B.SC (ITIM) Syllabus Kuvempu University
B.SC (ITIM) Syllabus Kuvempu University
JANNASHAYADRI , SHAKARGHATTA
SHIMOGA, KARNATAKA
UNIT – I
UNIT – II
Writing Business Messages and Documents: Business writing, Business Correspondence,
Instructions Business Reports and Proposals, Career building and Resume writing.
Developing Oral Communication Skills for Business: Effective Listening, Business Presentations
and Public Speaking, Conversations, Interviews
UNIT – III
Developing Oral Communication Skills for Business: Meetings and Conferences, Group
Discussions and Team Presentations, Team Briefing.
UNIT – IV
UNIT – V
Presentation Process: Planning the presentations, executing the presentations, impressing the
audience by performing
Planning stage: Brainstorming, mind maps / concept maps, executing stage: chunking theory,
creating outlines, Use of templates. Adding graphics to your presentation: Visual communication,
Impress stage: use of font, colour, layout, Importance of practice and performance.
Reference:
1. Business Communica tion Edited by Meenakshi Raman and Oxford University Press Second
2. Professional Communica tion Aruna Koneru Tata McGraw Hill
3. Graphics for Learning: Proven Guidelines for Planning, Designing, and Evaluating Visuals
in Training Materials Ruth C. Clark, Chopeta Lyons, Pfeiffer, Wiley 2011
4. Basic Business Communica tion: Skills for Empowerin g the Internet Generation Lesikar
2
Raymond V and Marie E. Flatley. Tata McGraw - Hill 2005
5. Nonverbal Communica tion: Notes on the Visual Perception of Human Relations Ruesh,
Jurgen and Weldon Kees University of California Press 1966
3
BSIMS-12 Computers Fundamentals and C Programming
4
Reference:
5
BSIMS-13 Basic Electronics
References:
1. Digital computer Electronics by Albert Paul Malvino Tata Mc Graw-Hill PublicProgramming in ANSI C - E
Balaguruswamy
2. PC Troubleshooting and Repair Stephen J. Bigelow Dream tech Press, New Delhi
3. PC AND CLONES Hardware, Troubleshooting and Maintenance B. Govinda rajalu, Tata Mc-graw-Hill
Publication.
6
BSIMS-14 PROGRAMMING FUNDAMENTALS & C
Unit 1-Introduction to C:
Unit 2- Operators:
Increment and Decrement operators, Arithmetic, relational, logical, assignment and bitwise
operators, conditional operator and special operators of C, data type conversion, precedence
and associativity of operators. Mathematical functions. Formatted and unformatted Input and
Output functions – gets(), puts(), getchar(), putchar(), printf() and scanf().
References:
1. Computer Concepts and C Programming by P B Kottur.
2. Ansi C, by Balagurusamy E
7
6. Sorting an unsorted array
7. Searching an element in an array.
8. Addition of two matrices
9. Multiplication of two matrices
10. Norm and trace of the matrix.
11. Count the numbers of vowels in a given string.
12. Find the factorial of a number using function
8
[Link]. (ITIM)-2nd Semester
BSIMS-21 Principles of Data Communication
PART- A
Unit 2-Dataencoding
Basics, types and description of different signals, Digital data & digital signals:
NRZ, multilevel binary, Bi phase techniques. Digital data & Analog signals:
Encoding techniques- ASK, FSK, PSK Analog data & Digital signals: PCM & delta
modulation Analog data & Analog signals: Modulation- AM & FM Spread
spectrum: Frequency hoping, direct sequence Asynchronous & synchronous
transmission: Line configurations- full duplex & half duplex.
PART- B
References:
2. Data and Computer Communications – William Stallings.
3. Computer Networks – Andrew [Link] baum.
4. Data Communication – Ulysis D Black.
5. Data Communication and Networking – Behrouz A. Forouzan.
6. Internetworking with TCP/ IP – Douglas E comer, PHI
9
BSIMS-22 Introduction to Operating Systems
PART- A
Unit 1–Introduction
Definition of Operating System, need. Early systems – Batch Systems,
Multiprogramming, Time Sharing, Parallel and Distributed systems. Special Purpose
Systems – Real Time, Embedded Systems, Multimedia Systems, Handheld Systems.
Computing Environments – Traditional, Client Server, Peer- to-Peer and Web based.
Open Source Operating Systems.
PART -B
Unit 3–Deadlocks
Definition with example, System model, Dead lock characterization – Necessary
Conditions, Resource Allocation Graph, Dead lock prevention, Avoidance and detection,
Recovery from deadlock.
References:
1. Abraham Silberschatz and Peter Baer Galvin, Operating System Concepts,
Fifth edition, Addison - wesley 1989.
2. Milan Milonkovic, Operating System Concepts & Design, II Edition, McGRaw
Hill 1992.
3. Stallings, Operating Systems, PearsonEdition.
4. Tanenbaum, Operating System Concepts, PearsonEducation
5. Nutt : Operating System, 3/e Pearson Education 2004
10
BSIMS-23 Essentials of Linux operating Systems
UNIT - I
Operating System: Concept, Components of Operating System, Operating System Operations,
Protection and Security. Computing Environment. Abstract View of OS: User view, System View,
Operating System Services, System Calls: Concept, Types of System Calls.
