Wednesday, August 18, 2010
Tuesday, August 17, 2010
What is a Debug Monitor and How Can it Benefit Me?
A WinDriver Kernel is a driver development toolkit inside ones computer that simplifies the creation of drivers. A driver is used in a computer so that the computer can read the devices that are in the computer or that get attached to the computer. If you were to hook up a printer to your computer, you would first need to install its driver so that the computer could create graphics or a console so that you could control your printer through the computer. The same thing goes for audio devices, internet devices, video devices.
A debug monitor, simply put, is a tool that helps to find and reduce the number of bugs and defects in a computer program or any electrical device within or attached to the computer in order to make it act the way it should. While the driver is being created and downloaded, the debug monitor helps it work properly. For example, when an armored car drives up to a bank and the guards have to transfer money from the truck to the bank, there are special guards that stand watch to make sure no one tries to rob them thus making the transaction go smoothly. Those guards could be the debug monitors in the computer industry.
If the debugging monitor locates a bug or defect in any of the equipment, it will first try to reproduce the problem which will allow a programmer to view each string that was within the bug or defect range and try to fix it. A programmer is a technician who has learned the basic format of computers that make them run. These are strings of technical information that most people using computers will never see. For example, using a clock. The general public will plug in the clock and use it to tell time but will not open it up to see how it works. That is saved for the people who fix clocks. They are the programmers of clocks in the computer industry.
The programmer will delete strings or add new ones and then use the debug monitor to re-create the driver download to see if he fixed the problem. This can be a tedious task with all the processes that run in the computer, but the debug monitor helps to make it a lot easier.
More details about LINUX
Linux is based on the idea that everyone using a system has their own username and password.
Every file belongs to a user and a group, and has a set of given attributes (read, write and executable) for users, groups and all (everybody).
A file or folder can have permissions that only allows the user it belongs to to read and write to it, allowing the group it belongs to to read it and at the same time all other users can't even read the file.
4. Who and what is root
Linux has one special user called root (this is the user name). Root is the "system administrator" and has access to all files and folders. This special user has the right to do anything.
You should never log on as this user unless you actually need to do something that requires it!
Use su - to temporary become root and do the things you need, again: never log into your sytem as root!
Root is only for system maintenance, this is not a regular user (LindowsOS don't have any user management at all and uses root for everything, this is a very bad idea!).
You can execute a command as root with:
su -c 'command done as root'
Gentoo Linux: Note that on Gentoo Linux only users that are member of the wheel group are allowed to su to root.
5. Opening a command shell / terminal
To learn Linux, you need to learn the shell command line in a terminal emulator.
In KDE: K -> System -> Konsoll to get a command shell)
Pressing CTRL-ALT-F1 to CTRL-ALT-F6 gives you the console command shell windows, while CTRL-ALT-F7 gives you XFree86 (the graphical interface).
xterm (manual page) is the standard XFree console installed on all boxes, run it with xterm (press ALT F2 in KDE and Gnome to run commands).
Terminals you probably have installed:
xterm http://dickey.his.com/xterm/
konsole (KDEs terminal)
gnome-terminal (Gnomes terminal)
Non-standard terminals should install:
rxvt http://www.rxvt.org/
aterm http://aterm.sourceforge.net
6. Your first Linux commands
Now you should have managed to open a terminal shell and are ready to try your first Linux commands. Simply ask the computer to do the tasks you want it to using it's language and press the enter key (the big one with an arrow). You can add a & after the command to make it run in the background (your terminal will be available while the job is done). It can be practical to do things like moving big divx movies as a background process: cp movie.avi /pub &. Jobs - the basics of job control
6.1. ls - short for list
ls lists the files in the current working folder. This is probably the first command to try out. It as a number of options described on the ls manpage.
Examples:
ls
ls -al --color=yes
6.2. pwd - print name of current/working directory
pwd prints the fully resolved name of the current (working) directory. pwd manpage.
6.3. cd - Change directory
cd stands for change (working) directory and that's what it does. The folder below you (unless you are in /, where there is no lower directory) is called "..".
To go one folder down:
cd ..
Change into the folder Documents in your current working directory:
cd Documents
Change into a folder somewhere else:
cd /pub/video
The / in front of pub means that the folder pub is located in the / (lowest folder).
7. The basic commands
7.1. chmod - Make a file executable
To make a file executable and runnable by any user:
chmod a+x myfile
Refer to the chmod manual page for more information.
7.2. df - view filesystem disk space usage
df -h
Filesystem Size Used Avail Use% Mounted on
/dev/hda3 73G 67G 2.2G 97% /
tmpfs 2.0M 24K 2.0M 2% /mnt/.init.d
tmpfs 252M 0 252M 0% /dev/shm
The flags: -h, --human-readable Appends a size letter such as M for megabytes to each size.
df manpage
7.3. du - View the space used by files and folders
Use du (Disk Usage) to view how much space files and folders occupy. Read the du manual page for flags and usage.
du is a part of fileutils.
Example du usage:
du -sh Documents/
409M Documents
7.4. mkdir - makes folders
Folders are created with the command mkdir:
mkdir folder
To make a long path, use mkdir -p :
mkdir -p /use/one/command/to/make/a/long/path/
Like most programs mkdir supports -v (verbose). Practical when used in scripts.
You can make multiple folders in bash and other shells with {folder1,folder2} :
mkdir /usr/local/src/bash/{old,new,dist,bugs}
mkdir manual page
The command rmdir removes folders.
7.5. passwd - changes your login password
To change your password in Linux, type:
passwd
The root user can change the password of any user by running passwd with the user name as argument:
passwd jonny
will change jonnys password. Running passwd without arguments as root changes the root password.
If you need to add several new users and give them password you can use a handy program like Another Password Generator to generate a large set of "random" passwords.
