year the student must have CGPA of 4.00 or more at the end of second
year.
• First year students will be given a chance to improve their ‘E’ /‘F’ grades of first semester along with
second
• semester exams by paying only exam fee. Similarly students will be given a chance to improve their
‘E’/’F’ grades of second semester in summer semester by paying only exam fees
• If a student wishes to improve one’s internal marks, then he/she will have to repeat that subject by
paying subject wise fee and attending classes
• For award of degree student must have ‘D’ or higher grade in all the papers along with minimum
CGPA of 4.5
Post Graduate (PG) Courses
• Promotion from 1st to 2nd year is granted If the student has at least 4.00 CGPA
• First year students will be given a chance to improve their ‘E’ /’F’ grades of first semester along with
second semester exams by paying only exam fee. Similarly students will be given a chance to
improve their ‘E’/’F’ grades of second semester in summer semester by paying only exam fees

10
• If a student wishes to improve one’s internal marks, then he/she will have to repeat that subject by
paying subject wise fee and attending classes.
• For award of PG degree student should have ‘D’ or higher grade in all papers along with CGPA of
5.00 or more.

11
6. Lecture planning and implementation sheet

Detailed Plan for Lectures

Week Lecture Broad Chapters Other Lecture Learning Pedagogic


Numbe Number Topic(Sub /Section Readings, Descriptio Outcomes al Tool
r Topic) s of Relevant n Demonstra
Text/refe Websites, tion/ Case
rence Audio Study /
books Visual Images /
Aids, animation
software / ppt etc.
and Planned
Virtual
Labs
Lecture Introduction to T- https://msd Componen To know the PPT
1 Data 1:1.1 n.microsoft ts of data importance Video
Communicatio and .com/en- communic of all the
ns Concepts 1.2 us/library/ ation concepts
bb742424.
aspx
Lecture Digital and T-1.3 https://msd How To PPT
2 Analog signals n.microsoft digital understand
.com/en- are the
us/library/ different functionali
bb742424. from ty of each
aspx analog
Week 1 signals
Parallel and T- https://msd Compariso To
Serial signals 1:1.2 n.microsoft n between understand Video
and .com/en- parallel basic
1.3 us/library/ and serial difference
bb742424. signals
aspx
Lecture Synchronous T- https://msd Use of To PPT
3 and 1:1.4 n.microsoft Synchrono understand
Asynchronous and .com/en- us and the concept
1.5 us/library/ Asynchron of each
bb742424. ous
aspx
Week 2 Lecture Simplex/Half/F T- https://msd differenti To be able PPT
4 ull Duplex 1:6.1 n.microsoft ate to learn Video
and .com/en- between Simplex/H
6.2 us/library/ Simplex/ alf/Full
bb742424. Half/Full Duplex
aspx Duplex

12
Lecture Multiplexing T-1:8.1 https://msd Role of To PPT
5 and 1:8.2 n.microsoft multiplex understand Video
.com/en- ing the concept
us/library/ of
bb742424. multiplexin
aspx g
Lecture Description of T- https://msd Understa To be able PPT
6 LAN, WAN, 1:8.4 n.microsoft nd types to use Video
MAN, PAN .com/en- of LAN,
us/library/ networks WAN
bb742424.
aspx
Lecture Wireless T- https://msd Use of To know PPT
7 networks 1:8.. n.microsoft wireless wireless Video
5 .com/en- networks networks
us/library/
bb742424.
aspx
Lecture Physical and T- https://msd Computer Learn about PPT
8 Logical 1:8.7 n.microsoft network Computer Video
networks .com/en- terminolog network
us/library/ ies terminologi
bb742424. es
aspx
Week 3 Lecture Bridge, Switch, T- https://msd PPT
Computer Learn about
9 Hub, Gateway, 1:10. n.microsoft network Computer Video
Routers, 2 .com/en- terminolog network
Repeaters, us/library/ ies terminologi
Modem bb742424. es
aspxv
Network T- https://msd Computer Learn about PPT
Interface Card, 1:10. n.microsoft network Computer Video
Physical 3 .com/en- terminolog network
Address/MAC us/library/ ies terminologi
Address and bb742424. es
Logical aspx
Address
Week 4 Lecture IP Addressing T- https://msd IP To get to PPT
10 and Subnet 1:10. n.microsoft Addres divide Video
Mask 4 .com/en- sing network
us/library/ into
bb742424. subnets
aspx

13
Communicatio T- https://msd use of To know PPT
n Channels: 1:10. n.microsoft Telep the types of Video
Telephone lines 5 .com/en- hone cables
us/library/ lines
bb742424.
aspx

Lecture Coaxial T- https://msd Coaxial Optical PPT


11 Cables, and 1:10. n.microsoft cables Fiber Video
Optical Fiber 6 .com/en- features Transmissi
us/library/ on use
Transmission
bb742424.
aspx

Lecture Bus Topology, T- https://msd Different To learn PPT


12 Ring Topology, 1:10. n.microsoft Topology topology Video
Star Topology 7 .com/en- features
us/library/
bb742424.
aspx

Lecture Hybrid T- https://msd Different To learn PPT


13 Topology and 4:21. n.microsoft Topology topologu Video
Mesh Topology 1 .com/en- features
us/library/
bb742424.
aspx

Lecture OSI Reference T- https://msd Understa To learn PPT


14 Model, TCP/IP 4:21. n.microsoft nd layers of Video
reference 2 .com/en- Referenc Model
Week 5 us/library/ e Model
model
bb742424.
aspx

Lecture Core protocols T- https://msd Understa Student PPT


15 of TCP/IP,IP 4:21. n.microsoft nd the will learn Video
routing,IP 3 .com/en- protocols Diferent
us/library/ routing
routers,Routing
bb742424. techniques
Tables. aspx

Week 6 MST 1
Week 6 Lecture Introduction to T- https://msd Introduct Learn DNS PPT
16 DNS:DNS 4:21. n.microsoft ion to Architectur Video
Architecture 4 .com/en- DNS e
us/library/
bb742424.
aspx

