AC 19/3/2012 Item No. 4.



Syllabus for the T.Y. B. Sc. Sem. V & VI Program: T.Y.B.Sc. Subject: Information Technology

(with effect from the academic year 2012–2013)

Semester V
Paper 1: Network Security Paper 2: *ASP.NET with C# Paper 3: Software Testing Paper 4: *Advanced Java Paper 5: *Linux Administration

Semester VI
Paper 1: *Internet Technologies Paper 2: Digital Signals and Systems Paper 3: *Datawarehousing Paper 4: Elective: IPR and Cyber Laws Project Management GIS

Paper V: Project Report Paper VI: Project Viva-Voce

Collision-free Hash Functions The Birthday Attack. Cryptanalysis of the Vigenere Cipher. Factoring Algorithms in Practice Unit-II Signature Schemes : Introduction. Electronic Mail Security. MTI Key Agreement Protocols. The Permutation Cipher. Dixon’s Algorithm and the Quadratic Sieve. Attacks On RSA. The Rabin Cryptosystem. Security Services. The Affine Cipher. The Vigenere Cipher. The Hill Cipher. Key Predistribution . Key Agreement Using Self-certifying Keys. Huffman Encodings and Entropy. The DES Controversy. The ElGamal Signature Scheme. Fail-stop Signatures Hash Functions Signatures and Hash Functions. Perfect Secrecy. Properties of Entropy. and Problems. DES Modes of Operation. Hash Functions from Cryptosystems. An Attack on a 6-round DES. An Example of DES Encryption. X.CLASS: B. Blom’s Scheme. Key Distribution and Key Agreement Introduction.1 Method. A Model for Network Security Unit-IV Authentication Applications: Kerberos. The OSI Security Architecture. A Data Compression Using Zip. PGP Random Number Generation Unit-V IP Security: IP Security Overview. Key Terms. Cryptanalysis of the Substitution Cipher. Authentication Header. Undeniable Signatures. Pretty Good Privacy. Spurious Keys and Unicity Distance The Data Encryption Standard. Cryptanalysis of the LFSR-based Stream Cipher. A Kerberos Encryption Techniques. Review Questions. Implementing RSA. Encapsulating Security Payload. Combining Security Associations. IP Security Architecture. Timestamping. Other Useful Facts. The MD4 Hash Function. The Decryption Exponent. Cryptanalysis. The Euclidean Algorithm. Recommended Reading and Web Sites. Unit-III Security Trends. Differential Cryptanalysis. Stream Ciphers. SUBJECT: Network Security Periods per week Lecture 1 Period is 50 minutes TW/Tutorial/Practical Evaluation System Theory Examination TW/Tutorial/Practical Semester – V 5 3 Hours 2 -Marks 60 40 Unit-I Cryptography: Introduction: Some Simple Cryptosystems. The Substitution Cipher. Diffie-Hellman Key Predistribution. Description of DES. An Attack on a 3-round DES. Cryptanalysis of the Affine Cipher. One-time Signatures. Extending Hash Functions. The Digital Signature Standard. Sc (Information technology) Paper I. Review Questions. DES in Practice. Partial Information Concerning Plaintext Bits. The Chinese Remainder Theorem. Key Terms. Introduction to Public-key Cryptography. S/MIME. Factoring Algorithms. Security Attacks. and Problems. The p . A Discrete Log Hash Function. Diffie-Hellman Key Exchange. More Number Theory. The RSA Cryptosystem. A Time-memory Trade-off. Radix-64 Conversion. Probabilistic Primality Testing. The Station-to-station Protocol. Key .509 Authentication Service. Security Mechanisms. Shannon’s Theory. Public-Key Infrastructure. Entropy. The Shift Cipher. Kerberos.

Recommended Reading and Web Site. Ankit Fadia and J. Encryption. PHI(Pearson). CRC Press LLC (Unit I and II) Cryptography and Network Security Principles and Practices. Secure Electronic Transaction. Common Criteria for Information Technology Security Evaluation. student series. Saurabh Sharma. d Write a program to perform substitution ciphers to encrypt the plain text to monoalphabetic cipher and to decrypt it back to plain text. CRC Press. Malicious Software: Viruses and Related Threats. c Write a program to perform substitution ciphers to encrypt the plain text to homophonic cipher and to decrypt it back to plain text. Trusted Systems.Management. Books: Cryptography: Theory and Practice. Key Terms. Douglas Stinson. b Write a program to perform transposition ciphers to encrypt the plain text to cipher and to decrypt it back to plain text using Simple Columnar technique. Security. c Write a program to perform transposition ciphers to encrypt the plain text to cipher and to decrypt it back to plain text using Columnar with multiple rounds. Firewalls: Firewall Design Principles. Bhattacharjee. Secure Socket Layer and Transport Layer. Password Management. e Write a program to perform substitution ciphers to encrypt the plain text to homophonic cipher and to decrypt it back to plain text. b Write a program to perform substitution ciphers to encrypt the plain text to Modified Caesar cipher and to decrypt it back to plain text. (Unit: III-VI) References: Information Security and cyber laws. 2 Transposition Ciphers a Write a program to perform transposition ciphers to encrypt the plain text to cipher and to decrypt it back to plain text using rail fence technique. Vikas publication. D Write a program to encrypt a plain text to a cipher text and decrypt it back to plain text . Practical List: 1 Substitution Techniques a Write a program to perform substitution ciphers to encrypt the plain text to Caesar cipher and to decrypt it back to plain text. Unit-VI Intruders: Intrusion Detection. Write a program to perform substitution ciphers to encrypt the plain text to f polyalphabetic cipher and to decrypt it back to plain text. Web Security: Web Security Considerations. Virus Countermeasures. Distributed Denial of Service Attacks. Recommended Reading and Web Sites. Vikas publication Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. William Stallings. Fourth Edition.

