You are on page 1of 48


MADURAI 625 002


COURSE CODE THEORY 10277DM101 10244CS102 10244CS103 10244CS104 10244CS105 E01 PRACTICAL 10244CS107 10244CS108

Discrete Mathematics Advanced Data Structures and Algorithms Network Engineering and management Advanced Database technologies Computer Architecture Elective I Advanced Data Structures Laboratory Networks and Database laboratory

3 3 3 3 3 3

0 0 0 0 0 0

0 0 0 0 0 0

3 3 3 3 3 3

0 0

0 0

3 3

2 2 22

TOTAL SEMESTER II COURSE CODE THEORY 10244CS201 10244CS202 10244CS203 10244CS204 E02 E03 PRACTICAL 10244CS207 10244CS208 Compiler Laboratory Soft Computing & Network Security Laboratory 0 0 0 0 3 3 Advanced distributed Computing Soft Computing and Simulators Computer Network Security Compiler Design Elective II Elective III 3 3 3 3 3 3 0 0 0 0 0 0 0 0 0 0 0 0 COURSE TITLE L T P

C 3 3 3 3 3 3 2 2 22 1


SEMESTER III COURSE CODE 10244CS301 E04 E05 PRACTICAL 10244CS304 Project Thesis Phase I 0 0 0 5 14 COURSE TITLE Virtualization and Cloud Computing Elective IV Elective V L 3 3 3 T 0 0 0 P 0 0 0 C 3 3 3



TOTAL L Lecture T Tutorial P Practical C: Credit


List of Electives
COURSE CODE COURSE TITLE ELECTIVE I (E01) 10244CSE11 10244CSE12 10244CSE13 10244CSE14 10244CSE15 Object Oriented Systems Engineering Multimedia Systems Advanced JAVA technology Digital Image processing UNIX Internals ELECTIVE II (E02) 10244CSE21 10244CSE22 10244CSE23 10244CSE24 10244CSE25 Open Source Systems Software Project Management XML & Web Services Middleware technologies Parallel computing and Multicore technologies ELECTIVE III (E03) 10244CSE31 10244CSE32 10244CSE33 10244CSE34 10244CSE35 Mobile Technologies Software reliability and project management E:Commerce Real time systems Network System Design Using Network Processor ELECTIVE IV (E04) 10244CSE41 10244CSE42 10244CSE43 10244CSE44 Embedded Systems Operation research Adhoc Networks Bioinformatics 3 3 3 3 0 0 0 0 0 0 0 0 3 3 3 3 3 3 3 3 3 3 0 0 0 0 0 0 0 0 0 0 3 3 3 3 3 3 3 3 3 3 0 0 0 0 0 0 0 0 0 0 3 3 3 3 3 3 3 3 3 3 0 0 0 0 0 0 0 0 0 0 3 3 3 3 3 L T P C

10244CSE45 10244CSE46

Recent trends in Mobile computing Semantic Web ELECTIVE V (E05)

3 3

0 0

0 0

3 3

10244CSE51 10244CSE52 10244CSE53 10244CSE54 10244CSE55 10244CSE56 10244CSE57

Data Warehousing and Data Mining Agent based intelligent Systems High speed networks Decision support systems Fault tolerant systems Grid Computing Wireless Sensor networks

3 3 3 3 3 3 3

0 0 0 0 0 0 0

0 0 0 0 0 0 0

3 3 3 3 3 3 3


UNIT I: FUNDAMENTAL STRUCTURES 9 Set theory:: Relationships between sets : Operations on sets : Set identities : Principle of inclusion and exclusion : Minsets. Relations: Binary relations: Partial orderings : Equivalence relations. Functions: Properties of functions : Composition of functions Inverse functions : Permutation functions. UNIT II: LOGIC 9 Propositional logic Logical connectives Truth tables Normal forms (conjunctive and disjunctive) : Predicate logic : Universal and existential quantifiers : Proof techniques direct and indirect Proof by contradiction Mathematical Induction. UNIT III: COMBINATORICS 9 Basics of counting Counting arguments Pigeonhole principle : Permutations and Combinations : Recursion and Recurrence relations Generating functions. UNIT IV: MODELING COMPUTATION AND LANGUAGES 9 Finite state machines Deterministic and Non: deterministic finite state machines Turing Machines : Formal Languages Classes of Grammars Type_0 Context Sensitive Context Free Regular Grammars Ambiguity UNIT V: DISCRETE PROBABILITY 9 Finite probability : Probability distributions : Conditional Probability Independence : Bayes theorem : Mathematical expectation. L :45 T:15 Total :60 REFERNCES 1. Judith L.Gersting, Mathematical Structures for Computer Science, Fifth Edition, W.H. Freeman and Company, NY, 2003. 2. J.P. Tremblay and R. Manohar, Discrete Mathematical Structures with Applications to Computer Science, TMH, 1997. 3. Kenneth H. Rosen, Discrete Mathematics and its Applications, Fifth Edition, TMH, 2003. 4. R.P. Grimaldi, Discrete and Combinatorial Mathematics, Pearson Edition, New Delhi 2002. 5. M.K. Venkataraman, N. Sridharan and N.Chandrasekaran, Discrete Mathematics, The National Publishing Company, 2003. 5

10244CS102 ADVANCED DATA STRUCTURES AND ALGORITHMS L T P 3 0 0 Unit I: Basic Concepts of OOPs Templates Function and class templates Algorithms: performance analysis: time complexity and space complexity ADT List (Singly Doubly and Circular) Implementation Array Pointer Cursor Implementation Unit II: Stacks and Queues ADT Implementation and Applications Trees General Binary Binary Search Expression Search AVL Introduction to Red Black trees and Splay tree B Trees Implementations Tree Traversals Unit III: Set Implementation Basic Operations on Set Priority Queue Implementation Graphs Directed Graphs Shortest Path Problem Undirected Graph Spanning Trees Graph Traversals:hash table representation: hash functions: collision resolution:separate chaining: open addressing:linear probing: quadratic probing: double hashing: rehashing Unit IV: Issues Managing Equal Sized Blocks Garbage Collection Algorithms for Equal Sized Blocks Storage Allocation for Objects with Mixed Sizes Buddy Systems Storage Compaction Unit V: Searching Techniques Sorting Internal Sorting Bubble Sort Insertion Sort Quick Sort Heap Sort Bin Sort Radix Sort External Sorting Merge Sort Multiway Merge Sort Polyphase Sorting Design Techniques Divide and Conquer Dynamic Programming Greedy Algorithm Backtracking Local Search Algorithms TOTAL:45 REFERENCES: 1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, Pearson Education, 2002. 2. Aho Hopcroft Ullman, Data Structures and Algorithms, Pearson Education, 2002. 3. Horowitz Sahni, Rajasekaran, Computer Algorithms, Galgotia, 2000. 4. Tanenbaum A.S, Langram Y, Augestien M.J., Data Structures using C & C++, Prentice Hall of India, 2002. 5. Data structures, Algorithms and Applications in C++, S.Sahni, University Press (India) Pvt.Ltd, 2nd edition, Universities Press Orient Longman Pvt. Ltd. 6. Data structures and Algorithms in C++, Michael T.Goodrich, R.Tamassia and Mount, Wiley student edition, John Wiley and Sons. 7. Data structures using C and C++, Langsam, Augenstein and Tanenbaum, PHI. 6

C 3


Unit I Network Architecture ISO/OSI layered architecture : TCP/IP reference Model : Types of Network : Transmission Media Types of Modem DSL, ADSL, Cable Modem Physical Layer Standard RS232c, RS449, X.21& V.24. Data Link Layer:Error Detection & correction, Flow control, Logical Link control and Medium access Control 802.3, 802.4, 802.2, 802.11 Unit II Network layer Services Virtual Circuit Datagram Internetworking Addressing Routing Link State Distance vector Routing Congestion Control algorithm IPV4 , IPV6, ICMP, ARP & RARP Unicast Routing RIP, OSPF, BGP Multicast Routing Protocols. Unit III Transport layer : Services Processes to Processes Delivery Transmission Control Protocol (TCP) User Datagram Protocol Data Traffic Congestion Control and Quality of Service Application layer Design Issues DNS, E:mail (SMTP), FTP, HTTP, WWW Unit IV Network Management Areas of Management : Network Monitoring Network Controlling SNMP V1, V2, V3 Unit V RMON 1 RMON 2 Management Information Base MIB case study: NS2 Simulator TOTAL:45 References: 1. William Stallings, Data and Computer Communications, Eighth Edition, Prentice Hall of India Private Limited,2007 2. Brijendra Singh : Data Communication and Computer Networks, PHI, 2004. 3. Michael A.Gallo, William A. Hancock: Computer Communication and Networking Technologies,Thomson Asia, 2003. 4. SNMP v1,v2,v3 & RMON 1 & 2 by William Stallings, Pearson Education Asia Inc., 5. Mani Subramanian, Network Management Principles and practice , Addison Wesly New York, 2000. 6. Leon:Garcia, Widjaja : Communication Networks, Fundamental Concepts and Key Architecture, TMH, 2nd Edition, 2004. 7. Gerd E.Keiser: Local Area Networks, TMH, 2nd Edition, 2002


T 0

P 0

C 3

UNIT I DISTRIBUTED DATABASES 5 Distributed Databases Vs Conventional Databases Architecture Fragmentation Query Processing Transaction Processing Concurrency Control Recovery. UNIT II OBJECT ORIENTED DATABASES 10 Introduction to Object Oriented Data Bases : Approaches : Modeling and Design : Persistence Query Languages : Transaction : Concurrency Multi Version Locks : Recovery. UNIT III EMERGING SYSTEMS 10 Enhanced Data Models : Client/Server Model : Data Warehousing and Data Mining Web Databases Mobile Databases. UNIT IV DATABASE DESIGN ISSUES 10 ER Model : Normalization : Security : Integrity : Consistency : Database Tuning Optimization and Research Issues Design of Temporal Databases Spatial Databases. UNIT V CURRENT ISSUES 10 Rules : Knowledge Bases : Active And Deductive Databases : Parallel Databases Multimedia Databases Image Databases Text Database TOTAL : 45 REFERENCES: 1. Elisa Bertino, Barbara Catania, Gian Piero Zarri, Intelligent Database Systems, Addison:Wesley, 2001. 2. Carlo Zaniolo, Stefano Ceri, Christos Faloustsos, R.T.Snodgrass, V.S.Subrahmanian, Advanced Database Systems, Morgan Kaufman, 1997. 3. N.Tamer Ozsu, Patrick Valduriez, Principles Of Distributed Database Systems, Prentice Hal International Inc., 1999. 4. C.S.R Prabhu, Object:Oriented Database Systems, Prentice Hall Of India, 1998. 5. Abdullah Uz Tansel Et Al, Temporal Databases: Theory, Design And Principles, Benjamin Cummings Publishers, 1993. 6. Raghu Ramakrishnan, Johannes Gehrke, Database Management Systems, Mcgraw Hill, Third Edition 2004. 7. Henry F Korth, Abraham Silberschatz, S. Sudharshan, Database System Concepts, Fourth Ediion, Mcgraw Hill, 2002. 8. R. Elmasri, S.B. Navathe, Fundamentals of Database Systems, Pearson Education, 2004.


