V Sem Syllabus 2020-21200121020338270921011611
V Sem Syllabus 2020-21200121020338270921011611
Course Outcomes: At the end of the course student will be able to:
CO 1 Analyze the structure of OS and basic architectural components involved in OS design.
CO 2 Analyze various file systems and disk scheduling algorithms.
CO 3 Analyze and implement process synchronization and CPU scheduling techniques. Explain the
cause and effect related to deadlocks and to analyze them related to common circumstances in
operating systems.
CO 4 Explain the basics of memory management, the use of virtual memory in modern operating
systems.
CO 5 Illustrate the network and distributed operating system along with security and threat
protection.
COURSE CONTENT:
Unit I:
Introduction to System Programs & Operating Systems, Evolution of Operating System (mainframe, desktop,
multiprocessor, Distributed, Network Operating System, Clustered & Handheld System), Operating system
services, Operating system structure, System Call & System Boots, Operating system design & Implementations,
System protection, Buffering & Spooling. Types of Operating System: Bare machine, Batch Processing, Real
Time, Multitasking & Multiprogramming, time-sharing system.
Unit II:
File: concepts, access methods, free space managements, allocation methods, directory systems, protection,
organization ,sharing & implementation issues, Disk & Drum Scheduling, I/0 devices organization, I/0 devices
organization, I/0 buffering, I/O Hardware, Kernel I/O subsystem, Transforming I/O request to hardware operations.
Device Driver: Path managements, Sub module, Procedure, Scheduler, Handler, Interrupt Service Routine. File
system in Linux & Windows
Unit III:
Process: Concept, Process Control Blocks(PCB), Scheduling criteria Preemptive & non Preemptive process
scheduling, Scheduling algorithms, algorithm evaluation, multiple processor scheduling, real time scheduling,
operations on processes, threads, inter process communication, precedence graphs, critical section problem,
semaphores, classical problems of synchronization. Deadlock: Characterization, Methods for deadlock handling,
deadlock prevention, deadlock avoidance, deadlock detection, recovery from deadlock, Process Management in
Linux.
Unit IV:
Memory Hierarchy, Concepts of memory management, MFT & MVT, logical and physical address space,
swapping, contiguous and non-contiguous allocation, paging, segmentation, and paging combined with
segmentation. Structure & implementation of Page table. Concepts of virtual memory, Cache Memory
Organization, demand paging, page replacement algorithms, allocation of frames, thrashing, demand
segmentation.
Unit V:
Distributed operating system:-Types, Design issues, File system, Remote file access, RPC, RMI, Distributed
Shared Memory(DSM), Basic Concept of Parallel Processing & Concurrent Programming Security & threats
protection: Security violation through Parameter, Computer Worms & Virus, Security Design Principle,
Academic Session2020-21
Authentications, Protection Mechanisms. Introduction to Sensor network and parallel operating system. Case study
of Unix, Linux & Windows
List of Experiment:
1. Write a program to implement FCFS CPU scheduling algorithm.
2. Write a program to implement SJF CPU scheduling algorithm.
3. Write a program to implement Priority CPU Scheduling algorithm.
4. Write a program to implement Round Robin CPU scheduling algorithm.
5. Write a program to compare various CPU Scheduling Algorithms over different Scheduling Criteria.
6. Write a program to implement classical inter process communication problem(producer consumer).
7. Write a program to implement classical inter process communication problem(Reader Writers).
8. Write a program to implement classical inter process communication problem(Dining_Philosophers).
9. Write a program to implement & Compare various page replacement algorithm.
10. Write a program to implement & Compare various Disk & Drum scheduling Algorithms
11. Write a program to implement Banker’s algorithms.
12. Write a program to implement Remote Procedure Call(RPC).
13. Write a Devices Drivers for any Device or peripheral.
References:
1. Silberschatz ,”Operating system”, Willey Pub.
2. Stuart,”Operating System Principles, Design & Applications”,Cengage Learning
3. Tannanbaum, “Modern operating system”,PHI Learning
4. Dhamdhere, ”Operating System”,TMH.
5. Achyut S Godbole,”Operating System”, TMH.
6. William stalling, “operating system” Pearson Edu.
7. Deitel & Deitel, “Operating Systems”, Pearson Edu.
8. Flynn & Mchoes, “Operating Systems”, Cengage Learning
9. Haldar, “Operating System”, Pearson Edu.
Academic Session2020-21
UIT-RGPV (Autonomous) Bhopal
CO (Course Objectives)
CO502.1 Learn and practice basics and data modeling using the entity-relationship and developing
database designs
CO502.2 Understand the use of Structured Query Language (SQL) and learn SQL syntax.