NET frameworks. Rich TextBox. OOPs with C#. CheckBox. IDEA d. Radio Button.3 4 5 6 7 using vernam cipher as the transposition technique Write a program to generate Symmetric Keys for the following Cipher algorithms DES. Variables and expressions. Checked List Box. Sc (Information technology) Paper II. Link Label. Introduction to ASP. Comparisons and Conversions. Building MDI applications. SUBJECT: ASP. and then decrypt the encrypted string and compare the decrypted string with the input string. List View. a colon. Windows programming: Controls(Button.NET lifecycle. Unit-III . Triple DES Write a program to encrypt input string by using SecretKey of the following algorithms. Write a program to encrypt input string by using SecretKey of the following algorithms. JSHash. Use the following algorithms for encryption and decryption: a. Text Box. Assembly. Blowfish. exporting and validating Digital Certificate. AES. The permission name consists of a book id. DJBHash 8 Write a program to encrypt the given string by using RC4 .NET 4: Microsoft. Write a program to generate assymmetric Keys for the following Cipher algorithms a) DSA (Digital Signature Algorithm). SDBMHash. flow controls.NET framework. Defining classes and class members. MD5. Components of Assembly. Label . Garbage Collector. algorithms. DES b. ASP. debugging and error handling. and then decrypt the encrypted string and compare the decrypted string with the input string. c) RSA. HmacMD5 and HmacSHA1. BlowFish c. AES c. b) DH (DiffieHellman). RSA b. List Box. SDI and MDI applications. BKDRHash. 9 Write a program for creating. Private and Shared Assembly. TripleDES. Tabbed ).NET with C# Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – V 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Unit-II Review of . Use the following algorithms for encryption and decryption: a. and a set of allowable pages. Delegates and Events. Namespaces Collections. 10 Create a permission that controls access to pages of a book. JIT compiler. CLASS: B. functions. DSA Implement following HashFunctions: RSHash. Introduction to C#. Forms (Menus and ToolBars.

config and global.ADO. Reprint 2011.NET Security: Authentication. J. ADO.NET. C. J. Crystal reports.asax files. what Boolean test can you perform to see if one or the other (but not both) is greater than 10? .NET architecture. M. programmatic redirection User Controls: Introduction to user controls Validating User Controls Databases: Introduction.NET. effects with JQuery.NET CSS: Need of CSS. Hint: you may recall that the Convert.NET web pages: Introduction.Esposito. retrieving and manipulating data with SQL. Using ASP.Unit-IV Unit-V Unit-VI Themes in ASP. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. JQuery syntax. Reprint 2011 (Unit III to VI).NET data control. (Unit I and II). Query Syntax ASP. Working with CSS with visual developer ASP. Simple Programs with C#: a) Write a console application that obtains four int values from the user and displays the product. ASP. Web Services and Page methods in AJAX websites. Caching. statements. Impersonation.NET Ajax: Introducing AJAX.NET server controls: Types of control.NET. LINQ to objects. organizing code.XML.NET Visual C#. ASP. References: Programming ASP. Using SQL to work with database. I. Web.0 programming.H Padderson. the equivalent command to convert from a string to an int is Convert. Patel. deploying the web site.NET Technology. LINQ: Operators. Master Pages. working with ADO. object oriented basics. Dreamtech.NET 4. Beginning ASP. data source control. K. Vijay Nicoel. Authorization. Microsoft Press (Dreamtech). ASP. Navigation: Using navigation controls.NET. Tata McGraw-Hill (Unit III to VI). D. b) If you have two integers stored in variables var1 and var2. Watson. implementations. JQuery and extensibility. ASP.ToInt32(). Reid. Spanjaars. Introduction to CSS.Skinner. Nagel. ASP.NET 4 in C# and VB. Wrox (Wiley) 2010.NET AJAX. Programming ASP. Kanjilal.NET state management engine.ToDouble() command was used to convert the input from the console to a double. JQuery: Introduction to JQuery. Practical: 1. modifying DOM with JQuery.D.NET provider model ASP. data types and variables. J. Books: Beginning Visual C# 2010. TMH Advanced .

9. Programs using different controls. f) Write an application that receives the following information from a set of students: Student Id: Student Name: Course Name: Date of Birth: The application should also display the information of all the students once the data is entered. obtains two numbers from the user. Database programs with ASP. Generate Fibonacci series. 2. Test for prime numbers. Use of foreach loop with arrays. Test for vowels. Object oriented programs with C# a. respectively. 6. diamond and other patterns) with numbers. . iv. Programs using AJAX. v. Generate prime numbers. Programs using Language Integrated query.NET and ADO.NET Server controls. Programs using JQuery. but rejects any input where both numbers are greater than 10 and asks for two new numbers. Programs securing web pages. vi. and displays them. ii. Program with different features of C# Function Overloading Operator Overloading Inheritance (all types) Constructor overloading Interfaces Using Delegates and events Exception handling 3. vii. Then display these values. Programs using CSS.c) Write an application that includes the logic from Exercise 1. 4. Reverse a number and find sum of digits of a number. Program using classes. 8. g) Write programs using conditional statements and loops: i. iii. 10.NET 7. b. d) Write a console application that places double quotation marks around each word in a string e) Write an application that uses two command-line arguments to place values into a string and an integer variable. 5. Programs using ASP. Generate various patterns (triangles. Implement this using an Array of Structs.

