Vous êtes sur la page 1sur 15

IGNOU MCA-22 Free Solved Assignments 2011

MCS-022 Operating System Concepts and Networking Management Question No.1a) How is microkernel architecture different from kernel architecture? Explain. Ans: Early operating system kernels were rather small, partly because computer memory was limited. As the capability of computers grew, the number of devices the kernel had to control also grew. Through the early history of Unix, kernels were generally small, even though those kernels contained device drivers and file system managers. When address spaces increased from 16 to 32 bits, kernel design was no longer cramped by the hardware architecture, and kernels began to grow. Berkeley UNIX (BSD) began the era of big kernels. In addition to operating a basic system consisting of the CPU, disks and printers, BSD started adding additional file systems, a complete TCP/IP networking system, and a number of "virtual" devices that allowed the existing programs to work invisibly over the network. This growth continued for many years, resulting in kernels with millions of lines of source code. As a result of this growth, kernels were more prone to bugs and became increasingly difficult to maintain. The microkernel was designed to address the increasing growth of kernels and the difficulties that came with them. In theory, the microkernel design allows for easier management of code due to its division into user space services. This also allows for increased security and stability resulting from the reduced amount of code running in kernel mode. For example, if a networking service crashed due to buffer overflow, only the networking service's memory would be corrupted, leaving the rest of the system still functional. ============================================================== Question 1.b) How is multithreading useful in uniprocessor as well as symmetric multiprocessing? Explain. Ans. symmetric multiprocessing or SMP involves a multiprocessor computer hardware architecture where two or more identical processors are connected to a single shared main memory and are controlled by a single OS instance. Most common multiprocessor systems today use an SMP architecture. In the case of multi-core processors, the SMP architecture applies to the cores, treating them as separate processors. Processors may be interconnected using buses, crossbar switches or on-chip mesh networks. The bottleneck in the scalability of SMP using buses or crossbar switches is the bandwidth and power consumption of the interconnect among the various processors, the memory, and the disk arrays. Mesh architectures avoid these bottlenecks, and provide nearly linear scalability to much higher processor counts. SMP systems allow any processor to work on any task no matter where the data for that task are located in memory, provided that each task in the system is not in execution on two or more processors at the same time; with proper operating system support, SMP systems can easily move tasks between processors to balance the workload efficiently. ===============================================================

Question 1. C. What is the purpose of caching in DNS? Ans. All Internet hosts, including your computer when it is connected to the Internet, use a DNS server. Every time you go to a website, you need to look up the site's IP address using the domain name of the website. Your request for this lookup is eventually passed to a DNS server somewhere. But your request is one of thousands, even millions of requests being made at any one time across the Internet. The DNS lookup process requires that if your local DNS server is not Authoritative for the domain that contains the domain name you are trying to reach, it should ask other servers to get an answer. Your local server could get quite busy performing these lookup requests, and this could slow down its performance if it is Authoritative for a domain name. To combat this the answers that a DNS server gets from another DNS server can be added to their own internal database and retained for a period of time equal to the time to live (ttl) value set on the record stored on the Authoritative DNS server. Storing these responses is called caching, and allows a DNS server to respond more quickly to multiple queries for the same domain or host. If you are on a website, and want to retrieve the next page on the site, the local DNS server does not have to look up the host again, provided the time to live (ttl) value has not expired and caused the local DNS server to delete the information. This is why it takes so long to contact a website at first, but subsequent requests for pages on the same site are somewhat faster. Caching DNS servers are configured for recursive lookup as well. This creates a server that will respond to lookup requests by delivering answers from its cache, or looking them up on other servers. It is the job of a caching DNS server to handle general lookups of Internet domains. A caching DNS server reduces the load placed on an Authoritative DNS server by handling the requests that don not pertain to the local domain. Almost all Internet Service Providers (ISPs) operate some kind of caching DNS server. Unfortunately DNS caching is a double-edged sword. It speeds up resolution by storing recent answers, and short-circuiting the normal resolution process. However there is a down side. Because DNS servers cache answers, and don't delete these answers until the time to live (ttl) expires, it can take hours or days for the entire Internet to recognize changes to DNS information for your domain name Question 1. D) Why UDP instead of TCP/IP is used in network management protocol? User Datagram Protocol (UDP) is a TCP/IP standard defined in RFC 768, "User Datagram Protocol (UDP)." UDP is used by some programs instead of TCP for fast, lightweight, unreliable transportation of data between TCP/IP hosts. UDP provides a connectionless datagram service that offers best-effort delivery, which means that UDP does not guarantee delivery or verify sequencing for any datagrams. A source host that needs reliable communication must use either TCP or a program that provides its own sequencing and acknowledgment services. UDP messages are encapsulated and sent within IP datagrams, as shown in the following illustration.

