dev bhoomi institute of technology dehradun · 25. cobra t2 1 ppt 26. introduction to interactive...

184
DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017-18 Class :8th Sem/4th Year

Upload: others

Post on 20-Oct-2019

1 views

Category:

Documents


0 download

TRANSCRIPT

  • DEV BHOOMI INSTITUTE OF

    TECHNOLOGY

    DEHRADUN Department of Computer Science and Engineering

    HAND BOOK

    Session 2017-18

    Class :8th Sem/4th Year

  • Prerequisite: Knowledge of Object Oriented Programming

    Objective: 1. To understand concepts, terms and technologies used in website designing.

    2. To learn the basic HTML, XML, Dynamic HTML and JavaScript for Web designing. 3. To attain necessary knowledge and skills in using various technologies and tools for website

    development.

    4. To learn interactive and social web services like AJAX and Ruby on Rails.

    UNIT I:

    Internet Principles and Components: History of the Internet and World Wide Web-

    HTML; protocols – HTTP, SMTP, POP3, MIME, IMAP. Domain Name Server, Web Browsers and Web Servers

    UNIT II: HTML, DHTML and XML List, Tables, Images, Forms, Frames, CSS Document type definition, Dynamic HTML, XML

    schemes, Object Models, Presenting XML, Using XML Processors: DOM and SAX, Introduction

    to Java Script, Object in Java Script, Dynamic HTML with Java Script.

    UNIT III: Web Services

    Introduction to Web Services, UDDI, SOAP, WSDL, Web Service Architecture, Developing

    and deploying web services. Ajax – Improving web page performance using Ajax, Programming in Ajax. CORBA,

    UNIT IV: Web 2.0

    Interactive and social web: Blogs, wikis, and social networking sites – The technology behind these applications- AJAX, RSS and syndication, Ruby on Rails, Open APIs,

    UNIT V:

    Web 3.0: Semantic Web, Widgets, drag & drop mashups (iGoogle) - The technology behind

    these applications- RDF

    Web based Information Systems, Search engines, Recommender Systems, Web Mining

    Books:

    1. Burdman, “Collaborative Web Development” Addison Wesley.

    Dev Bhoomi Institute Of Technology

    SEMESTER: IV

    Department of Computer Science & Engineering

    Course Level: Beginner Course Type: Core Credit:

    Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

    100/50

    Course Title: INTRODUCTION TO WEB TECHNOLOGY

    Course Code:TCS-802 Duration of External Exam: 3

    Hours

  • 2. Chris Bates, “Web Programing Building Internet Applications”, 2nd Edition,

    WILEY, Dreamtech

    3. Joel Sklar , “Principal of web Design” Vikash and Thomas Learning

    4. Jon Duckett, “Beginning Web Programming with HTML, XHTML, and CSS”, Wiley India Pvt Ltd (June 2008)

    5. http://ugweb.cs.ualberta.ca/~c410/F06/schedule/index.html

    Course Outcome Description

    CO1 Ability to apply the design principles, techniques and technologies to

    the development of creative websites.

    CO2 Ability to use web services for efficient website development.

    CO3 Implement the advanced concepts of java services such as UDDI, SOAP,

    and WSDL; create dynamic web pages & Programming in Ajax.

    CO4 To focus on interactive web services.

    CO5 Ability to create web based information systems, knowledge about data

    mining.

  • DBIT DEHRADUN

    LESSON PLAN

    SEMESTER/YEAR: 8th

    /4th

    yr DEPARTMENT : CSE

    COURSE: Introduction to Web Technology COURSE CODE : TCS-802

    S.

    No.

    Topic Name

    Reference/

    Text Book/

    Web

    (R/T/W)

    No. Of

    Lectures

    Delivery

    Method

    Remarks

    1. History of internet, world wide web, HTML T2,R1 1 Chalk &Talk

    2. Internet protocols-HTTP,SMTP.POP3 T2

    2 Chalk &Talk

    3. MIME , IMAP T1, R2 1 PPT

    4. web browser ,Web server, T2,R1 1 Chalk &Talk

    5. Creating web sites, security threats of web R1

    1 Chalk &Talk

    6. HTML-List , tables,images T2 1 Chalk &Talk

    7. HTML-Form , frames T2 1 Chalk &Talk

    8. CSS Document type definition, dynamic HTML T2 2 PPT

    9. XML schemes, object models T1, R2 1 Chalk &Talk

    10. Presenting XML

    T1, R2 1 Chalk &Talk

    11. Using XML processor-DOM and SAX T1, R2 1 Chalk &Talk

    12. Introduction to java script T2 1 Chalk &Talk

    13. Objects in java script T2 1 Chalk &Talk

    14. Dynamic HTML with java script T1 1 Chalk &Talk

    15. Java Script and HTML Programs T1 1 Chalk &Talk

    16. Introduction to web services T1, R2 1 Chalk &Talk

    17. UDDI T1, R2 1 PPT

    18. SOAP T1, R2 1 PPT

    19. WSDL T1, R2 1 PPT

    20. Web Service Architecture T1, R2 1 PPT

    21. Developing and deploying web services. T2,R1 1 Chalk &Talk

  • 22. Ajax – Improving web page performance using Ajax R1

    2 Chalk &Talk

    23. Programming in Ajax-1 T2 1 Chalk &Talk

    24. Programming in Ajax-2 T2 1 Chalk &Talk

    25. COBRA T2 1 PPT

    26. Introduction to interactive and social web T1, R2 1 PPT

    27. Blogs, wikis T1, R2 2 PPT

    28. Social networking sites T1, R2 1 PPT

    29. The technology behind these application-AJAX, RSS T2 1 PPT

    30. Syndication T2 1 Chalk &Talk

    31. Ruby on rails T1 1 Chalk &Talk

    32. Open API’s T1 1 PPT

    33. Semantic web T1, R2 1 PPT

    34. Widgets T1, R2 1 PPT

    35. Drag and drop mashups(iGoogle) T2,R1 1 Chalk &Talk

    36. The technology behind these application-RDF R1

    1 Chalk &Talk

    37. Web based Information Systems T2 1 Chalk &Talk

    38. Search engines, T2 1 Chalk &Talk

    39. Recommender Systems T2 1 Chalk &Talk

    40. Web Mining T1, R2 1 Chalk &Talk

    Total Lectures: 43

    REMARKS/RECOMMENDATIONS FOR FUTURE:

    EXTRA CLASS TAKEN (IF ANY):

    TEXT BOOKS:

    [T1] Burdman, Collaborative Web Development Addison Wesley.

    [T2] Jon Duckett, Beginning Web Programming with HTML, XHTML, and CSS , Wiley India Pvt Ltd

    REFERENCE BOOKS:

  • [R2] Chris Bates, Web Programing Building Internet Applications , 2nd Edition, WILEY, Dreamtech

    [R3] Joel Sklar , Principal of web Design Vikash and Thomas Learning

    Signature of HOD:__________

    Date: __________

  • 1. What do you mean by Web technologies? Write down the various steps to develop a

    multi departmental website.

    2. Explain the SOAP web service in AJAX.

    3. How the result set of Mysql be handled in PHP?

    4. What is the difference between developing a site for co corporate world and developing a

    site for an individual?

    5. Write a PHP script to sort the elements of an array.

    6. What types of primary data structures are supported in Perl? Discuss.

    7. Describe the role of W3C.Also give the primary hosts for W3C?

    8. How to search for a page using Perl language elements?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT

    Course Name: Web Technologies Assignment No. 1

    Course Code:TCS-802

    Faculty :

    Branch: CSE Semester: 5th

    Unit 1: Introduction to Web Technologies Date of Issue: Date of Submission:

  • 1. What is form? How are form created for a website? What is the function of submit button on a form.

    2. Define class. Explain how to create a class and its objects in Ruby.

    3. How will you create hyperlinks in Web documents? Discuss on different attributes of

    Creating a Hyperlink.With an example program explain Pattern Matching in Ruby.

    4. What is JavaScript? Why do you think JavaScript plays important role in web designing.

    5. What is Script Manager in AJAX?

    6. Differentiate between for and fore each statements in PHP.

    7. What are the arguments that are used frequently in Perl?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT

    Course Name: Web Technologies Assignment No. 2

    Course Code:TCS-802

    Faculty :Mr. Kuldeep Bhauguna

    Branch: CSE Semester: 5th

    Unit 2 : Date of Issue: Date of Submission:

  • 1. What is the underlying technology of all the other web services technologies and what great

    benefit does this technology provide.

    2. How does a symbol differ from a string in Ruby language?

    3. What are Web services and why we need web services?

    4. Create a HTML which uses CSS that gives all H1 and H2 elements a padding of 0.5 ems; a

    grooved border style and a margin of 0.5 ems.

    5. Explain the terms

    a) SOAP

    b) UDDI

    c) WSDL

    6. What is the difference between traditional web application and AJAX?

    7. Write a program to read current time and date using AJAX application?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT

    Course Name: Web Technologies Assignment No. 3

    Course Code:TCS-802

    Faculty :Mr. Kuldeep Bhauguna

    Branch: CSE Semester: 5th

    Unit 3: Date of Issue: Date of Submission:

  • 1. What is RDF? What formats can RDFbe represented in?

    2. What do you understand by social networking sites? Why these sites are called

    interactive?

