M.Tech (Computer Science and Engineering) (Four Semesters / Full Time) Curriculum
M.Tech (Computer Science and Engineering) (Four Semesters / Full Time) Curriculum
M.Tech (Computer Science and Engineering) (Four Semesters / Full Time) Curriculum
CURRICULUM
SL Code Course L T P C TC
No
Semester – I
Theory
1 MA611 Mathematical Foundations of Computer 3 1 0 3
Science
2 CS601 Computer Architecture 3 1 0 3
3 CS602 Data Structures and Analysis of Algorithms 3 0 2 4
4 CS603 Operating Systems 3 0 2 4
5 CS604 Software Engineering Methodologies 3 0 0 3
6 CS605 Computer Networks and Management 3 0 2 4
Practical
1 CS606 Java Programming Lab 1 0 3 2
Total 23
Semester – II
Theory
1 CS607 Database Technology 3 0 0 3
2 CS608 Service Oriented Architecture 3 0 0 3
3 CS609 Mobile Computing 3 0 0 3
Semester – III
Theory
Practical
Semester – IV
Practical
1 CS703 Project – Phase II 0 0 24 18
Total 18
Total Credits = 75
Total Number of Theory Courses : 16
Total Number of Case Studies :1
Total Number of Practical Courses : 2
SL Code Course L T P C
No
SEMESTER – I
UNIT II LOGIC 9
TOTAL = 45
TEXT BOOK
REFERENCES
Compiler techniques for exposing ILP – Static branch prediction – Static multiple issue:
VLIW – Advanced compiler support – Hardware support for exposing parallelism –
Hardware Vs software speculation. Mechanism – IA 64 and Itanium processor.
Cache performance – Reducing cache miss penalty and miss rate – Reducing hit time –
Main memory and performance – Memory technology. Types of storage devices –
Buses – RAID – Reliability, availability and dependability – I/O performance measures –
Designing I/O system.
TOTAL= 45
TEXTBOOK
Algorithm analysis techniques – Abstract data structure – Time and space analysis of
algorithms – Big oh and theta notations – Average, best and worst case analysis –
Simple recurrence relations – Arrays, lists, stacks, queues – Array and linked structure
implementations of lists, stacks, queues – Array of nodes and dynamic pointer
implementations of linked structures.
UNIT II TREES 10
General and binary trees – Representations and traversals – General trees as binary
trees – Binary search trees – Applications – The concept of balancing and its
advantages – AVL trees – 2–3 trees – Red-black trees – Self–adjusting trees – Graphs
and digraphs – Representations – Breadth and depth first searches – Connectivity
algorithms – Shortest path – Minimal spanning tree – The union find problem –
Hamiltonian path and travelling salesperson problems – Network flow – Articulation
points and Biconnected components.
Greedy methods – Application to bin packing, loading, and knapsack problems –Divide
and conquer – Knapsack and min–max problem – Dynamic programming – 0/1
knapsack problem, recursive and iterative solutions – Local Search Algorithms –
Influence of data structure on algorithm performance.
UNIT V NP vs. P 7
The spaces P and NP – Polynomial reduction – NP complete problems – Boolean
satisfiability and Cook's theorem – Bin packing – Knapsack – Hamiltonian path –TSP –
Independent set – Max clique – Graph coloring – Approximation algorithms.
TOTAL= 45
REFERENCES
1. Aho, J. Hopcroft and J. Ullman, “The Design and Analysis of Computer Algorithms”,
Addison Wesley, 1974.
2. Baase and Gelder, “Computer Algorithms: Introduction to Design and Analysis”, 3 rd
edition, Addison Wesley, 2000.
3. Gilles Brassard and Paul Bratley, “Algorithmics”, Prentice Hall, 1988.
4. Donald Knuth, “The Art of Computer Programming”, 3 volumes, various editions,
Addison Wesley, 1973–81.
