JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M.

TECH (COMPUTER NETWORKS AND INFORMATION SECURITY) COURSE STRUCTURE AND SYLLABUS I YEAR I SEMESTER Code Group

Elective -I

Subject Advanced Computer Networks Network Programming Distributed Computing Information Security – I Java &Web Technologies Software Architecture and Process Management
Multimedia and Rich Internet Applications

L 3 3 3 3 3

P 0 0 0 0 0

Credits 3 3 3 3 3

Elective -II

Lab

TCP/IP Protocol Suite Embedded Systems Data Warehousing and Mining Distributed Databases Speech Processing Network Programming Lab Seminar Total Credits (6 Theory + 1 Lab.)

3

0

3

0 -

3 -

2 2 22

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. Tech. (CN&IS)
ADVANCED COMPUTER NETWORKS UNIT I Review Computer Networks and the Internet: What is the Internet, The Network edge, The Network core, Access Networks and Physical media, ISPs and Internet Backbones, Delay and Loss in Packet-Switched Networks, History of Computer Networking and the Internet - Foundation of Networking Protocols: 5-layer TCP/IP Model, 7-Layer OSI Model, Internet Protocols and Addressing, Equal-Sized Packets Model: ATM - Networking Devices: Multiplexers, Modems and Internet Access Devices, Switching and Routing Devices, Router Structure. UNIT II The Link Layer and Local Area Networks: Link Layer: Introduction and Services, ErrorDetection and Error-Correction techniques, Multiple Access Protocols, Link Layer Addressing, Ethernet, Interconnections: Hubs and Switches, PPP: The Point-to-Point Protocol, Link Virtualization - Routing and Internetworking: Network–Layer Routing, Least-Cost-Path algorithms, Non-Least-Cost-Path algorithms, Intradomain Routing Protocols, Interdomain Routing Protocols, Congestion Control at Network Layer UNIT III Logical Addressing: IPv4 Addresses, IPv6 Addresses - Internet Protocol: Internetworking, IPv4, IPv6, Transition from IPv4 to IPv6 – Multicasting Techniques and Protocols: Basic Definitions and Techniques, Intradomain Multicast Protocols, Interdomain Multicast Protocols, Node-Level Multicast algorithms - Transport and End-to-End Protocols: Transport Layer, Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Mobile Transport Protocols, TCP Congestion Control – Application Layer: Principles of Network Applications, The Web and HTTP, File Transfer: FTP, Electronic Mail in the Internet, Domain Name System (DNS), P2P File Sharing, Socket Programming with TCP and UDP, Building a Simple Web Server UNIT IV Wireless Networks and Mobile IP: Infrastructure of Wireless Networks, Wireless LAN Technologies, IEEE 802.11 Wireless Standard, Cellular Networks, Mobile IP, Wireless Mesh Networks (WMNs) - Optical Networks and WDM Systems: Overview of Optical Networks, Basic Optical Networking Devices, Large-Scale Optical Switches, Optical Routers, Wavelength Allocation in Networks, Case Study: An All-Optical Switch UNIT V

I SEMESTER

VPNs, Tunneling and Overlay Networks: Virtual Private Networks (VPNs), Multiprotocol
Label Switching (MPLS), Overlay Networks – VoIP and Multimedia Networking: Overview of IP Telephony, VoIP Signaling Protocols, Real-Time Media Transport Protocols, Distributed Multimedia Networking, Stream Control Transmission Protocol - Mobile A-Hoc Networks: Overview of Wireless Ad-Hoc Networks, Routing in Ad-Hoc Networks, Routing Protocols for Ad-Hoc Networks – Wireless Sensor Networks: Sensor Networks and Protocol Structures, Communication Energy Model, Clustering Protocols, Routing Protocols TEXT BOOKS: 1. Computer Networking: A Top-Down Approach Featuring the Internet, James F. Kurose, Keith W.Ross, Third Edition, Pearson Education, 2007 2. Computer and Communication Networks, Nader F. Mir, Pearson Education, 2007

Ed Tittel. 3. . Pearson Education (CISCO Press) 5.Fifth Edition.Farrel. 2007 2.REFERENCES: 1. Prentice Hall. Fourth Edition. Greg Tomsho. Andrew S. Behrouz A. 6. Computer Networks. Guide to Networking Essentials.Keshav. Fourth Edition. S.A. An Engineering Approach to Computer Networking . The Internet and Its Protocols. Tanenbaum. Catherine Paquet. Pearson Education. 4. David Johnson. Data Communications and Networking. Diane Teare. Thomson. Campus Network Design Fundamentals.Elsevier. Forouzan. Tata McGraw Hill.

