This action might not be possible to undo. Are you sure you want to continue?
Tech COMPUTER SCIENCE AND ENGINEERING 1ST YEAR – 2ND SEM SYLLABUS
ADVANCED COMPUTER NETWORKS UNIT: I Review Computer Networks and the Internet: What is Internet, The Network edge, The Network core, Access Networks and Physical media. ISPs and Internet Backbones. Delay and Loss in PacketSwitched Networks, History of Computer Networking and the Internet. Foundation of Networking Protocols: 5-layer TCP/IP Model, 7-Layer OSI Model, Internet Protocols and Addressing, Equal-Sized Packets Model: ATMNetworking Devices: Multiplexers, Modems and Internet Access Devices, Switching and Routing Devices, Router Structure. UNIT: II The Link Layer and Local Area Networks: Link Layer: Introduction and Services, Error – Detection and Error – Correction techniques, Multiple Access Protocols, Link Layer Addressing, Ethernet, Interconnections: Hubs and Switches, PPP: The Point-to-Point Protocol, Link Virtualization. Routing and Internetworking: Network-Layer Routing, Least-Cost-Path algorithms, Non-LeastCost-Path algorithms, Intradomain Routing Procols, Interdomain Routing Protocols, Congestion Control at Network Layer. UNIT: III Logical Addressing: IPv4 Addresses, IPv6 Address – Internet Protocol: Internetworking, IPv4, IPv6, Transition form IPv4 to IPv6 – Multicasting Techniques and Protocols: Basic Definitions and Techniques, Interdomain Multicast Protocols, Interdomain Multicast Protocols, Node-Level Multicast algorithms – Transport and End-to-End Protocols: Transport Layer, Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Mobile Transport Protocols, TCP Congestion Control – Application Layer: Principles of Network Applications, The Web and HTTP, File Transfer: FTP, Electronic Mail in the Internet, Domain Name System (DNS), PSP File Sharing, Socket Programming with TCP and UDP, Building a Simple Web Server. UNIT – IV Wireless Network and Mobile IP: Infrastructure of Wireless Networks, Wireless LAN Technologies, IEEE 802.11 wireless Standard, Cellular Networks, Mobile IP, Wireless Mesh Networks (WMNs) – Optical Networks and WDM Systems: Overview of Optical Networks, Basic Optical Networking Devices, Large –Scale Optical Switches. Optical Routers, Wavelength Allocation in Networks, Case Study: An All-Optical Switch. UNIT – V VPNs, Tunneling and Overlay Networks: Virtual Private Networks (VPNs), Multiprotocol Label Switching (MPLS), Overlay Networks – VoIP and Multimedia Networking: Overview of IP Telephony, VoIP Signaling Protocols, Real-Time Media Transport Protocols, Distributed Multimedia Networking, Stream Control Transmission Protocol – Mobile A-Hoc Networks: Overview of wireless Ad-Hoc Networks, Routing in Ad Hoc Networks, Routing Protocols for AdHoc Networks – Wireless Sensor Networks: Sensor Networks and Protocol Structures, Communication Energy Model, Clustering Protocols, Routing Protocols TEXT BOOKS: 1. Computer Networking: A Top-Down Approach Featuring the Internet, James F. Kurose, Keith W. Ross, Third Edition, Pearson Education, 2007. 2. Computer and Communication Networks, Nader F. Mir, Pearson Education, 2007
Technology trends. ILP software approach – Basic compiler level techniques. Patterson. Basic performance issues in pipelining. Practical issues in interconnecting networks.. Amdahl’s law. high performance instruction delivery – hardware based speculation. Cost price and their trends. MC Graw Hill. . Examples of inter connection. Classic five stage pipe line for RISC processor.Jawaharlal Nehru Technological University Hyderabad M. review of ABC of cache. FSIntel Architecutre: Intel IA-64 ILP in embedded and mobile markets Fallacies and pit falls. Virtual memory. John P. Exploiting ILP. Pearson ed. UNIT: II Pipelines: Introduction. Brigs. REFERENCE BOOKS: 1. Reducing pipeline branch penalties. Computer Architecture and Prallel Processing. Memory hierarchy design: Introduction. static branch prediction. UNIT: IV Multi Processors and Thread level Parallelism – Introduction. Branch prediction. Systematic shared memory architecture. Faye A. measuring and reporting performance. 