5. Robert Kruse, “Data Structures and Program Design “, Prentice Hall, 1984.
6. Udi Manber, “Introduction to Algorithms”, Addison Wesley, 1989.
7. Robert Sedgewick, “Algorithms”, 2nd edition, Addison Wesley, 1988.
8. Thomas H. Cormen (CLRS), “Introduction to Algorithms”, 2 nd edition, Prentice Hall of
India, 2003.
9. Alfred V. Aho, Jeffrey D. Ullman, John E. Hopcroft,“ Data Structures and
Algorithms”, Addison Wesley, 1983.
10. Horowitz and Sahni, “Fundamentals of Computer Algorithms”, Computer Science
Press, 1984.
UNIT I INTRODUCTION 7
File concepts – Access methods – Directory structure – File protection – File system
implementation: File system structure and implementation – Directory implementation –
Allocation methods free space management – Recovery – Disk structure – Disk
scheduling.
Design issues in distributed operating system – Distributed file systems – Naming and
transparency – Remote file access – Stateful versus Stateless service – Distributed
coordination – Event ordering – Mutual exclusion – Atomicity – Concurrency control–
Deadlock handling – Election algorithms – Case study – Linux.
TOTAL= 45
TEXTBOOKS
REFERENCES
Software testing – Strategies – Issues – Test strategies for conventional and object
oriented software – Validation and system testing – Testing tactics: White box testing,
Basis path testing – Control structure testing – Black box testing – Object oriented
testing – Testing GUI – Testing Client/Server –Documentation testing.
TOTAL = 45
TEXTBOOKS
REFERENCES
Principles of network applications – The Web and HTTP – File transfer: File transfer
protocol – DNS – Peer–to–Peer applications – Socket programming – Transport – layer
and services – Multiplexing and demultiplexing – Connectionless transport: User
datagram protocol – Principles of reliable data transfer – Connection–oriented transport:
Principles of congestion control – Congestion control mechanism.
UNIT III THE NETWORK LAYER AND THE LINK LAYER AND LOCAL
AREA NETWORKS 9
Introduction – Virtual circuit and datagram networks – Internet Protocol (IP): Routing
algorithms – Routing in the Internet – Broadcast and multicast routing – Link layer :
Services – Error–detection and correction techniques – Multiple access protocols –
Link–layer addressing – Ethernet – Link-layer switches – Point-to-Point protocol – Link
virtualization: A Network as a Link Layer.
Introduction – Wireless links and network characteristics – WiFi: 802.11 Wireless LANs
– Cellular internet access – Mobility management: Mobile IP – Managing mobility in
cellular networks – Impact on higher–layer protocols – Multimedia networking
applications – Streaming stored audio and video – Making the best of the Best–effort
service – Protocols for real–time interactive applications – Quality of service
guarantees.
TOTAL = 45
TEXT BOOKS
1. James F. Kurose and Keith W. Ross, “Computer Networking: A Top–Down
Approach”, 4th edition, Addison–Wesley, 2007.
REFERENCES
1. Larry Peterson and Bruce Davie, “Computer Networks: A System Approach”, 4th
edition, Morgan Kaufmann, 2007.
2. C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Networks: Architectures and
Protocols”, Prentice Hall, 2004.
3. William Stallings, “Wireless Communications & Networks”, 2 nd edition,
Prentice Hall, 2005.
4. Jochen Schiller, “Mobile Communications”, 2nd edition, Addison–Wesley, 2003.
SEMESTER – II
Schedules – Concurrency control – Objects and semantic commutativity – Locking –Crash, abort
and media failure – Recovery – Atomic termination – Distributed deadlock – Global serialization
– Replicated databases – Distributed transactions in Real world.
TOTAL = 45
REFERENCES
1. Philip M. Lewis, Arthur Bernstein and Michael Kifer, “Databases and Transaction
Processing: An Application–Oriented Approach”, Addison–Wesley, 2002.
2. R. Elmasri and S.B. Navathe, “Fundamentals of Database Systems”, 3 rd edition, Addison
Wesley, 2004.
