MCS 22 Solved Assignment
MCS 22 Solved Assignment
2024-2025
Key Characteristics:
• Deterministic Response: Ensures that tasks are completed within a predictable and
reliable time frame.
• Priority-Based Scheduling: Uses priority-based scheduling to manage task execution
based on their urgency.
• Minimal Latency: Provides minimal latency and high responsiveness to ensure
timely processing.
• Predictable Performance: Offers predictable performance to meet real-time
deadlines.
1. FreeRTOS:
o Description: FreeRTOS is an open-source real-time operating system
designed for embedded systems. It provides multitasking capabilities with
priority-based scheduling, making it suitable for applications requiring timely
responses, such as industrial control systems.
o Features: Lightweight, portable, and supports a variety of microcontrollers
and processors.
2. VxWorks:
o Description: VxWorks is a commercial RTOS developed by Wind River
Systems. It is used in mission-critical applications such as aerospace, defense,
automotive, and industrial automation.
o Features: Offers high performance, reliability, and real-time capabilities with
extensive support for networking, security, and safety features.
Q2. (a) What is EFS service? Describe the concept of encryption using EFS
service.
Answer:
EFS (Encrypting File System) is a feature of Microsoft Windows that provides file-level
encryption to protect sensitive data stored on NTFS file systems. EFS allows users to encrypt
files and folders on their local or network drives to ensure that only authorized users can
access them. It integrates with the Windows operating system to provide encryption
seamlessly without requiring additional user intervention for most tasks.
1. Encryption Process:
o Key Management: EFS uses a combination of symmetric and asymmetric
encryption to protect files. When a file is encrypted using EFS, it is first
encrypted with a symmetric encryption algorithm using a file encryption key
(FEK). The FEK itself is then encrypted using the user's public key
(asymmetric encryption). This process ensures that the file can only be
decrypted by the intended user who possesses the corresponding private key.
2. Encryption and Decryption:
o Encryption: When a user saves a file to an NTFS volume, EFS automatically
encrypts the file using the FEK. The FEK is then encrypted with the user's
public key and stored alongside the encrypted file.
o Decryption: When the user attempts to access the encrypted file, EFS first
decrypts the FEK using the user's private key. The FEK is then used to decrypt
the file content, making it accessible to the user.
3. Key Storage and Management:
o User Certificates: EFS relies on user certificates for managing encryption
keys. Each user has a digital certificate containing a public-private key pair.
The private key is stored securely in the user's profile, while the public key is
used for encrypting the FEK.
o Data Recovery Agents: EFS allows administrators to set up Data Recovery
Agents (DRAs) who can decrypt files if necessary. DRAs have their own
certificates and can access encrypted files even if the original user is
unavailable.
4. Integration and Usage:
o Seamless Integration: EFS is integrated into the Windows operating system
and operates transparently. Users can encrypt files or folders by simply
selecting the encryption option in the file properties.
o Security: EFS enhances data security by ensuring that encrypted files are
inaccessible to unauthorized users. It also protects data against unauthorized
access if a computer is stolen or if unauthorized individuals gain access to the
file system.
(b) Compare TFTP and FTP. Which protocol is used by TFTP at the transport
layer and why?
Answer:
TFTP (Trivial File Transfer Protocol) and FTP (File Transfer Protocol) are both
protocols used for transferring files over a network, but they differ significantly in their
functionality and features.
1. Functionality:
o TFTP:
▪ Purpose: Designed for simple, lightweight file transfers, typically used
in scenarios where minimal functionality is required, such as booting
systems over a network.
▪ Complexity: Simple protocol with no authentication or directory
listing capabilities. Suitable for small-scale, straightforward transfers.
o FTP:
▪
Purpose: A more robust protocol designed for comprehensive file
transfer capabilities, including user authentication, directory
navigation, and file management.
▪ Complexity: Supports a wide range of features, including user
authentication, directory listing, and various file operations (uploading,
downloading, deleting).
2. Protocol Characteristics:
o TFTP:
▪ Connection Type: Connectionless protocol that uses UDP (User
Datagram Protocol) for communication.
▪ Features: Lacks security features, authentication, and support for
complex file operations.
▪ Use Cases: Commonly used for network booting, configuration file
transfers, and scenarios where simplicity and low overhead are
important.
o FTP:
▪ Connection Type: Connection-oriented protocol that uses TCP
(Transmission Control Protocol) for reliable, ordered, and error-
checked delivery of data.
