Sei sulla pagina 1di 21

DATABASE MANAGEMENT SYSTEMS

Course Contents:

Model I: Introduction to DBMS


Introduction to DBMS, Architecture of DBMS, Components of DBMS, Traditional data Models (Network,
Hierarchical and Relational), Database Users, Database Languages, Schemas and Instances, Data Independence

Module II: Data Modeling


Entity sets attributes and keys, Relationships (ER), Database modeling using entity, Weak and Strong entity
types, Enhanced entity-relationship (EER), Entity Relationship Diagram Design of an E-R Database schema,
Object modeling, Specialization and generalization

Module III: Relational Database Model


Basic Definitions, Properties of Relational Model, Keys, Constraints, Integrity rules, Relational Algebra,
Relational Calculus.

Module IV: Relational Database Design


Functional Dependencies, Normalization, Normal forms (1st, 2nd, 3rd,BCNF), Lossless decomposition, Join
dependencies, 4th & 5th Normal form.

Module V: Query Language


SQL Components (DDL, DML, DCL), SQL Constructs (Selectfromwhere. group by. having. order
by), Nested tables, Views, correlated query, Objects in Oracle.

Module VI: PL/SQL


Introduction, Basic block, Structure of PL/SQL program, Control Statements, Exception handling, Cursor
Concept, Procedure, functions and triggers.

Module VII: Database Security and Authorization


Basic security issues, Discretionary access control, Mandatory access control, Statistical database security.

Module VIII: Transaction Management and Concurrency Control Techniques


Transaction concept, ACID properties, Schedules and recoverability, Serial and Non-serial schedules,
Serializability, Concurrency Techniques: Locking Protocols, Timestamping Protocol, Multiversion Technique,
Deadlock Concept - detection and resolution.

Module IX: Backup and Recovery


Database recovery techniques based on immediate and deferred update, ARIES recovery algorithm, Shadow
pages and Write-ahead Logging

Text & References:


Text:
Fundamental of Database Systems, Elmasri & Navathe, Pearson Education, Asia
Data Base Management System, Leon & Leon, Vikas Publications
Database System Concepts, Korth & Sudarshan, TMH

References:
Introduction to Database Systems, Bipin C Desai, Galgotia
SOFTWARE ENGINEERING
Course Objective:
Students in this course should be able to explain and apply a broad range of concepts from software engineering, spanning
all aspects the software engineering process. They should be able to recognize, define, and make correct use of generally
accepted software engineering terminology.

Course Contents:
Module I: Introduction
Evolution of Software Engineering, Software Problems, Issues Involved In Software Engineering, Fundamental Qualities
of a Software Product, Approaches to Software Engineering, Planning the development Process

Module II: Software Life Cycle Models


Development/Product Life-Cycle Model, Kinds of Software Life-Cycle Model Project Management Concepts, Project
Management Activities

Module III: Software Requirement Specification


Requirement Engineering, Requirement elicitation, Requirement analysis, requirement documentation, Case Study.

Module IV: Software Project Planning


Size Estimation, Cost Estimation, Models, COCOMO, COCOMO II, Putnam Resource allocation model, Software Risk
Management.

Module V: Software Design


Software Designing Principles Various Strategies, Module Level Concepts, Structured Design Methodologies

Module VI: Software Metrics


Software Metrics, Token Count, Data Structure Metrics, Information Flow Metrics and Metrics analysis.

Module VII: Software Reliability


Basic Concepts, Software quality, software reliability models, Capability maturity models, ISO 9000.

Module VIII: Software Testing


Testing Process, Some terminology, Functional Testing, Structural Testing, Levels of Testing, Debugging and Testing
Tools.

Module IX: Software Maintenance


Maintenance Process, Maintenance Model, Estimation of maintenance cost, Regression Testing, Reverse Engineering,
Software Re-engineering, Configuration Management and Documetation.

Text & References:


Text:
Software Engineering, A Practitioner's Approach, Roger S. Pressman,
Software Engineering, K.K. Agarwal, Yogesh Singh, New Age International Publishers
An Integrated Approach to Software Engineering, Pankaj Jalote, Narosa Publication

References:
Software Engineering Concepts, Richard Fairley
BASIC MATHEMATICS

Course Objective:
This course is aimed to solve standard topical text book-level problems by analytical means. Apply multiple concepts in
the solution of a more sophisticated problem, which may be derived from a scientific application or from basic
application. Model a topical problem from math, solve the problem, and report the results in the original problem context.

