MCS-022 Solved Assignment 2024-25
MCS-022 Solved Assignment 2024-25
Weightage : 25%
Last Dates for Submission : 31st October, 2024 (For July, Session) : 30th April, 2025 (For
January, Session)
Note:
Answer all the questions of the assignment having 80 marks in total. 20 marks are for viva
voce. You may use illustrations and diagrams to enhance the explanations. Please go
through the guidelines regarding assignments given in the Programme Guide for the format
of presentation. Answer of each part of the question should be confined to about 300
words.
Q1. (a) Compare and contrast the Distributed operating system with the Network
operating system. Give an example of each. (6 Marks)
Solution:
Introduction:
Q1. (b) Define a Real Time Operating System. Give any two examples of a real time
operating system. (4 Marks)
Solution:
Definition:
Characteristics of an RTOS:
Deterministic Behavior: Predictable and consistent response times for tasks and
events.
Fast Context Switching: Enables rapid switching between tasks for timely execution.
Preemptive Scheduling: Allows higher-priority tasks to interrupt lower-priority tasks.
Minimal Overheads: Keeps system overhead to a minimum to ensure timely
responses.
Q2. (a) What is EFS service? Describe the concept of encryption using EFS service. (5
Marks)
Solution:
EFS is a file system driver that provides encryption capabilities for files and folders stored on
NTFS formatted volumes. It allows users to encrypt their sensitive data, protecting it from
unauthorized access even if the computer is compromised or data is stolen.
The core concept behind EFS encryption revolves around the following aspects:
1. File Encryption: When a user enables EFS for a file or folder, EFS encrypts the file
content using a cryptographic algorithm, rendering the data unreadable without the
appropriate decryption key.
2. Encryption Key Management: EFS manages encryption keys using a hierarchical
approach.
o File Encryption Key: Each encrypted file has its own unique encryption key.
o User Certificate: Each user has a digital certificate associated with their user
account, storing their public and private keys. The user's private key is used to
decrypt the file encryption keys.
o Recovery Agent: A designated user or service (like a domain administrator)
can act as a recovery agent. This agent holds a certificate that can be used to
decrypt files in case the original user loses access to their private keys.
3. Data Decryption: When a user attempts to access an encrypted file, EFS uses the
user's private key to decrypt the file encryption key and subsequently decrypts the
file content. This process is transparent to the user, ensuring seamless access to their
encrypted data.
4. Integration with NTFS: EFS leverages the NTFS file system to store encryption
information for each file, such as encryption status and key identifiers.
Q2. (b) Compare TFTP and FTP. Which protocol is used by TFTP at the transport layer
and why? (5 Marks)
Solution:
Comparison:
TFTP utilizes the User Datagram Protocol (UDP) at the transport layer.
Q3. (a) List and explain the file systems supported by Linux operating system. Also,
write the security features provided by Linux in each file system. (5 Marks)
Solution:
Linux supports a wide range of file systems, each with its own characteristics and strengths.
Some of the most common include:
Solution:
Definition: DAC grants the owner of a resource the ability to control who can access
it and what permissions they have.
Enforcement: Access permissions are set by the owner of the resource, and the
system enforces these permissions.
Focus: Flexibility and convenience in managing access to resources within a specific
group or organization.
Example: A file owner can grant "Read" access to one user and "Read & Write"
access to another user.
Q4. Write the step-by-step procedure to create a group named "MCS022". Now add a
user "SOCIS" in Windows 2000 operating system. Assume user "SOCIS" is already a
member of the guest account in your system. Also explain the basic purpose of
enabling the offline features in Windows 2000 operating system. (10 Marks)
Solution:
Following are the step-by-step procedures to create a group named "MCS022" and add the
user "SOCIS" to it:
1. Locate the "MCS022" group: In the left pane of "Users and Computers", expand the
"Groups" folder and find the "MCS022" group.
2. Right-click on "MCS022": A context menu will appear.
3. Select "Properties": This will open the "MCS022 Properties" dialog box.
4. Navigate to the "Members" tab: This tab lists the current members of the group.
5. Click "Add": This will launch the "Select Users, Computers, or Groups" dialog box.
6. Enter the user name "SOCIS": Type "SOCIS" in the "Enter the object names to
select" field.
7. Click "Check Names": This will verify the user name.
8. Click "OK": This will add "SOCIS" to the "MCS022" group.
9. Click "OK" again: This will close the "MCS022 Properties" dialog box.
Note: Since "SOCIS" is already a member of the "Guest" group, this step will add "SOCIS" to
the "MCS022" group in addition to the "Guest" group.
