Syllabus for the T.Y. B. Sc. Sem. V & VI Program: T.Y.B.Sc. Subject: Information Technology

(with effect from the academic year 2012–2013)

CLASS: B. Sc (Information technology) SUBJECT: Network Security Periods per week Lecture 1 Period is 50 minutes TW/Tutorial/Practical Evaluation System Theory Examination TW/Tutorial/Practical

Semester – V 5 3 Hours 2 -Marks 60 40


Cryptography: Introduction: Some Simple Cryptosystems, The Shift Cipher, The Substitution Cipher, The Affine Cipher, The Vigenere Cipher, The Hill Cipher, The Permutation Cipher, Stream Ciphers, Cryptanalysis, Cryptanalysis of the Affine Cipher, Cryptanalysis of the Substitution Cipher, Cryptanalysis of the Vigenere Cipher, Cryptanalysis of the LFSR-based Stream Cipher. Shannon’s Theory, Perfect Secrecy, Entropy, Huffman Encodings and Entropy, Properties of Entropy, Spurious Keys and Unicity Distance The Data Encryption Standard, Description of DES, An Example of DES Encryption, The DES Controversy, DES in Practice, DES Modes of Operation, A Time-memory Trade-off, Differential Cryptanalysis, An Attack on a 3-round DES, An Attack on a 6-round DES. Introduction to Public-key Cryptography, More Number Theory, The Euclidean Algorithm, The Chinese Remainder Theorem, Other Useful Facts, The RSA Cryptosystem, Implementing RSA, Probabilistic Primality Testing, Attacks On RSA, The Decryption Exponent, Partial Information Concerning Plaintext Bits, The Rabin Cryptosystem, Factoring Algorithms, The p - 1 Method, Dixon’s Algorithm and the Quadratic Sieve, Factoring Algorithms in Practice Unit-II Signature Schemes : Introduction, The ElGamal Signature Scheme, The Digital Signature Standard, One-time Signatures, Undeniable Signatures, Fail-stop Signatures Hash Functions Signatures and Hash Functions, Collision-free Hash Functions The Birthday Attack, A Discrete Log Hash Function, Extending Hash Functions, Hash Functions from Cryptosystems, The MD4 Hash Function, Timestamping. Key Distribution and Key Agreement Introduction, Key Predistribution , Blom’s Scheme, Diffie-Hellman Key Predistribution, Kerberos, Diffie-Hellman Key Exchange, The Station-to-station Protocol, MTI Key Agreement Protocols, Key Agreement Using Self-certifying Keys. Unit-III Security Trends, The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms, A Model for Network Security Unit-IV Authentication Applications: Kerberos, X.509 Authentication Service, Public-Key Infrastructure, Recommended Reading and Web Sites, Key Terms, Review Questions, and Problems, A Kerberos Encryption Techniques, Electronic Mail Security, Pretty Good Privacy, S/MIME, Key Terms, Review Questions, and Problems, A Data Compression Using Zip, Radix-64 Conversion, PGP Random Number Generation

Secure Electronic Transaction. Password Management. CRC Press. Combining Security Associations. . Write a program to perform substitution ciphers to encrypt the plain text to f polyalphabetic cipher and to decrypt it back to plain text. Virus Countermeasures. (Unit: III-VI) References: Information Security and cyber laws. Practical List: 1 Substitution Techniques a Write a program to perform substitution ciphers to encrypt the plain text to Caesar cipher and to decrypt it back to plain text. b Write a program to perform substitution ciphers to encrypt the plain text to Modified Caesar cipher and to decrypt it back to plain text. 2 Transposition Ciphers a Write a program to perform transposition ciphers to encrypt the plain text to cipher and to decrypt it back to plain text using rail fence technique. PHI(Pearson). Trusted Systems. Books: Cryptography: Theory and Practice. Saurabh Sharma. IP Security Architecture. Intruders: Intrusion Detection. Firewalls: Firewall Design Principles. Fourth Edition. Douglas Stinson. Authentication Header. Vikas publication Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. student series. Secure Socket Layer and Transport Layer. Common Criteria for Information Technology Security Evaluation. Security. Bhattacharjee. e Write a program to perform substitution ciphers to encrypt the plain text to homophonic cipher and to decrypt it back to plain text. Vikas publication. b Write a program to perform transposition ciphers to encrypt the plain text to cipher and to decrypt it back to plain text using Simple Columnar technique.Unit-V Unit-VI IP Security: IP Security Overview. c Write a program to perform substitution ciphers to encrypt the plain text to homophonic cipher and to decrypt it back to plain text. Key Terms. Encapsulating Security Payload. CRC Press LLC (Unit I and II) Cryptography and Network Security Principles and Practices. Recommended Reading and Web Site. c Write a program to perform transposition ciphers to encrypt the plain text to cipher and to decrypt it back to plain text using Columnar with multiple rounds. Web Security: Web Security Considerations. Key Management. Ankit Fadia and J. Encryption. d Write a program to perform substitution ciphers to encrypt the plain text to monoalphabetic cipher and to decrypt it back to plain text. William Stallings. Malicious Software: Viruses and Related Threats. Distributed Denial of Service Attacks. Recommended Reading and Web Sites.