Course Content
Unit I-DBMS Concepts and architecture Introduction, Database approach v/s Traditional file accessing
approach, Advantages, of database systems, Data models, Schemas and instances, Data independence,
Data Base Language and interfaces, Overall Database Structure, Functions of DBA and designer, ER data
model: Entitles and attributes, Entity types, Defining the E-R diagram, Concept of Generalization,
Aggregation and Specialization. Transforming ER diagram into the tables. Various other data models
object oriented data Model, Network data model, and Relational data model,
Comparison between the three types of models.
Unit II-Relational Data models: Domains, Tuples, Attributes, Relations, Characteristics of relations,
Keys, Key attributes of relation attributes of relation languages: SQL-DDL, DML, integrity constraints,
Complex queries, various joins, indexing, triggers, sertions,Relational algebra and relational calculus,
Relational algebra operations like select,Project,Join, Division, outer union. Types of relational calculus
i.e. Tuple oriented and domain oriented relationalcalculus and its operations .
Unit III-Data Base Design: Introduction to normalization, Normal forms, Functional dependency,
Decomposition,Dependency preservation and losless join, problems with null valued and dangling tuples,
multivalued dependencies. Query Optimization: Introduction, steps of optimization, various algorithms to
implement select, projectand join operations of relational algebra, optimization methods: heuristic based,
cost estimation based.
Unit IV -Transaction Processing Concepts: - Transaction System, Testing of Serilizability, Serializability
ofschedules, conflict & view serializable schedule, recoverability, Recovery from transaction failures.
Log basedrecovery. Checkpoints deadlock handling. Concurrency Control Techniques: - Concurrency
Control, lockingTechniques for concurrency control, time stamping protocols for concurrency control,
validation based protocol,multiple granularity. Multi version schemes, Recovery with concurrent
transaction. Introduction to Distributeddatabases, data mining, data warehousing, Object Technology and
DBMS, Comparative study of O ODBMS Vs DBMSTemporal, Deductive, Multimedia, Web & Mobile
database .
Academic Session2020-21
Unit V Study of Relational Database Management Systems through Oracle/Postures SQL/MySQL:
Architecture,physical files, memory structures, background process. Concept of table spaces, segments,
extents and block.Dedicated server, multi-threaded server.Distributed database, database links, and
snapshot. Data dictionary, dynamic
performanceview. Security, role management, privilege management, profiles, invoker defined security
model. SQLqueries, Data extraction from single, multiple tables equi-join, non equi-join, self-join, outer
join. Usage of like, any,all, exists, in Special operators. Hierarchical queries, inline queries, flashback
queries. Introduction of ANSI SQL,anonymous block, nested anonymous block, branching and looping
constructs in ANSI SQL. Cursor management:nested and parameterized cursors, Oracle exception
handling mechanicDBMS. Stored procedures, in, out, in out typeparameters, usage of parameters in
procedures. User defined functions their limitations. Triggers, mutating errors,instead of triggers.
Suggested Reading:-
1. Date C J, “An Introduction To Database System”, Pearson Educations
2. Korth, Silbertz,Sudarshan, “Fundamental of Database System”, McGraw Hill
3. Rob, “ Data Base System:Design Implementation & Management”, CengageLearninig
4. Elmasri, Navathe, “Fundamentals Of Database Systems”, Pearson Educations
5 .AtulKahate , “ Introduction to Database Management System”, Pearson Educations
6. Oracle 9i Database Administration Fundamental-I, Volume I, Oracle Press,TMH.
7. Paneerselvam,”DataBase Management System”, PHI Learning
8. dev.mysql.com 9. www.postgressql.org
Academic Session2020-21
UIT-RGPV (Autonomous) Bhopal
Semester : V
Course Objectives
Unit-I Introduction to Raster Scan displays, Pixels, Frame buffer, Vector & Character
generation, Random Scan systems, Display devices, Scan Conversion techniques, Line Drawing:
simple DDA, Bresenham’s Algorithm, Circle Drawing Algorithms: Midpoint Circle drawing
and Bresenham’s Algorithm, Polygon fill algorithm: Boundary-fill and Flood-fill algorithms
Unit-III 3-D Transformations: Translation, Rotation and Scaling. Parallel & Perspective
Projection: Types of Parallel & Perspective Projection, Hidden Surface elimination: Depth
comparison, Back face detection algorithm, Painter’s Algorithm, Z-Buffer Algorithm. Curve
generation, Bezier and B-spline methods. Basic Illumination Model: Diffuse reflection, Specular
reflection, Phong Shading, Gouraud shading, Ray Tracing, Color models like RGB, YIQ, CMY,
HSV.
Academic Session2020-21
Unit-IV Multimedia : Characteristics of a multimedia presentation , Uses of Multimedia, Text –
Types, Unicode Standard ,text Compression, Text file formats, Audio Components of an audio
system, Digital Audio, Digital Audio processing, Sound cards, Audio file formats ,Audio
Processing software ,Video-Video color spaces,Digital Video, Digital Video processing, Video
file formats.
