study & evaluation scheme m.tech. (computer...

25
STUDY & EVALUATION SCHEME M.Tech. (Computer Science & Engineering) Part Time Course and Scheme of Examination S. No Course Code Subject Hours/Week Credits Evaluation (Marks) Total Marks Exam. Marks Sessional Lecture Tutorial Practica l Theory Practical Tutorial Practical Semester -I 1. CSP-101 Advanced Computer Networks 03 01 - 04 100 - 50 - 150 2. CSP-102 Advanced Software Engineering 03 01 - 04 100 - 50 - 150 3. CSP-154 Advanced Computer Networks Lab - - 03 02 - 50 - 25 75 Total 10 375 Semester II 1. CSP-201 Cryptography & Networks Security 03 01 - 04 100 - 50 - 150 2. CSP-202 Software Testing and Quality Management 03 01 - 04 100 - 50 - 150 3. CSP-254 Software Engineering Lab - - 03 02 - 50 - 25 75 Total 10 375 Semester III 1. CSP-301 Advanced Computer Architecture 03 01 - 04 100 - 50 - 150 2. CSP-302 Advanced Operating System and Distributed Computing 03 01 - 04 100 - 50 - 150 3. CSP-354 Seminar - - 03 02 - - 50 - 50 Total 10 350 Semester IV 1. CSP-401 Advanced Database Design 03 01 - 04 100 - 50 - 150 2. CSP-402 Advanced Artificial Intelligence 03 01 - 04 100 - 50 - 150 3. Elective-1 03 01 - 04 100 - 50 - 150 Total 12 450 Semester V 1. Elective-2 03 01 - 04 100 - 50 - 150 2. CSP-599 Thesis/Dissertation - - 08 08 - - - 150 150 Total 12 300 Semester VI 1. CSP-599 Thesis/Dissertation - - 12 12 - 200 - 200 400 Total 12 400 Grand Total 2250

Upload: doanphuc

Post on 03-Apr-2018

218 views

Category:

Documents


3 download

TRANSCRIPT

STUDY & EVALUATION SCHEME

M.Tech. (Computer Science & Engineering)

Part Time

Course and Scheme of Examination

S.

No

Course

Code

Subject

Hours/Week

Cre

dit

s

Evaluation (Marks)

Total

Marks

Exam. Marks Sessional

Lec

ture

Tu

tori

al

Pra

cti

ca

l Th

eory

Pra

ctic

al

Tu

tori

al

Pra

ctic

al

Semester -I

1. CSP-101 Advanced Computer

Networks

03 01 - 04 100 - 50 - 150

2. CSP-102 Advanced Software

Engineering

03 01 - 04 100 - 50 - 150

3. CSP-154 Advanced Computer

Networks Lab

- - 03 02 - 50 - 25 75

Total 10 375

Semester –II

1. CSP-201 Cryptography &

Networks Security

03 01 - 04 100 - 50 - 150

2. CSP-202 Software Testing and

Quality Management

03 01 - 04 100 - 50 - 150

3. CSP-254 Software Engineering

Lab

- - 03 02 - 50 - 25 75

Total 10 375

Semester –III

1. CSP-301 Advanced Computer

Architecture

03 01 - 04 100 - 50 - 150

2. CSP-302 Advanced Operating

System and

Distributed

Computing

03 01 - 04 100 - 50 - 150

3. CSP-354 Seminar - - 03 02 - - 50 - 50

Total 10 350

Semester –IV

1. CSP-401 Advanced Database

Design

03 01 - 04 100 - 50 - 150

2. CSP-402 Advanced Artificial

Intelligence

03 01 - 04 100 - 50 - 150

3. Elective-1 03 01 - 04 100 - 50 - 150

Total 12 450

Semester –V

1. Elective-2 03 01 - 04 100 - 50 - 150

2. CSP-599 Thesis/Dissertation - - 08 08 - - - 150 150

Total 12 300

Semester –VI

1. CSP-599 Thesis/Dissertation - - 12 12 - 200 - 200 400

Total 12 400

Grand Total 2250

LIST OF ELECTIVE

Elective-1

1. Digital Image Processing (CSP-041)

2. Mobile Computing (CSP-042)

3. Data Warehousing & Data Mining (CSP-043)

Elective-2

1. Parallel Algorithm (CSP-051)

2. Adhoc Sensor Networks (CSP-052)

3. Embedded System (CSP-053)

4. Advanced Mobile Computing (CSP-054)

ADVANCED COMPUTER NETWORKS

CSP- 101

L T P

3 1 0

UNIT-1

Need & Comparison of network models (ISO-OSI and TCP/IP), IEEE Standards-DQDB,

Wireless LAN.

Introduction to flow control, Error Control, Error detection and correction, IP Addressing,

multiplexing.

HDLC-Configurations and transfer modes, frames, Control Field, Segment format, Features &

comparison of IP V4, IPV6. [10]

UNIT-2

Network layer - connection devices, routing algorithms and protocols, direct versus indirect

delivery, forwarding techniques, Unicast routing protocols -optimization, intra and inter –

domain routing, distance vector routing, link state routing, path vector routing.

Multicast routing protocols - Applications, Multicast Routing, IP routing, dynamic routing

protocols.

[8]

UNIT-3

Transport layer-User datagram protocol (UDP)-segment format, Well-known port for UDP,

checksum, UDP Operation, Use of UDP.

TCP - TCP Segment format, TCP Services, TCP features, TCP connection Establishment &

release, TCP half close, TCP simultaneous close, TCP timers, TCP data flow, TCP timeout and

retransmission.

SCTP- SCTP services, SCTP Feature, Packet format, and SCTP Association.

[10]

UNIT-4

Congestion control - data traffic descriptor, traffic profile, congestion - network performance,

open-loop& close loop congestion control.