3. Cluster. quantitative principles of computer design. John L. Peter Kacsuk. Simple implementation of RISC instruction set. Distributed shared – memory architecture. Changing faces of computing and task of computer designer. Dezso Sima. Computer Architecture: A Quantitative Approach. Synchronization. Shen and Miikko H. operations in the instruction set. Reducing cache miss penalty. Designing of clusters. Pipeline hazards. VLIW approach. TEXT BOOKS: 1.Tech COMPUTER SCIENCE AND ENGINEERING 1ST YEAR – 2ND SEM SYLLABUS ADVANCED COMPUTER ARCHITECTURE UNIT: I Fundamentals of Computer design. Modern Processor Design: Fundamentals of Super Scalar Processors 2. classifying instruction set – memory addressing – type and size of operands. An Imprint of Elsevier. Cross cutting issues – Hardware verses Software. 3rd Edition. Lipasti. Advanced Computer Architecture – A Design Space Approach. Cache performance. Dynamic scheduling. basic RISC instruction set. David A. Interconnection network media. Hennessy. UNIT: III Instruction level parallelism the hardware approach: Instruction – level parallelism. Kai Hwang. Characteristics of application domain. Instruction set principles and examples – Introduction. Parallelism at compile time. UNIT: V Inter connection and networks – Introduction. Dynamic scheduling using Tomasulo’s approach. Terence Fountain.
Distributed Multimedia Systems – characteristics of multimedia data. Stream Adaptation.S. UNIT: IV Distributed Document – based Systems: WWW. Liu. John Wiley & sons. Pearson education. Pearson Education. A sample RMI Applications. Distributed Computing. Applications of Clusters. R. Java IDL. RPC model. CORBA object services. UNIT: V Grid Computing Definition of grid. the strengths and weaknesses of Distributed computing. Cluster Architecture. testing and debugging. Principles and Applications. The collaborative application (Groupware Paradigm). An Archetypal Distributed Object Architecture. . JINI. Inter-ORB protocols. operating system concepts relevant to distributed computing.Jawaharlal Nehru Technological University Hyderabad M. Mobile Agents. J. Orfali & Dan Harkey. grid components. 3. Resource Management. Fallenstein. Grid Computing. M. Distributed Object Systems. Pearson Education. Distributed Systems. Parallel and cooperative computing. the meaning of Distributed computing. Steen. UNIT: II Distributed Computing Paradigms: Paradigms of Distributed Applications – Message Passing Paradigm. object Adapters. TIB. Principles and Paradigms. Agent Technology. CORBA object reference. Message system (or MOM) Paradigm – the point-to-point message model and publish/subscribe message model. Distributed. second edition. parallel programming models and Paradigms. An example CORBA application. Lotus Notes. The CORBA object interface. drawbacks of grid computing. 5. QOS of services management. Client/Server Programming with Java and CORBA. TEXT BOOKS: 1. 2. The Client – Server Paradigm (Java Socket API). comparison of TIB and JINI Software Agents. Tanenbaum and M. UNIT: III Distributed Objects Paradigm (RMI): Message passing versus Distributed Objects. The Distributed Objects Paradigms – RMI. The Mobile Agent Paradigm. the object space Paradigm. RPC.V. A. grid types – computational grid. 4. object servers and object clients. RMI. cluster computing – Introduction. CORBA Naming Service and the Interoperable Naming Service. Joseph & C. Examples of Distributed systems. choosing a Paradigm for an application. High Performance Cluster Computing. comparison of WWW and Lotus Notes. Pearson education. grid architecture and its relation to various Distributed Technologies. Distributed Object Paradigm (CORBA) The basic Architecture.L. comparison of RMI and socket API. data grid. Rajkumar Buyya. Cluster Computing: Parallel computing overview.Tech COMPUTER SCIENCE AND ENGINEERING 1ST YEAR – 2ND SEM SYLLABUS DISTRIBUTED COMPUTING UNIT: I Introduction: The different forms of computing – Monolithic. ORB. grid benefits and applications. the Network Services Paradigm. The Java RMI Architecture. steps for building an RMI application. the architecture of distributed applications. The peer-to-peer Paradigm. Distributed Coordination-based systems – Introduction to coordination models. Java RMI API.