7.5.1. KDE
From KDE you can change your password by going:
K -> Settings -> Change Password
K -> Settings -> Control Center -> System Administration -> User Account
7.6. rm - delete files and folders, short for remove
Files are deleted with the command rm:
rm /home/you/youfile.txt
To delete folders, use rm together with -f (Do not prompt for confirmation) and -r (Recursively remove directory trees):
rm -rf /home/you/foo/
Like most programs rm supports -v (verbose).
rm manual page
7.7. ln - make symbolic links
A symbolic link is a "file" pointing to another file.
To make a symbolic link :
ln /original/file /new/link
This makes /original/file and /new/link the same file - edit one and the other will change. The file will not be gone until both /original/file and /new/link are deleted.
You can only do this with files. For folders, you must make a "soft" link.
To make a soft symbolic link :
ln -s /original/file /new/link
Example:
ln -s /usr/src/linux-2.4.20 /usr/src/linux
Note that -s makes an "empty" file pointing to the original file/folder. So if you delete the folder a symlink points to, you will be stuck with a dead symlink (just rm it).
ln manual page
7.8. tar archiving utility - tar.bz2 and tar.gz
tar (manual page) is a very handle little program to store files and folders in archives, originally made for tapestreamer backups. Tar is usually used together with gzip (manual page) or bzip2 (manual page), comprepssion programs that make your .tar archive a much smaller .tar.gz or .tar.bz2 archive.
kde
You can use the program ark (K -> Utilities -> Ark) to handle archives in KDE. Konqueror treats file archives like normal folders, simply click on the archive to open it. The archive becomes a virtual folder that can be used to open, add or remove files just as if you were working with a normal folder.
7.8.1. tar files (.tar.gz)
To untar files:
tar xvzf file.tar.gz
To tar files:
tar cvzf file.tar.gz filedir1 filedir2 filedir2...
Note: A .tgz file is the same as a .tar.gz file. Both are also often refered to as tarballs.
The flags: z is for gzip, v is for verbose, c is for create, x is for extract, f is for file (default is to use a tape device).
7.8.2. bzip2 files (.tar.bz2)
To unpack files:
tar xjvf file.tar.bz2
To pack files:
tar cvjf file.tar.bz2 filedir1 filedir2 filedir2...
The flags: Same as above, but with j for for bzip2
You can also use bunzip2 file.tar.bz2 , will turn it into a tar.
For older versions of tar, try tar -xjvf or -xYvf or -xkvf to unpack.There's a few other options it could be, they couldn't decide which switch to use for bzip2 for a while.
How to untar an entire directory full or archives?
.tar:
for i in `ls *.tar`; do tar xvf $i; done
.tar.gz: for i in `ls *.tar.gz`; do tar xvfz $i; done
.tar.bz2: for i in `ls *.tar.bz2`; do tar xvfj $i; done
2. Understanding files and folders
A blank piece of paper is called a file in the world of computers. You can use this piece of paper to write a text or make a drawing. Your text or drawing is called information. A computer file is another way of storing your information.
If you make many drawings then you will eventually want to sort them in different piles or make some other system that allows you to easily locate a given drawing. Computers use folders to sort your files in a hieratic system.
A file is an element of data storage in a file system (file systems manual page). Files are usually stored on harddrives, cdroms and other media, but may also be information stored in RAM or links to devices.
To organize our files into a system we use folders. The lowest possible folder is root / where you will find the user homes called /home/.
/
/home/
/home/mom/
/home/dad/
Behind every configurable option there is a simple human-readable text file you can hand-edit to suit your needs. These days most programs come with nice GUI (graphical user interface) like Mandrakes Control Center and Suses YAST that can smoothly guide you through most configuration. Those who choose can gain full control of their system by manually adjusting the configuration files from foo=yes to foo=no in an editor.
Almost everything you do on a computer involves one or more files stored locally or on a network.
Your filesystems lowest folder root / contains the following folders:
/bin Essential user command binaries (for use by all users)
/boot Static files of the boot loader, only used at system startup
/dev Device files, links to your hardware devices like /dev/sound, /dev/input/js0 (joystick)
/etc Host-specific system configuration
/home User home directories. This is where you save your personal files
/lib Essential shared libraries and kernel modules
/mnt Mount point for a temporarily mounted filesystem like /mnt/cdrom
/opt Add-on application software packages
/usr /usr is the second major section of the filesystem. /usr is shareable, read-only data. That means that /usr should be shareable between various FHS-compliant hosts and must not be written to. Any information that is host-specific or varies with time is stored elsewhere.
/var /var contains variable data files. This includes spool directories and files, administrative and logging data, and transient and temporary files.
/proc System information stored in memory mirrored as files.
The only folder a normal user needs to use is /home/you/ - this is where you will be keeping all your documents.
/home/elvis/Documents
/home/elvis/Music
/home/elvis/Music/60s
1. What is Linux?
Linux gives you a graphical interface that makes it easy to use your computer, yet it still allows those with know-how to change settings by adjusting 0 to 1.
It is only the kernel that is named Linux, the rest of the OS are GNU tools. A package with the kernel and the needed tools make up a Linux distribution. Mandrake , SUSE Linux, Gentoo and Redhat are some of the many variants. GNU/Linux OS can be used on a large number of boxes, including i386+ , Alpha, PowerPC and Sparc.
Tuesday, August 10, 2010
Client/Server definitions
Client/Server logical layering
Client/Server physical layering
The J2EE Platform
The J2EE APIs
The J2EE architecture
The J2EE application development
The J2EE application server
http://www.gogis.nl/en/tutorial/docs/J2EE/body.html
To understand client/server computing it is important to understand that software can be divided in logical layers. All logical layers together form the application. Each layer in the software is responsible for a specific task in the application. The logical layering of an application does not need to be the same as the physical layering of an application ( see for the physical layering the next paragraph).
In theory we distinguish 6 layers in sofware, as shown in figure below. The layering as shown here is a reference model: in practise the layering will not be so clear as shown here.
