0 ratings0% found this document useful (0 votes) 58 views16 pages3 RD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Python Programming
20CS31P
SL.
CHAPTER
LAB
Fundamental Concepts:
brief history; features; applications of python; python distributions;
versions; python IDEs; Python interpreter; Execution of python
programs, debugging python code; Indentation, Comments; best
1. Setup python environment
2. Executing python: explore different
ways to run python program
3. debug python code
1 _| practices for python programming; Character set; tokens;
keywords, variables, naming rules for variables, Assignment,
Basics /O operations 1. Code, execute and debug programs
Input- input Q), raw_inputQ ; output — print (), formatting output. that
Datatypes a) Use ifo statements
Scalar type: Numeric (int, long, float, complex), Boolean, bytes, _| b) Evaluate expressions and displays
2 | None; Type casting formatted output
Operators ©) Evaluate expressions to examine the
Arithmetic, Comparison/Relational, Logica/Boolean, Bitwise; operator precedence
string operators; Expressions and operator precedence 2. Identify and resolve Syntactic and
semantic issues in the given code
Snippet.
Control Flow: Conditional blocks 1. Identify and Code, execute and debug
Ifstatement: general format; Multiway branching; programs using conditional
3. | Sufficient examples; statements.
2. Identify and resolve syntactic and
semantic issues in the given code
snippet
Control Flow: Loops 1. Code, execute and debug programs
While loop: general format; examples using loops.
4. | For loop: general format, examples. 2. Code, execute and debug programs
Range();nesting loops and conditional statements; using loops and conditional statements
Controlling loop execution: Break, continue, pass statements; 3. Identify and resolve syntactic and
semantic issues in the given code
Snippet
Data Collections, 1. Code, execute and debug programs to
Concept of mutability Set — features, declaration, initialization, perform following,
5 | operations, comprehension; Tuple-features; declaration, * set operations
initialization, basic operations; indexing; slicing; built in functions; | + set comprehension
Nested tuples; 2. Code, execute and debug programs to
perform following.
+ basic operations on tuples
+ tuple indexing and slicing
3. Identify and resolve syntactic and
semantic issues in the given code snippet
6 | List 1. Write code snippet to perform
features; declaration, initialization, basic operations; indexing;
functions; Nested Lists; List iterations; Slicing;
built in Comprehensions; Applications
following on List
+ basic operations on List
+ indexing and slicing
+ comprehension
2. Identify and resolve syntactic and
semantic issues in the given code snippet
NS
1Dictionary
features; declaration, initialization, basic operations; indexing;
I. Code, execute and debug programs to
perform basic operations on Dictionary
7 | adding and removing keys, iterating through dictionaries; built in _ | 2. Code, execute and debug programs to
functions; Comprehensions; Applications perform Dictionary indexing Iterating
comprehension
3. Identify and resolve syntactic and
semantic issues in the given code snippet
‘Arrays and Strings 1. Code, execute and debug programs to
Arrays: features; create, initialize, indexing, traversal, manipulation; | perform string manipulation
8 | Strings: create, assign, indexing, built in functions; 2. Code, execute and debug programs to
perform array manipulation
3. Identify and resolve syntactic and
semantic issues in the given code snippet
9° | Funetions 3. Code, execute and debug programs to
Need of function; types; define funetion, calling function, fumetion | solve the given problem using recursion
arguments; retum and yield; None keyword; Scope of variables; _| 4. Define anonymous funetion and code
Recursion; anonymous functions; sufficient examples; to solve the given problem
5. Identify and resolve syntactic and
semantic issues in the given code snippet
10 | Modules and Packages 1. Create Modules and Packages
Why modules? Module creation; Importing modules; Module 2. Code, execute and debug programs
Namespace; Packages: basics; path setting; Package _init_.py | using built in modules
Files; Commonly used modules: Math, random; Emoji
11 | NumPy 1. Code, execute and debug programs
Brief about NumPy module; NumPy arithmetic functions; NumPy | using NumPy module
array manipulation functions; NumPy statistical functions; 2. Code, execute and debug programs
Pandas using series.
Introduction, series, data frame; Create dataframes; formatting 3. Code, execute and debug programs
data; fundamental data frame operations; using dataframes.
4, Identify and resolve syntactic and
semantic issues in the given code snippet
12 | Files T.write code snippet to perform
Concept; features; file operations; Opening Files; Closing Files; following operations on different
Writing to Files; Reading to Files; File methods; types of files
Working with files using data frame + read file
+ write to file
2. Write code to perform file operations
using dataframes on different file types.
