You are on page 1of 33

Linux Programming course provides a deep understanding of the operating system architecture and low-

level interfaces (principally, system calls and library functions) that are required to build system-level,
multi-threaded, and network applications on Linux and UNIX systems.

Course Content
 Module 01

Module I- Introduction to Linux

Introduction, Features of Linux, Linux Utilities-File handling utilities, File permissions, Process
utilities, Disk utilities, Networking commands, Filters, Text processing utilities and Backup
utilities, sed – scripts, operation, addresses, commands, applications, awk – execution, fields and
records, scripts, operation, patterns, actions, functions, using system commands in awk.

e-Tutorial (Quadrant 01)

o Introduction, Features of Linux and Linux Utilities - Session 1


o Introduction, Features of Linux and Linux Utilities - Session 2
o Introduction, Features of Linux and Linux Utilities - Session 3
o Introduction, Features of Linux and Linux Utilities - Session 4
o Introduction, Features of Linux and Linux Utilities - Session 5
o Introduction, Features of Linux and Linux Utilities - Session 6
o Introduction, Features of Linux and Linux Utilities - Session 7
o Introduction, Features of Linux and Linux Utilities - Session 8
o Introduction, Features of Linux and Linux Utilities - Session 9
o Introduction, Features of Linux and Linux Utilities - Session 10
o Introduction, Features of Linux and Linux Utilities - Session 11
o Introduction, Features of Linux and Linux Utilities - Session 12
o Introduction, Features of Linux and Linux Utilities - Session 13
o Introduction, Features of Linux and Linux Utilities - Session 14
o Introduction, Features of Linux and Linux Utilities - Session 15
o Introduction, Features of Linux and Linux Utilities - Session 16
o Introduction, Features of Linux and Linux Utilities - Session 17
o Introduction, Features of Linux and Linux Utilities - Session 18

Web Resources (Quadrant 03)


o Unit 1 - Introduction, Features of Linux and Linux Utilities

 Module 02

Module II- Working with the Bourne shell(bash)

Introduction, shell responsibilities, pipes and input Redirection, output redirection, running a shell
script, the shell as a programming language control structures, arithmetic in shell, shell script
examples, interrupt processing, functions and debugging shell scripts.

e-Tutorial (Quadrant 01)

o Working with the Bourne Shell - Session 1


o Working with the Bourne Shell - Session 2
o Working with the Bourne Shell - Session 3
o Working with the Bourne Shell - Session 4
o Working with the Bourne Shell - Session 5
o Working with the Bourne Shell - Session 6
o Working with the Bourne Shell - Session 7
o Working with the Bourne Shell - Session 8
o Working with the Bourne Shell - Session 9

Web Resources (Quadrant 03)

o Unit 2 - Working with the Bourne Shell

 Module 03

Module III- File I-O

File Concept, File System Structure, Inodes, File Attributes, File types, Library functions,the
standard I-O and formatted I-O in C, stream errors, kernel support for files, System calls, File
structure related system calls(File APIs), file and record locking, file and directory management –
Directory file APIs, Symbolic links & hard links and Process concept.

e-Tutorial (Quadrant 01)


o Files - Session 1
o Files - Session 2
o Files - Session 3

Web Resources (Quadrant 03)

o Unit 3 - Files

 Module 04

Module IV- Multi-threaded Programming

Differences between threads and processes, Thread structure and uses, Creating Threads, Thread
Attributes, Thread Synchronization with semaphores and with Mutexes, Example programs.
Sockets: Introduction to Sockets,example-client/server programs

e-Tutorial (Quadrant 01)

o Multi-Threaded Programming - Session 1


o Multi-Threaded Programming - Session 2
o Multi-Threaded Programming - Session 3
o Multi-Threaded Programming - Session 4
o Multi-Threaded Programming - Session 5

Web Resources (Quadrant 03)

o Unit 4 - Multi-Threaded Programming

1. Internet of Things

The Internet of things describes physical objects that are embedded with sensors, processing ability,
software, and other technologies that connect and exchange data with other devices and systems over the
Internet or other communications networks.

Course Content
 Module 01
Module I and IV - Introduction to IoT and Domain Specific IoTs

Definition and Characteristics, Physical Design of IoT, Logical Design of IoT, IoT Enabling
Technologies.M2M and IoT: Introduction to M2M, Difference between IoT and M2M, SDN and
NFV for IoT. IoT Protocols: IEEE 802.15.4, BACNet Protocol, Modbus, KNX, Zigbee
Architecture, 6LoWPAN and RPL. Domain Specific IoTs- Home Automation, Cities,
Environment, Energy, Retail, Logistics, Agriculture, Industry, Health and Lifestyle, Virtual
Reality Internet Advertising, Intelligent Transportation Systems, Health Information System:
Genomics Driven Wellness Tracking and Management System (Go-WELL).

e-Content (Quadrant 02)

o Unit 1 - Introduction to Internet of Things


o Unit 4 - IoT System Management
o Unit 2 - Domain Specific - Internet of Things
o Unit 3 - IoT and M2M

 Module 02

Module II - Developing Internet of Things

IoT Platforms Design Methodology, Python packages of Interest for IoT, IoT Physical Devices
and Endpoints. IoT and Cloud: IoT Physical Servers and Cloud Offerings, IoT Tools: Chef and
Puppet.

e-Content (Quadrant 02)

o Unit 5 - IoT Platform


o Unit 6 - IoT System
o Unit 7 - IoT Physical Devices
o Unit 8 - IoT Phsyical Servers

 Module 03

Module III -Data Analytics for IoT

Big Data Platforms for the IoT, Hadoop Map Reduce for Batch Data Analysis, Apache Oozie
Workflows for IoT Data Analysis, In-Memory Analytics using Apache Spark, Apache Storm for
Real Time Data Analysis, Sustainability Data and Analytics in Cloud based M2M Systems, Fog
Computing: A Platform for IoT and Analytics.

e-Content (Quadrant 02)

o Unit 9 - Case Studies of IoT Design


o Unit 10 - Data Analytics for IoT
o Unit 11 - Tools for IoT

 Module 04

Syllabus

Syllabus

Web Resources (Quadrant 03)

o Syllabus
Internet of things

Till
76 to 88 page from book
114 to 137

140-176
178-196
198-251
254 -351
336-412
414-484

1. Cloud Computing

Cloud computing is the on-demand availability of computer system resources, especially data storage
(cloud storage) and computing power, without direct active management by the user. Large clouds often
have functions distributed over multiple locations, each location being a data center. Cloud computing
relies on sharing of resources to achieve coherence[clarification needed] and economies of scale, typically
using a "pay-as-you-go" model which can help in reducing capital expenses but may also lead to
unexpected operating expenses for unaware users.

Course Content


Module 01
Module I - Basics of Cloud Computing, Cloud Models and Virtualization

Introduction: Cloud models-Evolution of Cloud Computing –System Models for Distributed and Cloud
Computing – NIST Cloud Computing Reference Architecture – On-demand Provisioning – Elasticity in
Cloud – deployment models – service models-cloud service providers. Virtualization: Basics of
Virtualization- Types of Virtualization- Implementation Levels of Virtualization, Virtualization Structures
- Tools and Mechanisms – resource sharing and resource pooling Desktop Virtualization – Server
Virtualization.
e-Content (Quadrant 02)

 Unit 1 - Introduction
 Unit 2 - Cloud Models
 Unit 3 - Virtualization
 Unit 4 - Other Concepts of Virtualization

 Module 02
Module II - Cloud Infrastructure, Service Oriented Architecture and Inter Cloud Resource
Management

Cloud Infrastructure: Architectural Design of Compute and Storage Clouds – Layered Cloud Architecture
Development – Design Challenges - Inter Cloud Resource Management – Resource Provisioning and
Platform Deployment – Global Exchange of Cloud Resources.

e-Content (Quadrant 02)

 Unit 5 - Cloud Infrastructure


 Unit 6 - Service Oriented Infrastructure
 Unit 7 - Inter - Cloud Resource Management
 Unit 8 - Cloud Programming Model

 Module 03
Module III - Cloud Programming Model, Programming Support and Security in the Cloud

Programming Model: Parallel and Distributed Programming Paradigms – Map Reduce,Twister and
Iterative Map Reduce – Hadoop Library from Apache – Mapping Applications -Programming Support.
Security in the Cloud: Security Overview – Cloud Security Challenges – Access control mechanisms –
Security Governance – Risk Management – Security Monitoring – Security Architecture Design – Virtual
Machine Security.
e-Content (Quadrant 02)

 Unit 9- Cloud Programming Report


 Unit 10 - Security in the Cloud
 Unit 11 - Security Monitoring
 Unit 12 - High Performance Computing

 Module 04
Module IV - Cloud Based High Performance Computing

Enterprise Cloud-Based High Performance Computing : Overview of High Performance Computing on


Cloud-Enterprises HPC applications - HPC Cloud vendor solutions: compute grids , data grids (Oracle
coherence, IBM Object grid, Cassendra, HBase, Memcached, HP Chardware, Setting up own cloud: Cloud
setup-How to build private cloud using open source tools- Understanding various cloud plugins- Setting up
your own cloud environment - Auto provisioning- Custom images-Integrating tools like Nagio-Integration
of Public and Private cloud.

e-Content (Quadrant 02)

 Unit 13 - Enterprise HPC on the Clouds


 Unit 14 - HPC Applications
 Unit 15 - Other HPC Applications

 Module 05
Module V - Setting Up Own Cloud

Building an open source based private cloud, Automated Provisioning, Custom Images, Integration Tool-
Nagio, Integration of Cloud.
e-Content (Quadrant 02)

 Unit 16 - Cloud Set Up

 Module 06
Syllabus

Syllabus

Web Resources (Quadrant 03)

 Syllabus

1. Cryptography and Network Security

Cryptography, or cryptology (from Ancient Greek: κρυπτό ς, romanized: kryptós "hidden, secret"; and
γρά φειν graphein, "to write", or -λογία -logia, "study", respectively, is the practice and study of
techniques for secure communication in the presence of adversarial behavior. More generally,
cryptography is about constructing and analyzing protocols that prevent third parties or the public from
reading private messages; various aspects in information security such as data confidentiality, data
integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography
exists at the intersection of the disciplines of mathematics, computer science, electrical engineering,
communication science, and physics. Applications of cryptography include electronic commerce, chip-
based payment cards, digital currencies, computer passwords, and military communications. Network
security consists of the policies, processes and practices adopted to prevent, detect and monitor
unauthorized access, misuse, modification, or denial of a computer network and network-accessible
resources.Network security involves the authorization of access to data in a network, which is controlled
by the network administrator. Users choose or are assigned an ID and password or other authenticating
information that allows them access to information and programs within their authority. Network security
covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting
transactions and communications among businesses, government agencies and individuals.

Course Content
 Module 01

Module I - Introduction

Introduction-computer security concepts, attacks, security services, security mechanisms;


Classical encryption techniques-symmetric cipher models, substitution techniques, transposition
techniques and rotor machines.

e-Content (Quadrant 02)

o Unit 1 - Introduction
o Unit 2 - Classical Encryption Techniques

 Module 02

Module II - Symmetric Ciphers

Block cipher principles; DES-Algorithm, strengths and weaknesses of DES, attacks on DES and
defense, multiple encryptions; Asymmetric ciphers-Essential mathematics, public key
cryptography.

e-Content (Quadrant 02)


o Unit 3 - Block Ciphers and the Data Encryption Standard
o Unit 4 - Basic Concept in Number Theory and Finate Funds
o Unit 5 - Advanced Encryption Standard
o Unit 6 - Block Cipher Operation
o Unit 7 - Pseudorandom Number Generation and Stream Ciphers
o Unit 8 - Introduction to Number Theory
o Unit 9 - Public Key Cryptogrpahy and RSA

 Module 03

Module III - Cryptographic Functions and Digital Signatures

RSA, Diffie Hellman key exchange, random number generation, Data integrity and authentication
Hash functions; MAC and Digital signatures.

e-Content (Quadrant 02)

o Unit 10 - Other Public Key Cryptosystems


o Unit 11 - Cryptographic Hash Functions
o Unit 12 - Message Authentication Codes
o Unit 13 - Digital Signatures

 Module 04

Module IV - Key Management

Key management; Authentication, Web and system security, Web security; IP security; E-mail
security; System security-intruders, malicious software and firewalls.
e-Content (Quadrant 02)

o Unit 14 - Key Management System


o Unit 15 - User Authentication
o Unit 16 - Transport Level Security
o Unit 17 - Wireless Network Security
o Unit 18 - Electronic Mail Security
o Unit 19 - IP Security
o Unit 20 - Intruders
o Unit 21 - Malicious Software
o Unit 22 - Firewalls
o Unit 23 - Legal and Ethical Aspects

 Module 05

Syllabus

Syllabus

Web Resources (Quadrant 03)

o Syllabus

Advanced Data Structures And Indexing


Advanced Database Management System

You might also like