fcntl. read.Linux Process – Process concept. IPC between processes on different systems. quoting.NetworkIPC (Part-II)-Windows Sockets. closedir. link.Scalars and their operations. Process utilities. pause.Comparison of IPC methods. pattern matching. system. process termination. File System Layout. shell responsibilities.rewinddir. shell commands.unlink.file and directory management . chdir./ServerPrograms. the shell as a programming language.Socket Client functions. abort. Semaphore and Shared memory example. The standard I/O library (C).send.Ex. UNIT III Interprocess Communication .Example-Client. (CN&IS) NETWORK PROGRAMMING UNIT I Linux Utilities-File handling utilities.accept. Tech. lseek.Socket Server functions.. rmdir. FIFOs.File Concept. UNIT II Linux Files. example programs. Remote Procedure Calls-Introduction. shell script examples. Message Queues.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. creat. readdir. Socket system calls for Connection oriented-Communicationsocket.Transparency issues handling in Sun RPC. unreliable signals.Working with the Bourne again shell(bash): Introduction.Socket descriptors.getsockopt. kill. arithmetic in shell. command substitution.A Socket-based server. Signal generation and handling. system call interface for process management-fork. file I/O. chown. Orphan process. UNIT IV NetworkIPC (Part-I)-Introduction to Unix Sockets. file name substitution. dup. close.Out-of-Band Data. umask. telldir functions. client/server example.fcntl. kernel support for files.listen. functions. vfork. Linux APIs for Shared memory.Basics of Perl . seekdir. System calls.Kernel support for shared memory.recvfrom. shell meta characters. debugging shell scripts. IPC between processes on a single computer system. UNIT V Advanced Socket System calls. arrays. Kernel support for process. running a shell script.Addressing-Byte Ordering. Pipes. Linux APIs for semaphores.usage of open. File types. process attributes. getcwd. functions. stat family.Introduction to IPC.Kernel support for messages. raise . references.Semaphores-Kernel support for semaphores. mkdir. File Structure.. assignment statements and simple I/O. dup2.chmod.File locking with semaphores. symlink). zombie process. low level file access . process creation. Linux APIs for messages.Address formats. opendir.Linux Signals – Introduction to signals. waiting for a process. sed.RPC model.Sun RPC-actual RPC implementation with the Sun RPC System. reliable signals. shell variables. Semaphores and Shared memory. Kernel support for signals. Signal function. write. process hierarchy.Transparency issues. A Socket-based client. awk.. hashes.bind. control structures. exec family.recv.connect.Socket options-setsockopt.sendto. waitpid. links(soft links & hard links .Shared Memory. interrupt processing. Introduction to three types of IPC(Linux)-Message queues. Socket system calls for Connectionless-Communicationsocket. exit. output redirection. Disk utilities. Networking commands. Text processing utilities and Backup utilities. the environment. alarm. here documents. Filters. test command. wait. sleep functions. Security by file permissions.ioctl system calls. pipes and input Redirection. I SEMESTER . control statements.

Robert Love. 2.D.Vol. Kumar Saurabh. Advanced Programming in the Unix environment. Windows Sockets Network Programming.Douglas Comer.A.TEXT BOOKS: 1.PHI. Linux System Programming. REFERENCE BOOKS: 1. O’Reilly. B. rp-2008. 4th Edition. N.Wrox. R. 5. 1st Edition.2006.R. Beginning Linux Programming.M.PHI/Pearson. Pearson Education. Schwartz. 3rd Edition. Graham Glass.Stevens. King Ables.R. W.Addison-Wesley. Pearson Education. T. PHI / Pearson Education. O’Reilly. Unix system programming using C++.Rago. 6. Wiley India pvt Ltd. SPD. Unix Programming. Bob Quinn and D.Hart. 8. 4th Edition. Learning Perl.III.Stevens & S.Pearson. rp-2007. TMH.Stones. R. 3.L.Phoenix. 4. 2nd Edition.Matthew.J. W. 2003. 7. Unix Network Programming. T. 3. 4. Sumitabha Das. SPD. Foy. Unix for programmers and users. Wiley India Edition. Unix Concepts and Applications.rp-2008.Shute. Windows system Programming. . Internetworking with TCP/IP.Chan. 2.

the meaning of Distributed computing. Parallel and cooperative computing. TEXT BOOKS: 1. Pearson Education. Java RMI API. An example CORBA application. comparison of WWW and Lotus Notes. 4. A. the strengths and weaknesses of Distributed computing. The Client-Server Paradigm (Java Socket API). Distributed Coordination-based systems – Introduction to coordination models. 3. comparison of RMI and socket API . 2. grid components. Principles and Applications. grid types – computational grid. An Archetypal Distributed Object Architecture. Principles and Paradigms. testing and debugging. Stream Adaptation UNIT V Grid Computing: Definition of grid. Lotus Notes. John Wiley & sons. comparison of TIB and JINI .JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. Inter-ORB protocols. the object space Paradigm. JINI. grid architecture and its relation to various Distributed Technologies .Fellenstein. Message system (or MOM) Paradigm – the point-to-point message model and the publish/subscribe message model. UNIT IV Distributed Document-based Systems : WWW. The Mobile Agent Paradigm. Distributed Object Systems. A sample RMI Application. Tech. parallel programming models and Paradigms. The peer-to-peer Paradigm. the Network Services Paradigm. UNIT III Distributed Objects Paradigm (RMI): Message passing versus Distributed Objects. cluster computing – Introduction. I SEMESTER . ORB. Client/Server Programming with Java and CORBA.V. grid benefits and applications.Cluster Computing : Parallel computing overview. QOS of service management.choosing a Paradigm for an application. CORBA object references.Liu. Mobile Agents Distributed Multimedia Systems : characteristics of multimedia data.Joseph & C. 5.Distributed Object Paradigm(CORBA): The basic Architecture. Pearson education. CORBA object services. M. Pearson education. steps for building an RMI application. Distributed Systems. RPC. Resource Management.Tanenbaum and M.Software Agents. Applications of Clusters. object servers and object clients. CORBA Naming Service and the Interoperable Naming Service. TIB.Steen . Agent Technology. Cluster Architecture. operating system concepts relevant to distributed computing. The Java RMI Architecture. Examples of Distributed systems. High Performance Cluster Computing. The CORBA object interface. Distributed. Distributed Computing. Grid Computing. R. object Adapters. The Distributed Objects Paradigms – RMI. J.Orfali & Dan Harkey. RMI. drawbacks of grid computing. Rajkumar Buyya. UNIT II Distributed Computing Paradigms Paradigms for Distributed Applications – Message Passing Paradigm. Java IDL. the architecture of distributed applications. second edition. RPC model. Pearson Education. (CN&IS) DISTRIBUTED COMPUTING UNIT I Introduction The different forms of computing – Monolithic.L. The collaborative application ( Groupware Paradigm) .S. data grid.

