Professional Documents
Culture Documents
CODE: MTCE-17-102
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. To get familiar the students about basic as well as advanced concepts in operating
systems
2. To introduce all the types of operating system, architectures and basic operation.
3. To study the detail of various components of operating systems viz. process management,
memory management, file management, disk management, I/O management
Unit II : OS Architecture
General operations, system calls, system program, system generation program, general structure:
monolithic, layered architecture, Virtual Machines, Microkernel, ExoKernel, Hybrid.
Course Outcomes:
a. The students will be able to understand the need and evolution of operating systems
b. Knowledge of batch systems, multiprogrammed systems, multiuser systems, multitasking
systems, multiprocessing systems, distributed systems, real-time systems
c. General operation of operating systems
d. Study of process life cycle, process scheduling, process synchronization, deadlocks
e. Study of memory allocation schemes, virtual memory
f. Study of file allocation methods and implementation of file systems
g. Study of implementation of I/O systems
a b c d e F g H
1 √
Objectives ----
Course
2 √ √
>
3 √ √ √ √
REFERENCES
CODE: MTCN-17-101
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
Introduction:
Data Communication: Data transmission, Parallel Transmission, Serial Transmission, Line Encoding
Schemes: Unipolar, Polar, Bipolar, Multiplexing techniques: TDM, FDM, Modulation methods:
AM, FM, PM, Pulse Code Modulation. Spread spectrum, Concepts of layering, TCP/IP and ISO’s
OSI reference model. Transmission media.
Data Link Layer
Error detection and correction, Data link control - Flow and Error control - Sliding
window protocol - ARQ schemes, HDLC protocol - Point to Point Protocol, Multiple Access
Techniques - Random Access, Controlled Access, Logical Link Control (LLC) and Medium
Access Sub-layer functions - LAN standards - IEEE 802.3 (CSMA/CD) - Fast Ethernet - Giga
Bit Ethernet, IEEE 802.4 (Token Bus), IEEE 802.5 (Token Ring), IEEE 802.11 (Wireless LAN).
Network Layer
Inter-networking- Subnetting, Supernetting and Masking , Class full and Classless addressing.
Routing - Link state and Distance Vector Routing - Congestion control algorithms - Network
Layer Protocols - ARP, RARP, IPv4, ICMP and IPv6. Unicast Routing and Multicast Routing
techniques.
Transport Layer
Processes to Processes Delivery - Transmission Control Protocol (TCP) - User Datagram
Protocol, Stream Control Transmission Protocol (SCTP) - Data Traffic - Congestion Control and
Quality of Service - Techniques to improve QOS - Integrated Services - Differentiated Services,
QoS in switched networks.
Session, Presentation And Application Layers
Services, Network security - Security Cryptography, Message confidentiality, message integrity,
message authentication, Digital Signature, Entity Authentication, Key Management, Application
layer- DNS, E-mail (SMTP), FTP, HTTP, Voice over IP.
Course Outcomes:
a. The students will be able to understand basic terminology used in database systems.
b. The students will be familiar with the basic concepts and the applications of database
systems.
c. The students will be able to understand role of Database administrator in DBMS.
d. The students will be able to understand various data model like Hierarchical model,
Network Model, Relational model, E-R model.
e. The students will be familiar with relational database theory and be able to write
relational algebra expressions for query.
f. The students will be able to understand the logical design guidelines for databases,
including the E-R method and normalization approach.
g. The students will be familiar with database storage structure and access techniques like
file and page organization, indexing methods like B-tree and hashing.
h. The students will be familiar with basic issues of transaction processing and concurrency
control.
i. The students will be able to understand serializability and also its various protocols to
maintain it.
j. The students will be able to choose the database management system suitable for a
specific project and knows its structure and functions.
k. The students will be able to know the SQL language clauses and functions and can write
optimal queries in SQL.
l. The students will be able to understand various storage mechanisms.
m. The students will be also understand how to retrieve data manipulate data using SQL.
MAPPING OF COURSE OBJECTIVES AND COURSE OUTCOMES:
a b C d e f g h i j k l M n o P
1 √ √ √ √ √
2 √ √ √ √
Course Objectives ---->
3 √
4 √
5 √
6 √
7 √
8 √
9 √
REFERENCES
CODE: MTCE-17-122
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
Course Outcomes:
a. Able to analyze and compare complexity for different types of algorithms for different
types of problems.
b. Apply mathematical preliminaries to the analyses and design stages of different types of
algorithms.
c. Choose among different types of data structures the best one for different types of
problems.
d. Recognize the general principles and good algorithm design techniques for developing
efficient computer algorithms.
e. Familiarizing students with specific algorithms for a number of important computational
problems like sorting, searching, and graphs, etc.
f. Decide on the suitability of a specific algorithm design technique for a given problem.
g. Design efficient algorithms for new situations, using as building blocks the techniques
learned.
h. Apply algorithm design techniques to solve certain NP-complete problems.
Course Outcome
a b c d e f g h i
1
√ √ √
√ √
2
√
Course
3
Objective
4
√ √
√
REFERENCES
1. Fundamental of Computer algorithms, Ellis Horowitz and Sartaj Sahni, 1978, Galgotia Publ.,
2. Introduction To Algorithms, Thomas H Cormen, Charles E Leiserson And Ronald L Rivest:
1990, TMH
3. The Design and Analysis of Computer Algorithm, Aho A.V. Hopcroft J.E., 1974, Addison
Wesley.
4. Algorithms-The Construction, Proof and Analysis of Programs, Berlion, P.Bizard, P., 1986.
Johan Wiley & Sons, Writing Efficient Programs, Bentley, J.L., PHI
5. Introduction to Design and Analysis of Algorithm, Goodman, S.E. & Hedetnieni, 1997, MGH.
M.TECH COMPUTER NETWORKING
CODE: MTCE-17-103
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives
1. Need for formal communication with the computing machines and requirement for
creation of formal languages
2. Various components of grammars relating to design of meaningful sentences in formal
languages
3. Classification & hierarchy of grammars on the basis of their production systems
4. Tools associated with various types of grammars ( 0, 1, 2 and 3) and their usage for
recognition of corresponding types of languages
5. Ambiguities and possible defects in Context free grammars and their removal
6. Need for standard (normal) forms of grammar
7. Concept of algorithm and its association with Turing Machine
8. Designing Turing machines for various languages and integer computing
9. Various extensions of Turing machines
10. Decidable and non decidable properties of various types of languages
11. Concept of recursive and recursively enumerable languages
12. Computability and its association with primitive recursive and µ recursive functions
Unit 4: Undecidability
Recursive and recursive enumerable languages, Post Correspondence Problem, Primitive
recursive functions.