Computer System Architecture: Single-Processor Systems, Multiprocessor Systems.
Types of Operating Systems: Batch Operating System, Multi-Programmed Operating System,
Time-Shared Operating System, Real Time Operating System, Distributed Operating Systems.
Process Management: Process Concept, Operation on Processes, Cooperating Processes, Inter-
Process Communication, Threads.
Linux Operating System: Introduction to Linux OS, Basic Commands of Linux OS.
UNIT - II
Process Synchronization: Introduction, The Critical-Section Problem with solution, Bakery
Algorithm, Synchronization hardware, Semaphores, Semaphores Implementation, Classical
Problems of Synchronization with algorithms, Critical Regions, Monitors.
CPU Scheduling: Basic Concepts, Scheduling Criteria, Scheduling algorithms, Multilevel Queue
Scheduling, Multilevel Feedback Queue Scheduling.
Linux Operating System: Process Management Commands and System Calls.
UNIT - III
Deadlock: System Models, Deadlock Characterization, Resource Allocation Graph, Deadlock
Prevention, Avoidance, Detection and Recovery, Banker’s algorithm.
Memory Management: Main Memory: Contiguous Memory Allocation, Fragmentation, Paging,
And Segmentation. Virtual Memory: Demand Paging, Page Replacement, Page replacement
algorithm, Allocation of
Frames, Thrashing.
Linux Operating System: Memory Management Commands and System Calls.
UNIT - IV
File, Devices and Secondary Storage Management: File-System Interface: Concepts, Access
Methods, Directory and Disk Structure. File-System Structure, File-System Implementation,
Directory Implementation, Allocation Methods, Free-Space Management.
Devices: Types of devices, Channels and Control Unit, Multiple Paths, Block Multiplexing.
Secondary Storage: Mass-Storage Structure, Disk Structure, Disk Scheduling Algorithms, Disk
Management, RAID structure of disk.
Linux Operating System: File Management Commands and System Calls.
References:
1. Milan Milenkovic, “Operating Systems Concepts and Design”, Tata McGraw-Hill, 2nd
Edition, 1995.
2. Godbole, Achyut, “Operating System”, McGraw-Hill Education, 2nd Edition, 2005.
3. A. S. Tanenbaum, “Modern Operating Systems “, Pearson, 3rd Edition, 2007.
4. Dhanjay M. Dhamdhere, “Operating System A concept based approach”, Tata McGraw-Hill,
2nd Edition, 2006.
5. Madnick E. and Donovan J., “Operating Systems”, Tata McGraw Hill, 2001. Operating
Systems with Linux Lab.
11
BSIMS-24 Basics of Computer Networks
PART -A
Unit 1-Basics
Design issues, routing algorithms- the optimality principle, shortest path routing,
distance vector routing, and link state routing. Congestion control algorithms-
general principle, Congestion prevention policies, traffic shaping. The network layer
in the internet - the IP protocol, IP address, and subnet. Internet control protocol.
PART -B
References:
12
[Link]. (ITIM)-3rd Semester
BSIMS-31 Deploying Business Desktops
13
Protecting Shared Files and Folders Using Shadow Copies
Configuring Network Printing
Implementing Group Policy
Overview of Group Policy
Group Policy Processing
Implementing a Central Store for Administrative Templates
Securing Windows Servers Using Group Policy Objects
Windows Security Overview
Configuring Security Settings
Restricting Software
Configuring Windows Firewall with Advanced Security
Implementing Server Virtualization with Hyper-V
Overview of Virtualization Technologies
Implementing Hyper-V
Managing Virtual Machine Storage
Managing Virtual Networks
Administering windows server 2012
Deploying and Maintaining Server Images
Overview of Windows Deployment Services
Implementing Deployment with Windows Deployment Services
Administering Windows Deployment Services
Configuring and Troubleshooting Domain Name System
Installing the DNS Server Role
Configuring the DNS Server Role
Configuring DNS Zones
Configuring DNS Zone Transfers
Managing and Troubleshooting DNS
Maintaining Active Directory Domain Services
Overview of AD DS
Implementing Virtualized Domain Controllers
Implementing RODC
Administering AD DS
Managing the AD DS Database
Managing User and Service Accounts
Automating User Account Management
Configuring Password-Policy and User-Account Lockout Settings
Configuring Managed Service Accounts
Implementing a Group Policy Infrastructure
Introducing Group Policy
Implementing and Administering Group Policy Objects (GPOs)
Group Policy Scope and Group Policy Processing
Troubleshooting the Application of GPOs
Managing User Desktops with Group Policy
Implementing Administrative Templates
Configuring Folder Redirection and Scripts
Configuring Group Policy Preferences
Managing Software with Group Policy
Configuring and Troubleshooting Remote Access
Configuring Network Access
Configuring Virtual Private Network (VPN) Access
14
Overview of Network Policies
Troubleshooting Routing and Remote Access
Configuring DirectAccess
Installing, Configuring, and Troubleshooting the Network Policy Server Role
Installing and Configuring a NPS
Configuring Remote Authentication Dial-In User Service (RADIUS) Clients and Servers
NPS Authentication Methods
Monitoring and Troubleshooting a NPS
Implementing Network Access Protection
Overview of Network Access Protection
Overview of NAP Enforcement Processes
Configuring NAP
Monitoring and Troubleshooting NAP
Optimizing File Services