    3. Is Ruby is a Scripting Language or Compiled Language?

    4. What is the difference between Blogs and Social networking sites?

    5. Why RSS? Benefits and Reasons for using RSS?

    6. Write short notes on:

    A) Wikis

    B) Blogs

    C) Social networking sites

    D) Open API’s

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT

    Course Name: Web Technologies Assignment No. 4

    Course Code:TCS-802

    Faculty :Mr. Kuldeep Bhauguna

    Branch: CSE Semester: 5th

    Unit 4: Date of Issue: Date of Submission:

  • 1. Write a PHP Code to determine whether a given number is an ‘PERFECT NUMBER’ or

    not. [Eg: 6 is a perfect number, since its factors including 1(but not the number itself)

    sum to the number i.e., 1+2+3 = 6]

    2. What is RSS? What problem does RSS solve?

    3. What are search engines? Why it is used? How it is designed?

    4. Explain RDF and give details about classes and properties in RDF.

    5. What are search engines? Why it is used? How it is designed?

    6. Write a short note on:

    a) Recommender Systems

    b) Web mining

    c) Search engine

    d) Widgets

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT

    Course Name: Web Technologies Assignment No. 5

    Course Code:TCS-802

    Faculty :Mr. Kuldeep Bhauguna

    Branch: CSE Semester: 5th

    Unit 5: Date of Issue: Date of Submission:

  • 1. Explain the SOAP web service in AJAX.

    2. How the result set of Mysql be handled in PHP?

    3. Write a PHP script to sort the elements of an array.

    4. What types of primary data structures are supported in Perl? Discuss.

    5. How to search for a page using Perl language elements?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name: Web Technologies Tutorial No. 1

    Course Code:TCS-802

    Faculty :

    Branch: CSE Semester: 5th

    Unit 1: Introduction to Web Technologies Date of Issue: Date of Submission:

  • 1. Define class. Explain how to create a class and its objects in Ruby.

    2. With an example program explain Pattern Matching in Ruby.

    3. What is Script Manager in AJAX?

    4. Differentiate between for and fore each statements in PHP.

    5. What are the arguments that are used frequently in Perl?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name: Web Technologies Tutorial No. 2

    Course Code:TCS-802

    Faculty :Mr. Kuldeep Bhauguna

    Branch: CSE Semester: 5th

    Unit 2 : Date of Issue: Date of Submission:

  • 1. How does a symbol differ from a string in Ruby language?

    2. Create a HTML which uses CSS that gives all H1 and H2 elements a padding of 0.5 ems; a

    grooved border style and a margin of 0.5 ems.

    3. What is Document object model? Discuss the various DOM methods used with JavaScript.

    4. Write a script that reads an integer and determines whether it is PRIME Number or Not.

    5. Give a brief note on DOM parser.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name: Web Technologies Tutorial No. 3

    Course Code:TCS-802

    Faculty :Mr. Kuldeep Bhauguna

    Branch: CSE Semester: 5th

    Unit 3: Date of Issue: Date of Submission:

  • 1. Design an XML schema for hospital information management.

    2. Explain how a DTD is created with an example.

    3. Is AJAX code cross browser compatible? Explain.

    4. Discuss the role of WSDL web service in AJAX.

    5. Explain the user defined functions in PHP with an example.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name: Web Technologies Tutorial No. 4

    Course Code:TCS-802

    Faculty :Mr. Kuldeep Bhauguna

    Branch: CSE Semester: 5th

    Unit 4: Date of Issue: Date of Submission:

  • 1. Write a PHP Code to determine whether a given number is an ‘PERFECT NUMBER’ or

    not. [Eg: 6 is a perfect number, since its factors including 1(but not the number itself)

    sum to the number i.e., 1+2+3 = 6]

    2. List and explain the operators used in Perl.

    3. Write a Perl script to create a form to mail.

    4. Discuss about simple I/O statements in Ruby.

    5. Explain Hashes and Methods in Ruby with examples.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name: Web Technologies Tutorial No. 5

    Course Code:TCS-802

    Faculty :Mr. Kuldeep Bhauguna

    Branch: CSE Semester: 5th

    Unit 5: Date of Issue: Date of Submission:

  • 1. What do you mean by Web technologies? Write down the various steps to develop a multi departmental website. (UPTU 2006-7)

    2. Briefly discuss the history of web? 3. What do you mean by protocol? Name three protocols that govern the web and explain

    about them. (UPTU 2005-6)

    4. What is the difference between developing a site for co corporate world and developing a site for an individual? (UPTU 2005-6)

    5. Explain the following terms:- (UPTU 2005-6) i. FTTP ii. HTTP iii. WWW iv. Portal v. URL 6. What is HTML? Explain its purpose .Write the names of any five important HTML tags

    and their syntax. (UPTU 2005-6)

    7. Explain the concept of IP address .Also discuss the various field in IP datagram header.( UPTU 2006-7)

    8. Explain the use of SMTP protocol. (UPTU 2005-6) 9. What are the differences between a traditional project and a web project. Also write some

    objectives to develop a Web project (UPTU 2009-10)

    10. Describe the role of W3C.Also give the primary hosts for W3C? (UPTU 2008-9) 11. Explain various protocols governing Web? (UPTU 2008-9) 12. What are Web standards and why should we use them? What is the difference in testing a

    CLIENT-SERVER application and a WEB application? (UTU-2012)

    13. What do you mean by protocol? Give the name of those protocols, which help in web and explain the working of those protocols.( UTU-2012)

    14. To be current, that is to up-to –date, is an important feature of the internet. Why is this important and what impact is this having on society? (UTU-2012)

    15. Are all web browsers capable of displaying all types of pages served by Web servers? Should the names of all web servers must start with the prefix www..? (UTU-2012)

    16. What is the main purpose of DNS server? Describe forward and reverse Lookup? (UTU-2012)

    17. What do you mean by Cyber crime .How the cyber crimes can be checked. (UPTU 2007-8)

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Web Technology Question bank no. 1

    Course Code: TCS 802 Faculty: Mr. Kuldeep Bahuguna

    Branch: CSE Semester: 7th

    Unit/Title: UNIT 1

    Date of Conduction:

  • 18. Name some tools along with their application that may be used for developing Web sites (UPTU 2009-10)

    19. Describe the following with suitable example-(UPTU2008-9) I. Web application II. Target Users 20. Who are the people that you need to develop your Website? What are the essential skills

    that must be identified while selecting the members of team? (UPTU 2009-10)

    21. What is the difference between Local and Remote login? Why does Telnet protocol require a time sharing operating g system?( UPTU 2006-07)

    22. Discuss the various Web project development Phases in detail (UPTU-2006-7)

  • 1. Differentiate between the following:- (UPTU-2009-10) i) HTML and DHTML ii) ROWSPAN and COLSPAN

    2. What is form? How are form created for a website? What is the function of submit button on a form

    3. Explain the Static and Dynamic Web pages .Explain the HTML tags for FRAME and FORM with the help of suitable example. (UPTU 2006-7)

    4. How will you create hyperlinks in Web documents? Discuss on different attributes of Creating a Hyperlink. (UPTU 2009-10)

    5. Why does FORM an important tag in Web application? Explain attributes ACTION and METHOD. (UPTU 2008-09)

    6. Write short note on DOM. (UPTU-2009-10) 7. What is JavaScript? Why do you think JavaScript plays important role in web designing. 8. What are dialogue box? Explain different types of dialogue boxes? 9. What is XML .Explain the parsing in XML. Also mention the application s of XML.

    (UPTU-2009-10)

    10. Justify the need for client side scripting languages. How do you perform client side validation using Java script? (UPTU-2009-10)

    11. Define CSS. Write CSS rule that make all the text 2.5 larger than the base font of the system.(UPTU-2008-09)

    12. Explain the term SAX with suitable example. (UPTU- 2008-09) 13. Specify the tag and attributes used to create a Textbox which can accept maximum of 20

    characters with a default value “Enter Name”.(UTU-2012) 14. Explain events in java script and their event handlers.(UTU-2012) 15. What is DTD (Documents type definitions) in XML? Illustrate with suitable example.

    (UTU-2012)

    16. Write salient feature of Java Script. And also discuss the significance of any two predefined object of Java Script. (UTU-2012)

    17. Write a JavaScript that finds the smallest of given N integers.(UPTU-2008-9) 18. What are cascading sheets and how are they coded. Explain them with an

    example.(UPTU 2009-10)

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Web Technology Question bank no. 2

    Course Code: TCS 802 Faculty: Mr. Kuldeep Bahuguna

    Branch: CSE Semester: 7th

    Unit/Title: UNIT 2

    Date of Conduction:

  • 19. Create a DTD for mark statement of a student. Write a program to retrieve the elements and attributes of XML document and display the mark statement in table format. (UTU-

    2012)

    20. Explain events in Java script and their event handlers. ( UTU-2012) 21. Write salient features of Java script .And also discuss the significance of any two

    predefined object in JavaScript. (UTU-2012)

    22. Write the history of DOM. 23. List out the levels of DOM. 24. How to access the element in Java Script? 25. Write the difference between Event and Event Handling. 26. How to create text box and button in DOM? 27. Write the few of events and tags in DOM. 28. List out the phases of DOM2. 29. Define Event Propagation. 30. Differentiate between DOM and SAX.

  • 1. What is Web Services with example? 2. What is the underlying technology of all the other web services technologies and what great

    benefit does this technology provide.(UTU-2012)

    3. Describe the major sections of a WSDL document and what WSDL components are contained in each section. (UTU-2012)

    4. What is WSDL? 5. List out the elements in WSDL. 6. List out data types that are available in Web-Service 7. What are UDD APis and what are they used for? List the categories of operations for each

    API. (UTU-2012).