Quality of services - flow characteristics, flow classes, techniques to improve QoS-Scheduling,

Traffic Shaping, Resource reservation Admission control, RSVP, ARP, RARP, ICMP, and

IGMP.

Security-services - message confidentiality, message authentication, message Non-repudiation,

message confidentiality-confidentiality with symmetric – key cryptography.

Confidentiality with asymmetric-key cryptography, message and message digest, hash function

criteria.

[8]

UNIT 5

Application layer- Segment format and working of DNS, BOOTP, DHCP, FTP, TELNET,

TFTP, streaming live audio/video, real – time interactive audio/video – characteristics, RTP –

RTP Packets Format, RTCP – Sender Report, Receiver, Source Description Message, Bye

Message. Application- Specification Message, Case study of voice over IP – SIP. [8]

References:

1. Forouzen,”Data Communication and Networking”,TMH

2. A.S.Tanenbaum,”Computer Networks”,3rd

Edition,Prentice Hall India,1997.

3. W.Stallings,”Data and Computer Communication”,Macmillan Press,1989.

4. W. Richard stevens, “ TCP/IP Illustrated Vol 1 “, Addition Wesley.

5. J Martin, “TCP/IP Networking Architecture, Administration and programming”, Prentice

Hall 1994.

6. D.E. Comer, “Internetworking with TCP/IP, Vol 1, Principles, Protocols, and

architecture.

7. R. Stevens, “Unix Networking Programming”, PHI 1998.

ADVANCED SOFTWARE ENGINEERING

CSP -102

L T P

3 1 0

UNIT-I

Software Engineering: Review of Software Engineering ,Key Concepts, Classical SDLC model

of software engineering , COTS, RUP ,Rapid Application Development, Agile methods, Extreme

programming. Advanced concepts of software engineering: Clean Room Software

Engineering, Component Based Software Engineering, Aspect oriented software engineering,

Service oriented software engineering, Object Oriented Software Engineering. [8]

UNIT -II Software Project Management: Introduction to Software project management, Project

Managers Roles and Responsibilities, Project Planning, Project Evaluation, Project Monitoring

and Control, Effort Estimation, Human Resource Management, Risk Management, Software

Project Management Tools. [8]

UNIT-III

Requirement Engineering: Introduction, Importance, Challenges, Success factors of

Requirement Engineering, Requirement Engineering Framework, Characteristics of

Requirements, Issues and problems in Requirement Elicitation, Trends and challenges of

Requirement Elicitation ,Techniques and approaches of Requirement Elicitation ,Role of Soft

Skills in Requirement analysis ,Requirement Reuse, Requirement Verification & Validation.

Specification of Requirement models: Characteristics of SRS, Components of SRS,

Specification Language, Structure of Requirement Document, Guidelines for writing SRS. [10]

UNIT –IV

Requirement Prioritization: Aspects of Prioritization, Prioritization Techniques, Requirement

Negotiation, Ambiguity in Requirement engineering, Requirement Management: Change

Management, Activities, Traceability, Measurement & Metrics, Software Requirements and Risk

Management, Requirement Engineering for Agile Methods, Introduction to Object Oriented

Requirement, Requirement Engineering for Web Based Information System ,Distributed

Requirement Engineering ,Future directions in Requirement Engineering Research. [8]

UNIT-V

Software Design: Design Principles, Software Design Process, Design Qualities, Design

Patterns.

Design Practices: Incremental Design, Structured Analysis and Structured Design, Jacksons

Structured Programming, Introduction to Object Oriented Design. [10]

REFERENCES

1. Sommerville “Software Engineering” , Pearson

2. Bob Hughes, ”Software project Management” ,TMH

3. Aybüke Aurum, Claes Wohlin “Engineering and Managing Software Requirements”

Springer.

4. Karl E. Weigers “Software Requirements” WP Publishers & Distributors

5. Brian Berenbach “Software & Systems Requirements Engineering ” TMH

6. David Budgen, “Software Design” Pearson, 2003

ADVANCED COMPUTER NETWORKS LAB

CSP-154

L T P

0 0 3

SECTION – A (Study of LAN Trainer Kit)

(A) MAC LAYER

1. Simulate ALOHA protocol for packet transmission between a no. of Nodes connected to a

common bus.

2. Simulate CSMA protocol for packet transmission between a no. of Nodes connected to a

common bus.

3. Simulate CSMA/CD protocol for packet transmission between a no. of Nodes connected to

a common bus.

4. Simulate TOKEN BUS for bus LAN.

5. Simulate TOKEN BUS for ring LAN.

(B) DATA LINK LAYER

1. Simulate PACKET TRANMISION from one Node to another Node.

2. Simulate SLIDING WINDOW protocol to provide reliable data transfer between two

nodes over an unreliable Network.

3. Simulate STOP & WAIT protocol for packet transmission between a no. of nodes.

(C) APPLICATION LAYER

1. Simulate FILE TRANSFER protocol to check transfer of file and deceiving of file

between two nodes.

SECTION – B (Study of Network Simulator)

(A) LAN EXPRIMENTS

1. Simulation of network based on Pure Aloha protocol using netsim.

2. Simulation of network based on Slotted Aloha protocol using netsim.

Simulation of network based on Ethernet protocol using netsim.