14
Lecture Understanding T- https://msd Understa To be able PPT
17 the DNS 1:11. n.microsoft nd the to Video
Domain 1 .com/en- DNS understand
us/library/ hierarchy
Namespace,
bb742424.
DNS domain aspx
name hierarchy

Lecture DNS and T- https://msd DNS and To be able PPT


18 Internet 1:11. n.microsoft Internet to Video
domains, DNS 7 .com/en- domains understand
us/library/ the
delegation
bb742424. delegations
aspx
Lecture Introduction to T- https://msd Introduct To know PPT
19 DHCP: 1:11. n.microsoft ion to the Video
Introduction to 6 .com/en- DHCP Architectur
us/library/ e
DHCP,
bb742424.
aspx
Lecture DHCP T- https://msd Architect To know PPT
20 Architecture 1:11. n.microsoft ure of the Video
6 .com/en- DHCP Architectur
Week 7 us/library/ e
bb742424.
aspx
Benefits to T- https://msd Benefits To know PPT
Lecture DHCP, 1:16. n.microsoft of DHCP the Video
21 Advantages of 1 .com/en- terminologi
us/library/ es
DHCP
bb742424.
aspx

Lecture DHCP T- https://msd Terms To know PPT


22 Terminologies 1:16. n.microsoft and the Video
and DHCP 1 .com/en- Responsi terminologi
us/library/ bilities es
Server
bb742424.
Responsibility. aspx
Week 8
Lecture Revision of T- https://msd Introduct To know PPT
23 DHCP 1:11. n.microsoft ion to the Video
6 .com/en- DHCP Architectur
us/library/ e
bb742424.
aspx

15
Lecture Introduction to T- https://msd Introductio To learn
24 operating 1:12. n.microsoft n to Types of Video
System: 4 .com/en- operating operating
us/library/ System
Introduction to System
bb742424.
operating aspx
system, Types
of operating
System:
Mainframe,
Desktop

Lecture Multiprocessor, T3: https://msd Use of To learn PPT


25 Distributed, 6.1 n.microsoft Multipro Multiproce
Clustered, .com/en- cessor, ssor,
us/library/ Distribut Distributed
bb742424. ed, , Clustered,
aspx Clustere
d,
Multipro
grammin
g
Lecture Multiprogram T3: https://msd Use of To learn PPT
26 ming, Real 6.1 n.microsoft Multipro Multiprogr
time, .com/en- cessor, amming
us/library/ Distribut
Embedded and
bb742424. ed,
Week 9 Time Sharing aspx Clustere
d,
Multipro
grammin
g
Lecture Operating T3: https://msd Role of To know PPT
27 System 6.2 n.microsoft Operatin the use of Video
Components: .com/en- g System Operating
us/library/ Compon System
Process
bb742424. ent Component
Management aspx
Component,
Memory
Management
component

Week Lecture I/O T3: https://msd Role of To be able PPT


10 28 Management 6.3 n.microsoft I/O to learn Video
component, .com/en- Manage I/O
us/library/ ment Manageme
File
bb742424. compone nt
Management aspx nt component
component,

16
Lecture Protection T3: https://msd Role of To be able PPT
29 System, and 6.3 n.microsoft I/O to learn Video
Networking .com/en- Manage I/O
us/library/ ment Manageme
management
bb742424. compone nt
component aspx nt component
Lecture Process States Detail of Detail of Lecture
30 process process Method
manage managem
ment ent
Week
10
Lecture Process Detail of Detail of Lecture
31 Control Block process process Method
(PCB) manage managem
ment ent
Lecture CPU Detail of Detail of Lecture
32 Scheduling process process Method
Week manage managem
types
11 ment ent

Lecture Brief intro to Detail of Detail of Lecture


33 CPU process process Method
Scheduling manage managem
Algo’s ment ent
Lecture Brief intro to About About Lecture
34 Paging and Memory Memory Method
segmentation allocation allocation

Lecture File Allocation About About Lecture


35 Methods storage storage Method
Week allocatio allocation
12 n
Lecture Comparison of T 3: https://msd Server To be able PPT
36 Microsoft 1.1 n.microsoft side to use Video
OS(Desktop, .com/en- program programmi
us/library/ ming in ng on
Server and
bb742424. java server side
Client), aspx using
sevlet
Week Lecture Comparison of T 3: https://msd Server To be able PPT
13 37 Microsoft 1.1 n.microsoft side to use Video
OS(Desktop, .com/en- program programmi
us/library/ ming in ng on
Server and
bb742424. java server side
Client), aspx using
sevlet

17
Lecture Hardware T 3: https://msd Server To be able PPT
38 Requirement 1.1 n.microsoft side to use Video
for .com/en- program programmi
us/library/ ming in ng on
OS(Desktop,
bb742424. java server side
Server and aspx using
client ) sevlet
Lecture Workgroups T 3: https://msd Server To be able PPT
39 and Domains. 1.1 n.microsoft side to use Video
.com/en- program programmi
us/library/ ming in ng on
bb742424. java server side
aspx using
sevlet
Lecture Workgroups T 3: https://msd Server To be able PPT
40 and Domains. 1.1 n.microsoft side to use Video
.com/en- program programmi
Week us/library/ ming in ng on
14 bb742424. java server side
aspx using
sevlet

7. Schedule of Assignment
Assignment No. Date of Allotment Last date of Content of Assignment
Submission (Assignment to be allotted group-wise)

18
01 25th july 2019 13th Aug 2019 G1:A1 Set-1 Easy
Covering Unit-1
G2: A1 Set-2 Easy
G3: A1 Set-3 Easy
G4: A1 Set-4 Easy
G5: A1 Set-5 Medium
G6: A1 Set-6 Medium
G7: A1 Set-7 Medium
G8: A1 Set-8 Medium
G9: A1 Set-9 Difficult
G10: A1 Set-10 Difficult
G11: A1 Set-11 Difficult
G12: A1 Set-12 Difficult

02 20Aug 2018 3rd oct 2018 G1:A2 Set-1 Easy


Covering Unit-2
G2: A2 Set-2 Easy
G3: A2 Set-3 Easy
G4: A2 Set-4 Easy
G5: A2 Set-5 Medium
G6: A2 Set-6 Medium
G7: A2 Set-7 Medium
G8: A2 Set-8 Medium
G9: A2 Set-9 Difficult
G10: A2 Set-10 Difficult
G11: A2 Set-11 Difficult
G12: A2 Set-12 Difficult

03 15 oct 2018 13 nov 2018 G1:A1 Set-1 Easy


Covering Unit-3
G2: A3 Set-2 Easy
G3: A3 Set-3 Easy
G4: A3 Set-4 Easy
G5: A3 Set-5 Medium

19
G6: A3 Set-6 Medium
G7: A3 Set-7 Medium
G8: A3 Set-8 Medium
G9: A3 Set-9 Difficult
G10: A3 Set-10 Difficult
G11: A3 Set-11 Difficult
G12: A3 Set-12 Difficult

Guidelines for Assignments


1. Three home assignments per semester are to be given to each students distributed uniformly i.e. one
assignment per unit.