Overview of FSRM
Using FSRM to Manage Quotas, File Screens, and Storage Reports
Implementing Classification and File Management Tasks
Overview of Distributed File System (DFS)
Configuring DFS Namespaces
Configuring and Troubleshooting Distributed File System Replication (DFS-R)
Configuring Encryption and Advanced Auditing
Encrypting Files by Using Encrypting File System
Configuring Advanced Auditing
Implementing Update Management
Overview of WSUS
Deploying Updates with WSUS
Monitoring Windows Server 2012
Monitoring Tools
Using Performance Monitor
Monitoring Event Logs
Configuring Advanced Windows Server 2012 Services
Implementing Advanced Network Services
Configuring Advanced DHCP Features
Configuring Advanced DNS Settings
Implementing IPAM
Implementing Advanced File Services
Configuring iSCSI Storage
Configuring BranchCache
Optimizing Storage Usage
Implementing Dynamic Access Control
Overview of Dynamic Access Control
Planning for Dynamic Access Control
Deploying Dynamic Access Control
Implementing Distributed Active Directory Domain Services Deployments
Overview of Distributed AD DS Deployments
Deploying a Distributed AD DS Environment
Configuring AD DS Trusts
Implementing Active Directory Domain Services Sites and Replication
Overview of AD DS Replication
Configuring AD DS Sites
15
Configuring and Monitoring AD DS Replication
Implementing Active Directory Certificate Services
PKI Overview
Deploying CAs
Deploying and Configuring CA Hierarchy
Deploying and Managing Certificate Templates
Implementing Certificate Distribution and Revocation
Managing Certificate Recovery
Implementing Active Directory Rights Management Services
AD RMS Overview
Deploying and Managing an AD RMS Infrastructure
Configuring AD RMS Content Protection
Configuring External Access to AD RMS
Implementing Active Directory Federation Services
Overview of AD FS
Deploying AD FS
Implementing AD FS for a Single Organization
Deploying AD FS in a B2B Federation Scenario
Implementing Network Load Balancing
Overview of NLB
Configuring an NLB Cluster
Planning an NLB Implementation
Implementing Failover Clustering
Overview of Failover Clustering
Implementing a Failover Cluster
Configuring Highly Available Applications and Services on a Failover Cluster
Maintaining a Failover Cluster
Implementing a Multi-Site Failover Cluster
Implementing Failover Clustering with Hyper-V
Overview of Integrating Hyper-V with Failover Clustering
Implementing Hyper-V Virtual Machines on Failover Clusters
Implementing Hyper-V Virtual Machine Movement
Managing Hyper-V Virtual Environments by Using VMM
Implementing Disaster Recovery
Overview of Disaster Recovery
Implementing Windows Server Backup
Implementing Server and Data Recovery
16
BSIMS-32 Network-Protocols & Internetworking
Introduction:
Introduction to computer networks and TCP/IP Protocols, The TCP/IP protocol suit and the
TCP/IP model.
The concept of layering, the job of each layer, Connectionless vs. Connection oriented
communication and services. TCP as CO Service over CL connection and UDP as CL
service over CL connection.
Complete communication process, an email and a web access communication over TCP/IP
network. Showcasing how SMTP and HTTP works at each layer in a brief.
Network layer-1
Addressing in networks, IPv4 addressing mechanism, subletting and CIDR, managing
addressing with CIDR.
The difference between IPv4 and IPv6 addressing mechanism. Advantage offered by the
IPv6. Different addressing mechanisms used by IPv6.
Network layer: services, accounting, addressing in TCP/IP
Network layer-2
Network layer: routing, what a router contains, routing algorithms How routing is performed
in TCP/IP networks, link state algorithm, two phases of LS algorithm, how best path is
decided.
Routing in MANets and the Exterior routing, the challenges in MANet Routing, AODV
routing, the difference in exterior routing, hot potato and interior routing used in exterior
routing process, multicast and broadcast routing.
Congestion at Network layer and MPLS, Congestion, congestion control, how tag based
routing is performed in MPLS Routes, how switching based on tags is done in networks, how
MPLS works, what are the challenges in implementing MPLS.
17
Transport layer-1
Transport layer services, the transport layer, it’s duties, different categories and types of
transport layer services, how TCP manages connections, flow control and estimation of
round trip time, how retransmission timer is managed at TCP.
TCP Timers and delayed duplicates problem in TCP, types of timers TCP normally uses,
delayed duplicates, handshake process is managed and errors are handled at TCP,
Tomlinson’s solution and the need for the three-way handshake.
Connection management with TCP, connection release process, asymmetric and symmetric
connection release process, congestion control, implicit and explicit congestion control
methods, slow start, AIMD, fast recovery and fast retransmit, explicit congestion
notification.
Application Layer-2
Resource Records in DNS and introduction to FTP, different types of resource records, How
FTP works, control and data connections, and passive FTP extensions.
The Hypertext Transfer Protocol (HTTP), The WWW and HTTP request and response,
persistent connection, cookies and session variables.