3. Simulation of network based on Token Bus protocol using netsim.

4. Simulation of network based on Token Ring protocol using netsim.

(B) WAN EXPRIMENTS

1. Simulation of network based on Router using netsim.

2. Simulation of network based on Frame relay using netsim.

3. Simulation of network based on X.25 using netsim.

4. Simulation of network based on TCP (Transfer Control Protocol) using netsim.

5. Simulation of network based on UDP (User Datagram Protocol) using netsim.

6. Simulation of network based on ATM (Asynchronous Transfer Mode) using netsim.

(C) ‘C’ PROGRAMS

1. WAP to implement TOKEN RING protocol.

2. WAP to implement ALOHA protocol.

3. WAP to implement CSMA/CD protocol for a single channel.

4. WAP to implement CSMA/CD protocol for a double channel.

CRYPTOGRAPHY AND NETWORK SECURITY

CSP 201

L T P

3 1 0

UNIT 1

Introduction to OSI Security Architecture: Conventional Encryption: Conventional Encryption

Model, Classical Encryption Techniques - Substitution Ciphers: Transpositions Ciphers:

Cryptanalysis, Staganography; Modern Block Ciphers- Block Ciphers Principles: Stream &

Block Ciphers, Fiestal Cipher, Shannon's Theory of Confusion and Diffusion, Data Encryption

Standards (DES): DES Encryption and Decryption, Strength of DES, , Block Cipher Modes of

Operation [9]

UNIT 2 Triple DES: Double DES, TDES with Two Keys, TDES with Three Keys; Confidentiality Using

Conventional Encryption: Placement of Encryption Function, Traffic Confidentiality, Key

Distribution, Random Number Generation ,Introduction to Graph, Ring and Field, Prime and

Relative Prime Numbers, Modular Arithmetic,. Principles of Public Key Cryptosystems: RSA

Algorithm: Key Management, Diffie-Heilman Key Exchange Algorithm, And Introductory Idea

of Elliptic Curve Cryptography. [9]

UNIT 3

Message Authentication & Hash Functions: Authentication Requirements, Authentication

Functions, Message Authentication Codes, Hash Functions: Requirement for a Hash Function,

Simple Hash Functions, Block Chaining Techniques; Security of Hash Function & MACS, MD5

Message Digest Algorithm, Secure Hash Algorithm (SHA-1).. Digital Signatures: Requirements,

Direct & Arbitrated Digital Signature; Authentication Protocols: Mutual & One way

Authentication; Digital Signature Standard (DSS) [8]

UNIT 4

Network Security Application- Authentication Applications: Kerberos Version 4 & Difference

between Kerberos v4 & v5, Kerberos Realms; X.509 Authentication Service: Electronic Mail

Security - Pretty Good Privacy (PGP): IP Security: Architecture, Authentication Header,

Encapsulating Security Payloads. Web Security: Secure Socket Layer & Transport Layer

Security, Secure Electronic Transaction (SET); System Security: Intruders, Viruses and Related

Threats: Malicious Programs, The Nature of Viruses, Types of Viruses, Macro Viruses, Email

Viruses; Firewall: Firewall Design Principles, Trusted Systems. [9]

UNIT 5

Cyber Laws: Cyber laws for Cyberspace- Legal Identity and Private International Laws in

Cyberspace. IT Act 2000. IT Act 2000 in reference to Email, E-Commerce and Issues of Privacy.

E-Agreements and the Web Surfing, Cyber Pirates - Copyright, Digital Content right. Steps to

Protect the Contents on WWW, Software Patents, Domain Name System and Trademarks, Cyber

Trademarks Laws. IT Act and Issues of Copyright, Patent and Trademark. Crimes- Cyber Crimes

and Future Imperfect, Strategy to Combat Cyber Crimes, IT Act 2000 and Cyber Crimes.

Case Study of Sensor Network Security. [9]

REFERENCES:

1. William Stallings, "Cryptography and Network Security: Principles and Practice"

Prentice Hall, New Jersey.

2. Johannes. A. Buchmann, "Introduction to cryptography", Springer Verlag. Bruce

Schiener, "Applied Cryptography".

3. Sharma, Vakul, "Handbook of cyber Laws", Macmillan India Ltd, 2002.

4. Kernal Texpalan, " Communication network Management:, PHI, 1992.

SOFTWARE TESTING AND QUALITY MANAGEMENT

CSP- 202

L T P

3 1 0

UNIT -I

Introduction to Software Testing: Evolution, Myths, Facts, Goals, Psychology, Models,

Principles , Axiom of Testing, Study of Bugs: Classification, Priority, Severity and their tracking

.Software Testing: Terminology, Life cycle, Methodology, Types of Testing, Test planning:

Test Plan Specification, Leveled Test Plan, Development of Test Plan ,Master Test plan ,Phase

Wise Test Plan, Test management, Software Testing Guidelines, Defect Management, Analyzing

& Reporting Test. [8]

UNIT -II

Testing Technique: Static Testing: Inspection, Structured Walkthrough, Technical reviews,

Automated Techniques ,Black box testing, Types of Black box Testing: Requirement based

Testing, Positive & Negative Testing, Boundary Value Analysis, Compatibility Testing, Domain

Testing, Graph Based Testing, Robustness Testing , Syntax Testing, Finite State Testing, Cause-

Effect Graphing Based Testing. White Box Testing, Types of White box Testing: Basis Path

Testing, Control Structure Testing, Mutation Testing, and Gray Box Testing. Software

Testability, Software Test Automation, Test Metrics and its Measurements. [10]

UNIT -III

Software Testing Strategies: Model for Software Testing, Unit Testing, Integration, System &

Acceptance Testing: Alpha Testing, Beta Testing, Stress testing, Load testing, Reliability

Testing, Scalability Testing . Performance Testing, Regression Testing, Ad-hoc Testing,

Usability and Accessibility Testing, Object Oriented Testing: Object-Oriented Testing Model,

Object-oriented Software Test Strategy. [8]

UNIT -IV

Introduction to Software Quality: Concepts of quality, perspectives and expectations, Quality

Framework, Quality engineering: Activity and process, Quality planning, Quality assessment

and improvement. Quality assurance: Classification, Q.A activities, Q.A. Techniques, Defect

prevention and process improvement, Software Inspection, Formal Verification, Introduction to

Software Reliability Engineering, Software Quality Measurement & Metrics. [8]

UNIT –V

Quality Models: McCall’s model, Bohem’s model, Dromey’s model, FURPS Model,ISO-9126

Model, Cost Of Quality, Software Quality Factors, Quality Control , CMMI-Framework :

Process Area Components, Capability & Maturity Levels, Relationship Among Process Areas.