References:
List of Experiments
1. To Study various in build graphics functions in C library.
2. Write a program to draw a line using DDA algorithm.
3. Write a program to draw a line using Bresenham‘s algorithm.
4. Write a program to draw a circle using midpoint algorithm.
5. Write a program to draw a circle using Bresenham‘s algorithm.
6. Write a program to draw a rectangle using line drawing algorithm.
7. Write a program to perform 2D Transformation on a line.
8. Write a program to perform rotation transformation on a triangle.
9. Write a program to implement Cohen Sutherland line clipping algorithm .
10.Write a program for making Bezier curve
Academic Session2020-21
UIT-RGPV (Autonomous) Bhopal
Semester: V
CO504.3 Understand about the Physical layer, Interface standards and Connecting
devices in communication.
CO504.4 Study about the Transmission media, Infrared & Satellite Communication
system . Telephone Network and communication network.
CO504.5 Recognize and understand about transmission errors and error correcting
methods.
COURSE CONTENT:
UNIT: - I Data Communication: Introduction, Components, data representation, data flow and basic
model, Serial & Parallel transmission, Modes of data transmission, Encoding: Unipolar, Polar, Bipolar,
Line & Block codes. Data compression: Lossy & Lossless techniques. Review of analog & digital
transmission methods.
UNIT:-2 Multiplexing: Introduction & History, FDM, TDM, WDM, Synchronous & Statistical TDM.
Spread spectrum: Frequency Hopping & Direct Sequence. Terminal handling & Polling. Network
Switching Techniques: Circuit, Message, Packet & Hybrid. X.25, ISDN.
UNIT:-3 Physical Layer: Introduction, Interface, Standards, EIA-232-D, RJ-45, RJ-11, BNC connector
& EIA-449 digital Interface: Connection, specifications & configuration. Modem: Types, features, signal
Academic Session2020-21
constellation, block schematic. Connecting Devices: Active and Passive Hubs, Repeaters, Bridges, Two
& Three layer switches & Gateway. Network Topologies and their comparative study.
UNIT:-4 Transmission Media: Transmission line characteristics, distortions, Crosstalk. Guided Media:
Twisted Pair, Baseband & Broadband Coaxial, Fiber Optic Cable. Unguided media: Electromagnetic
polarization , Rays and waves front , Electromagnetic spectrum, Radiation & Propagation of Waves,
Inverse square law , Wave attenuation and absorption, Terrestrial Propagation, Skip distance , Radio
waves, Microwave , Infrared & Satellite Communication system . Telephone Network: Components,
LATAs, signaling and Services, Digital Subscriber Line: ADSL, HDSL, SDSL, VDSL, Cable TV
network for data transfer.
UNIT:-5 Transmission Errors: Content Error, Flow integrity error, Error detection, Error correction, Bit
error rate. Error detection & Correction methods: Parity checking, Checksum Error Detection, Cyclic
Redundancy Check , Hamming Distance , Interleaved codes , Block Parity , Convolution code, Hardware
Implementation, Checksum .
References:
1. Gupta Prakash C. “Data communication”, PHI Learning
2. Forouzan, “Data communication and Networking”, 5e, TATA Mc Graw
3. Godbole A., “Data Communication & Network” , TMH
4. Miller, “ Data Network and Comunication”, Cengage Delmar Learning
5. Stallings William , “Data & Computer Communication”, Pearson Education
6. Tanenbum A.S. “Computer Network”, Pearson Education.
7. Kennedy G., “Communication Systems” MGH.
Academic Session2020-21
UIT-RGPV (Autonomous) Bhopal
Subject code-CS-511 Subject: Cyber Security
Semester: V
For credits & marks refer your scheme
Course Outcomes: At the end of the course student will be able to:
CO 511.1 Evaluate the computer network and information security needs of an organization.
CO 511.2 Describe various cybercrimes along with perceptions of cyber criminals.
CO 511.3 Explain the law perspective of all cybercrimes.
CO 511.4 Explain Relevancy, Admissibility, proof and probative value of e-evidence.
CO 511.5 Describe tools and methods used in cybercrime.
COURSE CONTENT:
UNIT 1
UNIT 2
Web jacking, Online Frauds, Software Piracy, Computer Network Intrusions, Password Sniffing, Identity Theft,
cyber terrorism, Virtual Crime, Perception of cyber criminals: hackers, insurgents and extremist group etc. Web
servers were hacking, session hijacking.