UNIT I FUNDAMENTALS OF COMPUTER DESIGN AND PIPELINING 9 Fundamentals of Computer Design Measuring and reporting performance Quantitative principles of computer design. Instruction set principles Classifying ISA Design issues. Pipelining Basic concepts Hazards Implementation Multicycle operations. UNIT II INSTRUCTION LEVEL PARALLELISM WITH DYNAMIC APPROACHES 9 Concepts Dynamic Scheduling Dynamic hardware prediction Multiple issues Hardware based speculation Limitations of ILP Case studies. UNIT III INSTRUCTION LEVEL PARALLELISM WITH SOFTWARE APPROACHES 9 Compiler techniques for exposing ILP Static branch prediction VLIW Advanced compiler support Hardware support for exposing more parallelism Hardware versus software speculation mechanisms Case studies. UNIT IV MULTIPROCESSORS AND MULTICORE ARCHITECTURES 9 Symmetric and distributed shared memory architectures Performance issues Synchronizations issues Models of memory consistency Software and hardware multithreading SMT and CMP architectures Design issues Case studies. UNIT V MEMORY AND I/O 9 Cache performance Reducing cache miss penalty and miss rate Reducing hit time Main memory and performance Memory technology. Types of storage devices Buses RAID Reliability, availability and dependability I/O performance measures Designing an I/O System

TOTAL:45 REFERENCES: 1. John L. Hennessey and David A. Patterson, Computer Architecture A quantitative approach, Morgan Kaufmann / Elsevier, 4th. Edition, 2007. 2. David E. Culler, Jaswinder Pal Singh, Parallel Computing Architecture: A hardware/software approach, Morgan Kaufmann / Elsevier, 1997. 3. William Stallings, Computer Organization and Architecture Designing for Performance, Pearson Education, Seventh Edition, 2006. 4. Behrooz Parhami, Computer Architecture, Oxford University Press, 2006.

10244CS107 ADVANCED DATA STRUCTURES LAB 1. Linked lists 2. Multistacks 3. Double Ended Queue (Deques) & Circular Queues 4. Min Heap 5. Deaps 6. Leftist Heap 7. AVL Tree 8. B:Tree 9. Quick Sort 10. Greedy algorithm 11. Knapsack using Dynamic Programming 12. Graph coloring using backtracking 10244CS108 NETWORK AND DATABASE LAB 1. Socket Programming (Using Threads) a. TCP Sockets b. UDP Sockets c. Applications using Sockets (Chat/File Transfer) 2. Simulation of Routing Protocols 3. Development of applications such as DNS/ HTTP 4. Performance evaluation of transport protocols using NS2 simulator. 5. Performance evaluation of any two routing protocols using NS2 simulator. 5. Study of all SQL commands 6. Implement the concept of Normalization 7. Implement the inventory control system with a reorder level 8. Develop a package for a bank to maintain its customer details 9. Develop a package for the payroll of a company



T 0

P 0

C 3

UNIT I FUNDAMENTALS 9 Characterization of Distributed Systems Examples Resource Sharing and the Web Challenges System Models Architectural and Fundamental Models Interprocess Communication The API for the Internet Protocols External Data Representation and Marshalling ClientServer Communication Group Communication Case Study Distributed Objects and Remote Invocation Communication between Distributed Objects Remote Procedure Call Events and Notifications Java RMI Case Study. UNIT II OPERATING SYSTEM ISSUES I 9 The OS Layer Protection Processes and Threads Communication and Invocation OS Architecture Security Overview Cryptographic Algorithms Digital Signatures Cryptography Pragmatics Case Studies Distributed File Systems File Service Architecture Sun Network File System The Andrew File System. UNIT III OPERATING SYSTEM ISSUES II 9 Name Services Domain Name System Directory and Discovery Services Global Name Service X.500 Directory Service Clocks Events and Process States Synchronizing Physical Clocks Logical Time and Logical Clocks Global States Distributed Debugging Distributed Mutual Exclusion Elections Multicast Communication Related Problems. UNIT IV DISTRIBUTED TRANSACTION PROCESSING 9 Transactions Nested Transactions Locks Optimistic Concurrency Control Timestamp Ordering Comparison Flat and Nested Distributed Transactions Atomic Commit Protocols Concurrency Control in Distributed Transactions Distributed Deadlocks Transaction Recovery Overview of Replication and Distributed Multimedia Systems. UNIT V PARALLEL PROGRAMMING USING MPI 9 Parallel Architectures : Parallel Algorithm Design : Message:Passing Programming : Shared:memory Programming : Combining MPI and OpenMP : Matrix Multiplication

Total: 45 REFERENCES: 1. George Coulouris, Jean Dollimore and Tim Kindberg, Distributed Systems Concepts and Design, Pearson Education, 3rd Edition, 2002. 2. Sape Mullender, Distributed Systems, Addison Wesley, 2nd Edition, 1993. 3. Albert Fleishman, Distributed Systems Software Design and Implementation, Springer Verlag, 1994. 4. M. L .Liu, Distributed Computing Principles and Applications, Pearson Education, 2004. 11

5. Andrew S Tanenbaum, Maartenvan Steen, Distributed Systems, Principles and Pardigms, Pearson Education, 2002. 6. Mukesh Singhal, Niranjan G Shivaratri, Advanced Concepts in Operating Systems, Tata McGraw Hill Edition, 2001. 7. Michael Quinn, Parallel Programming In C With Mpi And Open Mp, Tata Mcgraw Hill, 2003



T 0

P 0

C 3


Evolution of Computing : Soft Computing Constituents From Conventional AI to Computational Intelligence : Machine Learning Basics UNIT II FUZZY LOGIC 9

Fuzzy Sets Operations on Fuzzy Sets Fuzzy Relations Membership Functions: Fuzzy Rules and Fuzzy Reasoning Fuzzy Inference Systems Fuzzy Expert Systems Fuzzy Decision Making. UNIT III NEURAL NETWORKS 9

Machine Learning Using Neural Network, Adaptive Networks Feed forward Networks Supervised Learning Neural Networks Radial Basis Function Networks : Reinforcement Learning Unsupervised Learning Neural Networks Adaptive Resonance architectures Advances in Neural networks. UNIT IV GENETIC ALGORITHMS 9

Introduction to Genetic Algorithms (GA) Applications of GA in Machine Learning : Machine Learning Approach to Knowledge Acquisition. UNIT V MATLAB 9

Introduction to Matlab Matlab Workspace Arrays and array operations Functions and Files Study of neural network toolbox and fuzzy logic toolbox Simple implementation of Artificial Neural Network and Fuzzy Logic. TOTAL : 45 REFERENCES: 1. Jyh:Shing Roger Jang, Chuen:Tsai Sun, Eiji Mizutani, Neuro:Fuzzy and Soft Computing, Prentice:Hall of India, 2003. 2. George J. Klir and Bo Yuan, Fuzzy Sets and Fuzzy Logic:Theory and Applications, Prentice Hall, 1995. 3. James A. Freeman and David M. Skapura, Neural Networks Algorithms, Applications, and Programming Techniques, Pearson Edn., 2003. 4. Melanie Mitchell, An introduction to Genetic Algorithm, Prentice:Hall of India, New Delhi, Edition: 2004 5. S.Rajasekaran and G.A Vijayalakshmi Pai,Neural Networks, Fuzzy logic and Genetic Algorithms, Synthesis and Applications, Prentice Hall of India, New Delhi:2003. 6. MATLAB Toolkit Manual



UNIT I FUNDAMENTALS Introduction Services, Mechanisms and Attacks, OSI security Architecture Classical Encryption Techniques Stegnography Block Ciphers and Data Encryption Standard Block Cipher Principles : Advanced Encryption Standard AES Cipher; Contemporary Symmetric Ciphers: Triple DES, Blowfish, RC5, Characteristics of Advanced Symmetric Block Ciphers, RC4 Stream Cipher; Confidentiality using Symmetric Encryption: Placement of Encryption Function, Traffic Confidentiality, Key Distribution, and Random Number Generation. UNIT II PUBLIC:KEY ENCRYPTION AND HASH FUNCTIONS Public Key Cryptography and RSA: Principles of Public Key Cryptosystems, RSA Algorithm; Key Management and other public key cryptosystems: Key Management, Diffie:Hellman Key Exchange, Elliptic Curve arithmetic, Elliptic Curve Cryptography; Message Authentication and Hash Functions: Authentication Requirements, Authentication Functions, Message Authentication Codes, Hash Functions and MACs; Hash Algorithms: MD5 Message Digest Algorithm; Secure Hash Algorithm, RIPEMD 160, HMAC; Digital Signatures and Authentication Protocols: Digital Signatures, Authentication Protocols, Digital Signature Standards. UNIT III NETWORK SECURITY PRACTICE Authentication Applications: Kerberos, X.509 Authentication Service; Electronic Mail Security: Pretty Good Privacy, S/MIME; IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations; Web Security: Web Security Considerations, Secure Sockets Layer and Transport Layer Security, Secure Electronic Transaction.

