matrix & syllabus m.tech it ims 2013 - vels institute of...

44
Page 1 M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus) VELS UNIVERSITY MATRIX & CURRICULUM 2013 M. TECH. IT-IMS 2 Years (4 Semesters) The Course Objectives This course is aimed at students who have completed Graduation and are keen on making a career in the fast growing field of IT Infrastructure management. Students who graduate from this program would be capable of implementing IT infrastructure solutions and handling the Industry challenges. The course provides the student comprehensive knowledge, technical expertise and hands-on experience in Infrastructure Management. The course provides opportunity for the students to learn all aspects of IMS such as Networking, Operating Systems, Virtualisations and Data Center technologies. The early part of the course engages in Basics, and as the student progresses, the amount of LAB exercises increases, thereby giving the student a “real world” experience. In the last semester, the student can opt for an industry based internship, which helps the student to familiarise with the needs of the industry. Short Term and Long Term Benefits of the Course: Infrastructure Management Services Industry is a very fast growing industry, and it provides great job opportunities for the students to start a career. At iNurture, our courses are designed using Industry experts, and we give a large amount of LAB facility and exercises to the students, so that they can handle practical problems. We have also ensured that the course covers some of the major Vendor Certification in the areas of Networking, Operating Systems etc., Also, in the final semester, the student spends some time with a company as an intern, or he/ she works on a project which will simulate industry conditions. As part of the program, we also teach the student communication skills and interviewing skills. Because of this, we are confident that the student will not only get placements, but will also be able to shine in their career. Career Opportunities after the Course: Remote Infrastructure Management Services (RIMS) is an industry which started in 2005, and has been one of the fastest growing in the past 5 years As per NASSCOM, approx. 1,00,000 jobs are being created every year ( including the domestic market ) 6 BN USD (INR 35000 cr) industry in 2011, growing to 12 BN USD ( INR 70,000 cr) in 2015

Upload: vuminh

Post on 22-Jun-2018

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

VELS UNIVERSITY

MATRIX & CURRICULUM 2013

M. TECH. IT-IMS 2 Years (4 Semesters)

The Course Objectives

This course is aimed at students who have completed Graduation and are keen on making a career in

the fast growing field of IT Infrastructure management. Students who graduate from this program would

be capable of implementing IT infrastructure solutions and handling the Industry challenges. The course

provides the student comprehensive knowledge, technical expertise and hands-on experience in

Infrastructure Management.

The course provides opportunity for the students to learn all aspects of IMS such as Networking,

Operating Systems, Virtualisations and Data Center technologies. The early part of the course engages

in Basics, and as the student progresses, the amount of LAB exercises increases, thereby giving the

student a “real world” experience. In the last semester, the student can opt for an industry based

internship, which helps the student to familiarise with the needs of the industry.

Short Term and Long Term Benefits of the Course:

Infrastructure Management Services Industry is a very fast growing industry, and it provides great job

opportunities for the students to start a career. At iNurture, our courses are designed using Industry

experts, and we give a large amount of LAB facility and exercises to the students, so that they can

handle practical problems.

We have also ensured that the course covers some of the major Vendor Certification in the areas of

Networking, Operating Systems etc., Also, in the final semester, the student spends some time with a

company as an intern, or he/ she works on a project which will simulate industry conditions. As part of

the program, we also teach the student communication skills and interviewing skills. Because of this, we

are confident that the student will not only get placements, but will also be able to shine in their career.

Career Opportunities after the Course:

• Remote Infrastructure Management Services (RIMS) is an industry which started in 2005,

and has been one of the fastest growing in the past 5 years

• As per NASSCOM, approx. 1,00,000 jobs are being created every year ( including the

domestic market )

• 6 BN USD (INR 35000 cr) industry in 2011, growing to 12 BN USD ( INR 70,000 cr) in 2015

Page 2

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

• Over the last five years, the RIM segment has been on an accelerated growth path in India

growing at a CAGR over 25 % per cent. It is estimated that by 2020 RIM can contribute more

than a third of total IT services revenues for India.

• Cloud Computing, virtualization, unified communication, green data centers are fast

reshaping the technology infrastructure landscape and provide a unique opportunity for

RIM providers in India to build unique offerings and new business models

Major Companies who hire the students of this Course:

• Service Berry

• Dev IT Solutions

• Mind Inventory

• Q Page

• I-Link

• Infosoft

• Acute Informatics

• Tact Pro

• Mark TeQ

• Ashtech Infotech

• Sprics technologies

• Elemany IT Services

• VB Soft,

• Elite Core

• I – Infotechsys

Page 3

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

SEMESTER – I

SEMESTER – II

Sub. Code Course Title L T P C CIA ESE TOTAL

Theory

13MTIM201 Server Operating System 1

3 3 40 60 100

13MTIM202 Linux RHCE 1

3 3 40 60 100

13MTIM203 Principles of Virtualization 1

3 3 40 60 100

13MTIM204 Programming with C 1

3 3 40 60 100

13MTIM205 Designing Enterprise Networks II 1

3 3 40 60 100

13MTIM206E Elective 1 3

0 3 40 60 100

Total 8

15 18 240 360 600

Sub. Code Course Title L T P C CIA ESE TOTAL

Theory

13MTIM101 Computer System Organization 1

3 3 40 60 100

13MTIM102 Designing Enterprise Networks I 2

3 4 40 60 100

13MTIM103 Fundamentals of Operating System 2

3 4 40 60 100

13MTIM104 Office Automation Tools 2

3 4 40 60 100

13MTIM105 Datacenter Architecture and Storage

Management 3

0 3 40 60 100

13MTIM106 Introduction to Information Security 3

0 3 40 60 100

Total 13

12 21 240 360 600

Page 4

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

SEMESTER – III

SEMESTER – IV

Sub. Code Course Title L T P C CIA ESE TOTAL

Theory

13MTIM301 Linux Administration 2

3 4 40 60 100

13MTIM302 Object Oriented Programming with

C++ 1

3 3 40 60 100

13MTIM303 ITIL & HPSM/Microsoft SM 3

0 3 40 60 100

13MTIM304 Introduction to Cloud Computing 4

0 4 40 60 100

13MTIM305E Elective 2 3

0 3 40 60 100

Practical

13MTIM306 Project Phase 1

9 6 100 0 100

Total 13

15 23 300 300 600

Sub. Code Course Title L T P C CIA ESE TOTAL

Theory

13MTIM401 Evaluation of Project Phase 2

18 12 60 240 300

Total

18 12 60 240 300

Page 5

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

List of Electives

M. TECH. IT-IMS

Elective List

Sub. Code Course Title L T P C CIA ESE TOTAL

Semester II

13MTIM206E1 Concepts of Open Source Scripting Languages 3 0 3 40 60 100

13MTIM206E2 Introduction to DBMS 3 0 3 40 60 100

Semester III

13MTIM305E1 Advanced Information Security 3 0 3 40 60 100

13MTIM305E2 VOIP and Wireless Technologies 3 0 3 40 60 100

Page 6

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

SYLLABUS

SEMESTER I

Computer System Organization

Course Code: 13MTIM101 Total Lecture Hours: 15

Module - I: Computer Organization: 3 Hrs

Basic Logic Design: Boolean Algebra, Gate – 6, Integrated Circuits, Sequential Logic. Number Systems:

Representation of Number Bases, Converting Between bases, Common Data Representation Formats

Overview of Computer Systems: Overview of a Computer System, Units of Measurement in Computing,

Computer Applications, Classification of Computers, History of Computers, Basic Microcomputer Design.

ALU and Instruction Sets: Arithmetic – Logic Unit, Instruction set Architecture Central Processing Unit:

Internal Organization of the CPU, The Instruction Execution Cycle, Advanced Technologies used in

modern CPUs, Organization of the Pentium Processor. System Memory: The Memory Hierarchy,

Memory Characteristics, Basic Memory Operation, Cache Memory, Main Memory, Memory Error

Detection and Correction, Disk Storage, RAID (Redundant Array of Inexpensive Disks), Optical Storage,

Magnetic Tape I/O Subsystem: Structure of the I/O Subsystem, I/O control strategies, Memory Mapped

I/O and Isolated I/O, External Devices used in Computers. Control Unit: Micro-operations, Operation of

the Control Unit, and Techniques for implementation of the control Unit

Module - II: Introduction to PC Hardware: 3Hrs

PC Hardware, System Case, Motherboard, Processor Memory and I/O ports: Memory, Modems, Types of

ports, Universal Serial Bus, Storage Devices: Hard disk drive, Input devices, Display adapters, Monitors

and Printers, Assembling and Disassembling a PC: Materials Required for Assembling, Precautions for

Assembling and Disassembling the PC, Assembling Procedure, Disassembling a PC.