Duddy. Pearson Education. 2. Distributed Systems. Grid Computing: A Practical Guide to Technology and Applications.Coulouris. E. D. G. 3rd edition. J. O’Reilly. 3.R. Concepts and Design.Dollimore and Tim Kindbirg. 5. A. 4. Wiley Dreamtech. 3rd edition.Harold. Firewall Media.Minoli. Java Network Programming. Wiley & sons. 2nd edition. SPD. A Networking Approach to Grid Computing. Java Programming with CORBA. . Brose.Abbas. Vogel.REFERENCES: 1.

TMH 2007.Need for Keys.Public key cryptography principles. Race Conditions. Trusted Systems. TMH 4. Key Distribution. DAC. SNMPv1 Community facility and SNMPv3 OS Security. Code Red. Integrity. WILEY INDIA 2006. Forouzan. Network Security Essentials (Applications and Standards) by William Stallings. 5. Types of Firewalls. Basic concepts of SNMP. Cryptography & Network Security by Behrouz A. Mark Rhodes. Security Attacks (Interruption. Key Distribution UNIT III Approaches of Message Authentication. SPD O’REILLY 2006. Access Control. A model for Internetwork security. Attacks on Digital Signatutres. Internet Standards and RFCs. Discrete logarithms UNIT II Conventional Encryption Principles & Algorithms(DES. Stallings. I SEMESTER .Gangemi Sr. TEXT BOOKS: 1. Signing the Digest. Security Services (Confidentiality. Pearson Education 2007. Secure Hash Functions(SHA-512. Interception. Fermat’s and Euler’s theorems. Malware: Brain. Trusted Operating System: MAC. Network Security: The complete reference. AES. Services. Robert Bragg. Authentication. Malware Detection . ELGAMAL. ECC). WHIRLPOOL) and HMAC . Block Cipher Modes of Operation. Diffie-Hellman. Trusted Computing Base UNIT V Viruses and related threats. Anatomy of Virus. public key cryptography algorithms(RSA. testing for primality. Mark Stamp. modular arthimetic. Pearson Education. Morris Worm. Firewall Architectures. Information Security Principles & Practice. prime & relative numbers. Computer Security Basics by Rick Lehtinen. Chinese remainder theorem. Fourth edition. X. Virus Counter Measures . Kerberos.. access Control and Availability) and Mechanisms. REFERENCES: 1. Location of Encryption Devices.Firewalls. Tech.I UNIT I Security Goals. (CN&IS) INFORMATION SECURITY. RC4). OS Security Functions.509 Directory Authentication Service UNIT IV Network Management. Non-repudiation. PHI/Pearson 2. Trusted path. Memory Protection. Modification and Fabrication). Incomplete Mediation. Mathematical Tools for Cryptography: Introduction to number theory.Software Flaws: Buffer Overflow. Cryptography and network Security. Modern Cryptography by Wenbo Mao. Separation.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M.T.Digital Signatures: Comparison. RABIN. Process. Deborah Russell & G. 2. Design principles. 3.

JSDK The Servelet API. Using Scripting Elements Implicit JSP Objects. Class. Using XML Processors: DOM and SAX Review of Applets. The javax. Requests. Handling Http Request & Responses.servelet Package. (CN&IS) WEB TECHNOLOGIES (Elective –I) I SEMESTER Unit I: HTML Common tags. JSP Application Design with MVC architecture. Java Beans API. Document Object model. Dynamic HTML with Java Script. JSP Processing. Cascading Style sheets. Event Handling. Introduction to JSP: The Problem with Servelet. Unit III: Java Beans: Introduction to Java Beans. Bean Info Interface. Frames. Unit IV: More on Servlets: The javax. AWT Programming. Objects in Java Script. Declaring Variables and Methods Error Handling and Debugging Sharing Data Between JSP pages.List. Constrained properties Persistence.servelet HTTP package.sql.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. CSS Unit II: XML: Document type definition.* package Accessing a Database from a JSP Page Application – Specific Database Actions Deploying JAVA Beans in a JSP Page TEXT BOOKS: 1. XML Schemas. Chris Bates 2nd edition. Using Cookies-Session Tracking. BDK Introspection. Customizes. Introduction to Java Scripts. AJAX. WILEY Dreamtech (UNIT 1. images. Using Bound properties. Web Programming. Presenting XML. Introduction to Servelets: Lifecycle of a Serverlet.2) . Security Issues. Introduction to Swing: JApplet. Handling Swing Controls like Icons – Labels – Buttons – Text Boxes – Combo – Boxes – Tabbed Pains – Scroll Pains – Trees – Tables Differences between AWT Controls & Swing Controls Developing a Home page using Applet & Swing. Reading Initialization parameters. forms. Conditional Processing – Displaying Values Using an Expression to Set an Attribute. Reading Servelet parameters. building internet applications. Tech. Unit V: JSP Application Development: Generating Dynamic Content. Tables. Web servers: Tomcat Server installation & Testing. Advantages of Java Beans. and Users Passing Control and Date between Pages – Sharing Session and Application Data – Memory Usage Considerations Database Access Database Programming using JDBC Studying Javax. The Anatomy of a JSP Page.