Course Outcomes
COURSE OUTCOMES---------------.>
a b C d e f g h i
1 √
2 √
Course 3 √ √
Objectives 4 √
5 √
6 √
7 √
8 √
9 √
10 √
11 √
12 √
REFERENCES
1. Formal languages and Automata Theory- C. K. Nagpal, Oxford University Press 2011.
2. “Introduction to automata theory Language and Computation”, J.E. Hopcroft, R. Motwani, J.D.
Ullman, Pearson education.
3. “Theory of computer Science: Automata Language and Computation”, K.L.P Mishra and
Chandrasekaran, Prentice Hall of India.
4. “Introduction to Computer Theory”, D.I.A Cohen, Willey India.
5. “Introduction to Languages and the Theory of Computation”,John C. Martin, Tata McGraw Hill
M.TECH COMPUTER NETWORKING
CODE: MTIT-17-103
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
Course Outcomes
f) The students will be able to learn tf-idf scoring and vector space model scoring for ranking
g) The students will be able to understand Static quality ordering, cluster pruning and tiered indices
h) The students will be able to understand the basic concept of Search Engines their architecture and
various functional components.
i) The students will be able to understand the basic concept of Web crawlers and their architecture
j) The students will be able to understand various language models related to information retrieval
MAPPING OF COURSE OBJECTIVES AND COURSE OUTCOMES:
a b c d e f g h i j
1 √
2 √ √
3 √
Course Objectives------
4 √
5 √ √
6 √
7 √ √
8 √
REFERENCES
CODE: MTCE-17-113
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. To learn the fundamental principles and practices associated with each of the agile
development methods, evolutionary development and delivery.
2. To learn from fun hands-on activities in the classroom (or in collaborative groups online)
and also on a course project where students will apply the principles and practices of
agile software development and to understand various agile methodologies.
3. To learn how agile methods are planned and prioritized.
4. To perform estimation in agile by using various methods of estimation.
5. To learn how agile methods scrum is used, including the role of scrum software
development life cycle.
6. To perform in-depth testing into aspects of agile development that are particularly
relevant to each student through detailed discussion sessions.
Course outcomes
a. Student will understand fundamental principles and practices associated with each of the
agile development methods, evolutionary development and delivery.
b. Students will understand various agile methodologies and techniques to plan and
prioritize various tasks.
c. Students can perform estimation in agile by using various methods of estimation.
d. Students will understand scrum method of agile, including the role of scrum software
development life cycle.
e. Students will become familiar with various testing concepts.
Course Outcomes
a b c d e
1 √
2 √
3 √
Course 4 √
Objectives 5 √ √
6 √
REFERENCES
CODE: MTCE-17-115
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1) Describe the principles of processor design and Classify instruction set architectures.
2) The course focuses on about uni-processor implementation alternatives (single cycle,
multiple-cycle, and pipelined implementations)
3) Special emphasis will be on quantifying design decisions in terms of performance and
cost.
4) It helps to understand the memory hierarchy, the caches, virtual memory, storage
systems.
5) Architectures exploiting instruction-level parallelism (ILP), data-level parallelism (DLP),
thread-level and task-level parallelisms are treated.
6) Furthermore new code generation techniques needed for exploiting ILP will be treated.
7) Investigating modern design structures of Pipelined and Multiprocessors systems.
8) To acquaint with recent computer architectures and I/O devices, as well as driving or
managing these types of advanced hardware. The course focuses on processor design,
pipelining, superscalar, out-of-order execution
Course Outcomes
By the end of the course, a student should be able to:
a) Understand the classes of computers, the change in technology and the quantitative
principles of computer design
b) Understand the advanced concepts of computer architecture.
ILP.
e) Will know about computer performance, instruction set architecture design and
implementation.
f) Understand the components and operation of a memory hierarchy and the range of
performance issues influencing its design.
g) Design Scheduling and Structuring Code for Parallelism and study of issues related to
VLIW
h) Discuss the large scale multiprocessors and their relevance to the scientific applications
i) Be able to understand an existing software& hardware system and extend the system to
meet evolving requirements.
Mapping of Course Objectives and Course Outcomes
a b C d E F g H i
1 √ √ √ √
2 √ √ √ √ √
3 √ √ √
Course Objectives ---->
4 √
5 √
6 √
7 √ √
8 √ √
REFERENCES
1. John P Hayes, Computer architecture and organization, III edition McGraw Hill, 1998.
2. Pipelined and Parallel processor design by Michael J. Fiynn – 1995, Narosa
3. Computer Architecture and parallel Processing” Kai Hwang and A. Briggs International
edition McGraw-Hill.
4. Computer Architecture A quantitative approach 3rd edition John L. Hannessy & David A.
Patteson Morgan Kufmann (An Imprint of Elsevier)
M.TECH COMPUTER NETWORKING
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives
1. To get familiar the students about basic concepts of software testing and its techniques.
2. To study the concepts of Verification and validation activities.
3. To study in detail the process of performing the black box and white box testing
approaches with examples.
4. To get familiar the students the concept of regression testing.
5. To study about the various testing automation and debugging tools and case studies.
Unit 1 :
Testing terminology and Methodology
Definition of testing, goals, psychology, model for testing, effective testing, limitations of
testing, Importance of Testing, Definition of Failure, faults or bug, error, incident, test case, test
ware, life cycle of bug, bug effects, bug classification, test case design, testing methodology,
development of test strategy, verification, validation, Static testing: Inspection ,Review and
Walkthrough, dynamic testing, testing life cycle model, testing techniques, testing principles,
Testing Metrices.
Course Outcomes:
a. The students will be able to understand the concepts of software testing and its
techniques.
b. Knowledge of verification and validation activities.
c. Study of black box and white box testing techniques.
d. Study the concept of regression testing and its techniques.
e. Study of object oriented testing techniques.
f. Study of case studies and various testing automation and debugging tools.
g. Study of various testing metrics.
a b c d e f g
1 √
Course Objectives ---->
2 √
3 √
4 √
5 √
6 √ √ √
REFERENCES
1. G.J Myers, The Art of Software Testing, John Wiley & Sons, 1979
2. Naresh Chauhan, Software Testing Principles and Practices,OXFORD University Press.
M.TECH COMPUTER NETWORKING
CODE: MTCN-17-102
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives
1. To introduce the concept of wireless communication along with its history, application,
and market.
2. To make the student familiar with basic terminology like frequency, signals, bandwidth,
signals and spread spectrum etc.
3. To introduce the concept of cellular system and design of cellular system. To make the
students familiar with different handoff strategies.
4. To introduce the MAC and Telecommunication system.
5. To make the student familiar with the wireless LAN including Bluetooth technology.
6. To introduce the concept of Mobile Network layer, IP Packet delivery and adhoc network
routing.
7. To make the student familiar with mobile transport layer along with satellite
communication.
Unit 1: Introduction
Applications, history, market, reference model and overview. Wireless Transmission—
Frequencies, signals, antennas, signal propagation, multiplexing, modulation, spread spectrum.