Module - III: Introduction to Operating System: Windows 7 3 Hrs

Functions of an Operating System, Classification of Operating System, Windows Operating System,

Diagnosing and Troubleshooting OS, Perform a clean installation of Windows 7, upgrade to Windows 7,

and migrate user-related data and settings from an earlier version of Windows

Module - IV: Configuring Operating Systems 3 Hrs

Configure disks, partitions, volumes, and device drivers to enable a Windows 7 client computer,

Configure file access and printers on a Windows 7 client computer, Configure network connectivity on a

Windows 7 client computer, Configure wireless network connectivity on a Windows 7 client computer,

Secure Windows 7 client desktop computers, Optimize and maintain the performance and reliability of a

Windows 7 client computer, Configure mobile computing and remote access settings for a Windows 7

client computer.

Page 7

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Module -V: Introduction to Operating System: Windows server 2003 3Hrs

Managing and Maintaining Physical and Logical Devices, Managing Users, Computers, and Groups,

Managing and Maintaining Access to Resources, Managing and Maintaining a Server Environment,

Managing and Implementing Disaster Recovery

Text Book:

1. CompTIA A+ Certification All-In-One Desk Reference For Dummies Glen E. Clarke, Ed Tetz John

Wiley and Sons, 2010

Reference Books:

1. A+ Certification Bible, Ed Tetz, Glen E. Clarke, Angshuman Chakraborti, Meeta Gupta, Mridula

Parihar, Rashim Mogha, Wiley, 2011

2. Computer organization and architecture: An Introduction, B. S. Chalk, Robert Hind, A. T. (Antony T.)

Carter, 2010

3. Windows Server 2003: the complete reference by Kathy Ivens, 2003

4. CompTIA A+ Complete Study Guide Quentin Docter, Emmett Dulaney, Toby Skandier Wiley, 2004

Page 8

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Designing Enterprise Networks I

Course Code: 13MTIM102 Total Lecture Hours: 30

Module - I: Networking fundamentals 5Hrs

Network Models, Internet Connectivity Technologies, Network Protocols, TCP/IP Applications and

Technologies, Network Topologies, Network Types, Cable and Connector Types, Installing Network

Interface Cards, Configuring Network Interface Cards, Switches and Hubs, Beyond LANs—Repeaters,

Bridges, and Routers, Networking fundamentals Setting Up the Network Client, Using Shared Resource,

Browser Installation and Configuration, Using Network Command-Line Tools, Network and Internet

Troubleshooting. Network security: Authentication, Firewalls, Virtual Private Networks.

Module - II: Layered Models 10Hrs

OSI Reference Mode, Application Layer, Presentation Layer, Session Layer, Transport Layer, Network

Layer, Data link Layer, Physical Layer ,Cisco Three-Layer Model, TCP/IP :Introduction to TCP/IP, Transport

Layer Protocols (TCP, UDP),Internet Layer Protocols (IP, ICMP, ARP) IP Addressing: IP Addressing Classes,

Subnet Masks and Subnetting, Complex Subnet &Supernetting , Determining Broadcast & Network

Address. Configuring a Router: Starting up with a Router and Switch, Booting a Router and setup mode,

The Command-line Interface, Passwords and Line Console Commands, Interface Configuration setting,

Verifying & Debugging the Configuration.

Module - III: Building a Network 5 Hrs

Configuring a Router and Switch, Verifying Configuration and Duplex Settings, Continued Router

Configuration, Continued Switch Configuration. Managing CISCO in an Internetwork:

Backing up and restoring startup configuration and IOS, Booting IOS from TFTP Server, Cisco Discovery

Protocol, Ping and Trace, Understanding configuration register, Recovering the password.

Module - IV: IP Routing 5 Hrs

Routing Basics, Managing static and Dynamic Routes, Configuring static IP Routing, Configuring Dynamic

IP routing using RIP, IGRP, Managing and configuring OSPF & EIGRP, Avoiding Routing loops using split

horizon, route poisoning.

Module - V: Switching 5 Hrs

Bridging versus switching, working concept of Switch, Spanning Tree Protocol (STP), LAN Switch Types,

Virtual LANs, VLAN membership, VLAN Configuration and VTP, Assigning Ports, ISL Routing and Frame

tagging, Perform LAN and VLAN troubleshooting. Access Lists, Access Lists Commands, Standard IP

Access List, Wildcard Cards Implementing an Access List, Extended Access Lists, IPX access Lists, Securing

a Network Site with Access list. WAN: WAN Connection Types ISDN, X.25, Leased line and Frame-Relay,

Connection protocols, HDLC, PPP AND PPMP, Dial-on-Demand Routing, Frame Relay configuration, Sub

interfaces in Frame-Relay, Troubleshooting and Debugging Tools

Page 9

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Text Book:

1. CCNA Cisco Certified Network Associate: Study Guide (With CD) 7th Edition (Paperback), Wiley India,

2011

Reference Books:

1. CCENT/CCNA ICND1 640-822 Official Cert Guide 3 Edition (Paperback), Pearson, 2013

2. Routing Protocols and Concepts CCNA Exploration Companion Guide (With CD) (Paperback),

Pearson, 2008

3. CCNA Exploration Course Booklet : Routing Protocols and Concepts, Version 4.0 (Paperback),

Pearson, 2010

Lab Experiments for Designing Enterprise Networks

The Experiments include:

1. Implementation of TCP/IP protocol.

2. Troubleshooting Scenarios Network

3. Router - Configuration

4. Configuration of IP Address for a Router

5. Setting up of Passwords

6. Recovering of Passwords

Recap of all Previous Labs 1 -6

7. Configuration of Static and Dynamic Routing.

8. Configuration of Default Route.

Recap of Practical 8 & 9

9. Implementation of RIP V1 & V2

10. Implementation of EIGRP

11. Implementation of OSPF

12. Switch Configuration - Basic Commands

13. Switch Configuration - Switch Port Security

14. VLAN Configuration

15. Switch Troubleshooting

16. Recap of all Switching labs

17. Recap of all Switching and Routing labs

18. Configuration of Access-lists - Standard & Extended ACLs

Page 10

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Fundamentals of Operating System

Course Code: 13MTIM103 Total Lecture Hours: 30

Module - I: Introduction to Operating System 5 Hrs

Introduction to Operating System, Evolution of operating system, Structure of Operating, OS

Operations OS Organizations, Distributed Systems, Open source Operating systems, Process

Management, Memory Management, Storage Management, Computing Environment

Module - II: Installing, upgrading and managing Windows – 7 10 Hrs

Gathering hardware devices, Preparing to install windows 7, upgrading and migrating to

windows 7, Clean and Image based installation, Configuring Application Compatibility,

administrating windows features, Disk management, installing and configuring device drivers

Module - III: File Access, Printers and Network connectivity with Windows – 7 5 Hrs

Introduction to Authentication and Authorization , Managing file access , Shared Folders , File

compression , file archiving , managing printers , connecting windows 7 client with server ,

configuring ipv4 & ipv6 connectivity , Implementing APIPA , Introduction to Name resolution ,

troubleshooting network issues , Overview of wireless network , configuring wireless network

Module - IV: Securing, Optimizing and maintaining windows 7 Client 5 Hrs

Overview of local security management, local security policy settings, EFS and Bitlocker,

Application restrictions, UAC, Windows Firewall, Administrating IE8, Windows Defender

Module - V: Configuring Mobile Computing and Remote Access in windows 7 5 Hrs

Configure Mobile computer and device settings, Remote desktop, remote assistance, direct

access, branch cache

Text Book:

1. Milan Milenkovic - Operating Systems – TATA McGRAW HILL, 2009

Reference Books:

1. Operating Systems Fundamentals D. Irtegov, Laxmi Publications (December 30, 2005)

2. A Short Introduction to Operating Systems (M. Burgess), Wiley,2010

3. Operating Systems: Design and Implementation (Second Edition), Andrew S. Tanenbaum,

O’Reilly, 2010

Page 11

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Office Automation Tools

Course Code: 13MTIM104 Total Lecture Hours: 30

Module - I: Introduction to Office 2010 5 Hrs

Introduction to office: Introduction to office Versions of office, Benefits of using office, Help and

Security, Features and comparison of different versions of office

Module - II: Microsoft Office Word 2010 5 Hrs

Introduction to Word: Introduction to Word, Getting started with word 2010, Text Basics, Formatting

Text, Saving, Modifying Page Layout,

Formatting Word: Checking spelling and grammar, Printing, Using Indents and Tabs, Line and Paragraph

Spacing, Working with Lists, Adding breaks,

Working with Word: Working with columns, Working with hyperlinks, Working with shapes, Text Boxes

and WordArt, Inserting Clip Art and Pictures, Formatting Pictures, Styles and Themes,

Formatting Word: Working with Headers and Footers, Reviewing Documents, Working with Tables,

Smart Art Graphics, Using a Template,

Advanced Word features: Using Mail Merge, Working with Equation Editor, Bullets and Numbering,

Presenting Information with Word Table, Word Styles and Automation of Work

Module - III: Microsoft Office Excel 2010 5 Hrs

Introduction to excel 2010: Introduction, Getting to start Excel, Modifying Columns, Rows and Cells,