    8. What are Web services and why we need web services? 9. Sketch the Structure of SOAP. 10. What is SOAP? 11. Explain the architecture of Web services? 12. Explain the terms a)SOAP

    b) UDDI

    c) WSDL

    13. Differentiate between SOAP and HTTP. 14. Steps for creating the Web-Services. 15. Explain in detail about writing the Web-Service and Java Web Service Client. 16. What is AJAX? Explain the purpose and uses of AJAX. 17. Explain the approach for the browser to work with AJAX 18. What is the difference between traditional web application and AJAX? 19. Explain about security of the AJAX based web applications. 20. What are the advantages and disadvantages of using AJAX? 21. What are two types of Ajax based frameworks used in the web programming? 22. Write a program to read current time and date using AJAX application? 23. Design a login page to validate the user and show alert message if username and

    password is not correct.

    24. How do you send an image using AJAX?

    25. Describe UDDI application in details.

    26. Explain CORBA in details. 27. How the web pages can be improved by using AJAX applications.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Web Technology Question bank no. 3

    Course Code: TCS 802 Faculty: Mr. Kuldeep Bahuguna

    Branch: CSE Semester: 7th

    Unit/Title: UNIT 3

    Date of Conduction:

  • 1. What new features are available in AJAX that makes it powerful? How asynchronous processing is handled using Ajax? (UTU-2012)

    2. What is RDF? What formats can RDFbe represented in?(UTU-2012) 3. Ruby takes a unique approach to the problem of multiple inheritance. Explain Ruby’s

    approach and the strengths and weaknesses of it. (UTU-2012)

    4. What is the idea behind Web 2.0? 5. Why blogs are designed and who owned it? 6. What is the purpose of wikis in web?

    7. What do you understand by social networking sites? Why these sites are called interactive?

    8. Explain open API’s with examples 9. How to create your own social networking sites?

    10. What is ruby on rails? What are the benefits of using ruby on rails?

    11. Is Ruby is a Scripting Language or Compiled Language?

    12. What is the difference between static and dynamic scaffolding?

    13. What are the operators available in Ruby?

    14. What are the servers supported by ruby on rails applications?

    15. Explain the terms

    a)RSS

    b) Syndication

    16. What is the difference between Blogs and Social networking sites?

    17. Write short notes on:

    A) Wikis

    B) Blogs

    C) Social networking sites

    D) Open API’s 18. Why RSS? Benefits and Reasons for using RSS?

    19. What does the "Syndicate this site", "RSS", or "XML" link on many weblogs mean?

    20. How do you know if a site is RSS enabled?

    21. How can you get notified of new entries posted to this site?

    22. What is the difference between RSS and syndication?

    23. How do you put content from an RSS feed on to my site? 6. How to create your own social

    networking sites?

    24. Why blogs are designed and who owned it?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Web Technology Question bank no. 4

    Course Code: TCS 802 Faculty: Mr. Kuldeep Bahuguna

    Branch: CSE Semester: 7th

    Unit/Title: UNIT 4

    Date of Conduction:

  • 1. What is RSS? What problem does RSS solve?(UTU-2012)

    2. Give the overview of Web 3.0.

    3. What is the Semantic web?

    4. Describe the structure of semantic web?

    5. What is the difference between web 3.0 and semantic web?

    6. What is the purpose of Widgets and why it is used?

    7. Describe drag and drop mashups (iGoogle).

    8. Describe the technology behind the application- I Google.

    9. Explain web based information system. Give various applications to it.

    10. What are search engines? Why it is used? How it is designed?

    11. Write a short note on:

    a) Recommender Systems

    b) Web mining

    c) Search engine

    d) Widgets

    12. Define web mining and steps to mine the web in details.

    13. Explain RDF and give details about classes and properties in RDF

    14. What are the advantages of web mining and its applications?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Web Technology Question bank no. 5

    Course Code: TCS 802 Faculty: Mr. Kuldeep Bahuguna

    Branch: CSE Semester: 7th

    Unit/Title: UNIT 5

    Date of Conduction:

  • Prerequisite: Knowledge of Computer Network

    Objective:

    1. To understand concepts, organization and advantages of Distributed Computing.

    2. To learn fundamental architecture and model of distributed Systems.

    3. To learn Distributed Mutual Exclusion (DME), Centralized Approach, Fully Distributed

    Approach, Behavior of Fully Distributed Approach, and understand the Designing Process of a

    Distributed Systems.

    4. To understand the concept of Distributed Mutual exclusion, distributed deadlock detection and

    mutual exclusion and how to use them in distributed computing.

    Unit–I Characterization of Distributed Systems: Introduction, Examples of distributed Systems,

    Resource sharing and the Web Challenges.

    System Models: Architectural models, Fundamental Models

    Theoretical Foundation for Distributed System: Limitation of Distributed system, absence of

    global clock, shared memory, Logical clocks, Lamport’s & vectors logical clocks, Causal ordering of messages, global state, termination detection.

    Unit–II

    Distributed Mutual Exclusion: Classification of distributed mutual exclusion, requirement of mutual

    exclusion theorem, Token based and non token based algorithms, performance metric for distributed mutual

    exclusion algorithms.

    Distributed Deadlock Detection: system model, resource Vs communication deadlocks deadlock prevention,

    avoidance, detection & resolution, centralized dead lock detection, distributed dead lock detection, path

    pushing algorithms, edge chasing algorithms.

    Agreement Protocols: Introduction, System models, classification of Agreement Problem, Byzantine

    agreement problem, Consensus problem, Interactive consistency Problem, Solution to Byzantine Agreement

    problem.

    Unit–III Distributed Objects and Remote Invocation: Communication between distributed objects,

    Remote procedure call, Events and notifications, Java RMI case study.

    Dev Bhoomi Institute Of Technology

    SEMESTER: IV

    Department of Computer Science & Engineering

    Course Level: Beginner Course Type: Core Credit:

    Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

    100/50

    Course Title: DISTRIBUTED COMPUTING Course Code:TCS-801 Duration of External Exam: 3

    Hours

  • Distributed File Systems: File service architecture, Sun Network File System, The Andrew File

    System, Recent advances.

    Unit–IV Transactions and Concurrency Control: Flat and nested distributed transactions, Locks, Optimistic

    Concurrency control, Timestamp ordering, Comparison of methods for concurrency control.

    Distributed Transactions: Concurrency control in distributed transactions, Distributed deadlocks,

    Transaction recovery. Replication: System model and group communication, Fault - tolerant services, highly

    available services, Atomic Commit protocols.

    Unit –V Introduction to Grid Computing: Basics of grid Computing, Benefits of grid computing, Grid terms and

    concepts, Grid user roles, Standards for grid environments, Grid security requirements.

    Introduction to Cloud Computing: basics of cloud computing, Layers of Cloud Computing, types of cloud

    computing, Cloud Computing Features, Cloud Computing Security requirements, Cloud Computing

    Challenges.

    Books: 1. Singhal & Shivaratri, "Advanced Concept in Operating Systems", McGraw Hill

    2. Coulouris, Dollimore, Kindberg, "Distributed System: Concepts and Design”, Pearson Ed.

    Course Outcome Description

    CO1 To expose students to current literature in distributed systems.

    CO2 Recognize the inherent difficulties that arise due to distributed-ness of

    computing resources. Understanding of networks & protocols, mobile &

    wireless computing and their applications to real world problems.

    CO3 Develop, test and debug RPC based client-server programs in Unix.

    CO4 To focus on performance and flexibility issues related to distributed systems.

    CO5 Ability to use Grid and cloud computing in real time systems.

  • DBIT DEHRADUN

    LESSON PLAN

    SEMESTER/YEAR: 8th

    /4th

    DEPARTMENT : CSE

    COURSE: DISTRIBUTED COMPUTING COURSE CODE: TCS-801

    S.

    N

    o.

    Topic Name

    Refernce/

    Text Book/

    Web

    (R/T/W)

    No. Of

    Lectures

    Delivery

    Method

    Remarks

    1. UNIT-1 : Characterization of Distributed Systems: Introduction T1,R1 1 Chalk &

    Talk

    2. Examples of distributed Systems,

    Resource sharing and the Web Challenges

    T1,R1 2 Chalk &

    Talk

    3. System Models: Architectural models, Fundamental Models T1,R1 2 Chalk &

    Talk

    4. Theoretical Foundation for Distributed System: Limitation of

    Distributed system

    T1,R1 2 Chalk &

    Talk

    5. Absence of global clock T1 1 Chalk &

    Talk

    6. shared memory, Logical clocks, Lamport’s & vectors logical clocks T1 1 Chalk & Talk