Delegates and Events. Defining classes and class members. functions.NET with C# Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Unit-II Review of . Comparisons and Conversions. Write a program to generate assymmetric Keys for the following Cipher algorithms a) DSA (Digital Signature Algorithm). Tabbed ).D 3 4 5 6 7 Write a program to encrypt a plain text to a cipher text and decrypt it back to plain text using vernam cipher as the transposition technique Write a program to generate Symmetric Keys for the following Cipher algorithms DES. Write a program to encrypt input string by using SecretKey of the following algorithms. Variables and expressions. Namespaces Collections. IDEA d. Blowfish. List View. DSA Implement following HashFunctions: RSHash. Garbage Collector. SDI and MDI applications. Semester – VI CLASS: B. MD5. 9 Write a program for creating. AES c. JIT compiler. Private and Shared Assembly. c) RSA. . DJBHash 8 Write a program to encrypt the given string by using RC4 . JSHash. b) DH (DiffieHellman). Sc (Information technology) SUBJECT: ASP. BlowFish c. OOPs with C#. The permission name consists of a book id. and a set of allowable pages. algorithms. Checked List Box. Radio Button.NET frameworks. BKDRHash. Building MDI applications. Assembly. List Box. Label . Use the following algorithms for encryption and decryption: a. exporting and validating Digital Certificate. and then decrypt the encrypted string and compare the decrypted string with the input string. RSA b. debugging and error handling. Forms (Menus and ToolBars. Use the following algorithms for encryption and decryption: a. Link Label. flow controls. Introduction to C#. 10 Create a permission that controls access to pages of a book. Components of Assembly. Text Box. SDBMHash. and then decrypt the encrypted string and compare the decrypted string with the input string. a colon. CheckBox. Windows programming: Controls(Button. TripleDES. DES b. Rich TextBox. HmacMD5 and HmacSHA1. AES. Triple DES Write a program to encrypt input string by using SecretKey of the following algorithms.

H Padderson. Working with CSS with visual developer ASP.NET AJAX.NET.NET 4 in C# and VB. J. Web. Reprint 2011. References: Programming ASP. ASP. Vijay Nicoel.asax files. ASP.NET provider model ASP. the equivalent command to convert from a string to an int is Convert.NET Technology. . Tata McGraw-Hill (Unit III to VI). Programming ASP. Wrox (Wiley) 2010.Unit-III Unit-IV Unit-V Unit-VI Introduction to ASP.NET Ajax: Introducing AJAX. Spanjaars. Crystal reports.NET. Master Pages. Query Syntax ASP. organizing code.NET server controls: Types of control. JQuery syntax. Caching.Esposito.NET state management engine. effects with JQuery. Using ASP. Microsoft Press (Dreamtech). retrieving and manipulating data with SQL.NET. Reid. Books: Beginning Visual C# 2010.ADO.ToDouble() command was used to convert the input from the console to a double. D. Web Services and Page methods in AJAX websites. Themes in ASP. ADO. Using SQL to work with database. Introduction to CSS.config and global. LINQ: Operators. Watson. Impersonation.NET Security: Authentication. Reprint 2011 (Unit III to VI). K. ASP. statements. Authorization. object oriented basics. Simple Programs with C#: a) Write a console application that obtains four int values from the user and displays the product.NET data control. ASP.Skinner. Navigation: Using navigation controls.NET lifecycle. Patel. working with ADO.XML.NET Visual C#.NET CSS: Need of CSS. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. C. Hint: you may recall that the Convert. Beginning ASP.0 programming.ToInt32().NET architecture. modifying DOM with JQuery. J. Kanjilal. programmatic redirection User Controls: Introduction to user controls Validating User Controls Databases: Introduction. JQuery: Introduction to JQuery.NET web pages: Introduction.D. Nagel. ASP. implementations.NET 4. M. deploying the web site. (Unit I and II). I. data types and variables. ASP. TMH Advanced . JQuery and extensibility. data source control. J. Practical: 1. Dreamtech. LINQ to objects.NET 4: Microsoft.NET framework.NET.

Test for prime numbers. Reverse a number and find sum of digits of a number. Programs using ASP. Object oriented programs with C# a. 5. 4.NET Server controls.b) If you have two integers stored in variables var1 and var2. v. . Programs securing web pages. ii. respectively. Programs using JQuery. Program with different features of C# Function Overloading Operator Overloading Inheritance (all types) Constructor overloading Interfaces Using Delegates and events Exception handling 3. 10. but rejects any input where both numbers are greater than 10 and asks for two new numbers. iv. 8. Generate prime numbers. Use of foreach loop with arrays. Implement this using an Array of Structs. diamond and other patterns) with numbers. Programs using Language Integrated query. what Boolean test can you perform to see if one or the other (but not both) is greater than 10? c) Write an application that includes the logic from Exercise 1.NET 7. obtains two numbers from the user. iii. Programs using different controls. Generate various patterns (triangles. Programs using AJAX. 6. 9. g) Write programs using conditional statements and loops: i. d) Write a console application that places double quotation marks around each word in a string e) Write an application that uses two command-line arguments to place values into a string and an integer variable. vi. b. Then display these values.NET and ADO. and displays them. Programs using CSS. 2. f) Write an application that receives the following information from a set of students: Student Id: Student Name: Course Name: Date of Birth: The application should also display the information of all the students once the data is entered. Database programs with ASP. Program using classes. Test for vowels. Generate Fibonacci series. vii.