UNIT IV SYSTEM SECURITY Intruders: Intruder Detection, Password Management; Malicious Software: Virus and Related Threats, Virus Counter Measures; Firewalls: Firewall Design Principles, Trusted Systems. UNIT V COMPUTER PRIVACY

Privacy at Risk Privacy at Home Privacy on the NET Privacy at Work Privacy in Public Privacy in the Future. TOTAL:45 REFERENCES 1. William Stallings, Cryptography and Network Security, 3ed. Prentice Hall of India, New Delhi ,2004 2. William Stallings, Network Security Essentials, 2 ed. Prentice Hall of India, New Delhi, 2004 3. Charlie Kaufman , Network Security: Private Communication in Public World, 2 ed. Prentice Hall of India, New Delhi ,2004 4. Dan Tynan, Computer Privacy Annoyances, OReilly Media, July 2005 14

10244CS204 COMPILER DESIGN L 3 T 0 P 0 C 3

UNIT I LEXICAL ANALYSIS Compilers Analysis of Source Program : Phases of Compiler Compiler Construction Tools Role of a Lexical Analyzer Specification and Recognition of Tokens Finite Automata Regular Expression to Finite Automation. UNIT II SYNTAX ANALYSIS Role of a Parser Context Free Grammars Top:Down Parsing Bottom:Up Parsing LEX and YACC. UNIT III INTERMEDIATE CODE GENERATION Intermediate Languages Declaration Assignment Statements Boolean Expressions Flow Control Statements Back Patching. UNIT IV CODE OPTIMIZATION Code Optimization Principal Sources of Optimization Basic Blocks and Flow Graphs Optimization of Basic Blocks Code Improving Transformations. UNIT V CODE GENERATION Issues in the Design of a Code Generator Run:Time Storage Management Next Use Information A Simple Code Generator DAG Representation of Basic Blocks Peephole Optimization Code Generation from DAG. TOTAL:45 REFERENCES 1. A.V. Aho, Ravi Sethi, J. D. Ullman, Compilers : Principles, Techniques and Tools, Addison:Wesley Publishing Company, 1988. 2. Allen I. Holub, Compiler Design in C, Prentice Hall of India, 1993. 3. Fischer Leblanc, Crafting Compiler, Benjamin Cummings, Menlo Park,1988


10244CS207 COMPILER LABORATORY 1. Implementation of a Lexical Analyser 2. Computation of FIRST and FOLLOW sets 3. Construction of Predictive Parsing Table 4. Implementation of Shift Reduce Parsing 5. Computation of Leading and Trailing Sets 6. Computation of LR(0) items 7. Construction of DAG 8. Intermediate Code Generation 9. Use YACC and LEX to implement a parser for the same grammar as given in problem 10. Implement a recursive descent parser for an expression grammar that generates
arithmetic expressions with digits, + and *.

11. Use LEX tool to implement a lexical analyzer. 12. Write semantic rules to the YACC program in problem 5 and implement a calculator that takes an expression with digits, + and * and computes and prints its value. 13. Implement the front end of a compiler that generates the three address code for a simple language with: one data type integer, arithmetic operators, relational operators, variable declaration statement, one conditional construct, one iterative construct and assignment statement. 14. Implement the back end of the compiler which takes the three address code generated in problem 13, and produces the 8086 assembly language instructions that can be assembled and run using a 8086 assembler. The target assembly instructions can be simple move, add, sub, jump. Also simple addressing modes are used. Note: Use C compiler to implement 1 8 and Lex & Yacc tool for the rest.

10244CS208 SOFT COMPUTING & NETWORK SECURITY LAB 1. Implementation of any two Symmetric Key Algorithms 2. Implement RSA algorithm 3. Analyse the components of a Digital Certificate and Display it. 4. Capture and Analyze the Network traffic using Packet Analyser Tools. 5. Design and Simulate any one Arificial Neural Netwrok using MATLAB 6. Implementation of any one Real Time Problem using GA 7. Design and Simulate any one Real Time Problem using Fuzzy Based Systems. Note: Use Java / Dot NET compiler to implement 1 3 and MATLAB tool for 5 7 and Wire Shark or any tool for 4.



P 0

C 3

UNIT I CLOUD COMPUTING Understanding the Cloud Computing Cloud Architecture Cloud Storage Advantages, Disadvantages of Cloud Computing Companies in the Cloud Today Developing Cloud Services Web:Based Application Pros and Cons of Cloud Service Development Types of Cloud Service Development Software as a Service Platform as a Service Web Services On:Demand Computing Discovering Cloud Services Development Services and Tools Amazon Ec2 Google App Engine IBM Clouds UNIT II CLOUD COMPUTING FOR EVERYONE Centralizing Email Communications Collaborating on Schedules, To:Do Lists, Contact Lists and Group Projects and Events Cloud Computing for the Community and Corporation, Using Cloud Services: Collaborating on Calendars, Schedules and Task Management Exploring Online Scheduling Applications, Online Planning and Task Management Collaborating on Event Management, Contact Management, Project Management, Word Processing and Databases Storing and Sharing Files UNIT III VIRTUALIZATION & CLOUD COMPUTING * Virtualization & Cloud Computing Overview Case Study: Enterprise Virtualization & Cloud Computing Definitions Hypervisor / Virtual Machine Monitor Architecture CPU Virtualization Extensions Network and Storage Virtualization Architecture UNIT IV VIRTUALIZED ENTERPRISE * Smashing the Virtualized Stack Case Study: Owning the Virtualized Enterprise CPU & Chipsets VMM/Hypervisor/Host VMs/Guest Control & Management planes & APIs. UNIT V CLOUD SECURITY AND PRIVACY Infrastructure security Data Security and Storage Identity and access management Security management in the cloud privacy Security as a cloud service. TOTAL:45 REFERENCES 1. Michael Miller, Cloud Computing: Web:Based Applications That Change the Way You Work and Collaborate Online, Que Publishing, August 2008. 2. Christofer Hoff, Rich Mogull, Craig Balding, Hacking Exposed: Virtualization & Cloud Computing: Secrets & Solutions [Paperback], McGraw:Hill Osborne (20 Jan 2012) * 3. Haley Beard, Cloud Computing Best Practices for Managing and Measuring Processes for On:demand Computing, Applications and Data Centers in the Cloud with SLAs, Emereo Pty Limited, July 2008. 4. Tim Mather, Subra Kumaraswamy, Shahed Latif, Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance, By O'Reilly Media, 2009



UNIT I CLASSICAL PARADIGM System Concepts Project Organization Communication Project Management UNIT II PROCESS MODELS Life cycle models Unified Process Iterative and Incremental Workflow Agile Processes UNIT III ANALYSIS Requirements Elicitation Use Cases Unified Modeling Language, Tools Analysis Object Model (Domain Model) Analysis Dynamic Models Non:functional requirements Analysis Patterns UNIT IV DESIGN System Design, Architecture Design Principles : Design Patterns Dynamic Object Modeling Static Object Modeling Interface Specification Object Constraint Language UNIT V IMPLEMENTATION, DEPLOYMENT AND MAINTENANCE Mapping Design (Models) to Code Testing : Usability Deployment Configuration Management Maintenance Total: 45 REFERENCES 1. Bernd Bruegge, Alan H Dutoit, Object:Oriented Software Engineering, 2nd ed, Pearson Education, 2004. 2. Craig Larman, Applying UML and Patterns 3rd ed, Pearson Education, 2005. 3. Stephen Schach, Software Engineering 7th ed, McGraw:Hill, 2007. 4. Ivar Jacobson, Grady Booch, James Rumbaugh, The Unified Software Development Process, Pearson Education, 1999. 5. Alistair Cockburn, Agile Software Development 2nd ed, Pearson Education, 2007.



UNIT I INTRODUCTION AND QOS 9 Introduction:QOS Requirements and Constraints:Concepts:Resources: Establishment hase:Run:Time Phase:Management Architectures. UNIT II OPERATING SYSTEMS Real:Time Processing:Scheduling:Interprocess anagement:Server Architecture:Disk Management. 9 Communication:Memory and

UNIT III FILE SYSTEMS AND NETWORKS 9 Traditional and Multimedia File Systems:Caching Policy:Batching:Piggy backing thernet:Gigabit Ethernet:Token Ring:100VG AnyLAN:Fiber Distributed Data Interface (FDDI): ATM Networks:MAN:WAN. UNIT IV COMMUNICATION 9 Transport Subsystem:Protocol Support for QOS:Transport of Multimedia:Computer upported Cooperative Work:Architecture:Session Management:MBone Applications. UNIT V SYNCHRONIZATION 9 Synchronization in Multimedia Systems:Presentation:Synchronization Types:Multimedia ynchronization Methods:Case Studies:MHEG:MODE:ACME. Total: 45 REFERENCES 1. Ralf Steinmetz and Klara Nahrstedt, Multimedia Systems, Springer, I Edition 2004. 2. Ralf Steinmetz and Klara Nahrstedt, Media Coding and Content Processing, Prentice hall, 2002. 3. Vaughan Taeltimedia, Tata McGraw Hill, 1999. 4. Mark J.B., Sandra K.M., Multimedia Applications Development using DVI echnology, McGraw Hill, 1992. 5. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovacovic, D. A. Milovacovic , ultimedia Communication Systems: Techniques, Standards, and Networks, Prentice Hall, 1st Edition, 2002 6. Ze:Nian Li and Mark S. Drew, Fundamentals of Multimedia, Pearson, 2004.



