Post on 20-Oct-2019
DEV BHOOMI INSTITUTE OF
TECHNOLOGY
DEHRADUN Department of Computer Science and Engineering
HAND BOOK
Session 2017-18
Class :8th Sem/4th Year
Prerequisite: Knowledge of Object Oriented Programming
Objective: 1. To understand concepts, terms and technologies used in website designing.
2. To learn the basic HTML, XML, Dynamic HTML and JavaScript for Web designing. 3. To attain necessary knowledge and skills in using various technologies and tools for website
development.
4. To learn interactive and social web services like AJAX and Ruby on Rails.
UNIT I:
Internet Principles and Components: History of the Internet and World Wide Web-
HTML; protocols – HTTP, SMTP, POP3, MIME, IMAP. Domain Name Server, Web Browsers and Web Servers
UNIT II: HTML, DHTML and XML List, Tables, Images, Forms, Frames, CSS Document type definition, Dynamic HTML, XML
schemes, Object Models, Presenting XML, Using XML Processors: DOM and SAX, Introduction
to Java Script, Object in Java Script, Dynamic HTML with Java Script.
UNIT III: Web Services
Introduction to Web Services, UDDI, SOAP, WSDL, Web Service Architecture, Developing
and deploying web services. Ajax – Improving web page performance using Ajax, Programming in Ajax. CORBA,
UNIT IV: Web 2.0
Interactive and social web: Blogs, wikis, and social networking sites – The technology behind these applications- AJAX, RSS and syndication, Ruby on Rails, Open APIs,
UNIT V:
Web 3.0: Semantic Web, Widgets, drag & drop mashups (iGoogle) - The technology behind
these applications- RDF
Web based Information Systems, Search engines, Recommender Systems, Web Mining
Books:
1. Burdman, “Collaborative Web Development” Addison Wesley.
Dev Bhoomi Institute Of Technology
SEMESTER: IV
Department of Computer Science & Engineering
Course Level: Beginner Course Type: Core Credit:
Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:
100/50
Course Title: INTRODUCTION TO WEB TECHNOLOGY
Course Code:TCS-802 Duration of External Exam: 3
Hours
2. Chris Bates, “Web Programing Building Internet Applications”, 2nd Edition,
WILEY, Dreamtech
3. Joel Sklar , “Principal of web Design” Vikash and Thomas Learning
4. Jon Duckett, “Beginning Web Programming with HTML, XHTML, and CSS”, Wiley India Pvt Ltd (June 2008)
5. http://ugweb.cs.ualberta.ca/~c410/F06/schedule/index.html
Course Outcome Description
CO1 Ability to apply the design principles, techniques and technologies to
the development of creative websites.
CO2 Ability to use web services for efficient website development.
CO3 Implement the advanced concepts of java services such as UDDI, SOAP,
and WSDL; create dynamic web pages & Programming in Ajax.
CO4 To focus on interactive web services.
CO5 Ability to create web based information systems, knowledge about data
mining.
DBIT DEHRADUN
LESSON PLAN
SEMESTER/YEAR: 8th
/4th
yr DEPARTMENT : CSE
COURSE: Introduction to Web Technology COURSE CODE : TCS-802
S.
No.
Topic Name
Reference/
Text Book/
Web
(R/T/W)
No. Of
Lectures
Delivery
Method
Remarks
1. History of internet, world wide web, HTML T2,R1 1 Chalk &Talk
2. Internet protocols-HTTP,SMTP.POP3 T2
2 Chalk &Talk
3. MIME , IMAP T1, R2 1 PPT
4. web browser ,Web server, T2,R1 1 Chalk &Talk
5. Creating web sites, security threats of web R1
1 Chalk &Talk
6. HTML-List , tables,images T2 1 Chalk &Talk
7. HTML-Form , frames T2 1 Chalk &Talk
8. CSS Document type definition, dynamic HTML T2 2 PPT
9. XML schemes, object models T1, R2 1 Chalk &Talk
10. Presenting XML
T1, R2 1 Chalk &Talk
11. Using XML processor-DOM and SAX T1, R2 1 Chalk &Talk
12. Introduction to java script T2 1 Chalk &Talk
13. Objects in java script T2 1 Chalk &Talk
14. Dynamic HTML with java script T1 1 Chalk &Talk
15. Java Script and HTML Programs T1 1 Chalk &Talk
16. Introduction to web services T1, R2 1 Chalk &Talk
17. UDDI T1, R2 1 PPT
18. SOAP T1, R2 1 PPT
19. WSDL T1, R2 1 PPT
20. Web Service Architecture T1, R2 1 PPT
21. Developing and deploying web services. T2,R1 1 Chalk &Talk
22. Ajax – Improving web page performance using Ajax R1
2 Chalk &Talk
23. Programming in Ajax-1 T2 1 Chalk &Talk
24. Programming in Ajax-2 T2 1 Chalk &Talk
25. COBRA T2 1 PPT
26. Introduction to interactive and social web T1, R2 1 PPT
27. Blogs, wikis T1, R2 2 PPT
28. Social networking sites T1, R2 1 PPT
29. The technology behind these application-AJAX, RSS T2 1 PPT
30. Syndication T2 1 Chalk &Talk
31. Ruby on rails T1 1 Chalk &Talk
32. Open API’s T1 1 PPT
33. Semantic web T1, R2 1 PPT
34. Widgets T1, R2 1 PPT
35. Drag and drop mashups(iGoogle) T2,R1 1 Chalk &Talk
36. The technology behind these application-RDF R1
1 Chalk &Talk
37. Web based Information Systems T2 1 Chalk &Talk
38. Search engines, T2 1 Chalk &Talk
39. Recommender Systems T2 1 Chalk &Talk
40. Web Mining T1, R2 1 Chalk &Talk
Total Lectures: 43
REMARKS/RECOMMENDATIONS FOR FUTURE:
EXTRA CLASS TAKEN (IF ANY):
TEXT BOOKS:
[T1] Burdman, Collaborative Web Development Addison Wesley.
[T2] Jon Duckett, Beginning Web Programming with HTML, XHTML, and CSS , Wiley India Pvt Ltd
REFERENCE BOOKS:
[R2] Chris Bates, Web Programing Building Internet Applications , 2nd Edition, WILEY, Dreamtech
[R3] Joel Sklar , Principal of web Design Vikash and Thomas Learning
Signature of HOD:__________
Date: __________
1. What do you mean by Web technologies? Write down the various steps to develop a
multi departmental website.
2. Explain the SOAP web service in AJAX.
3. How the result set of Mysql be handled in PHP?
4. What is the difference between developing a site for co corporate world and developing a
site for an individual?
5. Write a PHP script to sort the elements of an array.
6. What types of primary data structures are supported in Perl? Discuss.
7. Describe the role of W3C.Also give the primary hosts for W3C?
8. How to search for a page using Perl language elements?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT
Course Name: Web Technologies Assignment No. 1
Course Code:TCS-802
Faculty :
Branch: CSE Semester: 5th
Unit 1: Introduction to Web Technologies Date of Issue: Date of Submission:
1. What is form? How are form created for a website? What is the function of submit button on a form.
2. Define class. Explain how to create a class and its objects in Ruby.
3. How will you create hyperlinks in Web documents? Discuss on different attributes of
Creating a Hyperlink.With an example program explain Pattern Matching in Ruby.
4. What is JavaScript? Why do you think JavaScript plays important role in web designing.
5. What is Script Manager in AJAX?
6. Differentiate between for and fore each statements in PHP.
7. What are the arguments that are used frequently in Perl?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT
Course Name: Web Technologies Assignment No. 2
Course Code:TCS-802
Faculty :Mr. Kuldeep Bhauguna
Branch: CSE Semester: 5th
Unit 2 : Date of Issue: Date of Submission:
1. What is the underlying technology of all the other web services technologies and what great
benefit does this technology provide.
2. How does a symbol differ from a string in Ruby language?
3. What are Web services and why we need web services?
4. Create a HTML which uses CSS that gives all H1 and H2 elements a padding of 0.5 ems; a
grooved border style and a margin of 0.5 ems.
5. Explain the terms
a) SOAP
b) UDDI
c) WSDL
6. What is the difference between traditional web application and AJAX?
7. Write a program to read current time and date using AJAX application?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT
Course Name: Web Technologies Assignment No. 3
Course Code:TCS-802
Faculty :Mr. Kuldeep Bhauguna
Branch: CSE Semester: 5th
Unit 3: Date of Issue: Date of Submission:
1. What is RDF? What formats can RDFbe represented in?
2. What do you understand by social networking sites? Why these sites are called
interactive?