Offline features in Windows 2000 enable users to work with files and resources even when
they are not connected to the network. The basic purpose of enabling these features is to:
Improved Productivity: Users can continue their work even when disconnected,
which is particularly beneficial for mobile users or in environments with intermittent
connectivity.
Enhanced Collaboration: Users can work on shared documents and resources offline,
and then synchronize their changes when they reconnect to the network.
Data Availability: Offline files and folders remain accessible even when the server or
network is unavailable.
Reduced Network Traffic: Offline files reduce the need for constant network access,
which can conserve bandwidth and improve network performance.
Enabling offline features requires the use of features like Offline Folders and Offline Files in
Windows 2000. These features allow users to create copies of network files and folders on
their local machines, providing access to those files when disconnected.
Q5. Answer the following questions related to Linux commands: (10 Marks)
(ii) List the files having more than one digit in the name.
(iii) Tell the system to run the process continuously even if the user logs out.
(iv) To allow a user to communicate with another user, logged in by splitting the screen
and providing two-way communication.
Solution:
The command w (or who) displays a list of users currently logged into the system, along
with their login time, idle time, and the terminal they are using.
w
Alternatively, who provides a simpler output with the username, terminal, and login time.
who
(ii) List the files having more than one digit in the name:
This task can be accomplished using the find command with a regular expression to match
filenames containing at least two digits.
(iii) Tell the system to run the process continuously even if the user logs out:
To ensure a process continues running even after a user logs out, it needs to be launched
as a daemon or background process using the nohup command.
(iv) To allow a user to communicate with another user, logged in by splitting the screen
and providing two-way communication:
The screen command can be used to create multiple sessions within a single terminal,
allowing users to communicate and interact in separate windows. However, for direct two-
way communication, a tool like xterm or gnome-terminal combined with screen can be
employed.
User1: Launches a screen session and starts a chat program (e.g., xchat or irssi).
User2: Attaches to User1's screen session.
They can use the chat program within the shared screen environment for
communication.
Alternatively, tools like tmux provide better flexibility in managing multiple sessions and
panes for efficient communication.
To terminate a process after a specified time (one hour in this case), we can use a
combination of sleep and kill commands.
sleep 3600; kill -9 <process_id>
This command waits for one hour (3600 seconds) and then sends a kill signal ( -9 ) to the
process with the provided process_id. This method is simple but may not be the most
graceful way to terminate a process. Alternatively, using a process management tool like
systemd or cron can provide more sophisticated scheduling and process management
features.
Q6. (a) List and describe the various security features in Windows 2000 operating
system. (5 Marks)
Solution:
Windows 2000 incorporates a variety of mechanisms to protect system resources and data
from unauthorized access. Here are some of the key security features:
Description: Windows 2000 utilizes user accounts and groups to manage access to
resources. Each user has a unique account with specific permissions, and these users
can be organized into groups to simplify access control management.
Purpose: This feature helps restrict access to sensitive data and resources based on
user roles and responsibilities.
Description: ACLs are used to define specific permissions for users and groups on
objects like files, folders, and registry keys. These permissions specify whether a user
can read, write, execute, or modify the object.
Purpose: This provides fine-grained control over access to resources, ensuring that
only authorized users can perform specific actions.
3. Audit Policies:
Description: Audit policies allow system administrators to track and log various
security-related events, such as logon attempts, file access, and system changes.
Purpose: These logs provide valuable insights into system activity and can be used
to identify potential security breaches or suspicious behavior.
4. Security Policies:
5. Kerberos Authentication:
Description: ICF is a built-in firewall that monitors and controls network traffic
entering and leaving the computer. It can block unauthorized access to the system
and restrict access to specific network resources.
Purpose: This helps protect the system from external threats and malicious activities
originating from the internet.
7. Certificate Services:
Description: This feature allows the system to issue and manage digital certificates,
which can be used for authentication and encryption.
Purpose: Digital certificates enhance security by verifying the identity of users and
computers, ensuring secure communication and data exchange.
Q6. (b) What is Virtual Memory? Explain the abstract model of virtual to physical
address mapping with reference to Linux operating system. (5 Marks)
Solution:
It is a crucial technique that allows an operating system to extend the address space
available to a process beyond the physical memory capacity of the system.
Virtual memory is a memory management technique that uses a combination of RAM and
disk storage to provide a larger address space to processes than the physical RAM available.
It creates an illusion of a larger memory space than physically exists.
How it Works:
1. Logical Address Space: Each process has its own logical address space, which is a
range of addresses it can access. This address space is independent of the physical
memory addresses.
2. Physical Address Space: The actual physical memory of the system forms the
physical address space.
