Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
KALASALINGAM UNIVERSITY
(Kalasalingam Academy of Research and Education)
Anand Nagar, Krishnankoil
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
(DST-FIST SPONSORED DEPARTMENT)
I semester
II semester
Total 6 0 18 24 20
III semester
Total 6 0 10 16 16
IV semester
Programming Electives I
Programming Electives II
Programming Electives IV
Programming Electives V
3 0 0 3
Regulation R2014
Course Description Presenting comprehensive coverage of this fast moving field, Wireless
Communications and Mobile Computing provides the R&D communities
working in academia and the telecommunications and networking industries
with a forum for sharing research and ideas. The convergence of wireless
communications and mobile computing is bringing together two areas of
immense growth and innovation. This is reflected throughout the journal by
strongly focusing on new trends, developments, emerging technologies and new
industrial standards.
Expected Outcome
1. To realise the vision of "Optimally Connected Anywhere, Anytime" supported by all system
levels from access
Cellular Communications 9
The Cellular Engineering Fundamentals : Introduction, Cell, Frequency Re-use, Channel Assignment
Strategies, Fixed and Dynamic Channel Assignment Strategies, Handoff Process, Factors affecting
Handoff Process, Handoff Strategies, Few practical cases of Handoff Scenario, Interference and
System Capacity, Co-channelInterference (CCI), Adjacent Channel Interference (ACI), Cell Splitting,
Sectoring, Microcell Zone concept, Repeaters, Trunked Radio System
Wireless Communications and Diversity 9
Fast Fading Wireless Channel Modeling Rayleigh/Ricean Fading Channels BER Performance in
Fading ChannelsDiversity modeling for Wireless Communications BER Performance Improvement
with diversity Types of Diversity – Frequency, Time, Space Broadband Wireless Channel Modeling
WSSUS Channel Modeling, RMS Delay Spread Doppler Fading, Jakes Model, Autocorrelation Jakes
Spectrum Impact of Doppler Fading
Narrowband Systems, Wideband Systems, Frequency Division Multiple Access, Time Division
Multiple Access, Spread Spectrum Multiple Access, Space Division Multiple Access. CDMA
Introduction to CDMA Walsh codes, Variable tree OVSF, PN Sequences, Multipath diversity, RAKE
Receiver ,CDMA Receiver Synchronization.
OFDM 9
Introduction to OFDM,Multicarrier Modulation and Cyclic Prefix, Channel model and SNR
performance,OFDM Issues – PAPR,Frequency and Timing Offset Issues,MIMO,Introduction to
MIMO, MIMO Channel Capacity, SVD and Eigenmodes of the MIMO Channel,MIMO Spatial
Multiplexing – BLAST,MIMO Diversity – Alamouti, OSTBC
Roaming in wireless and Mobile Networks 9
National and International Roaming, Interstandard Roaming, Prepaid and Postpaid Subscriber
Roaming, Basic Structure of Roaming, Roaming Services. Roaming in a GSM Network: Inter-
PLMN Signaling Network, Communication between a VPLMN VLR and HPLMN HLR , Roaming
Procedures, Roaming call scenarios, Short Message Services(SMS). 3G and 4G Wireless Standards
WCDMA, L T E , W i M A X etc
References
A.Books
1. Theodore Rappaport, “ Wireless Communications: Principles and Practice”, Prentice Hall.
2.David Tse and Pramod Viswanath, “ Fundamentals of Wireless Communications”, Cambridge
University Press.
3.Andrea Goldsmith, “ Wireless Communications”, Cambridge University Press.
4.W. C. Lee, Mobile Communications Engineering, New Delhi: Tata McGraw -Hill, Latest Ed.
5.Lee- Mobile Communication & Networking, TMH
6.Ezio Biglieri, “ MIMO Wireless Communications”, Cambridge University Press.
7.J. Schiller, “Mobile Communications”, Pearson Education.
8.Shahid K. Diddiqui, “Roaming in Wireless Networks”, McGraw Hill Professional.
9.William Stallings, “Wireless Communications & Networks 2/E”, Pearson.
10.Leo-Garcia & Widjaja, Communication Networks, TMH
11.Gordon A. Gow and Richard K. Smith “Mobile and Wireless Communication”, Mc Graw Hill
B. Magazines:
1.“The Wireless Age”, Wireless Press, Inc.
2.“Communication Arts”, 10 Constitution Drive, Menlo Park, CA 94025.
3.IEEE Communication Magazine.
4.IEEE Signal Processing Magazine.
5.Telecommunication Magazine. C.
C.Journals:
1.Wireless Communications and Mobile Computing (Wireless Comm Mobile Comput), Publisher John
Wiley & Sons, ISSN: 1530-86775
2.International Journal of Wireless Communications and Mobile Computing, ISSN:2330-1007 (Print),
ISSN: 2330-1015 (Online)
3.The International Research Journal of mobile and Wireless communications, ISSN 2249-6513
4.British Telecom Technological Journal, AT&T Technical Journals
5.Bell Systems Technical Journal.eference Books
3 0 0 3
Regulation R2014
Course
Prerequisite
Expected Outcome
SIGNALS 9
Vector spaces – norms – Inner Products – Eigen values,Review on Fourier Transform, Z transform,
Laplace transform-Frequency analysis, Weiner Khitchine relation - Power spectral density –
filtering random process, Spectral Factorization Theorem,Fuzzy logic basic concepts.
GRAPH THEORY 9
Introduction to Paths, Trees, Vector spaces, Matrix Coloring and directed graphs; Some basic
algorithms – Shortest path algorithms – Depth-First search on a graph – Isomorphism – Other Graph
Theoretic algorithms – performance of graph theoretic algorithms – Graph-theoretic Computer
languages-image processing examples
OPTIMIZATION TECHNIQUES 9
Linear programming - Basic concepts – Graphical and Simplex methods –Transportation problem –
Assignment problem; Dynamic programming - Elements of the dynamic programming model –
optimality principle – Examples of dynamic programming models and their solutions.
QUEING THEORY 9
Poisson Process – Markovian queues – Single and Multi-server Models – Little’s formula - Machine
Interference Model – Steady State analysis – Self Service queue
FINITE FIELD ARITHMETIC 9
Introduction, Groups- Rings- Fields- Arithmetic of Galois Field- Integer Ring-Polynomial Rings-
Polynomials and Euclidean algorithm, primitive elements,Construction and basic properties of Finite
Fields-Computations using Galois Field arithmetic- sub fields- Minimal polynomial and conjugates-
Vector space-Vector Subspace- Linear independence.
References
Mobile Computing
Mobile Computing 3 0 0 3
Regulation R2014
9
Mobility of Bits and Bytes
Wireless-The Beginning, Mobile Computing, Dialogue Control, Networks, Middleware and
Gateways, Application and Services (Contents), Developing Mobile Computing Applications,
Security in Mobile Computing Standards- Necessary of standards
Mobile fundamentals and channels 9
Multiple access techniques like Frequency division multiple access (FDMA) ,Time division multiple
access (TDMA) ,Code division multiple access (CDMA) ,Space division multiple access (SDMA)
Mobile radio channels 9
Path-loss, slow-fading, fast-fading , delay spread and coherence bandwidth, flat fading and frequency
selective fading ,The power budget design of mobile radio channels
Global System for Mobile Communications 9
GSM Architecture, GSM Entities ,Call Routing in GSM, PLMN Interfaces, GSM Addresses and
ECE DEPARTMENT KALASALINGAM UNIVERSITY Page 8
M.TECH MCC REGULATION 2015
Identifiers , Network Aspects in GSM , GSM Frequency Allocation, Authentication and Security,
Mobile Computing over SMS, Short Message (SMS) ,
Services of GSM 9
Value Added Services through, MS, Accessing the SMS Bearer, GPRS and packet
Architecture GPRS Network Architecture, GPRS Network Operations, Data
Services in GPRS , Application for GPRS, Limitation of GPRS, Billing and
Charging in GPRS, WAP , MMS , GPRS Applications, Spread – Spectrum
Technology, Is – 95.
Text / Reference Books
A. Books
1.Mazliza Othman, “Principles of Mobile Computing & Communications”, SPD publications.
2.Rajkamal, “Mobile Computing, 2/e”, Oxford University Press.
3.Raksha Shende, “Mobile Computing for beginners”, SPD publications.
4.V.Jeyasri Arokiamary,“Mobile Computing”, Technical Publications, 2009
5.Kumkum Garg, “Mobile Computing: Theory and Practice”, Pearson Education India, 2010
6.Asoke K. Talukdar, “Mobile Computing, 2E”, Tata McGraw-Hill Education, 2010
7.C.S.R. Prabhu,“Mobile Computing, Universities Press, 2002
8.Reza B'Far, “Mobile Computing Principles: Designing and Developing Mobile Applications with
UML and XML”, Cambridge University Press, 2005
9.J. Schiller, “Mobile Communications”, Pearson Education,
10. Shahid K. Diddiqui, “Roaming in Wireless Networks”, McGraw Hill Professional, 2006.
B. Magazines:
1.Mobile choice, London
2.Mobile World, UK.