Simple Mail Transfer Protocol (SMTP), The Email system and SMTP protocol, Internet
mail standards, POP3 and IMAP
Reference:
1. Computer Networks by Bhushan Trivedi, Oxford University Press
2. Data Communication and Networking, Bhushan Trivedi, Oxford University Press
3. Elements of network Protocol Design: Mohamed G. Gouda (Wiley Publications), 2006.
18
BSIMS-33 Data Storage and Management
Unit-I
Introduction to Storage Technology: Data proliferation, evolution of various storage technologies,
Overview of storage infrastructure components, Information Lifecycle Management, Data
categorization.
Unit-II
Storage Systems Architecture: Intelligent disk subsystems overview, Contrast of integrated vs.
modular arrays, Component architecture of intelligent disk subsystems, Disk physical structure
components, properties, performance, and specifications, RAID levels & parity algorithms, hot
sparing, Front end to host storage provisioning, mapping and operation.
Unit-III
Introduction to Networked Storage: JBOD, DAS, NAS, SAN & CAS evolution and comparison.
Applications, Elements, connectivity, standards, management, security and limitations of DAS,
NAS, CAS & SAN.
Unit -IV
Hybrid Storage solutions; Virtualization: Memory, network, server, storage & appliances. Data
center concepts & requirements, Backup & Disaster Recovery: Principles Managing & Monitoring:
Industry management standards (SNMP, SMI-S, CIM), standard framework applications, Key
management metrics (Thresholds, availability, capacity, security, performance).
Unit-V
Information storage on cloud: Concept of Cloud, Cloud Computing, storage on Cloud, Cloud
Vocabulary, Architectural Framework, Cloud benefits, Cloud computing Evolution, Applications &
services on cloud, Cloud service providers and Models, Essential characteristics of cloud computing,
Cloud Security and integration.
References:
1. G. Somasundaram & Alok Shrivastava (EMC Education Services) editors; Information
Storage and Management: Storing, Managing, and Protecting Digital Information; Wiley
India.
2. Ulf Troppens, Wolfgang Mueller-Friedt, Rainer Erkens, Rainer Wolafka, Nils Haustein;
Storage Network explained : Basic and application of fiber channels, SAN, NAS, iSESI,
INFINIBAND and FCOE, Wiley India.
3. John W. Rittinghouse and James F. Ransome; Cloud Computing : Implementation ,
Management and Security, CRC Press, Taylor Frances Pub.
4. Nick Antonopoulos, Lee Gillam; Cloud Computing : Principles, System &
Application,Springer. Anthony T. Velete, Toby [Link], and Robert Eltenpeter, Cloud
Computing : A practical Approach, TMH Pub.
5. Saurabh , Cloud Computing : Insight into New Era I
19
[Link]. (ITIM)-4th Semester
BSIMS-41 Introduction to DBMS
Unit-I
Introduction to Databases and Transactions: What is database system, purpose of database
system, view of data, relational databases, database architecture, and transaction management?
Unit-II
Data Models: The importance of data models, Basic building blocks, Business rules, the evolution
Of data models, Degrees of data abstraction.
Unit-III
Database Design ,ER-Diagram and Unified Modeling Language:
Database design and ER Model: overview, ER-Model, Constraints, ER-Diagrams,
ERDIssues, weak entity sets, Codd’s rules, Relational Schemas, Introduction to UML
Relational database model: Logical view of data, keys, integrity rules.
Relational Database design: features of good relational database design, atomic
Domain and Normalization
Unit -IV
Constraints, Views and SQL: What is constraints, types of constrains, Integrity constraints, Views:
Introduction to views, data independence, security, updates on views, comparison between tables
and views SQL: data definition, aggregate function, Null Values, nested sub queries, Joined
relations. Triggers.
Unit-V
Transaction management and Concurrency control: Transaction management: ACID properties,
serializability and concurrency control, Lock based concurrency control (2PL, Deadlocks), Time
stamping methods, optimistic methods, database recovery management.
References:
1. A Silberschatz, H Korth, S Sudarshan, “Database System and Concepts”, fifth Edition
McGraw-Hill.
2. Rob, Coronel, “Database Systems”, Seventh Edition, Cengage Learning.
20
BSIMS-42 Personality Development Program
Unit-I
Introduction to Personality Development: The concept of personality - Dimensions of personality
– Theories of Freud & Erickson-Significance of personality development. The concept of success
and failure: What is success? - Hurdles in achieving success - Overcoming hurdles - Factors
responsible for success – What is failure - Causes of failure. SWOT analysis.
Unit-II
Attitude & Motivation: Attitude - Concept - Significance - Factors affecting attitudes - Positive
attitude – Advantages –Negative attitude- Disadvantages - Ways to develop positive attitude -
Differences between personalities having positive and negative attitude. Concept of motivation -
Significance – Internal and external motives - Importance of self- motivation- Factors leading to de-
motivation
Unit-III
Self-esteem: Term self-esteem - Symptoms - Advantages - Do's and Don’ts to develop positive self-
esteem – Low self-esteem - Symptoms - Personality having low self-esteem - Positive and negative
self-esteem. Interpersonal Relationships – Defining the difference between aggressive, submissive
and assertive behaviors – Lateral thinking.