▪ Features: Supports authentication, file and directory management, and
various commands for managing files on the server.
▪ Use Cases: Suitable for a wide range of file transfer needs, including
transferring large files, managing files on a remote server, and more
complex data exchange scenarios.
3. Security:
o TFTP:
▪ Security: No built-in security features. Data is transmitted in plaintext,
making it vulnerable to interception and unauthorized access.
o FTP:
▪ Security: Offers user authentication and authorization features but
transmits data, including credentials, in plaintext by default. Secure
versions like FTPS (FTP Secure) and SFTP (SSH File Transfer
Protocol) provide encrypted communication.
Q3. (a) List and explain the file systems supported by Linux operating system.
Also, write the security features provided by Linux in each file system.
Answer:
Linux supports a variety of file systems, each with its own features and security mechanisms.
Here’s a list of commonly supported file systems along with their security features:
(b) Compare and Contrast the 'Mandatory Access Control" and "Discretionary
Access Control" mechanism in windows 2000.
Answer:
What is MAC?
Access control choices in MAC are based on a set of rules and regulations that
determine the level of access that users have to resources. A central authority
establishes these rules and policies, which take into consideration factors such
as user clearance level, role, and security clearance.
MAC enforces access control by issuing a security label to each resource and
user in the system. The security label determines the level of clearance
required to access the resource as well as the user's level of clearance. Access
to a resource is only given if the user's security clearance level matches or
exceeds the security label assigned to the resource.
What is DAC?
Access control lists (ACLs) are assigned to resources by DAC to impose access
control. An ACL is a list of individuals or groups of users who can access a
resource and the amount of access they have. The ACL is managed by the
resource's owner and can be changed at any moment to grant or cancel access.
Q4. Write the step-by-step procedure to create a group named "MCS022".
Now add a user "SOCIS" in Windows 2000 operating system. Assume user
"SOCIS" is already a member of the guest account in your system. Also explain
the basic purpose of enabling the offline features in Windows 2000 operating
system.
Answer:
Here’s a step-by-step procedure to create a group named "MCS022" and add a user named
"SOCIS" to this group in Windows 2000:
Step-by-Step Procedure:
Offline Files is a feature in Windows 2000 that allows users to access network files even
when they are not connected to the network. This feature is particularly useful in scenarios
where users need to work remotely or in situations where network connectivity is
intermittent.
1. Work Offline:
o Users can access and modify files that are stored on a network share even when
they are not connected to the network. Changes made to offline files will be
synchronized with the network version once connectivity is restored.
2. Increase Productivity:
o By providing access to necessary files and documents regardless of network
availability, offline files help users continue their work without interruptions due to
connectivity issues.
3. Synchronization:
o Offline Files automatically synchronize changes between the local copy and the
network copy when the user reconnects to the network. This ensures that all
changes are updated and no data is lost.
4. Local Caching:
o Frequently accessed files can be cached locally, which can improve performance and
reduce network load by decreasing the number of times files need to be accessed
from the network.
5. Enhanced Accessibility:
o Enables users who travel or work in remote locations to still have access to essential
files, ensuring continuity of work.
Q5. Answer the following questions related to Linux commands: (10 Marks)
(i) Show the users logged in on the network.
(ii) List the files having more than one digit in the name.
(iii) Tell the system to run the process continuously even if the user logs out.
(iv) To allow a user to communicate with another user, logged in by splitting
the screen and providing two-way communication.
(v) To kill a process after one hour
Answer:
To show the users currently logged into the system, you can use the who command or the w
command. These commands provide information about users who are logged in, including
their login names, terminal lines, login times, and other details.
Command:
who or w
(ii) List the Files Having More Than One Digit in the Name
To list files that have more than one digit in their names, you can use ls combined with grep
to filter the results based on the pattern you want.
Command:
ls | grep '[0-9].*[0-9]'
(iii) Tell the System to Run the Process Continuously Even if the User Logs
Out
To run a process in the background and ensure it continues running even if you log out, you
can use the nohup command. This command stands for "no hang up" and prevents the process
from being terminated when the user logs out.
Command:
To allow two users to communicate and share the screen, you can use the screen or tmux
utility. Both utilities allow you to create terminal sessions that can be shared among users.
Using screen:
screen -S session_name
Using tmux:
tmux
To kill a process after a specific amount of time, such as one hour, you can use the at
command, which schedules tasks to be run at a specified time.