3.Mobile Today, UK.
C. Journals:
1. International Journal of Wireless and Mobile Computing (ISSN online: 1741-1092 ISSN print:
1741- 1084)
2. International Journal of Computer Science Research & Technology (ISSN: 2321-8827)
3 0 0 3
Regulation R2014
9
Overview of Mobile Internet Protocol
Introduction, applications, definition of terms, history, MIP Mobile Internet Protocol version
6:MIPv6
TCP for Mobile Environments, Case study with example TCP protocols 9
Describe the operation of the TCP/IP protocol suite in a mobile environment, including tMobile IP
and a mobile ad hoc routing protocol; Modify an existing implementation of a protocol to alter
functionality or performance
Middleware 9
Role of mobile computing middleware: Use middleware application program interfaces (APIs) to
realize mobile applications, Overview of Wireless LAN Protocols: WiFi
Wireless Application Protocols 9
for
the Mobile Internet”, Addison Wesley Longman.
3. Steve Mann, Scott Sbihli, “The Wireless Application Protocol (WAP): A Wiley Tech Brief”, John
Wiley & Sons, 2002
4. Singhal, “WAP - Wireless Application Protocol”, Pearson Education India
5. Perkins, Perkins Charles E., “Mobile IP”, Pearson Education India
6. Mark Norris, “Mobile IP technology for M-business”, Artech House, 2001
C. Journals:
1. International Journal of Wireless and Mobile Computing, ISSN online: 1741-1092, ISSN print:
17411084,
Inder Science Publishers.
2. International Journal of Wireless & Mobile Networks (IJWMN), ISSN: 0975-3834
Mode of Evaluation Tests, Assignments and Seminar
Embedded Systems.
3 0 0 3
Regulation 2014
1. Know about Embedded systems and the interface issues related to it.
2. Know about different techniques on embedded systems
3. Know about the real time models, languages and operating systems
4. To analyze real time examples, obstacles and solutions.
9
Introduction to Embedded Systems
Architecture of Embedded Systems - Hardware Architecture, Software Architecture,
Communication Software, Development/Testing Tools ,Programming for Embedded Systems
The Process of Embedded System Development 9
DSP-based Embedded Systems - Implementation of Embedded Systems with VHDL, FPGA and
CPLD Embedded Systems Applications using Strong ARM Platform
Embedded Control Embedded Control Systems Design sign 9
Text / References
A. Books
1. Raj Kamal , “Embedded systems”, Tata McGraw-Hill Education, 2008.
2. A.P.Godse, A.O.Mulani, “Embedded Systems”, Technical Publications, 2009.
3. Dr. K.V.K.K. Prasad, “Embedded/Real-time Systems: Concepts, Design and Programming”,
Dreamtech press.
4. Vahid, “Embedded System Design: A Unified Hardware/Software Introduction”, John Wiley &
Sons, 2006
5. Dreamtech Software team, “Programming for Embedded Systems”, Willey –dreamtech
6. Santanu Chattopadhyay, “Embedded System Design”, PHI Learning Pvt. Ltd., 2013
7. Shibu K V, “Introduction to Embedded Systems 1st Edition”, Tata McGraw - Hill Education
(2009)
8. Jack G. Ganssle, Stuart R. Ball, “Embedded Systems”, Newnes, 2008
9. Krzysztof Iniewski, “Embedded Systems: Hardware, Design and Implementation”, John Wiley &
Sons, 2012
10. H. Bailey, “Embedded System Design”, Dreamtech Press, 2005
http://en.wikibooks.org/wiki/Category:Embedded_Control_Systems_Design
B. Magazines:
1. Embedded Systems Design magazine archive, South Tower San Francisco, CA 94107
2. Embedded Innovator Newsletter and magazines, Intel, Santa Clara, CA.
3. Embedded Computing Design, Saint Clair Shores, MI 48082
4. Military Embedded Systems, Saint Clair Shores, MI 48082
C. Journals:
1. International Journal of Embedded Systems, Inder Science Publishers, ISSN online: 1741-1076,
ISSN print: 1741-1068
2. International Journal of Reconfigurable and Embedded Systems (IJRES), ISSN: 2089-4864, IAES
3. Journal of Embedded Computing, ISSN 1740-4460, IOS Press
4. Journal of Embedded Systems, Science and Education Publishing.
Regulation R2014
Course This course matches the basic concepts of circuit theory to the real time
Description applications such as LED, LCD, Relays and other communication devices.
Expected Outcome
6 Practical
Cycle. I: hours
Study experiment A - Study of the MSP430 Launch pad Board and Energia IDE.
Study experiment B - Study of the basic Interfacings.
6. Basic serial communication using MSP430 launch pad board and PC.
7. control of pins with serial communication using MSP430 launch pad board and PC.
8. Hello world program with MSP430 launch pad board and Code Composer Studio.
9. Timer based operation with MSP430 launch pad board and Code Composer Studio.
10. Master-slave communication using MSP430 launch pad board.
Regulation R2014
Course This course takes a unified view of the fundamentals of wireless communication
Description and explains the advances at a level accessible to an audience with a basic
background in probability and digital communication. Experiments covered
include, DSSS,GSM and CDMA and propagation model.
Expected Outcome
1. Implementation and practical experiments by manually.
2. Finds the practical obstacle related to the wireless communication.
3. To learn different modulation techniques, multiple access techniques for wireless
communication and propagation models.
4. To understand modern mobile communication systems
Study of wireless Communications using VisSim or Trainer 6 Practical
Cycle. I: Kit hours
Cycle. II: Wireless Path loss Computations - Study of Propagation Path 6 Practical
loss Models: Indoor & Outdoor (Using hours
Matlab Programming)
1. Free Space Propagation – Path Loss Model
2. Link Budget Equation for Satellite Communication
3. Carrier to Noise Ratio in Satellite Communication
4. Outdoor Propagation – Okumura Model
B. Magazines:
1.The Wireless Age, Wireless Press, Inc.
2. Communication Arts, 10 Constitution Drive, Menlo Park, CA 94025.
3. IEEE Communication Magazine.
4. IEEE Signal Processing Magazine.
C. Journals:
1. Wireless Communications and Mobile Computing (Wireless Comm Mobile Comput),
Publisher John Wiley & Sons, ISSN: 1530-8677
2. International Journal of Wireless Communications and Mobile Computing, ISSN: 2330-1007
(Print), ISSN: 2330-1015 (Online)
3. The International Research Journal of mobile and Wireless communications, ISSN 2249-
6513.
4. British Telecom Technological Journal, AT&T Technical Journals Bell Systems Technical
Journal
Quantum Computing
Quantum Computing 3 0 0 3
Regulation 2014
Course The combination of two of the twentieth century’s most influential and
description revolutionary scientific theories, information theory and quantum mechanics,
gave rise to a radically new view of computing and information. Quantum
information processing explores the implications of using quantum mechanics
instead of classical mechanics to model information and its processing.
Quantum computing is not about changing the physical substrate on which
computation is done from classical to quantum but about changing the notion of
ECE DEPARTMENT KALASALINGAM UNIVERSITY Page 15
M.TECH MCC REGULATION 2015
computation itself, at the most basic level. The fundamental unit of computation
is no longer the bit but the quantum bit or qubit. This comprehensive
introduction to the field offers a thorough exposition of quantum computing and
the underlying concepts of quantum physics, explaining all the relevant
mathematics and offering numerous examples.
Expected Outcome
Upon Completion of the subjects:
1. The basics of Hilbert space theory
2. Understand and explain the basic notions of Quantum Computing-including Quantum Bits
and registers, Quantum Evolution, Quantum Circuits, Quantum Teleportation and the basic
Quantum Algorithms known at the present time.
3. Identify the essential difference between the classical paradigm and the quantum paradigm of
computation and appreciate why quantum computers can solve currently intractable
problems.
9
Fundamental Concepts
Fundamental Concepts
Global Perspectives, Quantum Bits, Quantum Computation, Quantum Algorithms, Quantum
Information, Postulates of Quantum Mechanisms. Quantum Computation Quantum Circuits –
Quantum algorithms, Single Orbit operations, Control Operations,
Guiding Principles, Conditions for Quantum Computation, Harmonic Oscillator Quantum Computer,
Optical Photon Quantum Computer – Optical cavity Quantum electrodynamics, Ion traps, Nuclear
Magnetic resonance.