Course Contents:

Module I: Set Theory


Sets, Types of Sets, Basic Operations on Sets, Venn diagram, Cartesian product of two sets, Distributive law, De
Morgans Law

Module II: Mathematical Logic


Basic Concepts, Propositions or Statements, Truth Table, Connectives and Compound Propositions, Implication, Bi-
conditional of Connectives, Converse, Inverse and Contra positive of an Implication, Tautology, Logical Equivalence,
Switching Circuits

Module III: Modern Algebra


Binary Operations, Properties of Binary Operations, Semi group, Monoid, Group, Subgroups and other Groups

Module IV: Graph Theory


Graph, Multi Graph, Complete Graph, Bi Graph, Degree, Degree Sequence

Module V: Data Analysis


Data and Statistical Data, Frequency Distribution, Graphical Representation, Measure of the Central Tendency, Measure
of Dispersion

Text & References:

Text:
Business Mathematics, Sancheti & Kapoor, S.Chand & Sons

References:
Discrete Mathematical Structure, Kolman, Busby and Ross, PHI
OPERATING SYSTEM AND DATA STORAGE
Course Objective:
This course is aimed at providing the basic knowledge of the concepts involved in designing and working of an operating
system, how it acts as a resource manager of the system as a whole, how various issues such as Memory conflicts,
resource conflicts are resolved by an operating system and a study of various types of operating systems.

Course Contents:

Module I: Introduction
What is an Operating System, Types of Operating Systems, Simple Batch Systems, Multiprogramming Systems, Time-
Sharing Systems, Parallel Systems, Distributed Systems, Real-time Systems

Module II: Operating System Structures


System Components, System Calls, System Programs, System Structure, Virtual Machines

Module III: Processes Management


Process Concept, Process Scheduling, Operation on processes, Cooperating Processes, Interprocess Communication, Back
ground process,

Module IV: CPU Scheduling

Basic Concepts, Scheduling Criteria, Scheduling Algorithms, Multi-Processor Scheduling, Real-Time Scheduling,
Algorithm Examination System Models, Methods for Handling Deadlocks, Deadlock Prevention, Deadlock Avoidance,
Deadlock Detection, Deadlock Recovery

Module V: Memory Management


Memory Management, Address Space, Memory Allocation Techniques, Swapping, Paging Segmentation with paging,
Virtual Memory, Demand Paging, Performance of Demand Paging, Page Replacement, Thrashing, Demand Segmentation

Module VI: File System Interface


File Concept, Access Methods, Directory Structure, Protection, File System Structure, and Allocation Methods.

Module VII: The Unix System Case Study


History, Design Principle, Programmer Interface, User Interface, Process Management, Memory Managements, File
management, Interprocess Communication.

Module VIII: Data Storage


Disks, organization disks, capacity & space, organizing tracks by sectors, clusters, Extents, fragmentation, organism
tracks by block. Magnetic tapes, number of tracks/character set used. Storage by Data warehousing. OLAP DSS (decision
support system). Characteristics of data warehouses. Date modeling for data warehouses, two dimensional matrix models.
Three dimensional data cube method, Roll up operation, Drill down operation. Acquisition of data for warehouse, typical
functionality of data warehouse. Problems and open issues in data warehouses.

Text & References:


Text:
Operating Systems Concepts, Silberschatz Galvin, Fifth Edition Addition Wesley Publication.
Modern Operating Systems, A S Tanenbaum, Prentice Hall of India New Delhi, 1995.

References:
Design of UNIX Operating System, Maurice J. Bauch, Prentice Hall of India.
Operating Systems Design, Peterson & Galvin
Semester
2
SYSTEM STRUCTURE ANALYSIS AND DESIGN

Course Code- MSI 201


Course Objective:
This course addresses both what is required of an Information System and how this can be achieved. Studying
the practices, processes, activities and technologies involved in the development of an Information system
provide an excellent insight to develop skills for employment & professional life. Students are involved in
activities ranging from the front-end of requirements analysis and system design to the development of User
Interfaces and testing & maintenance of software. The course equips the student to carve a niche in the growing
portfolio of Information systems careers or go in for higher studies

Course Contents:
Module I: System Concepts and the Information Systems Environment
What is System?, Important System Characteristic, Business Systems, Business, Information Systems,
Categories of Information Systems, Transaction, Processing System, MIS, DSS, and Scope of Information
system.
The Role of System Analyst: Overview of System Analysis and Design, Multifaceted role of System analyst:
Analytical Skill, Technical Skills, and Interpersonal Skills.

Module II
System Development Life Cycle: The System Development Life Cycle, Structured Analysis Development
Method, Systems Prototype Method. System planning and Initial Investigation: System Planning: Information
System Committee Method, User Group Committee Method, Initial Investigation,Feasibility Study:
Operational, Technical and Economical Feasibility Cost Benefit Analysis: Data Analysis, Cost Benefit
Analysis, The system proposal.