1. Depending upon the contents of the assignments date of the resubmission is be decided.

Details of Academic Task(s)

20
AT Objective Topic of the Nature Evalu Allotm Date of
No. Academic Task of ation ent / uploading
Acade Mode submission of Model
mic Week Answer
Task Sheet on
(group UIMS/
/indivi Notice
duals/ Board
field with
work marking
scheme
ST-1 To check the All subtopics Individua Step 16/8/19 19/8/19 to
analytical and included in l Markin to 24/8/19
conceptual Instruction Plan from g 19/8/19
ability of Lecture-1 to
students related Lecture-12
to
fundamentals
of Networks

ST-2 To test the All subtopics Individua Step 04/10/19 04/10/19 to


'Fundamentals included in the l Markin to 07/10/19
of Protocols Instruction Plan from g. 07/10/19
and Lecture-13 to
operating Lecture-28.
systems

signme To be able to All topics form Individua Step 13/08/19


No.-1 learn Lecture 1 to Lecture l Markin
ement- fundamentals 10 Fundamentals of g
of computer reference model. 24/07/19
networks and
reference
model.
signme To connect All topics form Individua Step 25/09/19
No.-2 window Lecture 25 to Lecture l Markin
27/08/19
server 2008. 27 Fundamentals of g
window server 2008.
signme To be able to All topics form Individua Step 11/11/19
No.-3 understand Lecture 29 to Lecture l Markin
the use of 35 Fundamentals of g 22/10/19
active active directory
directory.
rprise To test the All topics form Individua Step
st understandin Lecture 1 to Lecture l Markin
g of 42 g
networking
devices,
protocols and
21
layers

iz To test the All topics form Individua No


objective Lecture 1 to Lecture l Step
knowledge of 42 Markin
the network g
operating
system.
Signature of Course Coordinator E-Code: Signature of HoD with Stamp

Annexure 1

Tutorial or Case Studies

Date of
Serial
Week What %age can do
Topic of Tutorial Tutorial number of
more than 50% in
No. the Sheet Questions
Sheet questions in Tutorial
tutorial number given to the
distribution class
student

NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA
NA NA NA NA NA NA NA

Guide lines for Tutorial sheets

1. Tutorial sheet is related to the topics covered in lectures during the week as per scheme of study

22
2. This sheet is to be given to the students at least one week in advance from the scheduled date of
tutorial

3. Each tutorial sheet must contain at least 10 problems for 1 period tutorial. In case of tutorial periods
more than per week the number of problems should be increased in proportion to the tutorial
periods.

4. In case the number of sections are more than 1 for the same subject a common tutorial sheet can be
prepared for a maximum 4 sections.

1. Students are at liberty to prepare all questions at home, but teacher will at random give three
questions during tutorial period from the tutorial sheet

Annexure II

Quiz

23
Unit Quiz Topics Planned No of Date of What %age of
number Date Question Quiz students have more
number
than 60% right
answers
1 1 14-15
Nov
2

Guide lines for Quiz sheet

1. Two quiz evaluations are to be conducted in a unit i.e. six evaluations per semester.

1. A quiz may in variably contain 50 objective type questions relating to the fundamentals of the subject.

1. These quiz papers are to be scheduled and notified to the students well in advance.

Annexure IV

Surprise Test

24
Unit Date of Number of Average
Max Marks Remarks
Surprise Test questions Marks

1 08/2019 3 9

Guide lines for Surprise Test

1. It is suggested that three surprise test may be conducted during the semester.

2. Date and contents of surprise tests will be decided by the concerned teacher. In no case the dates and
contents of the test are announced before the hand but contents must be what have been taught in the
class.

3. After the test attached Performa of the course file should be duly filled up and question paper must
become the part of course file.

UNIT-1

1. Discuss the various advantages and disadvantages of each topology.

2. Differentiate between LAN and WAN.

3. Define data communication. Explain the components of data communication.

UNIT-II

1. Describe the architecture of RPC.

2. Can a BOOTP client boot from a DHCP server? How?

3. Explain the various responsibilities of DNS.

UNIT-III
1. Why operating system is called resource manager? Highlight process
management and memory management in detail.

2. Summarize process. Elaborate the states of a process with example.

3. Discuss detailed description about the file allocation methods.

Lecture Notes
UNIT 1

25
A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a
computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on
the network.

Computer network is a system which allows communication among the computers connected in the network.
A computer network is a set of connected computers. Computers on a network are called nodes. The
connection between computers can be done via cabling, most commonly the Ethernet cable, or wirelessly
through radio waves. Connected computers can share resources, like access to the Internet, printers, file
servers, and others. A network is a multipurpose connection, which allows a single computer to do more.

A computer network is a set of computers connected together for the purpose of sharing resources. The most
common resource shared today is connection to the Internet. Other shared resources can include a printer or a
file server. The Internet itself can be considered a computer network.

Network Criteria

A network must be able to meet a certain number of criteria. The most important of these are performance,
reliability, and security.

Performance

Performance can be measured in many ways, including transit time and response time. Transit time is the
amount of time required for a message to travel from one device to another. Response time is the elapsed
time between an inquiry and a response. The performance of a network depends on a number of factors,
including the number of users, the type of transmission medium, the capabilities of the connected hardware,
and the efficiency of the software.