Integration Testing. Sc (Information technology) SUBJECT: Software Testing Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – V 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Introduction to quality. Retrospection. Interaction Testing Object Oriented Testing: Issues. Functional Testing: Boundary value Testing. Retrospection Levels of Testing. 2012 Introduction to Software Testing.Ron Patton. Object Oriented System Testing Testing Process: Planning. Managing the Testing Process: Practical Tools and Techniques for Managing Hardware and Software Testing. (PHI) EEE edition. System Testing. . Wiley. fundamentals of software testing. Second Edition. Improvements. Perry. Object Oriented Integration Testing. Structural Testing: Path Testing. Decision Table based testing.CLASS: B. Wiley India. M. TMH.(Unit-II to V) References: Software testing by Yogesh Singh. Equivalence class testing. Software Testing. Limaye. Jorgensen.I and VI) Software Testing A Craftman’s Approach. Paul C. Second Edition. VV model of testing. Rex Black. Jeff Offutt. Cambridge University Press. CRC Press. Data Flow Testing. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. Techniques and Tools. (Unit. Class Testing. Software testing by Sandeep Desai.G. Unit-II Unit-III Unit-IV Unit-V Unit-VI Books: Software Testing Principles.SAMS Software Testing. Paul Ammann. Abhishek Srivastava. Metrics and Reports. Quantitative and Qualitative Analysis. software quality. Cambridge University Press.

Functional Testing a. Boundary value Testing b. Path testing b. Data-flow testing 6. For automated testing. Implement the process Object oriented testing 9. Equivalence class testing c. 2.Practical: 1. Performance Testing(use WAPT) 8. Regression Testing (use VTEST tool) using automated testing for website. 10. testdirect. ( e.g winrunner. 7. Structural Testing a. Whitebox Testing c. Integration Testing 4. Load Testing(use WAPT) b. coding and test plan. design the test plan and test cases for integration testing on the given case. MANUAL TESTING for the project a. For automated testing. Decision Table based testing d. Unit Testing e. Cause-effect graphs 5. Prepare a small project and submit SRS. AUTOMATED TESTING for websites a. Blackbox Testing d. Study of any one of the testing tools.etc) 3. Walkthrough b. design. . design the test plan for unit testing.

application development approach. creating a web application. Sc (Information technology) SUBJECT: Advanced Java Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Unit-II Swing: Event Handling. implicit objects. Building a web services using JAX-WS. Writing the application. java servlet technology. compiling and building the web application JDBC: Design of JDBC. creating database and tables in MySQL. Query Execution. servletConfig interface. building and running web application.RequestDispatcher Interface. metadata. Component Organizers Introduction to servlets: Need for dynamic content. disadvantages. Scrollable and updatable result sets. Transaction. creating JSP file. JSP: Introduction. Components of the Javamail API. JSF lifecycle. JFrames. Servlet Lifecycle. GenericServlet Class. Trees. Lifecycle of JSP. getting started with struts. characterquoting conventions. creating a web application(using netbeans) . Tables. JAVAMAIL: Mail Protocols. JSF web applications (login form. Action elements. JSF pages) EJB: Enterprise bean architecture. creating a java bean class. Adding the required library files. creating a servlet. creating enterprise bean. packaging beans. JAVAMAIL API. creating web applications. Executing SQL statement. JSP elements. types of beans. Text Components. Comments. HttpSession Interface. HIBERNATE: Introduction.CLASS: B. row sets. components of JSF. Resources and JNDI. STRUTS: Introduction. creating web client. what is JSF?. JNDI. JNDI: NAMING Service.HttpServlet Class. WEB Services: SOAP. Accessing beans . scope. why servlets? Servlet API and Lifecycle: servlet API. adding a mapping resource. Directory service. Starting with API. HttpServletRequest and HttpServletResponse Interfaces. Working with servlets: organization of a web application. installing and setting up struts. ServletInputStream And ServletOutputStream Classes. Struts framework core components. Progress Indicators. ServletRequest and ServletResponse Interfaces. JSP documents. Benefits of enterprise bean. JSF as an application. unified expression language. creating hibernate configuration and mapping file. Building web service. JSP v/s Servlets. creating JSPs. Unit-III Unit-IV Unit-V Unit-VI . JSF configuration. Java server Faces : Need of MVC . Lists . JDBC configuration.

Shah. Develop a JSP Application to accept Registration Details form user and Store it into the database table. Develop a simple “Hello World” Web Service with SOAP in Java. Write a java program to present a set of choices for a user to select Stationary products and display the price of Product after Selection from the list. II – Advanced Features.Develop a simple Struts Application to Demonstrate E-mail Validator. Write a java program to demonstrate typical Editable Table. Develop a JSP Application to Authenticate User Login as per the registration details. Develop Servlet Application of Basic Calculator (+. Herbert Schildt. /.Develop a simple Struts Application to Demonstrate 3 page Website of Teaching Classes which passes values from every page to another. Develop an application to show searching the Directory using JNDI capabilities. 6. Savaliya. 5. Seventh Edition. C Xavier. Horstmans. 12. 9. Eastern Economy Edition (PHI). SPD (Unit II to VI) Core Java Vol. . Pearson (Unit I and III) Java Complete Reference. Develop a Simple Web Service and Client with JAX-WS. B M Harwani. JPA and struts 2 for beginners.-. Write a java program using Split pane to demonstrate a screen divided in two parts. SPD Java Programming A practical Approach. c. Dreamtech. 4. McGraw Hill Java Server Faces A practical Approach for beginners. (Unit I) References: Java EE Project using EJB 3. Advanced Java Technology. Develop a Hibernate application to store Feedback of Website Visitor in MySQL Database. Eight Edition. Gary Coronell. %) using ServletInputStream and ServletOutputStream. 3. Cay S.Books: Java EE 6 for Beginners. Develop a Room Reservation System Application Using Enterprise Java Beans. one part contains the names of Planets and another Displays the image of planet. appropriate image of planet displayed in right screen. b. Practicals: 1. Vaishali Shah. When user selects the planet name form Left screen. 2. Develop a web application to add items in the inventory using JSF. a . 11. 7. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. Develop Simple Servlet Question Answer Application to demonstrate use of HttpServletRequest and HttpServletResponse interfaces. 10.TMH. describing employee details for a software company. If login success the forward user to Index Page otherwise show login failure Message.*. a. b. Sharanam Shah. 8.