[10]

REFERENCES:

1. Software Testing : K.Mustafa,R.A. Khan ,Narosa

2. Software Testing : Srinivasan Desikan,Pearson

3. Software Testing : Naresh Chauhan , Oxford

4. Software Quality Engineering : Jeff Tian ,Wiley

5. Software Testing Fundamentals: Marnie L.Hutcheson,Wiley

6. Software Testing : Ron Patton, Pearson

SOFTWARE ENGINEERING LAB

CSP-254

L T P

0 0 3

1. Use a good SRS-document (available in Project Data Bank) and review this from

TESTABILITY perspective. Identify “un-testable requirements” in SRS and suggest

corrective measures – for making the requirements testable.

2. Research “Requirements Management Tools” currently available in the market (including

OPEN-SOURCE TOOLS as well) and provide comparative presentation – with

recommendations for your lab – if you were given a chance to make decision on tool

selection, what would you deploy and why?

3. Identify a real-life application and develop a test-plan, for this application.

4. Research currently available OPEN-SOURCE Testing Tools and identify one of them

(that you believe is most suitable), for deployment in the lab. Make a presentation for

End-to-End Deployment, for the TEST-Tool of your choice.

5. Write application programs in C-Language ( design multiple modules) – using various

constructs of C-Language and perform “WHITE-BOX TESTING” of: (a.) Individual

Modules (b.) Interfaces.

During the course of White-Box Testing, ensure (and provide evidence of) the following:

i. All independent paths within a module have been covered at least once

ii. Cover all logical decisions on their true and false sides

iii. Execute all loops at their boundaries and within their operational bounds

iv. Exercise internal data structures to ensure their validity

6. Identify a good SRS-document ( currently available in Project Data Bank) and prepare

UAT Test-Cases on the basis of the SRS-document.

7. Develop Test-Cases for End-to-End, Black-Box Testing of the application program of

exercise(5.). Execute the test-cases and retain detailed test-log and other artifacts of

testing. Present Test-Summary report and answer queries (with reference to test artifacts).

8. Study any Test Management Tool (like “TEST DIRECTOR” or any other tool of your

choice) in detail and provide a presentation/evaluation demo on this tool in the lab.

9. Research and Indentify a Test Tool for Automating Test Scripts. Compare the same with

WinRunner and provide your objective assessment comments.

10. Take a mini-project and handle the same using V-Process Model of SDLC. During life

cycle of this mini-project, create various Testing Documents and the Final Test Report, as

deliverables.

ADVANCED COMPUTER ARCHITECTURE

CSP 301

L T P

3 1 0

UNIT-1

Fundamentals of Computer design- Technology trends- cost- measuring and reporting

Performance quantitative principles of computer design. Flynn’s & other classification, pipeline

& parallism.

Instruction set principles and examples- classifying instruction set- memory addressing-

Type and size of operands- addressing modes for signal processing-operations in the instruction

set-

Instructions for control flow- encoding an instruction set.-the role of compiler [9]

UNIT- 2:

Instruction level parallelism (ILP)- over coming data hazards- reducing branch costs – high

performance instruction delivery- hardware based speculation- limitation of ILP ILP software

approach- compiler techniques- static branch prediction- VLIW approach- H.W support for more

ILP at compile time- H.W verses S.W solutions [9]

UNIT- 3

Memory hierarchy design- cache performance- r educing cache misses penalty and miss rate –

virtual memory- protection and examples of VM. Multiprocessors and thread level parallelism-

symmetric shared memory architectures- distributed shared memory- Synchronization- multi

threading. [8]

UNIT-4

Storage systems- Types – Buses - RAID- errors and failures- bench marking a storage device-

designing a I/O system.

Inter connection networks and clusters- interconnection network media – practical issues in inter

connecting networks - examples – cluster s- designing a cluster [8]

UNIT-5

Introduction to High Performance Computing: Overview, Pipeline vs Parallel Processing Parallel

Architectures: Classification and Performance. Pipeline Processing: Pipeline performance,

design of arithmetic pipelines, multifiction pipes, concept of reservation table, collision vector

and hazards. Instruction Processing Pipes: Instruction and data hazard, hazard detection and

resolution. [10]

Text Book:

1. Computer Architecture A quantitative approach 3rd edition John L. Hennessy & David

A. Patterson Morgan Kufmann (An Imprint of Elsevier)

2. “ Computer Architecture and parallel Processing” Kai Hwang and A. Briggs International

Edition McGraw-Hill.

3. Advanced Computer Architectures, Dezso Sima, Terence Fountain, Peter Kacsuk, Pear

son.

4. Advance computer architecture ,Kai Hwang, Tata Mc Graw hill

ADVANCED OPERATING SYSTEM AND DISTRIBUTED COMPUTING

CSP 302

UNIT 1:

Advanced Operating Systems: Overview and architecture, Distributed computing models and

their comparison, Distributed Computing Paradigms.

Client Server Models: addressing, architecture, implementation. Case Study: World Wide Web

1.0

Interprocess Communication: API for internet protocol, Marshalling. Client server

communication, group communication Case Study: CBCAST protocol in ISIS. [10]

UNIT 2:

Distributed objects and remote invocation: communication between Distributed objects, RPC,

events and notification Case Study: Java RMI

Operating System Support: Operating System layer. Protection, processes and threads,

operating system architecture

Distributed clock synchronization: physical clock, logical clock. [8]

UNIT 3:

Distributed File System: Models, service interface and directory interface design, DFS system

structure, Case Study: Google file system, SUN File System.

Security in distributed systems: problems and design issues,

Fault tolerance and recovery: basic concepts, fault models, agreement problems and its

applications, commit protocols, voting protocols, checkpointing and recovery. [8]

UNIT 4:

Distributed Multimedia systems: Characteristics of multimedia, multimedia data. Quality of

service management, resource management, stream adaptation.