Quantum Information 9
Quantum noise and Quantum Operations – Classical Noise and Markov Processes, Quantum
Operations, Examples of Quantum noise and Quantum Operations – Applications of Quantum
operations, Limitations of the Quantum operations formalism, Distance Measures for Quantum
information.
Quantum Error Correction 9
1.C. T.Bhunia ,“Introduction To Quantum Computing” , Publisher New Age International Pvt Ltd
Publishers, ISBN 9788122430752
2.Micheal A. Nielsen. & Issac L. Chiang, “Quantum Computation and Quantum
Information”, Cambridge University Press, Fint South Asian edition, 2002
3.David McMahon, “Quantum Computing Explained”, Wiley.
4.Michael A. Nielsen, Isaac L. Chuang, “Quantum Computation and Quantum Information”,
Cambridge Series on Information and the Natural Sciences
5.Eleanor G. Rieffel , Wolfgang H. Polak, “Quantum Computing: A Gentle Introduction (Scientific
and Engineering Computation)”, The MIT Press.
6.Susan Shannon , “Trends in Quantum Computing Research”, Nova Publishers, 2006
7.Julian Brown, “Quest for the Quantum Computer”, Simon & Schuste.
8.Marco Lanzagorta, Jeffrey Uhlmann, “Quantum Computer Scienc”, Morgan &
Claypool Publishers,2009
9.Phillip Kaye , Raymond Laflamme , Michele Mosca , “An Introduction to Quantum Computing”,
Oxford.
10.Sahni, “Quantum Computing”, Tata McGraw-Hill Education, 2007.
B.Magazines:
1.Cosmos, Australia.
C.Journals:
1.Journal of Quantum Information Science, Scientific Research, ISSN Print: 2162-5751, ISSN
Online: 2162-576X
2.The Future of Quantum Information Processing, Science (Special Issue).
3.The IEEE Journal of Quantum Electronics, IEEE
4.Quantum information and Computing, Rinton press, New Jersey, US
L T P C
ECE5207 Wireless Adhoc And Sensor Networks
3 0 0 3
Regulation 2014
research and development in the rapidly growing area of ad hoc networks and
Includes coverage of ad hoc networking trends, possible architectures, and the
advantages/limits for future commercial, social, and educational applications.
The convergence of the Internet, communications, and information
technologies, coupled with recent engineering advances, is paving the way for a
new generation of inexpensive sensors and actuators, capable of achieving a
high order of spatial and temporal resolution and accuracy. The technology for
sensing and control includes sensor arrays, electric and magnetic field sensors,
seismic sensors, radio-wave frequency sensors, electro optic and infrared
sensors, laser radars, and location and navigation sensors. Advances in the areas
of sensor design, materials, and concepts will further decrease the size, weight,
and cost of sensors and sensor arrays by orders of magnitude and will increase
their spatial and temporal resolution and accuracy.
Cloud computing
9
Adhoc Networks And Routing Protocols
Ad hoc Wireless Networks – What is an Ad Hoc Network? Heterogeneity in Mobile Devices –
Wireless Sensor Networks – Traffic Profiles – Types of Ad hoc Mobile Communications – Types of
Mobile Host Movements – Challenges Facing Ad hoc Mobile Networks – Ad hoc wireless Internet
.Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks – Classifications of Routing
Protocols – Table–Driven Routing Protocols – Destination Sequenced Distance Vector (DSDV) –
Wireless Routing Protocol (WRP) – Cluster Switch Gateway Routing (CSGR) – Source–Initiated
On–Demand Approaches – Ad hoc On–Demand Distance Vector Routing (AODV) – Dynamic
Source Routing (DSR) –Temporally Ordered Routing Algorithm (TORA) – Signal Stability
Routing (SSR) –Location–Aided Routing (LAR) – Power–Aware Routing (PAR) – Zone Routing
Protocol(ZRP).
Multicast Routing And Security 9
Issues and Challenges in Providing QoS in Ad hoc Wireless Networks – Classifications of QoS
Solutions – MAC Layer Solutions – Network Layer Solutions – QoS Frameworks for Ad hoc
Wireless Networks Energy Management in Ad hoc Wireless Networks – Introduction – Need for
Energy Management in Ad hoc Wireless Networks – Classification of Energy Management
Schemes – Battery Management Schemes – Transmission Power Management Schemes – System
Power Management Schemes.
Sensor Networks – Architecture and Macprotocols 9
Single node architecture – Hardware components, energy consumption of sensor nodes, Network
architecture – Sensor network scenarios, types of sources and sinks, single hop versus multi-hop
networks, multiple sinks and sources, design principles, Development of wireless sensor networks.
, physical layer and transceiver design consideration in wireless sensor networks, Energy usage
profile, choice of modulation, Power Management - MAC protocols – fundamentals of wireless
MAC protocols, low duty cycle protocols and wakeup concepts, contention-based
protocols,Schedule-based protocols - SMAC, BMAC, Traffic-adaptive medium access protocol
(TRAMA), Link Layer protocols – fundamentals task and requirements, error control, framing, link
management.
Sensor Networks – Routing Protocols And Operating Systems 9
Gossiping and agent-based uni-cast forwarding, Energy-efficient unicast, Broadcast and multicast,
geographic routing, mobile nodes, Data-centric routing – SPIN, Directed Diffusion, Energy aware
routing, Gradient-based routing – COUGAR, ACQUIRE, Hierarchical Routing – LEACH, PEGASIS,
Location Based Routing – GAF, GEAR, Data aggregation – Various aggregation techniques.
Introduction to TinyOS – NesC, Interfaces, modules, configuration, Programming in TinyOS using
NesC, Emulator TOSSIM.
Reference Books
1. C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Networks Architectures and
Protocols”, Prentice Hall, PTR, 2004.
2. C. K. Toh, “Ad Hoc Mobile Wireless Networks Protocols and Systems”, Prentice Hall,
PTR, 2001.
3. Charles E. Perkins, “Ad Hoc Networking”, Addison Wesley, 2000.
4. Kazem Sohraby, Daniel Minoli and Taieb Znati, “ Wireless Sensor Networks Technology-
Protocols and Applications”, John Wiley & Sons, 2007.
5. Feng Zhao, Leonidas Guibas, “Wireless Sensor Networks: an information processing
approach”, Else vier publication, 2004.
6. C.S.Raghavendra Krishna, M.Sivalingam and Tarib znati, “Wireless Sensor Networks”,
Springer publication, 2004.
7. Holger Karl , Andreas willig, “Protocol and Architecture for Wireless Sensor Networks”,
John wiley publication, Jan 2006.
8. K.Akkaya and M.Younis, “ A Survey of routing protocols in wireless sensor networks”,
Elsevier Adhoc Network Journal, Vol.3, no.3,pp. 325-349, 2005.
9. Philip Levis, “ TinyOS Programming”, 2006 – www.tinyos.net.
10. I.F. Akyildiz, W. Su, Sankarasubramaniam, E. Cayirci, “Wireless sensor networks: a
survey”, computer networks, Elsevier, 2002, 394 - 422.
11. Jamal N. Al-karaki, Ahmed E. Kamal, “Routing Techniques in Wireless sensor networks: A
survey”, IEEE wireless communication, December 2004, 6 – 28.
3 0 0 3
Regulation R2014
Course
Description
Expected Outcome
WLAN Roadmap via IEEE 802.11 Family Evolutions, IEEE 802.11 Architecture,Different Physical
Layers, Data Link Layer, Medium Access Control Layer, Mobility,Security, IEEE 802.11 Family and
its Derivative Standards
Introduction, Architecture and Throughputs, Physical Layer and Physical Channels,Baseband Layer,
Link Manager Protocol, Logical Link Control and Adaptation Protocol, RFCOMM Protocol, Service
Discovery Protocol, Profiles, Host Control Interface, Bluetooth Network Encapsulation Protocol.
IEEE 802.15.4 and ZigBee 9
General Architecture, Physical Layer, 2450 MHz Physical Layer, 868/915 MHz Physical Layer, PDU
Packet Format, MAC Layer, Channel Access, Energy Detection, Active and Passive Scan, Association
Procedure, Guaranteed Time Slot, Security, Frame Structures, Beacon Frame , Data Frame.
QoS and Security issues 9
802.11e, WME and “Vanilla” WLANs, Traffic Categories, Voice Data Coexistence, Achieving QoS
for VoWLAN, System Capacity, Authentication in 802.1, Open System Authentication, Shared Key
Authentication, Authentication and Handoffs, Confidentiality in 802.1, Data Integrity in 802.11,
Loopholes in 802.11 Security, WPA.