3. Identify and resolve syntactic and
semantic issues in the given code snippet
13. | Error and Exception Handiin, Integrate exception handling into
Python errors; exceptions: built in, user defined. How to
exceptions? Raising exceptions;
above code
2. Write code snippet to raise exceptions
3. Identify and resolve syntactic and
semantic issues in the given code snippet
NSACTIVITY
1. Compare and contrast excel and python
2. Identify various python IDEs and identi
differences between them
2 | 1. Identify use cases like reading student name and contact details and display in a required
format
2. Compare and contrast input () and raw_input() and identify its appropriate use.
3. Identify use of operators and develop algorithms to solve the same
4, Compare and contrast different types of operators
3 | 1. Identify use cases that involve decision making and develop algorithms to solve the same
1. Identify common syntactical errors when using control flow statements
4 _ | 1. Identify use cases that involve iteration and develop algorithms to solve the same
2. Compare and contrast different types of loops,
2. Identify common syntactical errors when using loops
5 | 1. Identify use eases and solve them using sets|
2. Identify use cases and solve them using tuples
3. Identify common syntactical errors when working with sets and tuple
6 | 1. Identify use cases and solve them using List
2. Identify common syntactical errors when working with List
3. Reimplement built in list functions
7 |/1. Identify use eases and solve them using dictionary
2. Reimplement built in dictionary functions
3. Identify common syntactical errors when working with dictionary
8 | 1. Identify use cases and solve them using arrays
2. Reimplement built in string functions
3. Identify common syntactical errors when working with arrays and strings
9 [1 Optimize previously written programs by using modular programming approach
10 _ | 1. Identify and present pros and cons of modules and packages,
1. Explore and present python built in modules.
11 | 1. Identify the applications of Pandas
2. Perform data analysis using Pandas module on a dataset such as
12 _ | 1. Identify use cases on files concept and develop algorithms to solve the same
2. Explore regular expressions and present how they can be used for file manipulation
13 | 3. Compare and contrast error and exception.
4,
Rewrite the programs using exceptions if needed
Fyeton Programming
NSNSComputer Hardware, Maintenance and Administration
20CS32P
SEN
CHAPTERS
LAB
1
1/0 devices and Interfaces
Types of /O devices and ports on astandard PC for connecting 1
devices. Function of serial port, parallel port, and brief principle of
communication through these ports.types of devices that can be
connected and interface standards. Explain basic cable types,
features and their purposes. Importance of USB and HDMI
interfaces- Types and Features. Working of Common
Input/Outputdevices- Keyboard, Mouse, display monitor, printer
and speaker.
1. Hardware Identification:
+ Computer Case- Types, Features- Front
panel, back panel; A look inside the
computer case.
+ Identify the front and rear panel
controls andports on a PC cabinet.
+ Identify and understand different cables,
and connectors: Video cables- VGA,
HDMI, Mini-HDMI, Display port,
DVI; Peripheral cables- Serial; Hard
drive cables- SATA, PATA, IDESCS
Adapters-DVI to HDMI, USB to
ethernet, DVI to VGA.
+ Installation of a localprinter.
+ Shared printer.
+ Installing wireless andcloud printers.
2 | Power supplies T. Unmount the power supply from PC
Safety Basics: safety protocols; anti- static basic hand tools, cabinet. Identify the types of output
Know the danger of static electricity, power variation; connectors.
Precautions to be taken while mounting and unmounting, 2. Identify output voltagesusing color
power supply into/ from the cabinet;DC power source to PC - coding,
Need for SMPS, Specifications, Ratingof SMPS based on type of | 3. Measure voltage levelsusing multi
‘motherboard and devices used (AT/ATX, Micro ATX, mini ATX, | meter.
higher watts PSU for gaming PC), color coding adopted, Types of | 4. Mount the power supply into the PC
connectors used- ATX, ATX12V, Molex, SATA, PCIe; cabinet, connect different
Output voltage levels, measuring technique; choosing power componentsand test PC.
supply based on wattage rating; Heat sink; 80 plus rating system; | 5. Trouble shoot Power supply through
Modular power supply. Symptoms of SMPS failure; SMPS fan,
Commonproblems from a faulty SMPS. Trouble shooting Power | 6.Diagnose power supply faults using
supplies. PSU Tester:
3 | Basic Electronics Electricity, Electrical quantities- Voltage, ldentify the electrical and electronic
current and resistance; Active components: Diod
- PN junction
diodes, biasing conditionsforwardbias and reverse bias,
transistors- BJT, MOSFET; Passive components-Resistors,
capacitors, inductors, transformers, sensors, and transducers;
Integrated Circuits Digital Electronies- PWM, opto- coupler;
checking AC to DC converter.
components used in a computer and
tabulatethem as active and passive
components.