============================================================== Question 2. c) How do you configure a Linux machine to work with a network file system? Write all the steps? Ans Configuration is fairly simple. You need to edit the /etc/nwserv.conf file. The format of this file may at first look a little cryptic, but it is fairly straightforward. The file contains a number of single line configuration items. Each line is whitespace delimited and begins with a number that indicates the contents of the line. All characters following a '#' character are considered a comment and ignored. Martin supplies an example configuration file in the package, but I'll present what I consider to be a simplified example to offer an alternative for you. # VOLUMES (max. 5) # Only the SYS volume is compulsory. The directory containing the SYS # volume must contain the directories: LOGIN, PUBLIC, SYSTEM, MAIL. # The 'i' option ignores case. # The 'k' option converts all filenames in NCP requests to lowercase. # The 'm' option marks the volume as removable (useful for cdroms etc.) # The 'r' option set the volume to read-only. # The 'o' option indicates the volume is a single mounted filesystem. # The 'P' option allows commands to be used as files. # The 'O' option allows use of the OS/2 namespace # The 'N' option allows use of the NFS namespace # The default is upper case. # Syntax: # 1 <Volumename> <Volumepath> <Options> 1 SYS /home/netware/SYS/ # SYS 1 DATA /home/netware/DATA/ k # DATA 1 CDROM /cdrom kmr # CDROM # SERVER NAME # If not set then the linux hostname will be converted to upper case # and used. This is optional, the hostname will be used if this is not # configured. # Syntax: # 2 <Servername> 2 LINUX_FS01

# INTERNAL NETWORK ADDRESS # The Internal IPX Network Address is a feature that simplifies IPX routing # for multihomed hosts (hosts that have ports on more than one IPX network). # Syntax: # 3 <Internal Network Address> [<Node Number>] # or: # 3 auto # # If you use 'auto' then your host IP address will be used. NOTE: this may # be dangerous, please be sure you pick a number unique to your network. # Addresses are 4byte hexadecimal (the leading 0x is required). 3 0x49a01010 1

# NETWORK DEVICE(S) # This entry configures your IPX network. If you already have your # IPX network configured then you do not need this. This is the same as # using ipx_configure/ipx_interface before you start the server. # Syntax: # 4 <IPX Network Number> <device_name> <frametype> [<ticks>] # Frame types: ethernet_ii, 802.2, 802.3, SNAP 4 0x39a01010 eth0 802.3 1 # SAVE IPX ROUTES AFTER SERVER IS DOWNED # Syntax: # 5 <flag> # 0 = don't save routes, 1 = do save routes 50 # NETWARE VERSION # Syntax: # 6 <version> # 0 = 2.15, 1 = 3.11 61 # PASSWORD HANDLING # Real Novell DOS clients support a feature which encypts your # password when changing it. You can select whether you want your # mars server to support this feature or not. # Syntax # 7 <flag>

# # # # # # 71

<flag> is: 0 to force password encryption. (Clients can't change password) 1 force password encryption, allow unencrypted password change. 7 allow non-encrypted password but no empty passwords. 8 allow non-encrypted password including empty passwords. 9 completely unencrypted passwords (doesn't work with OS/2)