Using Tools to Monitor Security Booting and shutting down: Boot loaders-GRUB. GNU and Linux distributions Duties of the System Administrator. Enabling and disabling services. Editing Your Network Configuration TCP/IP Networking: Understanding Network Classes. Setting Up a Network Interface Card (NIC). Sc (Information Technology) SUBJECT: Linux Administration Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – V 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Introduction: Introduction to UNIX. System Environmental Settings. Configuring an NFS Client. Configuring an NFS Server. Comparing xinetd and Standalone. scp. sync. Examining NFS Security Unit-II Unit-III Connecting to Microsoft Networks: Installing Samba. Monitoring and Tuning Performance. Network Configuration Files. . Configuring Linux Firewall Packages. LILO.finger. Understanding Subnetting. The File System: Understanding the File System Structure. Creating and Maintaining User Accounts. Connecting to a Samba Client. Configuring the xinetd Server. Connecting from a Windows PC to the Samba Server Additional Network Services: Configuring a Time Server. Starting the Samba Server.FTP. Working with LinuxSupported File Systems. Bootstrapping. rc scripts. Linux Machine as a Server.rsh . Linux Disk Management Network Configuration Files: System Configuration Files: System wide Shell Configuration Scripts. Planning an NFS Installation. Memory and Virtual File Systems. Providing a Caching Proxy Server. The Linux System Administrator.rlogin. SSH. Working with Gateways and Routers. Managing the init Scripts. Creating Samba Users 3. Init process. Optimizing Network Services Internet Services: Secure Services.CLASS: and ntalk. Installing and Configuring Application Software. The Network File System: NFS Overview. Using Automount Services. sftp Less Secure Services (Telnet . Configuring Dynamic Host Configuration Protocol. Configuring a Secure System. Configuring the Network Using the Network. Configuration Tool. Linux. Configuring the Samba Server. Backing Up and Restoring Files. Installing and Configuring Servers.

Checking Configuration Configuring Mail Services: Tracing the Email Delivery Process. Tata McGraw-Hill. Configuring a Secondary Master DNS Server. Linux Administration: A Beginner's Guide. Optimizing FTP Services. Tata McGraw-Hill Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. Understanding Types of Domain Servers. Creating a Secure Server with SSL Providing Web Services: Creating Mailing Lists. Enabling CGI. Programming Shell scripts for Linux administration . Partitioning drives b. Setting time zones e. Serving Email with POP3 and IMAP. Red hat Linux Networking and System Administration by Terry Collings References: 1. Configuring vsftpd. Creating password and user accounts f. Configuring Apache. Optimizing Web Services System Administration: updating system. Implementing SSI. Adding Search Functionality. Enabling PHP. Richard Petersen. Configuring Sendmail. Shutting down 2. Administering Users and Groups Installing and Upgrading Software Packages Books: 1. Using SFTP Configuring a Web Server: Introducing Apache. Linux: Complete Reference.Unit-IV Unit-V Unit-VI Domain Name System: Understanding DNS. UNIX: Concepts and techniques. Das. Mail User Agent (MUA). Tata McGraw-Hill 3. Advanced FTP Server Configuration. Configuring an RSS Feed. Fifth Edition. 6th Edition. Wale Soyinka. Using the Postfix Mail Server. Configuring boot loader (GRUB/LILO) c. Network configuration d. upgrading and customizing kernel. Software selection and installation 3. Optimizing Internet Services: Optimizing LDAP Services. 2. S. Beginning Linux by Neil Mathew 4th Edition 2. a. Introducing SMTP. Practical: 1. Examining Server Configuration Files. Configuring a Primary Master Server. Maintaining Email Security Configuring FTP Services: Introducing vsftpd. Optimizing DNS Services. Installation of Red HAT/Fedora Linux operating system. Optimizing Mail Services. Setting Up Web-Based Email. Configuring a Caching DNS Server.

e. . Securing Linux features 9. Adding windows computer’s to user LAN f. Administrative commands e. Setting up hardware devices including sound card and printers and others(USB devices etc). Setting up proxy server 8. 12. Linux system administration a. f. Working with X-windows a. Configuring mozilla or firefox to use as a proxy 6. Administrative configuration files 5. c. Setting up FTP server e. Setting up local area network a. Setting up Samba file server c. Setting up dial-up PPP b. Display and Control a Remote Desktop using VNC. Understanding COMPUTER SECURITY: Firewall and security configurations a. Accessing X-window remotely. Securing linux with IP table firewalls c. Launching PPP connection d.4. The Apache web server d. Server setup and configuration a. Implementing Socket programs. set up my video card. 10. Temporarily changing user identity with su command c. IP address classes 7. Install KDE. LAN topologies b. Connecting to the internet and configuring samba a. LINUX security checklist b. 11. Becoming super user b. Installing TrueType fonts from my MS Windows partition. Creating a dial. Networking with TCP/IP d. LAN equipment c. monitor and mouse for the X-server. Switching between text and graphical consoles b. Configuring TCP/IP e. Configuring an IP table firewall d. Programming using C. Setting up NFS file server b.up connection with the internet configuration wizard c. Setting up linux as a proxy server e. Using graphical administrative tools d. change default desktop to KDE (or Gnome) d.