2.Ldentify the working and nonworking
stateof basic components and
semiconductor devices.
3.Using multi meter- Check Output
voltage ofbasic components and
semiconductor devices,
4.Check different voltage levels,
of opto-coupler, PWM and rectifier.
NsMother board — Example Motherboards; Functional description of
‘mother board; specification and variation. Form factor- what is
Motherboard Form factor?
Types and features of Motherboard formfactors
ATX, Micro-ATX, Mini-ITX, Nano-ITX, andPico-
components of Motherboard; CPU and CPU socket-Types of
TX. Functional
sockets;
Overview of microarchitecture of INTEL and AMD CPU.
I. Precautions to be takenbefore
removing the mother board from PC
cabinet.
2. Using the CPUID CPU-Ziool, find
U
trie flowpath and data
different features of C
k the
flow path
4, Windows resourcemonitor
5. Using the CPUID CPU-Ztool, identify
the CPU cache features of your working
system
5 | Chipsets- Function, Types andFeatures, 1. Identify system faults using POST
Buses- System bus architecture Importance of POST; U diagnostiescard.
why is itrequired, possible configurations through UEFI 2. Understand basic onboard
IDE ports; Methods of adding SCSIdrives. configurations through UEFI.
CMOS battery: Why? Its specifications. Impact of removingthe | 3. Test different motherboards to
battery from mother board determine support forUEFI
4, Replace the CMOS battery in a
computer following the procedures.
5, Understand and modifyBIOS settings
and observe the consequences of CMOS
failure
6 | Memory— Memory Units (B, KB, MB,GB, TB), memory locations | I. Identify RAM chips and HDD/SSD,
and address space, Access methods, Memory Classification, study their features and note their
Main memory Types and Features. Auxiliary memory — ‘Types and_ | technical specifications.
features, Memory modules. 2. Identify SIMM and DIMM
memory modules, their number of pins,
specs and type.
3, Identify the interface type of a hard
drive andconnect it to a PC for data
recovery.
7 | RAM Technology- SDRAM, DDR, DDR2, DDR3, DDR4— Clock | 1. Use CPUID-CPUZ tool toidentify
speed, Bandwidth, Memory speed rating, PCspeed rating;
RAM capacity- single- sided and double-sided RAM, Channels;
RAM features- Parity/ECC RAM, SODIMM, SPDR chip.
Mass storage media- Hard drive, Principle of working, reliability,
performance, SSD, optical drive; Logical Block Addressing
(LBA); Memory capacity- physical and logical addressing; M.2
drives, SATA, NVMe. Causes of Hard drive failure; Signs
offailure; Backup and recovery of data;
capacity, speed,technology, and related
features of RAM.
2. Check for RAM and Motherboard
compatibility and install additional
RAMStick.
3. Find on Windows system properties
tocheck the RAM for acorrect
installation
4, Query the SPD RAM chip to identify
all
5, possible informationusing CPUID
cPUz.
Ns‘Windows Installation — Overview windows 10;
general features; Versions; architecture;prerequisites for windows
10 installation: hardware compatibility,BIOS compatibility, driver
requirements. Clean install ofwindows 10; upgrade to windows 10;
disk partitioning; troubleshooting installation problems; Multiple
Windows
system image; How to Backup/Restore your Windows partition
boot options; windows service packs. Imaging: «1
with the bootable image
1. Windows Installation Inspect
prerequisites for windows 10
installationon a given computer.
2. Perform cleaninstallation.
3. Upgrade to windows10.
4, Create dual boot for a given system,
learn andr
5. Practice on recoverypattition
6. Practice 10 registrytweaks.
tify errors in dual boot.
7. Practice disk management utilities
9-__| File system overview, types, properties, conversion from one I. Practice data recoverymethods
filesystem to another, configuration. Configuring system and data__ | 2. Working with task manager to
recovery: Recover files, recover apps and the registry; recover troubleshoot configuration and Other
windows 10, Configure and manage windows updates performance related issues.
auto/manually; testing and troubleshooting updates. 3, Working with taskscheduler.