Module III

Determining System Requirements: Performing Requirements Determination, Traditional Method, Modern'


Methods, Radical Methods. The Tools of Structured Analysis: Process Modeling: DFD, Logical Modeling:
Structured English, Decision Trees, and Data Modeling: ER Diagram

Module IV
Process and Stages of System Design: The process of design: logical design, physical design, Structured
Design, Functional Decomposition, and Structured Walkthrough. Input/Output and Forms Design: Input design,
output design, forms design, types of forms, layout considerations and forms control.

Module V
File organization and Database Design: File structure, file organization, -objectives of database, data structure,
normalization, the role of database administrator. Automated Tools for Systems Development: CASE Tools

Text & References:

P-analysis & Design of Information Systems James A. Senn


Modern System Analysis & Design: Jeffery A. Hoffer, Joey F. George, Joseph S. Valacich
Elements of System Analysis & Design: Elias Awad.
Object Oriented Programming
Course code: MSI 202

Course Objective:
C++ is one of the most widely used programming languages for solving problems. The objective of this course
is to provide object oriented programming fundamentals using C++. Topics to be covered include fundamentals
of syntax & semantics of C++, Loops & decisions, functions, classes and structures and features of classes such
as overloading and inheritance, files, streams, pointers etc.

Course Content
Module-1 Overview of C++
What is Object Oriented Programming, Characteristics of OOP, Basics:- A Simple C++ Program, Compiling a
Simple C++ Program, How C++ Compilation Works, Variables, Simple Input/Output, Comments, Memory,
Integer Numbers, Real Numbers, Characters, Strings, Names

Module-2 Expressions, Functions, Loops and decisions


Expressions, Arithmetic Operators, Relational Operators, Logical Operators, Bitwise Operators,
Increment/Decrement Operators, Assignment Operator, Conditional Operator, Comma Operator, The sizeof
Operator, Operator Precedence, Simple Type Conversion,
Statements: Simple and Compound Statements, if, switch, while, do, for, continue, break, goto , return
Statements
Functions: A Simple Function, Parameters and Arguments, Global and Local Scope, Scope Operator, Auto
Variables, Register Variables, Static Variables and Functions, Extern Variables and Functions, Symbolic
Constants, Enumerations, Runtime Stack, Inline Functions, Recursion, Default Arguments, Variable Number of
Arguments, Command Line Arguments.

Module-3 Arrays, Classes, Pointers and References


Arrays, Multidimensional Arrays, Pointers, Dynamic Memory, Pointer Arithmetic, Function Pointers,
References, Typedefs
Classes: -A Simple Class, Inline Member Functions, Constructors, Destructors, Friends, Default Arguments,
Implicit Member Argument, Scope Operator, Member Initialization List, Constant Members, Static Members,
Member Pointers, References Members, Class Object Members, Object Arrays, Class Scope, Structures and
Unions, Bit Fields

Module-4 Operator Overloading and Inheritance


Function Overloading, Operator Overloading, Type Conversion, Overloading unary operator, Overloading
binary operator, data conversion, Inheritance:-Derived Classes, A Simple Derived Class, Class Hierarchy
Notation, Constructors and Destructors, Protected Class Members, Private, Public, and Protected Base Classes,
Virtual Functions, Multiple Inheritance, Ambiguity, and Class Object Members, Virtual Base Classes

Module- 5 Templates
Function Template Definition, Function Template Instantiation, Class Template Definition, Class Template
Instantiation, Nontype Parameters, Class Template Specialization, Class Template Members, Class Template
Friends, Derived Class Templates
Module-6 Files, Streams and Exception Handling
Exception Handling, Flow Control, Throw Clause, Try Block and Catch Clauses, Function Throw List
IO Library, Role of streambuf, stream Output with ostream, Stream Input with istream, Using the ios Class,
Stream Manipulators, File IO with fstreams, Array IO with strstreams, Preprocessor, Preprocessor Directives,
Macro Definition, Quote and Concatenation Operators, File Inclusion, Conditional Compilation, Other
Directives, Predefined Identifiers.

Text and References:-


Text:-
Object Oriented Programming in Turbo C++, E Balaguruswamy, Tata McGrahill
References:-
Object Oriented Programming with C++, Robert Lafore
The Complete Reference C++, Herbert Schildt
C++ Programming, Yashwant Karnitkar
SOFTWARE QUALITY ASSURANCE

Course Code:- MSI 203

Course Objective:
Quality is the essence of life. Information Technology by virtue of its various products, broadly software and
hardware, is enabling quality in various aspects. It thus becomes more imperative that the software, which is
actually becoming life line of any organization, adheres to certain quality norms. The students must understand
the various aspects of quality, tools to implement quality in software development and monitoring the same.