    7. Causal ordering of messages T1,R1 2 Chalk &

    Talk

    8. Global state, Termination detection T1,R1 1 Chalk &

    Talk

    9. UNIT-2: Distributed Mutual Exclusion: Classification of distributed

    mutual exclusion

    T1, 1 Chalk &

    Talk

  • 10 Requirement of mutual exclusion theorem T1,R1 1 Chalk &

    Talk

    11 mutual exclusion algorithms T1,R1 2 Chalk &

    Talk

    12 Distributed Deadlock Detection: system model T1, 1 Chalk &

    Talk

    13 Resource Vs communication deadlocks deadlock T1,R1 1 Chalk &

    Talk

    14 prevention, avoidance, detection & resolution T1 2 Chalk &

    Talk

    15 centralized dead lock detection, distributed dead lock

    detection

    T1,R1 1 Chalk &

    Talk

    16 path pushing algorithms, edge chasing algorithms T1,R1 1 Chalk &

    Talk

    17 Agreement Protocols: Introduction, System models T1 2 Chalk &

    Talk

    18 Classification of Agreement Problem, Byzantine

    agreement problem,

    T1,R1 1 Chalk &

    Talk

    19 Consensus problem, Interactive consistency Problem T1 1 Chalk &

    Talk

    20 Solution to Byzantine, Agreement problem T1 1 Chalk &

    Talk

    21 UNIT-3: Distributed Objects and Remote Invocation: Communication

    between distributed objects

    T1,R1 1 Chalk &

    Talk

    22 Remote procedure call, Events and notifications T1,R1 1 Chalk &

    Talk

    23 Java RMI case study T1,R1 1 Chalk &

    Talk

    24 Distributed File Systems: File service architecture T1,R1 1 Chalk &

    Talk

    25 Sun Network File System T1,R1 1 Chalk &

    Talk

    26 Sun Network File System T1 1 Chalk &

  • Total Lectures: 46

    Talk

    27 UNIT-4: Transactions and Concurrency Control: Flat and nested

    distributed transactions

    T1 1 Chalk &

    Talk

    28 Locks, Optimistic Concurrency control T1 1 Chalk &

    Talk

    29 Timestamp ordering, Comparison of methods for concurrency

    control

    T1,R1 2 Chalk &

    Talk

    30 Distributed Transactions: Concurrency control in distributed

    transactions, Distributed deadlocks

    T1 1 Chalk &

    Talk

    31 Transaction recovery T1,R1 1 Chalk &

    Talk

    32 Replication: System model and group communication, Fault -

    tolerant services

    T2,R1 1 Chalk &

    Talk

    33 highly available services, Atomic Commit protocols T1,R1 1 Chalk &

    Talk

    25 UNIT-5: Introduction to Grid Computing: Basics of grid Computing T1,R1 1 Chalk &

    Talk

    26 Benefits of grid computing, Grid terms

    and concepts

    T1 2 Chalk &

    Talk

    27 Grid user roles, Standards for grid environments T1 1 Chalk &

    Talk

    28 Grid security requirements, Timestamp ordering, Comparison of

    methods for concurrency control

    T1 1 Chalk &

    Talk

    29 Introduction to Cloud Computing: basics of cloud computing, Layers

    of Cloud Computing

    T1,R1 2 Chalk &

    Talk

    30 types of cloud computing T1 1 Chalk &

    Talk

    31 Cloud Computing Features, Cloud Computing Security requirements T1,R1 1 Chalk &

    Talk

    32 Cloud Computing Challenges. T1,R1 1 Chalk &

    Talk

  • TEXT BOOKS:

    [T1] Singhal & Shivaratri, "Advanced Concept in Operating Systems", McGraw Hill

    REFERENCE BOOKS:

    [R1] Coulouris, Dollimore, Kindberg, "Distributed System: Concepts and Design”, Pearson Ed.

    NOTES:

    Notes by Mr. Dhajvir Singh Rai.

    Signature of HOD:__________

    Date: __________

  • 1. Explain the term Distributed Computing?

    2. What are the advantages of distributed computing over Centralized Computing?

    3. What are the characteristics of distributed system?

    4. What do you understand by WWW?

    5. Explain the term Replication?

    6. Explain the various examples of distributed systems?

    7. Explain the advantage and disadvantage of distributed system.

    8. Explain the Logical clocks, Lamport’s& vectors logical clocks.

    9. Explain the term Distributed Computing?

    10. What are the advantages of distributed computing over Centralized Computing?

    11. Explain the advantage and disadvantage of distributed system

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

    Course Name:Distributed Computing Assignment No. 1

    Course Code:TCS-801

    Faculty :Ramnarayan

    Branch:CSE Semester: 8th

    Unit/Title: Unit 1 Date of Issue: Date of Submission:

  • 1. Describe the various security threats in the security model.

    2. Explain the Various Architectural Models.

    3. What is Fundamental Models? Explain it with details.

    4. What do you understand by the term Resource sharing?

    5. What are Token based and non token based algorithms?

    6. Explain Agreement Problem in Distributed computing.

    7. Describe the Byzantine Agreement problem.

    8. Explain deadlock prevention, avoidance, detection & resolution.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

    Course Name:Distributed Computing Assignment No:2

    Course Code:TCS-801

    Faculty :Ramnarayan Branch:CSE Semester: 8

    th

    Unit/Title: Unit 2 Date of Issue: Date of Submission:

  • 1. Explain the term RMI and its advantage.

    2. What is Distributed object? Explain about communication of object.

    3. Explain the java RMI with distributed system.

    4. What is distributed file system?

    5. Explain the Sun Network File System with distributed file system.

    6. What is Andrew File System?

    7. Explain path pushing algorithms in distributed computing.

    8. Explain performance metric for distributed mutual exclusion algorithms.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

    Course Name:Distributed Computing Assignment No. 3

    Course Code:TCS-801

    Faculty :Ramnarayan Branch:CSE Semester: 8

    th

    Unit/Title: Unit 3 Date of Issue: Date of Submission:

  • 1. What is transactions and Concurrency Control? Explain the flat and nested distributed

    transactions.

    2. Describe Atomic Commit protocols.

    3. What is lock Locks? Explain Optimistic Concurrency control.

    4. Discuss the 2 forms of transparency?

    5. Differentiate upload/download and remote access model?

    6. What are the ways of dealing with shared files in distributed system?

    7. What are the different ways in which replication can be done?

    8. List the different ways of doing caching in client memory?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

    Course Name:Distributed Computing Assignment No. 4

    Course Code:TCS-801

    Faculty :Ramnarayan

    Branch:CSE Semester: 8th

    Unit/Title: Unit 4 Date of Issue: Date of Submission:

  • 1. What is grid computing? Explain the basics of grid computing.

    2. What is Client-Server Systems?

    3. What is meant by Replication? What is its motivation?.

    4. Explain grid terms and concepts, Grid user roles.

    5. What is cloud computing? Explain layers of cloud computing.

    6. What are the Cloud Computing Features? Explain Cloud Computing Security

    requirements.

    7. What is the cloud Computing Challenges?

    8. What is Distributed Recovery?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

    Course Name:Distributed Computing Assignment No. 5

    Course Code:TCS-801

    Faculty :Ramnarayan

    Branch:CSE Semester: 8th

    Unit/Title: Unit 5 Date of Issue: Date of Submission:

  • 1. What is Distributed System?

    2. List the Disadvantages of Distributed Systems.

    3. Differentiate Monolithic Kernel and Micro Kernel.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name:Distributed Computing Tutorial Sheet No. 1

    Course Code:TCS-801

    Faculty :Ramnarayan Branch: CSE Semester:8

    th

    Unit/Title: Unit-I Date of Discussion:

  • 1. Explain vector clock and its working.

    2. List the advantages of Distributed System over Personal Computer.

    3. What are the Characteristics of Centralized algorithms?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name:Distributed Computing Tutorial Sheet No. 2

    Course Code:TCS-801

    Faculty :Ramnarayan Branch: CSE Semester:8

    th

    Unit/Title: Unit-I Date of Discussion:

  • 1.Write the short notes on

    a) absence of global clock

    b) global state

    2. List the types of Transparency in DS.

    3. Explain Token based and non token based algorithms.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name:Distributed Computing Tutorial Sheet No. 3

    Course Code:TCS-801

    Faculty :Ramnarayan

    Branch: CSE Semester:8TH

    Unit/Title: Unit-I &II Date of Discussion:

  • 1. Explain Lamport’s& vectors logical clocks. 2. What are the solutions to overcome the issues faced in no blocking primitive?

    3. What is the difference between path pushing algorithms, edge chasing algorithms?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name:Distributed Computing Tutorial Sheet No. 4

    Course Code:TCS-801

    Faculty :Ramnarayan Branch: CSE Semester:8TH

    Unit/Title: Unit-II Date of Discussion:

  • 1. Explain Distributed Deadlock Detection. What is Interactive consistency Problem?

    2. Explain Byzantine agreement problem

    3. What is RPC Runtime?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name:Distributed Computing Tutorial Sheet No. 5

    Course Code:TCS-801

    Faculty :Ramnarayan Branch: CSE Semester:8TH

    Unit/Title: Unit-II & III Date of Discussion:

  • 1. Describe Communication between distributed objects.

    2. Explain Andrew File System and Recent advances

    3. Explain Remote procedure call, Events and notifications.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name:Distributed Computing Tutorial Sheet No. 6

    Course Code:TCS-801

    Faculty :Ramnarayan

    Branch: CSE Semester:8TH

    Unit/Title: Unit-III Date of Discussion:

  • 1. Explain and nested distributed transactions. What is Concurrency Control?

    2. What is distributed deadlocks and transaction recovery

    3. Describe Atomic Commit protocols.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

    Course Name:Distributed Computing Tutorial Sheet No. 7

    Course Code:TCS-801

    Faculty :Ramnarayan

    Branch: CSE Semester:8TH

    Unit/Title: Unit-IV Date of Discussion:

  • 1. What is distributed system? What are significant advantages and limitations of distributed

    system?

    2. Explain what could be the impact of absence of global clock and shared memory.

    3. Explain happened before relationship.

    4. Give the difference between casually related events and concurrent events.

    5. How are resource sharing done in distributed system? Explain with example.

    6. Discuss the following terms with example: 1) Resource sharing .2) Name Resolution.

    7. What are Lamport’s Logical Clocks? List the important conditions to be satisfied by Lamport logical clock

    8. Explain concept of Virtual time in Lamport’s system of logical clock. 9. What are Vector clocks? Explain with the help of implementation of vector clocks.how

    they are incremented

    10. What are the advantages of vector clocks over lamport clock?

    11. Explain space time diagram in case oflamport clock.

    12. Show that in Lamport’s algorithm if a site Si is executing the critical section then Si’s requestneed not be at the top of the request queue at another site Sj

    13. Explain the concept of casual ordering of messages

    14. Explain concept of global state

    15. What do you mean by distributed mutual exclusion?

    16. Many distributed algorithm require the use of a coordinating process.To what extent can

    such algorithms actually be considered distributed? Discuss

    17. What effect does a communication failure have on a system using the two algorithms for

    the casual ordering of messages?