Roaming and Power Management 9
Types of Roaming, Roaming Issues, Roaming and Voice, Scanning Types, Scanning Strategies, Inter-
ESS Roaming, The Need for Power Management, Power-Aware System Design, Implementing Power
Management
References
Textbooks/References
Cloud computing
L T P C
ECE5209 Cloud Computing
3 0 0 3
Regulation R 2014
9
Data Centre foot prints & Concepts
Introduction To cloud Virtualization concepts
Types of Virtualization & its benefits Introduction to Various Virtualization OS Vmware , KVM etc
HA/DR using Virtualization Moving VMs SAN backend concepts Cloud Fundamentals: Cloud
Building Blocks Understanding Public & Private cloud environments
9
Cloud as SaaS
Private Cloud Environment: Basics of Private cloud infrastructure QRM cloud demo
Public Cloud Environment: Understanding & exploring Amazon Web services Managing and
Creating Amazon EC2 instances Managing and Creating Amazon EBS volumes Tata Cloud details
& demo
Managing Hybrid Cloud environment .
Setting up your own Cloud 9
How to build private cloud using open source tools, Understanding various cloud plugins,Setting up
your own cloud environment
Integraation of cloud 9
Auto provisioning, Custom images,Integrating tools like Nagios Integration of Public and Private
cloud
Future directions 9
Cloud Domain and scope of work,Cloud as PaaS, SaaS,Cloud Computing Programming Introduction
Trends and market of cloud
Text / Reference Books
A. Books
1.Rajkumar Buyya, James Broberg, Andrzej M. Goscinski “Cloud Computing: Principles and
Paradigms”,
John Wiley & Sons, 2010
2.Gupta, Pranab Kumar Das, Nayak, Manojranjan, Pattnaik, Sabyasachi, “Cloud Computing-
Based Projects Using Distributed Architecture”, PHI
3.T. A. Despande “Cloud Computing”,Nirali Prakashak.
4.Kumar Saurabh, “Cloud Computing 2nd Edition”, Wiley India 2012
5.Lee Gillam,“Cloud Computing: Principles, Systems and Applications”, Springer, 2010
B. Magazines:
1. Cloud Computing Magazine, USA
C. Journals:
1.Journal of Cloud Computing, Springer
2.International Journal of Cloud Computing, ISSN online: 2043-9997, ISSN print: 2043-9989
3.Cloud Computing, IEEE Transactions.
Regulation 2014
Course A key characteristic of engineering discipline is that its professionals have the
Description ability to build and evolve systems that it should be capable of consuming less
power and should handle more softwares for various appplications. The next
generation the researches focuses on how to reduce the softwares builted on
mobile phones and increase the applications.
9
Motivation and Programming Strategies
Memory Management - Design Patterns for Limited Memory, Memory Management in Mobile
Java, Memory Management in example OS
Applications 9
Dynamic Linking 9
Resource-Related Concerns in Mobile Devices, MIDP Java. Networking - MIDP Java and Web
Services, Bluetooth Facilities with an example OS
Security 9
Security - Secure Coding and Design, Infrastructure for Enabling Secured Execution, Security
Features in MIDP Java, Case study: Symbian OS Security Features
Research Lab
ECE5283 L T P C
Research Lab
3 0 0 3
Regulation 2014
Course
Description
L T P C
ECE5284 Wireless Communication (NS)Lab
3 0 0 3
Regulation R2014
Course
Description
Expected Outcome
1. Implementation and practical experiments by manually.
2. Finds the practical obstacle related to the wireless communication.
3. To learn different modulation techniques, multiple access techniques for wireless
communication and
propagation models.
4. To understand modern mobile communication systems
Study of wireless Communications using VisSim or Trainer 6 Practical
Cycle. I: Kit hours
LIST OF EXPERIMENTS
STUDY EXPERIMENT
To explore overall view about
1. Communication protocols
2. Software infrastructure
3. Security mechanisms
2. STUDY OF MIDDLEWARE, APPLICATION LEVEL, NETWORK,
SYSTEM SOFTWARE
To explore wearable and hand held computing and their enabling technologies
Mode of Evaluation Practical
Research Methodology
L T P C
ECE6023 Research Methodology
3 0 0 3
Regulation 2014
Course
Description Quite frequently these days people talk of research, both in academic institutions
and outside. Several research studies are undertaken and accomplished year
after year. But in most cases very little attention is paid to an important
dimension relaing to research, namely, that of research methodology. The result
is that much of research, particularly in social sciences, contains endless word-
spinning and too many quotations. Thus a great deal of research tends to be
futile. It may be noted, in the context of planning and development, that the
significance of research lies in its quality and not in quantity. The need,
therefore, is for those concerned with research to pay due attention to designing
and adhering to the appropriate methodology throughout for improving the
quality of research. The methodology may differ from problem to problem, yet
the basic approach towards research remains the same.
Expected Outcome
1. Steps in Research, Motivation, Types, good research techniques.
2. Methods of Data collection, Processing, Analysis techniques of raw datas.Hypothesis,
Technical writing techniques etc.
9
Problem Selection and Information Collection
Definition, Objective, Motivation, Types of Research, Significance, Criteria of Good Research
Defining the Research Problem:Definition of Research Problem, Selection of Problem, Necessity
of defining the Problems, Techniques involves in defining the problem. Research Design : Meaning
of Research Design, Need for research Design, Features of a Good Design, Different Design
Approach
9
Sampling and Measuring information
Sampling Design : Census And Sample Survey, Implications Of A Sample Design, Steps In Sample
Design, Criteria of Selecting A Sampling Procedure, Different Types of Sample Designs, How to
Select A Random Sample? Random Sample From An Infinite Universe, Complex Random Sampling
Designs. Measuring and Scaling Techniques
Measurement in Research, Measurement Scales, Sources of Error In Measurement, Tests of Sound
Measurement, Technique of Developing Measurement Tools, Scaling, Scale Classification Bases.
Methods of Data Collection
Collection of Primary Data, Observation Method, Interview Method, Collection of Data, Collection
of Secondary Data.
Processing and Analysis of Data 9
A.Books
1. C R Kothari, “Research Methodology- Methods and Techniques”, New Age
International Publications.
2. Ranjit Kumar, “Research Methodology”, SAGE Publications.
3. James Arthur, Michael Waring, Robert Coe, Larry V Hedges, “Research Methods
& Methodologies in Education”, SAGE Publications.
4. Donald Howard Menzel , “Writing a technical paper”, McGraw-Hill
5. R. Panneerselvam, “Research Methodology” PHI Publication
6. V.V Khanzone“Research Methodology- Techniques and Tools”, APH Publisher
7. Raj Mohan Joshi, “Writing Skills for Technical Purpose”, Isha Books
C.Journals
Journal of Research Methods and Methodological Issues, ISSN 2150-8143.
3 0 0 3
Regulation 2014
Course The dramatic growth in practical applications for machine learning over the last
Description ten years has been accompanied by many important developments in the
underlying algorithms and techniques. For example, Bayesian methods have
grown from a specialist niche to become mainstream, while graphical models
have emerged as a general framework for describing and applying probabilistic
techniques. The practical applicability of classifier methods has been greatly
enhanced by the development of a range of approximate inference algorithms
such as variational Bayes and expectation propagation, while new models based
on kernels have had a significant impact on both algorithms and applications.
Expected Outcome
Unit No. I: 9
Introduction
Introduction – Definitions, data sets for Pattern –Recognition-Different Paradigms of Pattern
Recognition-Representations of Patterns and Classes
Unit No. II: Feature Extraction 9
Bayes Classifier
1. Devi V.S.; Murty, M.N. (2011) Pattern Recognition: An Introduction, Universities Press,
Hyderabad.
2. R. O. Duda, P. E. Hart and D. G. Stork, Pattern Classification, Wiley, 2000.
Autonomous computing
Course Code Autonomous computing L T P C
3 0 0 3
Regulation 2014
Course The complexity of modern computer networks and systems, combined with the
Description extremely dynamic environments in which they operate, is beginning to outpace
our ability to manage them. Taking yet another page from the biometrics, the
autonomic computing paradigm mimics the human autonomic nervous system
to free system developers and administrators from performing and overseeing
low-level tasks. This course begins by introducing the concepts and
requirements of autonomic computing and exploring the architectures required
to implement such a system. The focus then shifts to the approaches and
infrastructures, including control-based and recipe-based concepts, followed by
enabling systems, technologies, and services.
Expected Outcome
nature
Research Challenges – The Life Cycle of an Autonomic Element – Relationships among Autonomic
Elements – Scientific Challenges – Research Projects in Autonomic Computing – University
Research Projects in Autonomic Computing - The state of Autonomic Computing Today
Text / Reference Books
Broadband Network 3 0 0 3
Regulation 2014
Description consolidates and disseminates the latest developments and advances in the area
of broadband access network technologies and architectures. It discusses the
emergent technologies developed and devised in the last few years as well as
shares the many experiences and lessons learned from the deployments of
field/testing trials of these technologies.
Expected Outcome
1. The course concludes with a discussion of the opportunities and threats posed to service
providers and
2. The communications industry by the emerging disruptive technologies of broadband
networking.