D. Sc (Information technology) SUBJECT: Internet Technologies Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Introduction: OSI Model. Domain Name System (DNS). Douglas E. Eastern Economy Edition. Unit-II Unit-III Unit-IV Unit-V Unit-VI Books: TCP/IP Protocol Suite. Comer. PHI TCP/IP Illustrated. File Transfer: FTP and TFTP World Wide Web and HTTP. Behrouz A.Mobile IP. OSPF and BGP) Transport Layer. Unicast Routing Protocols (RIP. Forouzan. Comer. Stevens.CLASS: B. D. Douglas E. Multimedia Client Server Programming: Concurrent Connection Oriented (TCP) and Connectionless programming(UDP). Volume I. Remote Login: TELNET and SSH. 4th Edition . Stream Control Transmission Protocol (SCTP) Host Configuration: DHCP. . User Datagram Protocol (UDP).N. Network Layer.P. Electronic Mail: SMTP. TMH (Unit I – V) Internetworking with TCP/IP. Gopalan. PHI Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. Fifth Edition.L. Comer. PHI Internetworking with TCP/IP. POP. Volume III. Network Management: SNMP. Volume II. IPV 4 and IPV6 Addresses and Protocol Address Resolution Protocol (ARP). Douglas E. Stevens.Siva Selvan. Iterative connectionless(TCP) and connection oriented servers(UDP.Internet Control Message Protocol Version 4 (ICMPv4). B. Transmission Control Protocol (TCP). PHI (Unit VI) References: Internetworking with TCP/IP. Third Edition.L. Second Edition. IMAP and MIME. TCP/IP Protocol Suite.

Practical: 1. region of convergence (ROC) LT of some important functions. . definition. simple manipulations of discrete time signals. 7. Write a JAVA code for TCP echo Server application. input and output modules of ARP. Fourier transforms of power and energy signals. Write a function in JAVA to simulate the cache control. Unit-II Applications of Laplace Transform to System Analysis Introduction. Sc (Information technology) SUBJECT: Digital Signals and Systems Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Classification of Signals and systems: Introduction. Parsevals identity for Fourier series. Continuous Time and discrete time signals. trigonometric Fourier series. Fourier transforms of some important signals. 4. 5. Write a JAVA code to implement the routing algorithm for RIP. Initial and final value theorems. Complex or exponential form of Fourier series. 8. Write a JAVA client/server TCP code to illustrate simple chat application. Write a JAVA client/server UDP code in which a client greets the server and the server send date and time to the client. 6. LT of periodic functions. CLASS: B. partial fraction expansions. amplitude and phase spectra. Power spectrum of a periodic function. network transfer function. classification of systems. Write aJAVA code to simulate the main module of TCP. analog to digital conversion of signals Fourier Analysis of Periodic and Aperiodic Continuous Time Signals and Systems: Introduction. classification of signals. 9. S-plane Poles and zeros. Write a JAVA code to find the shortest path between two points in the network. 10 Write JAVA client/server UDP code where client send series of numbers to server and server returns greatest among them. convolution integral. Application of LT in analysing networks. Write a JAVA code that calculates the checksum of UDP datagram. 3. Write a JAVA client/server TCP code in which a client sends a number to server and server responds by returning its factorial. Table of Laplace transforms. 2. Fourier transform and its properties.

Salivahanan. TMH References: Digital Signal Processing by Sanjit K. discrete Fourier series. Computing an inverse DFT by doing direct DFT.Unit-III Z Transform: Introduction. Willsky with S. IIR filter design by approximation of derivatives. Frequency domain representation of discrete time signals and systems. design of optimal linear phase FIR filters. Difference equation and its relationship with system function. Books: Digital Signal Processing by S. Elliptic filters. TMH Signals and systems by A Anand Kumar (PHI) 2011 Signals and Systems by Alan V. magnitude response and phase response of digital filters. Butterworth filters. Infinite Impulse Response (IIR) Filters: Introduction. Fast (Sectioned) convolution. properties of DSP system. evaluation of inverse z-transform. Second Edition. Unit-IV Unit-V Discrete and Fast Fourier Transforms: Introduction. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. . PHI (EEE) Digital Signal Processing by Apte. impulse response and frequency response. Chebyshev filters. definition of z-transform. Mitra. properties of z-transform. IIr filter design by the bilinear transformation. frequency response of linear phase FIR filters. Hamid Nawab. frequency transformation. Linear Time Invariant Systems: Introduction. Unit-VI Finite Impulse Response (FIR) Filters Introduction. Second Edition. Fast Fourier transform (FFT). Third Edition. Design techniques of FIR filters. Correlation. Composite radix FFT. Gnanapriya Second Edition. C. solution of linear constant coefficient difference equation. Discrete time Fourier transform (DTFT). Oppenheim and Alan S. Discrete convolution. Wiley India. IIR filter design by impulse invariant method.