Formatting Cells, Saving,

Text and Math equations: Creating Simple Formulas, Worksheet Basics, Printing, Creating Complex

Formulas, Working with Basic Functions, Sorting Data, Outlining Data, Filtering Data,

Presenting data: Formatting Tables, Reviewing and Sharing Worksheet, Using Templates, Working with

Charts, Working with Spark line, Using Conditional Formatting, Using Pivot Table, Using What-If analysis,

Excel Workbook,

Module - IV: Microsoft Office PowerPoint 5 Hrs

Introduction to PowerPoint 2010 : Getting Started with PowerPoint, Slide Basics, Text Basics, Applying a

Theme, Inserting Images, Applying Transitions, Checking Spelling, Presenting Slide Show, Saving and

Printing,

Working with PowerPoint 2010: Modifying Lists, Indents and Line Spacing, Modifying Themes,

Formatting Pictures, WordArt and Shapes ,Arranging Objects, Animating Text and Objects,

Visual enhancement: Inserting Videos, Inserting Audio, SmartArt Illustrations, Hyperlinks and Action

Buttons, Working with Tables, Working with Charts, Reviewing Presentations, Advanced Presentation

Options, Working with Objects, Customizing Power Point, Online Presentation

Module - V: Microsoft Office Access , Outlook and Publisher 5 Hrs

Microsoft Access 2010: Introduction to Databases, Introduction to Objects, Getting Started in Access,

Managing Databases and Objects, Working with Tables, Working with Forms, Sorting and Filtering

Records,

Page 12

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Analyzing data: Designing a Query, More Query Design Options, Creating Reports, Advanced Report

Options, Modifying Tables, Creating Forms, Formatting Forms, Designing Your Own Database

Microsoft Outlook: Basics of Outlook 2007, Sending Electronic Mails, Organizing the Inbox, Managing

Outlook Calendar, Managing Events and Meetings,

Microsoft Office Publisher: Introduction to Publisher, Getting to know Publisher, Producing a Publisher,

Creating a new Publication, Working with Text, Working with Shapes and Objects, Working with

Pictures, Working with Tables

Module - VI: Microsoft Office One Note, Microsoft SharePoint and InfoPath 5 Hrs

Microsoft Office One Note: Introduction to One Note, Working with Multiple Notebooks, Collecting

your Notes and Information, Drawing Tools and Tables, Flagging notes for follow up, Finding Notes

Quickly with Quickly Search Capabilities

Microsoft SharePoint: Using the launch bar, Creating a workspace, Understanding Workspace window,

Powerful Collaborative tools

Microsoft InfoPath: Introduction to InfoPath, Quickly Design Forms with Easy-to-Use Tools, Make Forms

for SharePoint Lists, Create SharePoint Applications, Build Advanced Forms and Connect Forms to Line-

of-Business systems, Embed forms in Web Pages,

New Technologies: Introduction to MS Office 2013, Introduction to Office 365, Introduction to Office

Live, Alternate to MS Office (http://www.openoffice.org/)

Text Book:

1. MICROSOFT OFFICE HOME & STUDENT 2010 STEP BY STEP By Joyce Cox, Joan Lambert and Curtis

Frye –Microsoft Press Publisher.

Reference Book:

1. First Look 2010 Microsoft Office System By Katherine Murray–Microsoft Press Publisher.

Page 13

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Data Center Architecture and Storage Management

Course Code: 13MTIM105 Total Lecture Hours: 45

Module - I: Data Center Design Principles 8 Hrs

The Service Delivery Network, A Route to Standardized Operating Environments, Dynamic Infrastructure

,The Service Delivery Network: A Case Study, Data Center Virtualization, Energy Efficiency Strategies:

Server Virtualization Technology, Understanding and Deploying Logical Domains Operating System

Virtualization Product Architecture Server Platforms in Data Center: Servers used in Data Center, Server

Management Storage used in Data Center: Storage System, iScsi Multipathing, Network Management

and Fabric Management.

Module - II: Disaster Recovery fundamentals 7 Hrs

Disaster Architecting Availability and Disaster Recovery Solutions, Security: Managing Data Center

Security, Management of Data Center: Remote Monitoring, Applications: Web Proxy, LDAP

Module - III: Solution Overview 10 Hrs

Product Features and options, Key EVA values and Virtualization technology, drive enclosures,

Functional and physical layout of the EVA, solution Low/Middle/High End configurations, Capacity

matrix, interconnects and indicators, Controller software versions and upgrades, Command view EVA

installation and operation, Storage Management Server (SMS), Controllers: Controller features and

redundancy, Operator Control Panel (OCP) operations, Configuring the World Wide Name and checksum

on the arrays, Password installation for the OCP, Enclosure host and port identification. Disk Drive

Enclosures: Drive enclosure models and configurations, Customer self-repair operations for the drive

enclosure, Drive enclosure indicators and connections from front and rear views, EMU functions, LED

status displays and display and pushbutton operations, Enclosure Address Bus EAB and Environmental

Monitoring Unit EMU functions. Storage Works Command View EVA: Command View EVA overview, EVA

Management Server requirements, Browsing to the SMS (versions 3x and 5x), Installation and

configuration of Command, View EVA versions 6.x - 8.x, Licensing of the various versions of command

View, Firmware and management software for the EVA 4400

Module - IV: Basic Concepts and Terminology 10 Hrs

Virtual storage overview, Powering the Storage System off and on sequence, Storage system, Disk group

configurations, default disk group and metadata content, Distributed virtual RAID (VRAID) technology,

Hosts and Virtual disk overview.

Module - V: Storage System Configuration 10 Hrs

Configuration guidelines, controller code loads and upgrades, Gathering preliminary host information

and configuration of host connections, Perform an un-initialize of the storage system, Perform storage

discovery and initialization, Disk group creation and configuration guidelines. Host System Configuration:

Operating system support, Co-existence with other EVA models, Installing and configuring hosts, Host

Page 14

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

properties, Presenting Storage (LUN mask/map), Verifying LUN presentation. Storage Works Multi-Path

Solutions: Automatic Path Failover and Load Balancing, Supported multi-path solutions, Active-Active

Failover: Overview of active-passive and active-active failover modes, Virtual disk ownership and

transitions, Configuration Best Practices Summary.

Text Books:

1. Data center fundamentals by Mauricio Arregoces, Maurizio Portolani From Cisco Press, 2010

2. Storage Management: The Complete Cornerstone Guide to Storage Management Best Practices -

Gerard Blokdijk, Ivanka Menken, Emereo Pty Ltd (October 3, 2010), 2011

Reference Books:

1. The holy grail of network storage management By Jon William Toigo, Prentice Hall; 1 edition

(November 6, 2003)

2. NX-OS And Cisco Nexus Switching: Next-Generation Data Center Architectures Kevin Corbin, Ron

Fuller, David Jansen Cisco Press, 2009

3. The Green and Virtual Data Center Greg Schulz Auerbach Publications, 2008

4. Handbook of data center management Layne C. Bradley A1Books.co.in, 2008

5. Administering Data Centers: Servers, Storage, And Voice Over Ip By KailashJayaswal Wiley-India,

2010

Page 15

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Introduction to Information Security

Course Code: 13MTIM106 Total Lecture Hours: 45

Module - I: Introduction to Information Security 10 Hrs

Introduction: Security Definition, Why Security, Security and its need, Current Trends and Statistics,

Basic Terminology, The C I A of Security the Relation: Security functionality and Ease of Use Triangle.

Module - II: User Identity and Access Management 8 Hrs

User identity and Access Management: Authentication, Account Authorization, Validation, Access

Control and Privilege management. Hashing and Cryptography- Encryption and Decryption

Module - III: System and Server Security 7 Hrs

System Security, Desktop & Server Security, Firewalls, Password cracking Techniques, Key-logger, viruses

and worms, Malwares & Spy wares, Windows Registry

Module - IV: Internet Security 10 Hrs

Internet Security: LAN Security, Email Security, Hacking attacks, preventive measures.

Module - V: Risk Assessment and Cyber Laws 10 Hrs

Vulnerability Assessment, Penetration Testing, Cyber Laws

Text Book:

1. Information Systems Security: Security Management, Metrics, Frameworks And Best Practices - Nina

Godbole, ISC2 Press, 2010

Reference Book:

1. Information Security Management Handbook, Volume 4 - Micki Krause, ISC2 Press, 2007

Page 16

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Semester II

Server Operating System

Course Code: 13MTIM201 Total Lecture Hours: 15

Module - I: Server 2008 Active Directory Services 3 Hrs

Installing Active Directory Domain Services Active Directory, Identity and Access, Active Directory

Domain Services on Server Core, Working with Active Directory Snap-ins, Creating a Custom Console

with Active Directory Snap-ins, Delegation and Security of Active Directory Objects, Delegating

Administrative Tasks with the Delegation Of Control Wizard ,Creating Users with Windows Power Shell

and VBScript ,Automating the Creation and Management of Groups ,Administering Groups in an

Enterprise, Supporting Computer Objects and Accounts, Group Policy Infrastructure ,Group Policy

Settings, Managing Software with Group Policy Software Installation ,Authentication, Integrating

Domain Name System with AD DS, Sites and Replication, Domains and Forests, Directory Business

Continuity, Active Directory Lightweight Directory Services, Active Directory Certificate Services and

Public Key Infrastructures, Active Directory Rights Management Services, Active Directory Federation

Services.