Java Server Programming .D. Java Server Pages –Hans Bergsten. 8.Ivan Bayross and others.Flanagan.3) 3.2.5) REFERENCE BOOKS: 1. Murach’s beginning JAVA JDK 5. S P D O’Reilly for chap 8.The X Team. Java Server Pages. Internet and World Wide Web – How to program .Allamaraju and othersApress(dreamtech). Pearson. Jakarta Struts Cookbook .. An Introduction to web Design and Programming –Wang-Thomson 7. Pekowsky.Pearson 2. Programming world wide web-Sebesta. 11. 12. Beginning Web Programming-Jon Duckett WROX. TMH (Chapters: 25) (UNIT 2. Core SERVLETS ANDJAVASERVER PAGES VOLUME 1: CORE TECHNOLOGIES .S. Murach. Java Script. .Patrick Naughton and Herbert Schildt.SPD. Web Warrior Guide to Web Programmming-Bai/Ekedaw-Thomas 10. 4.4. Marty Hall and Larry Brown Pearson 3. Bill Siggelkow. Professional Java Server Programming. SPD 6. 5.O’Reilly. The complete Reference Java 2 Fifth Edition . Dietel and Nieto PHI/Pearson. SPD O’Reilly (UNITs 3.SPD 9.

2003 . reference architectures. UNIT V Moving from one system to many Software Product Lines. UNIT II The Repeatable Process: Managing Software Organizations. architectural structures and views . defining the software process. reference models. 2003 4. designing the Architecture. 3. Tech. Paul Clements & Rick Kazman. Len Bass. Software architecture in future. Published by Pearson Education. Pearson education. An Introduction to the Team Software Process.2003. Software architecture. Humphrey. 2. Dikel. REFERENCES: 1. David Kane and James R. Addison wesley. Achieving qualities. Architecture design decision making. ATAM. Architectural patterns. second edition. UNIT IV Envisioning Architecture The Architecture Business Cycle. Pearson Education.2001 5. Software inspections. The Initial Process. Software Process Assessment.The Defined Process: Software standards. Building systems from off the shelf components. The Principles of Software Process Change. (CN&IS) I SEMESTER SOFTWARE ARCHITECTURE AND PROCESS MANAGEMENT ELCTIVE -I UNIT I Software Process Maturity: Software maturity Framework. Architectural styles and patterns. Humphrey. Watts S. software configuration management (Part-II). Introduction to the Personal Software Process by Watts S. Wilson. What is Software Architecture.Quality Attributes. second edition.Architecture Evaluation. CBAM. UNIT III The Managed Process: Data Gathering and analysis.Creating an Architecture . Humphrey. Software Configuration Management (Part-I) . TEXT BOOKS: 1. The project plan. Pearson Education. managing software quality The Optimizing Process: Defect prevention.Analyzing Architectures .2000 2. Luke Hohmann. David M. published by Pearson Education. Beyond Software architecture. Prentice Hall PTR.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. automating the Software Process. David Budgen. Software Design. Managing the Software Process by Watts S. Documenting software architectures. Software Architecture in Practice. Reconstructing Software Architecture .

Huffman coding. Using XML. Dojo ToolKit. Web 2.Audio/Video Conferencing.Text. (CN&IS) MULTIMEDIA AND RICH INTERNET APPLICATIONS ELECTIVE -I I SEMESTER Unit I. Motion Compensated Prediction. Interacting with Server Side Applications. Costumizing your User Interface. Publish your flash movie.Multimedia Information representationDigitization Principles. Audio Compression. H. RSS. Atom. Introduction to Multimedia Internet and Multimedia communications. Unit IV Rich Internet Applications(RIAs) with Adobe Flash and Flex Adobe Flash.0 What is web 2.Real Time Application with Resource Reservation .Introduction.Introduction.263. Multimedia Applications in Networks.Multimedia Networks. Creating special effects with Flash. Creating a full scale Ajax Enabled application.MPEG 2 and 3 Video. Unit III Web 2.Images. XML. Search. Learning Flash with Hands-on Examples. Web Services.Audio and Video. Multicast file transfer. . Arithmetic coding. Social Marking. and VoIP. Social Networking.MultiMedia Applications on the World Wide Web – Multicast Web Page Sharing. JSON.Audio/Video Conferencing-Session Directories. Rich Internet Application with Ajax. Adobe Flex 2. Traditional Web Applications vs Ajax Applications. Mashups. Interactive Multiplayer Games.Video Server. Introduction. Connection Independent RIAs on the desktop -Adobe Integrated Runtime(AIR). Social Media. History of Ajax.0 Monetization and Business Models. Blogging. Raw Ajax example using xmlhttprequest object. Multi Talk. Application Level Framing. Audio/Video Streams in the www. Flash Movie Development.Compression Methods-Basic Coding Methods – Run Length coding.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M.261.Reciever Hetrogenity.Enabled Rich Internet Application Introduction.0. Flex 3 Beta.User Generated Content. Creating a website splash screen. Tech. Creating Charts and Graphs. H. Creating a Simple User Interface. Network Text Editor for Shared Text Editing.Content Networks. web sources. Flex Platform Overview. Future of the Web. Video Compression – JPEG. Rich Internet Applications. Unit II. Wavelet and Fractal Image Compression. Discrete Cosine Transform. Differential PCM. Location Based Services.Multimedia Applications. Tagging. Applications requiring reliable multicast – White Board . Accessing XML data from your application. action script.Adaptive Applications. Unit V Ajax. MPEG-1 Video.