Performance is often evaluated by two networking metrics: throughput and delay. We often need more
throughputs and less delay. However, these two criteria are often contradictory. If we try to send more data to
the network, we may increase throughput but we increase the delay because of traffic congestion in the
network.

Reliability

In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the time it
takes a link to recover from a failure, and the network's robustness in a catastrophe.

Security:

Network security issues include protecting data from unauthorized access, protecting data from damage and
development, and implementing policies and procedures for recovery from breaches and data losses.

26
Simplex

In simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two devices
on a link can transmit; the other can only receive. Keyboards and traditional monitors are examples of
simplex devices. The key- board can only introduce input; the monitor can only accept output. The simplex
mode can use the entire capacity of the channel to send data in one direction.

Half-Duplex

In half-duplex mode, each station can both transmit and receive, but not at the same time. : When one device
is sending, the other can only receive, and vice versa.

The half-duplex mode is like a one-lane road with traffic allowed in both directions. When cars are traveling
in one direction, cars going the other way must wait. In a half-duplex transmission, the entire capacity of a
channel is taken over by whichever of the two devices is transmitting at the time. Walkie-talkies and CB
(citizens band) radios are both half-duplex systems.

The half-duplex mode is used in cases where there is no need for communication in both directions at the
same time; the entire capacity of the channel can be utilized for each direction.

Full-Duplex

In full-duplex mode (also called duplex), both stations can transmit and receive simultaneously.

The full-duplex mode is like a two-way street with traffic flowing in both directions at the same time. In
full-duplex mode, signals going in one direction share the capacity of the link: with signals going in the other
direction. This sharing can occur in two ways: Either the link must contain two physically separate
transmission paths, one for sending and the other for receiving; or the capacity of the channel is divided
between signals traveling in both directions.

One common example of full-duplex communication is the telephone network. When two people are
communicating by a telephone line, both can talk and listen at the same time.

The full-duplex mode is used when communication in both directions is required all the time. The capacity of
the channel, however, must be divided between the two directions.
27
Data transmission
Data transmission refers to the movement of data in form of bits between two or more digital devices. This
transfer of data takes place via some form of transmission media (for example, coaxial cable, fiber optics
etc.)

How does data transmission work between digital devices?

Data is transferred in the form of bits between two or more digital devices. There are two methods used to
transmit data between digital devices: serial transmission and parallel transmission. Serial data transmission
sends data bits one after another over a single channel. Parallel data transmission sends multiple data bits at
the same time over multiple channels.

Types of Transmission:

Parallel Transmission

In parallel transmission, all the bits of data are transmitted simultaneously on separate communication lines.
In order to transmit n bits, n wires or lines are used. Thus each bit has its own line.
Binary data, consisting of Is and Os, may be organized into groups of n bits each. Computers produce and
consume data in groups of bits much as we conceive ofand use spoken language in the form of words rather
than letters. By grouping, we can send data n bits at a time instead of 1. This is called parallel transmission.
The mechanism for parallel transmission is a conceptually simple one: Use n wires to send n bits at one time.
That way each bit has its own wire, and all n bits of one group can be transmitted with each clock tick from
one device to another. Figure 4.32 shows how parallel transmission works for n =8. Typically, the eight wires
are bundled in a cable with a connector at each end. Parallel transmission is used for short distance
communication.

28
Advantage of parallel transmission
It is speedy way of transmitting data as multiple bits are transmitted simultaneously with a single clock pulse.

Disadvantage of parallel transmission


It is costly method of data transmission as it requires n lines to transmit n bits at the same time.
Serial Transmission
In serial transmission, the various bits of data are transmitted serially one after the other.
It requires only one communication line rather than n lines to transmit data from sender to receiver. Thus all
the bits of data are transmitted on single line in serial fashion.
Only single bit is sent with each clock pulse. As shown in fig., suppose an 8-bit data 11001010 is to be sent
from source to destination. Then least significant bit (LSB) i.e. 0 will be transmitted first followed by other
bits. The most significant bit (MSB) i.e. 1 will be transmitted in the end via single communication line. Since
communication within devices is parallel, conversion devices are required at the interface between the sender
and the line (parallel-to-serial) and between the line and the receiver (serial-to-parallel). Serial transmission
is used for long distance communication.

Advantage of Serial transmission


Use of single communication line reduces the transmission line cost by the factor of n as compared to parallel
transmission.

Disadvantages of Serial transmission


1. Use of conversion devices at source and destination end may lead to increase in overall transmission cost.

29
2. This method is slower as compared to parallel transmission as bits are transmitted serially one after the
other.

Types of Serial Transmission


There are two types of serial transmission-synchronous and asynchronous both these transmissions use 'Bit
synchronization'
Bit Synchronization is a function that is required to determine when the beginning and end of the data
transmission occurs.

Asynchronous Transmission
Asynchronous transmission sends only one character at a time where a character is either a letter of the
alphabet or number or control character i.e. it sends one byte of data at a time. Bit synchronization between
two devices is made possible using start bit and stop bit. Start bit indicates the beginning of data i.e. alerts the
receiver to the arrival of new group of bits. A start bit usually 0 is added to the beginning of each byte. Stop
bit indicates the end of data i.e. to let the receiver know that byte is finished, one or more additional bits are
appended to the end of the byte. These bits, usually 1s are called stop bits.

Addition of start and stop increase the number of data bits. Hence more bandwidth is consumed in
asynchronous transmission. There is idle time between the transmissions of different data bytes. This idle
time is also known as Gap. The gap or idle time can be of varying intervals. This mechanism is called
Asynchronous, because at byte level sender and receiver need not to be synchronized. But within each byte,
receiver must be synchronized with the incoming bit stream.

Merits of Asynchronous

 Simple, doesn't require synchronization of both communication sides


 Cheap, because asynchronous transmission requires less hardware
 It is easy to implement, so well suited for applications where messages are generated at irregular
intervals, for example data entry from the keyboard, and the speed depends on different applications.
 It is an effective scheme.
30
Demerits of Asynchronous

 This method is less efficient and slower than synchronous transmission.


 Additional start and stop bits are required to be used.
 It is difficult to determine the sampling instants hence the timing error can take place.