UNIT I JAVA FUNDAMENTALS 9 Java Virtual Machine Reflection I/O Streaming Filter And Pipe Streams Byte Codes Byte Code : Interpretation Dynamic Reflexive Classes Threading Java Native Interfaces GUI Applications. UNIT II NETWORK PROGRAMMING IN JAVA 9 Stream Customization Sockets Secure Sockets Custom Sockets UDP Datagrams Multicast Sockets URL Classes Reading Data From The Server Writing Data Configuring The Connection Reading The Header Content Handlers Telnet Application Java Messaging Services. UNIT III DISTRIBUTED COMPUTING IN JAVA 9 Remote Method Invocation Activation Models RMI Custom Sockets Object Serialization Call Back Model RMI IIOP Implementation CORBA IDL Technology Naming Services CORBA Programming Models JAR File Creation. UNIT IV MULTI TIER APPLICATION DEVELOPMENT 9 Server Side Programming Servlets Session Management Cookies HTTP Communication JDBC Multimedia Data Handling Java Media Framework Enterprise Applications. UNIT V MOBILE APPLICATION DEVELOPMENT 9 Mobile Information Device Profile Deployment Of Mobile Objects Foundation Profile RMI Profile For Mobile Devices Development Of Midlets Mobile Networking Applications. TOTAL: 45

REFERENCES 1. Elliotte Rusty Harold, Java Network Programming, OReilly Publishers, 2000. 2. Cay S.Horstmann, Gary Cornell, Core Java, Volume 1 And 2, 5th Edition, Pearson Education Publishers, 2003. 3. Topley, J2ME In A Nutshell, OReilly Publishers, 2002. 4. Hunt, Guide to J2EE Enterprise Java, Springer Publications, 2004. 5. Ed Roman, Enterprise Java Beans, Wiley Publishers, 1998. 6. Avstin, Advance Programming For The Java2 Platform Pearson Education, 2001.



UNIT I DIGITAL IMAGE FUNDAMENTALS Elements of digital image processing systems, Elements of visual perception, psycho visual model, brightness, contrast, hue, saturation, mach band effect, Color image fundamentals :RGB,HSI models, Image acquisition and sampling, Quantization, Image file formats, Two:dimensional convolution, correlation, and frequency responses. UNIT II IMAGE TRANSFORMS 1D DFT, 2D transforms DFT, DCT, Discrete Sine, Walsh, Hadamard, Slant, Haar, KLT, SVD, Radon, and Wavelet Transform. UNIT III IMAGE ENHANCEMENT AND RESTORATION Histogram modification and specification techniques, Noise distributions, Spatial averaging, Directional Smoothing, Median, Geometric mean, Harmonic mean, Contra harmonic filters, Homomorphic filtering, Color image enhancement. Image Restoration degradation model, Unconstrained and Constrained restoration, Inverse filtering, Wiener filtering, Geometric transformations spatial transformations, Gray: Level interpolation, UNIT IV IMAGE SEGMENTATION AND RECOGNITION Edge detection. Image segmentation by region growing, region splitting and merging, edge linking, Morphological operators: dilation, erosion, opening, and closing. Image Recognition Patterns and pattern classes, matching by minimum distance classifier, Statistical Classifier. Matching by correlation, Neural network application for image recognition. UNIT V IMAGE COMPRESSION Need for image compression, Huffman, Run Length Encoding, Arithmetic coding, Vector Quantization, Block Truncation Coding. Transform Coding DCT and Wavelet. Image compression standards. Total: 45 REFERENCES: 1. Rafael C. Gonzalez, Richard E.Woods, Digital Image Processing, Pearson Education, Inc., Second Edition, 2004. 2. Anil K. Jain, Fundamentals of Digital Image Processing, Prentice Hall of India, 2002. 3. David Salomon : Data Compression The Complete Reference, Springer Verlag New York Inc., 2nd Edition, 2001 4. Rafael C. Gonzalez, Richard E.Woods, Steven Eddins, Digital Image Processing using MATLAB, Pearson Education, Inc., 2004. 5. William K.Pratt, Digital Image Processing, John Wiley, NewYork, 2002. 6. Milman Sonka, Vaclav Hlavac, Roger Boyle, Image Processing, Analysis, and Machine Vision, Brooks/Cole, Vikas Publishing House, II ed., 1999. 7. Sid Ahmed, M.A., Image Processing Theory, Algorithms and Architectures, McGrawHill, 1995. 8. Lim, J.S., Two Dimensional Signal and Image Processing, Prentice:Hall, New Jersey, 1990. 21


History System structure User perspective Operating system services Assumptions about hardware. Introduction to the Kernel : Architecture of the UNIX operating system Introduction to system concepts Kernel data structures System administration Summary and Preview. UNIT II BUFFER CACHE 9

Buffer headers Structure of the buffer pool Advantages and disadvantages of the buffer cache. Internal representation of files : Inodes Structure of a regular file Directories Conversion of a path name to an Inode Super block Other file types. UNIT III SYSTEM CALLS FOR FILE SYSTEM 9

Open Read Write File and record locking Adjusting the position of file I/O LSEEK Close File creation Creation of special files Pipes Dup Mounting and unmounting file systems UNIT IV THE STRUCTURE OF PROCESSES 9

Process states and transitions Layout of system memory The context of a process Saving the context of a process. Process Control: Process creation Signals Process termination Awaiting process termination Invoking other programs The shell System boot and the INIT process. UNIT V PROCESS SCHEDULING AND MEMORY MANAGEMENT POLICIES 9 Process Scheduling Memory Management Policies: Swapping A hybrid system with swapping and demand paging. The I/O Subsystem: Driver Interfaces Disk Drivers:Terminal Drivers. TOTAL:45 REFERENCES 1. Maurice J. Bach, The Design of the Unix Operating System, Prentice Hall of India, 2004. 2. Vahalia, Unix Internals: The New Frontiers, Pearson Education Inc, 2003.



Unit I 9 Overview of Free/Open Source Software:: Definition of FOSS & GNU, History of GNU/Linux and the Free Software Movement , Advantages of Free Software and GNU/Linux, FOSS usage , trends and potentialglobal and Indian.GNU/Linux OS installation:: detect hardware, configure disk partitions & file systems and install a GNU/Linux distribution ; Basic shell commands : logging in, listing files, editing files, copying/moving files, viewing file contents, changing file modes and permissions, process management ; User and group management, file ownerships and permissions, PAM authentication ; Introduction to common system configuration files & log files ; Configuring networking, basics of TCP/IP networking and routing, connecting to the Internet (through dialup, DSL, Ethernet, leased line). Unit II 9 Configuring additional hardware : sound cards, displays & display cards, network cards, modems, USB drives, CD writers ; Understanding the OS boot up process; Performing every day tasks using gnu/Linux :: accessing the Internet, playing music, editing documents and spreadsheets, sending and receiving email, copy files from disks and over the network, playing games, writing CDs ; X Window system configuration and utilities :: configure X windows, detect display devices ; Installing software from source code as well as using binary packages. Setting up email servers:: using postfix (SMTP services), courier (IMAP & POP3 services), squirrel mail ( web mail services) ; Setting up web servers :: using apache ( HTTP services), php (server:side scripting), perl ( CGI support) ; Setting up file services :: using samba ( file and authentication services for windows networks), using NFS ( file services for gnu/Linux / Unix networks) ; Setting up proxy services :: using squid ( http / ftp / https proxy services) ; Setting up printer services : using CUPS (print spooler), foomatic (printer database) Unit III 9 Setting up a firewall : Using netfilter and ip tables; Using the GNU Compiler Collection GNU compiler tools ; the C preprocessor (cpp), the C compiler (gcc) and the C++ compiler (g++), assembler (gas) ; Understanding build systems :: constructing make files and using make, using autoconf and autogen to automatically generate make files tailored for different development environments ; Using source code versioning and management tools :: using CVS to manage source code revisions, patch & diff. Unit IV 9 Understanding the GNU Libc libraries and linker :: linking against object archives (.a libraries) and dynamic shared object libraries (.so libraries), generating statically linked binaries and libraries, generating dynamically linked libraries ; Using the GNU debugging tools :: gdb to debug programs, graphical debuggers like ddd, memory debugging / profiling libraries mpatrol and valgrind ; Review of common programming practices and guidelines for GNU/Linux and FOSS ; Introduction to Bash, sed & awk scripting. Basics of the X Windows server architecture.


Unit V 9 Basics of the X Windows server architecture ; Qt Programming ; Gtk+ Programming ; Python Programming ; Programming GUI applications with localization support. TOTAL:45 REFERENCES: 1. N. B. Venkateshwarlu (Ed); Introduction to Linux: Installation and Programming, B S Publishers; 2005. 2. Matt Welsh, Matthias Kalle Dalheimer, Terry Dawson, and Lar Kaufman, Running Linux, Fourth Edition, O'Reilly Publishers, 2002. 3. Carla Schroder, Linux Cookbook, First Edition, O'Reilly Cookbooks Series, 2004 On:line material 1. Open Sources: Voices from the Open Source Revolution, First Edition, January 1999, ISBN: 1:56592:582:3. URL: 2. The Linux Cookbook: Tips and Techniques for Everyday Use, First Edition, Michael Stutz, 2001. URL: 3. The Linux System Administrators' Guide, Lars Wirzenius, Joanna Oja, Stephen Stafford, and Alex Weeks, December 2003. URL: 4. Using GCC, Richard Stallman et al. URL: 5. An Introduction to GCC, Brian Gough. URL: 6. GNU Autoconf, Automake and Libtool, Gary V. Vaughan, Ben Elliston, Tom Tromey and Ian Lance Taylor. URL: 7. Open Source Development with CVS, Third Edition, Karl Fogel and Moshe Bar. URL: 8. Advanced Bash Scripting Guide, Mendel Cooper, June 2005. URL: 9. GTK+/GNOME Application Development, Havoc Pennington. URL: 10. Python Tutorial, Guido van Rossum, Fred L. Drake, Jr., Editor. URL:



T 0

P 0

C 3

Unit 1 Introduction 9 Introduction to Software Project management and control Scope of Project management:Project Management Life cycle:Software Evolution and economics Software Management Process Framework:Disciplines of Software Management:Measures and Measurements Unit 2 Software Cost Estimation 10 Software Estimation Problems with estimation Decomposition Techniques : Cost estimation Process Delphi Technique SLIM: COCOMO II Function Point Analysis Estimation for Agile and Web development Activity Based Costing and Economic Value Added (EVA): Balanced Score Card Unit 3 Software Risk Management 9 Software Risks Risk management Paradigm: Risk Categories Risk Assessment : Identification Analysis : Prioritize Ranking : Control Risk Projection and Refinement FMEA Unit 4 Software Metrics 10 Need of Software metrics Software Metrics Classification Product Metrics : Size : Function Based Quality : Source Code Testing : Maintenance Process metrics Empirical Models : Statistical Models : Theory:based Models : Composite Models : Reliability Models. Unit 5 Project Management 7 Management Spectrum : People Product Process Project Client Relationship management Total : 45 Reference Books 1. McConnell, S. Software Project: Survival Guide, Microsoft Press, 1998. Royce, W. Software Project management: A Unified Framework, Addison Wesley, 1998 2. Cooper, R., The Rise of Activity:Based Costing: PartOne: What is an Activity:Based Cost System? Journal of Cost Management, Vol.2, No.2 (Summer 1988), pp.45 54 3. Roger S.Pressman., Software Engineering: A Practitioners approach, 6th edition,McGraw Hill International Edition 4. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE Software, January 1991, pp32:41 5. Fenton, N.E., and Pfleeger, S.L.. Software Metrics: A Rigorous and Practical Approach, Revised Brooks Cole, 1998 6. Tom Demarco, Controlling Software Project Management, Measurement, Prentice Hall, New Jersey 7. Demarco, T. and Lister, T. Peopleware: Productive Projects and Teams, 2nd Ed., Dorset House, 1999 25