# MINIMAL GID UID rights # permissions used for attachments with no login. These permissions # will be used for the files in your primary server attachment. # Syntax: # 10 <gid> # 11 <uid> # <gid> <uid> are from /etc/passwd, /etc/groups 10 200 11 201 # SUPERVISOR password # May be removed after the server is started once. The server will # encrypt this information into the bindery file after it is run. # You should avoid using the 'root' user and instead use another # account to administer the mars fileserver. # # This entry is read and encrypted into the server bindery files, so # it only needs to exist the first time you start the server to ensure # that the password isn't stolen. # # Syntax: # 12 <Supervisor-Login> <Unix username> [<password>] 12 SUPERVISOR terry secret # USER ACCOUNTS # This associates NetWare logins with unix accounts. Password are # optional. # Syntax: 13 <User Login> <Unix Username> [<password>] 13 MARTIN martin 13 TERRY terry # LAZY SYSTEM ADMIN CONFIGURATION # If you have a large numbers of users and could not be bothered using

# type 13 individual user mappings, you can automatically map mars_nwe # logins to linux user names. BUT, there is currently no means of making # use of the linux login password so all users configured this way are # will use the single password supplied here. My recommendation is not # to do this unless security is absolutely no concern to you. # Syntax: # 15 <flag> <common-password> # <flag> is: 0 - don't automatically map users. # 1 - do automatically map users not configured above. # 99 - automatically map every user in this way. 15 0 duzzenmatta # SANITY CHECKING # mars_nwe will automatically ensure that certain directories exist if # you set this flag. # Syntax: # 16 <flag> # <flag> is 0 for no, don't, or 1 for yes, do. 16 0 # PRINT QUEUES # This associates NetWare printers with unix printers. The queue # directories must be created manually before printing is attempted. # The queue directories are NOT lpd queues. # Syntax: # 21 <queue_name> <queue_directory> <unix_print_cmd> 21 EPSON SYS:/PRINT/EPSON lpr -h 21 LASER SYS:/PRINT/LASER lpr -Plaser # DEBUG FLAGS # These are not normally needed, but may be useful if are you debugging # a problem. # Syntax: # <debug_item> <debug_flag> # # 100 = IPX KERNEL # 101 = NWSERV # 102 = NCPSERV # 103 = NWCONN # 104 = start NWCLIENT # 105 = NWBIND # 106 = NWROUTED # 0 = disable debug, 1 = enable debug

100 0 101 0 102 0 103 0 104 0 105 0 106 0 # RUN NWSERV IN BACKGROUND AND USE LOGFILE # Syntax: # 200 <flag> # 0 = run NWSERV in foreground and don't use logfile # 1 = run NWSERV in background and use logfile 200 1 # LOGFILE NAME # Syntax: # 201 <logfile> 201 /tmp/nw.log # APPEND LOG OR OVERWRITE # Syntax: # 202 <flag> # 0 = append to existing logfile # 1 = overwrite existing logfile 202 1 # SERVER DOWN TIME # This item sets the time after a SERVER DOWN is issued that the # server really goes down. # Syntax: # 210 <time> # in seconds. (defaults 10) 210 10 # ROUTING BROADCAST INTERVAL # The time is seconds between server broadcasts # Syntax: # 211 <time> # in seconds. (defaults 60)

211 60 # ROUTING LOGGING INTERVAL # Set how many broadcasts take place before logging of routing # information occurs. # Syntax: # 300 <number> 300 5 # ROUTING LOGFILE # Set the name of the routing logfile # Syntax: # 301 <filename> 301 /tmp/nw.routes # ROUTING APPEND/OVERWRITE # Set whether you want to append to an existing log file or # overwrite it. # Syntax: # 302 <flag> # <flag> is 0 for append, 1 for create/overwrite 302 1 # WATCHDOG TIMING # Set the timing for watchdog messages that ensure the network is # still alive. # Syntax: # 310 <value> # <value> = 0 - always send watchdogs # < 0 - (-ve) for disable watchdogs # > 0 - send watchdogs when network traffic # drops below 'n' ticks 310 7 # STATION FILE # Set the filename for the stations file which determine which # machines this fileserver will act as the primary fileserver for. # The syntax of this file is described in the 'examples' directory # of the source code. # Syntax: # 400 <filename>