Monitor and manage: Performance monitoring; optimizewindows | 4. Customizing windows desktop
services; tune scheduled tasks. Customizing windows desktop
10 | Windows Command line; PowerShell; basic commands; 1. Execute basic commands in Windows
writing simple PowerShell scripts. File security. using command prompt and PowerShell
like listing the drives in a system,
creating a new file, removing a file or
directory, retrieving the list of processes
and services, ete.
2. Use command line to encrypt and
decrypt files and folders.
11 _ | Portable computingTroubleshooting Laptops- I T. Observe the layout ofa laptop
Difference between laptop and desktop Motherboards; Checking | and compare it with a desktop,
Power connector and adaptor pins, AC adapter of Laptop circuit | 2. Follow/review manufacturer
diagram, Fault finding; troubleshooting voltage transfer section, _ maintenance guide forrepair and
AC-DC conversion, Generation of stand by voltage, fault finding- | maintenance.
No power ON, power switch, Battery charging circuit; 3, Power Issues: Battery not charging,
No power.
4, Trouble shoot computer hardware
issues in the following scenarios-
“Unexpected shutdowns
-Lockups
-POST & Boot
-Continuous reboot
-No Power
-Loud Noises.
Intermittent devicefailure
-Smoke and burning smell
5, Indicator lights
Ns 7Troubleshooting Laptops- If Dual MOSFET pin details, Two N-
channel MOSFET in place of dual MOSFET, one p-channel
and one N- channel MOSFET, problems and faultfinding; CPU
voltage generation circuits, keyboard interface, problem and fault
finding, Touch pad connector, BIOS details, SATA HDD details,
Audio section, internal display, LED sereen pin details.
Malware mitigation: introduction, types, symptoms, malware
removal;
I. Perform the same operations in
week#f7on a laptop.
2. LCD display trouble-shoot: No
display/dim video/flickering video.
3, Wireless troubleshooting: Multiple
antennae, check presence of wireless
cards.
4.8%
Each computer or mobiledevice.
5. Perform Antivirus and antimalware
updates.
‘an and remove malwares in
‘and E-waste?
ros of E-waste management, StEP initiatives to
E-waste management: What is EI
Differents.
solve
waste problems
impact of e-waste on health of children and workers,
E-waste management in India:
EPR and e-waste, the informal sector in e-w:
ste management,
Technologies for e-waste management, Financing e-waste
management systems- Key steps, milestones to achieve a robust
E-waste system.
Case studies.
+ Visit https://greene.gov.in and
https://kspeb.kamataka.gov. in!
to find the latest regulations and policies
taken up by the Government of India,
+ Visit a nearby e-waste management
plant and understand the management
process.
NsSLNO
ACTIVITY
1. Study multipurpose cables used with different models of computers and their applications
2. Identify the cables and list the devices that can be connected to computer using these cables.
3. Identify commercially available brands of keyboard, mouse and monitor and their distinguishable features.
1. Identify preventive measures that help to eliminate or reduce electrostatic discharge
2. Describe effective ways to reduce the risk of injury or damage while working with respect to powersupply
in computer systems
3. Make your observations on why a technician may choose to use a UPS instead of a surge suppress or to
protect a computer.
Identify the components that are powered by the PSU.
SMPS
U wattage is decided.
Identify the common causes of PS lure and explain howit can be maintained in a healthy state.
Explain the factors on which the
Describe the features of different Power suppli
wailable commercially thal support a gaming PC
Calculate the value of resistors onboard using the color code.
. Identify the terminals of a BJT and MOSFET.
Identify the units MHz and GHz with respect to CPU.
Compare and contrast the characteristics of different motherboard formfactors.
Identify and present the factors to select an appropriate Motherboard based on the purposeBasic
applications, Gaming, Workstations/servers.
4, Study the features and specifications of the processors (Intel: Pentium family, dualcore, quad core, core 2
duo, i3, i5, 17, i9 and AMD processors).
. Study the CPU benchmarks of the trending processors.
9. Compare features of CPU and GPU.
Pperlpelsare
Explain bus standards with respect to evolution, spec
ind recent trends (ISA, PCI, AGP).
Explain how to clear CMOS password.
Explain the importance of UEFI and configuration settings for ~
Overclocking of CPU frequencies
Set RAM timings
Setting BIOS passwords Specify boot options
- Describe the classification of memories.
Study different types of memory devices and features that are commercially available
Study the characteristics of different types of SSDs
Compare DDR4 and DDRS memory.
- Study and identify what happens when the hard drive fails
~ Identify system requirements for Windows 10 installation.