Case Study: Tiger video file server.

Distributed shared memory: design and implementation issues, sequential consistency and Ivy.

Case Study: Munin [8]

UNIT 5:

Real time distributed operating system: Design issues, distributed communications in LAN

and WAN, scheduling: static and dynamic, scheduling algorithms, Case Study: MARS.

Emerging trends in distributed computing: Introduction, Grid computing-architecture

application, SOA overview, design, service oriented grid, advantages and future scope, Cloud

computing- feature and architecture. [8]

REFERENCE:

1. Distributed Systems – Coulouris [ Pearson Education]

2. Distributed Operating Systems- Tannenbaum [ Pearson Education]

3. Distributed Systems: Principles and Paradigms – Tannenbaum [ Pearson Education]

ADVANCED OPERATING SYSTEM AND DISTRIBUTED COMPUTING

CSP 302

L T P

3 1 0

UNIT 1

Introduction: Computer networks overview Operating System: Objectives and functions,

Structure, types, concept of multiprogramming Distributed systems: goals, features, distributed

operating system and design issues.

Processes: Process types, process description, process states and process control Concurrent

processes: Race condition, critical section, mutual exclusion, semaphore, applications of semaphore,

and monitors.

UNIT 2

Deadlock: system model, prevention, avoidance, detection & recovery and integrated approach

handling of deadlock in distributed system Interprocess Communication: Message passing system:

Features of message passing system, design issues, synchronization, buffering and process

addressing. Remote procedure call: RPC model, transparency, implementation mechanism.

UNIT 3

CPU Scheduling: Goals & policies, types of scheduler, performance criteria, algorithms,

multiprocessor systems and real time systems. Distributed system: process migration, Threads, load

balancing, load sharing and task assignment approach.

UNIT 4

Memory Management: Physical Memory: Memory management requirement, partitioning,

swapping, relocation segmentation, paging, selection of page size and other issues. Virtual Memory:

Concept & implementation (demand paging& segmentation and combined approach), design issues

and performance Distributed Shared Memory: concept, architecture, design issues and advantages

Input/output Management:

UNIT 5

I/O devices, organization of I/O functions, controllers and drivers. Magnetic disk: structure, free

space management, space allocation, address translation, arm scheduling, performance

enhancement ( RAID, disk cache, RAM cache etc) File Management: File system, structure,

organization, directory, file system reliability ( back-up & recovery and file system consistency

etc) Distributed file system: concept, desirable features, accessing, caching and replication.

Security: Authorization, authentication, access control matrix, access control list, capability list,

protection domain and cryptography.

REFERENCES:

1. Couloris, Dollimore, Kindberg,” Distributed systems: Concepts and Design”.

Pearson Education Asia, 3ed.

2. Singhal and Shivratri,” Advanced Concepts in Operating Systems”, Mc Graw Hill.

ADVANCED DATABASE DESIGN

CSP 401

L T P

3 1 0

UNIT 1

Query Processing- Measures of query cost, selection operations, Join operations, Evaluation of

expressions.

Query Optimization- catalog Information, . Clustering & Indexing, Transformation of relational

expression- equivalence rules, Choice of evaluation plans-cost based optimization, Heuristic

optimization. [8]

UNIT 2

Database Tuning- Database workload, Physical design and tuning decisions, Need for database

tuning, Index selection, Tuning Indexes, Tuning the conceptual schema, Tuning queries and

views, DBMS Benchmarks.

Object Oriented Database System- Object, Class, Structured types, Inheritance, Multiple

Inheritance, Object identity, Object containment, Nested Relational Model. [8]

UNIT 3

Distributed Database System- Homogeneous and heterogeneous databases, Data replication,

Data fragmentation, System structure, Commit protocols- Two Phase commit, Three- Phase

commit, Concurrency control in distributed databases, Deadlock handling, Distributed Query

Processing In R * System [8]

UNIT 4

Database Security- Database Security, Access Control and Grant & Revoke on Views and

Integrity Constraints, Discretionary Access Control, Role of DBA, Security in Statistical

Databases. [7]

UNIT 5

Enhanced Data Model for Advanced Applications- Active database concept and triggers and

their design and implementation issues, Temporal data base concepts, Spatial and multimedia

databases, Introduction to deductive databases, introduction to expert database system. [8]

REFERENCES

1. Majumdar & Bhattacharya, "Database Management System", TMH.

2. Korth, Silberchatz, Sudarshan, "Database Concepts", Addison Wesley.

3. Elmastri, Navathe, "Fundamentals of Database Systems", Addison Wesley.

4. Date C.J., "An Introduction to Database System", Addison Wesley.

5. Ramakrishnan, Hadzilacous, Goodman, "Concurrency Control & Recovery", Addiosn

Wesley.

6. Ceri & Palgatti, "Distributed Databases", McGraw Hill.

ADVANCED ARTIFICIAL INTELLIGENCE

CSP 402

L T P

3 1 0

UNIT 1 Overview of Artificial intelligence Problems of AI, AI technique, Problem Space & search,

Problem solving by search, state space.

Uninformed search: breath first search, depth first search, depth limiting search, iterative

deepening search, Comparison of BFS & DFS.

Informed Search: hill climbing search, best first search, A star, AO star.

Constraint satisfaction problem: Adversarial search: optimal decision in game (Min Max, Alpha Beta pruning), imperfect real

time decision, games that include element of chance. [08]

UNIT 2 Knowledge Representations: Prepositional Logic, First Order Predicate Logic, Resolution in

Predicate Logic, Unification, Strategies for Resolution by Refutation.

Weak slot and filler structure: semantic nets, frames.

Strong slot and filler structure: conceptual dependency, scripts. [10]

UNIT 3

Statistical reasoning: Probalistic reasoning, Bayes Theorem, Bayesian network, Dampster

Shafer theory.