3. Abraham Silberschatz, Henry. F. Korth and S.Sudharsan, “Database System Concepts”, 4th
edition, Tata McGraw Hill, 2004.
4. Raghu Ramakrishnan and Johannes Gehrke, “Database Management Systems”, 3rd edition,
TMH, 2003.
Service oriented design – Web service description language (WSDL) – Related XML
schema – WSDL language basis – SOAP language basis – Service interface design
tools – SOA comparison guide lines – Industry standards – XML AWSOA – WSDL and
SOA – SOAPAWAOA – SOA extension.
UNIT V 11
TOTAL = 45
TEXT BOOK
REFERENCES
1. Thomas Erl , “Service–Oriented Architecture: A Field Guide to Integrating XML and Web
Services ”, The Prentice Hall, Service–Oriented Computing Series, 2004.
2. Thomas Erl, “SOA Principles of Service Design”, Prentice Hall Service–Oriented Computing
Series, 2007.
3. Shankar Kambhampaty, “Service Oriented Architecture for Enterprise Applications”, 1 st
edition, Wiley India Private Limited, 2008.
4. Mike Rosen, Boris Lublinsky, Kevin T. Smith and Marc J. Balcer, “Applied SOA Service
Oriented Architecture And Design Strategies”, Wiley India Private Limited, 2008.
5. Eric Newcomer Greg Lomow, “Understanding SOA with Web Services”, Pearson
Education, 2nd edition, 2008.
6. Paul. C. Brown, “Implementing SOA Total Architecture in Practice”, Pearson Education,
2009.
7. Nicolai M. Josuttis, “SOA in Practice, The Art of Distributed System Design”, 2 nd edition,
2008.
UNIT I INTRODUCTION 9
Medium access control : Motivation for specialized MAC – SDMA – FDMA – TDMA –
CDMA – Comparison of access mechanisms – Tele communications : GSM – DECT–
TETRA – UMTS – IMT–200 – Satellite Systems: Basics – Routing – Localization –
Handover – Broadcast systems: Overview – Cyclic repetition of data – Digital audio
broadcasting – Digital video broadcasting.
Traditional TCP – Indirect TCP– Snooping TCP – Mobile TCP – Fast retransmit/ Fast
recovery – Transmission/Timeout freezing – Selective retransmission – Transaction
oriented TCP.
UNIT V WAP 9
Grid computing organizations and their roles – Grid computing analog – Grid computing
road map.
Merging the grid sources – Architecture with the Web devices architecture.
UNIT IV TECHNOLOGIES 9
OGSA – Sample use cases – OGSA platform components – OGSI – OGSA basic
services.
Globus Toolkit – Architecture, Programming model, High level services – OGSI .Net
middleware Solutions.
TOTAL = 45
REFERENCES
1. Joshy Joseph and Craig Fellenstein, “Grid Computing”, Prentice Hall of India, 2003.
2. Ahmar Abbas, “Grid Computing: A Practical Guide to technology and Applications”,
Charles River media, 2003.
CS611 DBMS LAB 103 2
The basic idea of this case study is to encourage problem solving, logical
thinking and analytical capability attacking real time problems. The concepts
focused are problem decomposition, problem definition, analysis, synthesis and
methodology to solve complex problems.
The student will work on new algorithms or modify the existing algorithms
suitable to the problem that is given to him/her.
The student will also implement the algorithmic design that he has made and
show some output after implementation.
SEMESTER – III
Frame relay networks – Asynchronous transfer mode – ATM protocol architecture, ATM
logical connection, ATM cell – ATM service categories – AAL. High speed LAN’s: Fast
Ethernet, Gigabit Ethernet, fiber channel – Wireless LAN’s applications, requirements –
Architecture of 802.11.
RSVP – Goals and characteristics, Data flow, RSVP operations, Protocol mechanisms –
Multiprotocol label switching – Operations, Label stacking, Protocol details – RTP –
Protocol architecture, Data transfer protocol, RTCP.