Course Outcomes
a b c d e f G h i j k l m n
1 √ √
2 √
Course Objectives ---->
3 √ √ √ √
4 √ √ √ √ √
5 √ √
6 √ √ √
7 √ √
REFERENCES
CODE: MTCE-17-101
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives
1. To apprise students of various programming techniques along with respective merits and
demerits of each technique.
2. To introduce basics terminology and design principles associated with OOPs and
constructs in C++ to support those.
3. To discuss the principles of abstraction and encapsulation with emphasis on silent
functions written by compiler, const-pass-by-reference, issues with friend functions,
handling of pointer-type-variables in copy cotr, static data members and similar c++
constructs.
4. To discuss the principles of inheritance and polymorphism with emphasis on virtual and
non-virtual functions, open and close principle, Liskcov’s substitution principle, virtual
dotr, private inheritance, virtual base classes and similar c++ constructs.
5. To familiarize students with compile time polymorphism and code sharing with c++
templates.
6. To make students understand the difference between error and exception handling with
proper language constructs for the same.
7. To introduce basic UML design notations, static and dynamic models elements for object
oriented system design.
8. To familiarize students with importance of system software with specific emphasis on
language translators.
9. To make students understand the basics of assembly language and design issues of two
pass and single pass assembler.
10. To apprise student of basic compiler, Linker and Loader design issues with data
structures used by these.
Course Outcomes
a. The students will be able to decide which programming technique to use in a given
design situation based on the respective merits and demerits.
b. The students will be able to design clean interfaces for the classes using the abstraction
design principle.
c. The students will be able to separate out the interfaces from the implementation during
the class design by applying the abstraction and encapsulation principles.
d. The students will be able to understand the design cost involved for using c++ constructs
like passing parameters by value or by reference, deep copy cotr, silent function writing
by compiler and friend functions.
e. The students will be able to use inheritance correctly for writing “is-a” kind of
relationships based programs and not mere for code reuse.
f. The students will be able to write polymorphic programs with clear understanding of
inheritance of interfaces v/s inheritance of default implementation v/s inheritance of static
implementation.
g. The students will be able to handle issues with multiple inheritance, memory leak issue
for not using virtual dotr, issue with inheritance of non-virtual function.
h. The students will be able to write generic program using c++ templates and handle
runtime issues using exception handling.
i. The student will be able to design software systems using UML notation and models.
j. The students will be able to understand the difference between application software and
system software and importance of language translators.
k. The students will be able to design a two pass assembler for a given ISA architecture.
l. The students will be able to understand the various phases involved in a complier design
and would be able to do lexical, syntactical and semantic analysis of simple programming
instructions.
m. The students will be able to understand program relocatability and c++ linking model.
n. The students will be also understand absolute and relative loaders for loading and running
c++ programs.
MAPPING OF COURSE OBJECTIVES AND COURSE OUTCOMES:
a b c d e F g h i j k l m n
1 √
2 √ √ √
3 √ √
Course Objectives ---->
4 √ √ √
5 √
6 √
7 √
8 √ √ √
9 √
10 √
REFERENCES
1. A.K.Sharma, Kavita Kapur, “ Introductory Computer Science with C++, Vol. II”,
Dhanpat Rai Publications
2. E. Balagurusamy, “Object Oriented Programming with C++”, TMH.
3. Herbert Schield “The Complete Reference in C++” TMH.
4. Donovan ,”Systems Programming”, Tata McGraw Hill.
5. Dhamdhere,” System Software” Tata McGraw Hill.
M.TECH COMPUTER NETWORKING
CODE: MTCN-17-108
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. Understand the basic concept of Cryptography and Network Security, their mathematical
models.
2. To understand various types of ciphers, DES, AES, message Authentication, digital
Signature System.
3. To impart knowledge of major issues in network and computer system security, focusing
mainly on threats from malicious software.
4. To understand common attacks on computer networks and methods to detect and
remediate such attacks.
5. To understand the Public Key Cryptosystems and analyze their security.
6. Evaluating information security procedures and practices.
7. To analyze security vulnerabilities on different network layers.
8. To acquire knowledge about network security tools and authentication applications.
9. To study various key management and key distribution schemes.
10. To study various issues in security of MANETS and study various attacks.
11. To provide the students with the competences required for understanding various issues
in security of Wireless Security Networks and also various attacks against security
mechanism and routing.
Unit 1 : Introduction
What is security?, Need of security, Why is security so hard?, various goals of security,
Difference between Vulnerability, Threats, Attacks and control, Security goals, aspects of
security, security services, security attacks
Encryption Techniques Terminology of encryption, Requirement of encryption, cryptography,
cryptanalysis, cryptanalytic attacks, symmetric ciphers: Substitution ciphers, Transposition
ciphers, Data Encryption Standard (DES, Advanced Encryption Standard (AES), location of
encryption devices, key distribution, Public Key Cryptography and RSA, Diffie-Hellman
Key Exchange, Message Authentication and Hash Functions, MD5, SHA
Unit 2 : Network Security
Security services, Message confidentiality, Message integrity, message authentication, digital
signature, entity authentication. Authentication applications: Kerberose 95, X.509
Authentication service, Public key infrastructure. Electronic mail Security: Preety Good
Privacy (PGP), IP Security: IP security overview, IP security architecture, Authentication
header, Encapsulating security Payload, Combining security associations, Key management.
Course Outcomes
After the completion of this course the student will able to:
Course Outcomes
a b c d e f g h i
1 √
2 √
3 √
4 √ √
5 √
6 √
Course 7 √
Objectives 8 √
9 √
10 √
11 √
REFERENCES
1. William Stalling, Cryptography and Network Security, 3 rd Edition. PHI New Delhi
2. William Stalling, Network Security Essentials, 2nd Edition. PHI New Delhi
3. Charles P. Pfleeger, Security in computing, 4th Edition Pearson,, New Delhi
Kazem Sohrary, Wireless sensor newtroks, Technology, Protocols and applications, Wiley Publishers
M.TECH COMPUTER NETWORKING
CODE: MTCN-17-110
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives
1. The objective of the course is to make students familiar about security, its various
services and differentiation among various types of security.
2. To make students familiar with basic concepts of steganography, its various techniques
and how is it different from cryptography.
3. To make students familiar with basic concepts of Digital watermarking, its various
classical and modern techniques.
4. To make students familiar about current research areas or topics of stenography and
digital water marking on which research is going on.
Unit 1 : Introduction
What is security?, Need of security, Why is security so hard?, various goals of security,
Difference between Vulnerability, Threats, Attacks and control, Security goals, aspects of
security, security services, security attacks, Kerchoff’s assumption, Difference between
Computer security, Information security, Network Security and Cyber security, security models,
unconditional security, computation security, Computer criminals, Introduction to
steganography, digital water marking.