Conduct research in the area of network traffic and networking protocols.
Unit No. I: 9
Overview of internet
Concepts, challenges and history. Next Generation Internet- challenges and problems.
Multicasting in Internet.Real time communication over Internet.
Unit No. II: 9
Packet scheduling Algorithm
Requirements and choices. Admission control in internet. Differentiated Services in internet.
Internet Telephony and voice over IP (VoIP)- RTP and RTCP. Broadband ISDN and ATM
Networks- ATM protocols.
Overview of IP over ATM and its evolution to IP switching. Policy based Networking. Policy
servers. Web in Qos domain. Architecture for Web Qos.
Intelligent web browsing and web caching. Internet & web Traffic measuremnt and characterization.
Prediction for network management.
DWDM based transport network. Issues in IP over DWDM optical IP routers and switching.
A.Books
1.Chris Hellberg, Dylan Greene, Truman Boyes, “Broadband Network Architectures: Designing and
Deploying Triple-Play Services-Play Services”, Pearson Education, 2007
2. James Trulove, “Broadband Networking”, Auerbach
3. Mike Sexton, Andy Reid, “Broadband networking:ATM, SDH, and SONET”, Artech House,
ECE DEPARTMENT KALASALINGAM UNIVERSITY Page 31
M.TECH MCC REGULATION 2015
1997.
4. Marlyn Kemper Littman, “Building Broadband Networks”, CRC Press, 2002
5. Abdallah Shami, Martin Maier, Chadi Assi, “Broadband Access Networks: Technologies and
Deployments”, Springer, 2010
6. Stallings, “ISDN and Broadband ISDN with Frame Relay and ATM”, Pearson Education India.
7. Johnson I. Agbinya, Oya Sevimli, Sam Reisenfeld, “Advances in Broadband Communication and
Networks vol2”, River Publishers, 2008
8. Achille Pattavina , “Switching theory: architecture and performance in broadband ATM
networks”, J.
Wiley
9. Soung C. Liew, Tony T. Lee, “Principles of Broadband Switching and Networking”, John Wiley
& Sons,
2010
B.Magazines
Broadband Communities Magazine online, Rosenberg.
C.Journals
1. Journal of High Speed Network, ISSN: 09266801, IOS Press
2. Broadband journal, Journal of the SCTE.
3. Broadband Network, Journal of Networking Technology, Print ISSN: 0974-898X, Online ISSN:
0974- 8998
Pervasive Computing
Course Code Pervasive computing L T P C
3 0 0 3
Regulation 2014
Course This course describes a new class of mobile computing devices which are
Description becoming omnipresent in everyday life. Handhelds, phones and manifold
embedded systems make information access easily available for everyone from
anywhere at any time. But Pervasive Computing is far more than just fancy
devices: A powerful wireless communication infrastructure extends the reach of
enterprise networks to mobile clients. Web services and portal servers offer
flexible gateways to the back-end server systems and their data. And finally, a
variety of new mobile solutions and services take advantage of the possibilities
and feature mobility, connectivity, and ease-of-use.
Expected Outcome
Unit No. I: 9
INTRODUCTION
Pervasive Computing- Principles, Characteristics- interaction transparency, context aware, automated
experience capture. Architecture for pervasive computing- Pervasive devices-embedded controls.-
smart sensors and actuators -Context communication and access services
Open protocols- Service discovery technologies- SDP, Jini, SLP, UpnP protocols–data
synchronization- SyncML framework - Context aware mobile services - Context aware sensor
networks, addressing and communications- Context aware security.
Unit No. III: TECHNOLOGIES 9
Smart Tokens, Heating Ventilation and Air Conditioning, Set Top Boxes, Appliances and Home
Networking, Residential Gateway, Automotive Computing, On Board Computing Systems, In
Vehicle networks, Entertainment Systems
Text / References
1.Seng Loke, Context-Aware Computing Pervasive Systems, Auerbach Pub., New York,
2007.
2. Uwe Hansmann etl , Pervasive Computing, Springer, New York,2001.
3. Jochen Burkhardt, , Stefan Hepper, Klaus Rindtorff, Thomas Schaeck ”Pervasive
Computing-Technology and Architecture of Mobile Internet Application”,Pearson
Regulation 2014
Course Mobile Satellite Communications includes introductory material for the reader
Description new to the field, in addition to exploring prevalent system concepts,
architecture, practices and trends for the more experienced. Telecommunications
and communication system engineers, as well as technical managers and
students will find an in-depth review of scientific principles merged with
business models, presenting a true perspective of commercial mobile satellite
systems. Addresses growing convergence on fixed and mobile satellite service
for personal communications and future system evolution trends e.g. ATM, IP
technology, S-UMTS, K and higher band broadband emerging systems.
Expected Outcome
1.
Unit No. I: Introduction to Satellite Communication 9
Satellite Orbits – Satellite Constellations –Orbital Mechanics –Equation of orbit – Orbital Elements –
Look angle determination –orbital perturbation – Satellite coverage –Space environment – Eclipse –
Sun Transitoutage – Limits of isibility – sub satellite point– launching procedures and Launch
Vehicles.
Spectrum issues – Propagation characteristics and frequency considerations– Radio link analysis –
Modulation – coding and multiple access schemes and comparison of multiple access schemes.
Spacecraft Technology: Satellite subsystems – Satellite for MSS, Inter satellite links – Emerging
Technologies – Launching Satellite constellation Gateways – Mobile Terminals – Environmental
issues.
Unit No. III: System architecture 9
System planning – Service Distribution model – Investment Routes – Regulatory issues– Traffic
Forecast – Air interface –system development –network considerations and network management –
Licensing issues.
Representative MSS system – Distress and Safety Systems navigation systems – Direct Satellite
broadcast – Direct TV Broadcast system – Very Small Aperture Terminal systems Terrestrial
Cellular system
Unit No. V: Future Trends 9
Text/Reference books
1. M.Richharia, “Mobile Satellite Communications Principles & Trends”, Pearson Education, 2003
2. T.Pratt and Bostian, “Satellite Communications”,John Wiley, 2001.
3. W.L.Prichand and A.Sciulli, “Satellite Communication systems Engineering”, Prentice Hall, 1986
4. Tri.T.Ha, “Digital Satellite Communication Systems Engineering”,McGraw Hill, 1998
3 0 0 3
Regulation 2014
Course The explosive demand for mobile communications is driving the development
Description of wireless technology at an unprecedented pace. Unfortunately, this exceptional
growth is also giving rise to a myriad of security issues at all levels—from
subscriber to network operator to service provider. Providing technicians and
designers with a critical and comprehensive resource, Security of Mobile
Communications brings together the policies, practices, and guidelines needed
to identify and address the security issues related to today’s wireless sensor
networks, satellite services, mobile e-services, and inter-system roaming and
interconnecting systems. It details the major mobile standards for securing
mobile communications and examines the architectures able to provide data
confidentiality, authentication, integrity, and privacy in various wireless
environments.
Expected Outcome
1. Students will have a broad knowledge of the state-of-the-art.
2. Open problems in wireless and mobile security, thus enhancing their potential to do research
or pursue a career in this rapidly developing area. outcome
Unit No. I: 9
Security
IP Layer Security, Link Layer Security, Network Security Options. Security Issues in a Mobile IPV6
Network, Mobile Code Issues: Security Measures for Mobile Agents, Security Issues for
Downloaded Code in Mobile phone
MCommerce and its Security Challenges, Security of the radio interface Security issues in Single
Hop Wireless Networks: Cellular Network Security, Access Control and Roaming Issues, Mobile IP
Security
Unit No. III: Security Issues in Multi-hop Wireless Networks 9
Mobile Adhoc Network Security, Trust Management and Routing Issues, Wireless Sensor Network
Security, Key Management, Sybil Attacks and Location Privacy, Vehicular Networks Application
and Security, Wireless Metropolitan Area Networks (e.g.802.11b)
Unit No. IV: Cryptographic Security 9
Speech Cryptology, WAP (Wireless Access Security) and its Security Architecture, Wireless
Transport Layer Security, Optimizing Wireless Security with FPGAs and ASICs
Unit No. V: Measurements and Issues 9
Security Measures for Mobile Agents, Security Issues for Downloaded Code in Mobile phone
Text / References
A.Books
1. Man Young Rhee, “Mobile Communication Systems and Security”, John Wiley & Sons, 2009
2. Hakima Chaouchi, Maryline Laurent-Maknavicius, “Wireless and Mobile Networks Security”,
John Wiley & Sons, 2010
3. S. Kami Makki, “Mobile and Wireless Network Security and Privacy”, Springer, 2007
4. Merritt Maxim, David Pollino, “Wireless Security”, McGraw Hill Professional, 2002
5. Aaron E. Earle, “Wireless Security Handbook”, CRC Press, 2010
6. Nichols, Lekkas, “Wireless Security Models, Threats, and Solutions”, McGraw-Hill
7. Aaron E. Earle ,“Wireless Security Handbook”, Auerbach
8. Steven Furnell, “Mobile Security”, IT Governance Ltd, 2009
B. Magazines:
C. Journals:
1. International Journal of Wireless Networks and Broadband Technologies (IJWNBT), IGI.
2. International Journal of Security and Networks, ISSN online: 1747-8413, ISSN print: 1747-8405
3. International Journal of Wireless Information Networks (IJWIN), ISSN: 1068-9605 (print
version), ISSN: 1572-8129 (electronic version)
Smart antennas
Course Code Course Name L T P C
Smart Antennas 3 0 0 3
Regulation 2014
Expected Outcome
1.