TOTAL = 45
TEXTBOOK
REFERENCES
Advanced encryption standard – Evaluation criteria for AES, AES Cipher. Contemporary
symmetric ciphers – Triple DES, Blowfish, RC5 – Characteristics of advanced
symmetric block ciphers – RC4 stream cipher. Confidentiality using symmetric
encryption – Placement of encryption function – Traffic confidentiality, Key Distribution,
and Random Number Generation.
Public key cryptography and RSA – Principles of public key cryptosystems, RSA
Algorithm. Key management and other public key cryptosystems – Key management,
Diffie–Hellman key exchange, Elliptic curve arithmetic, Elliptic curve cryptography.
Message Authentication and Hash Functions – Authentication requirements,
Authentication functions, Message authentication codes, Hash functions and MACs.
Hash algorithms – MD5 Message Digest algorithm. Secure hash algorithm– RIPEMD
160– HMAC. Digital signatures and Authentication protocols – Digital signatures,
Authentication protocols, Digital signature standards.
TOTAL = 45
REFERENCES
1. William Stallings, “Cryptography and Network Security”, 3rd edition, Prentice Hall of
India, New Delhi, 2004.
2. William Stallings, “Network Security Essentials”, 2 nd edition, Prentice Hall of India,
New Delhi, 2004.
3. Charlie Kaufman, “Network Security: Private Communication in Public World”, 2 nd
Edition, Prentice Hall of India, New Delhi, 2004.
ELECTIVES
Finite automata and Regular languages – Regular expressions and Regular languages
– Non determinism and Kleenes theorem, Equivalence of DFA and NFA, Finite
automation with e–moves, Equivalence of regular expression and NFA with e–moves –
Pumping lemma for regular sets.
TOTAL = 45
TEXT BOOKS
Introduction to neuro-fuzzy and soft computing – Fuzzy sets – Basic definition and
terminology – Set-theoretic operations – Member function formulation and
parameterization – Fuzzy rules and Fuzzy reasoning – Extension principle and Fuzzy
relations – Fuzzy If–then rules – Fuzzy reasoning – Fuzzy inference systems –
Mamdani fuzzy models – Sugeno fuzzy models – Tsukamoto fuzzy models – Input
space partitioning and fuzzy modeling.
UNIT II OPTIMIZATION 8
TOTAL= 45
REFERENCES
UNIT I 9
UNIT II 9
UNIT III 9
UNIT IV 9
UNIT V 9
TOTAL = 45
REFERENCES
UNIT I INTRODUCTION 9
UNIT V APPLICATIONS 9
Simple applications – Internet commerce – Database connectivity – Online databases –
EDI Applications in business – Plug-ins – Firewalls.
TOTAL= 45
REFERENCES
1. Deitel, Deitel and Neito, “Internet And World Wide Web – How to program”, Pearson
Education Asia, 2001.
2. D.Norton and H. Schildt, “Java 2: The complete Reference”, Tata McGraw-Hill
publications, 2000.
3. Elliotte Rusty Herold, “Java Network Programming”, O’Reilly Publications, 3 rd edition,
2004.
4. Eric Ladd and Jim O’Donnell, “Using HTML 4, XML, and JAVA1.2”, Prentice hall of
India publications, 2003.
5. Jeffy Dwight, Michael Erwin and Robert Nikes, “Using CGI”, Prentice hall of India
publications, 1997.
CSY005 XML AND WEB SERVICES 3 0 0 3
UNIT I INTRODUCTION 9
Role of XML – XML and the Web – XML language basics – SOAP – Web services –
Revolutions of XML – Service oriented architecture (SOA).
TOTAL= 45
REFERENCES
1. Frank. P. Coyle, “XML Web services and The Data revolution”, Pearson Education,
2002.
2. Ramesh Nagappan, Robert Skoczylas and Rima Patel Sriganesh, “ Developing Java
Web Services”, Wiley Publishing Inc., 2004.
3. Sandeep Chatterjee and James Webber, “Developing Enterprise Web Services”,
Pearson Education, 2004.