Unit 2 : Steganography
Introduction to Information hiding , Brief history and applications of information hiding,
Principles of Steganography, Steganography vs cryptography, Steganography terms, Type of
steganography, steganography system, Classic Techniques, Modern Steganography techniques :
Masking and Filtering, algorithms and transformations, least bit insertion, Pure , secret key and
public steganography, Steganalysis.
Course Outcome
By the end of the course, students should be able understand importance of security and its
various security models
a. By the end of the course, students should be able understand the concept of stenography,
its importance and application areas and various stenography techniques by which
security can be provided to data.
b. By the end of the course, students should be able understand the concept of Digital water
marking, its application areas, comparative analysis of various techniques to implement it
c. By the end of the course, students should be able to identify research challenges in the
area of stenography and digital water marking.
CODE: MTCN-17-112
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives
1. The objective of the course is to make students familiar about security, its various
services and differentiation among various types of security.
2. To make students familiar with cyber crime, its various categories and its various
technical aspects.
3. To make students familiar with areas where Actions on cyber are prohibited and their
impact.
4. To make students familiar about various forensic tools and various laws for cyber crime
and policy designed by the government for cyber security.
Unit 1: Introduction
What is security?, Need of security, Why is security so hard?, various goals of security,
Introduction to Cyber Security, Difference between Computer security, Information security,
Network Security and Cyber security, Cyber security Applications and Principles.
Course Outcome
a. By the end of the course, students should be able to understand the importance of
security, basics of cyber security.
b. By the end of the course, students should be able to understand what is cyber crime?,
various attacks and application domain under cyber crime.
c. By the end of the course, students should be able to understand the areas where cyber
crime can be happen and their impacts.
d. By the end of the course, students should be able to know laws, policies initiated by the
government against cyber crime.
Course a b c d
Objective
1
2
3
4
REFERENCES
1. William Stalling, Cryptography and Network Security, 3rd Edition, PHI New Delhi
2. William Stalling, Network Security Essentials, 2nd Edition, PHI New Delhi
3. Stuart McClure, Hacking Exposed : Network Security Secrets and Solutions.
4. Albert Marcella, Doug Menedez, Cyber Forensics : A Field Manual for collecting, Examinig and
Preserving Evidence of computer Crimes, Second Edition(Information Security)
M.TECH COMPUTER NETWORKING
CODE: MTCE-17-118
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives
Course Outcomes
Course Outcomes
a b c d e F g
1
2
3
4
5
6
7
Course 8
Objectives 9
10
REFERENCES
CODE: MTCE-17-104
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives
Uncertainty based Information: Information & Uncertainty, Nonspecificity of Fuzzy & Crisp
Sets, Fuzziness of Fuzzy Sets.
Genetic Algorithms, Scope & application areas, solution of 0-1Knapsack problem using GA
Course Outcomes
Course Outcomes
a b C d e f g h i
1 √ √
2 √ √
3 √
Course 4 √ √
Objectives 5 √ √
6 √
7 √
8 √ √ √ √
9 √ √
10 √ √
11 √
REFERENCES
1. “Fuzzy sets and Fuzzy Logic: Theory and applications”,G.J. Klir,B.Yuan, PHI
2. “Introduction to Fuzzy sets and Fuzzy Logic”, M.Ganesh , PHI
3. “An Introduction to Fuzzy Control”, D Driankov, H Hellendoorn, M Reinfrank,
Narosa Publishing Company
4. “ Neural Networks: A classroom approach”, Satish Kumar , Tata McGraw Hill
5. Haykin S., “Neural Networks-A Comprehensive Foundations”, Prentice-Hall
International, New Jersey, 1999.
6. Anderson J.A., “An Introduction to Neural Networks”, PHI, 1999
M.TECH COMPUTER NETWORKING
CODE: MTCN-17-114
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. To apprise students of parallel and distributed computing models and overview of their
evolution leading to concept of cloud computing.
2. To introduce concepts of client/server applications, types of client/server models, types of
architectures, message passing models and development tools available.
3. To discuss the design issues involved in developing different types of server applications
– iterative/connectionless, iterative/connection-oriented, concurrent/connectionless and
concurrent/connection-oriented, transport layer semantics available to develop such
applications.
4. To discuss the concept of middleware need in application development, types of
middleware in vogue – message based, RPC and Distributed object technology (CORBA)
based.
5. To familiarize students with internal architectural, object model and application
development based on CORBA middleware standards.
6. To introduce other distributed object models like RMI/EJB leading all the way to SOA
being designed using web services and REST technologies.
7. To introduce basic concept of cloud computing, types and service layers involved.
8. To familiarize students with importance of virtualization and its types and importance for
cloud computing.
9. To make students understand the basics of commodity clusters and map/reduce
programming technique for cloud based models.
10. To discuss research issues to be explored regarding resource allocation and load
balancing in cloud computing.
a. The students will understand the different models of parallel and distributed computing
and essential differences between them.
b. The students will understand the different types of client/server applications and
respective design architectures.
c. The students will understand the design issues involved in server designs under different
situations and transport layer constructs available for the same.
d. The students will be able to design client/server applications for different class of ip-
addresses.
e. The students will understand the concept and importance of middleware layer in
distributed application design and various types of middleware technologies available.
f. The students will be able to write distributed applications based on DOT concepts using
CORBA toolkits.
g. The students will be to understand how distributed objected methodology has evolved
into a service based architecture and how web services and REST API implements the
same.
h. The students will be able to write generic program using JAVA and non-JAVA based
distributed object applications.
i. The student will be able to understand on-demand utility computing phenomenon known
as cloud computing. How this paradigm is different from cluster and grid computing.
j. The students will be able to understand how virtualization layer offers elasticity and
flexibility to cloud computing. What are the different types of virtualization layers in
existence at present?
k. The students will be able to design cloud based applications using map/reduce paradigm
for handing distributed file system based data.
l. The students will be able to understand how computation could be taken to data i.e. in-
situ rather than moving volume of data around.
m. The students will be able to understand many issues involve in cloud computing and
would be able to take up some topics for research activity.
MAPPING OF COURSE OBJECTIVES AND COURSE OUTCOMES:
a B c D e F g h i j k l m
1 √
2 √ √
3 √ √
Course Objectives ---->
4 √ √
5 √ √
6 √
7 √ √ √
8 √
9 √ √ √
10 √
REFERENCES
2. Kai Hwang, Geoffrey C. Fox, Jack J. Dongarra, “Distributed and Cloud Computing: From parallel
processing to IOT” Morgan Kaufmann Publishers; 1 edition [ISBN: 978-0-12-385880], 2012.