Study and list the features of different versions of windows 10.
Explore file backup in Windows file history feature.
Study best practices followed in scheduled backups and scheduled disk maintenance.
Study the necessity of TPM in Windows 11
10
| Compare relative merits and demerits of the two command shells
it
Relate the components of a laptop to a desktop and compare their features.
. Identify the upgradable and non- upgradable components in laptops.
12
|. Document the common faults that may occur on the motherboard.
13
rlelp lols cle w cle Pel le
Study the e-waste rules 2016 and their amendments there-off as prescribed by the Kamataka state
pollution control board and explain the process for the polytechnic to follow safe disposal of e-waste.
2. Study the global e-waste key statistics.
3. Sketch the e-waste policies and regulations, you think, must be regulated at each stakeholder’s level.
NsNS
10Computer networks
20C833P
Sino_ | Chapters Labs
1 Electromagnetic waves - Generation of electromagnetic waves _| 1 Build a circuit to Generate and detect,
and their properties
Electromagnetic spectrum - classification and its applications
Communication Systems - Basic elements of communication
systems with block diagram, List commonly used terms in
electronic communication systems, Data representation, Data
flow, Modulation, Demodulation Analog and Digital Signals,
Periodic and Non-Periodie Signals, Sine Wave,
Phase, Wavelength, Digital Signals, Bitrate, Bit-length.
of BASK signal and BFSK signal using
communication kit.
2 Transmission Impairment - Attenuation, Distortion and Noise, | 1. Explore all ISP in your areallocality
Performance - Bandwidth, Throughput, Latency, Jitter (Basic __| and select best intemet ISP/plan
concepts only) based on cost and performance.
Transmission Modes — Parallel and Serial Transmission. 2. Test the download/upload speed in
Asynchronous and Synchronous Transmission. your computer/mobile phone also check
Satellite communication type, bandwidth and ISP.
Introduction, advantages and disadvantages 3. Explore Bluethooth, Wifi, NFC in
‘your smartphone and note their key
technical attributes (Radio spectrum
band, range, pathloss, throughput, mode
etc)
3 Perspectives on Networking — End user perspectives on 1. My Protocol Rules Objectives
‘Networking and Intemet, Overview of Networking. Categories of | a) Relate computer network protocols to
networks - LAN, MAN, WAN, Intemetworking (Illustrate the rules that you use every day for
"Network from LAN connected using a HUB to Intemetwork). | various forms of communication.
The communication rules (Method, language, Confirmation) b) Define the rules that govern how to
— Protocols, the Intemet. The Network Standard Organizations, | communicate in a group of students.
Protocol Stack. ¢) Play the communication game.
OSI Model : OSI Layers and Their Functions, OST Layering 4) List what would happen if the sender
Concepts and Benefits, OSI Encapsulation Terminology. and receiver did not agree on the
details of the protocol
2. Manual and Automatic address
assignment (Windows)
a) IPv4 address
b) Subnet mask
©) DNS
3. Manual and Automatic address
assignment (Android)
a) IPv4 address
b) Subnet mask
©) DNS
4 TCP/IP Networking Model - History Leading to TCPIIP, 1. Organize and play games to
Overview of the TCP/IP Networking Model. TCP/IP Application
Layer, HTTP Overview, HTTP Protocol Mechanisms. TCP/IP
Transport Layer, TCP Error Recovery Basics, Same-Layer and
understand working of TCP/IP like:
Create 2 group of students, each playing
role of a layers of TCP/IP
Ns
"‘Adjacent-Layer Interactions. TCP/IP Network Layer, Internet
Protocol and the Postal Service, Internet Protocol Addressing
Basics, IP Routing Basics. TCP/IP Link Layer (Data Link Plus
Physical), TCP/IP Model and Terminology, Data Encapsulation
Terminology. Names of TCP/IP Messages.
2. Determine the IP Address
Configuration of a Computer
(Windows) and Test the Network
Interface TCP/IP Stack (Ping).
5 Hardware and Software components of Network- Common | 1. Demonstrate working of common
network devices - Computers, Access points, Hub, Switch, network devices
Router, repeaters, NIC, Modem, LAN Cables ~ Co-axial, twisted | 2. Demonstrate different network cables
pair, and connectors,
optical fibre, LAN connectors- co-axial cable, and twisted pair | 3. Install and configure NIC.
cable, optical fibre, Connectors, Firewall, Firm wares, ISPs, 4, Crimping of R145: Straight and
Cross.
a) Punching Cat 6 cable to YO Box. Use
punching tool.
b) Check connectivity using LAN tester
6 Overview of network topologies - Basic topologies- bus, ring, | 1. Install Network simulator like Cisco
star, mesh and hybrid, packet tracer.