3. Is Ruby is a Scripting Language or Compiled Language?
4. What is the difference between Blogs and Social networking sites?
5. Why RSS? Benefits and Reasons for using RSS?
6. Write short notes on:
A) Wikis
B) Blogs
C) Social networking sites
D) Open API’s
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT
Course Name: Web Technologies Assignment No. 4
Course Code:TCS-802
Faculty :Mr. Kuldeep Bhauguna
Branch: CSE Semester: 5th
Unit 4: Date of Issue: Date of Submission:
1. Write a PHP Code to determine whether a given number is an ‘PERFECT NUMBER’ or
not. [Eg: 6 is a perfect number, since its factors including 1(but not the number itself)
sum to the number i.e., 1+2+3 = 6]
2. What is RSS? What problem does RSS solve?
3. What are search engines? Why it is used? How it is designed?
4. Explain RDF and give details about classes and properties in RDF.
5. What are search engines? Why it is used? How it is designed?
6. Write a short note on:
a) Recommender Systems
b) Web mining
c) Search engine
d) Widgets
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT
Course Name: Web Technologies Assignment No. 5
Course Code:TCS-802
Faculty :Mr. Kuldeep Bhauguna
Branch: CSE Semester: 5th
Unit 5: Date of Issue: Date of Submission:
1. Explain the SOAP web service in AJAX.
2. How the result set of Mysql be handled in PHP?
3. Write a PHP script to sort the elements of an array.
4. What types of primary data structures are supported in Perl? Discuss.
5. How to search for a page using Perl language elements?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name: Web Technologies Tutorial No. 1
Course Code:TCS-802
Faculty :
Branch: CSE Semester: 5th
Unit 1: Introduction to Web Technologies Date of Issue: Date of Submission:
1. Define class. Explain how to create a class and its objects in Ruby.
2. With an example program explain Pattern Matching in Ruby.
3. What is Script Manager in AJAX?
4. Differentiate between for and fore each statements in PHP.
5. What are the arguments that are used frequently in Perl?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name: Web Technologies Tutorial No. 2
Course Code:TCS-802
Faculty :Mr. Kuldeep Bhauguna
Branch: CSE Semester: 5th
Unit 2 : Date of Issue: Date of Submission:
1. How does a symbol differ from a string in Ruby language?
2. Create a HTML which uses CSS that gives all H1 and H2 elements a padding of 0.5 ems; a
grooved border style and a margin of 0.5 ems.
3. What is Document object model? Discuss the various DOM methods used with JavaScript.
4. Write a script that reads an integer and determines whether it is PRIME Number or Not.
5. Give a brief note on DOM parser.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name: Web Technologies Tutorial No. 3
Course Code:TCS-802
Faculty :Mr. Kuldeep Bhauguna
Branch: CSE Semester: 5th
Unit 3: Date of Issue: Date of Submission:
1. Design an XML schema for hospital information management.
2. Explain how a DTD is created with an example.
3. Is AJAX code cross browser compatible? Explain.
4. Discuss the role of WSDL web service in AJAX.
5. Explain the user defined functions in PHP with an example.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name: Web Technologies Tutorial No. 4
Course Code:TCS-802
Faculty :Mr. Kuldeep Bhauguna
Branch: CSE Semester: 5th
Unit 4: Date of Issue: Date of Submission:
1. Write a PHP Code to determine whether a given number is an ‘PERFECT NUMBER’ or
not. [Eg: 6 is a perfect number, since its factors including 1(but not the number itself)
sum to the number i.e., 1+2+3 = 6]
2. List and explain the operators used in Perl.
3. Write a Perl script to create a form to mail.
4. Discuss about simple I/O statements in Ruby.
5. Explain Hashes and Methods in Ruby with examples.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name: Web Technologies Tutorial No. 5
Course Code:TCS-802
Faculty :Mr. Kuldeep Bhauguna
Branch: CSE Semester: 5th
Unit 5: Date of Issue: Date of Submission:
1. What do you mean by Web technologies? Write down the various steps to develop a multi departmental website. (UPTU 2006-7)
2. Briefly discuss the history of web? 3. What do you mean by protocol? Name three protocols that govern the web and explain
about them. (UPTU 2005-6)
4. What is the difference between developing a site for co corporate world and developing a site for an individual? (UPTU 2005-6)
5. Explain the following terms:- (UPTU 2005-6) i. FTTP ii. HTTP iii. WWW iv. Portal v. URL 6. What is HTML? Explain its purpose .Write the names of any five important HTML tags
and their syntax. (UPTU 2005-6)
7. Explain the concept of IP address .Also discuss the various field in IP datagram header.( UPTU 2006-7)
8. Explain the use of SMTP protocol. (UPTU 2005-6) 9. What are the differences between a traditional project and a web project. Also write some
objectives to develop a Web project (UPTU 2009-10)
10. Describe the role of W3C.Also give the primary hosts for W3C? (UPTU 2008-9) 11. Explain various protocols governing Web? (UPTU 2008-9) 12. What are Web standards and why should we use them? What is the difference in testing a
CLIENT-SERVER application and a WEB application? (UTU-2012)
13. What do you mean by protocol? Give the name of those protocols, which help in web and explain the working of those protocols.( UTU-2012)
14. To be current, that is to up-to –date, is an important feature of the internet. Why is this important and what impact is this having on society? (UTU-2012)
15. Are all web browsers capable of displaying all types of pages served by Web servers? Should the names of all web servers must start with the prefix www..? (UTU-2012)
16. What is the main purpose of DNS server? Describe forward and reverse Lookup? (UTU-2012)
17. What do you mean by Cyber crime .How the cyber crimes can be checked. (UPTU 2007-8)
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Web Technology Question bank no. 1
Course Code: TCS 802 Faculty: Mr. Kuldeep Bahuguna
Branch: CSE Semester: 7th
Unit/Title: UNIT 1
Date of Conduction:
18. Name some tools along with their application that may be used for developing Web sites (UPTU 2009-10)
19. Describe the following with suitable example-(UPTU2008-9) I. Web application II. Target Users 20. Who are the people that you need to develop your Website? What are the essential skills
that must be identified while selecting the members of team? (UPTU 2009-10)
21. What is the difference between Local and Remote login? Why does Telnet protocol require a time sharing operating g system?( UPTU 2006-07)
22. Discuss the various Web project development Phases in detail (UPTU-2006-7)
1. Differentiate between the following:- (UPTU-2009-10) i) HTML and DHTML ii) ROWSPAN and COLSPAN
2. What is form? How are form created for a website? What is the function of submit button on a form
3. Explain the Static and Dynamic Web pages .Explain the HTML tags for FRAME and FORM with the help of suitable example. (UPTU 2006-7)
4. How will you create hyperlinks in Web documents? Discuss on different attributes of Creating a Hyperlink. (UPTU 2009-10)
5. Why does FORM an important tag in Web application? Explain attributes ACTION and METHOD. (UPTU 2008-09)
6. Write short note on DOM. (UPTU-2009-10) 7. What is JavaScript? Why do you think JavaScript plays important role in web designing. 8. What are dialogue box? Explain different types of dialogue boxes? 9. What is XML .Explain the parsing in XML. Also mention the application s of XML.
(UPTU-2009-10)
10. Justify the need for client side scripting languages. How do you perform client side validation using Java script? (UPTU-2009-10)
11. Define CSS. Write CSS rule that make all the text 2.5 larger than the base font of the system.(UPTU-2008-09)
12. Explain the term SAX with suitable example. (UPTU- 2008-09) 13. Specify the tag and attributes used to create a Textbox which can accept maximum of 20
characters with a default value “Enter Name”.(UTU-2012) 14. Explain events in java script and their event handlers.(UTU-2012) 15. What is DTD (Documents type definitions) in XML? Illustrate with suitable example.
(UTU-2012)
16. Write salient feature of Java Script. And also discuss the significance of any two predefined object of Java Script. (UTU-2012)
17. Write a JavaScript that finds the smallest of given N integers.(UPTU-2008-9) 18. What are cascading sheets and how are they coded. Explain them with an
example.(UPTU 2009-10)
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Web Technology Question bank no. 2
Course Code: TCS 802 Faculty: Mr. Kuldeep Bahuguna
Branch: CSE Semester: 7th
Unit/Title: UNIT 2
Date of Conduction:
19. Create a DTD for mark statement of a student. Write a program to retrieve the elements and attributes of XML document and display the mark statement in table format. (UTU-
2012)
20. Explain events in Java script and their event handlers. ( UTU-2012) 21. Write salient features of Java script .And also discuss the significance of any two
predefined object in JavaScript. (UTU-2012)
22. Write the history of DOM. 23. List out the levels of DOM. 24. How to access the element in Java Script? 25. Write the difference between Event and Event Handling. 26. How to create text box and button in DOM? 27. Write the few of events and tags in DOM. 28. List out the phases of DOM2. 29. Define Event Propagation. 30. Differentiate between DOM and SAX.
1. What is Web Services with example? 2. What is the underlying technology of all the other web services technologies and what great
benefit does this technology provide.(UTU-2012)
3. Describe the major sections of a WSDL document and what WSDL components are contained in each section. (UTU-2012)
4. What is WSDL? 5. List out the elements in WSDL. 6. List out data types that are available in Web-Service 7. What are UDD APis and what are they used for? List the categories of operations for each
API. (UTU-2012).