3. Page Table: A critical component is the page table, which maps logical addresses to
physical addresses. Each entry in the page table corresponds to a page of the
process's logical address space and holds the corresponding physical frame address
in memory.
4. Paging: When a process accesses a logical address, the MMU (Memory Management
Unit) uses the page table to translate it into a physical address. If the required page
is not in physical memory, a page fault occurs.
5. Swapping: The OS handles the page fault by bringing the required page from the
disk into a free frame in physical memory. This process of swapping pages between
memory and disk is managed by the operating system.
Abstract Model of Virtual to Physical Address Mapping in Linux:
Linux uses a multi-level page table structure for mapping virtual addresses to physical
addresses. The process involves the following:
1. Virtual Address: A process generates a virtual address, which is split into various
fields.
2. Page Table Entry (PTE): The virtual address is used to index the page table entries.
These entries contain information about the corresponding physical frame and other
attributes (e.g., valid/invalid, permissions).
3. Physical Address: The PTE provides the base physical address of the frame in
memory.
4. Offset: The virtual address's offset field is combined with the base physical address
to form the final physical address used by the MMU to access the data.
Example:
Consider a 32-bit Linux system with a 4KB page size. A virtual address might be split into a
20-bit page number and a 12-bit offset.
Significance:
Larger address space: Processes can access more memory than physically available.
Memory sharing: Multiple processes can share the same physical memory pages.
Protection: Memory protection is enforced through the page table and permissions.
Efficient resource utilization: Memory can be allocated and deallocated dynamically.
Q7. Write a Linux shell script for automatic grouping of files given in a directory. All
files will be grouped on the basis of their size and will be saved into the newly created
folders based on file size groups given below: Files will be grouped into 0 to 5 kB, 5 kB
to 5 MB, 5 MB to 1 GB and greater than 1 GB. (10 Marks)
Solution:
#!/bin/bash
# Check if the directories for each group exist, create them if not
mkdir -p "0-5KB" "5KB-5MB" "5MB-1GB" "1GB+"
Screenshot:
Q8. Write short notes on the following: (10 Marks)
(d) Firewall
Solution:
A LAN (Local Area Network) topology defines the physical and logical arrangement of
devices and connections within a network. My understanding is that different topologies
influence network performance, reliability, and cost. Common LAN topologies include:
Bus Topology: All devices are connected to a single cable (the bus). Simple and
inexpensive, but a single cable failure can bring down the whole network.
Star Topology: All devices are connected to a central hub or switch. Easy to manage,
fault-tolerant, and scalable, making it a popular choice.
Ring Topology: Devices are connected in a circular fashion, with data flowing in one
direction. Good for equal access to resources, but a single failure can impact the
entire ring.
Mesh Topology: Every device is connected to every other device. Highly reliable due
to redundancy, but complex and expensive to implement.
Tree Topology: Hierarchical structure resembling a tree, with a root node branching
out to other nodes. Combines features of bus and star topologies, good for larger
networks.
Token Ring is a network topology where data is transmitted in a circular fashion, with a
special frame called a "token" circulating through the network. My understanding is that
only the device holding the token is allowed to transmit data.
Mechanism: When a device needs to transmit, it waits for the token, attaches its
data to it, sends it around the ring, and then releases the token.
Advantages: Controlled access prevents collisions, provides deterministic
performance, and is well-suited for real-time applications.
Disadvantages: Performance degrades as the network grows, susceptible to single
points of failure if a device fails, and less popular compared to Ethernet.
Network monitoring tools are essential for ensuring network performance, security, and
troubleshooting. My understanding is that these tools help me collect data on network
traffic, device availability, and potential issues. Examples include:
(d) Firewall
A firewall is a security system that controls network traffic entering and leaving a network or
device. My understanding is that firewalls act as a barrier between a trusted internal network
and an untrusted external network.
Function: It examines network traffic based on pre-defined rules and blocks or allows
traffic accordingly.
Types: Hardware firewalls (dedicated devices) and software firewalls (programs
running on a computer).
Benefits: Protects against unauthorized access, malicious software, and network
intrusions. Helps enforce security policies and manage network access.
Active Directory (AD) in Windows 2000 is a directory service that manages network
resources and users within a Windows domain. My understanding is that it provides a
centralized location for storing and managing user accounts, computers, and other network
objects.
Key Features:
o Centralized User Management: Stores user accounts and their permissions,
allowing administrators to manage access to resources efficiently.
o Group Policy Management: Enables administrators to define and enforce
security policies across the network.
o Domain Controller: AD relies on domain controllers that store and replicate
directory data.
o Authentication: Verifies user identities and controls access to resources.
Importance: Provides a more structured and manageable way to administer network
resources and security, especially within larger organizations.