    18. What are casually related events? How are they implemented?

    19. Describe ‘Snapshot algorithm of Chandy and Lamport.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Distributed Computing Question bank no. 1

    Course Code: TCS 801 Faculty:Mr. VaibhavRanjan

    Branch: CSE Semester: 7th

    Unit/Title: UNIT 1

    Date of Conduction:

  • 1. What are shortcomings of Ho Ramamoorthys two phase algorithm for deadlock

    detection?

    2. How does one phase algorithm remove the possibility of false deadlock detection?

    3. What are the differences in centralized and distributed algorithms? How is the

    performance of distributed algorithms evaluated?

    4. Explain the term Message complexity in reference to distributed algorithms.

    5. Explain classification of agreement problems.

    6. What do you mean by Byzantine Agreement Problem?

    7. List agreement and validity statements to solution of byzantine agreement problem.

    8. What is the solution to byzantine agreement problem.

    9. What are certain applications of agreement algorithms

    10. Show how a solution to consensus problem can be used to solve the interactive

    consistency problem.

    11. Explain how byzantine agreement cannot be reached among four processors,if two

    processors are faulty.Explain.

    12. What are different modes of processor failure.

    13. How the performance of agreement protocols is calculated.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Distributed Computing Question bank no. 2

    Course Code: TCS 801 Faculty:Mr. VaibhavRanjan

    Branch: CSE Semester: 7th

    Unit/Title: UNIT 2

    Date of Conduction:

  • 1. What do you mean by distributed objects?

    2. Explain the concept of remote method invocation with suitable example.

    3. How the parameters and results are passed to a remote procedure.Explain with a suitable

    example.

    4. Explain the concept of mounting.What is a mount point.

    5. Differentiate between name space and name resolution.

    6. Explain the following sentence 1)Consistency,availability,and performance tend to be

    contradictory forces in a distributed system

    7. What are the requirements of distributed file system?

    8. What are the events and notifications of distributed objects?

    9. Explain the participants in the distributed event notification and Jini distributed event

    specification.

    10. What do you mean by Distributed file system? Discuss the architecture of a Distributed

    file system

    11. Explain the mechanism of distributed file system?

    12. Explain the architecture of NFS in detail.

    13. What are the various goals of NFS?

    14. What are the key issues of Distributed File system?

    15. Explain the concept of Caching.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Distributed Computing Question bank no. 3

    Course Code: TCS 801 Faculty:Mr. VaibhavRanjan

    Branch: CSE Semester: 7th

    Unit/Title: UNIT 3

    Date of Conduction:

  • 1. What is a Transaction?

    2. What are the two main factors that threaten the atomicity of transaction?

    3. Describe how atomicity is ensured for a transaction in both commit and abort.

    4. What are the properties of Transaction?

    5. Describe how a non recoverable situation could arise if write locks are released after the

    last operation of a transaction but before its commitments.

    6. What are commit protocols? Explain

    7. Explain how the two phase commit protocol for nested transactions ensures that if the top

    level transaction commitsall the right descendants are committed or aborted.

    8. What are different phases of two phases commit protocols.

    9. Explain concept of deadlocks.

    10. Explain the Edge chasing algorithm with its steps.

    11. Compare the operations of two phase commit protocol over three phase commit protocol.

    Give advantages of each method.

    12. Explain concept for wait –for graphs 13. Describe the concept of Time stamp Concurrency control.

    14. How you can recover from the two-phase commit protocol.

    15. Discuss in brief the possibilities of transaction conflicts happening during read and write

    operations.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Distributed Computing Question bank no. 4

    Course Code: TCS 801 Faculty:Mr. VaibhavRanjan

    Branch: CSE Semester: 7th

    Unit/Title: UNIT 4

    Date of Conduction:

  • 1. What are wave and traversal algorithms? Explain the termination decision and

    dependence requirements of a wave algorithm

    2. What is Routing? Discuss the correctness, complexity, efficiency and robustness

    criteria of a good routing algorithm.

    3. What is destination based routing?

    4. Write short notes on 1) Balances Sliding Window Protocol

    CORBA services.

    5. What are wave and traversal algorithms?

    6. Explain the termination decision and dependence requirements of a wave algorithm

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Distributed Computing Question bank no. 5

    Course Code: TCS 801 Faculty:Mr. VaibhavRanjan

    Branch: CSE Semester: 7th

    Unit/Title: UNIT 5

    Date of Conduction:

  • Prerequisite: knowledge of communication and network engineering principles Objective:

    1. Capability development includes gaining an understanding of network engineering principles for network, system and service management.

    2. understanding of the protocols used throughout the network and how the protocols are designed to achieve different tasks.

    3. understanding multi-layer networks, an introduction to network management and information routing throughout the network

    4. Introduction to internetworking, routing and network management

    UNIT I Network Design: Design Principles - Determining Requirements - Analyzing the Existing

    Network - Preparing the Preliminary Design - Completing the Final Design Development -

    Deploying the Network - Monitoring and Redesigning – Maintaining - Design Documentation - Modular Network Design - Hierarchical Network Design - The Cisco

    Enterprise Composite Network Model.

    UNIT II Technologies - Switching Design: Switching Types - Layer 2 and 3 Switching - Spanning-

    Tree Protocol - Redundancy in Layer 2 Switched Networks - STP Terminology and Operation – Virtual LANs – Trunks - Inter-VLAN Routing - Multilayer Switching - Cisco Express Forwarding - Switching Security - Switching Design Considerations - IPv4 Routing Design:

    IPv4 Address Design - Private and Public Addresses – NAT - Subnet Masks - Hierarchical IP Address Design - IPv4 Routing Protocols – Classification - Metrics - Routing Protocol Comparison - IPv4 Routing Protocol Selection.

    UNIT III Network Security Design: Hacking – Vulnerabilities - Design Issues - Human Issues - Implementation Issues – Threats - Reconnaissance Attacks - Access Attacks – Information Disclosure Attacks - Denial of Service Attacks - Threat Defense - Secure Communication -

    Network Security Best Practices - SAFE Campus Design.

    UNIT IV Wireless LAN Design: Wireless Technology Overview - Wireless Standards – Wireless Components - Wireless Security - Wireless Security Issues - Wireless Threat Mitigation – Wireless Management - Wireless Design Considerations - Site Survey - WLAN Roaming -

    Wireless IP Phones - Quality of Service Design - QoS Models – IntServ - DiffServ154 - QoS Tools – Policing and Shaping - Congestion Avoidance - Congestion Management - Link-Specific Tools1 – QoS Design Guidelines.

    Dev Bhoomi Institute Of Technology

    SEMESTER: VIII

    Department of Computer Science & Engineering

    Course Level: Beginner Course Type: Core Credit:

    Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

    100/50

    Course Title :Advance computer network Course Code: TCS-083/TIT-084 Duration of External Exam: 3

    Hours

  • UNIT V Network Management Design: ISO Network Management Standard - Protocols and Tools – SNMP – MIB – RMON - Cisco NetFlow – Syslog – CiscoWorks - Network Management Strategy - SLCs and SLAs - IP Service-Level Agreements – Content Networking Design – Case Study – Venti Systems.

    TEXT BOOKS: [T1] Diane Tiare and Catherine Paquet, Campus Network Design Fundamentals , Pearson Education, 2006.

    REFERENCE BOOKS: [R1] Craig Zacker, The Complete Reference: Upgrading and Troubleshooting Networks , Tata McGraw-Hill,

    2000.

    Course Outcome Description

    CO1 To learn the basic concepts of Network design and principles

    CO2 Explain and analyze various network technologies and switching designs

    CO3 Ability to understand various network security designs

    CO4 To understand wireless LAN design

    CO5 Understanding network management design

  • DBIT DEHRADUN

    LESSON PLAN

    SEMESTER/YEAR: 8th

    /4th

    DEPARTMENT : CSE

    COURSE: ADVANCE COMPUTER NETWORKS COURSE CODE: TCS-083

    S.

    No

    .

    Topic Name

    Refernce/

    Text Book/

    Web

    (R/T/W)

    No. Of

    Lectures

    Delivery

    Method

    Remarks

    1. UNIT-1 : Network Design: Design Principles - Determining

    Requirements

    T1,R1 1 Chalk &

    Talk

    2. Analyzing the Existing Network - Preparing the Preliminary Design. T1,R1 1 Chalk &

    Talk

    3. Completing the Final Design Development - Deploying the Network T1,R1 1 Chalk &

    Talk

    4. Monitoring and Redesigning – Maintaining - Design Documentation T1,R1 1 Chalk & Talk

    5. Modular Network Design - Hierarchical Network Design T1 1 Chalk &

    Talk

    6. The Cisco Enterprise Composite Network Model T1 2 Chalk &

    Talk

    7. Switching Design: Switching Types - Layer 2 and 3 Switching T1,R1 2 Chalk &

    Talk

    8. Spanning Tree Protocol - Redundancy in Layer 2 Switched Networks -

    STP Terminology and Operation

    T1,R1 2 Chalk &

    Talk

    9. Virtual LANs – Trunks - Inter-VLAN Routing - Multilayer Switching T1 1 Chalk & Talk

    10.