Write a program to demonstrate correlation property. data mart. evolution to DW 2. data warehouse environment. Find DFT and IDFT of the given sequence. Sc (Information technology) SUBJECT: Data warehousing Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I History of data warehousing: database management system. Write a program to implement Frequency Response of First order Difference Equation. a. 4. integrating data. a. Unit Ramp Sequence c. Exponential Sequence d. Write program to a. business impact of the data warehouse. spider web environment. Write a program to implement Z-Transforms. volumes of data. 5. 10. evolution of data warehouse from the business perspective. other notions about data warehouse. high pass and band pass filters. star schema. evolution from business perspective. different development approach. Even Signals g. Time shifting property of Z transform 3. b. Write a program to implement circular convolution using DFT 8. Write a program to implement/Design of FIR Filter using Frequency Sampling Technique. 7.0 environment. Exponential Increasing Sequence e. what is datawarehouse? . components of datawarehouse environment. . Unit Step Sequence b. Odd Signals 2. Z-transform of Finite duration signals b. Write a program to perform linear filtering (linear convolution using DFT. Exponential Decreasing Sequence f. personal computers and 4GL technology. Write a program to study and implement Discrete Time Signals and systems. 9. federated data warehouse. 6.Practical : ( To be conducted using Scilab / MATLAB) 1. Write a program to demonstrate convolution property. Determine N-Point DFT. Write a program to implement low pass. CLASS: B.

frequency of analysis. moving data offline. statistical analysis. falling probability of data access. refreshing exploration data. infrastructure stream. using metadata – an example. Archival sector. continuous time span data. specific text. direct dump. project based data. Total information quality management stream. Metadata. changed data capture. data models and unstructured data.0 and referential integrity. data flow into integrated sector. Dormant data. Near Line sector. datawarehouse monitor. information factory development stream. Internal and external taxonomy. metadata in archival sector. local metadata. ETL in online mode and batch mode. exploration processing. encryption. metadata. ETL and rejects. continuity of data. ETL and rejects. Time-collapsed data. drawbacks. creating ETL. data relativity elsewhere in DW. integrity of comparison. Access of data. Time relativity in the interactive sector. Active/ passive repository. transaction monitor. ETL and metadata. changing business requirements. security for near line data. seven streams approach.Introduction: Lifecycle of data warehouse. transformation of models. Flow of data in DW: flow of data throughout the architecture. issue of terminology. scope of integration. end user perspective. volumes. integrated sector. Changed data capture. making the distinction between granular and summarized data. enterprise metadata. sources for exploration processing. maintaining metadata. enterprise reference model. metadata – a major component. a sequence of records. Data marts and exploration facility. firewall. more complex transformation. DW 2. ETL data quality monitor.0. source and target. reasons for different sectors. transaction monitor. ETL and throughput. data models and interactive sector. Where ETL fits. near line. archival sector. freezing data. ELT Unit-III Unit-IV . A backflow of data. corporate data model. metadata and the system record. Statistical processing and DW: Two types of transaction.0 DW components: Interactive sector. perspective of business user. flow of data within DW 2. Monitoring the DW environment: Monitoring DW environment. Unit-II Metadata in DW: Reusability of data analysis. exploration facility. monitoring data quality. sensing an attack. using exploration data internally. code creation or parametrically driven ETL. Transactions in integrated sector. ETL and an audit trail. useful applications. ETL and data quality. application data to corporate data. Taxonomy. role of ETL. heuristic analysis. reporting in DW 2. perspective of business analyst. datawarehouse monitor. structures data/ unstructured data. time variance in the archival sector. discrete data. peak period processing. Textual analysis. ETL mapping. enterprise knowledge coordination stream. Data models and DW: datamodel and business. Time variant data: All data in DW. Data correction stream. DW and security: Protecting access to data. blather. Methodology and Approach for DW: Spiral model methodology. entering the interactive sector. limiting encryption. exception flow of data. ETL processing and DW: changing states of data. levels of the data model. beginning and ending a sequence of records. nonoverlapping records.

metadata. Mohanty. Practical List: 1. monitoring the environment.0 The architecture for Next Generation of Datawarehousing W. homegrown versus third party granularity manager.Inmon. John Wiley. adding archival sector. protecting the interactive sector. Queues. 2. Derek Strauss. service level agreements. heuristic processing.H. Migration: Migration in perfect world. capacity planning. Inmon. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. partitioning data. Create around 25 records and design the Chart view using Excel.H. S. 7. choosing the proper hardware. Perform the cube analysis on MOLAP 6. ELSEVIER. separating farmers and explorers. W. migration to the unstructured environment. ETL as shock absorber. batch parallelization. workload management. Wiley. Extract the data from excel . (Unit VI) References: Building the data warehouse. (Unit I to V) Paulraj Ponnian. filtering data.John Wiley. separation of transactions into classes. parallelization for transaction processing. Genia Neushloss. Datawarehousing. creating enterprise metadata. functions of the granularity manager. “Data Warehousing Fundamentals”. end user education. parallelizing the granularity manager. Perform the cube analysis on ROLAP Perform the cube analysis on HOLAP . TMH . building the metadata infrastructure. indexing. data warehouse deployment. Implementation And Maintenance: Physical design process. Design the star schema and create a cube using OLAP services 5. DW and performance: online response time. analytical productivity and response time. physically group data.Unit-V DW and granularity manager: granularity manager. access and sql and integrate it in SQL server. flow of data. Perform the same process using DTS package 4. data marts. many facets to performance. Create around 25 records and design the tabular view using Excel. exploration facilities. swallowing source system. Ralph Kimball . raising the level of granularity. The Data Warehouse Lifecycle toolkit”. third Edition. removing dormant data. analytical response time. Unit-VI DW2. adding components incrementally. 3. growth and maintenance.