1. INTRODUCTION 9 Role Of XML XML and The Web XML Language Basics SOAP Web Services Revolutions Of XML Service Oriented Architecture (SOA). 2. XML TECHNOLOGY 9 XML Name Spaces Structuring With Schemas and DTD Presentation Techniques Transformation XML Infrastructure. 3. SOAP 9 Overview Of SOAP HTTP XML:RPC SOAP: Protocol Message Structure Intermediaries Actors Design Patterns And Faults SOAP With Attachments. 4. WEB SERVICES 9 Overview Architecture Key Technologies : UDDI WSDL ebXML SOAP And Web Services In E:Com Overview Of .NET And J2EE. 5. XML SECURITY 9 Security Overview Canonicalization XML Security Framework XML Encryption XML Digital Signature XKMS Structure Guidelines For Signing XML Documents XML In Practice. Total: 45 REFERENCE BOOKS: 1. Frank. P. Coyle, XML, Web Services And The Data Revolution, Pearson Education, 2002. 2. Ramesh Nagappan , Robert Skoczylas and Rima Patel Sriganesh, Developing Java Web Services, Wiley Publishing Inc., 2004. 3. Sandeep Chatterjee, James Webber, Developing Enterprise Web Services, Pearson Education, 2004. 4. McGovern, et al., Java Web Services Architecture, Morgan Kaufmann Publishers, 2005.



UNIT I CLIENT / SERVER CONCEPTS 9 Client:Server File server Database server Group server Object server Web server Middleware General middleware Service specific middleware Client / server building blocks RPC Messaging Peer:to:Peer. UNIT II EJB ARCHITECTURE 9 EJB EJB architecture Overview of EJB software architecture View of EJB Conversation Building and Ddeploying EJBs Roles in EJB. UNIT III EJB APPLICATIONS 9 EJB session beans EJB entity beans EJB clients EJB deployment Building an application with EJB. UNIT IV CORBA 9 CORBA Distributed systems Purpose Exploring CORBA alternatives Architecture overview CORBA and networking Model CORBA object model IDL ORB Building an application with CORBA. UNIT V COM 9 COM Data types Interfaces Proxy and stub Marshalling Implementing Server/Client Interface pointers Object creation Invocation Destruction Comparison COM and CORBA Introduction to .NET Overview of .NET architecture Marshalling Remoting. Total: 45 REFERENCES 1. Robert Orfali, Dan Harkey and Jeri Edwards, The Essential Client/Server 2. Survival Guide, Galgotia Publications Pvt. Ltd., 2002. 3. Tom Valesky, Enterprise Java Beans, Pearson Education, 2002 4. Jason Pritchard, COM and CORBA side by side, Addison Wesley, 2000 5. Jesse Liberty, Programming C#, 2nd Edition, OReilly Press, 2002. 6. Mowbray, Inside CORBA, Pearson Education, 2002. 7. Puder, Distributed System Architecture A Middleware Approach,Elsevier, 2008.



Fundamentals of Computer Design : Measuring and Reporting Performance : Instruction Level Parallelism and Its Exploitation : Concepts and Challenges : Overcoming Data Hazards with Dynamic Scheduling Dynamic Branch Prediction : Speculation : Multiple Issue Processors Case Studies. UNIT II ADVANCED TECHNIQUES FOR EXPLOITING ILP 9

Compiler Techniques for Exposing ILP : Limitations on ILP for Realizable Processors : Hardware versus Software Speculation : Multithreading: Using ILP Support to Exploit Thread:level Parallelism : Performance and Efficiency in Advanced Multiple Issue Processors : Case Studies. UNIT III MULTIPROCESSORS 9

Symmetric and distributed shared memory architectures Cache coherence issues : Performance Issues Synchronization issues Models of Memory Consistency : Interconnection networks Buses, crossbar and multi:stage switches. UNIT IV MULTI:CORE ARCHITECTURES 9

Software and hardware multithreading SMT and CMP architectures Design issues Case studies Intel Multi:core architecture SUN CMP architecture IBM cell architecture.: hp architecture. UNIT V MEMORY HIERARCHY DESIGN 9 Introduction : Optimizations of Cache Performance : Memory Technology and Optimizations : Protection: Virtual Memory and Virtual Machines : Design of Memory Hierarchies : Case Studies. TOTAL : 45 REFERENCES 1. 2. 3. John L. Hennessey and David A. Patterson, Computer Architecture A quantitative approach, Morgan Kaufmann / Elsevier, 4th. Edition, 2007. David E. Culler, Jaswinder Pal Singh, Parallel Computing Architecture: A hardware/ software approach, Morgan Kaufmann / Elsevier, 1997. William Stallings, Computer Organization and Architecture Designing for Performance, Pearson Education, Seventh Edition, 2006.



UNIT I MOBILE DEVICE TECHNOLOGIES 9 Mobile Computing devices characteristics Adaptation Data dissemination and Management Heterogeneity Interoperability Context awareness Language localization issues User Interfacedesign issues Difference between UI design for mobile devices and conventional systems Mobile Agents : UNIT II TERMINAL SOFTWARE PLATFORM TECHNOLOGIES 9 Introduction Symbian OS: Introduction, Architecure,Applications for Symbion: Controls and compound controls: Active objects: Localization: Security on the Symbion.Palm OS, Windows CE.NET QUALCOMM, BREW, J2ME, Pocket PC UNIT III TELECOMMUNICATIONS: 9 GSM: DECTTETRA UMTS: IMT:200 Satellite Systems, CDMA and 3G: Introduction , SpreadSpectrum,Technology:IS 95:CDMA versus GSM:Wireless Data: third GenetrationNetworks, Applications on 3G.

UNIT IV LOCAL AREA AND WIDE AREA WIRELESS TECHNOLOGIES 9 IEEE 802.11 technologies Infrared technologies Bluetooth networks (OBEX Protocol) Personal Area Networks Mobility Management Mobile IP Establishing Wide area wireless networks Concept and structure of cell Call establishment and maintenance Channel management Frequency Assignment techniques. UNIT V TRANSPORT AND APPLICATION LAYER: 9 Traditional TCP: Indirect TCP: Snooping TCP: Mobile TCP: Fast retransmit/ Fast Recovery: Transmission/ Timeout Freezing Selective Retransmission: Transaction Oriented TCP, WAP Architecture Datagram Protocol: Transport Layer Security: Transaction Protocol: Session Protocol: Application Environment:Wireless Telephony Application. Total: 45 References 1. F.Adelstein, S.K.S. Gupta, Fundamentals of Mobile and Pervasive Computing Tata McGraw Hill, 2005. 2. Ashoke Talukdar and Roopa Yavagal, Mobile Computing, Tata McGraw Hill, 2005 3. Next Generation Mobile Systems : 3G and Beyond:Wiely publications 4. 3G wireless Demystified: MCGraw Hill 5. 1. J.Schiller, Mobile Communication, Addison Wesley, 2000.


10244CSE32 SOFTWARE RELIABILITY AND PROJECT MANAGEMENT L T P C 3 0 0 3 Unit 1 Introduction 7 Software Reliability Ideas of Software Reliability Ingredients of software reliability :Challenges and difficulties in Software Reliability Reliability Measurement :Computation of Software reliability Software Availability Unit 2 Software Reliability Models 10 Classes of software reliability models : General procedure for reliability modeling : Time Dependent Software Reliability Models: Time between failure reliability Models, Fault Counting Reliability Models : Time Independent Software Reliability Models: Fault injection model of Software Reliability, Input Domain Reliability Model, Orthogonal defect classification, Software availability Models Unit 3 Project Management 9 Software project management and control Activities of Project Management Project Planning Stepwise Project Planning:Project management Life cycle:Management process framework:Software Risk Management:Risk Assessment:Risk Projection and Refinement Unit 4 Metrics and Estimation 10 Software Metrics:Classification : Product Metrics : Function Based, Quality Metrics, Halsteds Metrics Process metrics : Empirical Models : Statistical Models and Reliability Models Software Estimation Issues Cost estimation method COCOMO II: Software Project Schedule Unit 5 Team Management 9 Management Spectrum Client Relationship management : Organizational Behaviour : Selecting The RightPerson For The Job Motivation Hackman Job Characteristics Model Working In Groups Becoming A Team Decision Making Leadership organizational Structures Stress Health And Safety Case Studies. Total : 45 References 1. Hoang Pham, Software Reliability, Springer Verlag, New York. 2. John D. Musa, Software Reliability Engineered Testing, Mc. Graw Hill, New York. 3. Bob Hughes, Mikecotterell, Software Project Management, Third Edition, Tata McGraw Hill, 2004 4. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE Software, January 1991, pp32:41 5. Doron Reled, Software Reliability Methods, Springer Verlag, New York 6. R. Ramakumar, Reliability Engineering: Fundamentals and Applications, Prentice Hall, New Delhi 7. McConnell, S. Software Project: Survival Guide, Microsoft Press, 1998. Royce, W. Software Project management: A Unified Framework, Addison Wesley, 1998 8. Roger S.Pressman., Software Engineering: A Practitioners approach, 6th edition,McGraw Hill International Edition 30