Course Contents:
Module I: Quality Concepts and Practices
Why Quality?, Cost of Quality, TQM concept, Quality Pioneers Approaches to Quality.

Module II: Software Quality


Software Development Process, S/w quality Attributes (Product Specific and Qrganization Specific,
Hierarchical Models of quality. Concept of Quality Assurance and Quality Control

Module III: Software Quality Assurance


Implementing an IT Quality function, Content of SQA Plan, Quality Tools, Quality baselines, Model and
assessment fundamentals, Internal Auditing and Quality assurance.

Module IV: Software Quality Control


Testing Concepts - ad hoc, white box, black box and integration, Cost Effectiveness of Software Testing
credibility & ROI, right methods, Developing Testing Methodologies- Acquire and study the test strategy,
building the system test plan and unit plan , Verification and Validation methods, Software Change Control-
SCM, change control procedure, Defect Management causes, detection, removal and tracking,

Module V: Metrics and Measurement of Software Quality


Measuring Quality, measurement concepts- Standard unit of measure, software metrics, Metrics Bucket,
Problems with Metrics, Objective and subjective measurement, measure of central tendency, attributes of good
measurement, Installing measurement program, Risk Management- defining, characterizing risk, managing risk,
software risk management

Module VI: Quality Standards


Introduction to various Quality standards: ISO-9000 Series, Six Sigma, SEI CMMi Model.
Networking Fundamentals
Course Code: -MSI 204
Module-1 : living in a Network Centric World
Networks supporting the way we live, Examples of todays popular communication tools, Communication,
Network as platform, The Elements of Network, Converged network, The Architecture of Internet, Trends in
Networking.

Module-II : Communicating over the Network


Introduction, LANs, WANs and Internet works, Network Addressing

Module-III : Application Layer-Introduction, making provision for applications and services, Application
layer protocols and services.
OSO transport Layers-Introduction, The TCP protocol-communicating with reliability, Managing TCP
sessions, The UDP protocol communicating with low overheads.
OSI Network layers-Introduction, Networks-dividing host into groups, Routing-How our data packets are
handled, Routing process.
OSI Physical layers- Introduction, The Physical Layer-Communication Signals, Physical Signaling and
Encoding, Representing Bits, Physical Media-Connecting Communication.
Data Link Layer-Introduction, Data Link Layer-Accessing the media. Media Access Control Techniques,
Media Access Control Addressing and Framing Data.

Module-IV : Addressing the Network Ipv4


Introduction, Address for different purpose, Assigning address, Calculating address, testing the Network layer.

Module-V : Ethernet, Planning and Cabling Network


Overview of Ethernet, Ethernet-Communication through the LAN, The Ethernet Frame, Ethernet Media Access
Control, Ethernet Physical Layer, Hubs and Switches, Address Resolution Protocol (APR)
Introduction, LANs-Making the Physical connections, Device Selection Factors, Device Interconnecting,
Developing an Addressing Scheme, Calculating the subnets, Device Interconnections.

Module-VI : Configuring and Testing Networks


Configuring CISCO devices-IOS basics, applying a Basic Configuration using CISCO IOS, Verifying
Connectivity, Monitoring and Documenting of Networks.

Module VII : Access controls & Network Security


Functions of an access control mechanism-Identification, Authentication, Three classes of authentication
information, Enhancing the security of the computer system, Action Privileges. Access Control Policies-
Discretionary Access Control, Mandatory Access Control. Implementing an Access Control Mechanism-Open
Environment, Closed Environment. Approaches to authorization-Mandatory Access Control Policy,
Discretionary Access Control Policy, Ticket Oriented Approach, List Oriented Approach.

Module VIII: Networking Security


Networking Management. SNMP Simple Networking Management Protocol, Managed Nodes, Management
Station, Management Information, A Management Protocol. Network Security-Passive threats, Active threats.
Levels of security-Physical security, Access controls, Security in log-in, Firewall, Proxy server. Encryption-
Basic concepts, Transposition Ciphers. Other methods of encryption-Secret key, Public key Cryptography. Fast
cryptography. Certificate authority. Enterprise authentication using digital certificates.
Semester
3
LAN SWITCHING AND WIRELESS
Course Objective:
The goal of LAN Switching and Wireless course is to introduce you to develop an understanding of how switches are
interconnected and configured to provide network access to LAN users. This course also teaches how to integrate wireless
devices into a LAN.

Course Contents:

Module I: LAN Design


Switched LAN Architecture, Principles of Hierarchical Network Design, Matching Switches to Specific LAN Function

Module II: Basic Switch Concepts and Configuration


Introduction to Ethernet/ 802.3 LAN, Forward Frame Using a Switch, Switch Management Configuration, Configuring
Switch Security,

Module III: VLANs


Introducing VLAN, VLAN Trunking, Configuring VLAN and Trunks, Trouble Shooting VLANs and Trunks

Module IV: VTP


VTP Concept, VTP Operation, Configure VTP

Module V: STP
Redundant Layer 2 Topology, Introduction to STP, STP Convergence, PVSTP+, RSTP and Paired PVSTP+

Module VI: Inter-VLAN Routing


Inter- VLAN Routing, Configuring Inter-VLAN Routing, Trouble Shooting Inter-VLAN Rioting

Module VII: Basic Wireless Concepts and Configuration


The Wireless LAN, Wireless LAN Security, Configuring Wireless LAN Access, Trouble Shooting Simple WLAN
Problems

Text & References:

Text
Cisco Networking Academy Programme CCNA 3 & 4 Companion Guide, 3rd Edn by Pearson Education
Cisco Networking Academy Programme CCNA 3 & 4 Lab Companion, 3rd Edn by Pearson Education

References:
Cisco Networking Academy Programme CCNA 3 & 4 Engineering General, 3rd Edn by Pearson Education
Data Communications and Networking by Behrouz Forouzan, 3e, Tata McGraw-Hill
Computer Networks by Andrews S. Tanenbaum, 4e, Pearson Education
Routing Protocols and Concepts
Course Objective:
The goal of CCNA Exploration Routing Protocols and Concepts course is to develop an understanding of how a router
learns about remote networks and determines the best path to those networks. This course includes both static routing and
dynamic routing protocols.

Course Contents:

Module I: Introduction to Routing and Packet Forwarding


Introduction, Inside the Router, CLI Configuration and Addressing, Building the Routing Tables, Path Determination and
Switching Functions.

Module II: Static Routing


Introduction, Routers and Network, Router Configuration Review, Exploring Directly Connected Networks, Static Routes
with Next Hop, Addresses, Static Routes with Exit Interface, Summary and Default Static Routes, Managing and
Troubleshooting Static Routes

Module III: Introduction to Dynamic Routing Protocols


Introduction, Classifying Dynamic Routing Protocols, Metrics, Administrative Distance, Routing Protocols and Subneting
Activities.

Module IV: Distance Vector Routing Protocols


Introduction to Distance Vector Routing Protocols, Network Discovery, Routing Table Maintenance, Routing Loops,
Distance Vector Routing Protocols Today.

Module V: RIP Version 1


Introduction, RIP v1,Distance Vector, Classful Routing Protocols, Basic RIPv1 Configuration, Verification and
Troubleshooting, Automatic Summarization, Default Route and RIP v1.

Module VI: VLSM and CIDR


Introduction, Classful and Classless Addressing, VLSM, CIDR, VLSM and Route Summarization Activity.

Module VII: RIP Version 2


Introduction, RIPv1 Limitations, Configuration RIPv2, VLSM & CIDR, Verifying & Troubleshooting RIPv2.

Module VIII: The Routing Table A Close Look


Introduction, the Routing Table Structure, Routing Table Lookup Process, Routing Behaviour.

Module IX: EIGRP


Introduction to EIGRP, Basic EIGRP Configuration, EIGRP Metric Calculation, DUAL, More EIGRP Configuration.

Module X: Link State Routing Protocols


Introduction, Link State Routing ,Implementing Link State Routing Protocols.

Module XI: OSPF


Introduction to OSPF, Basic OSPF Configuration, The OSPF metric, OSPF and Multi-access Networks, More OSPF
Configuration.
DATA STRUCTURES USING C LANGUAGE
Course Objective:
This course is an introduction to the use, design, and analysis of data structures in computer programs. The very
commonly used data structures like arrays, stacks, queues, lists, trees, and graphs will be discussed in detail. Sorting and
hashing are important topics in the study of algorithms. They are also closely related to the design of data structures.
Several algorithms to implement these techniques are included in the syllabus.

Course Contents:

Module I: Basic concepts of data representation


Abstract data types, Fundamental and derived data types, Representation, Primitive Data Structures.
Data Types In C Language, Pointers In C ,Arrays In C Language , Implementation Of Single Dimensional & Multi
Dimensional Arrays, Address Calculation In Single And Multi Dimensional Arrays. Representation of Sparse Matrices.

Module II: Searching and Sorting Techniques


Asymptotic Analysis, O- Notation.
Bubble Sort, Insertion Sort, Selection Sort, Merge Sort, Heap Sort, Radix Sort, Hashing, Binary Search, Linear Search,
Finding Complexities of Sorting and Searching Algorithms.

Module III: Stacks


Definition, Representation of a stack using an Array, Implementing Push and Pop operation in a Stack, Applications of
Stack: String reversal, checking a string for Palindrome, Infix Postfix & Prefix Expressions, Infix to Postfix conversion,
Infix to Prefix conversion.

Module IV: Queues


Definition, Representation of Queues using an array, Implementing Insertion and Deletion Operations on an Queue,
Circular Queues And Their Implementation, Priority Queues With Basic Operations.

Module V: Programming With Linked Lists


Introduction, Insertion And Deletion of a node in Single Linked List, Doubly Linked Lists with basic operations.
Polynomial representation using a Linked List. Addition of two polynomials.

Module VI: Programming With Trees


Binary Trees - Operations On Binary Trees, Node Representation, Internal And External Nodes, Choosing A B.S.T.
Representation, Threaded Binary Trees, Searching for an element in the tree, Deleting Kth Element, Tree Traversal.
Binary Search Tree- Definition Implementation Of B.S.T. Constructing a Binary Search Tree based on its given Infix And
Pre/Post Fix Order, Deletion And Insertion Of A Node In B.S.T. Height Balanced Tree. Introduction to AVL Tree.

Module VII: Graph and Their Applications


Introduction, Representation of a Graph Adjacency List and Adjacency Matrix, Linked Representation of aGraph,
Traversing A Graph - DFS, BFS.
Spanning Trees-Introduction, Representation Of Spanning Tree, Constructing A Spanning Tree ( Prims Algorithm ,
Kruskals Algorithm)
INFORMATION SECURITY
Course Objective:
This subject is very important for students because it provides conceptual understanding of information security issues,
challenges and mechanisms. This paper is useful to develop basic skills of secure network architecture and explains the
theory behind the security of different cryptographic algorithms. It describes common information vulnerabilities and
attacks, defense mechanisms against the security attacks, and cryptographic protection mechanisms. This paper explores
the requirements of real-time communication security and issues related to the security of web services.

Course Contents:

Unit-I Introduction to Information Security & Cryptography


Introduction to Security Attacks, Security Services and Mechanism, Classical encryption techniques, Substitution Ciphers
and Transposition ciphers, Cryptanalysis, Steganography, Stream and Block ciphers.

Unit-II Secret Key Cryptography


Modern Block Ciphers: Block Ciphers Principles, Shannons Theory of Confusion and Diffusion, Fiestal Structure, Data
Encryption Standard (DES), Strength of DES, Idea of Differential Cryptanalysis, Block Cipher Modes of Operations,
Triple DES

Unit-III Public Key Cryptography


Introduction to group, field, modular arithmetic, prime and relative prime numbers, Euclidean Algorithm.

Advanced Encryption Standard (AES) encryption and decryption, Fermats and Eulers theorem, Chinese Remainder
theorem, Principals of Public Key Crypto Systems, RSA algorithm, Security of RSA algorithm.

Unit-IV Authentication Standards


Message Authentication Codes: Authentication requirements, authentication functions, message authentication code, Hash
Functions, Birthday Attacks, Security of hash functions, Secure Hash Algorithm (SHA), Message Digest

Digital Signatures: Digital Signatures, Digital Signature Standards (DSS), proof of Digital Signature Algorithm

Unit-V Key Management


Key Management and Distribution: Symmetric Key Distribution, Diffie-Hellman Key Exchange, Public Key Distribution,
X.509 Certificates, Public Key Infrastructure.

Unit-VI Web Security


Authentication Applications: Kerberos, Electronic Mail Security: Pretty Good Privacy (PGP), S/MIME.

IP Security: Architecture, Authentication Header, Encapsulating Security Payloads, Key Management, Introduction to
Secure Socket Layer, Secure electronic, transaction (SET)

Module VII: System Security


System Security: Introductory Idea of Intrusion, Intrusion Detection Techniques, Viruses and Worms, Firewalls, Design
Principles of Firewalls, IT Acts and Cyber Laws (Global Standards), Virtual Private Network, Recent attacks on
networks.