8. What are Web services and why we need web services? 9. Sketch the Structure of SOAP. 10. What is SOAP? 11. Explain the architecture of Web services? 12. Explain the terms a)SOAP
b) UDDI
c) WSDL
13. Differentiate between SOAP and HTTP. 14. Steps for creating the Web-Services. 15. Explain in detail about writing the Web-Service and Java Web Service Client. 16. What is AJAX? Explain the purpose and uses of AJAX. 17. Explain the approach for the browser to work with AJAX 18. What is the difference between traditional web application and AJAX? 19. Explain about security of the AJAX based web applications. 20. What are the advantages and disadvantages of using AJAX? 21. What are two types of Ajax based frameworks used in the web programming? 22. Write a program to read current time and date using AJAX application? 23. Design a login page to validate the user and show alert message if username and
password is not correct.
24. How do you send an image using AJAX?
25. Describe UDDI application in details.
26. Explain CORBA in details. 27. How the web pages can be improved by using AJAX applications.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Web Technology Question bank no. 3
Course Code: TCS 802 Faculty: Mr. Kuldeep Bahuguna
Branch: CSE Semester: 7th
Unit/Title: UNIT 3
Date of Conduction:
1. What new features are available in AJAX that makes it powerful? How asynchronous processing is handled using Ajax? (UTU-2012)
2. What is RDF? What formats can RDFbe represented in?(UTU-2012) 3. Ruby takes a unique approach to the problem of multiple inheritance. Explain Ruby’s
approach and the strengths and weaknesses of it. (UTU-2012)
4. What is the idea behind Web 2.0? 5. Why blogs are designed and who owned it? 6. What is the purpose of wikis in web?
7. What do you understand by social networking sites? Why these sites are called interactive?
8. Explain open API’s with examples 9. How to create your own social networking sites?
10. What is ruby on rails? What are the benefits of using ruby on rails?
11. Is Ruby is a Scripting Language or Compiled Language?
12. What is the difference between static and dynamic scaffolding?
13. What are the operators available in Ruby?
14. What are the servers supported by ruby on rails applications?
15. Explain the terms
a)RSS
b) Syndication
16. What is the difference between Blogs and Social networking sites?
17. Write short notes on:
A) Wikis
B) Blogs
C) Social networking sites
D) Open API’s 18. Why RSS? Benefits and Reasons for using RSS?
19. What does the "Syndicate this site", "RSS", or "XML" link on many weblogs mean?
20. How do you know if a site is RSS enabled?
21. How can you get notified of new entries posted to this site?
22. What is the difference between RSS and syndication?
23. How do you put content from an RSS feed on to my site? 6. How to create your own social
networking sites?
24. Why blogs are designed and who owned it?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Web Technology Question bank no. 4
Course Code: TCS 802 Faculty: Mr. Kuldeep Bahuguna
Branch: CSE Semester: 7th
Unit/Title: UNIT 4
Date of Conduction:
1. What is RSS? What problem does RSS solve?(UTU-2012)
2. Give the overview of Web 3.0.
3. What is the Semantic web?
4. Describe the structure of semantic web?
5. What is the difference between web 3.0 and semantic web?
6. What is the purpose of Widgets and why it is used?
7. Describe drag and drop mashups (iGoogle).
8. Describe the technology behind the application- I Google.
9. Explain web based information system. Give various applications to it.
10. What are search engines? Why it is used? How it is designed?
11. Write a short note on:
a) Recommender Systems
b) Web mining
c) Search engine
d) Widgets
12. Define web mining and steps to mine the web in details.
13. Explain RDF and give details about classes and properties in RDF
14. What are the advantages of web mining and its applications?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Web Technology Question bank no. 5
Course Code: TCS 802 Faculty: Mr. Kuldeep Bahuguna
Branch: CSE Semester: 7th
Unit/Title: UNIT 5
Date of Conduction:
Prerequisite: Knowledge of Computer Network
Objective:
1. To understand concepts, organization and advantages of Distributed Computing.
2. To learn fundamental architecture and model of distributed Systems.
3. To learn Distributed Mutual Exclusion (DME), Centralized Approach, Fully Distributed
Approach, Behavior of Fully Distributed Approach, and understand the Designing Process of a
Distributed Systems.
4. To understand the concept of Distributed Mutual exclusion, distributed deadlock detection and
mutual exclusion and how to use them in distributed computing.
Unit–I Characterization of Distributed Systems: Introduction, Examples of distributed Systems,
Resource sharing and the Web Challenges.
System Models: Architectural models, Fundamental Models
Theoretical Foundation for Distributed System: Limitation of Distributed system, absence of
global clock, shared memory, Logical clocks, Lamport’s & vectors logical clocks, Causal ordering of messages, global state, termination detection.
Unit–II
Distributed Mutual Exclusion: Classification of distributed mutual exclusion, requirement of mutual
exclusion theorem, Token based and non token based algorithms, performance metric for distributed mutual
exclusion algorithms.
Distributed Deadlock Detection: system model, resource Vs communication deadlocks deadlock prevention,
avoidance, detection & resolution, centralized dead lock detection, distributed dead lock detection, path
pushing algorithms, edge chasing algorithms.
Agreement Protocols: Introduction, System models, classification of Agreement Problem, Byzantine
agreement problem, Consensus problem, Interactive consistency Problem, Solution to Byzantine Agreement
problem.
Unit–III Distributed Objects and Remote Invocation: Communication between distributed objects,
Remote procedure call, Events and notifications, Java RMI case study.
Dev Bhoomi Institute Of Technology
SEMESTER: IV
Department of Computer Science & Engineering
Course Level: Beginner Course Type: Core Credit:
Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:
100/50
Course Title: DISTRIBUTED COMPUTING Course Code:TCS-801 Duration of External Exam: 3
Hours
Distributed File Systems: File service architecture, Sun Network File System, The Andrew File
System, Recent advances.
Unit–IV Transactions and Concurrency Control: Flat and nested distributed transactions, Locks, Optimistic
Concurrency control, Timestamp ordering, Comparison of methods for concurrency control.
Distributed Transactions: Concurrency control in distributed transactions, Distributed deadlocks,
Transaction recovery. Replication: System model and group communication, Fault - tolerant services, highly
available services, Atomic Commit protocols.
Unit –V Introduction to Grid Computing: Basics of grid Computing, Benefits of grid computing, Grid terms and
concepts, Grid user roles, Standards for grid environments, Grid security requirements.
Introduction to Cloud Computing: basics of cloud computing, Layers of Cloud Computing, types of cloud
computing, Cloud Computing Features, Cloud Computing Security requirements, Cloud Computing
Challenges.
Books: 1. Singhal & Shivaratri, "Advanced Concept in Operating Systems", McGraw Hill
2. Coulouris, Dollimore, Kindberg, "Distributed System: Concepts and Design”, Pearson Ed.
Course Outcome Description
CO1 To expose students to current literature in distributed systems.
CO2 Recognize the inherent difficulties that arise due to distributed-ness of
computing resources. Understanding of networks & protocols, mobile &
wireless computing and their applications to real world problems.
CO3 Develop, test and debug RPC based client-server programs in Unix.
CO4 To focus on performance and flexibility issues related to distributed systems.
CO5 Ability to use Grid and cloud computing in real time systems.
DBIT DEHRADUN
LESSON PLAN
SEMESTER/YEAR: 8th
/4th
DEPARTMENT : CSE
COURSE: DISTRIBUTED COMPUTING COURSE CODE: TCS-801
S.
N
o.