(PHI) EEE edition. M. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. Techniques and Tools. Managing the Testing Process: Practical Tools and Techniques for Managing Hardware and Software Testing. Jorgensen. Perry. Interaction Testing Object Oriented Testing: Issues. Equivalence class testing. Functional Testing: Boundary value Testing. Wiley. Rex Black. . VV model of testing. Improvements. Integration Testing. Retrospection. Decision Table based testing. Cambridge University Press.SAMS Software Testing. Second Edition. Software Testing. Abhishek Srivastava. Jeff Offutt. SUBJECT: Software Testing Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – V 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Introduction to quality. CRC Press. System Testing. Quantitative and Qualitative Analysis. Metrics and Reports.Ron Patton. Class Testing. Cambridge University Press. Sc (Information technology) Paper III. Structural Testing: Path Testing. Limaye. TMH. Unit-II Unit-III Unit-IV Unit-V Unit-VI Books: Software Testing Principles. software quality. Wiley India. Retrospection Levels of Testing. Paul C.G.(Unit-II to V) References: Software testing by Yogesh Singh.I and VI) Software Testing A Craftman’s Approach. (Unit. Second Edition. Object Oriented System Testing Testing Process: Planning. Object Oriented Integration Testing. Data Flow Testing.CLASS: B. Software testing by Sandeep Desai. fundamentals of software testing. Paul Ammann. 2012 Introduction to Software Testing.

Equivalence class testing c. Unit Testing e. Prepare a small project and submit SRS. Boundary value Testing b. Decision Table based testing d. ( e. 10. 7.etc) 3. design the test plan for unit testing.g winrunner. 2. testdirect. coding and test plan. Functional Testing a. For automated testing. Blackbox Testing d. Integration Testing 4. Path testing b. Implement the process Object oriented testing 9. Study of any one of the testing tools. AUTOMATED TESTING for websites a. design the test plan and test cases for integration testing on the given case. For automated testing. design. Data-flow testing 6. Walkthrough b. MANUAL TESTING for the project a. Load Testing(use WAPT) b. Structural Testing a. . Whitebox Testing c. Regression Testing (use VTEST tool) using automated testing for website.Practical: 1. Performance Testing(use WAPT) 8. Cause-effect graphs 5.

CLASS: B. what is JSF?. JSP elements. Lifecycle of JSP. creating a servlet. packaging beans. getting started with struts. JSF configuration. Executing SQL statement. Building a web services using JAX-WS. servletConfig interface. creating web applications. Writing the application. implicit objects. metadata. Servlet Lifecycle. creating a web application(using netbeans) . Building web service. creating a java bean class. JSF pages) EJB: Enterprise bean architecture. JFrames. Comments. Action elements. ServletInputStream And ServletOutputStream Classes. creating database and tables in MySQL. JSF as an application. HttpServletRequest and HttpServletResponse Interfaces. Benefits of enterprise bean. SUBJECT: Advanced Java Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – V 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Unit-II Swing: Event Handling. Directory service. JSF web applications (login form.HttpServlet Class.RequestDispatcher Interface. characterquoting conventions. JNDI: NAMING Service. application development approach. JAVAMAIL API. components of JSF. unified expression language. ServletRequest and ServletResponse Interfaces. JAVAMAIL: Mail Protocols. Struts framework core components. creating hibernate configuration and mapping file. java servlet technology. compiling and building the web application JDBC: Design of JDBC. Resources and JNDI. HttpSession Interface. Working with servlets: organization of a web application. types of beans. Component Organizers Introduction to servlets: Need for dynamic content. Lists . Accessing beans . Starting with API. . creating JSP file. building and running web application. Text Components. why servlets? Servlet API and Lifecycle: servlet API. Trees. JSP: Introduction. creating JSPs. creating web client. JSP v/s Servlets. installing and setting up struts. scope. creating a web application. creating enterprise bean. Scrollable and updatable result sets. Components of the Javamail API. row sets. JNDI. Transaction. Tables. JSF lifecycle. disadvantages. STRUTS: Introduction. JDBC configuration. Unit-III Unit-IV Java server Faces : Need of MVC . Sc (Information technology) Paper IV. JSP documents. Unit-VI WEB Services: SOAP. Unit-V HIBERNATE: Introduction. Adding the required library files. adding a mapping resource. GenericServlet Class. Progress Indicators. Query Execution.