8. Retrieve the cube data into the excel sheet and present the information in tabular and graphical form. organised by customer order and product.e.. Consider to add a new level product categories to the product dimension. Design at least five queries for the created cube using MDX application. where the total items sold are stored. Each customer order includes the name of the customer and the date of the order. the attributes. Devise the relational schema (specifying the relations. 9. 10. Consider a data warehouse storing data about sales. . the primary keys. and write a SQL query for the following report: ”Select the total number of products sold per product category”. those that would result in the largest bill)?” iv. Write a SQL query for the following report: ”Which customer(s) made the largerst order (i. Devise the new relational star schema. Write a SQL query to answer the following question: ”Which customer(s) made an order containing at least five products with different descriptions?” iii. ii. and the foreign keys) of the above data warehouse using the star schema. i. each product includes a description of the product and its price.

Defences in case of Infringement Copyright-Objectives. Need for Protection. Jurisdictional Issues. UK Data Protection Act. SCPA. disputes under Intellectual Property Rights. Rights. Registration of domain names. Understanding Copyright Law. GIS Semester – VI CLASS: B. 1998. Unit II Unit-III Patents (Ownership and Enforcement of Intellectual Property) Patents-Objectives. Subject-matter of Protection. Enforcement. Designs-Objectives. Database and Data Protection-Objective. Copyright Protection. Infringements. Basic Principles of Patent Law. Transfer of Copyright. Defences for infringement Trademarks-Objectives. Rights. Basic Principles of Trade Mark. Rights. Defences of Design Infringement . TRIPs. work of employment Infringement. and International Perspective. Defences. Sc (Information technology) SUBJECT: IPR AND CYBER LAWS Periods per week 1 Period is 50 minutes Evaluation System Lecture TW/Tutorial/Practical Theory Examination TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Unit-I Basic Principles and Acquisition of Intellectual Property Rights: Focus on the: Philosophical Aspects of Intellectual Property Laws. Defences. Infringement. Criteria. Protection of Semi-conductor Chips-Objectives Justification of protection. Basic Principles of Design Rights. domain name and Intellectual Property. Patent Application procedure. WIPO Treaty. Domain Name Protection-Objectives. Protection of good will. International Background of Intellectual Property Information Technology Related Intellectual Property Rights Computer Software and Intellectual Property-Objective. Drafting of a Patent Specification. Assignments. Assignments.US Safe Harbor Principle. IPR and Cyber Laws 2. Rights. Passing off. Patent Protection.Elective Subjects (ANY ONE) 1. Reproducing. Project Management 3.

Cyber Law: Basic Concepts of Technology and Law : Understanding the Technology of Internet. Information Technology Act-2000-3 (Sec 43 to 45 and Sec 65 to 78). Leland. Allworth Press 8.Unit-IV Enforcement of Intellectual Property Rights .the Malaysian Approach. Determinative factors. Copyright in the Digital Media. Licensing Art & Design by Caryn R.) V. The Role and Function of Certifying Authorities. Patents in the Cyber World. Peter Weill “IT Savvy: What Top Executives Must Know to Go from Pain to Gain 4. Information Technology Act2000-6 ( Sec 91-94) Amendments in 2008. Cyber Jurisprudence Law of Digital Contracts : The Essence of Digital Contracts. Ross “Enterprise Architecture As Strategy: Creating a Foundation for Business Execution” 3. . Scope of Cyber Laws. V. How To Register Your Own Copyright by Marx Warda. Information Technology Act-2000-4(Sec 46 to Sec 64 and CRAT Rules). (2 ed. Criminal Remedies. The Science of Cryptography Intellectual Property Issues in Cyber Space: Domain Names and Related issues. Information Technology Act-2000-2 (Sec 14 to 42 and Certifying authority Rules). Cyber Law Issues for Management : Cyber Law Issues in E-Business Management.Civil Remedies. Rights of Netizens and E-Governance : Privacy and Freedom Issues in the Cyber World. Unit-V Unit-VI References: 1. Peter Weill . International Scenario in Cyber Laws : Data Protection Laws in EU and USA. Cyber Laws . E-Governance. IT Act 2000 with amendments in 2008 6. Jeanne W. Tutorial: At least three tutorials based on above syllabus must be conducted. Sopale ( PHI) Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. Information Technology Act-2000-5 (Sec 79 to 90). important clauses. Child Abuse Protection Laws in EU and USA. Practical Aspects of Licencing – Benefits . The System of Digital Signatures. Border Security measures. Sphinx Publishing 7. Major issues in Cyber Evidence Management. Cyber Law Compliancy Audit.wipo. Jeanne Ross “IT Governance: How Top Performers Manage IT Decision Rights for Superior Results” 2. Cyber Crimes and Cyber Laws Information Technology Act 2000 : Information Technology Act-2000-1 (Sec 1 to 13). licensing clauses. Managing Intellectual Property: The Strategic Importance. 5.