O’Reilly. A. Firewall Media. Wiley Dreamtech. E.Tech COMPUTER SCIENCE AND ENGINEERING 1ST YEAR – 2ND SEM SYLLABUS REFERENCE BOOKS: 1. Grid Computing: A Practical Guide to Technology and Applications. G. Concepts and Design. 5. Minoli. 3. Java Programming with CORBA. Coulouris. A Networking Approach to Grid Computing. Vogel. D. 3rd edition. Dollimore and Tim Kindbirg. Distributed Systems. Duddy. Brose. SPD. 3rd edition.R.Jawaharlal Nehru Technological University Hyderabad M. J. 2nd edition. Wiley & sons. . Java Network Programming. 4. Harold. Abbas. 2. Pearson Education.
Distributed Database Principles & Systems. Reliability and concurrency Control.Jawaharlal Nehru Technological University Hyderabad M. Pointer Swizzling. 3. Reference Architecture for Distributed Databases. Optimistic Methods for Distributed Concurrency Control. Authorization and Protection. Query Processing Issues.Reliability. Parametric Queries. A. Distributed Grouping and Aggregate Function Evaluation. Principles of Distributed Databases. Object Identifier Management. Tamer Ozsu. Detection and Resolution of Inconsistency. Object Management. Farrel. Computer Networks. Basic Concepts. 2007. UNIT: III . Tanenbaum. Scheme Translation. Andrew S. Foundation to Distributed Concurrency Control. David Johnson. Cache Consistency. Object Management Architecture CORBA and Database interoperability. TMH. Equivalence transformations for Queries. Catherine Paquet. 2. A Framework for Transaction Management. Distributed Deadlocks. The Internet and Its Protocols. A Framework for Query Optimization. Fourth Edition. S. Ed Tittel. COM/OLE and Database Interoperability. Query Processing Query Processing Layers in Distributed Multi-DBMSs. Object Query Processing. . Transforming Global Queries into Fragment Queries. Prentice Hall.Architectural Issues. Greg Tomsho. Transaction Management in Object DBMSs. Behrouz A. Diane Teare. Data Communication and Networking. REFERENCE BOOKS: 1. An Engineering Approach to Computer Networking. Transactions as Objects Database Integration. 2. Integrity Constraints in Distributed Databases. Transaction Management. Distributed Database Administration. Pearson Education (CISCO Press) 5. TMH. Catalog Management in Distributed Database. Optimization of Access Strategies. Distributed Database Design. Nonblocking Commitment Protocols. Pearson Education. Object Orientation and Interoperability. Stefano Ceri. Object Migration. Elsevier. Supporting Atomicity of Distributed Transactions. Giuseppe Pelagatti.The Management of Distributed Transactions. Distributed Component Object Model. Multidatabase Concurrency Control.Features of Distributed versus Centralized Databases. Determining a Consistent View of the Network. Campus Network Design Fundamentals. Types of Data Fragmentation. Forouzan. Scheme Integration. Guide to Networking Essentials. 2nd Edition.Tech COMPUTER SCIENCE AND ENGINEERING 1ST YEAR – 2ND SEM SYLLABUS DISTRIBUTED DATABASES UNIT: I . Fourth Edition. Multidatabase Recovery. 6. 4. Concurrency Control for Distributed Transactions. Pearson Education. Keshav. Concurrency Control. Join Queries. Checkpoints and Cold Restart. Principles of Distributed Database Systems. UNIT: V . PUSH-Based Technologies. General Queries.Translation of Global Queries to Fragment Queries. Fifth Edition: Thomson. UNIT: IV . Levels of Distribution Transparency. UNIT: II . Query Optimization Issues Transaction Management Transaction and Computation Model. Alternative Client/Server Architectures. Object Query Processor Architectures. Distributed Object Storage. M. Concurrency Control based on Timestamps. Architectural Aspects of Distributed Transactions. Query Execution. Patrick Valduriez. TEXT BOOKS: 1.