Topic Name
Refernce/
Text Book/
Web
(R/T/W)
No. Of
Lectures
Delivery
Method
Remarks
1. UNIT-1 : Characterization of Distributed Systems: Introduction T1,R1 1 Chalk &
Talk
2. Examples of distributed Systems,
Resource sharing and the Web Challenges
T1,R1 2 Chalk &
Talk
3. System Models: Architectural models, Fundamental Models T1,R1 2 Chalk &
Talk
4. Theoretical Foundation for Distributed System: Limitation of
Distributed system
T1,R1 2 Chalk &
Talk
5. Absence of global clock T1 1 Chalk &
Talk
6. shared memory, Logical clocks, Lamport’s & vectors logical clocks T1 1 Chalk & Talk
7. Causal ordering of messages T1,R1 2 Chalk &
Talk
8. Global state, Termination detection T1,R1 1 Chalk &
Talk
9. UNIT-2: Distributed Mutual Exclusion: Classification of distributed
mutual exclusion
T1, 1 Chalk &
Talk
10 Requirement of mutual exclusion theorem T1,R1 1 Chalk &
Talk
11 mutual exclusion algorithms T1,R1 2 Chalk &
Talk
12 Distributed Deadlock Detection: system model T1, 1 Chalk &
Talk
13 Resource Vs communication deadlocks deadlock T1,R1 1 Chalk &
Talk
14 prevention, avoidance, detection & resolution T1 2 Chalk &
Talk
15 centralized dead lock detection, distributed dead lock
detection
T1,R1 1 Chalk &
Talk
16 path pushing algorithms, edge chasing algorithms T1,R1 1 Chalk &
Talk
17 Agreement Protocols: Introduction, System models T1 2 Chalk &
Talk
18 Classification of Agreement Problem, Byzantine
agreement problem,
T1,R1 1 Chalk &
Talk
19 Consensus problem, Interactive consistency Problem T1 1 Chalk &
Talk
20 Solution to Byzantine, Agreement problem T1 1 Chalk &
Talk
21 UNIT-3: Distributed Objects and Remote Invocation: Communication
between distributed objects
T1,R1 1 Chalk &
Talk
22 Remote procedure call, Events and notifications T1,R1 1 Chalk &
Talk
23 Java RMI case study T1,R1 1 Chalk &
Talk
24 Distributed File Systems: File service architecture T1,R1 1 Chalk &
Talk
25 Sun Network File System T1,R1 1 Chalk &
Talk
26 Sun Network File System T1 1 Chalk &
Total Lectures: 46
Talk
27 UNIT-4: Transactions and Concurrency Control: Flat and nested
distributed transactions
T1 1 Chalk &
Talk
28 Locks, Optimistic Concurrency control T1 1 Chalk &
Talk
29 Timestamp ordering, Comparison of methods for concurrency
control
T1,R1 2 Chalk &
Talk
30 Distributed Transactions: Concurrency control in distributed
transactions, Distributed deadlocks
T1 1 Chalk &
Talk
31 Transaction recovery T1,R1 1 Chalk &
Talk
32 Replication: System model and group communication, Fault -
tolerant services
T2,R1 1 Chalk &
Talk
33 highly available services, Atomic Commit protocols T1,R1 1 Chalk &
Talk
25 UNIT-5: Introduction to Grid Computing: Basics of grid Computing T1,R1 1 Chalk &
Talk
26 Benefits of grid computing, Grid terms
and concepts
T1 2 Chalk &
Talk
27 Grid user roles, Standards for grid environments T1 1 Chalk &
Talk
28 Grid security requirements, Timestamp ordering, Comparison of
methods for concurrency control
T1 1 Chalk &
Talk
29 Introduction to Cloud Computing: basics of cloud computing, Layers
of Cloud Computing
T1,R1 2 Chalk &
Talk
30 types of cloud computing T1 1 Chalk &
Talk
31 Cloud Computing Features, Cloud Computing Security requirements T1,R1 1 Chalk &
Talk
32 Cloud Computing Challenges. T1,R1 1 Chalk &
Talk
TEXT BOOKS:
[T1] Singhal & Shivaratri, "Advanced Concept in Operating Systems", McGraw Hill
REFERENCE BOOKS:
[R1] Coulouris, Dollimore, Kindberg, "Distributed System: Concepts and Design”, Pearson Ed.
NOTES:
Notes by Mr. Dhajvir Singh Rai.
Signature of HOD:__________
Date: __________
1. Explain the term Distributed Computing?
2. What are the advantages of distributed computing over Centralized Computing?
3. What are the characteristics of distributed system?
4. What do you understand by WWW?
5. Explain the term Replication?
6. Explain the various examples of distributed systems?
7. Explain the advantage and disadvantage of distributed system.
8. Explain the Logical clocks, Lamport’s& vectors logical clocks.
9. Explain the term Distributed Computing?
10. What are the advantages of distributed computing over Centralized Computing?
11. Explain the advantage and disadvantage of distributed system
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET
Course Name:Distributed Computing Assignment No. 1
Course Code:TCS-801
Faculty :Ramnarayan
Branch:CSE Semester: 8th
Unit/Title: Unit 1 Date of Issue: Date of Submission:
1. Describe the various security threats in the security model.
2. Explain the Various Architectural Models.
3. What is Fundamental Models? Explain it with details.
4. What do you understand by the term Resource sharing?
5. What are Token based and non token based algorithms?
6. Explain Agreement Problem in Distributed computing.
7. Describe the Byzantine Agreement problem.
8. Explain deadlock prevention, avoidance, detection & resolution.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET
Course Name:Distributed Computing Assignment No:2
Course Code:TCS-801
Faculty :Ramnarayan Branch:CSE Semester: 8
th
Unit/Title: Unit 2 Date of Issue: Date of Submission:
1. Explain the term RMI and its advantage.
2. What is Distributed object? Explain about communication of object.
3. Explain the java RMI with distributed system.
4. What is distributed file system?
5. Explain the Sun Network File System with distributed file system.
6. What is Andrew File System?
7. Explain path pushing algorithms in distributed computing.
8. Explain performance metric for distributed mutual exclusion algorithms.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET
Course Name:Distributed Computing Assignment No. 3
Course Code:TCS-801
Faculty :Ramnarayan Branch:CSE Semester: 8
th
Unit/Title: Unit 3 Date of Issue: Date of Submission:
1. What is transactions and Concurrency Control? Explain the flat and nested distributed
transactions.
2. Describe Atomic Commit protocols.
3. What is lock Locks? Explain Optimistic Concurrency control.
4. Discuss the 2 forms of transparency?
5. Differentiate upload/download and remote access model?
6. What are the ways of dealing with shared files in distributed system?
7. What are the different ways in which replication can be done?
8. List the different ways of doing caching in client memory?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET
Course Name:Distributed Computing Assignment No. 4
Course Code:TCS-801
Faculty :Ramnarayan
Branch:CSE Semester: 8th
Unit/Title: Unit 4 Date of Issue: Date of Submission:
1. What is grid computing? Explain the basics of grid computing.
2. What is Client-Server Systems?
3. What is meant by Replication? What is its motivation?.
4. Explain grid terms and concepts, Grid user roles.
5. What is cloud computing? Explain layers of cloud computing.
6. What are the Cloud Computing Features? Explain Cloud Computing Security
requirements.
7. What is the cloud Computing Challenges?
8. What is Distributed Recovery?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET
Course Name:Distributed Computing Assignment No. 5
Course Code:TCS-801
Faculty :Ramnarayan
Branch:CSE Semester: 8th
Unit/Title: Unit 5 Date of Issue: Date of Submission:
1. What is Distributed System?
2. List the Disadvantages of Distributed Systems.
3. Differentiate Monolithic Kernel and Micro Kernel.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name:Distributed Computing Tutorial Sheet No. 1
Course Code:TCS-801
Faculty :Ramnarayan Branch: CSE Semester:8
th
Unit/Title: Unit-I Date of Discussion:
1. Explain vector clock and its working.
2. List the advantages of Distributed System over Personal Computer.
3. What are the Characteristics of Centralized algorithms?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name:Distributed Computing Tutorial Sheet No. 2
Course Code:TCS-801
Faculty :Ramnarayan Branch: CSE Semester:8
th
Unit/Title: Unit-I Date of Discussion:
1.Write the short notes on
a) absence of global clock
b) global state
2. List the types of Transparency in DS.
3. Explain Token based and non token based algorithms.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name:Distributed Computing Tutorial Sheet No. 3
Course Code:TCS-801
Faculty :Ramnarayan
Branch: CSE Semester:8TH
Unit/Title: Unit-I &II Date of Discussion:
1. Explain Lamport’s& vectors logical clocks. 2. What are the solutions to overcome the issues faced in no blocking primitive?
3. What is the difference between path pushing algorithms, edge chasing algorithms?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name:Distributed Computing Tutorial Sheet No. 4
Course Code:TCS-801
Faculty :Ramnarayan Branch: CSE Semester:8TH
Unit/Title: Unit-II Date of Discussion:
1. Explain Distributed Deadlock Detection. What is Interactive consistency Problem?
2. Explain Byzantine agreement problem
3. What is RPC Runtime?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name:Distributed Computing Tutorial Sheet No. 5
Course Code:TCS-801
Faculty :Ramnarayan Branch: CSE Semester:8TH
Unit/Title: Unit-II & III Date of Discussion:
1. Describe Communication between distributed objects.
2. Explain Andrew File System and Recent advances
3. Explain Remote procedure call, Events and notifications.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name:Distributed Computing Tutorial Sheet No. 6
Course Code:TCS-801
Faculty :Ramnarayan
Branch: CSE Semester:8TH
Unit/Title: Unit-III Date of Discussion:
1. Explain and nested distributed transactions. What is Concurrency Control?
2. What is distributed deadlocks and transaction recovery
3. Describe Atomic Commit protocols.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET
Course Name:Distributed Computing Tutorial Sheet No. 7
Course Code:TCS-801
Faculty :Ramnarayan
Branch: CSE Semester:8TH
Unit/Title: Unit-IV Date of Discussion:
1. What is distributed system? What are significant advantages and limitations of distributed
system?
2. Explain what could be the impact of absence of global clock and shared memory.
3. Explain happened before relationship.
4. Give the difference between casually related events and concurrent events.
5. How are resource sharing done in distributed system? Explain with example.
6. Discuss the following terms with example: 1) Resource sharing .2) Name Resolution.
7. What are Lamport’s Logical Clocks? List the important conditions to be satisfied by Lamport logical clock
8. Explain concept of Virtual time in Lamport’s system of logical clock. 9. What are Vector clocks? Explain with the help of implementation of vector clocks.how
they are incremented
10. What are the advantages of vector clocks over lamport clock?
11. Explain space time diagram in case oflamport clock.
12. Show that in Lamport’s algorithm if a site Si is executing the critical section then Si’s requestneed not be at the top of the request queue at another site Sj
13. Explain the concept of casual ordering of messages
14. Explain concept of global state
15. What do you mean by distributed mutual exclusion?
16. Many distributed algorithm require the use of a coordinating process.To what extent can
such algorithms actually be considered distributed? Discuss
17. What effect does a communication failure have on a system using the two algorithms for
the casual ordering of messages?