Planning: plan space, partial order planning, planning graph, goal stack planning.

Introduction to Fuzzy Logic [08]

UNIT 4 Learning: forms of learning (rote learning, abduction, analogy, inductive learning, deductive

learning)

Inductive learning: concept learning, decision tree.

Expert systems: Fundamental blocks and architecture, concept of shells, certainty factors, and

rule based systems.

Case studies: MYCIN, DART [08]

UNIT 5 Introduction to evolutionary algorithms: genetic algorithms

Natural language processing: Natural language understanding, Morphological analysis,

semantic analysis, discourse analysis, pragmatic analysis, Problems of Ambiguity.

Parsing: augmented transition network, case grammar, conceptual parsing.

Neural network: Preliminary understanding of unsupervised learning, feed forward nets, back

propagation algorithms. [08]

References:

1. Artificial Intelligence by Rich, Knight and Nair

2. Artificial Intelligence: A Modern Approach by Russell, Norvig

3. Artificial Intelligence by Winston

4. A guide to expert systems by Waterman

DIGITAL IMAGE PROCESSING

CSP 041

L T P

3 1 0

UNIT 1:

Sensor and Imaging: Imaging Optics, Radiometry of Imaging, Illumination sources and

techniques, Camera Principles, Color Imaging, Single Sensor Color Imaging and Color

Demosaicing, Range Images, 3D Imaging. [8]

UNIT 2:

Signal Representation: Vector Space and Unitary Trasnsforms, Multi-Resolutional Signal

Representation, Wavelet Decomposition, Scale space and diffusion, Representation of color,

Retinex Processing, Markov Random Field Modellings of Images. [8]

UNIT 3:

Non-linear Image Processing: Median and Order Statistics Filters, Rank-Ordered-Mean Filters

and Signal Dependent Rank-Ordered-Mean Filters, Two Dimensional Teager Filters,

Applications of nonlinear filters in image enhancement, edge detections, noise removal etc.

[9]

UNIT 4:

Feature Estimation: Morphological Operations, Edge Detection, Edges in multichannel images,

Texture Analysis, Optical flow based motion estimation, Reflectance based shape recovery,

Depth from focus, Stereo matching and depth estimation. [9]

UNIT 5:

Image and Video Compression Standards: Lossy and lossless compression schemes: Transform

Based, Sub-band Decomposition, Entropy Encoding, JPEG, JPEG2000, MPEG-1, MPEG-4, and

MPEG-7. Object Analysis, Classification: Bayesian Classification, Fuzzy Classification, Neural

Network Classifiers, Shape Reconstruction from volumetric data, Knowledge-based

interpretation of images. [9]

References:

1. R.C Gonzalez and R.E. Woods, “ Digital Image Pr ocessing” , Addison Wesley, 1992.

2. A.K.J ain, “ Fundamentals of Digital Image Pr ocessing” , Pr entice Hall of India.

3. Digital Image Pr ocessing – M. Anji Reddy, BS Publications.

MOBILE COMPUTING

CSP 042

L T P

3 1 0

UNIT 1

Prerequisite: Modulation Techniques, Spread Spectrum, Multiple Access Control.

Introduction to Wireless Communication: History of Cellular Systems, Fundamentals of Cellular

Systems, Cellular Infrastructure, Cell Area, Cell Capacity, Frequency Reuse, Co-Channel

Interference, Cell Splitting, Cell Sectoring; Wireless Transmission: Frequency for Radio

Transmission, Signals, Antennas, Signal Propagation. [9]

UNIT 2

Channel Allocation: Fixed, Dynamic, Hybrid, Flexible; Wireless LAN: Infrared, Bluetooth

Architechture & Protocol Stack; Overview of the IEEE 802.11 Standard, IEEE 802.16/16a

Standard for WiMAX, 802.11a/b/g/n (Wi-Fi), ; Wireless Public Networks: Wi-Max. [8]

UNIT 3

Mobile Communication Systems: Architecture: Base Station Subsystem (BSS): Base

Transreceiver Station (BTS), Base Station Controller (BSC), Base Station, Mobile Station,

Network & Switching Subsystem (NSS): Mobile Switching Center (MSC), Registration,

Handoff Parameters, Roaming Support using System Backbone: Home Agents, Foreign Agents,

Mobile IP: Goals, Assumption & Requirements, IP Packet Delivery, Agent Discovery,

Registration, Tunneling & Encapsulation; Adaptive Clustering for mobile networks: Multi-

Cluster Architecture, Cluster Algorithm, Cluster Maintenance. [9]

UNIT 4

Advanced Mobile Phone Systems (AMPS): Characteristics, Operation & Working; Global

System for Mobile Communications(GSM): Frequency Bands & Channels, Frames in GSM,

Identity Number used in GSM, Layers, Planes & Interfaces; Satellite Systems: Types &

Characteristics of Satellite Systems, Satellite Systems Infrastructure; Global Positioning System

(GPS): Limitations & Beneficiaries; General Packet Radio Services (GPRS). [9]

UNIT 5

IMT & UMTS: Deployment and future development of IMT (International Mobile

Telecommunications)-2000/UMTS (Universal Mobile Telecommunication System), Overview

on IMT-2000 radio access technologies, UMTS specification series, UMTS Architecture;

Cellular Systems Generations: 1G, 2G, 2.5G / 2.75G, 3G (IMT 2000), 3.5G/4G; CDMA One /

IS 95 CDMA (2G), CDMA 2000, Migration from GSM to UMTS (WCDMA). [9]

Reference ::

1. William Stallings, “ Wireless Communications & Networks”, Pearson Education, 2nd

Edition 2009.

2. Jochen Schiller, “ Mobile Communications, Pearson Education, 2nd Edition, 2003.

3. Dharma Prakash Agrawal & Qing-An Zeng “ Introduction to Wireless & Mobile

Systems”, Thomson Brooks/Cole, 2nd Edition 2003.