Browse. Hardware text search systems. UNIT III: Document and Term Clustering: Introduction. Similarity measures and ranking. Pearson Education. Functional Overview. Information Extraction. Relationship to DBMS. Cognition and perception. . Information System Evaluation: Introduction. UNIT IV: Text Search Algorithms: Introduction. UNIT II: Cataloging and Indexing: Objectives. Hypertext linkages. Objectives. Introduction to Information Retrieval By Christopher D. 2008. OPACs. Gerald. PAT data structure. Hypertext data structure – Automatic Indexing: Classes of automatic indexing. 2007. 1992. Ricardo Baeza-Yates. UNIT V: Multimedia Information Retrieval – Models and Languages – Data Modeling. Information Retrieval System Capabilities – Search. Relevance feedback. Indexing and Searching – Libraries and Bibliographical Systems – Online IR Systems. Cambridge University Press. Weighted searches of Boolean systems. Inverted file structures. Signature file structure. Digital Libraries.Tech COMPUTER SCIENCE AND ENGINEERING 1ST YEAR – 2ND SEM SYLLABUS INFORMATION RETRIEVAL SYSTEMS ELECTIVE – III UNIT I: Introduction: Definition. 2. Natural language. Searching the Internet and hypertext – Information Visualization: Introduction. Information visualization technologies. Data Structures: Introduction. 2004. Hierarchy of clusters – User Search Techniques: Search statements and binding. Digital Libraries and Data Warehouses. Automatic Indexing. Modern Information Retrival By Ricardo Baeza-Yates. Software text search algorithms. 2. Measures used in system evaluation. 2000. Thesaurus generation. TEXT BOOKS: 1. 2nd Edition. Mark T Maybury Kluwer Academic Press.Jawaharlal Nehru Technological University Hyderabad M. Information Retrieval Data Structures and Algorithms By William B Frakes. Information Retrieval: Algorithms and Heuristics By David A Grossman and Ophir Frieder. Springer International Edition. REFERENCE BOOKS: 1. Information Storage & Retrieval By Robert Korfhage – John Wiley & Sons. Manning and Prabhakar Raghavan. Measurement example – TREC results. N-gram data structures. Stemming Algorithms. Item clustering. Information Storage and Retrieval Systems: Theory and Implementation By Kowalski. Pearson Education. Concept indexing. Statistical indexing. Miscellaneous. Query Languages. 3. Indexing Process. 3. Selective dissemination of information search.
Authentication.T. Security Attacks (Interruption. Intrusion Detection Systems TEXT BOOKS: 1. Process – Need for Keys. Integrity. Gangemi Sr. Key Distribution. Pearson Education 2007. Internet Standards and RFCs. Networks Security Essentials (Applications and Standards) by William Stallings Pearson Education. Information Security by Mark Stamp. 2. TMH 6. Modification and Fabrication). UNIT II: Conventional Encryption Principles & Algorithms (DES. Kerberos. public key cryptography algorithms (RSA. Trusted Systems. Non-repudiation. Security Services (Confidentiality. Virus Countermeasures Firewall Design principles. UNIT III: Approaches of Message Authentication. Robert Bragg. Computer Security Basics by Rick Lehtinen. 4. 8. Location of Encryption Devices. Interception. Authentication Header. 2008. Services. Forouzan.Jawaharlal Nehru Technological University Hyderabad M. Viruses and related threats. access Control and Availability) and Mechanisms. Secure Electronic Transaction (SET). UNIT IV: Email Security: Pretty Good Privacy (PGP) and S/MIME: IP Security Overview. Secure Hash Functions (SHA-512. Intruders.. Wiley Student Edition.509 Directory Authentication Service. Whitman. X. 7. Key Distribution. Network Security: The complete reference. Encapsulating Security Payload. Cryptography & Network Security by Behrouz A. . 3. Wiley – India. A model for Internet work security. RC4) Block Cipher Modes of Operation.Tech COMPUTER SCIENCE AND ENGINEERING 1ST YEAR – 2ND SEM SYLLABUS INFORMATION SECURITY ELECTIVE-IV UNIT I : Security Goals. Signing the Digest. TMH 2007. Behorah Russell & G. 2006. Fourth Edition. Diffie-Hellman. SNMPv1 Community facility and SNMPv3. AES. Principles of Information Security. Combining Security Association and Key Management. 5. REFERENCE BOOKS: 1. ECC). Mark Rhodes. Web Security Requirements. Pearson Education 2007. Fundamentals of Computer Security. UNIT V: Basic concepts of SNMP. ELGAMAL. Godbole. Springer. 2. Information Systems Security. Attacks on Digital Signattures. IP Security Architecture. Cryptography and Network Security by William Stallings. Modern Cryptography by Wenbo Mao. Thomson. SPD O’REILLY 2006. RABIN. WHIRLPOOL) and HMAC Digital Signatures: Comparison. Public key cryptography principles. Secure Socket Layer (SSL) and Transport Layer Security (TLS).
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.