Module - II: Server 2008 Network Infrastructure Configuration 3 Hrs

Configure IPv4 and IPv6 addressing, Configure Dynamic Host Configuration Protocol (DHCP),Configure

Windows Firewall with Advanced Security, Configuring Name Resolution ,Configure a Domain Name

System (DNS) server, Configure DNS zones, Records, Replication, Configure name resolution for client

computers, Configure Direct Access & remote access, Configure Network Access Protection

(NAP),Configure Network Policy Server (NPS),

Module - III: Configuring File System and Network Infrastructure 3 Hrs

Configure Distributed File System (DFS),Configure backup and restore, Manage file server resources,

Configure and monitor print services, Configure Windows Server Update Services (WSUS) server

settings, Configure performance monitoring, Configure event logs, Gather network data, Configuring

Network Access ,Configuring File and Print Services ,Monitoring and Managing a Network Infrastructure.

Module - IV: Server 2008 Applications Infrastructure 3 Hrs

Deploy images by using Windows Deployment Services, Configure Microsoft Windows activation,

Configure Windows Server Hyper-V and virtual machines, Configure high availability, Configure storage,

Configure Remote App and Remote Desktop Web Access, Configure Remote Desktop Gateway (RD

Gateway, Configure Remote Desktop Connection Broker, Configure and monitor Remote Desktop

resources, Configure Remote Desktop licensing, Configure Remote Desktop Session Host, Configure Web

applications, Manage Web sites, Configure a File Transfer Protocol (FTP) server, Configure Simple Mail

Transfer Protocol (SMTP), Manage the Web Server (IIS) role.

Page 17

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Module - V: Server Troubleshooting 3 Hrs

Server 2008 Active Directory troubleshooting, Server 2008 Network Infrastructure troubleshooting, and

Server 2008 Applications Infrastructure troubleshooting.

Text Books:

1. Microsoft Windows Server 2008: A Beginner's Guide, Marty Matthews, McGraw-Hill Osborne Media;

1 edition (February 14, 2008)

2. 70-642:Windows Server 2008 Network Infrastructure Configuration (MOC) from John Wiley & Sons,

2009

3. 70-643: Windows Server 2008 Applications Infrastructure Configuration Textbook (MOC) from John

Wiley & Sons, 2010

Reference Books:

1. Windows Server 2008: the definitive guide By Jonathan Hassell, O’Reilly, 2008

2. MCTS: Windows Server 2008 Network Infrastructure Configuration Study Guide By William Panek,

T lor Wentworth, James , O’Reilly, 2011

3. MCTS Windows Server 2008 Applications Infrastructure Configuration Study. By Joel Stidley, Sybex,

2010

Page 18

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Linux RHCE

Course Code: 13MTIM202 Total Lecture Hours: 15

Module - I: Introduction and installation of Linux 3Hrs

Linux Ideas and History , Open source information , Linux Origin , Linux Usage basics , Linux Principles ,

virtual console and graphical environment , X windows , Logging into Linux system , Redhat Distributions

, Linux installation

Module - II: Basic Management of Linux Operating System 3 Hrs

Getting help , cal , date , browsing file system , pwd , ls , cd, cp , md , absolute and relative path names ,

important directories of linux , creating users and groups , managing permission by numeric and

symbolic method , changing ownership , default permissions , umask , configuring bash shell ,history

tricks , gnome terminal , standard i/o pipes , error redirection , tee , tools for extracting-analyzing and

manipulating text data , vi & vim

Module - III: Network configuration, managing processes with Linux 3 Hrs

Network and printer settings , sending text to printers , device activation , DNS configuration , Default

Gateway , IP configuration ,web clients , mail clients , ftp clients , ssh , scp , rsync , network diagnosis

tools , introduction to process , ps , signals , fg&bg , nice , top , scheduling techniques , setting up ipv6

Module - IV: Advance configuration in users, groups and permissions, file system in depth with Linux.

3 Hrs

Special permissions ,uid&gid , suid , sgid , sticky bit , important files for users configurations ,

monitoring logins , Locate , find , gnome search tools , inode , hardlink & softlink , fundamental file types

, mounting devices , nfs , swap , fstab, /etc/export , direct map , auto mounting , archive-compress tools

with linux , lvm , quota , raid.

Module - V: System initialization, package management and system services with Linux 3 Hrs

Boot sequence , grub , init role , system v services controls , rpm , yum , ntp , system logging , remote

administration of system , anacron ,

Security, virtualization, remote installation and troubleshooting with Linux

Setfacl , getfacl , selinux , enabling and disabling firewall , xen introduction , configuring virtual machine

with linux , kick start , initrd , grub , password , /etc/shadow , runlevel , rescue

Page 19

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Text Books:

1. Red hat Linux Administration By Michael Turner and Steve Shah-McGraw-Hill Companies, Inc

Publisher, 2010

2. Redhat Fedora linux for Dummies By Naba Barkakati-Wiley Publishing, Inc, 2011

Reference Book:

1. RHCSA/RHCE Red Hat Linux Certification Study Guide (Exams EX200 & EX300), 6th Edition

(Certification Press) [Paperback], Michael Jang, McGraw-Hill Osborne Media; 6 edition (June 17,

2011)

Page 20

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Principles of Virtualization

Course Code: 13MTIM203 Total Lecture Hours: 15

Module - I: Introduction 3 Hrs

What is Virtualization?, Why You Need Virtualization ?,Understanding Virtualization Technologies

:Server Virtualization, Hardware emulation ,Storage Virtualization ,Network-attached storage ,Storage

area networks ,I/O Virtualization ,Network Virtualization, Client Virtualization ,Application virtualization

,Desktop virtualization Understanding Virtualization Use Cases: Studying Server Consolidation,

Development and Test Environments ,Quality of Service ,Simple failover High availability, Clustering

,Data mirroring ,Data replication, IT Operational Flexibility ,Load balancing ,Server pooling ,Helping with

Disaster Recovery ,Rethinking Virtualization in Business Terms :Rethinking Infrastructure Virtualization

,Rethinking Applications and IT Operations Management ,Rethinking Client Virtualization, Benefits of

Virtualization

Module - II: Introduction to VMware Virtualization 3 Hrs

Introduce virtualization, virtual machines, and vSphere components, Explain the concepts of server,

network, and storage virtualization, Describe where vSphere fits into the cloud architecture, Install and

use vSphere user interfaces, Create Virtual Machine VMware vCenter Server: Introduction to vCenter

Server architecture and appliance , Virtual Machine Management :Deploy virtual machines using

templates and cloning, Modify and manage virtual machines, Create and manage virtual machine

snapshots, Perform VMware vSphere® vMotion® and Storage vMotion migrations, Create a

vSpherevApp

Module - III: Access and Authentication Control 3 Hrs

Control user access through roles and permissions, Configure and manage the ESXi firewall, Configure

ESXi lockdown mode, Integrate ESXi with Active Directory, Introduce VMware vShield Zones.

Module - IV: Installing VMware Components 3 Hrs

Introduce ESXi installation, Describe boot from SAN requirements, Introduce vCenter Server deployment

options, Describe vCenter Server hardware, software, and database requirements, Install vCenter Server

(Windows based)

Module - V: Implement and configure Window server 2008 Hyper V 3 Hrs

Configure Hyper V Virtual Networking, Configure and use Hyper V remote administration, Create and

configure Virtual Hard Drives, Use Virtual Machine snapshots, Describe considerations for configuring

Hyper-V servers for high availability, Monitor the performance of a Hyper-V server, use existing virtual

machines with Hyper-V server, understand issues with migrating existing virtual machines to Hyper-V,

Understand system center Virtual Machine Manager (VMM) features and use VMM to manage virtual

machines, Manage a VMM Library, Manage VMM checkpoint.

Page 21

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Text Books:

1. Virtualization: a beginner's guide - Danielle Ruest, Nelson Ruest , McGraw-Hill Prof Med, 2010

2. Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor By John Kelbley, Mike

Sterling, Allen Stewart, Sybex; 1 edition (April 20, 2009)

Reference Books:

1. Virtualization for Dummies - Bernard Golden, For Dummies; 1 edition (December 5, 2007)

2. Mastering Microsoft Virtualization - Tim Cerling, Jeffrey Buller, Jeffrey L. Buller, Sybex; 1 edition

(December 21, 2009)

Page 22

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Programming with C

Course Code: 13MTIM204 Total Lecture Hours: 15

Module - I: Elements of C Language 3 Hrs

Origin of C, Features & Characteristic of C, C Compiler, Character Set, Keywords, Identifiers, Constants,

Variables, Input/ Output Statements, Basic Data Types, Operators and Expressions, Tools for Problem

Solving: Problem Analysis, Flowchart, Algorithm Development. Top-Down Program Design, Structured

Design Approach, Basic structure of C programs, A simple C Program.

