Professional Documents
Culture Documents
Btech It
Btech It
Introduction 9
Fault Prevention -Fault tolerance anticipated and unanticipated Faults- Test generation Ior digital systems- Combinational logic. Network Boolean
diIIerence method test generation Ior sequential circuits- Iault simulation.
Error Model 9
General coding scheme Parity checking code- arithmetic code code Ior computer memories checking errors in logical operation communication
coding.
Fault Tolerance 9
Coding technique-Iault tolerant selI checking and Iail saIe circuits-Iault tolerant in combinatorial and sequential circuits- synchronous and asynchronous
Iail saIe circuits.
Architecture 9
Fault tolerant computers - general purpose commercial systems-Iault tolerant multiprocessor and VLSI based communication architecture.
Fault Tolerant Software 9
Design-N-version programming recovery block - acceptance tests-Iault trees- validation oI Iault tolerant systems.
Total No of periods: 45
1. K.K.Pradhan. Fault Tolerant computing theory and techniques volume III . Prentice Hall.1989
2. Anderson and Lee. Fault Tolerant principles and practice .PH I. 1989.
BITE04 CELLULAR MOBILE COMMUNICATION 3 0 0 3
Introduction to Wireless Mobile Communications 9
History and evolution oI mobile radio systems. Types oI mobile wireless services / systems Cellular . WLL. Paging . Satellite systems. Standards.
Future trends in personal wireless systems.
Cellular Concept and System design fundamentals 9
Cellular concept and Irequency reuse. Multiple Access Schemes. Channel assignment and handoII . InterIerence and system capacity. Trunking and
Erlang capacity calculations.
Mobile Radio Propagation 9
Radio wave propagation issues in personal wireless systems. Propagation models. Multi path Iading and Base band impulse respond models. parameters
oI mobile multipath channels . Antenna systems in mobile radio.
Modulation and Signal Processing 9
Analog and digital modulation techniques . PerIormance oI various modulation techniques Spectral eIIiciency. Error rate . power ampliIication .
equalizing rake receiver concepts Diversity and space-time processing speech coding and channel coding
System Examples and Design Issues 9
Multiple Access Techniques FDMA . TDMA and CDMA systems . operational systems Wireless networking . design issues in personal wireless
systems.
References:
1. K.Feher.Wireless digital communications. PHI . New Delhi. 2001
2. T.S.Rappaport. Wireless digital communications: Principles and practice. Prentice Hall. N.J. 1996
3. W.C.Y.Lee. Mobile communications Engineering: Theory and Applications. Second edition McGraw Hill. New York 1998
4. Schiller. Mobile Communications: Pearson Education Asia Ltd.. 2000
BITE05 NETWORK SECURITY 3 0 0 3
CONVENTIONAL ENCYRPTION 9
Conventional encryption model - DES - RC 5 Introduction to AE 5 - Random number generation.
NUMBER THEORY AND PUBLIC KEY CRYPTOGRAHY 9
Modular arithmetic - Euler's theorem - Euclid's algorithm - Chinese remainder theorem - Primary and Factorization - Discrete logarithms - RSA algorithm
- DiIIe Hellmann key exchange.
MESSAGE AUTHORISATION AND HASH FUNCTIONS 9
Hash Iunctions - Authenisation requirements - authentisation Iunction - Message Authentisation codes - Secure Hasg Algorithms.
DIGITAL SIGNATURE AND AUTHENTICATION PROTOCOLS 9
Digital Signature - Authentication protocols - Digital Signature standard.
NETWORK SECURITY 9
Pretty good privacy - S/MIME-IP Security Overview - Web Security.
Total No of periods: 45
Text Books:
1. Stallings W.. "Cryptography and Network Security Principles and Practice". Prentice Hall. New Jersey. 1999.
106
References:
1) E.Biham and A. Shamir. "DiIIential Crypt analysis oI the data encryption standard". Springer Verlag. 1993.
2) D.Denning. "Cryptography and data security". Addison Wesley. 1982.
3) N.Kobliz. "A course on Number theory and Cryptography". Springer Verlag. 1994.
BITE06 SOFTWARE TESTING TECHNIQUE 3 0 0 3
UNIT - I: 9
Introduction: The purpose oI testing Some dichotomies a model Ior testing Playing pool and consulting Oracles Is complete testing possible?