transition phases. Metrics automation.CLASS: B. The Project Environment. Next generation Software economics. The old way and the new : The principles of conventional software Engineering. Checkpoints of the process : Major mile stones. evolution of Organizations. transitioning to an iterative process. Tailoring the Process: Process discriminants. Periodic status assessments. Project Control and Process instrumentation: The seven core Metrics. Work Flows of the process : Software process workflows. Life cycle phases : Engineering and production stages. Future Software Project Management: Modern Project Profiles. Iteration planning process. life cycle expectations. cost and schedule estimating. Unit-II Unit-III Unit-IV Unit-V Unit-VI . modern process transitions. programmatic artifacts. Improving Software Economics : Reducing Software product size. Process Automation: Automation Building blocks. pragmatic software cost estimation. peer inspections. Elaboration. Project Organizations. Management artifacts. Project Organizations and Responsibilities: Line-of-Business Organizations. Pragmatic planning. conventional software Management performance. principles of modern software management. Sc (Information technology) SUBJECT: Project Management Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit-I Conventional Software Management : The waterfall model. planning guidelines. improving software processes. Iteration workflows. improving automation. Management indicators. Engineering artifacts. quality indicators. inception. pragmatic Software Metrics. Model based software architectures : A Management perspective and technical perspective. improving team effectiveness. construction. Minor Milestones. Artifacts of the process : The artifact sets. Iterative Process Planning : Work breakdown structures. Achieving required quality. Evolution of Software Economics : Software Economics.

Geographically referenced data.A systems Approach to planning. Relational model. Creating new data. Plane coordinate systems. (3rd ed. RMS error and its interpretation. Resampling of pixel values. A Guide to the Project Management Body of Knowledge (3rd Edition). Walker Royce: Pearson Education. scheduling and controlling Harold Kerzner (John Wiley & Sons. Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. typography. Meredith. 2005. Attribute data input and data display : Attribute data in GIS.) by S A Kelkar (PHI) 3. PA. Sc (Information Technology) SUBJECT: Geographic Information Systems Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Theory Examination TW/Tutorial/Practical Unit I Unit II Unit III Spatial Data Concepts: Introduction to GIS. projected and planer coordinate system. types of maps. 2. Project Management. Manipulation of fields and attribute data. Project Management Institute. Conversion of existing data. Data entry. Geometric transformation. Information Technology project Management.. Sutton with Gopalan (Wiley India Edition) 2. Shafer. Map projections. Geographic. cartographic symbolization. Software Project Management. Raster data model Data Input and Geometric transformation: Existing GIS data. Project Management Core Textbook – Mantel Jr. Information Technology Project management (4th Edition) – Kathy Schwalbe (Centgage Learning – Indian Edition) Reference Books: 1. 2005. map production . Metadata. CLASS: B. map design. Inc) 4. Vector data model. Tutorial: At least three tutorials based on above syllabus must be conducted.Books: 1.Newtown Square.: a concise study.

Distance measure operations Spatial Interpolation: Elements. map overlay. attribute data query.Unit IV Unit V Unit VI Data exploration: Exploration. neighbourhood operations. Distance measurement and map manipulation. analysis. Yeung http://www. Raster data analysis: Data analysis environment. Sc (Information Technology) SUBJECT: PROJECT Periods per week 1 Period is 50 minutes Lecture TW/Tutorial/Practical Semester – VI 5 3 Hours 2 -Marks 60 40 Evaluation System Final Examination Term Work The project should be undertaken preferably individually or by the group of maximum 3 students who will jointly work and implement the project. spatial data query. Comparisons of different methods Text Book Introduction to Geographic Information Systems by Kang-Tsung Chang Published by Tata Mcgraw Hill Reference Books and websites Concepts and Techniques in Geographic Information Systems by Chor Pang Lo and Albert K. raster data query. Kriging. The candidate/ group is expected to complete detailed system design. buffering. Global methods.ncgia. local methods. zonal operations. procurement of hardware and/or software. . The candidate/group will select a project with the approval of the Guide (staff member) and submit the name of the project with a synopsis of the proposed work of not more than 02 to 08 pages within one month of the starting of the semester.ucsb. local operations. data flow design. Tutorial: At least three tutorials based on above syllabus must be Term Work: Assignments: Should contain at least 6 assignments (one per unit) covering the Syllabus. geographic visualization Vector data analysis: Introduction. CLASS: B. W.

implementation of a few modules of the proposed work during the semester VI as a part of the term work submission in the form of a joint report. Project work should be continually evaluated based on the contributions of the candidate/group members. Two mid-term evaluations should be done. Candidate/group will submit the completed project work to the department at the end of semester VI as mentioned below. the major part of the assessment will be based on the written material in the project report. 2. and demonstrate the software. The project report should contain a full and coherent account of your work. which includes presentations and demos of the work done. The suggestive structure of a project report should be guided by your guide in selecting the most appropriate format for your project. etc. The workable project. database design iv) System implementation – algorithm. but ultimately it’s the candidates own responsibility. research and developmental efforts. Although there will be an opportunity to present the work verbally. code documentation v) Test results and test report. Note: 1. c) Extensive problem solving exercises should be given in order to improve the interest in the subject. iii) System design – dataflow diagrams. The project report in the bound journal complete in all respect with the following : i) Problem specifications. one on each unit is expected to be completed in a semester for each subject. innovations brought in. depth and applicability. ii) System definition – requirement analysis. 2. One can expect help and feedback from the project guide. b) The subjects not having practicals should be supported by tutorials/case studies to be discussed in a class. . 1. vi) In case of object oriented approach – appropriate process be followed. The term work assessment will be done jointly by teachers appointed by Head of the Institution. The oral examination will be conducted by an internal and external examiner as appointed by the University. originality of the work. General Instructions for all the courses in sem IV and V: a) Six assignments.

Sign up to vote on this title
UsefulNot useful