Synchronous Transmission
Synchronous transmission does not use start and stop bits. In this method bit stream is combined into longer
frames that may contain multiple bytes. There is no gap between the various bytes in the data stream. In the
absence of start & stop bits, bit synchronization is established between sender & receiver by 'timing' the
transmission of each bit. Since the various bytes are placed on the link without any gap, it is the
responsibility of receiver to separate the bit stream into bytes so as to reconstruct the original information. In
order to receive the data error free, the receiver and sender operates at the same clock frequency.
The byte synchronization is accomplished in the data link layer, when synchronous transmission is used
between computers.

Merits of Synchronous

 Lower overhead and thus, greater throughput.


 The speed of transmission is much higher.
 Timing errors are reduced due to synchronization.
 Start and stop bits are not needed.

Demerits of Synchronous

 Hardware is more expensive


 The accuracy of the received data is dependent entirely on the ability of the receiver to count the
received bits accurately.
 The sender and receiver have to operate at the same clock frequency. This requires proper
synchronization which makes the system complicated.

31
Parameters Synchronous Asynchronous
Transmission Transmission

Definition Transmits data in the Transmits 1 byte or


form of chunks or frames character at a time

Speed of Transmission Quick Slow

Cost Expensive Cost-effective

Time Interval Constant Random

Gap between data Yes None

examples Chat Rooms, Telephonic Email, Forums, Letters


Conversations, Video
Conferencing, Face to
face interactions.

Start and stop bits Not used Used

Application Communication between Communication between


two computers a computer and keyboard

32
We use the concept of layers in our daily life. As an example, let us consider two friends who communicate
through postal mail. The process of sending a letter to a friend would be complex if there were no services
available from the post office. Figure shows the steps in this task.

Sender, Receiver, and Carrier

In Figure we have a sender, a receiver, and a carrier that transports the letter. There is a hierarchy of tasks.

At Sender Site

Let us first describe, in order, the activities that take place at the sender site. o Higher layer. The sender writes
the letter, inserts the letter in an envelope, writes the sender and receiver addresses, and drops the letter in a
mailbox. o Middle layer. The letter is picked up by a letter carrier and delivered to the post office. o Lower
layer. The letter is sorted at the post office; a carrier transports the letter.

Carrier

The letter is then on its way to the recipient. On the way to the recipient's local post office, the letter may
actually go through a central office. In addition, it may be trans- ported by truck, train, airplane, boat, or a
combination of these.

At receiver site

At the Receiver Site o lower layer. The carrier transports the letter to the post office. o Middle layer. The
letter is sorted and delivered to the recipient's mailbox. o Higher layer. The receiver picks up the letter, opens
the envelope, and reads it.

According to this analysis, there are three different activities at the sender site and another three activities at
the receiver site. The task of transporting the letter between the sender and the receiver is done by the carrier.

Above example is only to understand the concept of OSI model.

THE OSI MODEL

33
Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection model. It was first introduced in the late 1970s. An
open system is a set of protocols that allows any two different systems to communicate regardless of their
underlying architecture. The purpose of the OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying hard- ware and software. The OSI
model is not a protocol; it is a model for understanding and designing a network architecture that is flexible,
robust, and interoperable.

The OSI model is a layered framework for the design of network systems that allows communication
between all types of computer systems. It consists of seven separate but related layers, each of which defines
a part of the process of moving information across a network.

ISO is the organization. OSI is the model.

Layered Architecture

The OSI model is composed of seven ordered layers: physical (layer 1), data link (layer 2), network (layer 3),
transport (layer 4), session (layer 5), presentation (layer 6), and application (layer 7). Figure shows the layers
involved when a message is sent from device A to device B. As the message travels from A to B, it may pass
through many intermediate nodes. These intermediate nodes usually involve only the first three layers of the
OSI model.

34
Within a single machine, each layer calls upon the services of the layer just below it. Layer 3, for example,
uses the services provided by layer 2 and provides services for layer 4. Between machines, layer x on one
machine communicates with layer x on another machine. This communication is governed by an agreed-
upon series of rules and conventions called protocols. The processes on each machine that communicate at a
given layer are called peer-to-peer processes. Communication between machines is therefore a peer-to-peer
process using the protocols appropriate to a given layer.

Comparison between OSI and TCPIP model

1. OSI is a generic, protocol independent 1. TCP/IP model is based on standard protocols


standard, acting as a communication around which the Internet has developed. It is a
gateway between the network and end communication protocol, which allows connection
user. of hosts over a network.

2. In OSI model the transport layer 2. In TCP/IP model the transport layer does not
guarantees the delivery of packets. guarantees delivery of packets. Still the TCP/IP
model is more reliable.

3. Follows vertical approach. 3. Follows horizontal approach.

4. OSI model has a separate Presentation 4. TCP/IP does not have a separate Presentation
layer and Session layer. layer or Session layer.

5. Transport Layer is Connection 5. Transport Layer is both Connection Oriented and


Oriented. Connection less.

6. Network Layer is both Connection 6. Network Layer is Connection less.


Oriented and Connection less.

7. OSI is a reference model around which 7. TCP/IP model is, in a way implementation of the
the networks are built. Generally it is used OSI model.
as a guidance tool.

8. Network layer of OSI model provides 8. The Network layer in TCP/IP model provides
both connection oriented and connectionless service.
connectionless service.

9. OSI model has a problem of fitting the 9. TCP/IP model does not fit any protocol
protocols into the model.

35
10. Protocols are hidden in OSI model and 10. In TCP/IP replacing protocol is not easy.
are easily replaced as the technology
changes.

11. OSI model defines services, interfaces 11. In TCP/IP, services, interfaces and protocols are
and protocols very clearly and makes clear not clearly separated. It is also protocol dependent.
distinction between them. It is protocol
independent.

12. It has 7 layers 12. It has 4 layers

Assignment-1

Set-1
1. Demonstrate the responsibilities of physical and data link layer.

2. Write down any two wireless network technologies in detail.

3. Highlight the significance of coaxial cables and fiber optics in communication channels.
4. Define computer network. Discuss various characteristics of computer network.