Unit No. I: 9
Introduction
Spatial processing for wireless systems. Adaptive antennas. Beam forming networks
Unit No. II: 9
Advanced Receiver techniques
Digital radio receiver techniques and software radios. Coherent and non-coherent CDMA spatial
processors. Dynamic re-sectoring. Range and capacity extension – multi-cell systems.
Direction finding and true ranging PL systems. Elliptic and hyperbolic PL systems. TDOA stimation
techniques.
Regulation 2014
Expected Outcome
1.
Detection methods 9
Wireless signaling environment. Basic signal processing for wireless reception. Linear receivers for
synchronous CDMA. Blind and group-blind multiuser detection methods. Performance issues.
9
Processing
Robust multiuser detection for non Gaussian channels; asymptotic performance ,implementation
aspects. Adaptive array processing in TDMA systems. Optimum space-time multiuser detection
Prediction 9
Turbo multiuser detection for synchronous and turbo coded CDMA. Narrowband interface
suppression. Linear and nonlinear predictive techniques. Code-aided techniques. Performance
comparison.
Adaptive Equalization 9
Signal Processing for wireless reception: Bayesian and sequential Montecarlo signal
processing. Blind adaptive equalization of MIMO channels.
Differential Detection 9
Signal processing for fading channels. Coherent detection based on the EM algorithm. Decision-
feedback differential detection. Signal processing for coded OFDM systems.
Text / Reference Books
Data Mining
Course Code Course Name L T P C
Data Mining 3 0 0 3
Regulation 2014
Course data mining is about applying algorithms to data, rather than using data to
Description “train” a machine-learning engine of some sort. This course covered the
Distributed file systems and map-reduce as a tool for creating parallel
Expected Outcome
Data Warehouse and OLAP -Data Warehouse and DBMS -Multidimensional data model -OLAP
operations -Example: loan data set
Data mining knowledge representation -Task relevant data -Background knowledge -Interestingness
measures -Representing input data and output knowledge -Visualization techniques -Experiments
with Weka - visualization
Data mining algorithms: Association rules -Motivation and terminology -Example: mining weather
data -Basic idea: item sets -Generating item sets and rules efficiently -Correlation analysis -
Experiments with Weka - mining association rules
Data mining algorithms: Prediction -The prediction task -Statistical (Bayesian) classification -
Bayesian networks -Instance-based methods (nearest neighbor) -Linear models
Unit No. IV: Training and Testing 9
Basic issues in clustering -First conceptual clustering system: Cluster/2 -Partitioning methods: k-
means, expectation maximization (EM) -Hierarchical methods: distance-based agglomerative and
divisible clustering-Conceptual clustering: Cobweb-Experiments with Weka - k-means, EM,
Cobweb -Advanced techniques, Data Mining software and applications -Text mining: extracting
attributes (keywords), structural approaches (parsing, soft parsing). -Bayesian approach to classifying
text Web mining: classifying web pages, extracting knowledge from the web Data Mining software
and applications
Text / Reference Books
A.Books
Ian H. Witten and Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques
(Second Edition), Morgan Kaufmann, 2005, ISBN: 0-12-088407-0.
CDMA Technology
Course Code Course Name L T P C
CDMA TECHNOLOGY 3 0 0 3
Regulation 2014
Expected Outcome
Unit No. I: 9
The CDMA concept
Need for spread spectrum communication – Spreading codes –Direct sequence and Frequency
hopping spread spectrum communication system –Spread spectrum performance – Basic DS CDMA
– Elements – RAKE receiver – Power control – Soft handover – Inter frequency handover – Multi
user detection – Capacity –Effects of loading, sectorisation and voice activity
Unit No. II: Link structure and Call processing 9
Asymmetric links - Forward link – Pilot channel –Sync channel – Paging channel – Traffic channel –
Modulator – Reversing access channel – Traffic channel – Call processing states – Initialization state
– Idle state –Access state – Traffic channel state.
Unit No. III: CDMA Design Engineering 9
Forward Link analysis – Pilot channel – Traffic channel –Reverse link – Traffic channel – Reverse
link rise – Frequency reuse factor - PN offset planning – Short PN sequence – Co PN offset –
Adjacent PN offset.
Channel supervision-Power control parameters - Search window sizes - Field optimization – Traffic
intensity – Loads –Grade of service – Earlang–B Model - Earlang–C Model – CDMA applications –
Soft and hard blocking.
Physical channel – Multirate design – Spreading technique –Advanced error control techniques –
Coherent detection – Inter operability in next generation CDMA – Multicarrier CDMA option –
Forward link – Reverse link.
Text / Reference Books
1.Samuel C Yang, “CDMA RF System Engineering”, - Artech House Mobile
Communication Library , 1998.
2. John B.. Groe and Lawrence E. Larson, “ CDMA Mobile Radio Design”, Artech
house 2000.
3. Kamil SH.Zingangirav, “Theory of Code Division Multiple Access
Communication”, IEEE press – Wiley Interscience, 2004.
Regulation 2014
Course This course has addressed the few challenges to ensure the success of UWB
Description technologies and covers several research areas including UWB low cost
transceiver, low noise amplifier (LNA), ADC architectures, UWB filter, and
high power UWB amplifiers. It is believed that this course serves as a
comprehensive reference for graduate students in UWB technologies.
Expected Outcome
1.
Unit No. I: 9
INTRODUCTION TO UWB
History, Definition, FCC Mask, UWB features, UWB Interference: IEEE 802.11.a Interference,
Signal to Interference ratio calculation, Interference with other wireless services
Unit No. II: 9
UWB TECHNOLOGIES AND CHANNEL MODELS
Impulse Radio , Pulsed Multiband, Multiband OFDM, features : Complexity, Power Consumption,
Security and achievable data rate. MIMO Multiband OFDM, Differential multiband ofdm ,
Performacne characterization Ultra Wide Band Wireless Channels
Channel model: Impulse Response Modeling of UWB Wireless Channels, IEEE UWB channel
model, Path loss, Delay profiles, Time and frequency modeling.
Data Modulation schemes, UWB Multiple Access Modulation, BER, Rake Receiver,
TransmitReference (T-R)Technique,UWBRange-Data Rate Performance, UWB Channel Capacity
UWB Wireless Locationing: Position Locationing Methods, Time of Arrival Estimation, NLOS
Location Error , Locationing with OFDM.
Antenna Requirements, Radiation Mechanism of the UWB Antennas, Types of Broad band
antennas, Parameters, Analysis of UWB Antennas, Link Budget for UWB System. Design
examples of broad band UWB antennas.
Wireless Ad hoc Networking, UWB Wireless Sensor, RFID , Consumer Electronics and Personal
,Asset Location, Medical applications UWB Regulation and standards in various countries , UWB
Regulation in ITU, IEEE Standardization
1.Homayoun Nikookar and Ramjee Prasad, “Introduction to Ultra Wideband for Wireless
Communications”1st Edition, Springer Science & Business Media B.V. 2009.
2. Thomas Kaiser, Feng Zheng “Ultra Wideband Systems with MIMO”, 1st Edition, John Wiley &
Sons Ltd, Newyork, 2010.
3. W. Pam Siriwongpairat and K. J. Ray Liu, “Ultra-Wideband Communications Systems:
Multiband OFDM approach” John Wiley and IEEE press, Newyork 2008.
Regulation 2014
Course
Description
Expected Outcome
1.
Unit No. I: 9
Switching
Performance and architectural issues: Packet switches- Circuit switches.Time and Space division
switching - Point to point circuit switching – multistage switching network - Paull’s matix for
representing connections - Strict sense nonblocking Clos network.Generalized circuit switching-
Cross Point Complexity (CPC)-Fast packet switching- Self routing Banyan networks- Combinatorial
limitations of Banyan networks.