Module - II: Control Flow Construction 3 Hrs

Decision making and branching: Simple if statement, if else statement, Nesting of it. Else statement,

else. If Ladder, switch statement, ?: operator, goto statement. Decision making and looping: while

statement, do. While statement, for statement, jumps in loops, break and continue statement.

Module - III: Defining and Manipulating Arrays 3 Hrs

One- Dimensional Arrays: Declaration of Arrays, Initialization of Arrays, Reading and Writing of integer,

real and character arrays, sorting and searching in Arrays, Multi-Dimensional Arrays, and Handling of

Character Strings.

Module - IV: User Defined Functions 3 Hrs

Syntax of Function, Calling functions, Actual & Formal Arguments, Categories of Functions, Function

prototype, Scope Rules: Local & Global variables, Recursion, Recursion vs. iteration, Passing Arguments:

call by values & call by reference, Passing array to function. Structures: Declaration and initialization of

structures, Array of structures, Array within structure, structure within structure, Structures and

functions, Introduction to unions.

Module - V: Pointer Data type and its Application 3 Hrs

Pointer Operator, Pointer Expression, Initialization pointers, Pointer Arithmetic, Pointer and Function

Arguments, Pointer to function, Pointer and Arrays, Pointers and String, Arrays of Pointers, Pointers to

Pointers. Files in C: Defining and opening a file, closing a file, input/ Output operations on files, error

handling during I/O operations, random access to files.

Text Books:

1. ANSI C programming By Balaguru swami, Tata Mc-Graw Hill, 2010

Reference Books:

1. C for Dummies by: DanGookin-Wiley Publishing, 2010

2. C++ for Dummies By Stephen Randy Davis-Wiley Publishing, Inc, 2009

Page 23

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Designing Enterprise Networks II

Course Code: 13MTIM205 Total Lecture Hours: 15

Module - I: Enterprise Network Fundamentals 3 Hrs

Describe the Methodology used to design a network, Describe developing business trends, Identify

Network Requirements to Support the Organization, Describe the tools/process to characterize an

existing network, Describe the top down approach to network design, Describe Network Management

Protocols and Features, Describe network structure and modularity: Describe the Network Hierarchy,

Describe the Modular Approach in Network Design, Describe network architecture for the enterprise.

Module - II: Designing Basic Enterprise Campus Networks 3 Hrs

Describe Campus Design considerations, Design the Enterprise Campus Network, Design the enterprise

data center, Describe enterprise network virtualization tools, Design Enterprise Edge and Remote

Network Units: Describe the Enterprise Edge, branch, and Teleworker design characteristics, Describe

physical and logical.

Module - III: WAN 3 Hrs

WAN connectivity, Design the branch office WAN solutions, Describe Access Network solutions for a

remote worker, Design the WAN to support selected redundancy methodologies, Identify Design

Considerations for a Remote Data Center.

Module - IV: Designing IP Addressing and Routing Protocols 3 Hrs

Describe IPv4 Addressing, Describe IPv6 Addressing, Identify Routing Protocol Considerations in an

Enterprise Network, Design a Routing Protocol Deployment

Module - V: Designing network services 3 Hrs

Describe the security lifecycle, Identify Cisco technologies to mitigate security vulnerabilities, Select

appropriate Cisco security solutions and deployment placement, Describe high level voice and video

architectures, Identify the design considerations for voice/video services, Describe Cisco Unified

Wireless Network Architectures and Features, Design wireless network using controllers

Text Book:

1. CCDA self-study: CCDA exam certification guide, By A. Anthony Bruno, Jacqueline Kim, Cisco Press,

2010

Reference Books:

1. CCDA self-study: designing For Cisco Internetwork Solutions (DESGN)Diane Teare, Cisco Press, 2010

2. CCDA: Cisco certified design associate study guide, By Todd Lammle, Andy Barkl, Sybex, 2010

3. CCDA Cisco Certified Design Associate By Todd Lammle, Donald Porter, Sybex, 2009

4. Enterprise Networks and Logistics for Agile Manufacturing By Lihui Wang, Springer Publication,

2010.

Page 24

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Elective I

Concepts of Open Source Scripting Languages

Course Code: 13MTIM206E1 Total Lecture Hours: 45

Module - I: Introduction to PHP 8 Hrs

PHP: Introduction to Web Technology, HTML, Basic Tags, CSS, Table and Forms , Introduction to

JavaScript, Variables, Operators, Data Type Conversions, functions, Control Structure, Date Time

functions and Form Manipulation. MYSQL – Introduction about Database, Data Types, DML, DDL,

Aggregate functions, Data Time functions, Stored Procedure, Sub query and join, PHP-Introduction to

PHP, History, Web Brower, Web Server, Xampp, Installation and Configuration files, Syntax, Operators,

Variables, Constants, Control, Structure, Language construct and functions

Module - II: Functions and Syntax 7 Hrs

Function – Syntax, Arguments, Variables, References, Returns and Variable Scope , Arrays-Enumerated

Arrays, Associative array, array, iteration, Multi-dimensional array, Array function and SPL, Date and

Time functions, OOP’s – Instantiation, Modifiers, Inheritance, Interfaces, Exceptions, Static Methods and

Properties, Auto load, Reflection, Type Hinting and Class Constance,

Module - III: String and Patterns 10 Hrs

Quoting, Matching, Extracting, Searching, Replacing and Formatting, Web Features- Sessions, Forms,

GET and POST data, Cookies, HTTP Headers. Database Programming, Streams and Network

Programming- Files, Reading, Writing, File System functions, Streams File Uploading and File

Downloading.

Module - IV: Unix & Linux Shell Scripting 10 Hrs

Introduction to Unix/Linux Login, Logging into the system, Editor , The File System , FS commands and

Permissions Useful Commands of Unix/Linux , Useful Commands of Unix/Linux, Utilities, Advance Shell

Scripting Using TheBash/Sh/ksh, Working with ksh / bash Korn Shell Scripts / Bash Shell Scripts , Korn

Shell Scripts , Bash Shell Scripts.

Module - V: Python 10 Hrs

Introduction and Installation Python , First Steps, The Basics, Operators and Expressions , The Control

Flow, Functions , Units, Data Structures, Problem Solving- Writing Python Script, Object Oriented

programming, Input / Output , The Python Standard Library.

Text Books:

1. PHP: a beginner's guide by Vikram Vaswani, Wiley, 2010

2. Linux Command Line and Shell Scripting Bible Richard Blum, Christine Bresnahan, O’Reilly, 2010

3. Learning Python by Mark Lutz,O’Reilly, 2009

Page 25

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Reference Books:

1. PHP: The Complete Reference Steven Holzner, Sybex, 2009

2. Pro Bash Programming: Scripting the GNU/Linux Shell By Chris F. A. Johnson, O’Reilly, 2010

3. Python: Programming Fundamentals by Kent D. Lee, O’Reilly, 2008

Page 26

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Elective I

Introduction to DBMS

Course Code: 13MTIM206E2 Total Lecture Hours: 45

Module - I: Introduction to data base 8 Hrs

Advantages of DBMS, Type of Data Models, Schema and instances, DBMS Architecture and Data

Independence, Entity- Relationship Model, Attributes and Keys, Relationship Types, Weak Entity set,

Strong Entity Set, Enhanced E–R Modeling, Specialization and Generalization, Record Storage and

Primary File Organizations: Introduction, Secondary Storage Devices, Buffering of Blocks, Structure of

Files: Types of Single –Level ordered indexes, Multilevel indexes, Dynamics Multilevel indexes using B-

trees and B+- Trees.

Module - II: the Relational data model 7 Hrs

Relational data model concepts, constraints, relational algebra, relational calculus, Tuple relational

calculus SQL: DDL, DML, DCL, Types of constraints, Defining different constraints on a table, Defining &

Dropping integrity constraints in the alter table command, View, Index.

Module - III: Database design 10 Hrs

Functional Dependencies and Normalization for Relational Databases: Informal design guidelines for

relation schemes, Functional dependencies, Normal forms based on primary keys, General definitions of

second and third normal forms, Boyce- Codd normal form, problem related with normal forms &

solutions. Multivalued & Join Dependencies, 4th & 5thNormalization.

Introduction to Database Management

Define Database and its fundamentals, Learn the oracle database 10g architecture, Learn the basic

oracle database 10g data types, Work with tables, Work with stored objects, Indexes, Roles, Table space

quotas, Synonyms, Users , Work with Object and System privileges , Introduction to grid.

