You are on page 1of 6


Introduction to software engineering- scope of software engineering – historical aspects, economic aspects, maintenance aspects, specification and design aspects, team programming aspects. Software engineering a layered technology – processes, methods and tools. Software process models – prototyping models, incremental models, spiral model, waterfall model. Capability maturity model (CMM), ISO 9000. Phases in Software development – requirement analysis- requirements elicitation for software , analysis principles, software prototyping, specification.

Module II (13 hours)
Planning phase – project planning objective, software scope, empirical estimation models- COCOMO, single variable model, staffing and personal planning. Design phase – design process, principles, concepts, effective modular design, topdown, bottom up strategies, stepwise refinement. Coding – programming practice, verification, size measures, complexity analysis, coding standards. Testing – fundamentals, white box testing, control structure testing, black box testing, basis path testing, code walkthroughs and inspection, testing strategies-Issues, Unit testing, integration testing, Validation testing, System testing. Maintenance-Overview of maintenance process, types of maintenance. Risk management: software risks-risk identification-risk monitoring and management

Module III (13 hours)
Project Management concept: People – Product-Process-Project. Project scheduling and tracking: Basic concepts-relation between people and effort-defining task set for the software project-selecting software engineering task Software configuration management: Basics and standards User interface design- rules. Computer aided software engineering tools - CASE building blocks, taxonomy of CASE tools, integrated CASE environment.

multi vector and SIMD computers. data flow and hybrid architectures. shared memory organizations.conditions of parallelism.vector processing principles. Module II(18 hours) Processors and memory hierarchy – advanced processor technology.The state of computing. three generations of multicomputers. system interconnect architectures. Program and network properties . Architectural development tracks. virtual memory technology. multithreaded and data flow architectures . Multivector and SIMD computers . scalable and multithreaded architectures. instruction pipeline design.802 COMPUTER SYSTEM ARCHITECTURE 3 – 1 – 0 Module I (16 hours) Parallel computer models . Parallel Random Access Machines and VLSI complexity model. memory hierarchy technology.backplane bus systems. arithmetic pipeline design. Intel Paragon system architecture.multiprocessor system interconnects. Principles of scalable performance. superscalar and vector processors. multivector multiprocessors.latency hiding techniques. principles of multithreading. multi processors and multi computers. .scalability analysis and approaches. cache coherence and synchronization mechanism.08. Bus and shared memory . Scalable. SIMD computer organizations. nonlinear pipelining. superscalar and super pipeline design Module III(18 hours) Multiprocessors and multicomputers . Pipelining and superscalar techniques – linear vs.

Encapsulating Security payload.803 CRYPTOGRAPHY AND NETWORKS SECURITY 2 – 1 – 0 Module I (14 hours) Symmetric Cipher Models. .SHA. Web Security: Web Security considerations.Transposition techniques. Prime numbers.Message authentication codesHash functions.Primitive operation.Principles of Public key Cryptography Socket Layer and Transport layer Security. The Strength of DES.Authentication functions.Inverse Cipher. Firewalls-Packet filters.Substitution techniques. Odd round.IDEA: Primitive operations.Digital signature standards. Module III (12 hours) Network security: Electronic Mail Security: Pretty good privacy. Even Round. Module II (13 hours) Public key Cryptography :.authentication Header.Combining Security associations.Modular arithmetic.Authentication requirements.Key management. Security of Hash functions and MACS. RSA algorithms. MD5.Authentication protocols.Application Level GatewayEncrypted tunnels.DES: Simplified DES.Block Cipher modes of operations.Key Expansion. Inverse Rounds.Block Cipher Design principles.S/MIME IP Security: Architecture.One round.Key Management .The Data Encryption Standard.Rotor machinesSteganography. Number theory.Digital signatures.Inverse keys for description. Rounds.Secure electronic transaction.Block Cipher principals.Differential and linear Cryptanalysis.Diffie-Hellman Key Exchange.08. AES: Basic Structure. Elliptic curve cryptography.Key expansions.

group communication.08. Networking and internetworking: Types of network – network principles – internet protocols Module II (14 hours) Interprocess communication : the API for internet protocol – external data representation and marshalling – client server communication . Operating system support: Operating system layer – protection – processes and threads.communication and invocation – Operating system architecture security: Overview of security techniques Module III (13 hours) Distributed file system: File service architecture .fault tolerant servicestransactions with replicated data . Distributed objects and remote invocation: communication between distributed objects – remote procedure call – Events and notification.distributed deadlockstransactions recovery.Andrew file system-recent advances Transactions and concurrency control: nested transactions-locks-optimistic concurrency control-comparison of methods for concurrency control-flat and nested distributed study: inter process communication in file system. Replication System model and group communication.804 DISTRIBUTED SYSTEMS 2 – 1 – 0 Module I (12 hours) Characteristics of distributed System: Examples of distributed systems – resource sharing and web – world wide web – issues in the design of distributed system. System models: Architectural models and fundamental models.

Operations. Lambda-Cuts ( -cuts) for Fuzzy sets and relations. Fuzzy Clustering. Fuzzy Systems and Neural Networks. Tolerance and Equivalence relations. Fuzzy sets and membership. Max-Min method. Fuzzy systems. Features. Fuzzy Databases and Information retrieval systems. Inductive reasoning. Fuzzification. Fuzzy Controllers (overview & example). Fuzzy rule-based systems. Membership functions. . Module II (16 hours) Defuzzification to Crisp sets. Inference. Module III (18 hours) Applications. Crisp and Fuzzy relations. Properties. Natural language. Classical relations and Fuzzy relations. Defuzzification methods. Classical Logic and Fuzzy Logic. Intuition. Cartesian product. Fuzzy Pattern Recognition. Fuzzy Neural Networks. Classical sets and Fuzzy sets. Rank ordering. Membership value assignments. Linguistic hedges.08.805 (1) FUZZY SET THEORY AND APPLICATIONS (ELECTIVE III) 3 – 1 – 0 Module I (18 hours) Uncertainty and imprecision. Various forms. Graphical techniques of inference. Fuzzy Image Processing. Cosine amplitude method.

SMTP. NFS. Variables. HTTP. Web Servers Web Design. KTD and Schemas. Electronic Mail . DHCP. Remote Login & Desktop . . Plug-ins and Helper Applications. Worldwide Web. POP. Key components. HTML. IMAP.DNS – Namespace. Objects. Web Server hardware & software – software for Web Server – Website & internet utility program – Web Server hardware – E-commerce software – basic function of E-commerce software – payment system for e-commerce – online payment basics – payment cards – electronic cash – electronic wallets – stored value cards. XML – Introduction.806 (4) INTERNET TECHNOLOGY (ELECTIVE IV) 3 – 1 – 0 Module I (17 hours) Introduction to Internet. Module II (17 hours) Proxy Server. Web Browsers. Arrays. Mapping Domain Names to Address. Video over IP. Module III (18 hours) NAT. DOM. DHTML. Java Script – Simple Java Script.08.FTP. VPN. MIME. Domain Name Resolution. Search Engines. SSH File Transfer and Access . Functions & Forms. Internet Domain Names. TFTP. PHP – Control Loops.Telnet.