Figure 2: Software layering
Presentation manager
A presentation manager displays the user interface. The presentation manager is responsible for the look and feel of an application: it defines how something is displayed to the user. It is also responsible for the infrastructure of user interface elements that are possible in an application. The user interface elements are not limited to text and controls , but also include things as grafics, sound, animation and movies. A presentation manager is not application dependent. All applications can use the same presentation manager.
In some operating systems there is a clean distinction between a presentation manager and the operating system itself (e.g. Linux/Unix with X-Windows) and a user can choose which presentation manager (s)he will use for the application (this choice is of course limited by the required user interface elements). Other operating systems only offer one presentation manager which is integrated with the operating system (e.g. Microsoft Windows).
Presentation logic
The presentation logic layer is responsible for what is displayed to the user. It defines which screens are displayed, when they are displayed, which navigation paths exist between screens, which fields to display etc.. The presentation logic layer is application dependent.
Application logic
The application logic layer contains the actual application logic. This is the layer where the application functionality is defined. The application logic layer is application dependent.
In praktice, this layer is the least recognizable of all layers. This layer is typically spread over all other layers whith most of its logic ending up in the presentation logic layer.
Business logic
The business logic layer contains the business rules of an organization. All the business rules should be shared between all the applications of the organization. This will ensure that changes in business rules will propagate through all the organization's applications. This layer is not application dependent but organization dependent.
Database logic
The database logic layer contains the data dictionary of the application (or even organization). It describes the tables, their columns, datatypes, primary and secondary keys. This layer is application (or even organization) dependent.
Database manager
This layer is responsible for the actual storage of data. This layer can be application/organization dependent but most of the time it is not. Most of the time the database manager is a commercial off-the-shelve application, which is able to manage many applications. For very simple applications the database manager and the operating file system are the same (persistence).
In practice, the database logic layer and the database manager layer are almost always one layer. Most database managers generate the physical storage facilities of the data on the basis of a database logic written in SQL. Whenever we speak of "database" in this tutorial we mean the integrated database logic / database manager layer.
Client/server computing & Client/Server definitions
The J2EE platform is an implementation of the concept of client/server computing. So before we go into detail about the J2EE platform first an introduction to client/server computing in general.
There are many ways to create advanced distributed applications. This tutorial is about one such technology: the J2EE Platform. Other technologies that can do the same, like CORBA, DCOM or .NET, are beyond the scope of this tutorial.
Client/Server definitions
Client/server computing is an area in which there are as many definitions of terms as there are people working in that area. This tutorial also has its own definitions. In discussing client/server computing we have the following starting-points:
Client/server is a distributed software architecture in which systems are divided into autonomous processes [TODO: we need a distinction between a business process and an OS process], where a client sends requests to a server and that server sends responses as an answer to the request to that client.
Client/server is a concept that will distribute the autonomous processes over clients and servers, based on the suitability for the task of those clients and servers.
Figure 1: Client/Server roles
As can be seen clearly from the figure above, it is possible that a server can be the client of another server. In general there is no clear distinction between clients and server besides a concrete request. In a large distributed system almost every client is a server and every server is also a client.
Tuesday, August 3, 2010
Windows 2000 Server Features
Internet Information Services 5.0 (IIS)Integrated Web services enable users to easily host and manage Web sites to share information, create Web-based business applications, and extend file, print, media and communication services to the Web.
Active Server Pages (ASP) Programming EnvironmentActive Server Pages is consistently rated the easiest, highest performance web server-scripting environment available.
XML ParserCreate applications that enable the Web server to exchange XML-formatted data with both Microsoft Internet Explorer and any server capable of parsing XML.
Windows DNA 2000With the Windows Distributed interNet Applications Architecture (Windows DNA 2000) - the application development model for the Windows platform - you can build secure, reliable, highly scalable solutions that ease the integration of heterogeneous systems and applications.
Component Object Model + (COM+)COM+ builds on COM's integrated services and features, making it easier for developers to create and use software components in any language, using any tool. COM+ includes Transaction Services and Message Queuing Services for reliable distributed applications.
Multimedia PlatformWith integrated Windows MediaTM Services, configure and manage high-quality digital media content across the Internet and intranets--delivering live and on-demand content to the maximum number of users.
Directory-Enabled ApplicationsDevelopers can use a number of standard interfaces to write applications that utilize information stored in the Active DirectoryTM service about users, other application and devices. This enables rich, dynamic applications that are simpler to develop and easier to manage. All Active Directory functions are available through LDAP, ADSI and MAPI for extending and integrating with other applications, directories, and devices.
Web FoldersWeb Folders bring the richness of Windows to the Web, by using Web Document Authoring and Versioning (WebDAV) to enable drag and drop Web publishing.
Internet PrintingSend print jobs across the Internet to a URL.
8-way Symmetric Multi-Processor SupportScale up by utilizing the latest 8-way SMP servers for more processing power. Windows 2000 Server delivers support for up to 4-way SMP servers.
8 GB Memory Support (advanced)Take advantage of larger amounts of memory to improve performance and handle the most demanding applications, with support for up to 8 gigabytes (GB) of RAM with Intel's Physical Address Extension (PAE). Windows 2000 Server delivers support for up to 4 GB of RAM.Network Load Balancing (advanced)Scale out quickly and easily by distributing incoming IP traffic across a farm of load-balanced servers. Incrementally expand capacity by adding additional servers to the farm using Network Load Balancing (NLB).
Terminal ServicesRun Windows-based applications on the server, and access from a remote PC, Windows-based Terminal or non-Windows device over LANs, WANs or low-bandwidth connections, through terminal emulation software. In Windows 2000, Terminal Services are up to 20 percent more scalable and have dramatically improved performance for both high and low-bandwidth connections.
Enhanced ASP PerformanceMore scalable Active Server Page (ASP) processing, improved ASP flow control, and ASP Fast Path for scriptless ASP files enable faster Web page processing.
Multi site HostingInternet Information Services (IIS) 5.0 allows you to host more Web sites per server with high performance.
IIS CPU ThrottlingLimit the amount of CPU time a Web application or site can use to ensure that processor time--and therefore better performance--is available to other Web sites or to non-Web applications.