Parekh.Harmon.Wiley India Edition. Rich Internet Applications. Simon barber and Renaun Erickson.Mastering Dojo.Tapper&others.SPD.Wrox.Pearson education.Multimedia Communications : Applications.TMH.Riecke and A.Adobe Flex 3:Training from the Source.Kazoun and J.C. Paul J Deitel and Harvey M Deitel.Professional Adobe Flex 2 .Pearson Education. REFERENCE BOOKS: 1. 3.PHI Learning.Programming Flex 3. 7.Addison Wesley Publications.E. J.Rao. Communications & Applications .Bojkovic and Milovanovic. 5.Russell. standards and networks. Wolf gang Effelsberg.AJAX.SPD.Prentice Hall Publications. 2.R. 3. Nalin K Sharda.TEXT BOOKS: 1.Gill. 4.C. K.Pearson Education. 2. Protocols and Standards .Multimedia Communications: Protocols and Applications .Deitel Developer Series.Multimedia Computing. Rich Tretola .Lott.Pearson Education.Multimedia Communication Systems: techniques. Networks.Dojo.Principles of Multimedia.Joaquin Garcia . 9.PHI Learning.Multimedia Information Networking . Ralf Steinmetz and Klara Nahrstedt. 6. Franklin F Kuo. and Web Development for Programmers..J. . Fred Halsall. 8.R.R.

Protocols and Architectures”. Sub netting and Super netting. Domain Name System (DNS). Hyper Text Transfer Protocol (HTTP) Text Books: 1.V File Transfer Protocol (FTP). IP Addressing. Douglas E. PHI. Delivery and Routing of IP Packets UNIT . TCP/IP Unleashed.Comer. “TCP/IP Protocol Suite”. 2. ARP and RARP. Forouzan BA. Trivial File Transfer Protocol (SMTP).II Internet Protocol (IP). Vol. Transmission Control Protocol (TCP) . BOOTP and DHCP.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. I. Internet Group Management Protocol (IGMP) UNIT . OSPF. I SEMESTER .I Introduction to TCP/IP. Routing Protocols (RIP. “Internetworking with TCP/IP. HELLO and BGP) UNIT . (CN&IS) TCP/IP PROTOCOL SUITE ELECTIVE -I UNIT .III User Datagram Protocol (UDP). Tech. Fourth Edition.IV Application Layer and Client-Server Model. Simple Network Management Protocol (SNMP). The OSI Model and TCP/IP Protocol Suites. Principles. TMH (2000) References: 1. Telnet and Rlogin UNIT . Internet Control Message Protocol (ICMP). Underlying Technologies. Pearson Education. CIDR.

4. Simulators. Thomson.V. Internet Enabled Systems. Simulation and Debugging Techniques and Tools: Testing on Host Machine. Muhammad Ali Mazidi. Complex System Design. Pearson.RTOS Programming: Basic functions and Types of RTOSES. 7. Real Time Clock. Pearson Education. Microcontrollers.V. Embedded Programming in C++ & JAVA UNIT IV I SEMESTER Real – Time Operating Systems: OS Services. The 8051 Microcontroller. Wireless and Mobile System protocols UNIT III Embedded Programming Concepts: Software programming in Assembly language and High Level Language. Pearson Education. Data types.Ayala. Introduction to Advanced Architectures. Third Edition. dreamTech press 2.Devices and Communication Buses for Devices Network: Serial and parallel Devices & ports.Prasad. Windows CE UNIT V Embedded Software Development Process and Tools: Introduction to Embedded Software Development Process and Tools. Embedded Hardware Units and Devices in a System. Laboratory Tools TEXT BOOKS: 1. Modifiers. Serial data Input/Output. Loops and Pointers. Linking and Locating Software. object oriented Programming. Counter and Timers. Embedded/Real-Time Systems. Ajay V Deshmukhi. An Embedded Software Primer. Real World Interfacing. REFERENCES: 1. Process and Memory Management. Classification of Embedded Systems UNIT II 8051 and Advanced Processor Architecture: 8051 Architecture. Input/Output Ports and Circuits.K. Response of Task as Performance Metrics . Host and Target Machines. External Memory. RTOS VxWorks. Interrupts. Simon. Interrupt Latency. Structures. Networked Embedded Systems. Raj kamal. Micro Controllers. Embedded Systems. Formalization of System Design. 5. Getting Embedded Software into the Target System. Processor Embedded into a System.K. Real – Time Operating Systems.K. Issues in Hardware-Software Design and Co-Design . David E. Watchdog Timer. Dr. Second Edition TMH.TMH. Kenneth J. (CN&IS) EMBEDDED SYSTEMS ELECTIVE –II UNIT I Introduction to Embedded Systems: Embedded Systems. Tech. Basic Design Using an RTOS.Shibu K. Macros and Functions. Wireless Devices. Raj Kamal. 6. TMH. Embedded Software.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M.Testing. Task Scheduling Models. 8051 Micro controller Hardware. The 8051 Microcontroller and Embedded Systems. 3. . Introduction to Embedded Systems. Timer and Counting Devices. Processor and Memory organization . Design Process in Embedded System.