18. What are casually related events? How are they implemented?
19. Describe ‘Snapshot algorithm of Chandy and Lamport.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Distributed Computing Question bank no. 1
Course Code: TCS 801 Faculty:Mr. VaibhavRanjan
Branch: CSE Semester: 7th
Unit/Title: UNIT 1
Date of Conduction:
1. What are shortcomings of Ho Ramamoorthys two phase algorithm for deadlock
detection?
2. How does one phase algorithm remove the possibility of false deadlock detection?
3. What are the differences in centralized and distributed algorithms? How is the
performance of distributed algorithms evaluated?
4. Explain the term Message complexity in reference to distributed algorithms.
5. Explain classification of agreement problems.
6. What do you mean by Byzantine Agreement Problem?
7. List agreement and validity statements to solution of byzantine agreement problem.
8. What is the solution to byzantine agreement problem.
9. What are certain applications of agreement algorithms
10. Show how a solution to consensus problem can be used to solve the interactive
consistency problem.
11. Explain how byzantine agreement cannot be reached among four processors,if two
processors are faulty.Explain.
12. What are different modes of processor failure.
13. How the performance of agreement protocols is calculated.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Distributed Computing Question bank no. 2
Course Code: TCS 801 Faculty:Mr. VaibhavRanjan
Branch: CSE Semester: 7th
Unit/Title: UNIT 2
Date of Conduction:
1. What do you mean by distributed objects?
2. Explain the concept of remote method invocation with suitable example.
3. How the parameters and results are passed to a remote procedure.Explain with a suitable
example.
4. Explain the concept of mounting.What is a mount point.
5. Differentiate between name space and name resolution.
6. Explain the following sentence 1)Consistency,availability,and performance tend to be
contradictory forces in a distributed system
7. What are the requirements of distributed file system?
8. What are the events and notifications of distributed objects?
9. Explain the participants in the distributed event notification and Jini distributed event
specification.
10. What do you mean by Distributed file system? Discuss the architecture of a Distributed
file system
11. Explain the mechanism of distributed file system?
12. Explain the architecture of NFS in detail.
13. What are the various goals of NFS?
14. What are the key issues of Distributed File system?
15. Explain the concept of Caching.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Distributed Computing Question bank no. 3
Course Code: TCS 801 Faculty:Mr. VaibhavRanjan
Branch: CSE Semester: 7th
Unit/Title: UNIT 3
Date of Conduction:
1. What is a Transaction?
2. What are the two main factors that threaten the atomicity of transaction?
3. Describe how atomicity is ensured for a transaction in both commit and abort.
4. What are the properties of Transaction?
5. Describe how a non recoverable situation could arise if write locks are released after the
last operation of a transaction but before its commitments.
6. What are commit protocols? Explain
7. Explain how the two phase commit protocol for nested transactions ensures that if the top
level transaction commitsall the right descendants are committed or aborted.
8. What are different phases of two phases commit protocols.
9. Explain concept of deadlocks.
10. Explain the Edge chasing algorithm with its steps.
11. Compare the operations of two phase commit protocol over three phase commit protocol.
Give advantages of each method.
12. Explain concept for wait –for graphs 13. Describe the concept of Time stamp Concurrency control.
14. How you can recover from the two-phase commit protocol.
15. Discuss in brief the possibilities of transaction conflicts happening during read and write
operations.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Distributed Computing Question bank no. 4
Course Code: TCS 801 Faculty:Mr. VaibhavRanjan
Branch: CSE Semester: 7th
Unit/Title: UNIT 4
Date of Conduction:
1. What are wave and traversal algorithms? Explain the termination decision and
dependence requirements of a wave algorithm
2. What is Routing? Discuss the correctness, complexity, efficiency and robustness
criteria of a good routing algorithm.
3. What is destination based routing?
4. Write short notes on 1) Balances Sliding Window Protocol
CORBA services.
5. What are wave and traversal algorithms?
6. Explain the termination decision and dependence requirements of a wave algorithm
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Distributed Computing Question bank no. 5
Course Code: TCS 801 Faculty:Mr. VaibhavRanjan
Branch: CSE Semester: 7th
Unit/Title: UNIT 5
Date of Conduction:
Prerequisite: knowledge of communication and network engineering principles Objective:
1. Capability development includes gaining an understanding of network engineering principles for network, system and service management.
2. understanding of the protocols used throughout the network and how the protocols are designed to achieve different tasks.
3. understanding multi-layer networks, an introduction to network management and information routing throughout the network
4. Introduction to internetworking, routing and network management
UNIT I Network Design: Design Principles - Determining Requirements - Analyzing the Existing
Network - Preparing the Preliminary Design - Completing the Final Design Development -
Deploying the Network - Monitoring and Redesigning – Maintaining - Design Documentation - Modular Network Design - Hierarchical Network Design - The Cisco
Enterprise Composite Network Model.
UNIT II Technologies - Switching Design: Switching Types - Layer 2 and 3 Switching - Spanning-
Tree Protocol - Redundancy in Layer 2 Switched Networks - STP Terminology and Operation – Virtual LANs – Trunks - Inter-VLAN Routing - Multilayer Switching - Cisco Express Forwarding - Switching Security - Switching Design Considerations - IPv4 Routing Design:
IPv4 Address Design - Private and Public Addresses – NAT - Subnet Masks - Hierarchical IP Address Design - IPv4 Routing Protocols – Classification - Metrics - Routing Protocol Comparison - IPv4 Routing Protocol Selection.
UNIT III Network Security Design: Hacking – Vulnerabilities - Design Issues - Human Issues - Implementation Issues – Threats - Reconnaissance Attacks - Access Attacks – Information Disclosure Attacks - Denial of Service Attacks - Threat Defense - Secure Communication -
Network Security Best Practices - SAFE Campus Design.
UNIT IV Wireless LAN Design: Wireless Technology Overview - Wireless Standards – Wireless Components - Wireless Security - Wireless Security Issues - Wireless Threat Mitigation – Wireless Management - Wireless Design Considerations - Site Survey - WLAN Roaming -
Wireless IP Phones - Quality of Service Design - QoS Models – IntServ - DiffServ154 - QoS Tools – Policing and Shaping - Congestion Avoidance - Congestion Management - Link-Specific Tools1 – QoS Design Guidelines.
Dev Bhoomi Institute Of Technology
SEMESTER: VIII
Department of Computer Science & Engineering
Course Level: Beginner Course Type: Core Credit:
Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:
100/50
Course Title :Advance computer network Course Code: TCS-083/TIT-084 Duration of External Exam: 3
Hours
UNIT V Network Management Design: ISO Network Management Standard - Protocols and Tools – SNMP – MIB – RMON - Cisco NetFlow – Syslog – CiscoWorks - Network Management Strategy - SLCs and SLAs - IP Service-Level Agreements – Content Networking Design – Case Study – Venti Systems.
TEXT BOOKS: [T1] Diane Tiare and Catherine Paquet, Campus Network Design Fundamentals , Pearson Education, 2006.
REFERENCE BOOKS: [R1] Craig Zacker, The Complete Reference: Upgrading and Troubleshooting Networks , Tata McGraw-Hill,
2000.
Course Outcome Description
CO1 To learn the basic concepts of Network design and principles
CO2 Explain and analyze various network technologies and switching designs
CO3 Ability to understand various network security designs
CO4 To understand wireless LAN design
CO5 Understanding network management design
DBIT DEHRADUN
LESSON PLAN
SEMESTER/YEAR: 8th
/4th
DEPARTMENT : CSE
COURSE: ADVANCE COMPUTER NETWORKS COURSE CODE: TCS-083
S.
No
.
Topic Name
Refernce/
Text Book/
Web
(R/T/W)
No. Of
Lectures
Delivery
Method
Remarks
1. UNIT-1 : Network Design: Design Principles - Determining
Requirements
T1,R1 1 Chalk &
Talk
2. Analyzing the Existing Network - Preparing the Preliminary Design. T1,R1 1 Chalk &
Talk
3. Completing the Final Design Development - Deploying the Network T1,R1 1 Chalk &
Talk
4. Monitoring and Redesigning – Maintaining - Design Documentation T1,R1 1 Chalk & Talk
5. Modular Network Design - Hierarchical Network Design T1 1 Chalk &
Talk
6. The Cisco Enterprise Composite Network Model T1 2 Chalk &
Talk
7. Switching Design: Switching Types - Layer 2 and 3 Switching T1,R1 2 Chalk &
Talk
8. Spanning Tree Protocol - Redundancy in Layer 2 Switched Networks -
STP Terminology and Operation
T1,R1 2 Chalk &
Talk
9. Virtual LANs – Trunks - Inter-VLAN Routing - Multilayer Switching T1 1 Chalk & Talk
10.