400 /etc/nwserv.stations # GET NEAREST FILESERVER HANDLING # Set how SAP Get Nearest Fileserver Requests are handled. # Syntax: # 401 <flag> # <flag> is: 0 - disable 'Get Nearest Fileserver' requests. # 1 - The 'stations' file lists stations to be excluded. # 2 - The 'stations' file lists stations to be included. 401 2 =============================================================== Question 2.D) How is Linux different from Unix operating sysem? Explain. Ans. UNIX is copyrighted name only big companies are allowed to use the UNIX copyright and name, so IBM AIX and Sun Solaris and HP-UX all are UNIX operating systems. The Open Group holds the UNIX trademark in trust for the industry, and manages the UNIX trademark licensing program.Most UNIX systems are commercial in nature. Linux is a UNIX Clone But if you consider Portable Operating System Interface (POSIX) standards then Linux can be considered as UNIX. To quote from Official Linux kernel README file: Linux is a Unix clone written from scratch by Linus Torvalds with assistance from a loosely-knit team of hackers across the Net. It aims towards POSIX compliance. However, "Open Group" do not approve of the construction "Unix-like", and consider it misuse of their UNIX trademark. Linux Is Just a Kernel Linux is just a kernel. All Linux distributions includes GUI system + GNU utilities (such as cp, mv, ls,date, bash etc) + installation & management tools + GNU c/c++ Compilers + Editors (vi) + and various applications (such as OpenOffice, Firefox). However, most UNIX operating systems are considered as a complete operating system as everything come from a single source or vendor. As I said earlier Linux is just a kernel and Linux distribution makes it complete usable operating systems by adding various applications. Most UNIX operating systems comes with A-Z programs such as editor, compilers etc. For example HP-UX or Solaris comes with A-Z programs. License and cost Linux is Free (as in beer [freedom]). You can download it from the Internet or redistribute it under GNU licenses. You will see the best community support for Linux. Most UNIX like operating systems are not free (but this is changing fast, for example OpenSolaris UNIX). However, some Linux distributions such as Redhat / Novell provides additional Linux support, consultancy, bug fixing, and training for additional fees. User-Friendly

Linux is considered as most user friendly UNIX like operating systems. It makes it easy to install sound card, flash players, and other desktop goodies. However, Apple OS X is most popular UNIX operating system for desktop usage. Security Firewall Software Linux comes with open source netfilter/iptables based firewall tool to protect your server and desktop from the crackers and hackers. UNIX operating systems comes with its own firewall product (for example Solaris UNIX comes with ipfilter based firewall) or you need to purchase a 3rd party software such as Checkpoint UNIX firewall. Backup and Recovery Software UNIX and Linux comes with different set of tools for backing up data to tape and other backup media. However, both of them share some common tools such as tar, dump/restore, and cpio etc. File Systems Linux by default supports and use ext3 or ext4 file systems. UNIX comes with various file systems such as jfs, gpfs (AIX), jfs, gpfs (HP-UX), jfs, gpfs (Solaris). System Administration Tools UNIX comes with its own tools such as SAM on HP-UX. Suse Linux comes with Yast Redhat Linux comes with its own gui tools called redhat-config-*. However, editing text config file and typing commands are most popular options for sys admin work under UNIX and Linux. System Startup Scripts Almost every version of UNIX and Linux comes with system initialization script but they are located in different directories: HP-UX - /sbin/init.d AIX - /etc/rc.d/init.d Linux - /etc/init.d =============================================================== Question 3.i) Define the concept of domains, workgroups and trusted relationship in the context of Windows 2000? Ans. Domain A name that identifies one or more IP addresses. For example, the domain name microsoft.com represents about a dozen IP addresses. Domain names are used in URLs to identify particular Web pages. For example, in the URL http://www.pcwebopedia.com/index.html, the domain name is pcwebopedia.com. Every domain name has a suffix that indicates which top level domain (TLD) it belongs to. There are only a limited number of such domains. For example: gov - Government agencies edu - Educational institutions org - Organizations (nonprofit) mil - Military com - commercial business net - Network organizations