3. Building Web Services with Java, Second Edition, S. Graham and others, Pearson Edn., 2008.
M.TECH COMPUTER NETWORKING
CODE: MTCN-17-116
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives
The objective of the course is
1. To make students familiar about Internet protocol addressing, protocol stack required for
the communication between entities whose location is far away.
2. To make students familiar about routing algorithms required to transfer information or
data between two entities.
3. The objective of the course is to make students familiar about various routing protocols
and their details required to establish communication between entities.
4. To make students familiar about Mobile Adhoc Networks and various protocols used in
this networks for the purpose of routing data and information.
5. To make students familiar about Wireless Sensor Networks and various protocols used in
this networks for the purpose of routing data and information.
Routing Algorithms: Shortest Path and Widest Path: Bellman–Ford Algorithm and the Distance
Vector Approach, Dijkstra’s Algorithm, Comparison of the Bellman–Ford Algorithm and
Dijkstra’s Algorithm, Shortest Path Computation with Candidate Path Caching, Widest Path
Computation with Candidate Path Caching, Widest Path Algorithm, k-Shortest Paths Algorithm
Course Outcome
By the end of the course, students should be able
a. To understand Internet protocol addressing, protocol stack required for the
communication between entities whose location is far away.
b. To understand routing algorithms required to transfer information or data between two
entities.
c. To understand various routing protocols and their details required to establish
communication between entities
d. To understand Mobile Adhoc Networks and its various protocols used in this networks
for the purpose of routing data and information.
e. To understand Wireless Sensor Networks and various protocols used in this networks for
the purpose of routing data and information.
f.
Mapping of Corse Objectives with Course Outcomes
Course a b c d e
Objective
1
2
3
4
5
REFERENCES
CODE: MTIT-17-114
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
Unit II:XML
Introduction, Role of XML, Difference between XML and HTML, XML Tree, XML Syntax,
Elements, Attributes, Validation, XML DTD: Introduction, Using DTD in an XML Document,
Element Type Declaration, Attribute Declaration, Entity Declaration, CDATA, DTD validation,
XML schemes: presenting and using XML; XML DOM: DOM Nodes, Document Node,
Element Node, Text Node, Attribute Node, Manipulating DOM Tree, XML Transformation,
XML Application.
Unit V:
Web services, Design and modeling of web services, Technologies for Implementing web
services, Current applications of advanced web technologies. HTML 5.0, WebGL, SVG, Social
web and related technologies, - Ontology modeling, Languages for representing ontologies on
the web, Rules and inferences,
Course Outcomes
a. Able to understand the concept of client server communication over web, Internet
protocols, HTTP, and web server.
b. Able to make a web page using HTML, list, tags, forms, CSS.
c. Familiar with XML, role of XML, syntax and attributes of XML.
d. Able to differentiate between XML and HTML and will be familiar with CDATA, DTD
validation, XML schemes, manipulation of DOM tree, XML Transformation.
e. Able to make the application using XML, XML DTD, XML DOM
f. Able to perform client side programming, validation and event handling using Javascript,
DOM, functions, arrays and objects.
g. Able to perform server side scripting, reading and sending the data from and into the
database using JSP.
h. Familiar with Java Servlets, cookies, Java beans, creation and implementation using EJB,
session beans and entity bean.
i. Able to understand the concept of web services, their desing and modelling, HTML 5.0,
WebGL,SVG.
MAPPING OF COURSE OBJECTIVES AND COURSE OUTCOMES:
a b c d e f G h i
1 √ √
Course Objectives ---->
2 √ √ √
3 √
4 √ √
5 √
REFERENCES
CODE: MTCN-17-201
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
Course Outcome:
Course Outcomes----
Course Objectives-
a B c d E f G
1 √
2 √
3 √
4 √ √
5 √
6 √
7 √
8 √
9 √
REFERENCES
CODE: MTCN-17-203
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. To make the students familiar with wireless network and adhoc network.
2. To introduce the advantages and issues related to mobile adhoc network routing.
3. To make the students familiar with different table driven base protocols for mobile adhoc
networks.
4. To introduce the concept of on demand approach and various protocols related to this
approach.
5. To make the student familiar with the GPS system and introduce the concept of location
based routing.
6. To make the student aware about the quality of service in mobile adhoc environment. To
find out various QoS parameters and how QoS can be achieved in adhoc environment.
7. To introduce the necessity of energyand how to manage the energy of a node and
network in adhoc networks.
8. To make the student aware regarding security aspects in mobile adhoc network.
UNIT I : Introduction
Wireless Networks, Infrastructure and Infrastructure less Wireless Networks, Ad hoc Wireless
Networks, Heterogeneity in Mobile Devices, Types of Ad hoc Mobile Communications,
Challenges Facing Ad hoc Mobile Networks, Issues in Designing a Routing Protocol for Ad Hoc
Wireless Networks, classifications of Routing Protocols: Table Driven Routing Protocols, On-
Demand Routing Protocols.
Course Outcomes
Upon successful completion of the course, the student will be able to:
a. Identify different types of wireless network and how wireless network is advantageous
over the traditional wired network.Identify various issues related to wireless
communication.
b. Understand the concept of adhoc network and differentiate between infrastructure based
and infrastructure less networks.
c. Understand the concept of routing and issues related to routing in mobile adhoc network.
d. Classify different categories of mobile adhoc network.
e. Understand the concept of table driven approach and various routing protocols available
for table driven approach.
f. Advantages and disadvantages of various routing protocols of proactive routing.
g. Understand the on demand approach. Differentiate various reactive routing protocols
based on their strategies.
h. Understand the concept of GPS and location based routing. What are the advantages and
disadvantages of location based routing .
i. Understand how zone based routing make use of both proactive and reactive approaches.
j. Understand QoS and its parameters. Classify QoS solution, why QoS provision is
difficult in adhoc environment and what are various approaches related to QoS in
MANET.
k. Understand the need of energy management in MANET, What are the various energy
management schemes available in MANET.
l. Understand the concept of security in MANET, requirement of security in adhoc
network.
m. Differentiate different types of security attacks in MANET and various solutions
available in MANET.
a b c d e f G h i j k l m
1 √ √ √
2 √ √
Course Objectives ---->
3 √ √ √
4 √ √ √
5 √ √ √
6 √ √
7 √ √
8 √ √ √ √
REFERENCES
1. C. Siva Ram Murthy and B. S. Manoj, ―Ad Hoc Wireless Networks Architectures and
Protocols‖, Prentice Hall, PTR, 2004.
2. C. K. Toh, ―Ad Hoc Mobile Wireless Networks Protocols and Systems‖, Prentice Hall, PTR,
2001.
3. Charles E. Perkins, ―Ad Hoc Networking‖, Addison Wesley, 2000
M.TECH COMPUTER NETWORKING
CODE: MTCN-17-211
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. To make the students familiar with High Speed Network technologies.