10244CSE33 E:COMMERCE L 3 T 0 P 0 C 3

UNIT I INTRODUCTION 9 Infrastructure for Electronic Commerce : Networks : Packet Switched Networks : TCP/IP Internet protocol : Domain name Services : Web Service Protocols : Internet applications : Utility programs Markup Languages : Web Clients and Servers : Intranets and Extranets : Virtual private Network. UNIT II CORE TECHNOLOGY 9 Electronic Commerce Models : Shopping Cart Technology : Data Mining : Intelligent Agents Internet Marketing : XML and E:Commerce UNIT III ELECTRONIC PAYMENT SYSTEMS 9 Real world Payment Systems : Electronic Funds Transfer : Digital Payment :Internet Payment Systems Micro Payments : Credit Card Transactions : Case Studies. UNIT IV SECURITY 9 Threats to Network Security : Public Key Cryptography : Secured Sockets Layer : Secure Electronic Transaction : Network Security Solutions : Firewalls. UNIT V INTER/INTRA ORGANIZATIONS ELECTRONIC COMMERCE 9 EDI : EDI application in business : legal, Security and Privacy issues : EDI and Electronic commerce : Standards : Internal Information Systems : Macro forces : Internal commerce : Workflow Automation and Coordination : Customization and Internal commerce : Supply chain Management. TOTAL: 45 REFERENCES 1. Ravi Kalakota and Andrew B Whinston , Frontiers of Electronic commerce, Addison Wesley, 1996 2. Pete Loshin, Paul A Murphy , Electronic Commerce, 2nd Edition , Jaico Publishers,1996. 3. Joseph P T , S J,E:Commerce : An Indian Perspective, second edtion, Prentice Hall of India.2006. 4. David Whiteley, e : Commerce : Strategy, Technologies and Applications : McGraw Hill,2000


10244CSE34 REAL TIME SYSTEMS. L 3 T 0 P 0 C 3

UNIT I INTRODUCTION 9 Introduction : Issues in Real Time Computing, Structure of a Real Time System. Task Classes, Performance Measures for Real Time Systems, Estimating Program Run times. Task Assignment and Scheduling : Classical Uniprocessor scheduling algorithms, UniProcessor scheduling of IRIS Tasks, Task Assignment, Mode Changes, and Fault Tolerant Scheduling. UNIT II PROGRAMMING LANGUAGES AND TOOLS 9 Programming Language and Tools Desired Language characteristics, Data Typing, Control structures, Facilitating Hierarchical Decomposition, Packages, Run:time (Exception) Error handling, Overloading and Generics, Multitasking, Low Level programming, Task scheduling, Timing Specifications, Programming Environments, Run:time Support. UNIT III REAL TIME DATABASES 9 Real time Databases : Basic Definition, Real time Vs General Purpose Databases, Main Memory Databases, Transaction priorities, Transaction Aborts, Concurrency Control Issues, Disk Scheduling Algorithms, Two:phase Approach to improve Predictability, Maintaining Serialization Consistency, Databases for Hard Real Time systems. UNIT IV COMMUNICATION 9 Real:Time Communication : Communications Media, Network Topologies Protocols, Fault Tolerant Routing. Fault Tolerance Techniques : Fault Types, Fault Detection. Fault Error containment Redundancy, Data Diversity, Reversal Checks, Integrated Failure handling. UNIT V EVALUATION TECHNIQUES 9 Reliability Evaluation Techniques : Obtaining Parameter Values, Reliability Models for Hardware Redundancy, Software Error models. Clock Synchronization : Clock, A Nonfault:Tolerant Synchronization Algorithm, Impact of Faults, Fault Tolerant Synchronization in Hardware, Fault Tolerant Synchronization in Software. TOTAL : 45 REFERENCES: 1. C.M. Krishna, Kang G. Shin, Real:Time Systems, McGraw:Hill International Editions, 1997. 2. Stuart Bennett, Real Time Computer Control:An Introduction,Second edition, Prentice Hall PTR, 1994. 3. Peter D. Lawrence, Real time Micro Computer System Design An Introduction, McGraw Hill, 1988. 4. S.T. Allworth and R.N. Zobel, Introduction to real time software design, Macmillan, II Edition, 1987. 5. R.J.A Buhur, D.L. Bailey, An Introduction to Real:Time Systems, Prentice:Hall International, 1999. 6. Philip.A.Laplante Real Time System Design and Analysis PHI , III Edition, April 2004. 32

10244CSE35 NETWORK SYSTEM DESIGN USING NETWORK PROCESSOR L T P C 3 0 0 3 UNIT I INTRODUCTION : PROTOCOLS AND PACKET FORMATS Network systems and the Internet, Applications, packet processing, protocols and layering, layer 1 and 2, layer 3, layer 4, protocol port numbers and de:multiplexing, Encapsulation and transmission. UNIT II PACKET PROCESSING Introduction, packet buffer allocation, packet buffer size and copying, protocol layering and copying, Heterogeneity and network byte order, IP datagram fragmentation and reassembly, IP forwarding algorithm UNIT III TCP ALGORITHM TCP connection recognition algorithm, TCP splicing algorithm, Functions Address lookup and packet forwarding, error detection and correction, Fragmentation, segmentation and reassembly, frame and protocol de:multiplexing, packet classification, queuing and packet discard, Scheduling and timing, Authentication and privacy, traffic measurement and policing , traffic shaping, timer management. UNIT IV NETWORK PROCESSORS: Introduction, motivation for embedded processors, RISC Vs CISC, need for custom silicon, definition of NP, flexibility through programmability, instruction set, scalability with parallelism and pipelining, cause and benefits of NP, NP functionality, packet processing functions, Ingress and Egress processing, Parallel and distributed architecture, architectural roles of NP, NP architectures Introduction, architectural variety, primary architectural characteristics, Architecture, packet flow and clock rates, software architecture, assigning functionality to the process hierarchy, issues in scaling an NP. UNIT V IXP2XXX Introduction, IXP2xxx Architecture, Micro engines, Programming Models, Packet processing in a single thread, Advanced programming, Applications: Switches, Routers, Firewall, and Active Networks. Total:45 REFERENCES: 1. Douglas E.Comer, Network Systems Design using Network Processors, Intel IXP version,, Pearson Education. March 2003 2. Erik J. Johnson and Aaron Kunze, IXP 2400/2800 Programming, Intel Press, April 2003 3. Uday R. Naik and Prashant R. Chandra, Designing High Performance Networking Applications Essential Insights for Developers of IXP2XXX Network Processor Based Systems, Intel Press, November 2004 4. Donald F. Hooper, Using IXP2400/2800 Development Tools A Hands on Approach to Network Processor Software Design, Intel Press, August 2004 5. Patrick Crowley, Peter Z. Onufryk, Mark A. Franklin, Haldun Hadimioglu, Network Processors 2002: Design Principles and Practices, Vol 1, Morgan Kaufmann Publications, September 2002.


6. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk Network Processor Design: Issues and Practices, Vol 2, Academic Press, December 2003. 7. Panos C. Lekkas, Network Processors: Architectures, Protocols and Platforms (Telecom Engineering), McGraw Hill, July 2003



UNIT I EMBEDDED COMPUTING 9 Challenges of Embedded Systems Embedded system design process. Embedded processors ARM processor Architecture, ARM and Thumb Instruction sets UNIT II EMBEDDED C PROGRAMMING 9 C:looping structures Register allocation Function calls Pointer aliasing structure arrangement bit fields unaligned data and endianness inline functions and inline assembly portability issues. UNIT III OPTIMIZING ASSEMBLY CODE 9 Profiling and cycle counting instruction scheduling Register allocation conditional execution looping constructs bit manipulation efficient switches optimized primitives. UNIT IV PROCESSES AND OPERATING SYSTEMS 9 Multiple tasks and processes Context switching Scheduling policies Interprocess communication mechanisms Exception and interrupt handling : Performance issues. UNIT V EMBEDDED SYSTEM DEVELOPMENT 9 Meeting real time constraints Multi:state systems and function sequences. Embedded software development tools Emulators and debuggers. Design methodologies Case studies Complete design of example embedded systems. TOTAL : 45 REFERENCES 1. Andrew N Sloss, D. Symes, C. Wright, ARM System Developers Guide, Morgan Kaufmann / Elsevier, 2006. 2. Michael J. Pont, Embedded C, Pearson Education, 2007. 3. Wayne Wolf, Computers as Components: Principles of Embedded Computer System Design, Morgan Kaufmann / Elsevier, 2nd. edition, 2008. 4. Steve Heath, Embedded System Design, Elsevier, 2nd. edition, 2003.



UNIT I QUEUEING MODELS 9 Poisson Process Markovian Queues Single and Multi:server Models Littles formula Machine Interference Model Steady State analysis Self Service Queue. UNIT II ADVANCED QUEUEING MODELS 9 Non: Markovian Queues Pollaczek Khintchine Formula Queues in Series Open Queueing Networks Closed Queueing networks. UNIT III SIMULATION 9 Discrete Even Simulation Monte Carlo Simulation Stochastic Simulation Applications to Queueing systems. UNIT IV LINEAR PROGRAMMING 9 Formulation Graphical solution Simplex method Two phase method : Transportation and Assignment Problems. UNIT V NON:LINEAR PROGRAMMING 9 Lagrange multipliers Equality constraints Inequality constraints Kuhn : Tucker conditions Quadratic Programming. L: 45 REFERENCES: 1. Winston.W.L. Operations Research, Fourth Edition, Thomson Brooks/Cole, 2003. 2. Taha, H.A. Operations Research: An Introduction, Ninth Edition, Pearson Education Edition, Asia, New Delhi, 2002. 3. Robertazzi. T.G. Computer Networks and Systems Queuing Theory and Performance 4. Evaluation, Third Edition, Springer, 2002 Reprint. 5. Ross. S.M., Probability Models for Computer Science, Academic Press, 2002.