4. McGovern, “Java Web Services Architecture”, Morgan Kaufmann Publishers, 2005.
UNIT I INTRODUCTION 7
Central dogma – Killer application – Parallel universes – Watson’s definition – Top
down Vs bottom up approach – Information flow – Conversance – Communications.
TOTAL = 45
REFERENCES
Traditional and multimedia file systems – Caching policy – Batching – Piggy backing –
Ethernet – Gigabit Ethernet – Token ring – 100VG AnyLAN-Fiber Distributed Data
Interface (FDDI) – ATM networks – MAN – WAN.
UNIT IV COMMUNICATION 9
UNIT V SYNCHRONIZATION 9
TOTAL= 45
REFERENCES
1. Ralf Steinmetz and Klara Nahrstedt, “Multimedia systems”, Springer, 1st edition,
2004.
2. Ralf Steinmetz and Klara Nahrstedt , “Media Coding and Content Processing”,
Prentice Hall of India, 2002.
3. Vaughan T, “Multimedia”, Tata McGraw Hill, 1999.
4. Mark J.B. and Sandra K.M., “Multimedia Applications Development using DVI
technology”, Tata McGraw Hill, 1992.
5. K.R.Rao, Zoran S. Bojkovic, Dragorad A. Milovacovic and D. A. Milovacovic,
“Multimedia Communication Systems: Techniques, Standards, and Networks”,
Prentice Hall of India, 1st edition, 2002.
6. Ze-Nian Li and Mark S. Drew, “Fundamentals of Multimedia”, Pearson Education,
2004.
UINT I INTRODUCTION 9
Purpose of testing – A model for testing – A taxonomy of bugs – Path testing –
Predicates, path predicates and achieving paths – Path sensitizing – Path
instrumentation – Implement and application of path testing.
UNIT V IMPLEMENTATION 9
TOTAL = 45
REFERENCES
1. Boris Beiser, “Software Testing Techniques”, 2 nd edition, Dreamtech press, New
Delhi, 2003.
2. Edward Kit, “Software Testing in the Real World - Improving the Process”, Pearson
Education, 2004.
3. William E. Perry , “Effective Methods for Software Testing”, 2 nd edition, Wiley
publications, 2000.
Study of RTOS, VxWorks – Basic features – Task management library at the system –
Library header file – VxWorks system functions and system tasks – Inter process
(Task) communication functions – Case study of coding for sending application layer
byte streams on a TCP/IP network using RTOS Vxworks.
TOTAL = 45
REFERENCES
UNIT I FUNDAMENTALS 9
Introduction – Background – Concepts of quality control – Quality assurance – Quality
management – Total quality management – Cost of quality – Seven tools – Holding the
gains – Six new tools.
Process and product metrics – Seven wastes – Statistical process control – Statistical
quality assurance – Benchmarking – Best demonstrated practices – Quality function
deployment – Business process Re-engineering – Overview of– Defects per million
opportunities – Design of experiments – FMEA – Kaizen.
Overview of PSP – TSP – Six Sigma and formal methods of verification – Zero defects–
Defect prevention and planning – Software reliability models.
TOTAL= 45
REFERENCES
1. John Bicheno and M.R Gopalan, “Management Guide to Quality and Productivity”,
Wiley Publications, 2nd edition, 2004.
2. Watts S. Humphery, “Managing The Software Process ", Pearson Education, 2008.
3. Philip B. Crosby, " Quality is Free: The Art of Making Quality Certain ", Mass Market,
1992.
4. Roger Pressman, “Software Engineering ", 6th edition, Tata McGraw Hill, 2005.
5. Stephen H. Kan, “Metrics and Models in Software Quality Engineering”, Pearson
Education, 2002.
UNIT I INTRODUCTION 9
Introduction – Fundamentals of wireless communication technology – The
Electromagnetic spectrum – Radio propagation mechanisms – Characteristics of the
wireless channel – IEEE 802.11a,b standard – Origin of Ad hoc: Packet radio networks
– Technical challenges – Architecture of PRNETs – Components of packet radios –
Adhoc wireless networks – Heterogeneity in mobile devices – Wireless sensor networks
– Traffic profiles – Types of Ad hoc mobile communications – Types of mobile host
movements – Challenges facing Ad hoc mobile networks – Ad hoc wireless internet.