Unit -IV
Other Aspects of Personality Development: Body language - Problem-solving - Conflict and
Stress Management - Decision-making skills -Leadership and qualities of a successful leader –
Character building -Team-work – Time management -Work ethics –Good manners and etiquette.
Unit-V
Employability Quotient: Resume building- The art of participating in Group Discussion – Facing
the Personal (HR & Technical) Interview -Frequently Asked Questions - Psychometric Analysis -
Mock Interview Sessions.
References:
1. Hurlock, E.B (2006). Personality Development, 28th Reprint. New Delhi: Tata McGraw Hill.
2. Andrews, Sudhir. How to Succeed at Interviews. 21st (rep.) New [Link] McGraw-Hill
1988.
3. Lucas, Stephen. Art of Public Speaking. New Delhi. Tata - Mc-Graw Hill. 2001.
4. Pravesh Kumar. All about Self- Motivation. New Delhi. Goodwill Publishing House. 2005.
5. Smith, B . Body Language. Delhi: Rohan Book Company. 2004
21
BSIMS-43 Linux Administration
UNIT - I
Introduction to Red Hat Enterprise Linux: Linux, Open Source and Red Hat, Origins of Linux,
Distributions, Duties of Linux System Administrator.
Command Line: Working with the Bash Shell, Getting the Best of Bash, Useful Bash Key
Sequences, Working with Bash History, Performing Basic File System Management Tasks,
Working with Directories, Piping and Redirection, Finding Files
System Administration Tasks: Performing Job Management Tasks, System and Process
Monitoring and Management, Managing Processes with ps, Sending Signals to Processes with the
kill Command, using top to Show Current System Activity, Managing Process Niceness, Scheduling
Jobs, Mounting Devices, Working with Links, Creating Backups, Managing Printers, Setting Up
System Logging, Setting Up Rsyslog, Common Log Files, Setting Up Logrotate.
Managing Software: Understanding RPM, Understanding Meta Package Handlers, Creating Your
Own Repositories, Managing Repositories, Installing Software with Yum, Querying Software,
Extracting Files from RPM Packages
UNIT - II
Configuring and Managing Storage: Understanding Partitions and Logical Volumes, Creating
Partitions, Creating File Systems, File Systems Overview, Creating File Systems, Changing File
System Properties, Checking the File System Integrity, Mounting File Systems Automatically
Through fstab, Working with Logical Volumes, Creating Logical Volumes, Resizing Logical
Volumes, Working with Snapshots, Replacing Failing Storage Devices, Creating Swap Space,
Working with Encrypted Volumes
Connecting to the Network: Understanding Network Manager, Working with Services and
Runlevels, Configuring the Network with Network Manager, Working with system-config-network,
Network Manager Configuration Files, Network Service Scripts, Networking from the Command
Line, Troubleshooting Networking, Setting Up IPv6, Configuring SSH, Enabling the SSH Server,
Using the SSH Client, Using PuTTY on Windows Machines, Configuring Key-Based SSH
Authentication, Using Graphical Applications with SSH, Using SSH Port Forwarding, Configuring
VNC Server Access.
Working with Users, Groups, and Permissions: Managing Users and Groups, Commands for
User Management, Managing Passwords, Modifying and Deleting User Accounts, Configuration
Files, Creating Groups, Using Graphical Tools for User, and Group Management, Using External
Authentication Sources, the Authentication Process, sssd, nsswitch, Pluggable Authentication
Modules, Managing Permissions, the Role of Ownership, Basic Permissions: Read, Write, and
Execute, Advanced Permissions, Working with Access Control Lists, Setting Default Permissions
with umask, Working with Attributes
UNIT - III
Securing Server with iptables: Understanding Firewalls, Setting Up a Firewall with system-config-
firewall, Allowing Services, Trusted Interfaces, Masquerading, Configuration Files, Setting Up a
Firewall with iptables, Tables, Chains, and Rules, Composition of Rule, Configuration Example,
Advanced iptables Configuration, Configuring Logging, The Limit Module, Configuring NAT.
Setting Up Cryptographic Services: Introducing SSL, Proof of Authenticity: The Certificate
Authority, Managing Certificates with openssl, Creating a Signing Request, Working with GNU
Privacy Guard, Creating GPG Keys, Key Transfer, Managing GPG Keys, Encrypting Files with
GPG, GPG Signing, Signing RPM Files.
Configuring Server for File Sharing: What is NFS? Advantages and Disadvantages of NFS,
Configuring NFS4, Setting Up NFSv4, Mounting an NFS Share, Making NFS Mounts Persistent,
Configuring Automount, Configuring Samba, Setting Up a Samba File Server, Samba Advanced
22
Authentication Options, Accessing Samba Shares, Offering FTP Services.
UNIT - IV
Configuring DNS and DHCP: Introduction to DNS, The DNS Hierarchy, DNS Server Types, The
DNS Lookup Process, DNS Zone Types, Setting Up a DNS Server, Setting Up a Cache-Only Name
Server, Setting Up a Primary Name Server, Setting Up a Secondary Name Server, Understanding
DHCP, Setting Up a DHCP Server.
Setting Up a Mail Server: Using the Message Transfer Agent, the Mail Delivery Agent, the Mail
User Agent, Setting Up Postfix as an SMTP Server, Working with Mutt, Basic Configuration,
Internet Configuration, Configuring Dovecot for POP and IMAP.