    . Cisco Express Forwarding - Switching Security - Switching Design

    Considerations

    T1,R1 2 Chalk &

    Talk

    11. IPv4 Routing Design: IPv4 Address Design. T1,R1 2 Chalk &

    Talk

    12. Private and Public Addresses – NAT R1 1 Chalk & Talk

    13. Subnet Masks - Hierarchical IP Address Design NOTES 2 Chalk &

    Talk

    14. IPv4 Routing Protocols – Classification - Metrics NOTES 1 Chalk & Talk

    15. Routing Protocol Comparison - IPv4 Routing Protocol Selection.

    T1 2 Chalk &

    Talk

    12. UNIT-2: Network Security Design: Hacking – Vulnerabilities T1,R1 1 Chalk & Talk

    13. Design Issues - Human Issues - Implementation Issues T1,R1 2 Chalk &

    Talk

    14. Threats - Reconnaissance Attacks - Access Attacks – Information Disclosure Attacks

    T1,NOTES 2 Chalk &

    Talk

    15. Denial of Service Attacks - Threat Defense T1 2 Chalk &

    Talk

  • 16. Secure Communication - Network Security Best Practices - SAFE

    Campus Design

    T1,R1 2 Chalk &

    Talk

    17. Wireless LAN Design: Wireless Technology Overview - Wireless

    Standards

    T1 2 Chalk &

    Talk

    18. Wireless Components - Wireless Security - Wireless Security Issues T1 1 Chalk &

    Talk

    19. Wireless Threat Mitigation – Wireless Management - Wireless Design Considerations

    NOTES 2 Chalk &

    Talk

    20. Site Survey - WLAN Roaming - Wireless IP Phones T1 2 Chalk &

    Talk

    21.

    . Quality of Service Design - QoS Models – IntServ - DiffServ154 - QoS Tools

    T1,R1 1 Chalk &

    Talk

    22. Policing and Shaping - Congestion Avoidance - Congestion

    Management

    T1,R1 2 Chalk &

    Talk

    23. LinkSpecific Tools1 – QoS Design Guidelines T1,NOTES 2 Chalk & Talk

    24. Network Management Design: ISO Network Management Standard -

    Protocols and Tools

    NOTES 1 Chalk &

    Talk

    25. SNMP – MIB – RMON NOTES 2 Chalk & Talk

    26. Cisco NetFlow – Syslog – CiscoWorks NOTES 1 Chalk & Talk

    27. Network Management Strategy - SLCs and SLAs NOTES 2 Chalk &

    Talk

    28. Content Networking Design – Case Study – Venti Systems NOTES 1 Chalk & Talk

    Total Lectures: 50

    REMARKS/RECOMMENDATIONS FOR FUTURE:

    EXTRA CLASS TAKEN (IF ANY):

    TEXT BOOKS:

    [T1] Diane Tiare and Catherine Paquet, Campus Network Design Fundamentals , Pearson Education, 2006.

    REFERENCE BOOKS:

    [R1] Craig Zacker, The Complete Reference: Upgrading and Troubleshooting Networks , Tata McGraw-Hill, 2000.

    Signature of HOD:__________

    Date: __________

  • 1. Explain layer 2 switching methods.

    2. What are the basic network design principles?

    3. What is the role of analyzing the Existing Network for designing a network?

    4. What is Monitoring and Redesigning?

    5. What is the significance design Documentation?

    6. Write and explain commands to configure router.

    7. Differentiate between Modular Network Design and Hierarchical Network Design.

    8. Explain the Cisco Enterprise Composite Network Model.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

    Course Name: Advance Computer Networks Assignment No. 1

    Course Code: TCS-083 Faculty :Preeti Raturi

    Branch: CSE Semester: 8th

    Unit/Title: Network Design Date of Issue: Date of Submission:

  • 1. Differentiate between layer 2 and layer 3 switching

    2. What are switch loops and redundancy?

    3. Write short note on Spanning tree protocol (STP).

    4. Explain STP Terminology for removing switch loop.

    5. Differentiate between private and public Addresses.

    6. What is count to infinity (routing loop) problem? Discuss possible solutions to reduce

    count to infinity problem.

    7. Explain classful IP addressing scheme.

    8. What are the limitations of IPv4 addressing?

    9. What is subnetting?

    a. Subnet mask

    b. Variable length subnet masking

    c. Fixed length subnet masking

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

    Course Name: Advance Computer Networks Assignment No. 2

    Course Code: TCS-083 Faculty :Preeti Raturi

    Branch: CSE Semester: 8th

    Unit/Title: Switching Design Date of Issue: Date of Submission:

  • 1. Describe the network security design.

    2. What is Hacking? What are the basic vulnerabilities for hacking a system?

    3. What are the design issues, human issues for a network security design?

    4. What are the implementation issues for a network security design?

    5. What are Threats? Differentiate between active and passive attacks.

    6. What is Reconnaissance Attacks? Explain its categories.

    7. What are Access Attacks?

    8. Differentiate between information disclosure attacks and denial of service attacks.

    9. Explain Secure Communication.

    10. What are the network security best practices?

    11. Explain SAFE Campus Design.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

    Course Name: Advance Computer Networks Assignment No. 3

    Course Code: TCS-083 Faculty :Preeti Raturi

    Branch: CSE Semester: 8th

    Unit/Title: Network Security Design Date of Issue: Date of Submission:

  • 1. What is the wireless LAN design?

    2. What are the wireless standards and wireless components?

    3. Explain wireless security and wireless security issues.

    4. What are the differences between open loop and closed loop congestion control

    mechanisms?

    5. Write short notes on the following:

    a. Wireless IP Phones

    b. QoS Models

    c. WLAN Roaming

    6. What are the models of Quality of Service design?

    7. Explain IntServ and DiffServ154.

    8. Differentiate between policing and shaping.

    9. What are the guidelines for QoS Design?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

    Course Name: Advance Computer Networks Assignment No. 4

    Course Code: TCS-083 Faculty :Preeti Raturi

    Branch: CSE Semester: 8th

    Unit/Title: Wireless LAN Design Date of Issue: Date of Submission:

  • 1. Discuss ISO Network Management Standard.

    2. Briefly explain about flow control and error control in SCTP?

    3. Write short notes:

    a. SNMP

    b. MIB

    c. RMON

    4. Explain Cisco NetFlow.

    5. Explain the following:

    a. Syslog

    b. CiscoWorks

    6. Explain the network management strategy.

    7. Differentiate between SLCs and SLAs.

    8. Discuss IP Service-Level Agreements.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

    Course Name: Advance Computer Networks Assignment No. 5

    Course Code: TCS-083 Faculty :Preeti Raturi

    Branch: CSE Semester: 8th

    Unit/Title: Network Management Design Date of Issue: Date of Submission:

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

  • 1. Where will you find a Mac Address table? Explain the different fields that you find in the

    table?

    2. What is collision domain in a switch? How does a switch forward packets in a local lan

    environment?

    3. Where will you find a Mac Address table? Explain the different fields that you find in the

    table?

    4. What is collision domain in a switch? How does a switch forward packets in a local lan

    environment?

    5. What are the different classes of ip, give an example of each specifying the default

    number of network and host bits?

    6. What is NAT and how translation is executed and why NAT is needed?

    7. Perform a comparative study between different routing protocols and specify the Metric

    values used to select a path by different routing protocols.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial Sheet

    Course Name:ADVANCED Computer Network

    Course Code:TCS 083

    Faculty :Ms. Preeti Raturi

    Branch:CSE Semester: VIII

    Unit/Title: 1

    Date of Issue: Date of Submission:

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

  • 1. Define Phishing, IP spoofing and denial to service attacks.

    2. How can you protect a network from internal and external attacks?

    3. What are the policies that can help you in building your network secure?

    4. Encryption can act as a major technique to implement network security. Justify your view

    and where in a network encryption used.

    5. Giving examples explain SSL.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial Sheet

    Course Name: ADVANCED Computer Network

    Course Code:TCS 083

    Faculty : Ms. Preeti Raturi

    Branch:CSE Semester: VIII

    Unit/Title: 2

    Date of Issue: Date of Submission:

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

  • 1. Encryption can act as a major technique to implement network security. Justify your

    view and where in a network encryption used.

    2. Giving examples explain SSL.

    3. Define Phishing, IP spoofing and denial to service attacks.

    4. How can you protect a network from internal and external attacks?

    5. Detail SAFE Campus Design keeping in mind the Cisco SAFE Blueprint.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial Sheet

    Course Name: ADVANCED Computer Network

    Course Code:TCS 083

    Faculty : Ms. Preeti Raturi

    Branch:CSE Semester: VIII

    Unit/Title: 3

    Date of Issue: Date of Submission:

  • 1. What is a Wireless Access Point? Giving examples explain Integrated WAP and wireless

    access clients?

    2. What are the different aspects that should be looked to maintain Wireless network

    security?

    3. Why there is need of a site survey before deploying a wireless network, if there is a need

    then it proves that wireless network is not suitable for every site?

    4. What are the Design Considerations for Wireless IP Phones?

    5. Discuss the Industry standards pertaining to wireless LANs.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial Sheet

    Course Name: ADVANCED Computer Network

    Course Code:TCS 083

    Faculty : Ms. Preeti Raturi

    Branch:CSE Semester: VIII

    Unit/Title: 4

    Date of Issue: Date of Submission:

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

  • 1. Explain in detail the working and implementation of Simple Network Management Protocol.

    2. Discuss the network management strategies and also specify SLA’s and SLC’s? 3. Discuss the components and design of content networking in detail.

    4. Cisco developed a application named CiscoWorks, what is it aimed for? Can this

    application work with other than Cisco networks?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial Sheet

    Course Name: ADVANCED Computer Network

    Course Code:TCS 083

    Faculty : Ms. Preeti Raturi

    Branch:CSE Semester: VIII

    Unit/Title: 2

    Date of Issue: Date of Submission:

    http://en.wikipedia.org/wiki/Simple_Network_Management_Protocolhttp://en.wikipedia.org/wiki/Simple_Network_Management_Protocol

  • 1. What are the different hardware components required to construct a local area network

    and how would you enable communication between multiple networks?