ca - Canada th - Thailand Workgroups A Workgroup may refer to a peer-to-peer computer network. See Workgroup (computer networking) a group of people working together toward a common goal, also known as a working group a Courtroom Workgroup, an informal arrangement between a criminal prosecutor, criminal defense attorney, and the judicial officer ========================================================== Question 3. ii). How is distributed file system implemented in Windows 2000. Ans. In Windows NT 4.0, Microsoft provided an add-on product called Distributed File System (DFS) that allowed physically separate network file resources to be grouped together and accessed as if they were a single logical structure. The product, which was a free download, failed to make a great impact with network administrators and went largely unnoticed. With Windows 2000, DFS is included with the OS and provides a number of new functions. The tool for managing the DFS structure has been improved, and wizards serve to make setup an easy task. DFS is a service that gives administrators a way to provide users with simple access to increasingly distributed amounts of data. In this article, I will look at some of the features of DFS and how to create a DFS tree in Windows 2000 DFS provides the ability to create a single logical directory tree from different areas of data. The data included in a DFS tree can be in any location accessible from the computer acting as the DFS root. In other words, the data can be on the same partition, disk, or server, or on a completely different server. As far as DFS is concerned, it makes no difference. A DFS tree appears as one contiguous directory structure, regardless of the logical or physical location of the data. After the DFS root is created, links to directories can be added or removed to construct the single logical directory structure. The DFS tree can be navigated using standard file utilities such as Windows Explorer. Unless users are made aware of the fact that the data is being accessed from different locations, they will not realize that they are using a DFS system at all. =============================================================== Question 3. iii).Explain drive mapping facility in Windows 2000 with suitable example? Ans. Follow these steps: Plan to map a separate drive for each resource you need to access. For instance, if you'll be manipulating files in both the home directory and your Webspace on the OIT Sun Network, map two different drive letters. This is because the file permissions will be set to different defaults. New directories and files in your public_html webspace should be world readable, but you wouldn't want those in your home directory to be. Be sure you can log in to Auburn Windows Domain resources. The Auburn University MyAccount page at http://www.auburn.edu/myaccount lets you set or change

your password. If at any point during the mapping process you are prompted for a password, enter your password. Know which version of Windows that you are using. How-to: Determine what Windows version you have Know whether you are logged into the Auburn Windows domain. You will need this for a later step. Windows 2000: You are logged into the Auburn domain if "auburn.edu" is shown in the domain field when you right-click My Computer, click Properties, click the Network Identification tab. Windows XP: You are logged into the Auburn domain if auburn.edu is shown in the domain field when you click Start, choose My Computer, choose Properties, click the Computer Name tab. Windows Vista: You are logged into the Auburn domain if auburn.edu is shown in the domain field when you click Start, choose Computer, choose System Properties. Open the Map Network Drive window. From your Windows Desktop (Windows2000) or the Start Menu (WindowsXP), right-click My Computer or Network Neighborhood or My Network Places, and then left-click Map Network Drive. From your Start Menu (Windows Vista), right-click Computer or Network, and then left-click Map Network Drive.

Select the drive letter to use. Windows will assigned a drive letter for you (example: F:). On your computer, this drive designator may be different, depending upon what other devices you have installed on your computer. You may select a different letter if you wish, but choose one that's not already in use for something else. Type the desired path in the Path box. Note that the syntax here requires two backslashes ( \\ ) before the hostname and a single backslash ( \ ) between the hostname and the file directory.