Data Preprocessing: Need for Preprocessing the Data. UNIT III Mining Frequent Patterns. Classification by Backpropagation. Mining various kinds of Association Rules. Text Mining. Constraint-Based Association Mining Classification and Prediction: Issues Regarding Classification and Prediction. Mining Time-Series Data. Integration of a Data Mining System with a Database or a Data Warehouse System. UNIT II Data Warehouse and OLAP Technology for Data Mining: Data Warehouse. Graph Mining. Prediction. Introduction to Data Mining – Pang-Ning Tan. A Categorization of Major Clustering Methods. Michael Steinbach and Vipin Kumar. Further Development of Data Cube Technology. Model-Based Clustering Methods.Jiawei Han & Micheline Kamber. Multimedia. Efficient and Scalable Frequent Itemset Mining Methods. Outlier Analysis . Lazy Learners. Data Warehouse Architecture. Data Mining Functionalities. Data Warehouse Implementation. Major issues in Data Mining. Time Series and Sequence Data: Mining Data Streams. Multimedia Data Mining. REFERENCES: 1. Additional Themes on Data Mining and Social Impacts of Data Mining. From Data Warehousing to Data Mining Data Cube Computation and Data Generalization: Efficient Methods for Data Cube Computation. Clustering High-Dimensional Data. 2nd Edition. Mining the World Wide Web. 2006. Bayesian Classification. Associative Classification. Mining Sequence Patterns in Transactional Databases. Classification of Data Mining systems. Data Mining System Products and Research Prototypes. TEXT BOOKS: 1.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. Data Warehousing Fundamentals – Paulraj Ponnaiah Wiley student Edition I SEMESTER . Hierarchical Methods. Classification by Decision Tree Induction. Tech. Further Development of Data Cube and OLAP Technology. Morgan Kaufmann Publishers. Pearson education. Accuracy and Error measures. Data Cleaning. GridBased Methods. Data Integration and Transformation. Constraint-Based Cluster Analysis. Partitioning Methods. Discretization and Concept Hierarchy Generation. Multidimensional Data Model. Data Mining Task Primitives. Other Classification Methods.Mining Streams. Density-Based Methods.Applications and Trends in Data Mining: Data Mining Applications. Ensemble Methods UNIT IV Cluster Analysis Introduction :Types of Data in Cluster Analysis. Data Warehousing in the Real World – Sam Aanhory & Dennis Murray Pearson Edn Asia. Mining Sequence Patterns in Biological Data. Evaluating the accuracy of a Classifier or a Predictor. . Associations and Correlations: Basic Concepts. (CN&IS) DATA WAREHOUSING AND MINING ELECTIVE -II UNIT I Introduction: Fundamentals of data mining. Attribute-Oriented Induction. 2. Support Vector Machines. 2. Spatial. Data Reduction. From Association Mining to Correlation Analysis. Social Network Analysis and Multirelational Data Mining: UNIT V Mining Object. Text and Web Data: Multidimensional Analysis and Descriptive Mining of Complex Data Objects. Spatial Data Mining. Rule-Based Classification. Data Mining – Concepts and Techniques .

5. Data Mining Introductory and advanced topics –Margaret H Dunham. University Press. 2005. John Wiley & Sons Inc. . Pearson education Data Mining Techniques – Arun K Pujari. 4. 6.3. The Data Warehouse Life cycle Tool kit – Ralph Kimball Wiley student edition Building the Data Warehouse By William H Inmon.

Determining a Consistent View of the Network. Object Management. Foundation of Distributed Concurrency Control. M. Object Migration. Object Identifier Management. A Framework for Query Optimization. General Queries UNIT III The Management of Distributed Transactions. Pearson Education. Checkpoints and Cold Restart. Distributed Object Storage. PUSH-Based Technologies TEXT BOOKS: 1. Principles of Distributed Databases. Concurrency Control for Distributed Transactions. 2. Query Optimization Issues Transaction Management Transaction and Computation Model. Distributed Database Design UNIT II Translation of Global Queries to Fragment Queries. Cache Consistency. Scheme Integration. Reference Architecture for Distributed Databases. Transactions as Objects Database Integration. Catalog Management in Distributed Databases. COM/OLE and Database Interoperability. Optimistic Methods for Distributed Concurrency Control. Optimization of Access Strategies. Object Query Processor Architectures. (CN&IS) DISTRIBUTED DATABASES ELECTIVE -II UNIT I Features of Distributed versus Centralized Databases. Distributed Databases Principles & Systems. Object Orientation and Interoperability. Join Queries. Distributed Database Administration.TMH. Reliability and concurrency Control. Alternative Client/Server Architectures. Multidatabase Concurrency Control. Nonblocking Commitment Protocols. Transaction Management in Object DBMSs. Stefano Ceri. Principles of Distributed Database Systems. Architectural Aspects of Distributed Transactions Concurrency Control. Distributed Deadlocks.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. Scheme Translation. Distributed Component Object Model. Patrick Valduriez . Parametric Queries. Integrity Constraints in Distributed Databases. Basic Concepts. UNIT IV Reliability. Giuseppe Pelagatti. Types of Data Fragmentation. Object Query Processing. Distributed Grouping and Aggregate Function Evaluation. Query Processing Query Processing Layers in Distributed Multi-DBMSs. Query Execution. Transforming Global Queries into Fragment Queries. Authorization and Protection UNIT V Architectural Issues. I SEMESTER . Multidatabase Recovery. Concurrency Control based on Timestamps. Pointer Swizzling. Query Processing Issues. Transaction Management. Supporting Atomicity of Distributed Transactions. Tech. Object Management Architecture CORBA and Database interoperability. Levels Of Distribution Transparency. Detection and Resolution of Inconsistency. Equivalence transformations for Queries. 2nd Edition. Tamer Ozsu. A Framework for Transaction Management.