High throughput and bandwidth utilizationWith support for up to 1 GB networks, Windows 2000 Server delivers high performance processing on high performance networks. Increased throughput increases performance without having too increase network bandwidth.
Support for the Latest Security StandardsBuild secure intranet, extranet and Internet sites using the latest standards, including: 56-bit and 128-bit SSL/TLS, IPSec, Server Gated Cryptography; Digest Authentication, Kerberos v5 authentication, and Fortezza.
Active Directory IntegrationActive Directory integration with the underlying security infrastructure provides a focal point of security management of users, computers and devices making Windows 2000 easier to manage.
Kerberos AuthenticationFull support for Kerberos version 5 protocol provides fast, single sign-on to Windows resources, as well as other environments that support this protocol.
Public Key Infrastructure (PKI)The Certificate Server is a critical part of a public key infrastructure that allows customers to issue their own x.509 certificates to their users for PKI functionality such as certificate-based authentication, IPSec, secure email, etc. Integration with Active Directory simplifies user enrollment.
Smart card supportSupports logon via Smart cards "out-of-the-box" for strong authentication to sensitive resources.
Encrypting File SystemIncrease security of data on the hard disk by encrypting it. This data remains encrypted even when backed up or archived.
Secure network communicationsEnd-to-end encrypted communications across your company network using the IPSec standard. Great for protecting sensitive internal communications from intentional or accidental viewing. Active Directory provides central policy control for its use to make it deployable.
Routing and Remote Access ServiceConnects remote workers, telecommuters, and branch offices to the corporate network through dial-up, leased line and Internet links.
Virtual private networking (VPN)A full-featured gateway that encrypts communications to securely connect remote users and satellite offices over the Internet. Now with an updated PPTP support and advanced security with Layer 2 Tunneling Protocol
Kernel-Mode Write ProtectionHelps prevent errant code from interfering with system operations.
Windows File ProtectionPrevents new software installations from replacing essential system files.
Driver CertificationIdentifies device drivers that have passed the Windows Hardware Quality Labs test and warns users if they are about to install an uncertified driver.
IIS Application ProtectionApplication protection keeps Web applications running separately from the Web server itself, preventing an application from crashing the Web server.
Cluster service (advanced)2-node Cluster service supports fail-over, caused by hardware or software failure, of critical applications, including databases, knowledge management, ERP, and file & print services.
Network Load Balancing (advanced)On Web or Terminal Services server farms, re-distribute workload among remaining servers in the event of a server hardware or software failure in less than 10 seconds.
Job Object APIThe Job Object API, with its ability to setup processor affinity, establish time limits, control process priorities, and limit memory utilization for a group of related processes, allows an application to manage and control dependent system resources. This additional level of control means the Job Object API can prevent an application from negatively impacting overall system scalability.
Application Certification & DLL ProtectionApplications certified to run on Windows 2000 Server are tested by Microsoft to ensure high quality and reliability. Protects DLLs installed by applications from conflicts that can cause application failure.
Multi-master ReplicationActive Directory uses multi-master replication to ensure high scalability and availability in distributed network configurations. "Multi-master" means that each directory replica in the network is a peer of all other replicas; changes can be made to any replica and will be reflected across all of them.
Distributed File System (Dfs)Build a single, hierarchical view of multiple file servers and file server shares on a network. Dfs makes files easier for users to locate, and increases availability by maintaining multiple file copies across distributed servers.
Disk QuotasSet quotas on disk space usage per user and per volume to provide increased availability of disk space and help capacity planning efforts.
Hierarchical Storage ManagementAutomatically migrate data that hasn't been recently accessed to less expensive storage media, maximizing disk space for the most heavily accessed data on the disk.
Dynamic system configurationAdd new volumes, extend existing volumes, break or add a mirror, or repair a RAID 5 array, while the server is online, without impacting the end-user.
Rolling Upgrade Support (advanced)Using Cluster service and NLB, avoid downtime caused by planned maintenance or upgrades using rolling upgrades. Migrate your applications or IP workload to one node, upgrading the first node, and then migrating them back. You can roll out hardware, software, and even operating systems upgrades without taking the application offline. Both Windows Clustering technologies are backwards compatible with their Windows NT Server 4.0 predecessors.
Dynamic Volume ManagementAdd new volumes, extend existing volumes, break or add a mirror, or repair a RAID 5 array, while the server is online, without impacting the end-user.
Disk DefragmentationOver time, fragmentation can have a severe impact on the performance of a busy file or Web server. These tools increase disks availability and performance.
Safe Mode BootBooting in Safe Mode allows users to troubleshoot the system during start up by changing the default settings or removing a newly installed driver that is causing a problem.
Backup and RecoveryBackup and recovery features make it easier to backup data and then recover data in the event of a hard disk failure. Windows 2000 allows back up to a single file on a hard disk and tape media.
Automatic RestartConfigure services across the operating system, including IIS, to restart automatically if they fail.
Kill Process TreeStop all processes related to an errant process or application without rebooting the system.
Cluster Administrator (advanced)Run Cluster Administrator from any Windows NT or Windows 2000 system to remotely control multiple clusters from a single location.
Integrated Directory ServicesWindows 2000 introduces Active Directory, a scalable, standard-compliant directory service that makes Windows 2000 easier to manage, more secure, and more interoperable with existing investments. Active Directory centrally manages Windows-based clients, and servers through a single consistent management interface, reducing redundancy and maintenance costs.
Windows Management InstrumentationA uniform model through which management data from any source can be managed in a standard way. Windows Management Instrumentation (WMI) provides this for software, such as applications, while WMI extensions for the Windows Driver Model (WDM) provide this for hardware or hardware device drivers. WMI in Windows 2000 enables management of even more functions.
Delegated AdministrationActive Directory enables administrators to delegate a selected set of administrative privileges to appropriate individuals within the organization to distribute the management and improve accuracy of administration. Delegation also helps companies reduce the number of domains they need to support a large organization with multiple geographical locations.