Command:
Windows 2000 introduced several key security features designed to enhance the security of
the operating system and protect against various types of threats. Here are the main security
features:
(b) What is Virtual Memory? Explain the abstract model of virtual to physical
address mapping with reference to Linux operating system
Answer:
Virtual Memory:
In Linux (and many other modern operating systems), virtual memory is implemented using a
combination of hardware and software mechanisms. The abstract model involves translating
virtual addresses used by processes into physical addresses used by the hardware.
Key Components:
Example: If a process in Linux tries to access a virtual address, the following steps occur:
Q7. Write a Linux shell script for automatic grouping of files given in a
directory. All files will be grouped on the basis of their size and will be saved
into the newly created folders based on file size groups given below: Files will
be grouped into 0 to 5 kB, 5 kB to 5 MB, 5 MB to 1 GB and greater than 1 GB.
Answer:
create a Linux shell script that automatically groups files in a directory based on their size,
you can follow these steps. The script will categorize files into the following size groups:
• 0 to 5 kB
• 5 kB to 5 MB
• 5 MB to 1 GB
• Greater than 1 GB
Answer:
(a) LAN Topologies
LAN (Local Area Network) Topologies refer to the physical or logical arrangement of
network devices and cables in a LAN environment. Common topologies include:
1. Bus Topology:
o Structure: All devices are connected to a single central cable (the bus).
o Advantages: Simple and cost-effective for small networks.
o Disadvantages: A failure in the central cable can bring down the entire network;
performance degrades as more devices are added.
2. Star Topology:
o Structure: All devices are connected to a central hub or switch.
o Advantages: Easy to install and manage; failure of one cable does not affect other
devices.
o Disadvantages: The central hub is a single point of failure; requires more cables
compared to bus topology.
3. Ring Topology:
o Structure: Devices are connected in a circular fashion; each device has exactly two
neighbors for communication purposes.
o Advantages: Data packets travel in one direction, reducing collisions.
o Disadvantages: A failure in any single connection can disrupt the entire network;
typically requires more complex setup and maintenance.
4. Mesh Topology:
o Structure: Devices are interconnected, with multiple paths for data transmission.
o Advantages: Provides high redundancy and reliability; data can take multiple paths
to reach its destination.
o Disadvantages: Expensive to install due to the high number of cables and devices
required.
5. Hybrid Topology:
o Structure: A combination of two or more different topologies.
o Advantages: Flexible and scalable; can leverage the advantages of multiple
topologies.
o Disadvantages: More complex to design and manage.
• Structure: Devices are connected in a logical ring (circle) and communicate using a token-
passing method.
• Operation: A small data packet called a "token" circulates around the network. Only the
device holding the token can send data, reducing collisions.
• Advantages: Efficient for managing network traffic and avoiding collisions.
• Disadvantages: Limited scalability; if the token is lost or a device fails, it can disrupt the
network.
Network Monitoring Tools are software applications used to monitor and manage network
performance, detect issues, and ensure the health of a network. Key tools include:
1. Nagios:
o Features: Monitors network services, hosts, and systems; provides alerting and
reporting.
o Use Case: Widely used for monitoring and alerting in enterprise environments.
2. Wireshark:
o Features: Network protocol analyzer; captures and inspects network traffic in real-
time.
o Use Case: Troubleshoots network issues, analyzes network protocols, and inspects
packet-level details.
3. SolarWinds:
o Features: Comprehensive network monitoring and management suite; includes
performance monitoring, configuration management, and security features.
o Use Case: Suitable for large enterprises requiring integrated network management.
4. PRTG Network Monitor:
o Features: Monitors network availability, bandwidth usage, and system performance;
provides graphical reports and alerts.
o Use Case: Ideal for medium to large networks with a focus on real-time monitoring.
(d) Firewall
A Firewall is a network security device or software that controls incoming and outgoing
network traffic based on predetermined security rules:
• Types:
1. Hardware Firewall: Dedicated physical device that sits between the network and the
Internet; provides high performance and robust security.
2. Software Firewall: Installed on individual devices; provides customizable security
rules for specific applications and processes.
• Functions:
o Packet Filtering: Inspects packets and allows or blocks them based on rules.
o Stateful Inspection: Tracks the state of active connections and makes decisions
based on the state of the connection.
o Proxy Services: Acts as an intermediary between users and the Internet, filtering
traffic and hiding internal IP addresses.
• Benefits:
o Protects networks from unauthorized access and cyber threats.
o Monitors and controls traffic based on security policies.
Active Directory (AD) is a directory service developed by Microsoft for Windows domain
networks: