Professional Documents
Culture Documents
Linux Programming1
Linux Programming1
level interfaces (principally, system calls and library functions) that are required to build system-level,
multi-threaded, and network applications on Linux and UNIX systems.
Course Content
Module 01
Introduction, Features of Linux, Linux Utilities-File handling utilities, File permissions, Process
utilities, Disk utilities, Networking commands, Filters, Text processing utilities and Backup
utilities, sed – scripts, operation, addresses, commands, applications, awk – execution, fields and
records, scripts, operation, patterns, actions, functions, using system commands in awk.
Module 02
Introduction, shell responsibilities, pipes and input Redirection, output redirection, running a shell
script, the shell as a programming language control structures, arithmetic in shell, shell script
examples, interrupt processing, functions and debugging shell scripts.
Module 03
File Concept, File System Structure, Inodes, File Attributes, File types, Library functions,the
standard I-O and formatted I-O in C, stream errors, kernel support for files, System calls, File
structure related system calls(File APIs), file and record locking, file and directory management –
Directory file APIs, Symbolic links & hard links and Process concept.
o Unit 3 - Files
Module 04
Differences between threads and processes, Thread structure and uses, Creating Threads, Thread
Attributes, Thread Synchronization with semaphores and with Mutexes, Example programs.
Sockets: Introduction to Sockets,example-client/server programs
1. Internet of Things
The Internet of things describes physical objects that are embedded with sensors, processing ability,
software, and other technologies that connect and exchange data with other devices and systems over the
Internet or other communications networks.
Course Content
Module 01
Module I and IV - Introduction to IoT and Domain Specific IoTs
Definition and Characteristics, Physical Design of IoT, Logical Design of IoT, IoT Enabling
Technologies.M2M and IoT: Introduction to M2M, Difference between IoT and M2M, SDN and
NFV for IoT. IoT Protocols: IEEE 802.15.4, BACNet Protocol, Modbus, KNX, Zigbee
Architecture, 6LoWPAN and RPL. Domain Specific IoTs- Home Automation, Cities,
Environment, Energy, Retail, Logistics, Agriculture, Industry, Health and Lifestyle, Virtual
Reality Internet Advertising, Intelligent Transportation Systems, Health Information System:
Genomics Driven Wellness Tracking and Management System (Go-WELL).
Module 02
IoT Platforms Design Methodology, Python packages of Interest for IoT, IoT Physical Devices
and Endpoints. IoT and Cloud: IoT Physical Servers and Cloud Offerings, IoT Tools: Chef and
Puppet.
Module 03
Big Data Platforms for the IoT, Hadoop Map Reduce for Batch Data Analysis, Apache Oozie
Workflows for IoT Data Analysis, In-Memory Analytics using Apache Spark, Apache Storm for
Real Time Data Analysis, Sustainability Data and Analytics in Cloud based M2M Systems, Fog
Computing: A Platform for IoT and Analytics.
Module 04
Syllabus
Syllabus
o Syllabus
Internet of things
’
Till
76 to 88 page from book
114 to 137
140-176
178-196
198-251
254 -351
336-412
414-484
1. Cloud Computing
Cloud computing is the on-demand availability of computer system resources, especially data storage
(cloud storage) and computing power, without direct active management by the user. Large clouds often
have functions distributed over multiple locations, each location being a data center. Cloud computing
relies on sharing of resources to achieve coherence[clarification needed] and economies of scale, typically
using a "pay-as-you-go" model which can help in reducing capital expenses but may also lead to
unexpected operating expenses for unaware users.
Course Content
Module 01
Module I - Basics of Cloud Computing, Cloud Models and Virtualization
Introduction: Cloud models-Evolution of Cloud Computing –System Models for Distributed and Cloud
Computing – NIST Cloud Computing Reference Architecture – On-demand Provisioning – Elasticity in
Cloud – deployment models – service models-cloud service providers. Virtualization: Basics of
Virtualization- Types of Virtualization- Implementation Levels of Virtualization, Virtualization Structures
- Tools and Mechanisms – resource sharing and resource pooling Desktop Virtualization – Server
Virtualization.
e-Content (Quadrant 02)
Unit 1 - Introduction
Unit 2 - Cloud Models
Unit 3 - Virtualization
Unit 4 - Other Concepts of Virtualization
Module 02
Module II - Cloud Infrastructure, Service Oriented Architecture and Inter Cloud Resource
Management
Cloud Infrastructure: Architectural Design of Compute and Storage Clouds – Layered Cloud Architecture
Development – Design Challenges - Inter Cloud Resource Management – Resource Provisioning and
Platform Deployment – Global Exchange of Cloud Resources.
Module 03
Module III - Cloud Programming Model, Programming Support and Security in the Cloud
Programming Model: Parallel and Distributed Programming Paradigms – Map Reduce,Twister and
Iterative Map Reduce – Hadoop Library from Apache – Mapping Applications -Programming Support.
Security in the Cloud: Security Overview – Cloud Security Challenges – Access control mechanisms –
Security Governance – Risk Management – Security Monitoring – Security Architecture Design – Virtual
Machine Security.
e-Content (Quadrant 02)
Module 04
Module IV - Cloud Based High Performance Computing
Module 05
Module V - Setting Up Own Cloud
Building an open source based private cloud, Automated Provisioning, Custom Images, Integration Tool-
Nagio, Integration of Cloud.
e-Content (Quadrant 02)
Module 06
Syllabus
Syllabus
Syllabus
Cryptography, or cryptology (from Ancient Greek: κρυπτό ς, romanized: kryptós "hidden, secret"; and
γρά φειν graphein, "to write", or -λογία -logia, "study", respectively, is the practice and study of
techniques for secure communication in the presence of adversarial behavior. More generally,
cryptography is about constructing and analyzing protocols that prevent third parties or the public from
reading private messages; various aspects in information security such as data confidentiality, data
integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography
exists at the intersection of the disciplines of mathematics, computer science, electrical engineering,
communication science, and physics. Applications of cryptography include electronic commerce, chip-
based payment cards, digital currencies, computer passwords, and military communications. Network
security consists of the policies, processes and practices adopted to prevent, detect and monitor
unauthorized access, misuse, modification, or denial of a computer network and network-accessible
resources.Network security involves the authorization of access to data in a network, which is controlled
by the network administrator. Users choose or are assigned an ID and password or other authenticating
information that allows them access to information and programs within their authority. Network security
covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting
transactions and communications among businesses, government agencies and individuals.
Course Content
Module 01
Module I - Introduction
o Unit 1 - Introduction
o Unit 2 - Classical Encryption Techniques
Module 02
Block cipher principles; DES-Algorithm, strengths and weaknesses of DES, attacks on DES and
defense, multiple encryptions; Asymmetric ciphers-Essential mathematics, public key
cryptography.
Module 03
RSA, Diffie Hellman key exchange, random number generation, Data integrity and authentication
Hash functions; MAC and Digital signatures.
Module 04
Key management; Authentication, Web and system security, Web security; IP security; E-mail
security; System security-intruders, malicious software and firewalls.
e-Content (Quadrant 02)
Module 05
Syllabus
Syllabus
o Syllabus