2. To make students aware of advantages and disadvantages of high speed technologies.
3. Study of techniques available for congestion control traffic management.
4. How to make congestion control in TCP and ATM.
5. To study integrated and differentiated services architecture.
6. Protocols for high speed communication.
UNIT I
Introduction to computer networks - Review of OSI/ISO model – Introduction to high speed
networks - High speed LANs – Fast Ethernet - Switched Fast Ethernet - Gigabit Ethernet –
ISDN, FDDI, Frame relay - operations and layers.
UNIT II
Introduction to SONET – SONET/SDH Layers – SONET Frame Structure – Sonet Physical
Layer. Cell format and Switching Principles – Protocol Architecture – Service categories.
TCP/IP protocol Suite – IP Packet Header – TCP packet header – User services – Protocol
Operation – Connection Establishment – UDP.
UNIT III
Congestion control in Data Networks and Internets – Effects of Congestion – Congestion
Control in Packet Switched Networks. Frame relay Congestion Control – Traffic rate
Management – Congestion Avoidance. ATM Traffic and Congestion Control – Attributes –
Traffic Management Framework – Traffic Control – ABR Traffic Management. TCP Traffic
Control – Flow Control – TCP Congestion Control – Timer Management – Window
Management.
UNIT IV
Introduction to Quality of Service - Integrated Services – Differentiated Services – Protocols for
QoS support - Resource Reservation (RSVP) – Multiprotocol Label Switching (MPLS) – Real-
Time Transport Protocol (RTP).
UNIT V
Introduction to Optical networks – Wavelength division multiplexing (WDM) – Introduction to
broadcast-and-select networks - Switch architectures - channel accessing – Wavelength routed
networks – Switch architectures - Routing and wavelength assignment – virtual topology design–
IP over SONET over ATM over WDM – IP over ATM over WDM – IP over WDM.
Course outcomes:
a. Students will be able to understand basic high speed networks like Frame relay and ATM.
b. Students will be familiar with advantages and disadvantages of high speed network.
c. Students will be aware of congestion control traffic management techniques.
d. Students will be aware of TCP and ATM congestion control techniques.
e. To learn the functionality of integrated and differentiated services architecture.
f. Familiarity with various high speed protocols currently available.
REFERENCES
1. William Stallings, “High-Speed Networks and Internets”, Pearson Education, 2nd Edition,
2. 2002. (Unit I, II, III, and IV)
3. Fred Halsall, “Multimedia Communications: Applications, Protocols, and Standards”,
4. Pearson Education Asia, 2001. (Unit I and II)
5. Rajiv Ramaswami and Kumar N. Sivarajan, “Optical Networks: A Practical Perspective”,
6. Morgan Kaufmann (Elsevier Indian Edition), 2nd Edition, 2004. (Unit II and V).
7. C. Siva Ram Murthy and Mohan Gurusamy, “WDM Optical Networks: Concepts, Design
8. and Algorithms”, PHI, 2002. (Unit V)
9. Laon-Garcia and Widjaja, “Communication Networks: Fundamental Concepts and key
10. Architectures”, Tata McGrawHill, 2000.
11. Behrouz A. Forouzan, “Data Communications and Networking”, Tata McGraw-Hill,
12. 2nd edition, 2000.
M.TECH COMPUTER NETWORKING
CODE: MTCN-17-213
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
Course Outcome:
Course outcomes------
Cou a b c d e f g h i j k l m n o p q
rse 1
2
Obj
3
ecti
4
ves 5
6
7
8
9
10
11
12
13
14
15
16
17
REFERENCES
CODE: MTIT-17-112
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. To make student familiar with various client - server models.
2. To make the student familiar with Network programming.
3. To introduce with the components used in client server applications.
4. To make the student familiar with client server network.
5. To introduce with the middleware technologies.
6. Student gets familiar with development of client server system.
Unit IV :
Middleware – Peer to Peer Communication - RPC – MOM middleware -mom versus rpc- online
transaction processing - decision support systems - oltp versus, dss - programming effort, client /
server transaction processing - transaction models - tp monitors- transaction monitoring systems,
groupware - components – Distributed Objects & Distributed Components, Services and
Support, system administration, Availability, Reliability, Serviceability, Software Distribution,
Performance, Network management, Help Disk, Remote Systems Management Security, LAN
and Network Management issues.
Course Outcomes:
a. The students will be aware about the client server computing, Evolution of corporate
computing models.
b. The student will be aware with the algorithm and issues in server design.
c. The student will be familiar with networking programming in java using java.net
package.
d. The student will be able to implement the two way communication between a client and
server.
e. The student will be familiar with utility services, dynamic data exchange, OLE, CORBA,
network operation system and server operating system.
f. The student will be familiar with the inter-process communication, network topology,
network management, client server system hardware and network Acquisition etc.
g. The student will be familiar with peer to peer communication, MOM middleware, online
transaction processing.
h. The student will be aware with client server transaction processing, transaction models,
transaction monitoring system.
i. The student will be familiar with Groupware components, system management security
and network management issues.
j. The student will be familiar with client server system development.
MAPPING OF COURSE OBJECTIVES AND COURSE OUTCOMES:
Course
Outcomes
------->
a B c d e f g h i J
1 √ √
Course Objectives ---->
2 √ √
3 √
4 √
5 √ √ √
6 √
REFERENCES
CODE: MTCE-17-211
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
UNIT – I
Introcution to NLP and NLU – Applications of NLP & NLU, open problem, Differences
levels of Language Analysis
UNIT – II
Syntatic processing – Linguistic Background – Outline of English Syntax, Top down &
Bottom up processing, Finite state models and morphological processing.
Grammer for Natural language, Ambiguity Resolution.
UNIT – III
Semantic Introduction – Semantic and logical form, Ambiguity, speech acts and embedded
Sentences, other strategies for Sementic Interpretation.
UNIT – IV
Speech Recognition and Spoken language – Issue in Speech Recognition sound structure,
Signal processing, HMM model, NLP, NLU and speech Recognition.
Course Outcomes:
a. The student will be familiar with difference levels/stages of natural language processing.
b. The student will be able to understand the familiar with applications and open problems
of/in NLP and NLU.
c. The student will be able to understand types of Formal languages and grammars:
Chomsky hierarchy and problems associated with them. They will also be able to resolve
such problems.
d. The student will be familiar with the top down and the bottom up parsing approaches and
their respective types of parsers.
e. The student will be able to write small grammars for simple English sentences.
f. The student will be familiar with parser like CKY, Earley & Tomita’s.
g. The student will be able to do Morphology of words taken from natural languages like
Hindi, English.
h. The student will be familiar with Semantics-knowledge and its importance in
understanding the language sentence. The student will be also be able to write some
simple semantic structures and will be able to use them for semantic analysis.
i. The student will be familiar with speech recognition and issues associated with it. They
will also be familiar with HMM and will be able to apply that for speech recognition.