    2. What are different design principles that are required to be executed before planning a

    network?

    3. What is a design and a how can be a good design classified?

    4. Discuss the different design principles in detail?

    5. What is PDIOO Network life cycle?

    6. Before deploying a network what requirement s need to be analyzed?

    7. Discuss the different phases in which a network can be deployed.

    8. What is modular design of computer network?

    9. Explain in detail the Hierarchical Network Design Model.

    10. Why is there need of network redesigning and Network monitoring?

    11. Discuss detailed deployment plan and schedule, including implementation, testing,

    training, and contracts?

    12. How will you plan for what is to be monitored in the operating network and how errors

    are to be handled?

    13. If you analyzed and audited the existing network, if one exists, to determine any

    restrictions on the new network as well as what portions of the existing network should

    be retained?

    14. Determined the requirements and constraints related to business issues, including the

    budget? Are the requirements clear and deterministic? Support your answer by relevant

    theory.

    15. Explain using a diagram Cisco Enterprise Composite Network Model.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Advance Computer Network Question bank no. 1

    Course Code: TCS 083 Faculty:Ms. Preeti Raturi

    Branch: CSE Semester:8th

    Unit/Title: UNIT 1

    Date of Conduction:

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

  • 1. Switches can enhance the performance, flexibility, and functionality of your network.

    Explain HOW?

    2. In what ways can a Switch is different from a Hub.

    3. What is switching in computer networks?

    4. Where will you find a Mac Address table? Explain the different fields that you find in the

    table?

    5. What is collision domain in a switch? How does a switch forward packets in a local lan

    environment?

    6. Explain the types of switching and also differentiate between them.

    7. What is a Spanning tree Protocol and explain how is it important for switched networks?

    8. Explain STP protocol Terminology and Operation.

    9. What is the importance of VLAN’s in a switched network? 10. Explain the need of VLAN’s and also give details of operation. 11. Explain the following terms with respect to a VLAN - Designated and Non Designated

    port, Trunk Port and Inter VLAN routing.

    12. How the STP is critical in a Layer 2 switched environment to prevent loops 13. How switches fit into the design models 14. The two types of switches: Layer 2 and Layer 3

    15. Explain Multilayer Switching and Cisco Express Forwarding.

    16. How is security implemented in switching and why is security needed?

    17. Discuss and differentiate between Public and Private ip addresses.

    18. What are the different classes of ip, give an example of each specifying the default

    number of network and host bits?

    19. What is NAT and how translation is executed and why NAT is needed?

    20. How is routing done, define the different techniques?

    21. Perform a comparative study between different routing protocols and specify the Metric

    values used to select a path by different routing protocols.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Advance Computer Network Question bank no. 2

    Course Code: TCS 083 Faculty:Ms. Preeti Raturi

    Branch: CSE Semester: 8th

    Unit/Title: UNIT 2

    Date of Conduction:

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

  • 1. Define hacking and specify the type of hackers that exist.

    2. Discuss why a network can be said vulnerable to the outer attacks.

    3. Categorize the different type of attacks that can be made to deteriorate the network

    security.

    4. Define Phishing, IP spoofing and denial to service attacks.

    5. How can you protect a network from internal and external attacks?

    6. What are the policies that can help you in building your network secure?

    7. What is Intrusion Prevention Systems, discuss in detail its full specifications?

    8. Encryption can act as a major technique to implement network security. Justify your

    view and where in a network encryption used.

    9. Giving examples explain SSL.

    10. Explain wrt Network security the policy of Network Admission control.

    11. Detail SAFE Campus Design keeping in mind the Cisco SAFE Blueprint

    .

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Advance Computer Network Question bank no. 3

    Course Code: TCS 083 Faculty:Ms. Preeti Raturi

    Branch: CSE Semester: 8th

    Unit/Title: UNIT 3

    Date of Conduction:

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

  • 1. The popularity of WLANs is undeniable. Do you agree, if Yes or No, whichever it is

    support your answer?

    2. Differentiate giving key details between a Wired +LAN and a Wireless LAN.

    3. Explain the different Wireless standards giving details of the frequency, compatibility

    and throughput.

    4. What is a Wireless Access Point? Giving examples explain Integrated WAP and wireless

    access clients?

    5. What are the different aspects that should be looked to maintain Wireless network

    security?

    6. Explain in detail the Wireless Security Standards. 7. What is the need of Wireless Protected access and Wireless intrusion detection systems?

    8. If you get a job of Network Administrator in certain company and have to look the

    existing wireless network, discuss how you will manage wireless network.

    9. Give a detailed report on wireless design considerations.

    10. Why there is need of a site survey before deploying a wireless network, if there is a need

    then it proves that wireless network is not suitable for every site?

    11. What are the Design Considerations for Wireless IP Phones?

    12. Discuss the Industry standards pertaining to wireless LANs.

    13. Explain Wireless management using Cisco Integrated Wireless Networks.

    14. QoS ensures quality service to network traffic, what can be the factors that can

    deteriorate traffic in a network and what are the measures that can be taken to ensure

    smooth flow of traffic.

    15. Using diagrams explain different QoS models.

    16. You want improve Quality of service that your network provides what the QoS tools that

    you will use. Regarding the QoS tools explain classification and marking?

    17. Define congestion in a network also explain why congestion occurs and specify how

    congestion can be avoided?

    18. Specify the Quality of Service Guidelines.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Advance Computer Network Question bank no. 4

    Course Code: TCS 083 Faculty:Ms. Preeti Raturi

    Branch: CSE Semester: 8th

    Unit/Title: UNIT 4

    Date of Conduction:

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

  • 1. Explain in detail the working and implementation of Simple Network Management Protocol.

    2. How does RMON support monitoring and protocol analysis?

    3. For which IP based applications CISCO NetFlow can be used.

    4. Cisco developed a application named CiscoWorks, what is it aimed for? Can this

    application work with other than Cisco networks?

    5. Specify the Network Management Standard, and also there protocols and tools.

    6. Discuss the network management strategies and also specify SLA’s and SLC’s? 7. Discuss the components and design of content networking in detail.

    8. Write short note on the following:

    Simple Network Management Protocol (SNMP) Management Information Base (MIB) Remote Monitoring (RMON) Cisco NetFlow Syslog CiscoWorks

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

    Course Name: Advance Computer Network Question bank no. 5

    Course Code: TCS 083 Faculty:Ms. Preeti Raturi

    Branch: CSE Semester: 8th

    Unit/Title: UNIT 5

    Date of Conduction:

    http://en.wikipedia.org/wiki/Simple_Network_Management_Protocolhttp://en.wikipedia.org/wiki/Simple_Network_Management_Protocol

  • .

  • Prerequisite: Knowledge of Database Management System.

    Objective:

    1. Introduce basic concepts and major techniques in DBMS implementations.

    2. To understand concepts and techniques for data storage, query processing, and transaction

    management.

    3. Introduce research development ability in databases through technical survey and presentation.

    UNIT-1

    Distributed DBMS Concepts and design: Introduction, functions and architecture of a DDBMS,

    distributed relational database design, Transparencies in a DDBMS, Twelve rules for a

    DDBMS. Advanced concepts: Distributed transaction management, distributed concurrency

    control, distributed deadlock management, distributed database recovery, X/open distributed

    Transaction processing model, Replication servers, Distributed query optimization, Mobile

    databases.

    UNIT-2

    Object-Oriented DBMS Introduction, advanced database applications, weakness of RDBMS,

    storing objects in a relational database, next-generation database systems. Concepts and design:

    OODBMS perspectives, persistence, issues in OODBMS, advantages and disadvantages of

    OODBMS, Object-oriented database design.

    UNIT-3

    Standards and systems: object management group, object database standard ODMG 3.0 1999, Object store. Object relational DBMS: Introduction, third generation database manifestos,

    SQL8, Object oriented extensions in Oracle, Comparison of ORDBMS and OODBMS.

    UNIT-4

    Web technology and DBMS Web as a database Application Platform: Requirements for web-

    DBMS integration, web-DBMS architecture, advantages and disadvantages of web-DBMS

    approach, approaches to integrating the web and DBMS, Oracle Internet Application Server

    (IAS).

    UNIT-5

    Data Warehousing Concepts, OLAP and Data mining Evolution of data warehousing, data

    warehousing concepts, benefits and problems of data warehousing, comparison of OLTP

    systems and data warehousing, On-Line Processing, Introduction to data mining.

    Dev Bhoomi Institute Of Technology

    SEMESTER: IV

    Department of Computer Science & Engineering

    Course Level: Beginner Course Type: Core Credit:

    Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

    100/50

    Course Title: ADVANCED DBMS Course Code: TCS-087/TIT-089 Duration of External Exam: 3

    Hours

  • Books:

    1. Adam, Nabil R., Bhargava, Bharat K., “Advanced Database Systems”, Springer. 2. Carlo Zaniolo, Stefano Ceri, “Advanced Database Systems”, Morgan Kaufmann, 1997

    Course Outcome Description

    CO1 Explain and evaluate the fundamental theories and requirements that influence

    the design of modern database system.

    CO2 Assess and apply database functions and packages suitable for enterprise database development and database management.

    CO3 To understand the difference between DBMS and advanced DBMS and use of

    advanced database concepts and become proficient in creating database

    queries.

    CO4 Critically evaluate alternative designs and architectures for databases and web

    based DBMS architecture.

    CO5 To understand the new technologies such as OLAP, data mining and data

    warehousing.

  • DBIT/BTech/CSE/06

    DBIT DEHRADUN

    LESSON PLAN

    SEMESTER/YEAR: 8th

    / 4th

    DEPARTMENT : CSE

    COURSE: ADVANCED DBMS COURSE CODE: TCS-087

    S.