Set-2

1. Explain the functions of the Session Layer.

2. Define topology. Discuss any two in detail.

3. Explain the Bluetooth works with an example.

4. Write the approach for classifying IP addresses.

Set-3

1. Explain any three protocols of application layer in TCP/IP model.


2. Discuss any two IP routing protocols in details.
3. Explain the working of LAN and WAN. Also differentiate it
4. Discuss star and bus topologies.

Set-4

1. Elaborate the concept of ISO-OSI with all layers diagrammatically.

36
2. Differentiate between UTP and STP cables.

3. What do you mean by data communication? Discuss various components of data

communication.

4. Differentiate hub and switch

Set-5

1. Discuss SMTP and HTTP.

2. Exemplify the concept of classful and classless addressing.

3. Differentiate hub and switch.

4. Define computer network. Discuss various characteristics of computer network.

Set-6

1. How OSI reference model differs from TCP/IP reference model?

2. Differentiate synchronous and asynchronous transmission with example.

3. How can data be transported in different layers? Exemplify

4. Define computer network. Discuss the criteria of computer network.

Set-7

1. Highlight any three network devices in detail with its working model.

2. Differentiate STP and UTP cables.

3. Discuss any two IP routing protocols in detail.

4. Which layer of the OSI model contains the LLC sub layer and the MAC sub layer?

Explain it.

Set-8

1. Specify the purpose of each layer of OSI model.

2. Give the advantages of routing table and working of it?

3. Explain simplex, half duplex and full duplex diagrammatically.

37
4. Differentiate synchronous and asynchronous transmission with example.

Set-9

1. Differentiate serial and parallel transmission.

2. Differentiate subnet mask and subneting with suitable example including diagram.

3. Diagrammatically represent the foremost role of Application layer in networking.

4. Explain any two wireless network technologies in detail.

Set-10

1. Generalize Transmission media with best of the two examples.

2. Give the similarity and difference in between Transmission Control Protocol and User

Data-gram Protocol.

3. Formulate the advantages of routing table and working of it?

4. Explain the working of repeaters and routers.

Set- 11

1. Explain the Bluetooth works? Explain with an example

2. Explain FTP and DNS in detail.

3. Explain the working of application layer in detail.

4. Define data communication. Discuss various components of data communication.

Set-12

1. Differentiate between TCP and UDP.

2. Discuss transmission media with best of the two examples.

3. Define multiplexing. Explain the working of TDM.

4. Which layer is responsible for frame to frame delivery? Explain it.

38
Question paper of MST-1 along with marking scheme

MST 1

Paper Marking Scheme MST-1


(What is expected from the student to write along with step marking?)

Subject Name :- NETWORK OPERATING Subject Code:-CSO-446


SYSTEM

Section –A (2 Marks Question)

Q1.

(a) Outline any two criteria of network. (2)


Performance :1 Mark

Security :1 Mark

Reliability :1 Mark

(any two)

(b) Differentiate between synchronous and asynchronous signals with relevant example. (2)
Synchronous signal :1 Mark
Asynchronous signal :1 Mark
(c) Specify different types of computer network. (2)
LAN/MAN/WAN/PAN :0.5 for each

39
Section –B (15 Marks Question)

Q2. Diagrammatically highlight the difference between simplex, half duplex and full duplex
systems. (15)

Simplex mode :5 Marks

Half duplex mode :5 Marks

Full duplex mode :5 Marks

Q3. Which layer is responsible for process to process delivery? (15)

Transport layer definition :2 Marks

Diagram :3 Marks

Any five functions :10 Marks

Q4. Discover the properties of following and compare them:

TCP and UDP (15)

TCP : 5 Marks

UDP : 5 Marks

Comparison : 5 Marks

Lecture Notes

UNIT 2

40
DHCP and DNS
Domain Name System (DNS) servers provide name resolution for network clients. DNS maintains (among
other things) information that links a computer's fully qualified domain name (FQDN) to its assigned IP
address(es).
While DHCP provides a powerful mechanism for automatically configuring client IP addresses, until recently
DHCP did not notify the DNS service to update the DNS records on the client; specifically, updating the
client name to an IP address, and IP address to name mappings maintained by a DNS server.
Without a way for DHCP to interact with DNS, the information maintained by DNS for a DHCP client may
be incorrect. For example, a client may acquire its IP address from a DHCP server, but the DNS records
would not reflect the IP address acquired nor provide a mapping from the new IP address to the computer
name (FQDN).
In Windows 2000, DHCP servers and clients can register with DNS to provide this update service if the DNS
server supports DNS with dynamic updates. The Windows 2000 DNS service supports dynamic updates. A
Windows 2000 DHCP server can register with a DNS server and update pointer (PTR) and address (A)
resource records on behalf of its DHCP-enabled clients using the DNS dynamic update protocol.
The ability to register both A and PTR type records lets a DHCP server act as a proxy for clients using
Microsoft Windows 95 and Windows NT 4.0 for the purpose of DNS registration. DHCP servers can
differentiate between Windows 2000 and other clients. An additional DHCP option code (option code 81)
enables the return of a client's FQDN to the DHCP server. If implemented, the DHCP server can dynamically
update DNS to modify an individual computer's resource records with a DNS server using the dynamic
update protocol. This DHCP option permits the DHCP server the following possible interactions for
processing DNS information on behalf of DHCP clients that include Option Code 81 in the DHCPRequest
message they send to the server:
● The DHCP server always registers the DHCP client for both the forward (A-type records) and reverse
lookups (PTR-type records) with DNS.
● The DHCP server never registers the name-to-address (A-type records) mapping information for
DHCP clients.
● The DHCP server registers the DHCP client for both forward (A-type records) and reverse lookups
(PTR-type records) only when requested to by the client
DHCP and static DNS service are not compatible for keeping name-to-address mapping information
synchronized. This might cause problems with using DHCP and DNS together on a network if you are using
older, static DNS servers, which are incapable of interacting dynamically when DHCP client configurations
change.
To avoid failed DNS lookups for DHCP-registered clients when static DNS service is in effect, do the
following steps:
1. If WINS servers are used on the network, enable WINS lookup for DHCP clients that use NetBIOS.
2. Assign IP address reservations with an infinite lease duration for DHCP clients that use DNS only and
do not support NetBIOS.