Microsoft Management ConsoleUnify and simplify system management tasks through a central, customizable console that allows control, monitoring, and administration of widespread network resources. All management functions in Windows 2000 are available through the Microsoft Management Console (MMC).
Remote Management with Terminal ServicesSafely enable Terminal Services for remote administration purposes. Up to two concurrent sessions are supported, with no impact on performance or application compatibility.
Windows Script Host (WSH)Administer the server and automate tasks via the command line instead of graphical user interface tools with scripts.
Group PolicyGroup policy allows central management of collections of users, computers, applications, and network resources instead of managing entities on a one-by-one basis. Integration with Active Directory delivers more granular and flexible control.
Centralized Desktop ManagementManage users' desktop resources by applying policies based on the business needs and location of users. IntelliMirrorTM management technologies install and maintain software, apply correct computer and user settings, and ensure that users' data is always available.
Security Configuration Toolset (SCTS)Reduce costs associated with security configuration and analysis of Windows-based networks. In Windows 2000, use Group Policy to set and periodically update security configurations of computers.
PKI Group Policy ManagementCentrally manage Domain wide-PKI policies. Specify which Certificate Authorities a client will trust, distribute new root certificates, adjust IPSec policy or determine if a user will be required to use smart cards to long onto a particular system.
Windows NT 4.0 Domain migration toolsSimplify the upgrade process to a Windows 2000 domain.
Directory interoperabilityMeta directory technologies enable companies to use Active Directory to manage identity information stored in heterogeneous directory services.
Directory synchronization toolsMaintain and synchronize data between Active Directory and Microsoft Exchange and Novell NDS directories.
High interoperability with client computersSupports Windows NT Workstation, Windows 9x, Windows 3.x, Macintosh, and Unix operating systems. TCP/IP Appleshare support improves resource sharing for the Macintosh operating system.
Applications & Directory interoperabilityWindows 2000 compatible applications will install and upgrade onto the Windows 2000 operating system. Active Directory can interoperate or synchronize date with other directory services using Lightweight Directory Access Protocol (LDAP), Meta directory technologies, Microsoft Directory Service Synchronization, or Active Directory Connector. Integration with existing management applications and frameworkd via Windows Management Services.
Server & Mainframe interoperabilityMessage Queuing enables the exchange of information between applications running on mainframe platforms. Kerberos authentication protocol support enables interoperability with other systems using this industry standard authentication protocol. Services for NetWare is an add-on product that increases interoperability with NetWare servers and clients with Windows-based servers and clients. Services for Unix is an add-on product that makes it easier to integrate Windows NT 4.0 and Windows 2000 into a UNIX environment.
Latest server hardware (advanced)Support for the latest advanced 8-way SMP servers running Intel's Profusion chipset and architecture, and up to 8 GB of memory support with Intel's Physical Address Extension (PAE).
NetworkingWindows 2000 Server works with networking devices that support the latest networking technologies, including Plug and Play, DSL, VPN, routing, NAT, DHCP, Quality of Services switches and routers, Directory-Enabled Networking devices, IPSec, SSL, and Asynchronous Transfer Mode.
PeripheralsWindows 2000 Server works with the newest peripherals such as storage management hardware, USB printers, network adapters, keyboards and mice. It delivers advanced printer driver support, as well as support for 1394, PCMCIA, infra-red and digital devices.
Friday, July 30, 2010
IT Vth_SEM SYLLABUS
IT-301 E RAPID APPLICATION DEVELOPMENT
L T P Class Work: 50
3 1 - Exam: 100
Total: 150
Duration of Exam: 3 Hrs.
Unit-1: Visual Programming Environment: Concept of procedure and event oriented languages,
Integrated Development Environment for VC++ and Visual Basic, Components of Visual C++ and Visual
Basic.
Unit-2: Parts of Visual C++ Program: Application object, main window object, view object, document
object, Document-View architecture and its advantages, dEvent oriented windows Programming, device
context, Microsoft Foundation Classes- an Overview, Simple MFC application, API’s .
Unit-3: Reading keystrokes, handling mouse, creating menus, toolbars, buttons, status bar prompts,
dialog box, check box, radio buttons, list boxes, combo boxes, sliders, multiple documents.
Unit-4: Serialization, file handling, debugging.
Unit-5: DLL’s, OLE Object Technologies, Creating Internet Programs using Visual C++ and Visual
Basic, Creating Active X Controls, connecting to Database (using DAO/
and Visual C++.
Text Books
1. Microsoft Visual C++ By Steven Holzner (Pub: BPB)
2. Visual C++ Programming, 2nd edition by Steven Holzner(Pub: PHI)
3. Using Visual Basic for Applications By Paul Sanna(Pub: PHI)
4. Visual Basic Programming By Steven Holzner
5. MSDN Help
Reference Books
1. Visual C++: From the ground Up By Mucller (Pub :TMH)
2. Programming Visual C++ by David J. Kruglinski
IT-303 E Systems Programming &System Administration
L T P Class Work: 50
3 1 - Exam: 100
Total: 150
Duration of Exam: 3 Hrs.
Unit-1: Evolution of Components Systems Programming, Assemblers, Loaders, Linkers, Macros,
Compilers. software tools, Text editors, Interpreters and program generators, Debug Monitors,
Programming environment.
Unit-2: Compiler: Brief overview of compilation process, Incremental compiler, Assembler: Problem
statement, single phase and two phase assembler, symbol table; Loader schemes, compile and go Loader,
general loader schemes, absolute loader, Subroutine linkage, Reallocating loader, Direct linkage Loader,
Binders, Linking loader, overlays.
Unit-3: M acro language and macro-processor, macro instructions, features of macro facility, macro
instruction arguments, conditional macro expansion, macro calls with macro instruction defining macros.
Unit-4: Theoretical Concept of Unix Operating System: Basic features of operating system;
File structure: CPU scheduling; Memory management: swapping, demand paging; file system: block
and fragments, inodes, directory structure; User to user communication.