TOTAL= 45
REFERENCES
1. C. Siva Ram Murthy and B.S. Manoj, “Ad Hoc Wireless Networks: Architectures and
Protocols”, Pearson Prentice-Hall, 2004.
2. C.K. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems”, Prentice-Hall
of India ,2001.
3. Charles E. Perkins, “Ad Hoc Networking”, Addison Wesley, 2000.
UNIT I INTRODUCTION 9
UNIT V APPLICATIONS 9
Applications of data mining – Social impacts of data mining – Tools:An introduction to
DB Miner – Case studies – Mining WWW – Mining text database – Mining spatial
databases.
TOTAL= 45
REFERENCES
1 Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques",
Morgan Kaufmann Publishers, 2002.
2 Alex Berson and Stephen J. Smith, “Data Warehousing, Data Mining & OLAP”, Tata
Mcgraw Hill, 2004.
3 Usama M.Fayyad, Gregory Piatetsky–Shapiro, Padhrai Smyth and Ramasamy
Uthurusamy, "Advances In Knowledge Discovery And Data Mining", The M.I.T
Press, 1996.
4. Ralph Kimball, "The Data Warehouse Life Cycle Toolkit", John Wiley & Sons Inc.,
1998.
5. Sean Kelly, "Data Warehousing In Action", John Wiley & Sons Inc., 1997.
UNIT I INTRODUCTION 9
UNIT V ANALYSIS 9
TOTAL = 45
REFERENCES
UNIT I INTRODUCTION 9
Logical agents – First order logic – First order inference – Unification – Chaining –
Resolution strategies – Knowledge representation – Objects – Actions – Events.
TOTAL = 45
REFERENCES
Price's model – Barabasi and Albert's model – Other growth models – Vertex copying
models.
UNIT V APPLICATIONS 9
TOTAL = 45
REFERENCES
UNIT I INTRODUCTION 9
Java and CORBA – Interface definition language – Object request broker – System
object model – Portable object adapter – CORBA services – CORBA component model
– Containers – Application server – Model driven architecture.
TOTAL = 45
TEXTBOOK
REFERENCES
UNIT IV METRICS 9
Need for software metrics – Classification of software metrics – Product metrics (size
metrics, complexity metrics, Halstead’s product metrics, quality metrics) and Process
metrics (empirical models, statistical models, theory–based models, composite models,
and reliability models).
UNIT V PEOPLE MANAGEMENT 9
TOTAL = 45
REFERENCES
Edge detection – Image segmentation by region growing – Region splitting and merging
– Edge linking. Image recognition – Patterns and pattern classes – Matching by
minimum distance classifier – Matching by correlation – Back propagation neural
network– Neural network applications in image processing.
Need for data compression – Huffman – Run length encoding – Shift codes – Arithmetic
coding – Vector quantization –Block truncation coding – Transform coding – DCT and
Wavelet – JPEG – MPEG standards– Concepts of context based compression.
TOTAL = 45
REFERENCES
The Research problem – Sources of research problem – Information, how to deal with it –
Criteria / characteristics of a good research problem – Errors in selecting a good research
problem – Types of research – Nature and use of arguments.
Single and Multiple server Markovian queueing models – Customer impatience –Queueing
applications.
TOTAL = 45
TEXT BOOKS
1. Nicholas Walliman, ”Your Research Project”, 2nd edition, Vistaar Publications, New Delhi ,
2005.
2. Gupta, S.C. and Kapoor, V.K., “Fundamentals of Mathematical Statistics”, Sultan Chand and
Sons, New Delhi ,2001.
3. Taha, H.A., “Operations Research: An Introduction”, 7 th edition, Pearson Education Edition,
Asia, New Delhi, 2002.