appropriate image of planet displayed in right screen. Develop a Room Reservation System Application Using Enterprise Java Beans. /. B M Harwani. Practicals: 1. %) using ServletInputStream and ServletOutputStream. 2. Develop Servlet Application of Basic Calculator (+. When user selects the planet name form Left screen. JPA and struts 2 for beginners.Develop a simple Struts Application to Demonstrate E-mail Validator. 4. Dreamtech. Write a java program to demonstrate typical Editable Table. Seventh Edition.*. Gary Coronell. Develop a JSP Application to accept Registration Details form user and Store it into the database table. Herbert Schildt. 3. one part contains the names of Planets and another Displays the image of planet. Develop a Hibernate application to store Feedback of Website Visitor in MySQL Database. Pearson (Unit I and III) Java Complete Reference. Eight Edition. Savaliya. SPD Java Programming A practical Approach. McGraw Hill Java Server Faces A practical Approach for beginners. 11. 9. c. 8. 5. Develop an application to show searching the Directory using JNDI capabilities. Cay S. Sharanam Shah. 12. b. Develop a web application to add items in the inventory using JSF. a . Vaishali Shah. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. 7. . If login success the forward user to Index Page otherwise show login failure Message. Advanced Java Technology. Develop Simple Servlet Question Answer Application to demonstrate use of HttpServletRequest and HttpServletResponse interfaces. Eastern Economy Edition (PHI). Develop a Simple Web Service and Client with JAX-WS. Develop a JSP Application to Authenticate User Login as per the registration details. Write a java program to present a set of choices for a user to select Stationary products and display the price of Product after Selection from the list. describing employee details for a software company. Develop a simple “Hello World” Web Service with SOAP in Java. II – Advanced Features.Books: Java EE 6 for Beginners.-. 6. C Xavier. a. SPD (Unit II to VI) Core Java Vol. Horstmans.Develop a simple Struts Application to Demonstrate 3 page Website of Teaching Classes which passes values from every page to another. Shah.TMH. 10. (Unit I) References: Java EE Project using EJB 3. b. Write a java program using Split pane to demonstrate a screen divided in two parts.

sftp Less Secure Services (Telnet . Network Configuration Files. . Installing and Configuring Servers. Optimizing Network Services Internet Services: Secure Services. Working with LinuxSupported File Systems. Configuration Tool. Using Tools to Monitor Security Booting and shutting down: Boot loaders-GRUB. Configuring the Network Using the Network. Working with Gateways and Routers. Enabling and disabling services.CLASS: B. Configuring the xinetd Server. Configuring Linux Firewall Packages. Editing Your Network Configuration TCP/IP Networking: Understanding Network Classes. System Environmental Settings. Connecting from a Windows PC to the Samba Server Additional Network Services: Configuring a Time Server. Creating Samba Users 3. The File System: Understanding the File System Structure. Monitoring and Tuning Performance. Comparing xinetd and Standalone. Installing and Configuring Application Software. Setting Up a Network Interface Card (NIC). Configuring an NFS Server. SUBJECT: Linux Administration Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – V 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Introduction: Introduction to UNIX. Linux Machine as a Server. Examining NFS Security Unit-II Unit-III Connecting to Microsoft Networks: Installing Samba. Configuring the Samba Server. Managing the init Scripts. The Network File System: NFS Overview. Backing Up and Restoring Files. GNU and Linux distributions Duties of the System Administrator.finger. Starting the Samba Server. Providing a Caching Proxy Server. Using Automount Services. Memory and Virtual File Systems. Sc (Information Technology) Paper V. scp. Configuring a Secure System. The Linux System Administrator. LILO. Creating and Maintaining User Accounts. Understanding Subnetting. Configuring Dynamic Host Configuration Protocol. Linux Disk Management Network Configuration Files: System Configuration Files: System wide Shell Configuration Scripts. sync. Planning an NFS Installation. SSH.FTP. Bootstrapping. Init process. Linux.rsh . rc scripts. Connecting to a Samba and ntalk. Configuring an NFS Client.rlogin.

Richard Petersen. 2. Linux Administration: A Beginner's Guide. Installation of Red HAT/Fedora Linux operating system. Implementing SSI. Examining Server Configuration Files. Using the Postfix Mail Server. Creating password and user accounts f. Mail User Agent (MUA). Using SFTP Configuring a Web Server: Introducing Apache. Understanding Types of Domain Servers. Tata McGraw-Hill. Optimizing DNS Services. Enabling CGI. Das. Optimizing Internet Services: Optimizing LDAP Services. Setting time zones e. Configuring an RSS Feed. Serving Email with POP3 and IMAP.Unit-IV Unit-V Unit-VI Domain Name System: Understanding DNS. Red hat Linux Networking and System Administration by Terry Collings References: 1. Fifth Edition. Configuring Sendmail. Configuring a Caching DNS Server. Wale Soyinka. 6th Edition. Programming Shell scripts for Linux administration . Checking Configuration Configuring Mail Services: Tracing the Email Delivery Process. Introducing SMTP. Optimizing Web Services System Administration: updating system. upgrading and customizing kernel. Practical: 1. Administering Users and Groups Installing and Upgrading Software Packages Books: 1. Maintaining Email Security Configuring FTP Services: Introducing vsftpd. Configuring boot loader (GRUB/LILO) c. a. UNIX: Concepts and techniques. Setting Up Web-Based Email. Enabling PHP. Configuring Apache. Network configuration d. Creating a Secure Server with SSL Providing Web Services: Creating Mailing Lists. Software selection and installation 3. Configuring vsftpd. Adding Search Functionality. Optimizing Mail Services. Partitioning drives b. Beginning Linux by Neil Mathew 4th Edition 2. Tata McGraw-Hill 3. Configuring a Secondary Master DNS Server. Configuring a Primary Master Server. Tata McGraw-Hill Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. Advanced FTP Server Configuration. Linux: Complete Reference. S. Optimizing FTP Services. Shutting down 2.