Unit-5: Getting Started with Unix: User names and groups, logging in; Format of Unix
commands; Changing your password; Characters with special meaning; Unix documentation; Files
and directories; Current directory, looking at the directory contents, absolute and relative pathnames,
some Unix directories and files; Looking at the file contents; File permissions; basic operation on
files; changing permission modes; Standard files, standard output; Standard input, standard error;
filters and pipelines; Processes; finding out about processes; Stopping background process; Unix
editor vi.
Unit-6: Test Manipulation: Inspecting files; File statistics; Searching for patterns; Comparing
files; Operating on files; Printing files; Rearranging files; Sorting files; Splitting files; Translating
characters; AWK utility.
Unit-7: Shell Programming: Programming in the Borne and C-Shell; Wild cards; Simple shell
programs; Shell variables; Shell programming constructs; interactive shell scripts; Advanced
features.
Unit-8: System Administration: Definition of system administration; Booting the system; Maintaining
user accounts; File systems and special files; Backups and restoration; Role and functions of a system
manager.
Overview of the linux. operating system
Text Books:
1. Systems Programming by Donovan, TMH.
2. The unix programming environment by Brain Kernighen & Rob Pike, 1984, PHI & Rob Pike.
3. Design of the Unix operating system by Maurich Bach, 1986, PHI.
4. Introduction to UNIX and LINUX by John Muster, 2003, TMH.
Reference Book:
1. Advanced Unix programmer’s Guide by Stephen Prato, BPB
2. Unix- Concept and applications by Sumitabha Das, 2002, T.M..H
Note: Eight questions will be set in all by the examiners taking at least one question from each unit.
Students will be required to attempt five questions in all.
IT-305 E COMPUTER NETWORKS
L T P Class Work: 50
3 1 - Exam: 100
Total: 150
Duration of Exam: 3 Hrs.
Unit-1: OSI Reference Model and Network Architecture: Introduction to Computer Networks,
Example networks ARPANET, Internet, Private Networks, Network Topologies: Bus-, Star-, Ring-,
Hybrid -, Tree -, Complete -, Irregular –Topology; Types of Networks : Local Area Networks,
Metropolitan Area Networks, Wide Area Networks; Layering architecture of networks, OSI model,
Functions of each layer, Services and Protocols of each layer
Unit–2: TCP/IP: Introduction, History of TCP/IP, Layers of TCP/IP, Protocols, Internet Protocol,
Transmission Control Protocol , User Datagram Protocol, IP Addressing, IP address classes, Subnet
Addressing, Internet Control Protocols, ARP, RARP, ICMP, Application Layer, Domain Name System,
Email – SMTP, POP,IMAP; FTP, NNTP, HTTP, Overview of IP version 6.
Unit-3: Local Area Networks: Introduction to LANs, Features of LANs, Components of LANs, Usage
of LANs, LAN Standards, IEEE 802 standards, Channel Access Methods, Aloha, CSMA, CSMA/CD,
Token Passing, Ethernet, Layer 2 & 3 switching, Fast Ethernet and Gigabit Ethernet, Token Ring, LAN
interconnecting devices: Hubs, Switches, Bridges, Routers, Gateways.
Unit–4: Wide Area Networks: Introduction of WANs, Routing, Congestion Control, WAN
Technologies, Distributed Queue Dual Bus (DQDB), Synchronous Digital Hierarchy (SDH)/
Synchronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), Frame Relay.,Wireless
Links.
Unit-5: Introduction to Network Management: Remote Monitoring Techniques: Polling, Traps,
Performance Management, Class of Service, Quality of Service, Security management, Firewalls,
VLANs, Proxy Servers, Introduction to Network Operating Systems: Client-Server infrastructure,
Windows NT/2000.
Text Book:
1. Computer Networks (3rd edition), Tanenbaum Andrew S., International edition, 1996.
Reference Books:
1. Data Communications, Computer Networks and Open Systems (4th edition), Halsall Fred,
2. 2000, Addison Wesley, Low Price Edition.
3. Business Data Communications, Fitzgerald Jerry,.
4. Computer Networks – A System Approach, Larry L. Peterson & Bruce S. Davie, 2nd Edition
5. Computer Networking – ED Tittel , 2002, T.M.H.
Note: Eight questions will be set in all by the examiners taking at least one question from each unit.
Students will be required to attempt five questions in all.
CSE-301 E PRINCIPLES OF OPERATING SYSTEMS
L T P Class Work: 50
3 1 - Exam: 100
Total: 150
Duration of Exam: 3 Hrs.
Unit-1: Introduction: Introduction to Operating System Concepts (including Multitasking,
multiprogramming, multi user, Multithreading etc)., Types of Operating Systems: Batch operating
system, Time-sharing systems, Distributed OS, Network OS, Real Time OS; Various Operating system
services, architecture, System programs and calls.
Unit–2: Process Management: Process concept, process scheduling, operation on processes; CPU
scheduling, scheduling criteria, scheduling algorithms -First Come First Serve (FCFS), Shortest-Job-First
(SJF), Priority Scheduling, Round Robin(RR), Multilevel Queue Scheduling.
Unit–3: Memory Management: Logical & Physical Address Space, swapping, contiguous memory
allocation, non-contiguous memory allocation paging and segmentation techniques, segmentation with
paging; virtual memory management - Demand Paging & Page-Replacement Algorithms; Demand
Segmentation.
Unit–4: File System: Different types of files and their access methods, directory structures, various
allocation methods, disk scheduling and management and its associated algorithms, Introduction to
distributed file system.
Unit–5: Process-Synchronization & Deadlocks: Critical Section Problems, semaphores; methods for
handling deadlocks-deadlock prevention, avoidance & detection; deadlock recovery.
Unit-6: I/O Systems: I/O Hardware, Application I/O Interface, Kernel, Transforming I/O requests,
Performance Issues.
Unit–7: Unix System And Windows NT Overview
Unix system call for processes and file system management, Shell interpreter, Windows NT architecture
overview, Windows NT file system.