REFERENCES
1. Walpole, R.E., Myer, R.H., Myer, S.L. and Ye, K., “Probability and Statistics for engineers
and Scientists”, 7th Edition, Pearson Education, Delhi (2002).
2. Goel, B.S. and Mittal, S.K, “Operations Research”, Pragati Prakashan, Meerut (2000)
3. Freund, J.E., and Miller, I.R., “Probability and Statistics for Engineers”, Prentics Hall of
India, Fifth Edition, New Delhi, 1994.
CSY020 REAL TIME SYSTEMS 3 0 0 3
UNIT I INTRODUCTION 9
UNIT II RTOS 9
UNIT V CONNECTIVITY 9
Wireless connectivity – Blue tooth – Other short range protocols – Wireless application
environment – Service discovery – Middleware.
TOTAL = 45
REFERENCES
UNIT I
Security Attacks (interruption, interception, modification and fabrication) – Security
Services (confidentiality, authentication, integrity, non–repudiation, access control and
availability) and mechanisms – A model for Internet work security – Internet Standards
and RFCs – Buffer overflow & format string vulnerabilities – TCP session hijacking –
ARP attacks– Route table modification – UDP hijacking and man-in-the-middle attacks.
Security Models: Military and civil security– vulnerability and threat models– End-end
security (COMSEC) – Link encryption (TRANSEC) – Compartments – Privacy –
Authentication– Denial of service – Non repudiation.
UNIT II
UNIT–III
UNIT–IV
Secure Socket Layer (SSL) and Transport Layer Security (TLS) – Secure Electronic
Transaction (SET) – Basic concepts of SNMP– SNMPv1 community facility and
SNMPv3 – Intruders, viruses and related threats.
UNIT V
Intruders, Viruses and related threats – Firewall design principles – Trusted systems –
Intrusion detection systems – Key and certificate management – Secure binding of
public and private values: DNS certificates – Making and distributing key media:
randomization, lifetime issues– Key agreement protocols: STS protocol and IETF work
orders– Key Escrow: the Clipper chip – One-time passwords: schemes based on
S/KEY– PKI.
TOTAL = 45
TEXT BOOKS
1. William Stallings, “Network Security Essentials (Applications and Standards)”,
Pearson Education, 2004.
2. Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal
Flynn Ido Dubrawsky, Steve W.Manzuik and Ryan Permeh, “Hack Proofing your
network ”, 2nd edition, Syngress, 2002.
REFERENCES
UNIT I INTRODUCTION 9
Architecture:
Intel network processor: Multithreaded architecture overview – Features –Embedded
RISC processor – Packet processor hardware – Memory interfaces – System and
Control interface components – Bus Interface.
Programming:
Software development kit – IXP instruction set – Register formats – Micro engine
programming – Intra thread and Inter-thread communication – Thread synchronization –
Developing sample applications – Strong-Arm programming.
TOTAL = 45
TEXT BOOKS
REFERENCES
Multi-core processor evolution – Moore’s law – Basic system and Multicore processor
architecture – Homogeneous and heterogeneous multicore – On-chip interconnect
architecture – Uniform and nonuniform memory access – Cache and cache coherence
– Multicore processors benchmark – Multicore processors OS module – AMP – SMP –
Virtualization–MIPC– Choosing multicore OS configuration.
TOTAL = 45
TEXT BOOKS
1. Kai Hwang and Faye A. Briggs, "Computer Architecture and Parallel Processing"
McGraw–Hill International, 1984
2. Kai Hwang, "Advanced Computer Architecture", Tata McGraw–Hill, 1993
3. Shameem Akhter and Jason Roberts, “Multi–core Programming”, Intel Press, 2006.
4. Michael J Quinn, “Parallel programming in C with MPI and OpenMP”, Tata McGraw
Hill, 2003.
REFERENCES
NMOS and PMOS transistors – Threshold voltage – Body effect – Design equations –
Second order effects – MOS models and small signal AC characteristics – Basic CMOS
technology.