Configuring Apache on Red Hat Enterprise Linux: Configuring the Apache Web Server, creating
a Basic Website, Understanding the Apache Configuration Files, Apache Log Files, Working with
Virtual Hosts, Securing the Web Server with TLS Certificates, Configuring Authentication, Setting
up Authentication with .htpasswd, Configuring LDAP Authentication, Setting Up MySQL.
UNIT – V
Introducing Bash Shell Scripting: Introduction, Elements of a Good Shell Script, Executing the
Script, Working with Variables and Input, Understanding Variables, Variables, Subshells, and
Sourcing, Working with Script Arguments, Asking for Input, Using Command Substitution,
Substitution Operators, Changing Variable Content with Pattern Matching, Performing Calculations,
Using Control Structures, Using if...then...else, Using case, Using while, Using until, Using for,
Configuring booting with GRUB.
High-Availability Clustering: High-Availability Clustering, The Workings of High Availability,
High-Availability Requirements, Red Hat High-Availability Add-on Software, Components,
Configuring Cluster-Based Services, Setting Up Bonding, Setting Up Shared Storage, Installing the
Red Hat High Availability Add-On, Building the Initial State of the Cluster, Configuring Additional
Cluster Properties, Configuring a Quorum Disk, Setting Up Fencing, Creating Resources and
Services, Troubleshooting a Nonoperational Cluster, Configuring GFS2 File Systems.
Setting Up an Installation Server: Configuring a Network Server as an Installation Server, Setting
Up a TFTP and DHCP Server for PXE Boot, Installing the TFTP Server, Configuring DHCP for
PXE Boot, Creating the TFTP PXE Server Content, creating a Kickstart File, Using a Kickstart File
to Perform an Automated, Installation, Modifying the Kickstart File with, system-config-kickstart,
Making Manual Modifications to the Kickstart File.
References:
1. Linux Administration: A Beginner's Guide Wale Soyinka TMH Fifth Edition
2. Red hat Linux Networking and System Administration Terry Collings and Kurt Wall Wiley
3rd Edition.
3. Red Hat Enterprise Linux6 Administration Sander van Vugt John Wiley and Sons 2013.
23
BSIMS-E1 Interconnecting Network Device (ICND)*
Networking Fundamentals:
Introduction to TCP/IP networking as the primary dominant networking model on modern
Ethernet networks.
Learn the fundamentals of data transfer on Ethernet LANs.
Understanding basic WAN connectivity options.
Identify the purpose and structure of IPv4 addresses.
Identify the purpose of routing processes.
Understanding Transport layer and application protocols.
Understanding IPv4:
Learn the purpose and structure of an IPv4 address.
Learn the purpose and structure of an IPv4 subnet mask.
Understand the purposes of subnetting.
Identify key facts about an IPv4 address.
Configure routers using the CLI.
Configuring router interfaces with IPv4 addresses
Understanding routing protocols
Configuring static routes.
Configuring clients with IPv4 addresses using DHCP.
IPv4 Services:
Creating and configuring Access Control Lists.
Working with Named Access Control Lists.
Understanding Network Address Translation Concepts.
Configuring Network Address Translation on Routers.
24
Implementing IPv6:
Understand the fundamentals of IPv6.
Understand the structure of IPv6 Addresses.
Identify the different types of IPv6 Addresses.
Configuring IPv6 Addresses.
Configuring IPv6 Routing.
Creating IPv6 Subnets.
Assigning IPv6 Addresses to clients.
Reference:
1. Internetworking with TCP/IP Volume One 6th Edition by Comer, Douglas E. published by
Addison-Wesley.
2. A Guide to the TCP/IP Protocol Suite by Floyd Wilder, 1998 Edition.
3. Networking for Systems Administrators by Michael W Lucas
4. Computer Networking for Beginners Your Guide for Mastering Computer Networking,
Cisco IOS and the OSI Model by Ramon Nastase.
25
BSIMS-E2 OBJECT ORIENTED PROGRAMMING WITH C++*
Difference between C and C++, Structure of a C++ program, input and output statements,
tokens - Keywords, identifiers, constants, strings and operators, reference variables – definition
and example, special operators in C++, brief introduction to control structures in C++.
Difference between structure and class, syntax and example for class declaration, Definition of
data member and member function, Defining member function inside and outside the class,
inline functions, array of objects, default arguments, static data members and static member
functions, function overloading, definition of friend function, syntax and example for the
declaration of friend function, special characteristics of friend function.
Definition of Inheritance,forms of inheritance, syntax and example for defining derived classes,
visibility modes, explanation of multilevel inheritance and hybrid inheritance with examples.
Definition of templates, syntax and example for class and function template.
Reference Books:
1. Object Oriented Programming with C++ - E Balaguruswamy
2. C++ - The Complete Language – BjarneSchildt
3. Object Oriented Programming in Turbo C++ - Robert Lafore
26
BSIMS-E3 Object Oriented Programming with Java*
Introduction to Java : Basics of Java programming, Data types, Variables, Operators, Control
structures including selection, Looping, Java methods, Overloading, Math class, Arrays in java.