Performance evaluation.Cepstral Analysis: Mathematical details of Cepstral analysis. Nasals. Articulatory Models. speech Enhancement. spectral features. Discrete –Time Signal and Systems: Sampling. Features that distinguish the speakers: measures of the effectiveness of features. Frequency–Domain (Spectral) Parameters: Filter–Bank Analysis. Frequency Analysis : Fourier Transform. Recognition techniques: Model evaluation. speech coding. Balm-Welch re-estimation training. Viterbi algorithm. making ASR decisions UNIT V Speaker recognition: Introduction. Signals and Linear Systems: Simple signal. stochastic models. Place of the Articulation. Short –Time Average Energy and Magnitude.SPEECH ANALYSIS: Introduction. Recognition. Digital Filters. Short –Time Average Zero-Crossing Rate ( ZCR). speech segmentation. Short-Time speech Analysis: Windowing. techniques to choose features. Verification Vs. Least –Squares Covariance Method. Spectral Displays. parametric representation: parameters used in speech recognition. I SEMESTER . Evaluation of similarity of speech patterns: frame-based distance measures . statical Vs. Formant Estimation and Tracking UNIT III LINEAR PREDICTIVE CODING (LPC) ANALYSIS: Basic Principles of LPC. Speech Communication Douglas O’ Shaughnessy. Filtering and convolution. text dependence. Tech. Window Considerations . spectra and Correlation. Vocal Tract. Acoustic Phonetics : Spectrograms. Biing-Hwang Juang. Frequency Transforms of Discrete-Time Signals. Difference Equations and Interpolation UNIT II SPEECH PRODUCTION AND ACOUSTIC PHONETICS:Anatomy and Physiology of the speech Organs: the Lungs and the Thorax. Spectral Estimation Via LPC. Lawrence Rabiner. Updating the LPC Model Sample by Sample. vector quantization. stops (Plosives). Larynx and Vocal Folds(cords). dynamic features. (CN&IS) SPEECH PROCESSING ELECTIVE -II UNIT I INTRODUCTION Production of speech. Articulatory phonetics: Manner of Atriculatory. Fundamentals of Speech Recognition. Decimation and Interpolation Filter: Band pass Filter. segmenting speech into smaller units. short-Time Autocorrelation Function . Laplace Transform: Poles and Zeros. Universities Press. cepstral analysis.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. sound perception. short-time Spectral methods UNIT IV Introduction to speech recognition: Variability in speech signals. Mel-Scale Cepstrum. speech Synthesis. F0 Pitch estimation:Time domain F0 estimation methods. Structure of the Syllable. Diphthongs. REFERENCES: 1. Voicing. glides and Liquids. Applications for the spectrum. Database for speech recognition. Variants of Normal Speech . speech Analysis. testing. pattern recognition methods. speech and speaker Recognition. preprocessing. prosodic features TEXT BOOKS: 1. Pearson Edn. Computation Considerations. Phonemes in Other Language.HMM based Speech recognition: HMM representation. Least – Squares Autocorrelation Method. Time-domain Parameters: Signal Analysis in the Time Domain. feature extraction. Fricatives. Spectra of Windows: Wide-and Narrow –Band Spectrograms. similarity and distance measures. Vowels. Short-Time Fourier Transform Analysis.