Module - IV: Application Programming with database 10 Hrs

Introduction to Joomla, Installation and configuration ,Front end Backend Administrative function, Site

Menu/Help Menu/Menu manager, Managing Content, Components and Modules, Forums, comments

and calendar, Image gallery and document Management

Module - V: My SQL Database 10 Hrs

Installation and Up gradation to MYSQL, MySQL Architecture, Invoking MySQL through Command Line,

MySQL Server Start and Stop, Defining a Database, Creating Tables and Fields in MySQL, Overview of

Data Types in MySQL, Introduction to SQL, Executing DDL and DML Queries, Grouping and Aggregate

Functions, SubQueries, Date and Utility Functions, Triggers and Stored Procedures

Transaction Management

Concurrency Control-Lost Updates- Uncommitted Data- Inconsistent Retrievals-The Scheduler-

Concurrency Control with Locking Methods – Concurrency Control with Time Stamping- Concurrency

Control with Optimistic Methods- Database Recovery Management. Introduction to object oriented

databases, Active databases, Data warehouses – Data mining

Page 27

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Interactive SQL: Introduction to SQL, Logging into SQL *Plus, Naming rules and Conventions, Data Types,

Constraints, DDL, DML, DCL, TCL, DQL(Select Clause) Create, Alter, Drop, Rename on table structure,

Insert, Update and Delete Operation on table, Select Clause. Functions, Group by and Having Clause,

Group by using cube and rollup operator, Exist and Not Exist Operator, Sub Query, Different types of

Joins, set Operators, Index, View, Sequence, Spooling, Setting Environment Using SET Command, Paging,

Cluster and Snapshots.

Text Books:

• Oracle 10G beginners guide, Ian Abramson, Michael Corey, Michael S. Abbey, Michael S. Abbey,

Michael Corey, Barns and Noble, 2010

• Oracle 10g Data Warehousing, Lilian Hobbs, Susan Hillson, Shilpa Lawande, Pete Smith, Google

Ebook, Elsevier Publishing, 2011

Reference Book:

• Database Management Systems, Raghu Ramakrishnan, McGraw-Hill Education, 2010

Page 28

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Semester III

Linux Administration

Course Code: 13MTIM301 Total Lecture Hours: 30

Module - I: System Performance-Security-Service Access Control-Network Resource Access Control in

Redhat Linux 10 Hrs

Goals , Security Domains , System Faults , System Faults Analysis Methods , Benefit of maintaining

system state , Networking-data storage and processing resource concerns , Log file analysis ,

Understanding service management , Service configuration resources , Implement Access Control ,

Selinux Overview , SELinux management , IP and IP routing , Compare IPv4 and IPv6 , Netfilter

architecture , iptables , NAT

Module - II: Organizing Network System, NFS, SAMBA, Web Services in Redhat Linux 10 Hrs

Host name resolutions , verification of DNS server operation , BIND DNS configuration , DHCP Overview ,

DHCP configuration , Describe FTP service , Network File Sharing , Samba Service , client tool with each

service , features of Apache HTTP server , configure important Apache parameters , per-directory

configuration , CGI use with Apache , Identify key modules , Introduction to proxy web servers

Module - III: Mail Services, Securing Data, Account Management with Redhat Linux 10 Hrs

Understanding email Operations , Basic configuration of mail server , configuring proc mail – dovecot ,

Debug email services , Fundamental of encryption protocols encryptions with redhatlinux , configure

encryption services for common networking protocols , basics of authentication , Understanding the

Roles of NSS and PAM

Text Books:

1. Linux Bible By: Christopher Negus- Wiley Publishing, Inc, 2010.

2. Redhat Linux Networking and System Admin By: Terry Collings and Kurt Wall-M&T Books, 2009.

Reference Books:

1. UNIX and Linux System Administration Handbook (4th Edition), Evi Nemeth, Garth Snyder, Trent R.

Hein, Ben Whaley, Prentice Hall; 4th edition (July 24, 2010)

2. Linux Administration A Beginners Guide 6/E, Wale Soyinka, McGraw-Hill Osborne Media; 6 edition

(February 21, 2012)

Lab Experiments for Linux Administration:

1. Configure your system such that SE Linux must be in enforcing mode and firewall is enables and ssh

service is not allowed through your firewall.

Page 29

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

2. Configure ftp server such that anonymous can download and upload the data to ftp server. Deny

users John and Carel to access the ftp server. Note that your ftp server must be accessible in your

private network only. It can’t be accessible in another network.

3. Create a RAID level 1 on /dev/md0 device by creating two equal partitions of 100MB size and mount

it on /data. The RAID device must be mounted at the time of system startup.

4. Configure LVM in volume group named volgrp by creating 2 partitions of 100MB size and mount it

on /exam directory. The initial size of LVM is approximately 40MB and after extending the size of

LVM is 80MB.

5. Configure a NIS domain RHCE.COM for user authentication on server.example.com. Note the

following:

a. Nisuser should be able to log into client.example.com but will not have a home directory

until you have completed the autofs requirements.

b. NIS user has a password of password.

c. Configure autofs on client.example.com to auto mount the home directories of NIS users

where nisuser’s home directory is server.example.com:/rhome/server/nisuser.

d. nisuser’s home directory should be auto mounted on client.example.com on /rhome.

6. Configure the DHCP server such that your DHCP server will able to provide IP configuration to 65

systems in your network.

7. Configure the station as NFS server such that /share directory is shared & only accessible in your

network. This NFS share should be automatically mounted on remote client using autofs. On remote

client system, NFS share should be mounted on /data/share directory.

8. Configure stationx.example.com for quota such that when user neo type

dd if=/dev/zero of=/quota/somefile bs=1024 count=30, he succeed. When he type

dd if=/dev/zero of=/quota/somefile bs=1024 count=70 he fails.

9. Implement a stationx.example.com as a web server for the site http://wwwx.rhce.com, then

perform the following steps:

a. Download ftp://server.rhce.com/pub/rhce/station.html.

b. Rename the downloaded file to index.html.

c. Copy this index.html to the Document Root of your web server.

d. Do not make any modification to the content of index.html.

e. Extend your web server to include a virtual host for the site http://wwwy.rhce.com/.

f. Set the Document Root to /var/www/virtual for this virtual host.

g. Download ftp://server.rhce.com/pub/rhce/www.html.

h. Rename the downloaded file to index.html and place it to the DocumentRoot of the virual

host. Don’t change the contents of index.html.

Page 30

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

10. Configure the sendmail server for your local LAN. As well as the mail of user john should get by the

jane user. If any mail coming from outside of the local LAN block all mails.

11. Configure the system to allow the pop3 and imap connection from your domain and deny all other

domains.

12. Configure the DNS for rhce.com domain, where 192.168.0.20 is associated IP for www and NS is

192.168.0.254.

13. There are systems running on Linux as well as windows os. Some users are working on windows os.

Your printer is connected on linux server and you want to share the printer using samba so that

users working on windows also can print. Configure samba server to share printer.

14. Share the internet using squid for your local LAN. Proxy server should be run on 8080 port. Using

squid block internet to 192.168.1.0/24 network and allow to 192.168.0.0/24 network. Also block the

msn.com site.

15. Ssh service is enabled in your server. Your LAN is connected to WAN also. Configure to match

following conditions:

a. Deny the ssh from outside your domain.

b. If any denied host tried for ssh then send the information through mail with clients

information.

Page 31

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Object Oriented Programming with C++

Course Code: 13MTIM302 Total Lecture Hours: 15

Module - I: Introduction 2.5 Hrs

Basic concepts of OOP, Benefits of OOP, Object Oriented Language, Structure of C++ Program, Compiling

& Linking, Operators & Expressions, Looping concepts, Arrays & Structures, functions.

Module - II: Classes & Object 2.5 Hrs

Specifying a class, Define member function, Scope of class and its member, Nested Class, Data hiding &

encapsulation, Friend function, Array within a class, array of object as function argument, function

returning object, static member.

Overview of C language, History of C, Features of C language, C Structure, Execution of C program,

Compiler and Interpreter, Literals, Variable s in C, Data Types in C, Operators in C language, Basic

Programs in C.

Module - III: Constructors and Destructors 2.5Hrs

Constructor function, parameterized multiple constructor, default constructor, copy constructor, const

and class, Data conversion between objects of different classes, Destructor function, Polymorphism,

function overloading, Operator overloading.

Module - IV: Inheritance, Pointer & Virtual function 2.5 Hrs

Define derived classes, single inheritance, multilevel inheritance, Hierarchical inheritance, Hybrid

Inheritance, Pointers to objects, this pointer, Pointers to derived class, Virtual function, Pure Virtual

function, Abstract classes.

Module - V: File I/O & Templates 5 Hrs

Files streams, opening & closing a file, read () & write () functions, detecting end-of-file, seekp(), seekg(),

tellg(), tellp()function. Introduction to Templates & Exception, Creating and handling Templates and

Exception in OOP.