    No

    .

    Topic Name

    Refernce/

    Text Book/

    Web

    (R/T/W)

    No. Of

    Lectures

    Delivery

    Method

    Remarks

    1. Introduction to Distributed DBMS Concepts and design T1,R1 1 Chalk &

    Talk

    2. Distributed relational database design, T1,R1 2 Chalk &

    Talk

    3. Transparencies in a DDBMS, Twelve rules for a DDBMS. T1,R1 2 Chalk &

    Talk

    4. Advanced concepts. T1,R1 1 Chalk &

    Talk

    5. Distributed transaction management. T1 1 Chalk &

    Talk

    6. Distributed concurrency control. T1 1 Chalk &

    Talk

    7. Distributed deadlock management. T1,R1 2 Chalk &

    Talk

    8. Distributed database recovery. T1,R1 1 Chalk &

    Talk

    9. X/open distributed Transaction processing model. T1,T2 1 Chalk &

    Talk

    10.

    .

    Replication servers. T1,R1 2 Chalk &

    Talk

    11. Distributed query optimization. T1,R1,W 2 Chalk &

    Talk

    12. Mobile databases. T1,R1 1 Chalk &

    Talk

    13. Object-Oriented DBMS Introduction. T1,R1 2 Chalk &

    Talk

    14. Advanced database applications. T1,NOTES 2 Chalk &

    Talk

    15. Weakness of RDBMS. T1,R2 1 Chalk &

    Talk

    16. storing objects in a relational database. T1,R1 2 Chalk &

    Talk

    17. next-generation database systems. T1,T2 2 Chalk &

    Talk

    18. Concepts and design. T1 1 Chalk &

    Talk

    19. OODBMS perspectives. NOTES 2 Chalk &

    Talk

    20. persistence, issues in OODBMS. T1 2 Chalk &

    Talk

    21.

    .

    advantages and disadvantages of OODBMS. T1,T2 2 Chalk &

    Talk

    22. Object-oriented database design. T1,T2 2 Chalk &

    Talk

    23. UNIT-3 Standards and systems. T1,T2 2 Chalk &

    Talk

    24. object management group. NOTES 1 Chalk &

    Talk

  • DBIT/BTech/CSE/06

    25. Object database standard ODMG 3.0 1999 NOTES 1 Chalk &

    Talk

    26. Object store. NOTES 2 Chalk &

    Talk

    27. Introduction to Object relational DBMS. NOTES 2 Chalk &

    Talk

    28. third generation database manifestos. NOTES 1 Chalk &

    Talk

    29. SQL8, Object oriented extensions in Oracle. T2,R1 2 Chalk &

    Talk

    30. Comparison of ORDBMS and OODBMS. T2 1 Chalk &

    Talk

    31. Web technology and DBMS Web as a database Application Platform. T2,NOTES 2 Chalk &

    Talk

    32. Requirements for webDBMS integration. T2,R1 2 Chalk &

    Talk

    33. Web-DBMS architecture. T2,R1 1 Chalk &

    Talk

    34. Advantages and disadvantages of web-DBMS approach. T2 1 Chalk &

    Talk

    35. Approaches to integrating the web and DBMS. T1,T2 2 Chalk &

    Talk

    36. Oracle Internet Application Server (IAS). T1,T2 2 Chalk &

    Talk

    37. Data Warehousing Concepts. T2 2 Chalk &

    Talk

    38. OLAP and Data mining Evolution of data warehousing. T2 1 Chalk &

    Talk

    39. Data warehousing concepts. T2,R2 1 Chalk &

    Talk

    40. Benefits and problems of data warehousing. T2,R2 1 Chalk &

    Talk

    41. Comparison of OLTP systems and data warehousing. T1,T2 1 Chalk &

    Talk

    42. On-Line Processing, Introduction to data mining. NOTES 1 Chalk &

    Talk

    Total Lectures: 61

    TEXT BOOKS:

    [T1] Adam, Nabil R., Bhargava, Bharat K., “Advanced Database Systems”, Springer. [T2] Modern Database Management by Pearson Paperback – 26 Sep 2017by A. Hoffer Jeffrey (Author), V. Ramesh (Author), Topi Heikki (Author)

    REFERENCE BOOKS:

    [R1] Carlo Zaniolo, Stefano Ceri, “Advanced Database Systems”, Morgan Kaufmann, 1997 [R2] Advanced Database Management System (MISL-DT) Paperback – 2014 by Rini Chakrabarti (Author), Shilbhadra Dasgupta (Author), Subhash K. Shinde (Author)

    https://www.amazon.in/s/ref=dp_byline_sr_book_1?ie=UTF8&field-author=A.+Hoffer+Jeffrey&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_2?ie=UTF8&field-author=V.+Ramesh&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_2?ie=UTF8&field-author=V.+Ramesh&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_2?ie=UTF8&field-author=V.+Ramesh&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_3?ie=UTF8&field-author=Topi+Heikki&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_1?ie=UTF8&field-author=Rini+Chakrabarti&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_1?ie=UTF8&field-author=Rini+Chakrabarti&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_1?ie=UTF8&field-author=Rini+Chakrabarti&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_2?ie=UTF8&field-author=Shilbhadra+Dasgupta&search-alias=stripbookshttps://www.amazon.in/s/ref=dp_byline_sr_book_3?ie=UTF8&field-author=Subhash+K.+Shinde&search-alias=stripbooks

  • DBIT/BTech/CSE/06

    OTHER REFERENCES: 1. NPTEL Lectures

    NOTES:

    Notes by various internet resources.

    Signature of HOD:__________

    Date: __________

  • 1. Discuss the table inheritance in SQL.

    2. Consider the database schema with a relation University whose attributes are as shown below; with

    types specified for multi-valued attributes.

    Staff(sname, Department set multiset(department), subject set multiset(subjects)).

    Department = (name, joining date)

    Subjects = (type, exam set of (exams))

    Exams = (year, place)

    i) Define the above schema in SQL:2003 with appropriate types for each attribute.

    ii) Using database schema in SQL:2003, write the following queries;

    a) Find name of all staff who have joined after January 2013.

    b) List all subjects in the relation University.

    3. Explain document type definition. Describe a DTD with suitable example for an XML.

    4. Write the applications of XML.

    5. Differentiate object oriented (OO) and object relational (OR) databases.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

    Assignment

    Course Name:ADVANCED DBMS

    Course Code:TCS-087

    Faculty :MR. VAIBHAV RANJAN

    Branch:CSE Semester: VIII

    Unit/Title: 1

    Date of Issue: Date of Submission:

  • 1. Explain in detail the data warehouse architecture.

    2. Write short notes on the following;

    i) Online transaction processing

    ii) Data warehouse data house

    iii) Dimensionality modeling in data warehouse

    iv) Data warehouse using Oracle

    v) Data marts

    3. Explain the functions of Administration & Management tools in data warehouse.

    4. Explain the approaches taken by vendor to provide data extraction, cleansing, and data

    transformation tools.

    5. Write the algorithm for K-Mean data mining.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

    Assignment

    Course Name: ADVANCED DBMS

    Course Code: TCS-087

    Faculty : MR. VAIBHAV RANJAN

    Branch:CSE Semester: VIII

    Unit/Title: 2

    Date of Issue: Date of Submission:

  • 1. Describe the characteristics of multi-dimensional data and how this data can be represented?

    2. Write short notes on the following;

    i) OLAP benchmarks

    ii) Applications and benefits of OLAP

    iii) Bayesian classifier

    iv) Predictive modeling

    3. Discuss OLAP functionality provided by ROLLUP and CUBE of SQL standard.

    4. Write the types of locks.

    5. Explain exception handlers in Oracle.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

    Assignment

    Course Name: ADVANCED DBMS

    Course Code: TCS-087

    Faculty : MR. VAIBHAV RANJAN

    Branch:CSE Semester: VIII

    Unit/Title: 3

    Date of Issue: Date of Submission:

  • 1. Explain implicit and explicit locking in Oracle.

    2. Write notes on database security and threats.

    3. Explain the authorization and access control for providing security for database

    4. What are long duration transactions? What are the adverse effects of following concurrency

    protocols on long duration transactions?

    5. What is the effect of the speed of the interconnection between the client and the server on the

    choice between object and page shipping?

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

    Assignment

    Course Name: ADVANCED DBMS

    Course Code: TCS-087

    Faculty : MR. VAIBHAV RANJAN

    Branch:CSE Semester: VIII

    Unit/Title: 4

    Date of Issue: Date of Submission:

  • 1. What form of parallelism (inter-query, inter-operation or intra-operation) is likely to be the

    most important for each of the following tasks: Increasing the throughput of a system with many

    small queries, increasing the throughput of a system with a few large queries, when the number

    of disks and CPUs is large.

    2. What is pipelined parallelism? What are the drawbacks of pipelined parallelism? 15 05

    3 What are the main software modules of DDBMS? Discuss the main functions of each of these

    modules in context to client-server architecture.

    4. What is fragment of a relation? What are the main types of fragments? Why are fragments a

    useful concept in distributed database design?

    5. List the basic operations of the following built-in interfaces of the ODMG Object Model:

    Object, Collection, Iterator, Set, and List.

    DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

    Assignment

    Course Name: ADVANCED DBMS

    Course Code: TCS-087

    Faculty : MR. VAIBHAV RANJAN

    Branch:CSE Semester: VIII

    Unit/Title: 5

    Date of Issue: Date of Submission:

  • 1 .What is PL/SQL Engine? Draw PL/SQL BLOCK structure. Explain each block.

    2.Des