The Apache web server d. 10. Securing linux with IP table firewalls c. LAN topologies b. IP address classes 7. Setting up local area network a. Administrative commands e. Setting up FTP server e. Install KDE. Configuring mozilla or firefox to use as a proxy 6. Programming using C. Configuring TCP/IP e. Setting up NFS file server b. Connecting to the internet and configuring samba a.4. Administrative configuration files 5. c. Accessing X-window remotely. LAN equipment c. Linux system administration a. Setting up linux as a proxy server e. Working with X-windows a. Display and Control a Remote Desktop using VNC. Setting up dial-up PPP b. Installing TrueType fonts from my MS Windows partition. Launching PPP connection d. Using graphical administrative tools d. e. 11. f. Configuring an IP table firewall d. Becoming super user b. set up my video card. Setting up hardware devices including sound card and printers and others(USB devices etc). Adding windows computer’s to user LAN f. Setting up proxy server 8. Creating a dial. monitor and mouse for the X-server. . change default desktop to KDE (or Gnome) d. Server setup and configuration a. Understanding COMPUTER SECURITY: Firewall and security configurations a. LINUX security checklist b. Setting up Samba file server c.up connection with the internet configuration wizard c. Securing Linux features 9. 12. Networking with TCP/IP d. Switching between text and graphical consoles b. Implementing Socket programs. Temporarily changing user identity with su command c.

TMH (Unit I – V) Internetworking with TCP/IP. User Datagram Protocol (UDP). Volume II. Douglas E.Siva Selvan. PHI (Unit VI) References: Internetworking with TCP/IP. D.P. Stream Control Transmission Protocol (SCTP) Host Configuration: DHCP. Third Edition. Stevens.L. 4th Edition . Second Edition. Unicast Routing Protocols (RIP.N.Mobile IP. IPV 4 and IPV6 Addresses and Protocol Address Resolution Protocol (ARP). TCP/IP Protocol Suite. Eastern Economy Edition. PHI TCP/IP Illustrated.CLASS: B. File Transfer: FTP and TFTP World Wide Web and HTTP. SUBJECT: Internet Technologies Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Introduction: OSI Model. Volume I. OSPF and BGP) Transport Layer. Douglas E. Behrouz A. Fifth Edition. Comer. Network Layer. Electronic Mail: SMTP. Stevens. Forouzan. Multimedia Client Server Programming: Concurrent Connection Oriented (TCP) and Connectionless programming(UDP). Gopalan. D. Remote Login: TELNET and SSH.L. Iterative connectionless(TCP) and connection oriented servers(UDP. Sc (Information technology) Paper I. Network Management: SNMP. Unit-II Unit-III Unit-IV Unit-V Unit-VI Books: TCP/IP Protocol Suite. Comer.Internet Control Message Protocol Version 4 (ICMPv4). POP. Transmission Control Protocol (TCP). B. . Comer. PHI Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. Volume III. PHI Internetworking with TCP/IP. Domain Name System (DNS). Douglas E. IMAP and MIME.

6. Initial and final value theorems. S-plane Poles and zeros. Write a JAVA client/server UDP code in which a client greets the server and the server send date and time to the client. 10 Write JAVA client/server UDP code where client send series of numbers to server and server returns greatest among them. Write a JAVA code to implement the routing algorithm for RIP. simple manipulations of discrete time signals. classification of signals. Fourier transforms of power and energy signals. Write a JAVA code for TCP echo Server application. trigonometric Fourier series. Write a JAVA code to find the shortest path between two points in the network. Complex or exponential form of Fourier series. definition. Write aJAVA code to simulate the main module of TCP. CLASS: B. 5. Power spectrum of a periodic function. Continuous Time and discrete time signals. 2. Application of LT in analysing networks. Write a JAVA client/server TCP code to illustrate simple chat application. convolution integral. Table of Laplace transforms. LT of periodic functions. Unit-II Applications of Laplace Transform to System Analysis Introduction. 4. 8. amplitude and phase spectra. 1. partial fraction expansions. SUBJECT: Digital Signals and Systems Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Classification of Signals and systems: Introduction. 9. analog to digital conversion of signals Fourier Analysis of Periodic and Aperiodic Continuous Time Signals and Systems: Introduction. 7.Practical: Write a function in JAVA to simulate the cache control. network transfer function. . Parsevals identity for Fourier series. Write a JAVA client/server TCP code in which a client sends a number to server and server responds by returning its factorial. Fourier transforms of some important signals. 3. classification of systems. region of convergence (ROC) LT of some important functions. Fourier transform and its properties. Write a JAVA code that calculates the checksum of UDP datagram. Sc (Information technology) Paper II. input and output modules of ARP.

Computing an inverse DFT by doing direct DFT.Unit-III Z Transform: Introduction. Willsky with S. Composite radix FFT. PHI (EEE) Digital Signal Processing by Apte. Second Edition. impulse response and frequency response. Fast (Sectioned) convolution. solution of linear constant coefficient difference equation. Salivahanan. Unit-VI Finite Impulse Response (FIR) Filters Introduction. Hamid Nawab. TMH Signals and systems by A Anand Kumar (PHI) 2011 Signals and Systems by Alan V. Frequency domain representation of discrete time signals and systems. Oppenheim and Alan S. Gnanapriya Second Edition. discrete Fourier series. Elliptic filters. C. Mitra. Difference equation and its relationship with system function. Design techniques of FIR filters. Correlation. evaluation of inverse z-transform. Discrete convolution. properties of DSP system. Discrete time Fourier transform (DTFT). TMH References: Digital Signal Processing by Sanjit K. Infinite Impulse Response (IIR) Filters: Introduction. magnitude response and phase response of digital filters. Fast Fourier transform (FFT). Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. . Linear Time Invariant Systems: Introduction. properties of z-transform. Butterworth filters. design of optimal linear phase FIR filters. Wiley India. IIr filter design by the bilinear transformation. Unit-IV Unit-V Discrete and Fast Fourier Transforms: Introduction. Chebyshev filters. frequency response of linear phase FIR filters. IIR filter design by impulse invariant method. IIR filter design by approximation of derivatives. Third Edition. frequency transformation. Books: Digital Signal Processing by S. Second Edition. definition of z-transform.