. Cisco Express Forwarding - Switching Security - Switching Design
Considerations
T1,R1 2 Chalk &
Talk
11. IPv4 Routing Design: IPv4 Address Design. T1,R1 2 Chalk &
Talk
12. Private and Public Addresses – NAT R1 1 Chalk & Talk
13. Subnet Masks - Hierarchical IP Address Design NOTES 2 Chalk &
Talk
14. IPv4 Routing Protocols – Classification - Metrics NOTES 1 Chalk & Talk
15. Routing Protocol Comparison - IPv4 Routing Protocol Selection.
T1 2 Chalk &
Talk
12. UNIT-2: Network Security Design: Hacking – Vulnerabilities T1,R1 1 Chalk & Talk
13. Design Issues - Human Issues - Implementation Issues T1,R1 2 Chalk &
Talk
14. Threats - Reconnaissance Attacks - Access Attacks – Information Disclosure Attacks
T1,NOTES 2 Chalk &
Talk
15. Denial of Service Attacks - Threat Defense T1 2 Chalk &
Talk
16. Secure Communication - Network Security Best Practices - SAFE
Campus Design
T1,R1 2 Chalk &
Talk
17. Wireless LAN Design: Wireless Technology Overview - Wireless
Standards
T1 2 Chalk &
Talk
18. Wireless Components - Wireless Security - Wireless Security Issues T1 1 Chalk &
Talk
19. Wireless Threat Mitigation – Wireless Management - Wireless Design Considerations
NOTES 2 Chalk &
Talk
20. Site Survey - WLAN Roaming - Wireless IP Phones T1 2 Chalk &
Talk
21.
. Quality of Service Design - QoS Models – IntServ - DiffServ154 - QoS Tools
T1,R1 1 Chalk &
Talk
22. Policing and Shaping - Congestion Avoidance - Congestion
Management
T1,R1 2 Chalk &
Talk
23. LinkSpecific Tools1 – QoS Design Guidelines T1,NOTES 2 Chalk & Talk
24. Network Management Design: ISO Network Management Standard -
Protocols and Tools
NOTES 1 Chalk &
Talk
25. SNMP – MIB – RMON NOTES 2 Chalk & Talk
26. Cisco NetFlow – Syslog – CiscoWorks NOTES 1 Chalk & Talk
27. Network Management Strategy - SLCs and SLAs NOTES 2 Chalk &
Talk
28. Content Networking Design – Case Study – Venti Systems NOTES 1 Chalk & Talk
Total Lectures: 50
REMARKS/RECOMMENDATIONS FOR FUTURE:
EXTRA CLASS TAKEN (IF ANY):
TEXT BOOKS:
[T1] Diane Tiare and Catherine Paquet, Campus Network Design Fundamentals , Pearson Education, 2006.
REFERENCE BOOKS:
[R1] Craig Zacker, The Complete Reference: Upgrading and Troubleshooting Networks , Tata McGraw-Hill, 2000.
Signature of HOD:__________
Date: __________
1. Explain layer 2 switching methods.
2. What are the basic network design principles?
3. What is the role of analyzing the Existing Network for designing a network?
4. What is Monitoring and Redesigning?
5. What is the significance design Documentation?
6. Write and explain commands to configure router.
7. Differentiate between Modular Network Design and Hierarchical Network Design.
8. Explain the Cisco Enterprise Composite Network Model.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET
Course Name: Advance Computer Networks Assignment No. 1
Course Code: TCS-083 Faculty :Preeti Raturi
Branch: CSE Semester: 8th
Unit/Title: Network Design Date of Issue: Date of Submission:
1. Differentiate between layer 2 and layer 3 switching
2. What are switch loops and redundancy?
3. Write short note on Spanning tree protocol (STP).
4. Explain STP Terminology for removing switch loop.
5. Differentiate between private and public Addresses.
6. What is count to infinity (routing loop) problem? Discuss possible solutions to reduce
count to infinity problem.
7. Explain classful IP addressing scheme.
8. What are the limitations of IPv4 addressing?
9. What is subnetting?
a. Subnet mask
b. Variable length subnet masking
c. Fixed length subnet masking
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET
Course Name: Advance Computer Networks Assignment No. 2
Course Code: TCS-083 Faculty :Preeti Raturi
Branch: CSE Semester: 8th
Unit/Title: Switching Design Date of Issue: Date of Submission:
1. Describe the network security design.
2. What is Hacking? What are the basic vulnerabilities for hacking a system?
3. What are the design issues, human issues for a network security design?
4. What are the implementation issues for a network security design?
5. What are Threats? Differentiate between active and passive attacks.
6. What is Reconnaissance Attacks? Explain its categories.
7. What are Access Attacks?
8. Differentiate between information disclosure attacks and denial of service attacks.
9. Explain Secure Communication.
10. What are the network security best practices?
11. Explain SAFE Campus Design.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET
Course Name: Advance Computer Networks Assignment No. 3
Course Code: TCS-083 Faculty :Preeti Raturi
Branch: CSE Semester: 8th
Unit/Title: Network Security Design Date of Issue: Date of Submission:
1. What is the wireless LAN design?
2. What are the wireless standards and wireless components?
3. Explain wireless security and wireless security issues.
4. What are the differences between open loop and closed loop congestion control
mechanisms?
5. Write short notes on the following:
a. Wireless IP Phones
b. QoS Models
c. WLAN Roaming
6. What are the models of Quality of Service design?
7. Explain IntServ and DiffServ154.
8. Differentiate between policing and shaping.
9. What are the guidelines for QoS Design?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET
Course Name: Advance Computer Networks Assignment No. 4
Course Code: TCS-083 Faculty :Preeti Raturi
Branch: CSE Semester: 8th
Unit/Title: Wireless LAN Design Date of Issue: Date of Submission:
1. Discuss ISO Network Management Standard.
2. Briefly explain about flow control and error control in SCTP?
3. Write short notes:
a. SNMP
b. MIB
c. RMON
4. Explain Cisco NetFlow.
5. Explain the following:
a. Syslog
b. CiscoWorks
6. Explain the network management strategy.
7. Differentiate between SLCs and SLAs.
8. Discuss IP Service-Level Agreements.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET
Course Name: Advance Computer Networks Assignment No. 5
Course Code: TCS-083 Faculty :Preeti Raturi
Branch: CSE Semester: 8th
Unit/Title: Network Management Design Date of Issue: Date of Submission:
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
1. Where will you find a Mac Address table? Explain the different fields that you find in the
table?
2. What is collision domain in a switch? How does a switch forward packets in a local lan
environment?
3. Where will you find a Mac Address table? Explain the different fields that you find in the
table?
4. What is collision domain in a switch? How does a switch forward packets in a local lan
environment?
5. What are the different classes of ip, give an example of each specifying the default
number of network and host bits?
6. What is NAT and how translation is executed and why NAT is needed?
7. Perform a comparative study between different routing protocols and specify the Metric
values used to select a path by different routing protocols.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial Sheet
Course Name:ADVANCED Computer Network
Course Code:TCS 083
Faculty :Ms. Preeti Raturi
Branch:CSE Semester: VIII
Unit/Title: 1
Date of Issue: Date of Submission:
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
1. Define Phishing, IP spoofing and denial to service attacks.
2. How can you protect a network from internal and external attacks?
3. What are the policies that can help you in building your network secure?
4. Encryption can act as a major technique to implement network security. Justify your view
and where in a network encryption used.
5. Giving examples explain SSL.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial Sheet
Course Name: ADVANCED Computer Network
Course Code:TCS 083
Faculty : Ms. Preeti Raturi
Branch:CSE Semester: VIII
Unit/Title: 2
Date of Issue: Date of Submission:
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
1. Encryption can act as a major technique to implement network security. Justify your
view and where in a network encryption used.
2. Giving examples explain SSL.
3. Define Phishing, IP spoofing and denial to service attacks.
4. How can you protect a network from internal and external attacks?
5. Detail SAFE Campus Design keeping in mind the Cisco SAFE Blueprint.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial Sheet
Course Name: ADVANCED Computer Network
Course Code:TCS 083
Faculty : Ms. Preeti Raturi
Branch:CSE Semester: VIII
Unit/Title: 3
Date of Issue: Date of Submission:
1. What is a Wireless Access Point? Giving examples explain Integrated WAP and wireless
access clients?
2. What are the different aspects that should be looked to maintain Wireless network
security?
3. Why there is need of a site survey before deploying a wireless network, if there is a need
then it proves that wireless network is not suitable for every site?
4. What are the Design Considerations for Wireless IP Phones?
5. Discuss the Industry standards pertaining to wireless LANs.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial Sheet
Course Name: ADVANCED Computer Network
Course Code:TCS 083
Faculty : Ms. Preeti Raturi
Branch:CSE Semester: VIII
Unit/Title: 4
Date of Issue: Date of Submission:
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
1. Explain in detail the working and implementation of Simple Network Management Protocol.
2. Discuss the network management strategies and also specify SLA’s and SLC’s? 3. Discuss the components and design of content networking in detail.
4. Cisco developed a application named CiscoWorks, what is it aimed for? Can this
application work with other than Cisco networks?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial Sheet
Course Name: ADVANCED Computer Network
Course Code:TCS 083
Faculty : Ms. Preeti Raturi
Branch:CSE Semester: VIII
Unit/Title: 2
Date of Issue: Date of Submission:
http://en.wikipedia.org/wiki/Simple_Network_Management_Protocolhttp://en.wikipedia.org/wiki/Simple_Network_Management_Protocol
1. What are the different hardware components required to construct a local area network
and how would you enable communication between multiple networks?