UNIT 3
Cyber Crime and Criminal justice: Concept of Cyber Crime and the IT Act, 2000, Hacking, Teenage Web Vandals,
Cyber Fraud and Cheating, Defamation, Harassment and E-mail Abuse, Other IT Act Offences, Monetary
Penalties, jurisdiction and Cyber Crimes, Nature of Criminality, Strategies to tackle Cyber Crime and Trends.
UNIT 4
The Indian Evidence Act of 1872 v. Information Technology Act, 2000: Status of Electronic Records as Evidence,
Proof and Management of Electronic Records; Relevancy, Admissibility and Probative Value of E-Evidence,
Proving Digital Signatures, Proof of Electronic Agreements, Proving Electronic Messages.
UNIT 5
Tools and Methods in Cybercrime: Proxy Servers and Anonymizers, Password Cracking, Keyloggers and Spyware,
virus and worms, Trojan Horses, Backdoors, DoS and DDoS Attacks , Buffer and Overflow, Attack on Wireless
Networks, Phishing : Method of Phishing, Phishing Techniques.
References:
Academic Session2020-21
UIT-RGPV (Autonomous) Bhopal
COURSE OBJECTIVES:
The purpose of this subject is to cover the concepts, Installation Process, Hardware Requirements and features
of Unix/Linux. Basic Commands & Shell Programming. The students should have general Idea about
computing fundamentals & operating system and at least one year of experience in programming.
COURSE CONTENT:
Overview of Unix/Linux: -
Concepts, Unix/Linux Installation Process, Hardware Requirements for Unix/Linux ,Advantages of Unix/Linux,
Reasons for Popularity and Success of Linux/Unix Operating System, Features of Linux/Unix Operating
System, Kernel, Kernel Functions, The Shell Basic Commands, Shell Programming:-Shell Variables, Branching
Control Structures, Loop-Control Structure, Continue and break Statements, Sleep Command, Debugging
Script. Use of Linux as web-server, file server, directory server, application server, DNS server, SMTP server,
Firewall, Proxy server.
File System: - Definition of File System, Defining Geometry, Disk Controller, Solaris File System, Disk Based
File Systems, Network-Based File Systems, Virtual File systems, UFS File System, The Boot Block, The Super
Block, The Inode, Tuning File System, Repairing File System.
Process Control: - Viewing a Process, Command to display Process, Process Attributes, Process States, Process
Fields, PS Commands options, PGREP, PRSTAT, CDE Process Manager, Scheduling Process, Scheduling
Priorities, Changing the Priority of a time-sharing process, Killing.
Process System Security: -Physical Security, Controlling System Access, Restricted Shells Controlling File
Access, File Access Commands, Access Control List(ACLs), Setting ACL Entries, Modifying ACL entries on a
file, Deleting ACL entries on a file, Restricting FTP, Securing Super User Access, Restricting Root Access,
Monitoring super user Access, TCP Wrappers.
Dynamic Host Configuration Protocol: - Introduction, DHCP Leased Time, DHCP Scopes, DHCP IP
Address, Allocation Types, Planning DHCP Deployment, DHCP Configuration files, Automatic Startup of
DHCP Server, Configuration of DHCP Clients, Manually Configuring the DHCP.
Case Study: -
Installation of Linux, Customization of Linux, Installation of SAMBA, APACHE, TOMCAT, Send MAIL,
Postfix, Implementation of DNS, LDAP services, Firewall, Proxy server.
List of Experiments:-
1. To Study basic & User status Unix/Linux Commands.
2. Study & use of commands for performing arithmetic operations with Unix/Linux.
3. Create a file called wlcc.txt with some lines and display how many lines, words and characters are present in
that file.
Academic Session2020-21
4. Append ten more simple lines to the wlcc.txt file created above and split the appended file into 3 parts.
What will be the names of these split files? Display the contents of each of these files. How many lines will be
there on the last file?
5. Given two files each of which contains names of students. Create a program to display only those names
that are found on both the files.
6. Create a program to find out the inode number of any desired file.
7. Study & use of the Command for changing file permissions.
8. Write a pipeline of commands, which displays on the monitor as well as saves the information about the
number of users using the system at present on a file called usere.ux.
9. Execute shell commands through vi editor.
10. Installation, Configuration & Customizations of Unix/Linux.
11. Write a shell script that accepts any number of arguments and prints them in the reverse order.
12. Write a shell script to find the smallest of three numbers that are read from the keyboard.
13. Write a shell script that reports the logging in of a specified user within one minute after he/she logs in.
The script automatically terminates if the specified user does not login during a specified period of time.
14. Installation of SAMBA, APACHE, TOMCAT.
15. Implementation of DNS, LDAP services,
16. Study & installation of Firewall proxyserver
References:
Academic Session2020-21
UIT-RGPV (Autonomous)
Bhopal
COURSE OUTCOME
Course Contents
EVALUATION