Text Books:
1. Operating System Concepts by Silberchatz et al, 5th edition, 1998, Addison-Wesley.
2. Modern Operating Systems by A. Tanenbaum, 1992, Prentice-Hall.
3. Operating Systems Internals and Design Principles by William Stallings,4th edition, 2001,
Prentice-Hall
Reference Books:
1. Operating System By Peterson , 1985, AW.
2. Operating System By Milankovic, 1990, TMH.
3. Operating System Incorporating With Unix & Windows By Colin Ritche, 1974, TMH.
4. Operating Systems by Mandrik & Donovan, TMH
5. Operating Systems By Deitel, 1990, AWL.
6. Operating Systems – Advanced Concepts By Mukesh Singhal , N.G. Shivaratri, 2003, T.M.H
Note: Eight questions will be set in all by the examiners taking at least one question from each unit.
Students will be required to attempt five questions in all.
EE-309-E MICROPROCESSORS AND INTERFACING
L T P CLASS WORK :
50
3 1 0 EXAM : 100
TOTAL :
150
DURATION OF EXAM :
3 HRS
PART A
UNIT1. THE 8085 PROCESSOR :
Introduction to microprocessor, 8085 microprocessor: Architecture, instruction set, interrupt structure,
and assembly language programming.
UNIT2. THE 8086 MICROPROCESSOR ARCHITECTURE:
Architecture, block diagram of 8086, details of sub-blocks such as EU, BIU; memory segmentation and
physical address computations, program relocation, addressing modes, instruction formats, pin diagram
and description of various signals.
UNIT3. INSTRUCTION SET OF 8086:
Instruction execution timing, assembler instruction format, data transfer instructions, arithmetic
instructions, branch instructions, looping instructions, NOP and HLT instructions, flag manipulation
instructions, logical instructions, shift and rotate instructions, directives and operators, programming
examples.
PART B
UNIT4. INTERFACING DEVICE :
The 8255 PPI chip: Architecture, control words, modes and examples.
UNIT 5. DMA :
Introduction to DMA process, 8237 DMA controller,
UNIT6. INTERRUPT AND TIMER :
8259 Programmable interrupt controller, Programmable interval timer chips.
TEXT BOOKS :
1. Microprocessor Architecture, Programming & Applications with 8085 : Ramesh S Gaonkar;
Wiley Eastern Ltd.
2. The Intel Microprocessors 8086- Pentium processor : Brey; PHI
REFERENCE BOOKS:
1. Microprocessors and interfacing : Hall; TMH
2. The 8088 & 8086 Microprocessors-Programming, interfacing,Hardware & Applications :Triebel
& Singh; PHI
3. Microcomputer systems: the 8086/8088 Family: architecture, Programming & Design : Yu-
Chang Liu & Glenn A Gibson; PHI.
4. Advanced Microprocessors and Interfacing : Badri Ram; TMH
NOTE: 8 questions are to be set selecting FIVE questions from PART A and THREE questions from
PART- B .Students have to attempt any five questions.
CSE -303 E COMPUTER GRAPHICS
L T P Class Work: 50
3 1 - Exam: 100
Total: 150
Duration of Exam: 3 Hrs.
Unit-1: Introduction to Computer Graphics: What is Computer Graphics, Computer Graphics
Applications, Computer Graphics Hardware and software, Two dimensional Graphics Primitives: Points
and Lines, Line drawing algorithms: DDA, Bresenham’s; Circle drawing algorithms: Using polar
coordinates, Bresenham’s circle drawing, mid point circle drawing algorithm; Filled area algorithms:
Scanline: Polygon filling algorithm, boundary filled algorithm.
Unit-2: Two/Three Dimensional Viewing: The 2-D viewing pipeline, windows, viewports, window to
view port mapping; Clipping: point, clipping line (algorithms):- 4 bit code algorithm, Sutherland-cohen
algorithm, parametric line clipping algorithm (Cyrus Beck).
Polygon clipping algorithm: Sutherland-Hodgeman polygon clipping algorithm. Two dimensional
transformations: transformations, translation, scaling, rotation, reflection, composite transformation.
Three dimensional transformations: Three dimensional graphics concept, Matrix representation of 3-D
Transformations, Composition of 3-D transformation.
Unit-3: Viewing in 3D: Projections, types of projections, the mathematics of planner geometric
projections, coordinate systems.
Unit-4: Hidden surface removal: Introduction to hidden surface removal. The Z- buffer algorithm,
scanline algorithm, area sub-division algorithm.
Unit-5: Representing Curves and Surfaces: Parametric representation of curves: Bezier curves, BSpline
curves. Parametric representation of surfaces; Interpolation method.
Unit-6: Illumination, shading, image manipulation: Illumination models, shading models for polygons,
shadows, transparency. What is an image? Filtering, image processing, geometric transformation of
images.
Text Books:
1. Computer Graphics Principles and Practices second edition by James D. Foley, Andeies van
Dam, Stevan K. Feiner and Johb F. Hughes, 2000, Addision Wesley.
2. Computer Graphics by Donald Hearn and M.Pauline Baker, 2nd Edition, 1999, PHI
Reference Books:
1. Procedural Elements for Computer Graphics – David F. Rogers, 2001, T.M.H Second Edition
2. Fundamentals of 3Dimensional Computer Graphics by Alan Watt, 1999, Addision Wesley.
3. Computer Graphics: Secrets and Solutions by Corrign John, BPB
4. Graphics, GUI, Games & Multimedia Projects in C by Pilania & Mahendra, Standard Publ.
5. Computer Graphics Secrets and solutions by Corrign John, 1994, BPV
6. Introduction to Computer Graphics By N. Krishanmurthy T.M.H 2002
Note: Eight questions will be set in all by the examiners taking at least one question from each unit.
Students will be required to attempt five questions in all.
IT-307 E Rapid Application Development Lab.
L T P Class Work: 25
- - 2 Exam: 25
Total: 50
Duration of Exam: 3 Hrs.