Output conflicts- HOL blocking.Traffic analysis: Traffic measurements, arrival distributions, Poisson
process, holding/service time distributions, loss systems, lost calls cleared – Erlang-B formula, lost
calls returning and lost calls held models, lost calls cleared and held models with finite sources, delay
systems, Little’s theorem, Erlang-C formula , M/G/1 model. Blocking probability: Analysis of single
stage and multistage networks –Blocking for Unique path routing- Alternate path routing- The Lee
approximation – The Jacobaeus method.
Multiplexing: Network performance and source characterization; Stream sessions in packet networks
-deterministic analysis, stochastic analysis, circuit multiplexed networks;Elastic transfers in packet
networks- adaptive bandwidth sharing.
blocking analysis in circuit multiplexed networks, with single rate or multirate traffic- Models for
performance analysis of integrated packet networks; deterministic models, worst case analysis;
Unit No. V: Traffic flow 9
Stochastic models, large deviations analysis. The effective Bandwidth approach for Admission
control - Models for traffic flow in packet networks, long range dependence and self similar
processes.
3 0 0 3
Regulation R2014
Course The rapid growth in mobile communications has led to an increasing demand for
Description wideband high data rate communications services. In recent years, the
Distributed Antenna System (DAS) has emerged as a promising candidate
beyond 3G and 4G mobile communications which leads to different mobile
architecture.
Expected Outcome
1.
Architectural models – Client-Server model, Thin Client, Mobile Devices. Software agents.
Fundamental models – Interaction, Failure and Security models. Interprocess Communication: API for
Internet protocols. External data representation and Marshalling. Client-Server communication and
Group communication.
Unit No. II: Distributed File Systems 9
File service architecture. Sun NFS. Recent advances. Name Services: Basic principles of Name
Services. Domain Name System. Directory and discovery services. Locating Mobile entities. Case
studies. Coordination and Agreement:
Unit No. III: Distributed transactions 9
Flat and nested transactions. Atomic commit protocols. Concurrency control in distributed
transactions. Distributed deadlocks. Transaction recovery.
Distributed Snapshot Global State Collection Important Case Studies.
Elections. Consensus and related problems. Clock Sunchronization Transactions and Concurrency
Control: Fundame
ntal principles. Transactions and nested transactions. Locks. Optimistic concu
rrency control. Timestamp ordering.
Communication between distributed objects. Remote Procedure Call. Remote Object Invocation.
Events and notification. Message- and Stream-oriented communication. Case study: CORBA and
DCOM.
References
A.Books
1. Distributed Systems : Concepts and Design - George Coulouris, Jean Dollimore, and Tim
Kindberg.
2. Introduction to Reliable Distributed Programming - Rachid Guerraoui and Louis Rodrigues,
Springer-Verlag, Berlin, Germany, 2006.
3. Distributed Systems: Principles and Paradigms - Andrew Tanenbaum and Maarten van Steen,
Prentice Hall, 2007.
4. Elements of Distributed Computing - Vijay K. Garg, Wiley, 2002.
5. Research Papers
Regulation 2014
Course Outcome
1. Understand the unique aspects of mobile application design.
Unit No. I: 9
Introduction
Android Development Environment Factors in Developing Mobile Applications-Mobile
Software Engineering-Frameworks and Tools Generic UI Development Android User VUIs
and Mobile Apps a.In Text -to-Speech Techniques-b.Designing the Right UI c.Multichannel
and Multimodial UIs
Storing and Retrieving Data-a.Synchronization and Replication of Mobile Data b.Getting the
Model Right c.Android Storing and Retrieving Data d.Working with a Content
Provider6.Communications Via Network and the Web a.State Machine b.Correct
Communications Model c.Android Networking and Web
Unit No. III: 9
Regulation 2014
Course
Description
Expected Outcome
1.
Unit No. I: 9
Conventional Telephony and data protocols
The Evolution of the Telephone Network, Digitizing Speech, PSTN Architecture, Signaling in the
Local Loop, Signaling in the Network, SS7, Call-Setup, Voice and Wireless Networks, The TCP/IP
Transport Layer, Transmission Control Protocol (TCP), User Datagram Protocol (UDP).
Network Architecture, 802.11 Framing, Accessing the Medium, PHY, voWLAN, System Capacity
and QoS, Packet Sizes, Packetization Overheads, DCF Overheads, Transmission Rate, Inherent
Fairness Among All Nodes, PCF, Admission Control, Security, Roaming/Handoffs in 802.11
Unit No. IV: QoS and Security issues 9
802.11e, WME and “Vanilla” WLANs, Traffic Categories, Voice Data Coexistence, Achieving QoS
for VoWLAN, System Capacity, Authentication in 802.1, Open System Authentication, Shared Key
Authentication, Authentication and Handoffs, Confidentiality in 802.1, Data Integrity in 802.11,
Loopholes in 802.11 Security, WPA.
Unit No. V: Roaming and Power Management 9
Types of Roaming, Roaming Issues, Roaming and Voice, Scanning Types, Scanning Strategies,
Inter-ESS Roaming, The Need for Power Management, Power-Aware System Design, Implementing
Power Management
1.Praphul Chandra and Lide : Wi-Fi Telephony Challenges and Solutions for Voice over WLANs-
2007, Elsevier Inc.
2.Comer, Douglas E. : Internetworking With Tcp/Ip : Principles, Protocols, And
Architecture Vol. I- Phi Learning
3.Jonathan Davidson, James Peters, Brian Gracely : Voice over IP Fundamentals-Cisco Press
Mobile Databases 3 0 0 3
Regulation 2014
Course This course includes important milestones in the history and development of
Description mobile data processing, the text provides the information, tools, and resources
needed for MDS management, and the fundamentals of wireless communication
and Location conventional database management systems and why existing
approaches are not adequate for mobile databases
Expected Outcome
2. Distributed database and mobile database system.
3. Difference between conventional & mobile database, different tools, techniques, query
languages, locking techniques etc.
Unit No. I: 9
Introduction
Introduction to conventional databases, distributed database mobile data access system:
mobility issues, on-demand services, broadcast services, transaction processing, security moving
Unit No. II: 9
Object Databases:
Basic concepts and challenges, accessing methods of moving object databases, current information
oriented indexing, historical information oriented information, mixed-type indexing, indexing
moving object with special characteristics moving object.
Unit No. III: Queries 9
basic Queries (nearest neighbor query, range query), advanced queries (density query, continuous
query) trends and open issue
Unit No. IV: Introduction of Concurrency control mechanism 9
Ways of Locking Data items, Phantom problems, Multi granularity locking, Heuristic approach in
locking scheme, Non-locking based scheme, Optimistic Concurrency control mechanisms, Two
phase locking for Distributed database systems.
Unit No. V: Applications 9
Fully Connected Information Space Personal Communication System (PCS) Mobile Database
Systems (MDS) Transaction Management Data Caching Query Processing Data Classification
Mobile Database recovery
A. Books
1. Kumar Vijay, “Mobile database systems”. John Willy & sons.
2. Robert Laberge, Srdjan Vujosevic, “Building PDA Databases for Wireless and Mobile
Development” Wiley
3. David Taniar, “Mobile Database Query Processing”, Wiley, 2013
4. Lars Frank, “Design of Distributed Integrated Heterogeneous Or Mobile Databases”, Lambert
Academic Publishing, 2010
5. Yongyan Huang, “A Restricted Precedence Concurrency Control Protocol for Mobile Distributed
Database Systems”, ProQuest, 2006
B. Magazines:
C. Journals:
1. International Journal of Intelligent Information and Database Systems, ISSN online: 1751-5866,
ISSN print: 1751-5858.
2. Journal of Parallel and Distributed Computing.
Mode of Evaluation Tests, Assignments and Seminar
Green computing
Course Code Green Computing L T P C
3 0 0 3
Regulation 2014
Course Tackling Energy Efficiency at Large Scale explores seminal research in large-
Description scale green computing. It begins with low-level, hardware-based approaches and
then traverses up the software stack with increasingly higher-level, software-
based approaches. In the beginning, the IBM Blue Gene team illustrates how to
improve the energy efficiency of a supercomputer by an order of magnitude
without any system performance loss in parallelizable applications. The next
few chapters explain how to enhance the energy efficiency of a large-scale
computing system via compiler-directed energy optimizations, an adaptive run-
time system, and a general prediction performance framework. The book then
explores the interactions between energy management and reliability and
describes storage system organization that maximizes energy efficiency and
reliability. It also addresses the need for coordinated power control across
different layers and covers demand response policies in computing centers.
Expected Outcome
1. Explore and understand different research areas of green computing to minimize energy
consumption, reducing Green House Gases.
2. Different tools and simulators for measuring power usages efficiencies,
3. Changing existing networking protocols, result analysis, comparison of both existing and new
proposed approach etc
Unit No. I: 9
Introduction
Origins, Regulations and industry initiatives- Government, Industry. Approaches to green
computing- Product longevity, Algorithmic efficiency, Resource allocation.