2. What are different design principles that are required to be executed before planning a
network?
3. What is a design and a how can be a good design classified?
4. Discuss the different design principles in detail?
5. What is PDIOO Network life cycle?
6. Before deploying a network what requirement s need to be analyzed?
7. Discuss the different phases in which a network can be deployed.
8. What is modular design of computer network?
9. Explain in detail the Hierarchical Network Design Model.
10. Why is there need of network redesigning and Network monitoring?
11. Discuss detailed deployment plan and schedule, including implementation, testing,
training, and contracts?
12. How will you plan for what is to be monitored in the operating network and how errors
are to be handled?
13. If you analyzed and audited the existing network, if one exists, to determine any
restrictions on the new network as well as what portions of the existing network should
be retained?
14. Determined the requirements and constraints related to business issues, including the
budget? Are the requirements clear and deterministic? Support your answer by relevant
theory.
15. Explain using a diagram Cisco Enterprise Composite Network Model.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Advance Computer Network Question bank no. 1
Course Code: TCS 083 Faculty:Ms. Preeti Raturi
Branch: CSE Semester:8th
Unit/Title: UNIT 1
Date of Conduction:
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
1. Switches can enhance the performance, flexibility, and functionality of your network.
Explain HOW?
2. In what ways can a Switch is different from a Hub.
3. What is switching in computer networks?
4. Where will you find a Mac Address table? Explain the different fields that you find in the
table?
5. What is collision domain in a switch? How does a switch forward packets in a local lan
environment?
6. Explain the types of switching and also differentiate between them.
7. What is a Spanning tree Protocol and explain how is it important for switched networks?
8. Explain STP protocol Terminology and Operation.
9. What is the importance of VLAN’s in a switched network? 10. Explain the need of VLAN’s and also give details of operation. 11. Explain the following terms with respect to a VLAN - Designated and Non Designated
port, Trunk Port and Inter VLAN routing.
12. How the STP is critical in a Layer 2 switched environment to prevent loops 13. How switches fit into the design models 14. The two types of switches: Layer 2 and Layer 3
15. Explain Multilayer Switching and Cisco Express Forwarding.
16. How is security implemented in switching and why is security needed?
17. Discuss and differentiate between Public and Private ip addresses.
18. What are the different classes of ip, give an example of each specifying the default
number of network and host bits?
19. What is NAT and how translation is executed and why NAT is needed?
20. How is routing done, define the different techniques?
21. Perform a comparative study between different routing protocols and specify the Metric
values used to select a path by different routing protocols.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Advance Computer Network Question bank no. 2
Course Code: TCS 083 Faculty:Ms. Preeti Raturi
Branch: CSE Semester: 8th
Unit/Title: UNIT 2
Date of Conduction:
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
1. Define hacking and specify the type of hackers that exist.
2. Discuss why a network can be said vulnerable to the outer attacks.
3. Categorize the different type of attacks that can be made to deteriorate the network
security.
4. Define Phishing, IP spoofing and denial to service attacks.
5. How can you protect a network from internal and external attacks?
6. What are the policies that can help you in building your network secure?
7. What is Intrusion Prevention Systems, discuss in detail its full specifications?
8. Encryption can act as a major technique to implement network security. Justify your
view and where in a network encryption used.
9. Giving examples explain SSL.
10. Explain wrt Network security the policy of Network Admission control.
11. Detail SAFE Campus Design keeping in mind the Cisco SAFE Blueprint
.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Advance Computer Network Question bank no. 3
Course Code: TCS 083 Faculty:Ms. Preeti Raturi
Branch: CSE Semester: 8th
Unit/Title: UNIT 3
Date of Conduction:
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
1. The popularity of WLANs is undeniable. Do you agree, if Yes or No, whichever it is
support your answer?
2. Differentiate giving key details between a Wired +LAN and a Wireless LAN.
3. Explain the different Wireless standards giving details of the frequency, compatibility
and throughput.
4. What is a Wireless Access Point? Giving examples explain Integrated WAP and wireless
access clients?
5. What are the different aspects that should be looked to maintain Wireless network
security?
6. Explain in detail the Wireless Security Standards. 7. What is the need of Wireless Protected access and Wireless intrusion detection systems?
8. If you get a job of Network Administrator in certain company and have to look the
existing wireless network, discuss how you will manage wireless network.
9. Give a detailed report on wireless design considerations.
10. Why there is need of a site survey before deploying a wireless network, if there is a need
then it proves that wireless network is not suitable for every site?
11. What are the Design Considerations for Wireless IP Phones?
12. Discuss the Industry standards pertaining to wireless LANs.
13. Explain Wireless management using Cisco Integrated Wireless Networks.
14. QoS ensures quality service to network traffic, what can be the factors that can
deteriorate traffic in a network and what are the measures that can be taken to ensure
smooth flow of traffic.
15. Using diagrams explain different QoS models.
16. You want improve Quality of service that your network provides what the QoS tools that
you will use. Regarding the QoS tools explain classification and marking?
17. Define congestion in a network also explain why congestion occurs and specify how
congestion can be avoided?
18. Specify the Quality of Service Guidelines.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Advance Computer Network Question bank no. 4
Course Code: TCS 083 Faculty:Ms. Preeti Raturi
Branch: CSE Semester: 8th
Unit/Title: UNIT 4
Date of Conduction:
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
1. Explain in detail the working and implementation of Simple Network Management Protocol.
2. How does RMON support monitoring and protocol analysis?
3. For which IP based applications CISCO NetFlow can be used.
4. Cisco developed a application named CiscoWorks, what is it aimed for? Can this
application work with other than Cisco networks?
5. Specify the Network Management Standard, and also there protocols and tools.
6. Discuss the network management strategies and also specify SLA’s and SLC’s? 7. Discuss the components and design of content networking in detail.
8. Write short note on the following:
Simple Network Management Protocol (SNMP) Management Information Base (MIB) Remote Monitoring (RMON) Cisco NetFlow Syslog CiscoWorks
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK
Course Name: Advance Computer Network Question bank no. 5
Course Code: TCS 083 Faculty:Ms. Preeti Raturi
Branch: CSE Semester: 8th
Unit/Title: UNIT 5
Date of Conduction:
http://en.wikipedia.org/wiki/Simple_Network_Management_Protocolhttp://en.wikipedia.org/wiki/Simple_Network_Management_Protocol
.
Prerequisite: Knowledge of Database Management System.
Objective:
1. Introduce basic concepts and major techniques in DBMS implementations.
2. To understand concepts and techniques for data storage, query processing, and transaction
management.
3. Introduce research development ability in databases through technical survey and presentation.
UNIT-1
Distributed DBMS Concepts and design: Introduction, functions and architecture of a DDBMS,
distributed relational database design, Transparencies in a DDBMS, Twelve rules for a
DDBMS. Advanced concepts: Distributed transaction management, distributed concurrency
control, distributed deadlock management, distributed database recovery, X/open distributed
Transaction processing model, Replication servers, Distributed query optimization, Mobile
databases.
UNIT-2
Object-Oriented DBMS Introduction, advanced database applications, weakness of RDBMS,
storing objects in a relational database, next-generation database systems. Concepts and design:
OODBMS perspectives, persistence, issues in OODBMS, advantages and disadvantages of
OODBMS, Object-oriented database design.
UNIT-3
Standards and systems: object management group, object database standard ODMG 3.0 1999, Object store. Object relational DBMS: Introduction, third generation database manifestos,
SQL8, Object oriented extensions in Oracle, Comparison of ORDBMS and OODBMS.
UNIT-4
Web technology and DBMS Web as a database Application Platform: Requirements for web-
DBMS integration, web-DBMS architecture, advantages and disadvantages of web-DBMS
approach, approaches to integrating the web and DBMS, Oracle Internet Application Server
(IAS).
UNIT-5
Data Warehousing Concepts, OLAP and Data mining Evolution of data warehousing, data
warehousing concepts, benefits and problems of data warehousing, comparison of OLTP
systems and data warehousing, On-Line Processing, Introduction to data mining.
Dev Bhoomi Institute Of Technology
SEMESTER: IV
Department of Computer Science & Engineering
Course Level: Beginner Course Type: Core Credit:
Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:
100/50
Course Title: ADVANCED DBMS Course Code: TCS-087/TIT-089 Duration of External Exam: 3
Hours
Books:
1. Adam, Nabil R., Bhargava, Bharat K., “Advanced Database Systems”, Springer. 2. Carlo Zaniolo, Stefano Ceri, “Advanced Database Systems”, Morgan Kaufmann, 1997
Course Outcome Description
CO1 Explain and evaluate the fundamental theories and requirements that influence
the design of modern database system.
CO2 Assess and apply database functions and packages suitable for enterprise database development and database management.
CO3 To understand the difference between DBMS and advanced DBMS and use of
advanced database concepts and become proficient in creating database
queries.
CO4 Critically evaluate alternative designs and architectures for databases and web
based DBMS architecture.
CO5 To understand the new technologies such as OLAP, data mining and data
warehousing.