For your OIT Sun Network home directory, enter \\ausamba\homes or, if your computer is not joined to the Auburn domain, use the full path \\ausamba.auburn.edu\homes. For your OIT Sun Network Webspace, enter \\ausamba\pubhtml or \\ausamba\pub_html or, if your computer is not joined to the Auburn domain, add the full path \\ausamba.auburn.edu\pubhtml or \\ausamba.auburn.edu\pub_html. For the streaming media, see Uploading files to the streaming server. Check the Reconnect at Logon box to make the drive mapping available on every login to your computer. Windows will attempt to map your drive each time you log into your machine without you needing to set up the drive mapping again. If you leave this box unchecked, then the next time you startup up your computer and log in, you will have to map the drive again before you can use it. Click the Finish button if you are logged into the Auburn Windows domain. If you are not logged into the Auburn Windows Domain, then click 'different user name', enter "auburn\AU User Name", and click the Finish button. Click OK. If your computer is joined to the Auburn domain and you logged in to the Auburn domain when you started your computer, you will skip this step. You may have to wait several seconds for a small window like this to open and close:

The following window will appear:

In Windows 2000, "User name" will read "Connect As". For your OIT Sun Network home directory or Webspace, enter "auburn\AU User Name" and your OIT Password. For the restricted access server, enter "duc_domain\AU User Name" for directories less than p9949, or enter "auburn\AU User Name" for directories more than p9949, and in the password field, enter your OIT password.

Click OK. =============================================================== Question 3. iv) Write the purpose of VPN and name some VPN protocols supported by windows 2000. Ans. VPN gives extremely secure connections between private networks linked through the Internet. It allows your remote computer(s) to act as though they were on the same secure, local (USU) network. Allows you to be at home or anywhere Internet access is available and access the USU network and computer systems in the same way as if you were connected directly at USU. Almost impossible for someone to tap or interfer with data in the VPN tunnel. For secure VPNs, the technologies that VPNC supports are IPsec with encryption L2TP inside of IPsec SSL with encryption For trusted VPNs, the technologies that VPNC supports are: MPLS with constrained distribution of routing information through BGP ("layer 3 VPNs") Transport of layer 2 frames over MPLS ("layer 2 VPNs") Question 4. i) Describe backup strategies for your system? Ans. backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. The verb is back up in two words, whereas the noun is backup (often used like an adjective in
compound nouns).[1]

Backups are useful primarily for two purposes. The first is to restore a state following a disaster (called disaster recovery). The second is to restore small numbers of files after they have been accidentally deleted or corrupted. Data loss is also very common. 66% of internet users have suffered from serious data loss.[2] Since a backup system contains at least one copy of all data worth saving, the data storage requirements are considerable. Organizing this storage space and managing the backup process is a complicated undertaking. A data repository model can be used to provide structure to the storage. In the modern era of computing there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability. Before data is sent to its storage location, it is selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Many organizations and individuals try to have confidence that the process is working as expected and work to define measurements and validation techniques. It is also important to recognize the limitations and human factors involved in any backup scheme.

Question 4. ii) Describe the features of Intrusion detection system? Ans. An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network. IDS come in a variety of flavors and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems. There are IDS that detect based on looking for specific signatures of known threats- similar to the way antivirus software typically detects and protects against malware- and there are IDS that detect based on comparing traffic patterns against a baseline and looking for anomalies. There are IDS that simply monitor and alert and there are IDS that perform an action or actions in response to a detected threat Question 4. iii)List and describe the various security features in Windows 2000 OS? Ans. Windows 2000 OS contain so many features some of features are: 1. Converting NTFS format 2. Disabling TCP/IP and IIS 3. Securing guest and administrator account 4. Creating a local security policy 5. Creating groups 6. Disable sharing =============================================================== =============================================================== =============================THE END ==========================

Vous aimerez peut-être aussi