Network Simulator: Network simulator like Packet Tracer, 2. Create simple network in simulator.
Installation, User Interface. Deploy devices and cables GUI and _ | 3. Create and Demonstrate all possible
CLI Configuration, Configure end Devices network topologies using simulator
7 ‘An Overview of LANs - Typical SOHO LANs, Typical, 1. Build a physical Ethernet LAN
Enterprise LANs, The Variety of Ethernet Physical Layer Network and demonstrate file sharing,
Standards, Consistent Behaviour over All Links Using the printer sharing.
Ethernet Data Link Layer. Building Physical Ethernet Networks | 2. Install and configure wireless access
with UTP - Transmitting Data Using Twisted Pairs, Breaking _| point over the LAN.
Down a UTP Ethemet Link, UTP Cabling Pinouts for 1OBASE-T | 3. Use pathping commandto find actual
and 100BASE-T, StraightThrough Cable Pinout, Crossover Cable | path between source to destination with
Pinout, Choosing the Right Cable Pinouts, UTP Cabling Pinouts _ | information about network latency/delay
for 1000BASE-T, Sending Data in Ethernet Networks. & network loss.
8 Ethernet Data Link Protocols — The Rise of Ethernet, The 1. Determine the MAC Address of a
Ethernet MAC address and Ethemet Addressing, Host(PC and Phone).
Identifying Network Layer Protocols with the Ethernet Type 2. View Wireless and Wired NIC
Field, Error Detection with FCS. Encapsulation, Ethemet Frame. | Information and make a table explaining
Hierarchical Network Design — Physical and logical addresses, | each.
Benefits of a Hierarchical Design, Access, Distribution, and Core | 3. Configure and install a ethemet
layers Sending Ethemet Frames with Switches and Hubs, Sending | switch/Hub (Use simulator if hardware
in Modem Ethernet LANs Using Full-Duplex, Using Half-Duplex | devices are not available)
with LAN Hubs. 4, Create/model a simple Ethernet
Ethernet access layer devices — Hub, Switch, The MAC address. | network using 3 hosts and a switch,
table, Ethemet Broadcast and Broadcast Observe traffic behavior on the network
domain, ARP. and Observerdata flow of ARP
broadcasts and pings
9 ‘Routing: The Need for Routing - Criteria for Dividing the Local | 1. Build a simple peer-topeer network
‘Network - Now We Need Routing
Overview of Network Layer Functions - Network Layer
Routing
(Forwarding) Logic, Host Forwarding Logic: Send the Packet to
and verify physical connectivity and
Assign various IPv4 addresses to hosts
and observe the effects on network
communication
Ns
12the Default Router, Routing Data Across the Network, Delivering
Data to the End Destination, How Network Layer Routing Uses
LANs and WANs, IP Addressing and How Addressing Helps
IP Routing, Routing Protocols.
IPv4 Addressing - Rules for IP Addresses, Rules for Grouping IP
Addresses, Class A, B, and C IP Networks, The Actual Class A,
B, and C IP Networks, IP Subnetting, How to er
Subnet mask, CIDR, variable length subnet mask
je subnets,
2. Configure IP addresses of a network
(eal or simulated) and ping across
to test and troubleshoot.
3. Subnetting of a network (either using
real network or in Simulator).
4, Connect to web server using
simulator, Observe how packets are sent
across the Internet using IP addresses.
10 | IPv4 Routing - IPv4 Host Routing, Router, Forwarding 1. Implement simple static routing.
Decisions and the IP Routing Table, The default gateway, A 2. Troubleshooting of IP Addressing
Summary of Router Forwarding Logic, A Detailed Routing a) Change a routing table entry
Example. 'b) Wrong address
Routing Protocols - IPv4 Routing Protocols — static and ©) incorrect subnet mask
dynamic. 3. Configure and test DHCP on a
Other Network Layer Features - Using Names and the Domain. | wireless router (real or simulated)
Name System, The Address Resolution Protocol, ICMP Echo and
the ping Command.
DHCP ~ Static address assignment, Dynamic address assignment,
DHCP servers
11 | Pv4 and IPv6 Address Management - Network Boundaries 1 Packet Tracer - Examine NAT on a
Gateways to Other Networks, Routers as Gateways. Wireless Router
Network Address Translation - Introduction, NAT operation. | 2. Identify IPv6 Addresses
IPv4 Issues - Need of IPV6, Ipv4 vs IPv6, IPv4 and IPV6 a) Identify the different types of IPV6
Coexistence. addresses.