Find DFT and IDFT of the given sequence. Write a program to demonstrate correlation property. spider web environment. volumes of data. components of datawarehouse environment. star schema. 9. Write a program to implement/Design of FIR Filter using Frequency Sampling Technique. Write a program to implement low pass. Exponential Sequence d. Sc (Information technology) Paper III.0 environment. data mart. Write a program to study and implement Discrete Time Signals and systems. high pass and band pass filters. Write a program to implement Frequency Response of First order Difference Equation. what is datawarehouse? . a. CLASS: B. 4. Write a program to implement Z-Transforms. . Z-transform of Finite duration signals b. evolution to DW 2. Write a program to demonstrate convolution property. integrating data. Exponential Decreasing Sequence f. federated data warehouse. 10. Even Signals g. evolution of data warehouse from the business perspective. Unit Ramp Sequence c. personal computers and 4GL technology. data warehouse environment. 5. Write program to a. Odd Signals 2. 7. other notions about data warehouse. Exponential Increasing Sequence e. Write a program to perform linear filtering (linear convolution using DFT. Unit Step Sequence b. 6.Practical : ( To be conducted using Scilab / MATLAB) 1. SUBJECT: Data warehousing Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I History of data warehousing: database management system. Determine N-Point DFT. b. Time shifting property of Z transform 3. different development approach. business impact of the data warehouse. a. evolution from business perspective. Write a program to implement circular convolution using DFT 8.

integrated sector. Time-collapsed data. using metadata – an example. metadata. falling probability of data access. enterprise knowledge coordination stream. reporting in DW 2. infrastructure stream. data flow into integrated sector. ETL processing and DW: changing states of data. transaction monitor. enterprise reference model. changed data capture. creating ETL. maintaining metadata. firewall. seven streams approach. nonoverlapping records. scope of integration. encryption. metadata in archival sector. ETL and throughput. more complex transformation. time variance in the archival sector. information factory development stream. DW and security: Protecting access to data. a sequence of records. A backflow of data. ETL mapping. freezing data. application data to corporate data. exception flow of data. Flow of data in DW: flow of data throughout the architecture.Introduction: Lifecycle of data warehouse. Taxonomy. Unit-II Metadata in DW: Reusability of data analysis. Monitoring the DW environment: Monitoring DW environment. ETL and data quality. volumes. Where ETL fits. beginning and ending a sequence of records. datawarehouse monitor. direct dump. drawbacks. limiting encryption. Archival sector. archival sector. discrete data. Data correction stream. ETL and metadata. structures data/ unstructured data. frequency of analysis. statistical analysis. corporate data model. moving data offline. Transactions in integrated sector. near line. data models and interactive sector. data relativity elsewhere in DW. transformation of models.0. levels of the data model. sources for exploration processing. changing business requirements. data models and unstructured data. continuity of data. reasons for different sectors. ETL and rejects. sensing an attack. transaction monitor. continuous time span data. Time relativity in the interactive sector. end user perspective. Near Line sector. security for near line data. metadata and the system record.0 and referential integrity. monitoring data quality. entering the interactive sector. role of ETL. Data models and DW: datamodel and business. ETL in online mode and batch mode. Active/ passive repository. Time variant data: All data in DW. ETL data quality monitor. flow of data within DW 2. Textual analysis. integrity of comparison. ETL and rejects. heuristic analysis. perspective of business analyst. ELT Unit-III Unit-IV . useful applications. peak period processing. perspective of business user. specific text. exploration processing. datawarehouse monitor. metadata – a major component. DW 2. Dormant data. blather. project based data. Methodology and Approach for DW: Spiral model methodology. Total information quality management stream.0 DW components: Interactive sector. exploration facility. issue of terminology. Access of data. Statistical processing and DW: Two types of transaction. enterprise metadata. Metadata. Internal and external taxonomy. refreshing exploration data. source and target. local metadata. using exploration data internally. code creation or parametrically driven ETL. ETL and an audit trail. Changed data capture. Data marts and exploration facility. making the distinction between granular and summarized data.

filtering data. Perform the cube analysis on MOLAP 6. Practical List: 1. choosing the proper hardware. 3. separating farmers and explorers. monitoring the environment. access and sql and integrate it in SQL server. DW and performance: online response time.Inmon. functions of the granularity manager. separation of transactions into classes. raising the level of granularity. analytical response time. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. many facets to performance. service level agreements. Perform the cube analysis on ROLAP Perform the cube analysis on HOLAP . The Data Warehouse Lifecycle toolkit”.H.H. Extract the data from excel . “Data Warehousing Fundamentals”. physically group data. Queues. flow of data. Wiley. building the metadata infrastructure. analytical productivity and response time. Ralph Kimball . W. end user education. parallelization for transaction processing. adding archival sector. 2. Perform the same process using DTS package 4. capacity planning.0 The architecture for Next Generation of Datawarehousing W. Inmon. metadata. protecting the interactive sector. data marts. exploration facilities.Unit-V DW and granularity manager: granularity manager. third Edition. John Wiley. ELSEVIER. Unit-VI DW2. parallelizing the granularity manager. heuristic processing. Design the star schema and create a cube using OLAP services 5. TMH . swallowing source system. migration to the unstructured environment. 7. data warehouse deployment. indexing. batch parallelization. growth and maintenance. Datawarehousing. (Unit VI) References: Building the data warehouse. ETL as shock absorber. Implementation And Maintenance: Physical design process. creating enterprise metadata. Derek Strauss.John Wiley. workload management. Mohanty. Migration: Migration in perfect world. adding components incrementally. Genia Neushloss. Create around 25 records and design the Chart view using Excel. (Unit I to V) Paulraj Ponnian. partitioning data. homegrown versus third party granularity manager. S. removing dormant data. Create around 25 records and design the tabular view using Excel.