Course Outcomes--------->
A b c d e f G h i
1 √
Course Objectives ---->
2 √
3 √
4 √
5 √
6 √
7 √
8 √
9 √
10 √
REFERENCES
CODE: MTCN-17-215
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. To introduce the basic concepts of Cloud Computing, service layers involved, deploy
applications over cloud computing platform, Utility Computing and Elastic Computing .
2. To discuss the various Cloud Technologies: AJAX , web services and software for enterprise
applications.
3. To discuss the cloud data in Relational databases and various filesystems: GFS, HDFS, BigTable,
HBase and Dynamo in cloud.
4. To discuss in detail the Map-Reduce concept, Map-Reduce model in parallel computing and its
application.
5. To introduce the fundamentals of cloud security, its tool and cloud computing security
architecture.
6. To familiarize the students with challenges involved in cloud computing security: Virtualization
security management.
7. To discuss the issues involved in cloud computing while implementing real time application over
cloud.
8. To discuss the issues regarding intercloud environments, QOS, Dependability, data migration,
streaming.
9. To make students understand the basics of cloud middleware, Mobile Computing, Grid
Computing, Sky Computing.
10. To discuss research issues to be explored regarding load balancing, resource optimization,
dynamic resource provisioning in cloud computing.
Unit 1:
Introduction to Cloud Computing, Definition, Characteristics, Components, Cloud provider,
SAAS, PAAS, IAAS and Others, Organizational scenarios of clouds, Administering &
Monitoring cloud services, benefits and limitations, Deploy application over cloud, Comparison
among SAAS, PAAS, IAAS, Cloud computing platforms: Infrastructure as service: Amazon
EC2,Platform as Service: Google App Engine, Microsoft Azure, Utility Computing, Elastic
Computing
Unit 2:
Introduction to Cloud Technologies, Study of Hypervisors Compare SOAP and REST
Webservices, AJAX and mashups-Web services: SOAP and REST, SOAP versus REST,
AJAX: asynchronous 'rich' interfaces, Mashups: user interface services Multitenant software:
Multi-entity support, Multi-schema approach, Multi-tenance using cloud data stores, Data access
control for enterprise applications
Unit 3:
Data in the cloud: Relational databases, Cloud file systems: GFS and HDFS, BigTable, HBase
and Dynamo. Map-Reduce and extensions: Parallel computing, The map-Reduce model, Parallel
efficiency of Map-Reduce, Relational operations using Map-Reduce, Enterprise batch processing
using Map-Reduce, Introduction to cloud development, Example/Application of Mapreduce,
Features and comparisons among GFS,HDFS etc, Map-Reduce model
Unit 4:
Cloud security fundamentals, Vulnerability assessment tool for cloud, Privacy and Security in
cloud Cloud computing security architecture: Architectural Considerations- General Issues,
Trusted Cloud computing, Secure Execution Environments and Communications, Micro-
architectures; Identity Management and Access control-Identity management, Access control,
Autonomic Security Cloud computing security challenges: Virtualization security
management- virtual threats, VM Security Recommendations, VM-Specific Security techniques,
Secure Execution Environments and Communications in cloud.
Unit 5:
Issues in cloud computing, Implementing real time application over cloud platform
Issues in Intercloud environments, QOS Issues in Cloud, Dependability, data migration,
streaming in Cloud. Quality of Service (QoS) monitoring in a Cloud computing environment.
Cloud Middleware. Mobile Cloud Computing. Inter Cloud issues. A grid of clouds, Sky
computing, load balancing, resource optimization, resource dynamic reconfiguration, Monitoring
in Cloud
Course Outcomes:
a. The students will understand the concept of cloud computing with its service layers and
Utility Computing and Elastic Computing .
b. The students will understand deployment of applications over cloud computing platform.
c. The students will be able to understand various Cloud Technologies, web services and
software involved in cloud computing to design enterprise applications.
d. The students will be able to manage cloud data in relational databases and file systems in
cloud computing.
e. The students will understand the concept of Map-Reduce and how Map-Reduce works in
analysis of data in parallel computing .
f. The students will be able to design cloud based applications using map/reduce paradigm
for handing distributed file system based data.
g. The students will be able to understand concept of cloud security, its tool and architecture
of cloud computing security.
h. The students will be able to understand the challenges involved in cloud computing
security and how VMs can be secured in Virtualization security management
i. The students will be able to understand how real time applications can be implemented
over cloud platform.
j. The students will understand how the various issues arise due to Intercloud environments,
QOS, Dependability, data migration and streaming in cloud
k. The student will be able to understand on-demand utility computing phenomenon known
as cloud computing. How this paradigm is different from Mobile cloud computing, grid
computing, sky computing.
l. The students will be able to understand how computation could be taken to data i.e. in-
situ rather than moving volume of data around.
m. The students will be able to understand many issues involve in cloud computing and
would be able to take up some topics for research activity.
a B c d e f g h i j k l m
1 √ √ √
2 √
3 √
Course Objectives ---->
4 √ √
5 √
6 √
7 √ √
8 √ √
9 √ √
10 √
REFERENCES
1. Cloud Computing by Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper (Wiley India Edition)
2. Enterprise Cloud Computing by Gautam Shroff,Cambridge
3. Cloud Security by Ronald Krutz and Russell Dean Vines, Wiley-India
4. Google Apps by Scott Granneman,Pearson
5. Cloud Security & Privacy by Tim Malhar, S.Kumaraswammy, S.Latif (SPD,O’REILLY)
6. Cloud Computing : A Practical Approach, Antohy T Velte, et.al McGraw Hill,
7. Cloud Computing Bible by Barrie Sosinsky, Wiley India
M.TECH COMPUTER NETWORKING
CODE: MTCN-17-217
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. To make the student understand the basic concepts of WSN and its distinguishing
features from its successor networks
2. To understand the application domain of WSN
3. To understand the middleware principle and design issues of WSN
4. To understand the operating system design issues of WSN
5. To understand the physical layer protocols and their design issues
6. To discuss the challenges in designing various MAC and routing protocols for WSN
7. To understand the taxonomy of routing protocols of WSN
8. To discuss the transport layer and application layer protocols of WSN
9. To discuss the security mechanism and attacks in WSN
10. To impart the detailed knowledge of IEEE 802.15.4 and Zigbee Security
Course Outcomes
Course Outcomes
a b c d e f g h
1
2
3
Course 4
Objectives 5
6
7
8
9
10
REFERENCES
1. Anna Hac, “Wireless Sensor Network Designs”, John Wiley, 2003, ISBN : 0-470-86736-1
2. Holger Karl & Andreas Willig, " Protocols And Architectures for Wireless SensorNetworks" ,
John Wiley, 2005, ISBN : 0-470-09510-5.