41
Wherever possible, upgrade or replace older, static-based DNS servers with DNS servers supporting updates.
Dynamic updates are supported by the Microsoft DNS service, included in Windows 2000.
Windows Server 2008 is designed around certain roles and features. A role is a primary duty that a server
performs. For example, you typically would point at a server and say "that's my domain controller (DC) and
DNS server." A feature is something that helps a server perform its primary duty (Windows Backup, network
load balancing). Certain roles are comprised of sub-elements called Role Services, which are distinct units of
functionality. For example, within the role of Terminal Services, is the TS Gateway and TS Licensing Role
Services.
 Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program
located in another computer on a network without having to understand the network's details.
A procedure call is also sometimes known as a function call or a subroutine call.
 RPC uses the client-server model. The requesting program is a client and the service providing program
is the server. Like a regular or local procedure call, an RPC is a synchronous operation requiring the
requesting program to be suspended until the results of the remote procedure are returned. However, the
use of lightweight processes or threads that share the same address space allows multiple RPCs to be
performed concurrently.
 RPC is designed to mitigate these issues by providing a common interface between applications. RPC
serves as a go–between for client/server communications. RPC is designed to make client/server
interaction easier and safer by factoring out common tasks, such as security, synchronization, and data
flow handling, into a common library so that developers do not have to dedicate the time and effort into
developing their own solutions.

RPC is a client/server technology in the most generic sense. There is a sender and a receiver; data is
transferred between them. This can be classic client/server (for example, Microsoft Outlook communicating
with a server running Microsoft Exchange Server) or system services within the computer communicating
with each other. The latter is especially common. Much of the Windows architecture is composed of services

42
that communicate with each other to accomplish a task. Most services built into the Windows architecture
use RPC to communicate with each other.

Assignment-2
Set-1
1. Define DHCP. Describe the various benefits of DHCP.
2. What is Remote Procedure Call? Explain its architecture.

3. What is the primary function of the domain controller?

4. Why DHCP is important?

Set-2

1. Write short note on RPC call.


2. What is RPC? Explain the various RPC dependencies.
3. What do you mean by DNS delegation?
4. Difference between primary and secondary server.

Set-3
1. Why Remote Procedure calls are important for a network? Justify the statement.
2. Clarify the concept of static and dynamic address allocation in DHCP.
3. Summarize the main task of DNS.
4. Discuss common terminologies associated with DHCP.

Set-4.
1. What is DHCP? Explain its benefits.

2. What is DNS? How it works with domain name space?

3. How does RPC works? Write down merits and demerits of RPC.
4. Diagrammatically describe the DNS architecture with example.
Set-5
1. Write short note on DNS? Describe domain name hierarchy in detail.
2. Write down the sequence of events during remote procedure call.
3. Explain the working of RPC. Also explain the architecture of RPC.
4. How many types of DNS queries are used? Explain it.

Set-6

1. Explain DHCP Terminologies and Responsibilities.


2. What is the sequence of events during remote procedure call?
3. Define the DHCP relay agent. Write down the various advantages of DHCP.
4. Why hierarchical namespace is important? Describe the DNS domain name types in detail.

43
Set-7

1. How can you configure the DHCP server so that it provides certain devices with the same IP address
each time the address is renewed?
2. Diagrammatically describe the DNS architecture with example.
3. How many types of queries DNS does? Explain it.
4. With the help of an example, Scrutinize DHCP Architecture.

Set-8
1. Define RPC. Describe the architecture of RPC in detail.
2. Why DHCP is important? Demonstrate the working of DHCP.
3. Describe DHCP terminology in detail.
4. Discuss the working of DHCP along with its responsibilities.

Set-9
1. What are the uses of various DNS components .
2. What are the uses of namespace to support DNS?
3. Explain the concept of Name Servers in DNS support.
4. What is the use of resolver in DNS support?

Set-10

1. Explain what is the primary function of the domain controller?


2. Explain what is the way to configure the DHCP server such that it allocates the same IP address to
certain devices each time the address is removed?
3. Write note on domain name server. Discuss the architecture of DNS.
4. Discuss common terminologies associated with DHCP.

Set-11
1. Explain DHCP Terminologies and Responsibilities.
2. Highlight the concept of DNS? Briefly scrutinize domain name hierarchy.
3. Conclude the sequence of events during remote procedure call.
4. Summarize DHCP’s purpose diagrammatically. Scrutinize the handshaking process of DHCP.

Set-12
1. .Explain the architecture of RPC.
2. Explain Domain controller.
3. Conclude the sequence of events during remote procedure call.

4. Highlight the working of RPC. Exemplify the architecture of RPC.

44
Question paper of MST-2 along with marking scheme

45
Lecture Notes
Computers running Windows on a network must be part of a workgroup or a domain. Computers running
Windows on home networks can also be part of a homegroup, but it's not required.

Computers on home networks are usually part of a workgroup and possibly a homegroup, and computers on
workplace networks are usually part of a domain.

 All computers are peers; no computer has control over another computer.
 Each computer has a set of user accounts. To log on to any computer in the workgroup, you must
have an account on that computer.
 There are typically no more than twenty computers.
 A workgroup is not protected by a password.
 All computers must be on the same local network or subnet.
 One or more computers are servers.
 Network administrators use servers to control the security and permissions for all computers on the
domain.
 This makes it easy to make changes because the changes are automatically made to all computers.
 Domain users must provide a password or other credentials each time they access the domain.
 If you have a user account on the domain, you can log on to any computer on the domain without needing
an account on that computer.
 You probably can make only limited changes to a computer's settings because network administrators
often want to ensure consistency among computers.
 There can be thousands of computers in a domain.
 The computers can be on different local networks.

In a Windows network, a domain is a group of server computers that share a common user account database.
A user at a client computer can log in to a domain to access shared resources for any server in the domain.
46
Each domain must have at least one server computer designated as the domain controller, which is ultimately
in charge of the domain.

Most domain networks share this work among at least two domain controllers, so that if one of the
controllers stops working, the network can still function.