10244CSE43 ADHOC NETWORKS L 3 T 0 P 0 C 3

Unit 1. INTRODUCTION Introduction:Fundamentals of Wireless Communication Technology The Electromagnetic Spectrum : Radio Propagation Mechanisms : Characteristics of the Wireless Channel : IEEE 802.11a,b Standard Origin Of Ad hoc: Packet Radio Networks : Technical Challenges : Architecture of PRNETs : Components of Packet Radios Ad hoc Wireless Networks :What Is an Ad Hoc Network? Heterogeneity in Mobile Devices : Wireless Sensor Networks : Traffic Profiles : Types of Ad hoc Mobile Communications : Types of Mobile Host Movements : Challenges Facing Ad Hoc Mobile Networks:Ad hoc wireless Internet Unit 2. AD HOC ROUTING PROTOCOLS Introduction : Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks : Classifications of Routing Protocols :Table:Driven Routing Protocols Destination Sequenced Distance Vector : Wireless Routing Protocol : Cluster Switch Gateway Routing : Source:Initiated On:Demand Approaches : Ad Hoc On: Demand Distance Vector Routing : Dynamic Source Routing : Temporally Ordered Routing Algorithm : Signal Stability Routing : Location:Aided Routing : Power:Aware Routing : Zone Routing Protocol. Unit 3. MULTICAST ROUTING IN AD HOC NETWORKS Introduction : Issues in Designing a Multicast Routing Protocol : Operation of Multicast Routing Protocols : An Architecture Reference Model for Multicast Routing Protocols : Classifications of Multicast Routing Protocols : Tree:Based Multicast Routing Protocols: Bandwidth Efficient Multicast Routing Protocol, Multicast Routing based on Zone Routing, Associatively Based Ad Hoc Multicast Routing, Weight Based Multicast Protocol, Multicast Ad Hoc On Demand Distance Vector Routing Protocol, Ad Hoc Multicast Routing Protocol, Adaptive Shared Tree Multicast Routing Protocol :Mesh:Based Multicast Routing Protocols : Energy:Efficient Multicasting : Multicasting with Quality of Service Guarantees : Application:Dependent Multicast Routing . Unit 4. TRANSPORT LAYER, SECURITY PROTOCOLS Introduction : Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks : Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks :Classification of Transport Layer Solutions : TCP Over Ad Hoc Wireless Networks : Other Transport Layer Protocols for Ad Hoc Wireless Networks : Security in Ad Hoc Wireless Networks : Network Security Requirements : Issues and Challenges in Security Provisioning : Network Security Attacks : Key Management : Secure Routing in Ad Hoc Wireless Networks Unit 5. QoS AND ENERGY MANAGEMENT Introduction : Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks :Classifications of QoS Solutions : MAC Layer Solutions: Cluster TDMA, IEEE 802.11e : Network Layer Solutions: Ticket Based QoS Routing Protocol, Predictive Location Based QoS Routing Protocol, Bandwidth Routing Protocol, On Demand Link State Multipath QoS Routing Protocol : QoS Frameworks for Ad Hoc Wireless Networks: QoS Models, QoS Resource Reservation Signaling, INSIGNIA,SWAN: Energy Management in Ad Hoc Wireless Networks Introduction : Need for Energy Management in Ad Hoc Wireless Networks : Classification of Energy Management Schemes : Battery Management Schemes : Transmission Power Management Schemes : System Power Management Schemes 37

TOTAL:45 REFERENCE BOOKS: 1. C. Siva Ram Murthy and B.S. Manoj Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall PTR,2004 2. C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall PTR, 2001 3. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000


10244CSE44 BIO INFORMATICS L 3 T 0 P 0 C 3

1. INTRODUCTION 7 The Central Dogma Killer Application Parallel Universes Watsons Definition : Top Down Vs Bottom Up Approach Information Flow Conversance:Communications. 2. DATABASE AND NETWORKS 9 Definition Data Management Data Life Cycle Database Technology Interfaces Implementation Networks: Communication Models Transmission Technology Protocols Bandwidth Topology Contents Security Ownership Implementation. 3. SEARCH ENGINES AND DATA VISUALIZATION 10 Search Process Technologies Searching And Information Theory Computational Methods Knowledge Management Sequence Visualizations Structure Visualizations User Interfaces Animation Vs Simulation 4. STATISTICS, DATA MINING AND PATTERN MATCHING 11 Statistical Concepts Micro Arrays Imperfect Data Basics Quantifying Randomness Data Analysis Tools Selection Alignment Clustering Classification Data Mining Methods Technology Infrastructure Pattern Recognition Discovery Machine Learning Text Mining Pattern Matching Fundamentals Dot Matrix Analysis Substitution Matrix Dynamic Programming Word Method Bayesian Method Multiple Sequence Alignment Tools. 5. MODELING SIMULATION AND COLLABORATION 8 Drug Discovery Fundamentals Protein Structure System Biology Tools Collaboration And Communication Standards Issues Case Study. Total: 45 REFERENCE BOOKS: 1. Bryan Bergeron, Bio Informatics Computing, Prentice Hall, 2003. 2. T.K. Affward, D.J. Parry Smith, Introduction to Bio Informatics, Pearson Education, 2001. 3. Pierre Baldi, Soren Brunak, Bio Informatics The Machine Learning Approach, 2nd Edition, First East West Press, 2003



Unit I. INTRODUCTION 9 Medium Access Control : Motivation for Specialized MAC: SDMA: FDMA: TDMACDMA: Comparison of Access mechanisms Tele communications : GSM: DECTTETRA UMTS: IMT:200 Satellite Systems: Basics: Routing: Localization: Handover: Broadcast Systems: Overview Cyclic Repetition of Data: Digital Audio Broadcasting Digital Video Broadcasting Unit II. WIRELESS NETWORKS 9 Wireless LAN: Infrared Vs Radio Transmission Infrastructure Networks: Ad hoc Networks: IEEE 802.11 HIPERLAN Bluetooth: Wireless ATM: Working Group: Services: Reference Model Functions Radio Access Layer Handover: Location Management: Addressing Mobile Quality of Service: Access Point Control Protocol Unit III. MOBILE NETWORK LAYER 9 Mobile IP : Goals Assumptions and Requirement Entities IP packet Delivery: Agent Advertisement and Discovery Registration Tunneling and Encapsulation Optimization Reverse Tunneling IPv6 DHCP: Ad hoc Networks , Mobile Transport Layer, Application Layer Unit IV. MOBILE TRANSPORT LAYER 9 Traditional TCP: Indirect TCP: Snooping TCP: Mobile TCP: Fast retransmit/ Fast Recovery: Transmission/ Timeout Freezing Selective Retransmission: Transaction Oriented TCP Unit V. WAP 9 Architecture Datagram Protocol: Transport Layer Security: Transaction Protocol: Session Protocol: Application Environment:Wireless Telephony Application TOTAL:45 REFERENCE BOOKS 1. J.Schiller, Mobile Communication, Addison Wesley, 2000. 2. William Stallings, Wireless Communication and Networks, Pearson Education, 2003. 3. Singhal, WAP:Wireless Application Protocol, Pearson Education, 2003 4. Lother Merk, Martin. S. Nicklaus and Thomas Stober, Principles of Mobile Computing, Second Edition, Springer, 2003. 5. William C.Y.Lee, Mobile Communication Design Fundamentals, John Wiley, 1993.


10244CSE46 : SEMANTIC WEB L 3 T 0 P 0 C 3

1. INTRODUCTION 8 History Semantic Web Layers Semantic Web technologies Semantics in Semantic Web XML: Structuring Namespaces Addressing Querying Processing 2. RDF 10 RDF and Semantic Web Basic Ideas : RDF Specification RDF Syntax: XML and Non: XML : RDF elements RDF relationship: Reification, Container, and collaboration RDF Schema Editing, Parsing, and Browsing RDF/XML:RQL:RDQL 3. ONTOLOGY 10 Why Ontology Ontology movement OWL OWL Specification : OWL Elements OWL constructs: Simple and Complex Ontology Engineering : Introduction Constructing ontologies Reusing ontologies On:To:Knowledge Semantic Web architecture 4. LOGIC AND INFERENCE 9 Logic Description Logics : Rules Monotonic Rules: Syntax, Semantics and examples Non:Monotonic Rules Motivation, Syntax, and Examples Rule Markup in XML: Monotonic Rules, and Non:Monotonic Rules 5. APPLICATIONS OF SEMANTIC WEB TECHNOLOGIES 8 RDF Uses: Commercial and Non:Commercial use Sample Ontology e:Learning Web Services Web mining Horizontal information Data Integration Future of Semantic Web TOTAL: 45 REFERENCES 1. Grigorous Antoniou and Van Hermelen : A Semantic Web Primer:The MIT Press 2004 2. Spinning the Semantic Web: Bringing the world wide web to its full potential The MIT Press 2004 3. Shelley Powers Practical RDF Oreilly publishers First Indian Reprint : 2003



UNIT I DATA WAREHOUSING 9 Data Warehousing and Business Analysis : Data warehousing Components Building a Data warehouse Mapping the Data Warehouse to a Multiprocessor Architecture DBMS Schemas for Decision Support Online Analytical Processing (OLAP) OLAP and Multidimensional Data Analysis. UNIT II DATAMINING : PREPROCESSING AND ASSOCIATION RULE MINING 9 Data Mining : Data Mining Functionalities Data Preprocessing Data Cleaning Data Integration and Transformation Data Reduction Data Discretization and Concept Hierarchy Generation. Association Rule Mining : Efficient and Scalable Frequent Item set Mining Methods Mining Various Kinds of Association Rules. UNIT III CLASSIFICATION AND PREDICTION 9 Classification and Prediction : Issues Regarding Classification and Prediction Classification by Decision Tree Introduction Bayesian Classification Rule Based Classification Classification by Back propagation Support Vector Machines Associative Classification Other Classification Methods Prediction Accuracy and Error Measures Evaluating the Accuracy of a Classifier or Predictor UNIT IV CLUSTERING 9 Cluster Analysis : Types of Data in Cluster Analysis A Categorization of Major Clustering Methods Partitioning Methods Hierarchical methods Density:Based Methods Grid:Based Methods Model:Based Clustering Methods Clustering High:Dimensional Data Constraint: Based Cluster Analysis Outlier Analysis. UNIT V RECENT TRENDS 9 Mining Object, Spatial, Multimedia, Text and Web Data: Multidimensional Analysis and Descriptive Mining of Complex Data Objects Spatial Data Mining Multimedia Data Mining Text Mining Mining the World Wide Web. Total : 45 REFERENCES 1. Jiawei Han and Micheline Kamber Data Mining Concepts and Techniques Second Edition, Elsevier, Reprinted 2008. 2. Alex Berson and Stephen J. Smith Data Warehousing, Data Mining & OLAP, Tata McGraw Hill Edition, Tenth Reprint 2007. 3. K.P. Soman, Shyam Diwakar and V. Ajay Insight into Data mining Theory and Practice, Easter Economy Edition, Prentice Hall of India, 2006. 4. G. K. Gupta Introduction to Data Mining with Case Studies, Easter Economy Edition, Prentice Hall of India, 2006. 5. Pang:Ning Tan, Michael Steinbach and Vipin Kumar Introduction to Data Mining, Pearson Education, 2007. 42