3. Ian F. Akyildiz and Mehmet Can Varun ” Wireless Sensor Networks” John Wiley ISBN 978-0-
470-03601-3.
4. Kazem Sohraby, Daniel Minoli, & Taieb Znati, “Wireless Sensor Networks-Technology,
Protocols, And Applications”, John Wiley, 2007, ISBN :978-0-471-74300-2
M.TECH COMPUTER NETWORKING
CODE: MTCN-17-219
NO OF CREDITS: 4
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. To apprise students of various roots of service oriented architecture (SOA) along with
characteristics and comparision with client server and distributed internet architecture.
2. To discuss how the components in an SOA interrelate and the Principles of service
orientation.
3. To introduce the service descriptions like messaging with SOAP and message exchange
along with Pattern- coordination,Atomic translation and Business activities.
4. To familiarize students with various service layers.
5. To discuss the service oriented analysis like business-centric SOA and deriving business
services along with service modeling and service oriented design.
6. To make students understand the basics of WSDL and SOAP.
7. To make students understand the basics of SOA platform like SOA support in J2EE and
intoduce the Java API for XML-based web services (JAX-WS),Java architecture for
XML binding(JAXB),java API for XML Registers(JAXR),Java API for XML based
RPC(JAX-RPC).
8. To familiarize students with web services interoperability technologies (WSIT),web
services and web services enhancements (WSE).
9. To discuss the web services architecture and its characteristics along with its core
building block,Standard and technology available for implementing communication .
10. To make students understand the basic steps of implementing Web services and
developing Web services enabled applications along with the various functions of SOAP
.
UNIT I :Roots of SOA
How services encapsulate logic , How Services Relate, How Services Communicate, How
Services are designed, How Services are built, Characteristics of SOA - Comparing SOA to
client-server and distributed internet architectures – Anatomy of SOA- How components in an
SOA interrelate -Principles of service orientation, SOA and object-orientation
Course Outcomes:
a. The students will be able to understand how the services encapsulate logic, How services
relate,How services communicate, How services are designed and How services are
build.
b. The students will be able to familiar to the SOA by the characteristics of SOA and
comparision between SOA to client server and distributed internet architecture.
c. The students will be able to understand the anatomy of SOA and How the components in
SOA is interrelate and the principles of service orientation.
d. The students will be able to understand the service discriptions, how the messaging with
SOAP, How the message exchange, How the patten coordination and atomic transaction
done .
e. The students will be able to familiar with various service layer for example application
service layer,business service layer,Orchestration service layer.
f. The students will be able to decide which service layer is good by familiar of these
service layer.
g. The students will be able to analyzing the service oriented functions.
h. The students will be able to understand that how the business services derive.
i. The student will be able to understand the basics of WSDL and SOAP & SOA and
composition guidelines.1
j. The students will be able to design various services like Entity-centric business service
design, Application service design,Taskcentric business service design.
k. The students will be able to understand the SOA platform basics like which platform
support SOA.
l. The students will be able to understand Java API for XML-based web services (JAX-
WS),Java architecture for XML binding(JAXB),java API for XML
Registers(JAXR),Java API for XML based RPC(JAX-RPC),web services, WSIT,WSE.
m. The students will be able to familiar web services architecture and its characteristics ,core
building block of web services standards and technologies available for implementing
web services, web services communication,basic steps of implementing web services .
n. The students will be able to develop web services enabled applications and also able to
understand the function of SOAP.
MAPPING OF COURSE OBJECTIVES AND COURSE OUTCOMES:
a b C d e F g h i j k L M N
1 √ √
2 √
3 √
Course Objectives ---->
4 √ √
5 √ √ √
6 √ √
7 √ √
8 √
9 √
10 √ √
REFERENCES
CODE: OEC-2
NO OF CREDITS: 3
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
UNIT-I
History of Information Systems and its Importance, basics, Changing Nature of Information
Systems, Need of Distributed Information Systems, Role of Internet and Web Services,
Information System Threats and attacks, Classification of Threats and Assessing Damages
Security in Mobile and Wireless Computing- Security Challenges in Mobile Devices,
authentication Service Security, Security Implication for organizations, Laptops Security Basic
Principles of Information Security, Confidentiality, Integrity Availability and other terms in
Information Security, Information Classification and their Roles.
UNIT-II
Security Threats to E Commerce, Virtual Organization, Business Transactions on Web, E
Governance and EDI, Concepts in Electronics payment systems, E Cash, Credit/Debit Cards.
Physical Security- Needs, Disaster and Controls, Basic Tenets of Physical Security and Physical
Entry Controls, Access Control- Biometrics, Factors in Biometrics Systems, Benefits, Criteria
for selection of biometrics, Design Issues in Biometric Systems, Interoperability Issues,
Economic and Social Aspects, Legal Challenges
UNIT-III
Model of Cryptographic Systems, Issues in Documents Security, System of Keys, Public Key
Cryptography, Digital Signature, Requirement of Digital Signature System, Finger Prints,
Firewalls, Design and Implementation Issues, Policies Network Security- Basic Concepts,
Dimensions, Perimeter for Network Protection, Network Attacks, Need of Intrusion Monitoring
and Detection, Intrusion Detection Virtual Private Networks- Need, Use of Tunneling with VPN,
Authentication Mechanisms, Types of VPNs and their Usage, Security Concerns in VPN
UNIT-IV
Security metrics- Classification and their benefits Information Security & Law, IPR, Patent
Law, Copyright Law, Legal Issues in Data mIning Security, Building Security into Software Life
Cycle Ethics- Ethical Issues, Issues in Data and Software Privacy Cyber Crime Types &
overview of Cyber Crimes
REFERENCES
CODE: OEC-4
NO OF CREDITS: 3
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Web’s Robot global access to information, HTML, HTTP, Accessing a web server, publishing
on web server, secure HTTP, Secure Sockets Layer, WWW Proxies, IIS, Case study of apache
web server.
Background and history,Anatomy of WWW, Web characteristics, Spam, The web graph, The
Web Search Users, search engines, architecture of search engines, search tools, DNS resolution,
The URL frontier, Link analysis, PageRank,
Basics of Web crawling, Various crawling techniques , incremental crawler, parallel crawler,
distributed crawlers, focused crawler, agent based crawler, Hidden web Crawler
Information retrieval problem, an inverted index, Processing Boolean queries, The extended
Boolean model versus ranked retrieval, an inverted index, Bi-word indexes, Positional indexes,
Combination schemes
CODE: OEC-5
NO OF CREDITS: 3
L P THEORY EXAM: 75
4 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
UNIT V: Infringement
What is Infringement?How is Infringement determined? Who is an Infringer?, Direct,
Contributory and Induced, Defences of Infringement:Research Exemption, Invalidity, Misuse,
Failure to mark, Laches and Estoppel and first sale doctrine
REFERENCES