The taxonomy of Bugs: The consequences oI Bugs taxonomy oI Bugs some Bug statistics.-Flow graphs and Path Testing: Path Testing basics
Predicates. Path Predicates. and Achievable Paths Path sensing Path Instrumentation Implement and Applications oI Path Testing Testability Tips.
UNIT - II: 9
Transaction-Flow Testing: Generalization transaction-Ilow testing techniques Implementation comments Testability tips. Data-flow Testing: Data
Flow Testing Basics Data Flow Testing strategies Applications. Tools. EIIectiveness Some tips. Domain Testing: Domain and Paths Nice
Domains and Ugly Domains Domain Testing Domains and InterIace Testing Domains and Testability.
UNIT - III: 9
Syntax Testing: Why. What and How A grammar Ior Formats Test Case Generation Implementation and Application Testability tips. Logic-
based Testing: Motivational overview Decision Tables Path Expressions KV Charts SpeciIications some tips. Metrics and Complexity:
Metrics. what and why Linguistic Metrics Structural Metrics Hybrid Metrics Metrics Implementation some tips.
UNIT - IV: 9
Paths. Path Products. and Regular Expression: Motivation Path Products and Path Expressions A Reduction Procedure Applications Regular
Expressions Flow anomaly Detection. States. State Graphs and Transition Testing: Overview State Graphics Good State Graphs and Bad State
Testing Tips. Graph. Matrices and Applications : Motivational overview The Matrix oI a Graph Relations The Powers oI a Matrix Node
Reduction Algorithm Building tools.
UNIT - V: 9
Implementation: Overview Strategies Ior Programmers Strategies Ior Independent Testers Tests as SoItware Products Tools.
Total No of periods: 45
Reference Books:
1. Boris Beizer SoItware Testing Techniques Dream tech Press. 2000
2. Pressman SoItware Engineerin1g.TMH.5
th
Edition 2001
BITE07 CRYPTOGRAPHY AND DATA SECURITY 3 0 0 3
CONVENTIONAL ENCYRPTION 9
Conventional encryption model - DES - RC 5 Introduction to AE 5 - Random number generation.
NUMBER THEORY AND PUBLIC KEY CRYPTOGRAHY 9
Modular arithmetic - Euler's theorem - Euclid's algorithm - Chinese remainder theorem - Primary and Factorization - Discrete logarithms - RSA algorithm
- DiIIe Hellmann key exchange.
MESSAGE AUTHORISATION AND HASH FUNCTIONS 9
Hash Iunctions - Authenisation requirements - authentisation Iunction - Message Authentisation codes - Secure Hasg Algorithms.
DIGITAL SIGNATURE AND AUTHENTICATION PROTOCOLS 9
Digital Signature - Authentication protocols - Digital Signature standard.
NETWORK SECURITY 9
Pretty good privacy - S/MIME-IP Security Overview - Web Security.
Total No of periods: 45
Text Books:
1. Stallings W.. "Cryptography and Network Security Principles and Practice". 3
rd
Edition .Prentice Hall. New Delhi.2003.
References:
1. E.Biham and A. Shamir. "DiIIential Crypt analysis oI the data encryption standard". Springer Verlag. 1993.
2. D.Denning. "Cryptography and Data Security". Addison Wesley. 1982.
3. N.Kobliz. "A course on Number theory and Cryptography". Springer Verlag. 1994.
BITE08 EMBEDDED SYSTEMS 3 0 0 3
Introduction to Embedded Systems 9
DeIinition and ClassiIication Overview oI Processors and hardware units in an embedded system-SoItware embedded into the system Exemplary
Embedded systems-Embedded Systems on a Chip (SoC) and the use oI VLSI designed circuits.
Devices and Buses for Devices Network 9
I/O Devices Device I/O Types and examples Synchronous ISO Synchronous and Asynchronous Communications Irom serial Devices Examples
oI Internal Serial Communication Devices UART and HDLC Parallel Port Devices Sophisticated interIacing Ieatures in Devices / Ports Timer
and Counting Devices - 12C`. USB`. CAN` and advanced I/O Serial high speed buses ISA. PCI. PCI-X. cPCI and advanced buses
Programming Concepts and Embedded Programming in C. C++ 9
Programming in assembly language (ALP) vs. High level language C Program Elements. Macros and Iunctions Use oI Pointers NULL pointers
Use oI Function calls Multiple Iunction calls in a Cyclic order in the Main Iunction pointers Function Queues and Interrupt Service Routines Queues.
