Syllabus for Forth Sem Lab
Syllabus for aktu btech forth semester Lab.
Quick Links
- Operating System Lab (BCS 451)
- Object Oriented Programming with Java Lab (BCS 452)
- Cyber Security Workshop (BCS 453)
Operating System Lab(BCS 451)
List of Experiments (Indicative & not limited to)
- Study of hardware and software requirements of different operating systems (UNIX,LINUX,WINDOWS XP, WINDOWS7/8
- Execute various UNIX system calls for
- Process management
- File management
- Input/output Systems calls
- Implement CPU Scheduling Policies:
- SJF
- Priority
- FCFS
- Multi-level Queue
- Implement file storage allocation technique:
- Contiguous(using array)
- Linked -list(using linked-list)
- Indirect allocation (indexing)
- Implementation of contiguous allocation techniques:
- Worst-Fit
- Best- Fit
- First- Fit
- Calculation of external and internal fragmentation
- Free space list of blocks from system
- List process file from the system
- Implementation of compaction for the continually changing memory layout and calculate total movement of data
- Implementation of resource allocation graph RAG)
- Implementation of Banker‟s algorithm
- Conversion of resource allocation graph (RAG) to wait for graph (WFG) for each type of method used for storing graph.
- Implement the solution for Bounded Buffer (producer-consumer)problem using inter process communication techniques-Semaphores
- Implement the solutions for Readers-Writers problem using inter process communication technique - Semaphore
Object Oriented Programming with Java Lab (BCS 452)
List of Experiments (Indicative & not limited to)
- Use Java compiler and eclipse platform to write and execute java program.
- Creating simple java programs using command line arguments
- Understand OOP concepts and basics of Java programming.
- Create Java programs using inheritance and polymorphism.
- Implement error-handling techniques using exception handling and multithreading.
- Create java program with the use of java packages.
- Construct java program using Java I/O package.
- Create industry oriented application using Spring Framework.
- Test RESTful web services using Spring Boot.
- Test Frontend web application with Spring Boot.
Cyber Security Workshop (BCS 453)
List of Experiments (Indicative & not limited to)
Module 1: Packet Analysis using Wire shark
- Basic Packet Inspection: Capture network traffic using Wire shark and analyze basic protocols like HTTP, DNS, and SMTP to understand how data is transmitted and received.
- Detecting Suspicious Activity: Analyze network traffic to identify suspicious patterns, such as repeated connection attempts or unusual communication between hosts.
- Malware Traffic Analysis: Analyze captured traffic to identify signs of malware communication, such as command-and-control traffic or data infiltration.
- Password Sniffing: Simulate a scenario where a password is transmitted in plaintext. Use Wireshark to capture and analyze the packets to demonstrate the vulnerability and the importance of encryption.
- ARP Poisoning Attack: Set up an ARP poisoning attack using tools like Ettercap. Analyze the captured packets to understand how the attack can lead to a Man-in-the-Middle scenario.
Module 2: Web Application Security using DVWA
- SQL Injection: Use DVWA to practice SQL injection attacks. Demonstrate how an attacker can manipulate input fields to extract, modify, or delete database information.
- Cross-Site Scripting (XSS): Exploit XSS vulnerabilities in DVWA to inject malicious scripts into web pages. Show the potential impact of XSS attacks, such as stealing cookies or defacing websites.
- Cross-Site Request Forgery (CSRF): Set up a CSRF attack in DVWA to demonstrate how attackers can manipulate authenticated users into performing unintended actions.
- File Inclusion Vulnerabilities: Explore remote and local file inclusion vulnerabilities in DVWA. Show how attackers can include malicious files on a server and execute arbitrary code.
- Brute-Force and Dictionary Attacks: Use DVWA to simulate login pages and demonstrate brute-force and dictionary attacks against weak passwords. Emphasize the importance of strong password policies.
You can visit for learn more subjects.