Textbooks & References:

Textbooks:
W. Stallings, Networks Security Essentials: Application & Standards, Pearson Education, 2000
W. Stallings, Cryptography and Network Security, Principles and Practice, Pearson Education, 2000.
References:
1. Behrouz A. Frouzan: Cryptography and Network Security, Tata McGraw Hill
2. Bruce Schiener, Applied Cryptography. John Wiley & Sons
3. Bernard Menezes, Network Security and Cryptography, Cengage Learning.
4. Atul Kahate, Cryptography and Network Security, Tata McGraw Hill
Semester
4
NETWORK PLANNING AND DESIGN

Course Objective:
Network Planning and Design course teaches an effective methodology for planning and designing enterprise
networks with relevant new technologies. This course efficiently explains principles, methodologies, and
technologies, while remaining focused on graph theory, Queuing theory and optimization techniques. We will
use a real-world design case study as the framework along with a structured methodology to teach all phases of
a design project.

Course Contents:
Module I: Making the business care for the network
What is network design; Job of network designer; Major steps of network design; Methods of system
development; Characteristics of successful systems ; Need for quality assurance; Technical solutions for
quality; Major challenges in network design; Types of network (centralized and distributed); Criteria to evaluate
different design alternatives; Network design process; Data collection; Technical requirement specification;
Network topology; Routing strategy; Network management introduction ; Linear programming.

Module II: Queuing theory


Performance Analysis; Queing essentials; Analysis and delay and loss in network ; M/M/1 Model; M/M/C
model; Erlang B model; Analysis of network reliability.

Module III: Three location data network design problems


Analysis of link delays in data network; Exponential problems; M/M/1 queue; Designing data network ; Costs
of network component; Design principles; Representing traffic using tables; Drop algorithm.

Module IV: Network design and graph theory:


Graphs; Minimum spanning three (MST); Kruskals Algorithm; Prims algorithm; Trees; Tree design;
Drawback of MSTs; Shortage path trees and tours; Bottleneck path problem.

Module V: Capacity Assignment in centralized network:


Network problem; Network performance criteria; Network design objectives, RMA.

Module VI: Centralized network


Time and cost trade offs; Definition of the problem; Delay and cost table; Terminal assignment problem using
a star topology.

Module VII: Project Management


Fundamentals of project management; Use of project management techniques; PERT / CPM network; Project
scheduling using PERT/CPM; Critical path; Stack of an activity; Lab upgrade example.

Text & References:


Text:
Network Planning & Designing in Guide by Shaun Hummel, CISCO Press
References:
Graph Theory with Applications to Engineering and Computer Science by N. Deo, P.H.I. publication.
IT PROJECT MANAGEMENT

Module I: Introduction of Software Project Management & Project Planning


Introduction, the state of IT project management, context of project management, need of project management, project
goals, project life cycle and IT development, extreme project management, some ways of categorizing software projects,
the project as a system, Problems with software projects, Management control, Requirement specification, Information
and control in organization, Introduction of Step Wise project planning, Step: 0-4, Step: 5-10 of project planning.

Module II: Risk Management


The nature of Risk, Risk identification, Risk analysis, Risk Examination, Risk Assessment, Reducing Risk, Evaluating
risks to the schedule.

Module III: Project Examination


Strategic assessment, Technical assessment, Cost-benefit analysis (no numerical), cost-benefit Examination techniques,
Cash flow forecasting, risk Examination

Module IV: Overview of Appropriate project approach & Software Effort Estimation
Project models, Examples of project models, the basis of software estimation, Problems with over and under estimates,
where are estimates done? Software effort estimation techniques: LOC, Function Point (no numerical), COCOMO: a
parametric model

Module V: Overview of Management


Levels of management, Management as a control system, Functions of Management, Objectives, Characteristics and
Impact of management

Module VI: Activity Planning & Resource Allocation


Objective of activity planning, when to Plan, Project Schedules, Projects and activities, Sequencing and scheduling
activities, Nature of resources, Identifying resource requirements, Scheduling resources, Cost Schedules, Scheduling
sequences.

Module VII: Monitoring and Control & Managing people and organizing team
Creating the framework, collecting the data, Visualizing progress and change control, Organizational structure and
behavior, selecting right person for a job, motivation, leadership, working in a group.

Module VIII: Software Quality


Place of s/w quality in project planning, importance of s/w quality, Defining s/w quality, ISO 9126, ISO 9000, ISO 9003,
Practical s/w quality measures, Product versus process quality management, External standards, Techniques to help
enhance s/w quality, CMM Model, Concept of Six Sigma

Text & References:

Text:
Software Project Management (Second Edition), BOB Hughes and Mike Cotterell, TMH

References:
Software Engineering David Gustafson (Schaums Series)
Software Engineering Pressmen
OPTICAL TECHNOLOGIES
Course Objective:
This course gives a comprehensive concept of theory and behavior of optical fiber links, its interaction with others
devices; basic design principle of digital and analog optical fiber transmission links ,WDM , architecture and performance
characteristics of complex optical network and advanced optical communications techniques such as optical CDMA and
OTDM.