IPV6 features - IPv6 Address Representation. b) Examine a host [Pv6 network
Concept of Virtual LAN’s(VLAN’s) interface and address,
©) Practice IPV6 address abbreviation.
3. Setup, configure and test VPN in your
smartphone
12 | The Client Server relationship — Client Server interaction, URI, | 1. Create a client — server model in
URN, URL simulator and observe the client
TCP/IP Layer 4 Protocols: TCP and UDP - Transmission interaction between the server and PC
Control Protocol, Multiplexing Using TCP Port Numbers, using packet tracer.
Popular TCP/IP Applications, Connection Establishment and 2. Observe DNS Name Resolution
Termination, User Datagram Protocol. a) Observe the conversion of a URL to
Port Numbers - TCP and UDP. Socket pairs, the netstat an IP addres
command. b) Observe DNS lookup using the
Application Layer Services - Common Network Application | nslookup command,
Services, Domain Name System, Domain Name Translation, 3. Use simulator to demonstrate Telnet
DNS and SSH
Servers, HTTP, Web Clients and Servers, FTP, Virtual Terminals,
Remote Access with Telnet or SSH, Telnet, Security Issues with
Telnet, SSH, Email- Email protocols, Simple Mail Transfer
Protocol (SMTP), Post Office Protocol (POP3), Intemet
Message Access Protocol (IMAP4)
13 _ | Troubleshoot Common Network Problems - The 1. Demonstrate troubleshooting
Troubleshooting Process, Network Troubleshooting,
Commands with a scenario- ipconfig,
Ns
18Overview, Gather Information
‘Nature of problem, Equipment,
Configuration and Topology, Previous Troubleshooting.
Structured Troubleshoo
Divide-and-Conquer, Follow-the-Path, Substitution, Comparison,
ing Methods - Bottom-Up, Top-Down,
Educated Guess. Guidelines for Selecting a Troubleshooting
Method
Troubleshoot Wireless Issues - Causes of Wireless Issues,
Authentication and Association Errors
ping., netstat, tracert, nslookup.
2. Interpret the output of commonly
used network command line utilities and
Determine which network utility an
provide the ne
ssary information to
perform troubleshooting activities in a
bottom-up troubleshooting strategy
3. Physical Layer Problems - Common
Layer 1 Problems, how to use the
five senses to troubleshoot, Wireless
Router LEDs, Cabling Problems
4, Common Internet Connectivity Issues
- DHCP Server Configuration Errors,
Check Intemet Configuration, Check
Firewall Settings.
SLNO | ACTICITY
1 Prepare a report on advanced communication systems and suggest best way to connect remote
villages of India,
2 Prepare a report on Communication satellites of Indian Space Research Organization,
3 Prepare a presentation on 5 networking protocols being used in your smart phone
4 My Protocol Rules Objectives
a) Relate computer network protocols to the rules that you use every day for various forms ofeommunication,
b) Define the rules that govern how you send and interpret text messages,
©) Explain what would happen if the sender and receiver did not agree on the details of the protocol
5 My Local Network
a) Record all the different network-attached devices in your home or classroom.
») Investigate how each device connects to the network to send and receive information,
©) Create a diagram showing the topology of your network,
4) Label each device with its function within the network
6 Detailed study of Packet tracer and present the same
7 Trace a Route
a) Determine network connectivity to a destination host
b) Trace a route to a remote server using tracert
8 Presentation on wireless Ethernet protocols
9 1. Calculate whether destination address is local or remote using IP address
2. Calculate whether destination address is local or remote using mask
3. Use logical AND to determine network address
10 _| Identify 1Pvé Addresses
a) Identify the different types of IPv6 addresses.
b) Examine a host IPv6 network interface and address.
©) Practice IPv6 address abbreviation.