Pointers Concepts oI EMBEDDED PROGRAMMING IN C - Obiect Oriented Programming Embedded Programming in C. C` Program
compilers Cross compiler Optimization oI memory codes.
Real Time Operating Systems - Part - 1 9
DeIinitions oI process . tasks and threads Clear cut distinction between Iunctions ISRs and tasks by their characteristics Operating System Services
Goals Structures Kernel Process Management Memory Management Device Management File System Organization and Implementation
107
I/O Subsystems Interrupt Routines Handling in RTOS. REAL TIME OPERATING SYSTEMS: RTOS Task Scheduling models Handling oI task
scheduling and latency and deadlines as perIormance metrics Co operative Round Robin Scheduling Cyclic Scheduling with Time slicing (Rate
Monotonics Co operative Scheduling) Preemptive scheduling model strategy by a scheduler critical section service by a Preemptive scheduler Fixed
(Static) Real time scheduling oI tasks INTER PROCESS COMMUNICATION AND SYNCHRONIZATION Shared data problem Use oI
semaphore(s) Priority inversion problem and Deadlock situations Inter process communications using signals semaphore Flag or mutex as Resource
key Message Queues Mail boxes Pipes Virtual (Logical) Sockets Remote Procedure Calls (RPCs).
Real Time Operating Systems - Part - 2 9
Study oI Micro C/OS-II or Vx works or any other popular RTOS RTOS system level Iunctions Task service Iunctions Time Delay Functions
Memory Allocation Related Functions Semaphore related Iunctions Mailbox related Iunctions Queue related Iunctions Case studies oI
programming with RTOS Understanding case deIinition multiple tasks and their Iunctions creating a list oI tasks Function and IPCs Exemplary
Coding steps.
Total No of periods: 45
Text Books:
1. Raikamal. Embedded Systems Architecture. Programming and Design. Tata McGraw Hill. First reprint Oct 2003
References:
1. Steve Heath. Embedded Systems Design. Second Edition - 2003 Newnes
2. David E.Simon. An Embedded SoItware Primer. Pearson Education Asia. First Indian Reprint 2000
3. Wayne WolI. Computers as Components: Principles oI embedded computing system design Harcourt India. Morgan KauIman Publishers.
First Indian Reprint 2001
4. Frank Vahid and Tony Givargis. Embedded Systems Design A uniIied Hardware / SoItware Introduction. John Wiley. 2002
BITE09 TCP/IP DESIGN AND IMPLEMENTATION 3 0 0 3
UNIT I: 9
Inter networking issues-routing-internet addressing-address resolution protocol(ARP)-reverse address resolution protocol(RARP)-packet Iormat-routing.
UNIT II: 9
Fragmentation and reassembly-error processing-IP V6-UDP-basic concepts-TCP data structures.
UNIT III: 9
Finite state machine implementation-output processing-timer management-Ilow control-urgent data processing.
UNIT IV: 9
Core gateway system-autonomous systems and considerations-interior gateway protocols. transparent gateways. DNS.
UNIT V: 9
Sockets-RPC mechanisms-Telnet-Mail systems.
Total No of periods: 45
Text Books:
COMER D.E. AND STEVENS D.L. INTERNETWORKING WITH TCP/IP VOL I II III 2
nd
edition Prentice hall oI India 1997.
References:
STEVENS W.R 'TCP/IP ILLUSTRATED VOL I .II AND III .Addision Wesley 1999
BITE10 GRID COMPUTING 3 0 0 3
Grid Computing 9
Introduction DeIinition and Scope oI grid computing
Grid Computing Initialives 9
Grid Computing Organizations and their roles Grid Computing analog Grid Computing road map.
Grid Computing Applications 9
Merging the Grid sources Architecture with the Web Devices Architecture
Technologies 9
OGSA Sample use cases- OGSA platIorm components OGSI OGSA Basic services.
Grid Computing Tool Kits 9
Globus GT 3 Toolkit Architecture -. Programming model . High level services OGSI .Net middleware solutions.
Total No of periods: 45
Text Book:
1. Joshy Joseph & Craig Fellenstein. 'Grid Computing. Pearson/PHI PTR 2003.
References:
1. Ahmar Abbas.Grid Computing: A Practical Guide to technology and Applications. Charles River media 2003.