Course Contents:

Module I: Optical Fibers


Basic optical fiber communication system; Fibers types: Single Index, Graded Index, Multimode , Single Mode; Fiber
waveguides; Modes and Rays; Dispersion and Attenuation; Absorption and Scattering, Fiber Material & Fabrication;
Special Fibers: Dispersion Shifted Fibers, Dispersion Flattened Fibers; Merits: Digital Fiber Optic Link.

Module II: Optical Sources, Transmitters and Receivers


LEDs, LDs, Semiconductor Devices: Types of lasers; Transmitter Design ; Receiver : PIN and APD devices; Receiver
Amplifiers; ISI and Eye Diagrams; Effects of Noises on Error Probability.

Module III: Optical Amplifiers and Networks


Basic applications and types; SLA; External pumping and pain ,EDFA: Mechanism and Architecture , Parameters; System
Applications , Basic Networks; SONET / SDH ,WDM networks , Optical CDMA ,Ultra High Capacity Networks ,
Optical Time Division Multiplexing (OTDM)

Module IV: Optical WDM and Components


Principles of WDM, Components, Fiber Couplers, Interferometers; Mach-Zehnder and Michaleson interferometric
techniques, Phased Array Based WDM devices, Tunable Sources and Filters, Splicing; Fusion Splicers , Fiber
Connectors; FDDI & FC types.

Module V: Fiber Optic Measurements


Power Meters, Attenuators; Attenuation Measurement; Dispersion Measurement Techniques, OTDR (Optical Time-
Domain Reflectometer) and its applications; Fiber Fault Location,; Optical Spectrum Analyzers (OSA), Characteristics of
sources.

Text & References:

Text:
G. Keiser, Optical Fiber Communication, 3rd edition, McGraw Hill, 2000
Walter Goralski, Optical Networking & WDM, Tata McGraw Hill, 2001

References:
Franz & Jain, Optical Communication System & Components, Narvsa Publications 2000
Fiber Optical communication systems, 2nd edition, John Wiley & sons, New York, 1997.
D.K. Myan Baev and L. lscheiner, Fiber Optic Communication Technology, Pearson education Asia, 2001.
EMERGING TECHNOLOGIES

Course Objective:
To keep the pace with the exponential growth of information, there is a growing need for the skilled information
management professionals. This course gives insight into: Challenges and solutions for data storage and data
management, intelligent storage systems, Storage networking environments (FC-SAN, IP-SAN, NAS, CAS,
and DAS), Business continuity and disaster recovery, Storage security and virtualization, Managing and
monitoring the storage infrastructures.

Course Contents:

Module I: Introduction to Storage Technology and Management


Meeting Today's Data Storage Needs, Evolution of Storage Technology and Architecture, Data Storage
Solutions, Data Center Infrastructures, Key challenges in managing Information

Module II: Storage Systems Architecture


Host Environment, Components of a Host, Connectivity, Physical Disks, RAID Arrays (RAID 0, RAID 1, RAID
3, RAID 4, RAID 5, RAID 6, RAID 0+1, RAID 1+ 0), Disk Storage Systems, Data Flow Exercise

Module III: Networked Storage Environments


Direct Attached Storage (DAS) and Introduction to SCSI, Storage Area Network (SAN) and Introduction to
Fiber Channel, Zoning, FC Topologies, Network Attached Storage (NAS) and its Protocols, NAS
implementations, IP SAN, Content Addressed Storage (CAS), Storage Virtualization

Module IV: Business Continuity


Introduction to Business Continuity, Backup & Recovery, BC Local Replication, BC Remote Replication

Module V: Monitoring & Managing the Storage Infrastructure


Managing the Data Center, Monitoring the Storage Infrastructure, Storage Management Activities, Storage
Infrastructure Management Challenges, Developing the Ideal Solution

Module VI: Securing Storage & Virtualization


Securing the Storage Infrastructures, Security Implementations in Storage Networking, Virtualization
Technologies.

Text & References:

Text:
Information Storage and Management Storing, Managing and Protecting Digital Information By G.
Somasundaram, Alok Shrivastava, EMC Education Services, Wiley Publishing, Inc.

References:
Storage Technology Foundations, EMC Education Services.
Network Security: The Complete Reference, Roberta Bragg, Mark Rhodes-Ousley, Keith Strassberg, et al -
Tata McGraw-Hill presents.

Potrebbero piacerti anche