11__| Prepare a report on ICANN. List the popular port numbers with their use
12 __ | Prepare ¢ report on popular application layer protocols and present the same
13 | Identify and correct any misconfiguration of a wireless device ( Scenario : A small business
owner learns that a wireless user is unable to access the network. All the PCs are configured with
static IP addressing. Identify and resolve the issue)
Ns
14Database System Concepts and PL/SQL
20CS34P
SUN [CHATPERS LARS,
1 Introduction Overview of DB: why a database? Purpose of 1. Install and setup DBMS software
database; Classification; Application; DBMS: features, providers;
Functional components of DBMS; Types of DBMS architecture;
‘View of data in DBMS; Database users; Role and responsibilities
‘of DBA; Case study: Example of any database application,
recruitment database
such as MySQL, PostgreSQL
2. Leam the interface and explore the
features of installed DBMS
2 | Database design Data model; types, importance of data
modeling; Overview of database design; phasesof database
design; database development life cycle; Conceptual design’
ER-Model: entity: types; attribute: types; relationships: types,
constraints, Symbols and Notations; Case study: conceptual
design for a set of specifications
i, Restaurant
ii, Retail shop
iii, Recruitment
iv. College
vy. Library
1. Identify and ERmodel elements
and draw
diagram for the given
specifications using tools.
Relational model: Overv
nw, characteristics; Constraints: types;
Operations; Advantages and Disadvantages; applications;
Design anomalies; Features of good DB design;
1, Map ER Model to relational model
2. Identify various constraints
4 | Functional dependenes
overview, rules, types; Normalization:
normalization process; importance of normalization;
INF,2NF,3NF Sufficient examples to understand the concept
1, Normalize the above design
database languages: types, commands/tasks in each type;
Integrity constraints; MySQL/PostgreSQL: overview; features;
datatypes; Standardization guidelines;
1. Validate the above design against
integrity constraints
6 | Defining Data: DDL CREATE, ALTER, DROP different DB
objects; Temporary tables: types, create and use; external tables;
Managing constraints
1. Use MySQLPostgreSQL DDL.
statements to create database and other
DB objects for above design
7 | Insert, delete and update data Modifying data: UPDATE and
DELETE Update anomalies; impact of constraints Querying of
available data: SELECT; Aliases; sorting data: ORDER BY
1. Perform single table and multi
table insertion
2. Perform delete and update operations
3. Querying single table
4, Sort the result set of a query
‘| filtering data: WHERE, AND, OR, row limiting clause, IN,
“TWEEN, LIKE; Joining table: INNER JOIN, LEFT JOIN,
1. Querying single table
2. Filtering data
3. query multiple tables with joins
9 | Grouping data: Aggregate functions, GROUP BY, HAVING;
Set operators: UNION, INTERSECT, MINUS;
1. Queries that use set operators
2. Report aggregated data using group
Functions
10 | Subqueries: Comparator operators; subqueries: Single Row
Subqueries; Multiple Row Subqueries; correlated subqueries;
EXISTS, NOT EXISTS, ANY, ALL, SOME;
1. Write sub queries to retrieve
information from the created database
Ns
1811 | Views: create, drop and update; realization of views based on | 1. Create view and query
single and multiple tables; DCL: Controlling user access: 2. Create users and assign privileges for
Differentiating system privileges from object privileges; DB operations
Granting privileges on tables
12 | statements (decision making); Stored procedures and Functions | 1, Create and execute store procedures
Concept; syntax and structure of store procedure; 2. Create and execute functions
syntax and structure of functions; calling a funetion; Examples;
13 | Managing and controlling transactions: Introduction of 1. Create and execute transactions
transaction, ACID properties; states of transaction; Transaction | 2. Call previously created store procedure
control; Overview of transaction management, using or function in transaction
transaction control commands: COMMIT, ROLLBACK, SAVE
POINT, SET TRANSACTION; sufficient examples;
SLNO_ | ACTIVITY
1 1. Identify the drawbacks of file system and how DB enables us to overcome them,
Identify distinguishable features of each of DBMS available in the market
2 1 Transform given n-ary relationship to binary relationship
2, Document the steps to create ER diagram.
3. Identify the components of ER model in the given requirements
1. Document the steps to create logical design
2, Discuss and document Codd's 12 rules
4 1, Explore and document other normal forms
5 1. study and present the working of SQL optimizer
2. Leam and report optimization techniques
6 1. Lear and demonstrate use of DISTINCT, ALL, IS NULL;
2. Learn and present RIGHT JOIN;
7 1. Identify the advantages of Cascading Referential Integrity Constraints
8 1. Identify need of subqueries
9 1. identify the advantages and disadvantages of store procedure and functions,
10 1. presentation on the latest developments in research and industry related to this course
11 1. Leam and present need of scalar subqueries
12 1. Lear iterative statements in PL/SQL
B 1. Does Relational model support storage of unstructured data, if no, what are the alternatives to
store unstructured data,
Ns 16