Note: At least 10 experiments are to be performed by the students in the semester
1. Study window’s API’s? Find out their relationship with MFC classes. Appreciate how they
are helpful in finding complexities of window’s programming?
2. Get familiar with the essential classes in a typical (document view architecture) VC program
and their relationships with each other.
3. Write a program to handle the mouse event right click on client area and display a message
box as “Right Button Click”.
4. Create a simple model dialog box to read the information about a student i.e. name, roll no.
class using appropriate fields.
5. Write a simple console application to create archive class object from file class that reads
and stores a simple structure (record).
6. Create a simple database in MS access and connect it to Visual Basic using
7. Write a program that reads a text and changes its font, font size as selected by the user from
different fonts contained in a list box.
8. With the help of Visual Basic, created an object of excel application and implement any
function of it.
9. Write a simple program that displays an appropriate message when an illegal operation is
performed, using error handling technique in VB.
10. Make an active X control of your own using Visual Basic.
CSE-309 E Computer Graphics Lab.
L T P Class Work: 50
- - 3 Exam: 50
Total: 100
Duration of Exam: 3 Hrs.
List of programs to be developed
1. Write a program for 2D line drawing as Raster Graphics Display.
2. Write a program for circle drawing as Raster Graphics Display.
3. Write a program for polygon filling as Raster Graphics Display
4. Write a program for line clipping.
5. Write a program for polygon clipping.
6. Write a program for displaying 3D objects as 2D display using perspective transformation.
7. Write a program for rotation of a 3D object about arbitrary axis.
8. Write a program for Hidden surface removal from a 3D object.
Note: At least 5 to 10 more exercises to be given by the teacher concerned.
CSE-313 E Operating Systems Lab.
L T P Class Work: 25
- - 2 Exam: 25
Total: 50
Duration of Exam: 3 Hrs.
Study of WINDOWS 2000 Operating System.
Administration of WINDOWS 2000 (including DNS,LDAP, Directory Services)
Study of LINUX Operating System (Linux kernel, shell, basic commands pipe & filter
commands).
Administration of LINUX Operating System.
Writing of Shell Scripts (Shell programming).
AWK programming.
Note: At least 5 to 10 more exercises to be given by the teacher concerned.
EE-329-E MICROPROCESSORS AND INTERFACING LAB
L T P CLASS WORK : 25
0 0 2 EXAM : 25
TOTAL : 50
DURATION OF EXAM: 3 HRS
LIST OF EXPERIMENTS:
1. Study of 8085 Microprocessor kit.
2. Write a program using 8085 and verify for :
a. Addition of two 8-bit numbers.
b. Addition of two 8-bit numbers (with carry).
3. Write a program using 8085 and verify for :
a. 8-bit subtraction (display borrow)
b. 16-bit subtraction (display borrow)
4. Write a program using 8085 for multiplication of two 8- bit numbers by repeated addition
method. Check for minimum number of additions and test for typical data.
5. Write a program using 8085 for multiplication of two 8- bit numbers by bit rotation method and
verify.
6. Write a program using 8085 for division of two 8- bit numbers by repeated subtraction method
and test for typical data.
7. Write a program using 8085 for dividing two 8- bit numbers by bit rotation method and test for
typical data.
8. Study of 8086 microprocessor kit
9. Write a program using 8086 for division of a defined double word (stored in a data segment) by
another double Word division and verify.
10. Write a program using 8086 for finding the square root of a given number and verify.
11. Write a program using 8086 for copying 12 bytes of data from source to destination and verify.
12. Write a program using 8086 and verify for:
a. Finding the largest number from an array.
b. Finding the smallest number from an array.
13. Write a program using 8086 for arranging an array of numbers in descending order and verify.
14. Write a program using 8086 for arranging an array of numbers in ascending order and verify.
15. Write a program for finding square of a number using look-up table and verify. .
16. Write a program to interface a two digit number using seven-segment LEDs. Use 8085/8086
microprocessor and 8255 PPI.
17. Write a program to control the operation of stepper motor using 8085/8086 microprocessor and
8255 PPI.
NOTE: At least ten experiments have to be performed in the semester out of which seven experiments
should be performed from above list. Remaining three experiments may either be performed from the
above list or designed & set by the concerned institution as per the scope of the syllabus of EE-309-C.
IT-302 E Network Programming
L T P Class Work: 50
3 1 - Exam: 100
Total: 150
Duration of Exam: 3 Hrs.
Unit-1: Introduction to networking, TC/IP Protocol architecture, Classful internet addresses, subnets,
super netting, address resolution Protocol (RAP) and RARP, IP datagram format, UDP and TCP/data
grams , ICMP its purpose , FINGER, NET STAT details & IPconfig, Ping, TRACERT, ROUTE.
Unit-2: Socket introduction, elementary TCP sockets, TCP client sever, I/O functions, select& poll
functions, socket options elementary UDP sockets, elementary node and address conversions, echo
service (TCP and UDP).
Unit-3: Algorithm and issues in server software design :iterative connectionless servers, (UDP),
Iterative, connection oriented servers (TCP), single process, concurrent servers multiprotocol servers
(TCP,UDP), multi service servers (TCP,UDP).
Unit-4: Remote procedure call concept (RCP) :RPC models, analogy between RPC of client and server,
remote programs and procedures, their multiple versions and mutual exclusion communication semantics,
RPC retransmits, dynamic port mapping ,authentication.
Unit-5: Network file system concept of data link access, debugging techniques ,Routing sockets,
broadcasting to mobile network.
Text Books:
1. Unix Network programming Vol -2nd edition, W.Richard Stevens
2. Internet working with TCP/IP Vol-1, Doubles e-commer.
3. Internetworking TCP/IP Vol III Doubles E comer, David L.Stevens
Reference Book:
1. Internetworking with TCP/IP, Vol II
Note: Eight questions will be set in all by the examiners taking at least one question from each unit.
Students will be required to attempt five questions in all