A peer-to-peer network can’t have a domain because it doesn’t have a dedicated server computer to act as a
domain controller. Instead, computers in a peer-to-peer network are grouped in workgroups, which are
simply groups of computers that can share resources with each other. Each computer in a workgroup keeps
track of its own user accounts and security settings, so no single computer is in charge of the workgroup.

To create a domain, you have to designate a server computer as the domain controller and configure user
accounts. Workgroups are much easier to administer. In fact, you don’t have to do anything to create a
workgroup except decide on the name you want to use.

Although you can have as many workgroups as you want on a peer-to-peer network, most networks have just
one workgroup. That way, any computers on the network can share resources with any other computer on the
network.

One of the most common mistakes when setting up a peer-to-peer network is misspelling the workgroup
name on one of the computers.

For example, suppose you decide that all the computers should belong to a workgroup named MYGROUP. If
you accidentally spell the workgroup name MYGRUOP for one of the computers, that computer will be
isolated in its own workgroup. If you can’t locate a computer on your network, the workgroup name is one of
the first things to check.

Assignment-3
Set-1
1. Difference between server and client.
2. Differentiate multiprogramming and multiprocessing.
3. CPU scheduling is important. Clarify it.
4. Clarify the concept of file management. Give a detailed description about the file allocation methods.

Set-2
1. Demonstrate the role of operating system acts as memory manager.
2. What is the role of operating system acts as memory manager.
3. Write down the CPU scheduling criteria to pick the best algorithm. Illustrate RR scheduling algorithm
in detail.
4. Differentiate multiprogramming, multiprocessing and multitasking.

Set-3
1. Differentiate symmetric and asymmetric multiprocessing system.
47
2. CPU scheduling is important. Clarify it.
3. Give a details description about the components of operating system.
4. Give a detailed description about different types of operating system.

Set-4
1. Differentiate soft and hard real time system.
2. Why CPU switching is important. Exemplify FCFS and SJF scheduling algorithms in detail with
example.
3. Construct the diagram of process states. Exemplify it.
4. Why CPU switching is important. Exemplify FCFS and SJF scheduling algorithms in detail with
example.

Set-5
1. Exemplify workgroup with example.
2. Why CPU switching is important. Exemplify FCFS and SJF scheduling algorithms in detail with
example.
3. Why operating system is called resource manager? Highlight process management and memory
management in detail.
4. Give a details description about the components of operating system.

Set-6
1. Illustrate the hardware requirements for desktop systems.
2. Describe the difference between domain admin groups and enterprise admin groups.
3. Comparison between local, global and universal groups.
4. How memory is managed by the operating system? Differentiate paging and segmentation.

Set-7
1. Differentiate soft and hard real time system.
2. In what respect are distributed computing systems better than parallel processing systems. Discuss
both.
3. How memory is managed by the operating system? Differentiate paging and segmentation.
4. Differentiate Hard and soft real time systems. State the one example of each.

Set-8
1. Differentiate symmetric and asymmetric multiprocessing system.
2. Highlight the concept of file management. Give a detailed description about the file allocation
methods.
3. Why operating system is called resource manager? Highlight process management and memory
management in detail.
4. Discuss the types of CPU scheduling. Explain the scheduling criteria to check the best algorithm.

Set-9
1. Operating system is called resource manager. Justify it.
2. Why CPU switching is important. Exemplify FCFS and SJF scheduling algorithms in detail with
example.
3. Tabulate the different types of OS along with its functionality.
48
4. Differentiate Hard and soft real time systems. State the one example of each.

Set-10
1. Differentiate preemptive and non-preemptive scheduling.
2. Write down the types of CPU scheduling. In particular, exemplify CPU scheduling algorithms.
3. Give a details description about the components of operating system.
4. Describe clustering systems in detail along with its benefits. Also discuss the types of clustering
system.

Set-11

1. Exemplify workgroup with example.


2. In what respect are distributed computing systems better than parallel processing systems. Discuss
both.
3. Write down the CPU scheduling criteria to pick the best algorithm. Illustrate RR scheduling algorithm
in detail.

4. How memory is managed by the operating system? Differentiate paging and segmentation.

Set-12

1. Illustrate the hardware requirements for desktop systems.

2. Tabulate the different types of OS along with its functionality.

3. Highlight the concept of file management. Give a detailed description about the file allocation
methods.

4. Describe the difference between domain admin groups and enterprise admin groups.

49
Sample Question Bank

50
PPT’s to be uploaded
PPT’s uploaded on UIMS

51
Students Result Analysis after MST-1/MST-2/End Semester Examination

MST-1

Marks %age Number of students


Less than 40 % 54
40-50% 20
50-60% 12
60-70% 5
Above 70% 1

MST-2

Marks %age Number of students


Less than 40 %
40-50%
50-60%
60-70%
70-80%
Above 80%

52
1. Topics on advancement in the subject 3 lectures
Lectur Window T 3: https://msd Explain To be able PPT
e 41 Server 2008 13.1 n.microsoft the to work on Video
.com/en- installati Window
us/library/b on and Server
b742424.as configura 2008
px tion
Lectur Active T 3: https://msd Use of To be able PPT
e 42 Directory 13.2 n.microsoft Activity to use AD
Advanced .com/en- Directory and its
Topics us/library/b component
b742424.as s
px

53
Result Analysis Sheet

Name of Faculty Er. Kanwaldeep Kaur

E-Code E-1435

Division CSE

Program Name Bachelor Of Engineering (Open-Elective)

Course Name Network Operating System

Course Code CSO-446

Semester 7

Year December -2019

Total Students Appeared :

Max. Marks : 100

Average Marks :

Highest Marks :

Lowest Marks :

Marks Range (Internal+External) No. of Students

Less than 40

40-50

51-60

61-70

71-80

81-90

91-100

Total

Grade No. of Students

A+

54
A

B+

C+

Observations by Faculty:

Here we have whole range of grades, but some students got fail in the subject. Subject is easy but
students did not show their interest in studies due to placements.

Suggestions and steps that will be taken to improve the result in future:

If students skip their classes due to any reason like placements, interviews, then there should be extra
classes for those students

Signature of the Faculty

Date:

55
56

Das könnte Ihnen auch gefallen