Objects and Classes : Basics of objects and classes in java, Constructors, Finalizer, Visibility
modifiers, Methods and objects, Inbuilt classes like String, Character, StringBuffer, File, this
reference.
Inheritance and Polymorphism : Inheritance in java, Super and sub class, Overriding, Object
class, Polymorphism, Dynamic binding, Generic programming, Casting objects, Instance of
operator, Abstract class, Interface in java, Package in java, UTIL package.
Event and GUI programming : Event handling in java, Event types, Mouse and key events, GUI
Basics, Panels, Frames, Layout Managers: Flow Layout, Border Layout, Grid Layout, GUI
components like Buttons, Check Boxes, Radio Buttons, Labels, Text Fields, Text Areas, Combo
Boxes, Lists, Scroll Bars, Sliders, Windows, Menus, Dialog Box, Applet and its life cycle,
Introduction to swing.
I/O programming: Text and Binary I/O, Binary I/O classes, Object I/O, Random Access Files.
Multithreading in Java : Thread life cycle and methods, Runnable interface, Thread
synchronization, Exception handling with try-catch-finally, Collections in java, Introduction to
JavaBeans and Network Programming.
Reference:
1. Introduction to Java Programming (Comprehensive Version), Daniel Liang, Seventh Edition,
Pearson.
2. Programming in Java, Sachin Malhotra & Saurabh Chaudhary, Oxford University Press.
3. Murach’s Beginning Java 2, Doug Lowe, Joel Murach and Andrea Steelman, SPD.
4. Core Java Volume-I Fundamentals, Eight Edition, Horstmann & Cornell, Pearson Education.
5. The Complete Reference, Java 2 (Fourth Edition), Herbert Schild, TMH.
6. Java Programming, D. S. Malik, Cengage Learning.
27
[Link]. (ITIM)-5th Semester
BSIMS-51 Essentials of Software Testing & QA
UNIT - I
Introduction to Quality: Historical Perspective of Quality, What is Quality? (Is it a fact or perception?),
Definitions of Quality, Core Components of Quality, Quality View, Financial Aspect of Quality, Customers,
Suppliers and Processes, Total Quality Management (TQM), Quality Principles of Total Quality
Management, Quality Management Through Statistical Process Control, Quality Management Through
Cultural Changes, Continual (Continuous) Improvement Cycle, Quality in Different Areas, Benchmarking
and Metrics, Problem Solving Techniques, Problem Solving Software Tools.
Software Quality: Introduction, Constraints of Software Product Quality Assessment, Customer is a King,
Quality and Productivity Relationship, Requirements of a Product, Organization Culture, Characteristics of
Software, Software Development Process, Types of Products, Schemes of Criticality Definitions,
Problematic Areas of Software Development Life Cycle, Software Quality Management, Why Software Has
Defects? Processes Related to Software Quality, Quality Management System Structure, Pillars of Quality
Management System, Important Aspects of Quality Management.
UNIT – II
Fundamentals of testing: Introduction, Necessity of testing, What is testing? Fundamental test
process, The psychology of testing, Historical Perspective of Testing, Definitions of Testing,
Approaches to Testing, Testing During Development Life Cycle, Requirement Traceability Matrix,
Essentials of Software Testing, Workbench, Important Features of Testing Process, Misconceptions
About Testing, Principles of Software Testing, Salient Features of Good Testing, Test Policy, Test
Strategy or Test Approach, Test Planning, Testing Process and Number of Defects Found in Testing,
Test Team Efficiency, Mutation Testing, Challenges in Testing, Test Team Approach, Process
Problems Faced by Testing, Cost Aspect of Testing, Establishing Testing Policy, Methods,
Structured Approach to Testing, Categories of Defect, Defect, Error, or Mistake in Software,
Developing Test Strategy, Developing Testing Methodologies (Test Plan), Testing Process, Attitude
Towards Testing (Common People Issues), Test Methodologies/Approaches, People Challenges in
Software Testing, Raising Management Awareness for Testing, Skills Required by Tester, Testing
throughout the software life cycle, Software development models, Test levels, Test types, the targets
of testing, Maintenance testing.
UNIT – III
Unit Testing: Boundary Value Testing: Normal Boundary Value Testing, Robust Boundary Value
Testing, Worst-Case Boundary ValueTesting, Special Value Testing, Examples, Random Testing,
Guidelines for Boundary Value Testing,
Equivalence Class Testing: Equivalence Classes, Traditional Equivalence Class Testing, Improved
Equivalence Class Testing, Edge Testing, Guidelines and Observations.
Decision Table–Based Testing: Decision Tables, Decision Table Techniques, Cause-and-Effect
Graphing, Guidelines and Observations, Path Testing: Program Graphs, DD-Paths, Test Coverage
Metrics, Basis Path Testing, Guidelines and Observations,
Data Flow Testing: Define/Use Testing, Slice-Based Testing, Program Slicing Tools.
UNIT – IV
Software Verification and Validation: Introduction, Verification, Verification Workbench,
Methods of Verification, Types of reviews on the basis od Stage Phase, Entities involved in
verification, Reviews in testing lifecycle, Coverage in Verification, Concerns of Verification,
Validation, Validation Workbench, Levels of Validation, Coverage in Validation, Acceptance
Testing, Management of Verification and Validation, Software development verification and
validation activities.