where the total items sold are stored. each product includes a description of the product and its price. Consider a data warehouse storing data about sales. Retrieve the cube data into the excel sheet and present the information in tabular and graphical form. Devise the relational schema (specifying the relations. Design at least five queries for the created cube using MDX application.e. Consider to add a new level product categories to the product dimension. ii. i.8. Devise the new relational star schema. Write a SQL query to answer the following question: ”Which customer(s) made an order containing at least five products with different descriptions?” iii.. 9. Write a SQL query for the following report: ”Which customer(s) made the largerst order (i. those that would result in the largest bill)?” iv. and the foreign keys) of the above data warehouse using the star schema. . 10. organised by customer order and product. the primary keys. Each customer order includes the name of the customer and the date of the order. the attributes. and write a SQL query for the following report: ”Select the total number of products sold per product category”.

Unit II Unit-III Patents (Ownership and Enforcement of Intellectual Property) Patents-Objectives. Elective Subjects (ANY ONE) 1. Database and Data Protection-Objective.US Safe Harbor Principle. UK Data Protection Act. Designs-Objectives. Rights. Assignments. Infringements. Basic Principles of Trade Mark. Need for Protection. Protection of Semi-conductor Chips-Objectives Justification of protection. and International Perspective. Project Management 3. SCPA. Reproducing. Registration of domain names. Transfer of Copyright. Patent Protection. Copyright Protection. Sc (Information technology) SUBJECT: IPR AND CYBER LAWS Periods per week 1 Period is 50 minutes Evaluation System Lecture TW/Tutorial/Practical Theory Examination TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Unit-I Basic Principles and Acquisition of Intellectual Property Rights: Focus on the: Philosophical Aspects of Intellectual Property Laws. Enforcement. Defences. domain name and Intellectual Property. Defences. Criteria. Understanding Copyright Law. GIS Semester – VI CLASS: B. 1998.Paper IV. Subject-matter of Protection. Protection of good will. Domain Name Protection-Objectives. Passing off. Basic Principles of Patent Law. TRIPs. Rights. Defences for infringement Trademarks-Objectives. Assignments. Drafting of a Patent Specification. Jurisdictional Issues. Rights. Infringement. Basic Principles of Design Rights. disputes under Intellectual Property Rights. IPR and Cyber Laws 2. Defences in case of Infringement Copyright-Objectives. International Background of Intellectual Property Information Technology Related Intellectual Property Rights Computer Software and Intellectual Property-Objective. Patent Application procedure. Rights. work of employment Infringement. Defences of Design Infringement . WIPO Treaty.

Licensing Art & Design by Caryn R. (2 ed. Jeanne Ross “IT Governance: How Top Performers Manage IT Decision Rights for Superior Results” 2. licensing clauses. Information Technology Act-2000-3 (Sec 43 to 45 and Sec 65 to 78). Jeanne W. Cyber Law: Basic Concepts of Technology and Law : Understanding the Technology of Internet. Information Technology Act2000-6 ( Sec 91-94) Amendments in 2008. IT Act 2000 with amendments in 2008 6. Information Technology Act-2000-5 (Sec 79 to 90). Sphinx Publishing 7. Information Technology Act-2000-2 (Sec 14 to 42 and Certifying authority Rules). Ross “Enterprise Architecture As Strategy: Creating a Foundation for Business Execution” 3. Leland. Criminal Remedies. Copyright in the Digital Media.) V. Cyber Crimes and Cyber Laws Information Technology Act 2000 : Information Technology Act-2000-1 (Sec 1 to 13). Practical Aspects of Licencing – Benefits . Tutorial: At least three tutorials based on above syllabus must be conducted. Scope of Cyber Laws. Cyber Laws . Patents in the Cyber World. E-Governance. www. Cyber Law Compliancy Audit. Rights of Netizens and E-Governance : Privacy and Freedom Issues in the Cyber World. Unit-V Unit-VI References: 1.wipo. Determinative factors. Allworth Press 8. .Civil Remedies.the Malaysian Approach. Peter Weill . Cyber Jurisprudence Law of Digital Contracts : The Essence of Digital Contracts. The System of Digital Signatures. Information Technology Act-2000-4(Sec 46 to Sec 64 and CRAT Rules). International Scenario in Cyber Laws : Data Protection Laws in EU and USA. important clauses. Managing Intellectual Property: The Strategic Importance. Child Abuse Protection Laws in EU and USA. Peter Weill “IT Savvy: What Top Executives Must Know to Go from Pain to Gain 4. Major issues in Cyber Evidence Management. The Science of Cryptography Intellectual Property Issues in Cyber Space: Domain Names and Related issues. How To Register Your Own Copyright by Marx 5.Unit-IV Enforcement of Intellectual Property Rights . Border Security measures. Sopale ( PHI) Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. The Role and Function of Certifying Authorities. V. Cyber Law Issues for Management : Cyber Law Issues in E-Business Management.