Unit No. II: Virtualization 9
Green Maturity model for Virtualization, Virtualization level : Level0, Level 1, Level 2, Level 3.
Terminal servers, Power management, Operating system support, Power supply, Storage, Video card,
Display.
Web, Temporal and Spatial Data Mining Materials recycling, Telecommuting. Thin Clients:
Introduction of thin clients, Characteristics of thin clients, Thin Clients variants
Unit No. III: Environmentally Sustainable Infrastructure Design 9
Middleware Support for green computing, Tools for monitoring, HPC computing, Green Mobile,
embedded computing and networking, Management Frameworks Standards and metrics for
computing green
Unit No. V: Green Networking: 9
Where to save energy in Wired Networking, Taxonomy of Green Networking research: Adaptive
Link rate, Interface Proxying, Energy ware Infrastructure, Energy ware Application.Efficient-
Efficient Data Canters: Reason for over power consumption in data centers, Data Center
Management Architecture in greener perspective. Green Cellular Networking: Survey, Measuring
Greenness matrics, Energy Saving in Base Stations, Research Issues, Challenges, Future Generation
Wireless Systems, Wireless Sensor Network for Green Networking
Text / References
A. Books
1. Bud E. Smith, “Green Computing: Tools and Techniques for Saving Energy, Money, and
Resources”, Auerbach Publications.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Green IT: Reduce Your Information System's
Environmental Impact While Adding to the Bottom Line”, MC-Grow Hill
3. Jason Harris , “Green Computing and Green IT Best Practices on Regulations and Industry
Initiatives, Virtualization, Power Management, Materials Recycling and Telecommuting”, Emereo
Publishing
4. John Lamb , “The Greening of IT-How Companies Can Make a Difference for the Environment”,
Pearson Education
5. Greg Schulz , “The Green and Virtual Data Center”, CRC Press
6. F. Richard Yu, Xi Zhang, Victor C.M. Leung, “Green Communications and Networking”, CRC
Press.
7. Daniel Minoli, “Designing Green Networks and Network Operations: Saving Run-the-Engine
Costs”, CRC Press.
8. Gary Moore, “The Dark Side of Green: The Unintended Consequences of the Climate Change
Movement”, CRC Press, April 2011.
9. Bhuvan Unhelkar. “Handbook of Research on Green ICT: Technology, Business and Social
Perspectives”, IGI-Global, 2010.
10. Bhuvan Unhelkar, “Green IT Strategies and Applications: Using Environmental
Intelligence”, CRC Press, March 2011
11. Wu-chun Feng, “Green Computing: Large-Scale Energy Efficiency”, CRC Press.
January 2011
B. Magazines:
1. The Wireless Age, Wireless Press, Inc.
2. TechNet Magazine, Microsoft.
3. Smart Computing.
C. Journals:
1. International Journal of Green Computing
2. Sustainable Computing: Informatics and Systems.
3. Computing Now! Special issue of Green IT
4. Jan/Feb 2011 issue of IEEE IT Professional: Special issue on Green IT
Mode of Evaluation Tests, Assignments and Seminar
3 0 0 3
Regulation R2014
Course The Global Positioning System and Geographical Information Systems, working
Description in tandem, provide a powerful tool. Recent developments such as the removal of
Selective Availability have not merely made these technologies more accurate
but have also opened up a new seam of applications, particularly in location
based services. The Global Positioning System and GIS is a clear text and guide
to the use and integration of these powerful technologies, with each topic
combining an overview with a step-by-step approach. This significantly revised
and extended second edition now comes with a set of resources on a CD-ROM,
including an instructor's guide, demonstration data and exercises. It is a
straightforward introductory text for students and teachers on GIS/GPS courses
as well as a practical and introductory field manual for mapping science
professionals, giving basic practical guidance, particularly to the integrated use
of ESRI's GIS software with Trimble's GPS hardware.
Expected Outcome
History of GPS – BC-4 System – HIRAN – NNSS – NAVSTAR GLONASS and GNSS Systems –
GPS Constellation – Space Segment – Control Segment – User Segment –Single and Dual Frequency
– Point – Relative – Differential GPS – Static and Kinematic Positioning – 2D and 3D – reporting
Anti Spoofing (AS); Selective Availability (SA) – DOP Factors
Unit No. II: Coordinate Systems 9
Coordinate Systems – Geo Centric Coordinate System – Conventional Terrestrial Reference System –
Orbit Description – Keplerian Orbit – Kepler Elements – Satellite Visibility – Topocentric Motion –
Disturbed Satellite Motion – Perturbed Motion – Disturbing Accelerations - Perturbed Orbit – Time
Systems – Astronomical Time System – Atomic Time – GPS Time – Need for Coordination – Link to
Earth Rotation – Time and Earth Motion
Services
Unit No. III: Pseudo Ranges 9
C/A code; P-code; Y-code; L1, L2 Carrier frequencies – Code Pseudo Ranges – Carries Phases –
Pseudo Ranges – Satellite Signal Signature – Navigation Messages and Formats – Undifferenced and
Differenced Range Models – Delta Ranges – Signal Processing and Processing Techniques – Tracking
Networks – Ephemerides – Data Combination: Narrow Lane; Wide Lane – OTF Ambiguity.
Unit No. IV: Propagation Media 9
References
A.Books
1. B.Hoffman - Wellenhof, H.Lichtenegger and J.Collins, "GPS: Theory and Practice", 4th
revised edition, Springer, Wein, New york,1997
2. A.Leick, "GPS Satellites Surveying", 2nd edition, John Wiley & Sons,NewYork,1995
3. B.Parkinson, J.Spilker, Jr.(Eds), "GPS: Theory and Applications", Vol.I & Vol.II, AIAA, 370
L'Enfant Promenade SW, Washington, DC 20024, 1996
4. A.Kleusberg and P.Teunisen(Eds), “GPS for Geodesy”, Springer-Verlag, Berlin,1996
5. L.Adams, "The GPS - A Shared National Asset”, Chair, National Academy Press,
Washington, DC, 1995
Multimedia computing
Course Code Multimedia Computing L T P C
3 0 0 3
Regulation 2014
Course Multimedia computing has emerged as a major area of research. Coupled with
Description high-speed networks, multimedia computer systems have opened a spectrum of
new applications by combining a variety of information sources, such as voice,
graphics, animation, images, audio, and video.
Expected Outcome
1. Able to create substantial and well-engineered web sites, 2D and 3D media, audio and video,
animation, involving a variety of media, through the use of a number of key professional
tools.
2. Understand the characteristic of human’s visual system
3. Understand the characteristics of human’s audio system; be able to take into considerations in
multimedia techniques design and implementation.
Unit No. I: 9
Introduction
Line - Curve and Ellipse Drawing Algorithms – Attributes – Two-Dimensional Geometric
Transformations – Two-Dimensional Clipping and Viewing.
Unit No. II: Three-Dimensional Concepts 9
Compression & Decompression – Data & File Format standards – Multimedia I/O technologies -
Digital voice and audio – Video image and animation – Full motion video – Storage and retrieval
Technologies.
Unit No. V: Hypermedia 9
7. Judith Jeffcoate, “Multimedia in practice technology and Applications”, PHI, 1998. 8. Foley,
Vandam, Feiner, Huges, “Computer Graphics: Principles & Practice”, Pearson Education, second
edition 2003.
9. Daniel Cunliffe, Geoff Elliott, “Multimedia Computing”, Lexden Publishing Limited, 2005
B. Magazines:
C. Journals:
1. ACM Transactions on Multimedia Computing, Communications and Applications, ACM
2. International Journal of Multimedia Information Retrieval, ISSN: 2192-6611 (print version), SSN:
2192-662X (electronic version)
3. International Journal of Multimedia and Ubiquitous Engineering, SERSC.
4. International Journal of Multimedia Intelligence and Security, ISSN online: 2042-3470, ISSN
print: 2042-3462
Mode of Evaluation Tests, Assignments and Seminar
Mobile Commerce
Course Code Course Name L T P C
Mobile Commerce 3 0 0 3
Regulation 2014
Expected Outcome
1.
Unit No. I: 9
Introduction
Objectives Scope GS1 - creating a favourable environment for mobile commerce Target audience
Methodology Mobile Commerce Overview: The mobile industry - Mobile phones: revolutionary
devices- Mobile Commerce: beyond e-commerce - Mobile marketing: towards personalisation -
success factors for mobile commerce
Unit No. II: 9
Business Application
Identification Keys -Data Carriers -Mobile Devices -Network providers and technologies -
Information Providers
Wireless Infrastructure, Mobile middleware, wireless User Infrastructure, Security and Risks,
Counter measures.
Magazine
“Mobile Commerce: opportunities and challenges A GS1 Mobile Com White Paper
February 2008 Edition”