**5. *16. *4. of two integers. the number of lines on it is also reported. NAME. **18.Write a shell script to reverse the rows and columns of a matrix.Write a shell script to generate a multiplication table. **24. The options are add (-a). Whenever the argument is a file.Write a shell script that determines the period for which a specified user is working on the system. MARKS3 and finds out the average for each student. *15. standard I/O b. *9.Write a c program that makes a copy of a file using a. **23.Write a shell script that displays the list of all files in the given directory. new name and so on. quotient (-c) and reminder (-r).Write a shell script to find the G.Write a shell script to find factorial of a given integer.D. multiply (-m). have the program ask him for the necessary information such as the file name. The script requires 3 arguments: The operation to be used and two integer numbers. subtracts. Once the user has made a choice.Write an awk script to count the number of lines in a file that do not contain vowels. multiplies and divides the given two integers. Daniel Jurafsky. removing or linking files. Pearson Edn. MARKS1. **26.Write a shell script that accepts any number of arguments and prints them in the reverse order.Write a shell script that copies multiple files to a directory.Let it offer the user the choice of copying.Write an interactive file-handling shell program. I SEMESTER . MARKS2.Write a shell script that deletes all lines containing a specified word in one or more files supplied as arguments to it.Write a shell script that counts the number of lines and words present in a given file.Write a shell script that receives any number of file names as arguments checks if every argument supplied is a file or a directory and reports accordingly. **20. *11. JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. words and lines in a file. *8. **17. **21.Write a shell script (small calculator) that adds.Write an awk script to find the factorial of a user supplied number.Write a shell script that displays a list of all the files in the current directory to which the user has read.Write a shell script to list all of the directory files in a directory. 2) to print the size of all files and number of files. *14. *13. *3. Martin. subtract (-s).Write sed command that deletes the character before the last character in each line a file.Write a shell script that accepts a file name.Write an awk script to find the number of characters. **19. system calls.Write an awk script that reads a file of which each line has 5 fields – ID.2. Tech. Write an awk script 1)to print the selected fields (Ex:size and name of the files) from the file listing. write and execute permissions. *2. Print out the average marks with appropriate messages. There are two division options: one returns the quotient and the other returns reminder. *7.Write a shell script that accepts a list of file names as its arguments. *10. (CN&IS) NETWORK PROGRAMMING LAB LIST OF SAMPLE PROBLEMS/EXPERIMENTS *1.Write a sed command that swaps the first and second words in each line of a file.C. Speech and Language processing. **22. starting and ending line numbers as arguments and displays all the lines between the given line numbers. *12. *6. ls –l command produces long listing of files. counts and reports the occurrence of each word that is present in the first argument file on other argument files. James H.Write a sed command that deletes the first character in each line in a file. **25.

***48. *36. to write 3 messages to it with different priority numbers. Write c programs that illustrate communication between two unrelated processes using named pipe. **40. ***53. *38. Using standard I/O b. b.Write a program that takes one or more file/directory names as command line input and reports the following information on the file. Interaction between server and client processes using Internet Domain Sockets.Implement in C the following Unix commands using system calls a.(Using semaphores). Write a c program in which a parent writes a message to a pipe and the child reads the message. Write a c program that accepts two small numbers as arguments and then sums the two numbers in a child process. Write a c program (receiver. Write a c program that creates a child process to execute a command. cat b. *51. Write a c program that displays the real time of a day every 60 seconds. mv ***29. Write a c program that illustrates how to execute two commands concurrently with a command pipe.Write a C program that counts the number of blanks in a text file a. then the parent uses kill to send a SIGTERM signal to kill the child process.ls –l | sort ***42.Time of last access. Write c program that illustrates two processes communicating via shared memory. **46. Write client and server programs (using C) for a. *31. 10 times. Interaction between server and client processes using Unix Domain Sockets. Write a c program ( sender. **50. puts a file into it. **41. Write a c program that illustrates suspending and resuming processes using signals. Write a c program to list for every file in a directory.Number of links. *32. Write a C program that illustrates file-locking using semaphores.c) that receives the messages (from the above message queue as specified in 63. **34. Using system calls **28. The sum should be returned by child to the parent as its exit status and the parent should print the sum. Write a c program to create a Zombie process. Write a c program that demonstrates redirection of standard output to a file. d. Design TCP iterative Client and server application to reverse the given input sentence . Write a c program to create a child process and allow the parent to display “parent” and the child to display “child” on the screen. its inode number and file name. Write a c program that creates a file containing hole which is occupying some space but having nothing.File type. Write a c program that creates a directory. ls c. Write and Execute permissions. to create a message queue with read and write permissions. If it doesn’t.Write a c program that runs a command that is input by the user and prints the exit status if the command completes in 5 seconds. **49. Ex:. and then removes it. **30. ***47. a.c ) a. b. Write a c program that illustrates how an orphan is created. *35. Write a c program to emulate the Unix ls –l command. *44. Write a c program that searches for a file in a directory and reports whether the file is present in the directory or not. *45. **43. *33. Read. **39. b.Ex: ls > f1. c.a) and displays them. The command to be executed is passed on the command line. Write a C program that implements a producer-consumer system with two processes. **52.*27. *37.

4. Advance Unix Programming.Gilberg. Pearson Education. Pearson Education. Design using poll client server application to multiplex TCP and UDP requests for converting a given text into upper case.G. B. Design UDP Client and server application to reverse the given input sentence ***59. Design a TCP concurrent server to echo given set of sentences using poll functions ***58.***54. Venkateswarlu.A. 4th Edition. Elllie Quigley. Thomson. Unix and Shell Programming. 3. Unix and Shell programming. ***61. Design a TCP concurrent server to convert a given text into upper case using multiplexing system call “select” ***57. BS Publication. Venkatesh Murthy. N. Design UDP Client server to transfer a file ***60. Design TCP client and server application to transfer file ***56. M.Forouzan and R.B. Unix Shells by Example. 5. Advance Unix Programming Richard Stevens. Design a RPC application to add and subtract a given pair of integers TEXT BOOKS: 1. Design TCP iterative Client and server application to reverse the given input sentence ***55. * Simple ** Moderate *** Complex . Second Edition Pearson Education 2.F.