DBIT/BTech/CSE/06
DBIT DEHRADUN
LESSON PLAN
SEMESTER/YEAR: 8th
/ 4th
DEPARTMENT : CSE
COURSE: ADVANCED DBMS COURSE CODE: TCS-087
S.
No
.
Topic Name
Refernce/
Text Book/
Web
(R/T/W)
No. Of
Lectures
Delivery
Method
Remarks
1. Introduction to Distributed DBMS Concepts and design T1,R1 1 Chalk &
Talk
2. Distributed relational database design, T1,R1 2 Chalk &
Talk
3. Transparencies in a DDBMS, Twelve rules for a DDBMS. T1,R1 2 Chalk &
Talk
4. Advanced concepts. T1,R1 1 Chalk &
Talk
5. Distributed transaction management. T1 1 Chalk &
Talk
6. Distributed concurrency control. T1 1 Chalk &
Talk
7. Distributed deadlock management. T1,R1 2 Chalk &
Talk
8. Distributed database recovery. T1,R1 1 Chalk &
Talk
9. X/open distributed Transaction processing model. T1,T2 1 Chalk &
Talk
10.
.
Replication servers. T1,R1 2 Chalk &
Talk
11. Distributed query optimization. T1,R1,W 2 Chalk &
Talk
12. Mobile databases. T1,R1 1 Chalk &
Talk
13. Object-Oriented DBMS Introduction. T1,R1 2 Chalk &
Talk
14. Advanced database applications. T1,NOTES 2 Chalk &
Talk
15. Weakness of RDBMS. T1,R2 1 Chalk &
Talk
16. storing objects in a relational database. T1,R1 2 Chalk &
Talk
17. next-generation database systems. T1,T2 2 Chalk &
Talk
18. Concepts and design. T1 1 Chalk &
Talk
19. OODBMS perspectives. NOTES 2 Chalk &
Talk
20. persistence, issues in OODBMS. T1 2 Chalk &
Talk
21.
.
advantages and disadvantages of OODBMS. T1,T2 2 Chalk &
Talk
22. Object-oriented database design. T1,T2 2 Chalk &
Talk
23. UNIT-3 Standards and systems. T1,T2 2 Chalk &
Talk
24. object management group. NOTES 1 Chalk &
Talk
DBIT/BTech/CSE/06
25. Object database standard ODMG 3.0 1999 NOTES 1 Chalk &
Talk
26. Object store. NOTES 2 Chalk &
Talk
27. Introduction to Object relational DBMS. NOTES 2 Chalk &
Talk
28. third generation database manifestos. NOTES 1 Chalk &
Talk
29. SQL8, Object oriented extensions in Oracle. T2,R1 2 Chalk &
Talk
30. Comparison of ORDBMS and OODBMS. T2 1 Chalk &
Talk
31. Web technology and DBMS Web as a database Application Platform. T2,NOTES 2 Chalk &
Talk
32. Requirements for webDBMS integration. T2,R1 2 Chalk &
Talk
33. Web-DBMS architecture. T2,R1 1 Chalk &
Talk
34. Advantages and disadvantages of web-DBMS approach. T2 1 Chalk &
Talk
35. Approaches to integrating the web and DBMS. T1,T2 2 Chalk &
Talk
36. Oracle Internet Application Server (IAS). T1,T2 2 Chalk &
Talk
37. Data Warehousing Concepts. T2 2 Chalk &
Talk
38. OLAP and Data mining Evolution of data warehousing. T2 1 Chalk &
Talk
39. Data warehousing concepts. T2,R2 1 Chalk &
Talk
40. Benefits and problems of data warehousing. T2,R2 1 Chalk &
Talk
41. Comparison of OLTP systems and data warehousing. T1,T2 1 Chalk &
Talk
42. On-Line Processing, Introduction to data mining. NOTES 1 Chalk &
Talk
Total Lectures: 61
TEXT BOOKS:
[T1] Adam, Nabil R., Bhargava, Bharat K., “Advanced Database Systems”, Springer. [T2] Modern Database Management by Pearson Paperback – 26 Sep 2017by A. Hoffer Jeffrey (Author), V. Ramesh (Author), Topi Heikki (Author)
REFERENCE BOOKS:
[R1] Carlo Zaniolo, Stefano Ceri, “Advanced Database Systems”, Morgan Kaufmann, 1997 [R2] Advanced Database Management System (MISL-DT) Paperback – 2014 by Rini Chakrabarti (Author), Shilbhadra Dasgupta (Author), Subhash K. Shinde (Author)
https://www.amazon.in/s/ref=dp_byline_sr_book_1?ie=UTF8&field-author=A.+Hoffer+Jeffrey&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_2?ie=UTF8&field-author=V.+Ramesh&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_2?ie=UTF8&field-author=V.+Ramesh&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_2?ie=UTF8&field-author=V.+Ramesh&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_3?ie=UTF8&field-author=Topi+Heikki&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_1?ie=UTF8&field-author=Rini+Chakrabarti&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_1?ie=UTF8&field-author=Rini+Chakrabarti&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_1?ie=UTF8&field-author=Rini+Chakrabarti&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_2?ie=UTF8&field-author=Shilbhadra+Dasgupta&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_3?ie=UTF8&field-author=Subhash+K.+Shinde&search-alias=stripbooks
DBIT/BTech/CSE/06
OTHER REFERENCES: 1. NPTEL Lectures
NOTES:
Notes by various internet resources.
Signature of HOD:__________
Date: __________
1. Discuss the table inheritance in SQL.
2. Consider the database schema with a relation University whose attributes are as shown below; with
types specified for multi-valued attributes.
Staff(sname, Department set multiset(department), subject set multiset(subjects)).
Department = (name, joining date)
Subjects = (type, exam set of (exams))
Exams = (year, place)
i) Define the above schema in SQL:2003 with appropriate types for each attribute.
ii) Using database schema in SQL:2003, write the following queries;
a) Find name of all staff who have joined after January 2013.
b) List all subjects in the relation University.
3. Explain document type definition. Describe a DTD with suitable example for an XML.
4. Write the applications of XML.
5. Differentiate object oriented (OO) and object relational (OR) databases.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
Assignment
Course Name:ADVANCED DBMS
Course Code:TCS-087
Faculty :MR. VAIBHAV RANJAN
Branch:CSE Semester: VIII
Unit/Title: 1
Date of Issue: Date of Submission:
1. Explain in detail the data warehouse architecture.
2. Write short notes on the following;
i) Online transaction processing
ii) Data warehouse data house
iii) Dimensionality modeling in data warehouse
iv) Data warehouse using Oracle
v) Data marts
3. Explain the functions of Administration & Management tools in data warehouse.
4. Explain the approaches taken by vendor to provide data extraction, cleansing, and data
transformation tools.
5. Write the algorithm for K-Mean data mining.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
Assignment
Course Name: ADVANCED DBMS
Course Code: TCS-087
Faculty : MR. VAIBHAV RANJAN
Branch:CSE Semester: VIII
Unit/Title: 2
Date of Issue: Date of Submission:
1. Describe the characteristics of multi-dimensional data and how this data can be represented?
2. Write short notes on the following;
i) OLAP benchmarks
ii) Applications and benefits of OLAP
iii) Bayesian classifier
iv) Predictive modeling
3. Discuss OLAP functionality provided by ROLLUP and CUBE of SQL standard.
4. Write the types of locks.
5. Explain exception handlers in Oracle.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
Assignment
Course Name: ADVANCED DBMS
Course Code: TCS-087
Faculty : MR. VAIBHAV RANJAN
Branch:CSE Semester: VIII
Unit/Title: 3
Date of Issue: Date of Submission:
1. Explain implicit and explicit locking in Oracle.
2. Write notes on database security and threats.
3. Explain the authorization and access control for providing security for database
4. What are long duration transactions? What are the adverse effects of following concurrency
protocols on long duration transactions?
5. What is the effect of the speed of the interconnection between the client and the server on the
choice between object and page shipping?
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
Assignment
Course Name: ADVANCED DBMS
Course Code: TCS-087
Faculty : MR. VAIBHAV RANJAN
Branch:CSE Semester: VIII
Unit/Title: 4
Date of Issue: Date of Submission:
1. What form of parallelism (inter-query, inter-operation or intra-operation) is likely to be the
most important for each of the following tasks: Increasing the throughput of a system with many
small queries, increasing the throughput of a system with a few large queries, when the number
of disks and CPUs is large.
2. What is pipelined parallelism? What are the drawbacks of pipelined parallelism? 15 05
3 What are the main software modules of DDBMS? Discuss the main functions of each of these
modules in context to client-server architecture.
4. What is fragment of a relation? What are the main types of fragments? Why are fragments a
useful concept in distributed database design?
5. List the basic operations of the following built-in interfaces of the ODMG Object Model:
Object, Collection, Iterator, Set, and List.
DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN
Assignment
Course Name: ADVANCED DBMS
Course Code: TCS-087
Faculty : MR. VAIBHAV RANJAN
Branch:CSE Semester: VIII
Unit/Title: 5
Date of Issue: Date of Submission:
1 .What is PL/SQL Engine? Draw PL/SQL BLOCK structure. Explain each block.
2.Des