Text Books:

1. Object Oriented Programming With C++, E. Balaguruswamy, Tata McGraw Hill Publications, 2008

Reference Books:

1. C++ Programming Fundamentals, Chuck Easttom, Charles River Media, 2011

2. Object Oriented Programming With C++, David Parsons, Continuum Books, 2002

Lab Experiments for Object Oriented Programming Lab

1. Write a C++ program to find the sum of individual digits of a positive integer.

Page 32

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

2. A Fibonacci sequence is defined as follows: the first and second terms in the sequence are 0 and

1.Subsequent terms are found by adding the preceding two terms in the sequence. Write a C++

program to generate the first n terms of the sequence.

3. Write a C++ program to generate all the prime numbers between 1 and n , where n is a value

supplied by the user.

4. Write C++ programs that use both recursive and non-recursive functions

a. To find the factorial of a given integer.

b. To find the GCD of two given integers.

c. To find the nth Fibonacci number.

5. Write a C++ program that uses a recursive function for solving Towers of Hanoi problem.

6. Write a C++ program that uses functions

a) To swap two integers.

b) To swap two characters.

c) To swap two reals. Note: Use overloaded functions.

7. Write a C++ program to find both the largest and smallest number in a list of integers.

8. Write a C++ program to sort a list of numbers in ascending order.

9. Write a C++ program that uses function templates to solve problems-7&8.

10. Write a C++ program to sort a list of names in ascending order.

11. Write a C++ program to implement the matrix ADT using a class. The operations supported by this

ADT are:

a) Reading a matrix.

c) Addition of matrices.

b) Printing a matrix.

d) Subtraction of matrices.

e) Multiplication of matrices.

12. Implement the matrix ADT presented in the problem-11 using overloaded operators (<<, >>, +, -, *)

and templates.

13. Implement the complex number ADT in C++ using a class. The complex ADT is used to represent

complex numbers of the form c=a+ib, where a and b are real numbers. The operations supported by

this ADT are:

a) Reading a complex number. d) Subtraction of complex numbers.

b) Writing a complex number. e) Multiplication of complex numbers.

c) Addition of Complex numbers. f) Division of complex numbers.

14. Write a C++ program that overloads the + operator and relational operators (suitable) to perform

the following operations:

a) Concatenation of two strings.

b) Comparison of two strings.

15. Implement the complex number ADT in C++ using a class. The complex ADT is used to represent

complex numbers of the form c=a+ib, where a and b are real numbers. The operations supported by

Page 33

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

this ADT are:

a) Reading a complex number.

b) Writing a complex number.

c) Addition of Complex numbers.

d) Subtraction of complex numbers.

e) Multiplication of complex numbers.

f) Division of complex numbers.

Note: 1. overload << & >> operators in part a and part b.

2. overload +, - , *, / operators in parts c, d, e and f.

16. Write a template based C++ program that determines if a particular value occurs in an array of

values.

17. Write a C++ program that uses functions to perform the following operations to:

a) Insert a sub-string in to the given main string from a given position.

b) Delete n characters from a given position in a given string.

18. Write a C++ program that uses a function to reverse the given character string in place, without any

duplication of characters.

19. Write a C++ program to make the frequency count of letters in a given text.

20. Write a C++ program to count the lines, words and characters in a given text.

Page 34

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

ITIL AND HPSM/MICROSOFT SM

Course Code: 13MTIM303 Total Lecture Hours: 45

Module - I: ITIL Overview 8 Hrs

ITIL History, Components of the ITIL Library, IT Service Management ,Organizing for IT Service

Management, Technology and Architecture , Service Strategy : Service Strategy Lifecycle Stage, Service

Portfolio Management, The Demand Management Process, The IT Financial Management Process ,

Service Design : Service Design Lifecycle Stage, The Service Catalog Management Process, The Service

Level Management Process, The Availability Management Process, The Capacity Management Process,

The Information Security, Management Process, The IT Service Continuity, Management Process, The

Supplier Management Process.

Module - II: Service Transition 7 Hrs

Service Transition Lifecycle Stage, The Change Management Process, The Release and Deployment,

Management Process, The Service Asset and Configuration, Management Process, Knowledge

Management ,Service Operation Functions : Service Operation Lifecycle Stage, The Service Desk

Function, The Technical Management Function, The Application Management Function, The IT

Operations Management Function Service Operation Processes :The Event Management Process, The

Incident Management Process, The Request Fulfillment Process, The Access Management Process, The

Problem Management Process ,Continual Service Improvement :Continual Service Improvement,

Lifecycle Stage.

Module - III: Introduction to Service Manager 10 Hrs

Why IT organizations are turning to service management, How Service Manager fits in the ITSM

portfolio, Benefits of using Service Manager, Service Manager workflow – Roles and Responsibilities,

Multilanguage support and localization, Installing Service Manager: Understanding the Service Manager

architecture, Installing the Service Manager database, Installing the Service Manager server, Installing

the Service Manager client, Installing the Service Manager help, Installing the Service Manager web

client and self-service client, Troubleshooting the installation, Logging On and Navigating Service

Manager: Logging onto the Service Manager client and web interfaces as system administrator,

Comparing Service Manager client interface and web interface, Accessing the To Do list, favorites and

dashboard views, the Service Manager client interface, the Service Manager interface, Exporting to Excel

or Text files, Using the Service Manager help system, Service Manager Processes, goals for each of the

Service Manager components, features for Service Manager components, benefits for Service Manager

components, process flows, Embedded Best Practices, the workflows, interoperability among the

Service Manager Units, Operator Records, Roles, and Profiles: Connections among operator records,

roles, and profiles, Adding connections to Service Manager for different operators, Adding access rights

to user roles, how menus are mapped to user roles, different types of profiles, Creating and editing

profiles, Creating a user role, Defining and applying Security Folders, Approvals and Approval

Delegations, Define approvals and approval groups, Delegate approval authority to another group or

Page 35

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

operator, Configuration Management Unit: Configuring the Configuration Management Unit, Changing

Device Types, baselines and baseline versioning, Setting Environment Records, Using supporting table

Module - IV: Configuring the Service Desk Unit 10 Hrs

Configuring the Service Desk Unit, supporting tables, Setting Environment Records, Using templates to

populate interaction records, Using popup forms, Using smart indicators, Configuring the Incident

Management :Configuring the Incident Management ,Using supporting tables, Setting Environment

Records, Using Templates, Creating new area and subarea categories, Configuring the Problem

Management: Configuring the Problem Management Unit, Using supporting tables, Setting Environment

Records, alerts and alert notifications,

Module - V: Configuring the Scheduled Maintenance 10 Hrs

Configuring the Scheduled Maintenance, tasks for implementing Scheduled Maintenance, Configuring

the Change Management: the Change Management Unit, Setting Environment Records, Using

supporting tables, a change category, Configuring the Service Catalog: Configuring the Service Catalog,

the Service Catalog, Delivery Objectives, Configuring System Wide Configurations: functions of the

System Information Record, functions of the login. DEFAULT format control record, Administering

Service Manager: folder entitlement, calendars and work schedules, Purging and archiving records,

Moving from development to production environment.

Text Books:

1. Introduction to ITIL, Jan van Bon Stationery Office Books, The Stationery Office, 2010

2. HP operation Manual from HP, 2010

Reference Books:

1. A Guide to Service Desk Concepts Donna Knapp From Cengage Learning, 2010

2. The Shortcut Guide to Virtualization and Service Automation, Greg Shield Real-time Publishers,

2008

3. Service automation and dynamic provisioning techniques in IP/MPLS environments - Christian

Jacquenet, Gilles Bourdon, Mohamed Boucadair John Wiley and Sons, 2008

4. It Service Desk: What You Need To Know For It Operations Management Michael, Johnson

Tebbo, 2010

5. Help Desk, Service Desk Best Practice Handbook: Building, Running and Managing Effective

Support - Ready to Use Supporting Documents Bringing ITIL Theory Into Practice Gerard Blokdijk,

Ivanka Menken Emereo Pvt. Ltd, 2009

6. ITIL V3 Foundation Complete Certification Kit - Study Guide Book and Online, By Tim Malone,

Michael Wedemeyer, Gerard Blokdijk Lulu.com, 2008

7. The Shortcut Guide to Improving IT Service Support Through ITIL , Rebecca Herold

Realtimepublishers.com, 2009

8. The official introduction to the ITIL service lifecycle By OGC - Office of Government

Commerce The Stationery Office, 2010

Page 36

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

The Lab Experiments for ITIL and HPSM/ Microsoft SM are:

Basic Utilities and Tools

1.1 Data Policy

1.1.1 Access datapolicy

1.1.2 Modify the data policy record to filter data

1.1.3 Verify data policy changes

1.2 Database Manager

1.2.1 Access the database manager utility

1.2.2 Delete a record

1.2.3 Creating new operator

1.2.4 Add a new record to a table

1.2.5 Modify an existing record

1.2.6 Loading and unloading records

1.3 Forms designer

1.3.1 Field comparisons

1.3.2 Field value matching

1.3.3 Dynamic functions

1.3.4 Using select () function

1.3.5 Using DVD (Dynamic View Dependancies)

1.4 Links and Virtual Links

1.4.1 Accessing the Link record

1.4.2 Linking records between tables

1.4.3 Find function

1.4.4 Fill function

1.4.5 Format control

1.4.6 Configuring virtual joins, subforms,master forms

1.4.7 Configuring Links for Virtual Joins

1.4.8 Accessing views and favorites

1.4.9 Creating new View, modifying view

1.4.10 Analyzing User Profile

1.4.11 Modifying Queues and Views

1.5 Menus and MYSM

1.5.1 Creating menu

1.5.2 Enabling MySM Pages

1.5.2 Configuring a New MySM page

1.6 Document Engine

1.6.1 Navigating the Escalate Process in the Document Engine

1.7 Display Application

1.7.1 Analyzing the functionality of the Display Applications

1.8 Wizard

1.8.1 Running wizard.run

Page 37

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

1.8.2 File selection Tab, Usage tab, actions to Perform

1.8.3 Wizards functionality Quick Add Utility

1.9 Notifications and Alerts

1.9.1 Accessing the Notification Engine from the Object record

Page 38

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Introduction to Cloud Computing

Course Code: 13MTIM304 Total Lecture Hours: 60

Module - I: Introduction to Cloud Computing 12 Hrs

Defining cloud computing, Components of a computing cloud, Differentiating types of clouds: public,

private, hybrid Delivering services from the cloud: Categorizing service types, Comparing vendor cloud

products: Amazon, Google, Microsoft and others Adopting the Cloud

Module - II: Key drivers of cloud computing solutions 12 Hrs

Instantaneous provisioning of computing resources, Handling varied loads with elasticity and seamless

scalability, Tapping into an infinite storage capacity, Cost-effective pay-as-you-use billing models

Evaluating barriers to cloud computing: Handling sensitive data, Aspects of cloud security, Assessing

governance solutions

Module - III: Exploiting Software as a Service 11 Hrs

Characterizing SaaS: Minimizing the need for local hardware and software, Streamlining administration

with centralized installation and updates, Optimizing cost and performance with the ability to scale on

demand Comparing service scenarios: Improving collaboration with business productivity tools

Module - IV: Web Services 13 Hrs

Simplifying business process creation by integrating existing components Inspecting SaaS technologies:

Deploying Web applications Implementing Web services: SOAP, REST, Choosing a development

platform.

Module - V: Platform as a Service (PaaS) 12 Hrs

Delivering Platform as a Service (PaaS) Exploring the technical foundation for PaaS : Specifying the

components of PaaS, Analyzing vendor PaaS provisions , Selecting an appropriate implementation

Text Book:

1. Cloud Computing: Principles and Paradigms, Rajkumar Buyya, James Broberg, Andrzej M. Goscinski,,

John Wiley and Sons Publications, 2011

Reference Books:

1. Brief Guide to Cloud Computing, Christopher Barnett, Constable & Robinson Limited, 2010

2. Handbook on Cloud Computing, Borivoje Furht, Armando Escalante, Springer, 2010

Page 39

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Elective II

Advanced Information Security

Course Code: 13MTIM305E1 Total Lecture Hours: 45

Module - I : Introduction 8 Hrs

Introduction to Ethical Hacking, Foot printing and Reconnaissance

Module - II: Introduction to System Hacking 10 Hrs

Scanning Networks, System Hacking

Module - III: Trojans 10 Hrs

Trojans and Backdoors, Viruses and Worms

Module - IV: Social Engineering and Phishing Attacks 7 Hrs

Social Engineering, Denial of Service, Phishing

Module - V: Cryptography and Cyber Laws 10 Hrs

Cryptography, Penetration Testing, Cyber Laws

Text Book:

• Information Systems Security: Security Management, Metrics, Frameworks And Best Practices - Nina

Godbole, ISC2 Press, 2010

Reference Book:

• Information Security Management Handbook, Volume 4 - Micki Krause, ISC2 Press, 2007

Lab Experiments for Advanced Information Security

1. Working with Sniffers for monitoring network communication (Ethereal).

2. Understanding of cryptographic algorithms and implementation of the same in c or c++.

3. Using open ssl for web server browser communication.

4. Using GNU PGP.

5. Performance evaluation of various cryptographic algorithms.

6. Using IP TABLES on Linux and setting the filtering rules.

7. Configuring S/MIME for email communication

8. Using NMAP for ports monitoring.

9. Understanding the buffer overflow and format string attacks

Page 40

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

10. Implementation of proxy based security protocols in C or C++ with feathers like confidentiality,

integrity and authentication.

11. Make a detailed Report and ppt on windows registry.

12. Implement various password cracking techniques for breaking system password and make a

report.

Create a live Phishing scenario. Generate a report and ways to avoid this threat.

13. Detailed report on SQL Injection.

14. XSS attack.

15. List Major Indian Cyber Laws and make a PPT.

Page 41

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Elective II

VOIP and Wireless Technologies

Course Code: 13MTIM305E2 Total Lecture Hours: 45

Module - I: VOIP fundamentals 8Hrs

Describe a dial plan, Describe the basic operation and components involved in a VoIP call , Describe VoIP

call flows, RTP, RTCP, cRTP, and sRTP,H.323,MGCP,Skinny Call Control Protocol, SIP, Identify the

appropriate gateway signaling protocol for a given scenario, Choose the appropriate codec for a given

scenario, Describe and Configure VLANs. Implement Cisco Unified Communications Manager Express to

support endpoints using CLI , Describe the appropriate software components needed to support

endpoints, Configure DHCP, NTP and TFTP, Describe the differences between the different types of

ephones and ephone-dns, Configure Cisco Unified Communications Manager Express endpoints

Module - II : Gateway 10Hrs

Describe the function of gateways, Describe DSP functionality, Describe the different types of voice

ports and their usage, Describe dial peers and the gateway call routing process, Describe codecs and

codec complexity Implement a gateway: Configure analog voice ports, Configure digital voice ports,

Configure dial-peers, Configure digit manipulation, Configure calling privileges, Verify dial-plan

implementation, Implement fax support on a gateway Implement Cisco

Module - III: Unified Border Element: 7 Hrs

Describe the Cisco Unified Border Element features and functionality, Configure Cisco Unified Border

Element to provide address hiding, Configure Cisco Unified Border Element to provide protocol and

media interworking, Configure Cisco Unified Border Element to provide call admission control, Verify

Cisco Unified Border Element configuration and operation

Module IV: Implementing QoS for voice and video : 10Hrs

Describe causes of voice and video quality issues, Describe how to resolve voice and video quality issues,

Describe QoS requirements for voice and video traffic Describe and configure the DiffServQoS model:

Describe the DiffServQoS model, Describe marking based on CoS, DSCP, and IP Precedence, Configure

layer 2 to layer 3 QoS mapping, Describe trust boundaries, Configure trust boundary on Cisco switches,

Describe the operations of the QoS classifications and marking mechanisms, Describe Low Latency

Queuing, Describe the operations of the QoS WAN Link Efficiency mechanisms, Enable QoS mechanisms

on switches using AutoQoS, Configure Low Latency Queuing

Module - V: WLAN fundamentals 10Hrs

Install a basic Cisco wireless LAN, Install Wireless Clients, Implement basic WLAN Security, Operate basic

WCS.

Page 42

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Text Books:

• Voice over IPv6: architectures for next generation VoIP networks, Daniel Minoli, John Wiley and

Sons 2009

• Handbook Of Wireless Networks & Mobile Computing , Stojmenovic, John Wiley and sons

Publications, 2010

Reference Books:

• Wireless and mobile data networks , Aftab Ahmad, John Wiley and sons Publications, 2010

• Ad-hoc, mobile, and wireless networks, Violet R. Syrotiuk, Edgar Chávez - Technology &

Engineering Springer, 2009

• Wireless And Mobile Network Architectures By Yi-Bang Lin, Imrich Chlamtac, Wiley Publications,

2008

• The wireless mobile Internet: architectures, protocols and services By Abbas Jamalipour Wiley

Publications, 2009

The Lab Experiments for Implementing the VOIP and Wireless Technologies are:

1. Configuring Analog Interfaces

2. Configuring FXS Ports

3. Configuring FXO Ports

4. Configure CCS (PRI) Settings

5. Configure ISDN Network End

6. Create POTS and VoIP Dial Peers

7. Call Processing, Dial Plans, and Digit Manipulation

8. Configuring the Phone Directory

9. Configuring Call Forwarding

10. Configuring Call Detail Records and Accounting

Page 43

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Project Phase 1

Course Code: 13MTIM306 Total Lecture Hours:

As Per University Norms

Page 44

M. Tech. IT-IMS -VELS University-2013 (Course Matrix & Syllabus)

Semester- IV

Project Phase 2

Course Code: 13MTIM401 Total Lecture Hours:

As Per University norms