4. Krzysztof Wesolowski, “Mobile Communication Systems “, John Wiley & Sons, Ltd.

5. Ron Olexa, “Implementing 802.11, 802.16 and 802.20 Wireless Networks, Elsevier

DATA WAREHOUSING AND DATA MINING

CSP 043

L T P

3 1 0

UNIT-1

Overview & Concepts- Introduction to Data Warehousing, Data Warehousing Features, Data

Warehouses and Data Marts; Difference between between Operational Database Systems and

Data Warehouses; Data Warehouse Implementation; Multidimensional Data Model, Data

Warehouse Implementation, Further Development of Data Cube Technology, Architecture:

Understanding Data Warehouse Architecture, Architectural Framework. [9]

UNIT-2

Technical Architecture: Introduction to Principles of Dimensional Modeling; Data Extraction,

Transformation, and Loading, OLAP in the Data Warehouse: Demand for Online Analytical

Processing, Major Features and Functions, OLAP Models; From Data Warehousing to Data

Mining,

Data Preprocessing: Needs Preprocessing the Data, Data Cleaning, Data Integration and

Transformation, Data Reduction, Discretization and Concept Hierarchy Generation [9]

UNIT-3

Data Mining: Introduction, Data Mining Functionalities, Classification of Data Mining System;

Data Mining Primitives, Languages, and System Architectures: Data Mining Primitives, Data

Mining Query Languages, Designing Graphical User Interfaces Based on a Data Mining Query

Language Architectures of Data Mining Systems

Concepts Description: Characterization and Comparison: Data Generalization and

Summarization-Based Characterization, Analytical Characterization: Analysis of Attribute

Relevance, Mining Class Comparisons: Discriminating between Different Classes, Mining

Descriptive Statistical Measures in Large Databases [9]

UNIT-4

Mining Association Rules in Large Databases: Association Rule Mining, Mining Single-

Dimensional Boolean Association Rules from Transactional Databases, Mining

Multidimensional Association Rules from Relational Databases and Data Warehouses

Classification and Prediction: Classification by Decision Tree Induction, Bayesian Classification,

Classification by Back propagation, Classification Based on Concepts from Association Rule

Mining [9]

UNIT-V

Cluster Analysis Introduction: Types of Data in Cluster Analysis, A Categorization of

Major Clustering Methods, Partitioning Methods, Density-Based Methods, Grid-Based

Methods, Model-Based Clustering Methods, Outlier Analysis.

Mining Complex Types of Data: Multidimensional Analysis and Descriptive Mining of

Complex, Data Objects, Mining Spatial Databases, Mining Multimedia Databases, Mining Time-

Ser ies and Sequence Data, Mining Text Databases, Mining the World Wide Web. [8]

REFERENCES:

1. Data Mining – Concepts and Techniques - JIAWEI HAN & MICHELINE KAMBER

Harcourt India.

2. Data Mining Techniques – ARUN K PUJ ARI, University Press

3. Building the DataWarehouse- W. H. Inmon, Wiley Dreamtech India Pvt. Ltd..

PARALLEL ALGORITHM

CSP 051

L T P

3 1 0

UNIT 1:

Parallel computing, massive parallel processing, granularity of parallism Computational

demands, advantages of parallel systems. Flynn s classification, controlled parallelism and

scalability. Topologies: Mesh, binary tree, Hyper tree, Cube Connected cycles, shuffle-

Connected Exchange; [8]

UNIT 2:

Uniform Memory Access (UMA & Non uniform Memory Access (NUMA) Multi processor

System. PARAM Model of Parallel Computation, PARAM Algorithms; Parallel Reductions,

Prefix sum, List Ranking, Merging of Two Sorted List. [8]

UNIT 3:

Mapping and Scheduling; mapping of Data from Topology to other (Ring to 2-D Mesh,

Binomial trees to 2-D mesh, Rings & mesh into 2-D Mesh, Ring & Mesh into Hypercube), Load

balancing, Static scheduling on UMA multi processor systems. [9]

UNIT 4:

Applications of parallel computing: Matrix Multiplication, Sorting (bitonic Merge sort, parallel

quick sort, hyper quick sort), Searching a Graph (P-depth search, Breadth-Depth Search, Breath

first search). [9]

UNIT 5:

Parallel Branch and bound algorithms. Graph algorithms, minimum cost spanning tree, single

source shortest paths, all pair’s shortest paths, and algorithms for sparse graphs. Mapping

matrices on processors, matrix transposition, matrix vector multiplication, and matrix

multiplication, solving systems of linear equations. [9]

REFERENCES: 1. Michel J. Quinn, Parallel Computing: Theory and Practice, McGraw-Hill

2. Kai Hwang, Advanced Computer Architecture, McGraw-Hill.

AD-HOC SENSOR NETWORKS

CSP-052

L T P

3 1 0

UNIT 1

Introduction of ad-hoc/sensor networks Key definitions of ad-hoc/sensor networks, Advantages of ad-hoc/sensor networks, Unique

constraints and characteristics of MANET, challenges & Performance parameters of Adhoc

networks, Types & Applications of MANETs, Introduction of sensor network, sensor networks

vs. ad-hoc networks, sensor network limitations, Design issues. [8]

UNIT 2

Routing in Ad Hoc Networks Introduction, Topology based routing protocol- Proactive routing- DSDV, WRP, TBRPF, OLSR,

multipoint relay, STAR, Reactive routing- DSR, AODV, TORA, Hybrid routing approach- ZRP,

FSR, LANMAR, CBRP, Position based routing- Location services- DREAM, quorum based

location service, GLS, home zone, forwarding strategies- greedy packet forwording, Restricted

Directional flooding- DREAM, LAR, RDMAR , Hierarchical routing, Other position based

routing protocols. [10]