28
V-test Model:Introduction, V-model for software, testing during Proposal stage, Testing during
requirement stage, Testing during test planning phase, Testing during design phase, Testing during
coding, VV Model, Critical Roles and Responsibilities.
UNIT – V
Levels of Testing: Introduction, Proposal Testing, Requirement Testing, Design Testing, Code
Review, Unit Testing, Module Testing, Integration Testing, Big-Bang Testing, Sandwich Testing,
Critical Path First, Sub System Testing, System Testing, Testing Stages.
Special Tests: Introduction, GUI testing, Compatibility Testing, Security Testing, Performance
Testing, Volume Testing, Stress Testing, Recovery Testing, Installation Testing, Requirement
Testing, Regression Testing, Error Handling Testing, Manual Support Testing,
References:
1. Software Testing and Continuous Quality Improvement William E. Lewis CRC Press
2. Software Testing: Principles, Techniques and Tools M. G. Limaye TMH
3. Foundations of Software Testing Dorothy Graham, Erik van Veenendaal, Isabel Evans, Rex Black
Cengage Learning 3rd Edition
4. Software Testing: A Craftsman‟s Approach Paul C. Jorgenson CRC Press 4th Edition
29
BSIMS-52 IT Information Security & Management
UNIT I
ORGANISATION:
It’s Manager, Structure and activities – Introduction – The environment of organizations –
Information flows – Information needs and sources of information – Types of management decisions
and information need – Business and Technical Dimensions of information
UNIT II
SYSTEM ANALYSIS AND DESIGN:
The work of system analyst study – System design – Data Collection and Preparation – Detailed
system design – Implementation – Evaluation and maintenance of MIS – Pitfalls in MIS
development.
UNIT III
UNIT IV
Reference:
1. Steven Alter, Information Systems – A Management Perspective Addison Wesley.
2. James A O’Brein Management Information System Tata Mcgraw Hill New Delhi
3. Kenneth C. Laudon and Jane Price Laudon Management Information Systems managing the
digital firm, Pearson Education, Asia
IT Operation Management:
Definitions, Infrastructure, management activities, Evolutions of Systems since 1960s (Mainframes-
to-Midrange-to-PCs-to-Clientserver computing-to-New age systems) and their management, growth
of internet, current business demands and IT systems issues, complexity of today’s computing
environment, Total cost of complexity issues, Value of Systems management for business.
IT Infrastructure Management:
Factors to consider in designing IT organizations and IT infrastructure, Determining customer’s
Requirements, Identifying System Components to manage, Exist Processes, Data, applications,
Tools and their integration, Patterns for IT systems management, Introduction to the design process
30
for information systems, Models, Information Technology Infrastructure Library (ITIL).
IT Service Management:
Service-level management, financial management and costing, IT services continuity management,
Capacity management, Availability management
Introduction Security, Identity management, Single sign-on, Access Management, Basics of network
security, LDAP fundamentals, Intrusion detection, firewall, security information management.
Introduction to Storage, Backup & Restore, Archive & Retrieve, Space Management, SAN & NAS,
Disaster Recovery, Hierarchical space management, Database & Application protection, Bare
machine recovery, Data retention.
References
E Turban, E Mclean and James Wetherbe, ―Information Technology for Management
Kenneth C Laudon, Jane P Laudon, ―Management Information Systems
James A O‘Brien, ―Management Information System
Rich Schiesser, IT Systems Management.
31
BSIMS-54 Understanding IT project Management
Project Evaluation and Programme Management: Introduction, Business Case, Project Portfolio
Management, Evaluation of Individual Projects, Cost–benefit Evaluation Techniques, Risk
Evaluation, Programme Management, Managing the Allocation of Resources within Programmes,
Strategic Programme Management, Creating a Programme, Aids to Programme Management, Some
Reservations about Programme Management, Benefits Management.
Activity Planning: Introduction, Objectives of Activity Planning, When to Plan, Project Schedules,
Projects and Activities, Sequencing and Scheduling Activities, Network Planning Models,
Formulating a Network Model, Adding the Time Dimension, The Forward Pass, Backward Pass,
Identifying the Critical Path, Activity Float, Shortening the Project Duration, Identifying Critical
Activities, Activity-on-Arrow Networks
Monitoring and Control: Introduction, Creating the Framework, Collecting the Data, Review,
Visualizing Progress, Cost Monitoring, Earned Value Analysis, Prioritizing Monitoring, Getting the
Project Back to Target, Change Control, Software Configuration Management (SCM).
Working in Teams: Introduction, becoming a Team, Decision Making, Organization and Team
Structures, Coordination Dependencies, Dispersed and Virtual Teams, Communication Genres,
Communication Plans, Leadership
Project Closeout: Introduction, Reasons for Project Closure, Project Closure Process, Performing a
Financial Closure, Project Closeout Report.
References
1. Software Project Management Bob Hughes, Mike Cotterell, Rajib Mall TMH
2. Software Project Management Walker Royce Pearson 2005
33
BSIMS-61 Managing & Administering Small IT Setups
References
Management Information System, Author: Davis Olson, McGraw Hill Pub,
Management Information System, Author: James Obrin, Tata McGraw Hill,
34
35