10244CSE52 AGENT BASED INTELLIGENT SYSTEMS L T P C 3 0 0 3 UNIT I INTRODUCTION 9 Definitions : Foundations : History : Intelligent Agents:Problem Solving:Searching : Heuristics : Constraint Satisfaction Problems : Game playing. UNIT II KNOWLEDGE REPRESENTATION AND REASONING 9 Logical Agents:First order logic:First Order Inference:Unification:Chaining: Resolution Strategies:Knowledge Representation:Objects:Actions:Events UNIT III PLANNING AGENTS 9 Planning Problem:State Space Search:Partial Order Planning:Graphs:Nondeterministic Domains:Conditional Planning:Continuous Planning:MultiAgent Planning. UNIT IV AGENTS AND UNCERTAINITY 9 Acting under uncertainty Probability Notation:Bayes Rule and use Bayesian Networks:Other Approaches:Time and Uncertainty:Temporal Models: Utility Theory : Decision Network Complex Decisions. UNIT V HIGHER LEVEL AGENTS 9 Knowledge in Learning:Relevance Information:Statistical Learning Methods:Reinforcement Learning:Communication:Formal Grammar:Augmented Grammars: Future of AI. Total: 45 REFERENCES: 1. Stuart Russell and Peter Norvig, Artificial Intelligence : A Modern Approach, 2nd Edition, Prentice Hall, 2002 2. Michael Wooldridge, An Introduction to Multi Agent System, John Wiley, 2002. 3. Patrick Henry Winston, Artificial Intelligence, III Edition, AW, 1999. 4. Nils.J.Nilsson, Principles of Artificial Intelligence, Narosa Publishing House, 1992.



UNIT I HIGH SPEED NETWORKS 9 Frame Relay Networks Asynchronous transfer mode ATM Protocol Architecture, ATM logical Connection, ATM Cell ATM Service Categories AAL. High Speed LANs: Fast Ethernet, Gigabit Ethernet, Fibre Channel Wireless LANs. UNIT II CONGESTION AND TRAFFIC MANAGEMENT 9 Queuing Analysis: Queuing Models Single Server Queues Effects of Congestion Congestion Control Traffic Management Congestion Control in Packet Switching Networks Frame Relay Congestion Control. UNIT III TCP AND ATM CONGESTION CONTROL 9 TCP Flow control TCP Congestion Control Retransmission Timer Management Exponential RTO backoff KARNs Algorithm Window management Performance of TCP over ATM. Traffic and Congestion control in ATM Requirements Attributes Traffic Management Frame work, Traffic Control ABR traffic Management ABR rate control, RM cell formats, ABR Capacity allocations GFR traffic management. UNIT IV INTEGRATED AND DIFFERENTIATED SERVICES 9 Integrated Services Architecture Approach, Components, Services: Queuing Discipline, FQ, PS, BRFQ, GPS, WFQ Random Early Detection, Differentiated Services. UNIT V PROTOCOLS FOR QOS SUPPORT 9 RSVP Goals & Characteristics, Data Flow, RSVP operations, Protocol Mechanisms Multiprotocol Label Switching Operations, Label Stacking, Protocol details RTP Protocol Architecture, Data Transfer Protocol, RTCP. L:45 T:15 Total:60 REFERENCES 1. William Stallings, High Speed Networks and Internet, Second Edition, Pearson Education, 2002. 2. Warland, Pravin Varaiya, High Performance Communication Networks, Second Edition, Jean Harcourt Asia Pvt. Ltd., 2001. 3. Irvan Pepelnjk, Jim Guichard, Jeff Apcar, MPLS and VPN Architecture, Cisco Press, Volume 1 and 2, 2003.



UNIT:I INTRODUCTION Introduction : DSS definition: characteristics: History of DSS: Components of DSS: Data and Model Management:DSS knowledge base: user interfaces: DSS user: categories and classes of DSSs: Decision and Decision Makers : Decision Makers: Decision styles: Decision effectiveness: Hardness of Decisions UNIT:II DECISION MAKING Typology of Decisions: Decision theory: Rational Decision Making: Bounded Rationality:Process of choice Cognitive processes:Heuristics in Decision Making: Effectiveness and efficiency: Decisions in the Organization: Understanding the Organization: Organization culture: power and politics: organization Decision making UNIT:III DECISION PROCESSES Modeling Decision Processes: Problem definition and its structure decision models: types of probability and its forecasting techniques: sensitivity analysis: Group Decision Support : Group Decision making: the problem with groups: concepts and definition of MDM technology MDM activities: virtual workplace:Executive Information system(EIS):history of EIS:characteristics of executives: EIS components:making EIS workfuture of executive Decision making and EIS. UNIT:IV SYSTEM PERSPECTIVE OF DSS Perspective of DSS: System DSS in the context of information system: Information quality issues in DSS design: DSS information system architecture: role of Internet in DSS development and use: Designing and Building DSS: Strategies of DSS Analysis and Design: DSS Developer:tools for DSS development: DSS user Interface Issues UNIT:V IMPLEMENTATION OF DSS Implementing DSS: DSS Implementation: Patterns of Implementation: System Evaluation:Importance of Integration:Creativity Decision making: Definition of creativity: occurrence of creativity: creative problem solving techniques:introduction to intelligent DSS (AI, Expert system and Knowledge based systems) DSS in the 21st century:future of DSS, EIS and DSS technologies REFERENCES 1. George M .Marakas, "Decision Support Systems", 2nd Edition, Pearson Education, 2005. 2. Efraim Turban, Jay E.Aronson, Ting:Peng Liang, "Decision Support Systems and Intelligent Systems", 7th Edition, Pearson Education, 2006.


10244CSE55 FAULT TOLERANT SYSTEMS L 3 T 0 P 0 C 3 UNIT I Fundamental Concepts Definitions of fault tolerance, fault classification, fault tolerant attributes and system structure. Fault:Tolerant Design Techniques: Information redundancy, hardware redundancy, and time redundancy. UNIT II Dependability Evaluation Techniques Reliability and availability models: (Combinatorial techniques, Fault:Tree models, Markov models), Performability Models. Architecture of Fault:Tolerant Computers (case study): General:purpose systems, high:availability systems, long:life systems, critical systems. UNIT III Software Fault Tolerance Software faults and their manifestation, design techniques, reliability models. UNIT IV Fault Tolerant Parallel/Distributed Architectures Shared bus and shared memory architectures, fault tolerant networks. UNIT V Recent topics in fault tolerant systems Security, fault tolerance in wireless/mobile networks and Internet. TOTAL:45 REFERENCES 1. Fault:Tolerant Computer System Design D.K. Pradhan, 2003 2. Design and Analysis of Fault:Tolerant Digital Systems, B.W.Johnson, Addison:Wesley, 1989 3. Fault:Tolerant Computing, Theory and Techniques, Volumes I and II , D.K. Pradhan, Prentice Hall, 1986 4. Reliable Computer Systems: Design and Evaluation, D.P.Siewiorek and R.S.Swartz, Digital Press, 1992 5. Probability and Statistics with Reliability, Queueing and Computer Science Application, K.S.Trivedi, Prentice Hall, 1982


10244CSE56 GRID COMPUTING L 3 T 0 P 0 C 3

1. GRID COMPUTING INITIATIVES Introduction : Definition : Scope of grid computing Grid Computing Organizations and their roles Grid Computing analog Grid Computing road map. 2. GRID COMPUTING APPLICATIONS AND TECHNOLOGIES Merging the Grid services Architecture with the Web Services Architecture OGSA Sample use cases OGSA platform components OGSI OGSA Basic Services. 3. GRID COMPUTING TOOL KITS The Globus Toolkit 4 GT4 Java WS core: state full webservice Singleton, Multiple Resources Life Cycle Management Persistent Resources GT4 Security: GSI The security Descriptor Authentication Authorization Resource level security. 4. GLOBUS TOOL KIT Installing the Globus Toolkit 4 WSDL Primer Command Line Clients Examples. 5. CASE STUDY Case Study: GridSim: Installing the simulator examples Alchemi Toolkit: Owner, Manager and Executor cluster Prime number generation example. (Web References) TOTAL:45 REFERENCE BOOKS: 1. Joshy Joseph & Craig Fellenstein, Grid Computing, PHI, PTR:2003. 2. Borja Sotomayor & Lisa Childers, Globus Toolkit 4: Programming Java Services, Morgan Kaufmann, 2006 3. Ahmar Abbas, Grid Computing: A Practical Guide to technology and Applications, Charles River media 2003.



UNIT I INTRODUCTION Over view of sensor networks: Constraints and challenges Advantages of sensor networks: Applications: Collaborative processing Key definitions in sensor networks Tracking scenario Problem formulation Distributed representation and interference of states Tracking multiple objects sensor models: Performance comparison and metrics. UNIT II NETWORKING SENSORS Key assumption : Medium access control S:MAC protocol IEEE 802.15.4 standard and ZigBee : General Issues : Geographic, Energy Aware Routing : Attribute based routing. UNIT III INFRASTRUCTURE ESTABLISHMENT Topology control Clustering :Time Synchronization Localization Task driven sensing Role of sensor nodes Information based tasking : Routing and aggregation. UNIT IV SENSOR NETWORK DATABASE Sensor Database Challenges Querying the physical environment Interfaces In:network aggregation Data centric storage Data indices and range queries Distributed Hierarchical aggregation Temporal data. UNIT V SENSOR NETWOR PLATFORMS AND TOOLS Sensor Node Hardware Sensor network programming challenges Node level software platforms Operating system TinyOS Node level simulators State centric programming Applications and future directions. Total: 45 REFERENCE: 1. Feng Zhao, Leonidas Guibas, Wireless sensor networks an information processing approach, Mogan kanufmann publishers, 2004