UNIT 3

Wireless sensor networks Design Issues, Challenges of Wireless sensor network, Energy consumption, Clustering of

sensors- regularly placed sensor, randomly distributed sensors, Heterogeneous WSNs. Mobile

Sensors, attacks on sensor network routing- Spoofed, altered, or replayed routing information,

selective forwarding, sinkhole attacks, the Sybil attack, Wormholes, HELLO flood attacks,

Acknowledgement spoofing, application of sensor networks. [8]

UNIT 4

Data retrieval in sensor networks Introduction, Classification of WSNs- Architecture of sensor networks, network architecture,

Routing Layer- Network structure based- flat routing- Directed diffusion, sequential assignment

routing, MCFA, coherent and non-coherent processing, energy aware routing, Hierarchical

routing- CBRP, LEACH, PEGASIS, MECN, TEEN, APTEEN, routing in fixed size clusters,

sensor aggregates routing, Hierarchical power- Aware routing, flat versus Hierarchical. [8]

UNIT 5

Security Introduction, distributed system security, security in Ad- Hoc networks- requirements, security

solutions constraints, challenges.

Key Management- background, Diffie- Hellman key agreement, N- Party Diffie- Hellman Key

agreement, The tree based generalized Diffie-Hellman protocol, Cooperation in MANETS,

WSN security, Key distribution and management, Requirements for bootstrapping security in

sensor networks, key distribution techniques in sensor networks- using a single network-wide

key, using pair wise-shared keys, random key pre-distribution scheme, security protocols for

sensor network, general consideration of using public key method, SPINS: SNEP AND

µTELSA. [10]

REFERENCES:

1. AD HOC & SENSOR NETWORK “Theory and Application” by Carlos de Morais

Cordeiro, World scientific press.

2. “Wireless Ad Hoc and Sensor Networks” by Houda Labiod , Willy Publication

EMBEDDED SYSTEM

CSP 053

L T P

3 1 0

UNIT I

Introduction to embedded systems: embedded system, processors in the system, software

embedded into a system. Processor and memory organization: structural units, processor

selection, memory devices, memory selection, DMA Application areas and recent trends.

[9]

UNIT II

Devices and buses for device network: I/O devices, timer and counting devices, serial

communication. Device drivers and interrupts servicing mechanism: device drivers, parallel port

and serial port device drivers, interrupt servicing mechanism, context, context switching,

deadline and interrupt latency. [9]

UNIT III

Microcontroller 8051: hardware architecture, pin description. 8051 assembly language

programming: introduction, PC, ROM space, Flags, register banks and stacks. Jump, loop and

call instruction, time delay generation and calculations. I/O programming, bit manipulation.

Addressing modes and arithmetic instructions and programs. [9]

UNIT IV

8051 assembly language programming continued: logic instructions, rotate and swap, BCD and

ASCII application programs. Timer/counter programming in 8051. 8051 interrupts, timer

interrupts, external hardware interrupts, interrupt priority in the 8051. [9]

UNIT V

Inter process synchronization and communication, data sharing. Real time operating system,

RTOS task scheduling models. [8]

References:

1. Embedded systems - Raj Kamal

2. The 8051 microcontroller and embedded systems – Mazidi and Mazidi

3. Embedded system design – Frank Vahid & Tony Givargis

4. The 8051 microcontroller – Kenneth Ayala

ADVANCED CLOUD COMPUTING

CSP-054

L T P

3 1 0

Unit-I

Introduction to Cloud Computing : Definition(s) of Cloud Computing, Characteristics of

Cloud, Cloud Deployment Models, Cloud Service Models, Driving Factors and Challenges of

Cloud and Overview of Applications of Cloud.

Cloud Concepts & Technologies: Virtualization, Load Balancing, Scalability & Elasticity,

Deployment, Replication, Monitoring, MapReduce, Identity and Access Management, Service

Level Agreements and Billing

Unit-II

Cloud Services and Platforms : various types of cloud services including compute, storage,

database, application, analytics, network and deployment services.

Hadoop & MapReduce: Overview of Hadoop echosystem, MapReduce architecture,

MapReduce job execution flow and MapReduce schedulers.

Unit-III

Cloud Application Design: cloud application design considerations, cloud application reference

architectures, design methodologies such as SOA, CCM and MVC, data storage technologies

and cloud deployment approaches.

Big-Data Analytics: big data analytics approaches: approaches for clustering big data,

approaches for classification of big data and recommendation systems.

Unit-IV

Cloud Security: Cloud security challenges, approaches for authorization authentication, identify

& access management, data security, data integrity encryption & key management.

Cloud Application Benchmarking & Tuning: cloud application workload characteristics,

performance metrics for cloud applications, cloud application testing, performance testing tools

and a load test and bottleneck detection case study.

Unit-V

Cloud Computing Case-Studies: Review of Technical papers from Major journals (IEEE

Transactions) and major conferences (IEEE / Springer etc.) on Cloud

Computing / Software Engineering / Other Thrust Areas and Presentations by Students on their

understanding of the same, after reviewing the papers concerned.

Text-Book:

Cloud Computing A Hands-on Approach by A. Bagha & V. Madisetti [ ISBN: 978-81-

7371-923-3 ] Published by University Press, pp. 456, Printed in 2014.

Additional References:

Distributed and Cloud Computing From Parallel Processing to the Internet of Things by

K. Hwang, G.C. Fox, J.J. Dongarra [ISBN: 978-93-81269-23-7 ] Published by Elsevier

India Pvt. Ltd., pp. 648, Printed in 2013.

Cloud Computing: Principles, Systems and Applications, Editors: Nikos Antonopoulos,

Lee Gillam, Springer, 2012.

Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya, James Broberg,

Andrzej M. Goscinski, Wile, 2011

Cloud Computing Bible, Barrie Sosinsky, Wiley-India, 2010

Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald L. Krutz,

Russell Dean Vines, Wiley-India, 2010