quality indicators. Improving Software Economics : Reducing Software product size. The Project Environment. Management artifacts.CLASS: B. Periodic status assessments. modern process transitions. inception. Evolution of Software Economics : Software Economics. Work Flows of the process : Software process workflows. Project Organizations. conventional software Management performance. Minor Milestones. improving team effectiveness. cost and schedule estimating. planning guidelines. Metrics automation. evolution of Organizations. Life cycle phases : Engineering and production stages. Future Software Project Management: Modern Project Profiles. transition phases. Management indicators. Checkpoints of the process : Major mile stones. Sc (Information technology) SUBJECT: Project Management Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Conventional Software Management : The waterfall model. Achieving required quality. improving automation. Artifacts of the process : The artifact sets. Iteration planning process. life cycle expectations. Tailoring the Process: Process discriminants. Engineering artifacts. Elaboration. Pragmatic planning. The old way and the new : The principles of conventional software Engineering. pragmatic software cost estimation. Unit-II Unit-III Unit-IV Unit-V Unit-VI . Project Organizations and Responsibilities: Line-of-Business Organizations. programmatic artifacts. transitioning to an iterative process. peer inspections. improving software processes. pragmatic Software Metrics. Next generation Software economics. principles of modern software management. Iterative Process Planning : Work breakdown structures. Model based software architectures : A Management perspective and technical perspective. Process Automation: Automation Building blocks. Project Control and Process instrumentation: The seven core Metrics. Iteration workflows. construction.

2005. Project Management Core Textbook – Mantel Jr. map production . projected and planer coordinate system. Attribute data input and data display : Attribute data in GIS. Resampling of pixel values. PA. Geographically referenced data. Data entry. Geographic. Metadata. Information Technology project Management. Walker Royce: Pearson Education.Books: 1. typography. Information Technology Project management (4th Edition) – Kathy Schwalbe (Centgage Learning – Indian Edition) Reference Books: 1. Conversion of existing data. Shafer. Relational model. Sc (Information Technology) SUBJECT: Geographic Information Systems Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit I Unit II Unit III Spatial Data Concepts: Introduction to GIS.: a concise study. RMS error and its interpretation. Raster data model Data Input and Geometric transformation: Existing GIS data. Inc) 4. Sutton with Gopalan (Wiley India Edition) 2. map design. Geometric transformation. 2. Project Management Institute. types of maps. Plane coordinate systems. Software Project Management. Vector data model. Map projections. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. Meredith.) by S A Kelkar (PHI) 3. 2005. Project Management.A systems Approach to planning. cartographic symbolization. CLASS: B. (3rd ed. Manipulation of fields and attribute data. Creating new data. Tutorial: At least three tutorials based on above syllabus must be conducted. scheduling and controlling Harold Kerzner (John Wiley & Sons. A Guide to the Project Management Body of Knowledge (3rd Edition)..Newtown Square.

local methods. . zonal Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. data flow design. raster data query. spatial data query.Unit IV Unit V Unit VI Data exploration: Exploration. procurement of hardware and/or software. The candidate/ group is expected to complete detailed system design.ncgia. map overlay. Distance measure operations Spatial Interpolation: Elements. buffering. Tutorial: At least three tutorials based on above syllabus must be conducted. neighbourhood operations. local operations. Global methods. Kriging. geographic visualization Vector data analysis: Introduction. CLASS: B. analysis. The candidate/group will select a project with the approval of the Guide (staff member) and submit the name of the project with a synopsis of the proposed work of not more than 02 to 08 pages within one month of the starting of the semester. attribute data query. W. Yeung http://www. Distance measurement and map manipulation. Comparisons of different methods Text Book Introduction to Geographic Information Systems by Kang-Tsung Chang Published by Tata Mcgraw Hill Reference Books and websites Concepts and Techniques in Geographic Information Systems by Chor Pang Lo and Albert K. Raster data analysis: Data analysis environment. Sc (Information Technology) SUBJECT: PROJECT Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Final Examination Term Work The project should be undertaken preferably individually or by the group of maximum 3 students who will jointly work and implement the project.

The term work assessment will be done jointly by teachers appointed by Head of the Institution. innovations brought in. The project report in the bound journal complete in all respect with the following : i) Problem specifications. The suggestive structure of a project report should be guided by your guide in selecting the most appropriate format for your project. Candidate/group will submit the completed project work to the department at the end of semester VI as mentioned below. 1. depth and applicability. which includes presentations and demos of the work done. database design iv) System implementation – algorithm. iii) System design – dataflow diagrams. etc. originality of the work. and demonstrate the software. . Note: 1. One can expect help and feedback from the project guide. code documentation v) Test results and test report. General Instructions for all the courses in sem IV and V: a) Six assignments. Project work should be continually evaluated based on the contributions of the candidate/group members. The project report should contain a full and coherent account of your work. The oral examination will be conducted by an internal and external examiner as appointed by the University. 2. ii) System definition – requirement analysis.implementation of a few modules of the proposed work during the semester VI as a part of the term work submission in the form of a joint report. 2. c) Extensive problem solving exercises should be given in order to improve the interest in the subject. Although there will be an opportunity to present the work verbally. research and developmental efforts. but ultimately it’s the candidates own responsibility. one on each unit is expected to be completed in a semester for each subject. b) The subjects not having practicals should be supported by tutorials/case studies to be discussed in a class. vi) In case of object oriented approach – appropriate process be followed. the major part of the assessment will be based on the written material in the project report. Two mid-term evaluations should be done. The workable project.