NMOS and CMOS inverters – Stick diagram – Inverter ratio – DC and transient
characteristics – Switching times – Super buffers – Driving large capacitance loads –
CMOS logic structures – Transmission gates – Static CMOS design – Dynamic CMOS
design.
Overview of digital design with Verilog HDL– Hierarchical modelling concepts– Modules
and port definitions – Gate level modelling – Data flow modelling – Behavioral modelling
–Task & functions – Test bench.
TOTAL = 45
REFERENCES
1. Neil H.E. Weste and Kamran Eshraghian, “Principles of CMOS VLSI Design”,
Pearson Education ASIA, 2nd edition, 2000.
2. John P.Uyemura, “Introduction to VLSI Circuits and Systems”, John Wiley & Sons,
Inc., 2002.
3. Samir Palnitkar, “Verilog HDL”, Pearson Education, 2 nd edition, 2004.
4. Eugene D.Fabricius, “Introduction to VLSI Design”,McGraw Hill International
Editions, 1990.
5. J.Bhasker, “A Verilog HDL Primer”, 2nd edition, , B.S.Publications, 2001.
6. Pucknell, “Basic VLSI Design”, Prentice Hall of India Publication, 1995.
7. Wayne Wolf, “Modern VLSI Design System on chip”, Pearson Education,2002.
SPECIAL ELECTIVES
UNIT I 9
UNIT II 9
Signal processing methods – Spectral analysis models – Speech recognition filter banks
– Linear productive coding model – Autocorrelation methods – Vector quantization –
Similarity or distance measures – Vector classification – Extensions of vector
quantization - Auditory based spectral analysis models. Pattern comparison
techniques – Distortion measures – Time alignment and normalization.
UNIT III 9
UNIT IV 9
UNIT V 9
TOTAL = 45
REFERENCES
UNIT I INTRODUCTION 9
UNIT V APPLICATIONS 9
TOTAL= 45
TEXT BOOKS
1. Daniel Jurafsky And James H.Martin , “Speech and Language Processing” , Prentice
Hall , 2008.
2. Ron Cole and J.Mariani, “Survey of the state of the art in Human SSS language
technology”, Cambridge University Press, 1997.
3. Michal W. Berry, “Survey Of Text Mining : Clustering, Classification And Retrieval”
Springer Verlag, 2003.
4. Christopher D, Manning and Hinrich Schutze, “Foundations of Statistical Natural
Language Processing”, MIT Press, 1999.
REFERENCES
AIM
To impart the fundamental concepts of Computer Graphics and Multimedia.
OBJECTIVES
To study the graphics techniques and algorithms.
To study the multimedia concepts and various I/O technologies.
To enable the students to develop their creativity
TOTAL = 45
TEXT BOOKS
1. Donald Hearn and M.Pauline Baker, “Computer Graphics C Version”, Pearson
Education, 2003
2. Prabat K Andleigh and Kiran Thakrar, “Multimedia Systems and Design”, PHI, 2003.
REFERENCES
1. Judith Jeffcoate, “Multimedia in practice technology and Applications”, PHI, 1998.
2. Foley, Vandam, Feiner and Huges, “Computer Graphics: Principles & Practice”,
Pearson Education, 2nd edition, 2003.
UNIT I 9
Problem factors – Defense mechanisms – Handling user access – User input –
Handling attackers – Managing the application – Web application technologies – The
HTTP protocol – Web functionality – Encoding schemes.
UNIT II 9
Mapping the application – Bypassing client side control – Transmitting data via the
Client – Capturing user data , HTML forms and thick-client components – Active X
controls – Prevention – Attacking authentication – Design flaws in authentication –
Implementation flaws in authentication – Prevention – Attacking session management –
Weakness in session management generation and handling – Its prevention – Attacking
access control – Common vulnerabilities – Its prevention – Code injection – Injection
into SQL, OS commands, web scripting techniques, SOAP, XPath, SMDP, LDAP –
Attacking path traversal – Finding and exploiting path traversal vulnerabilities – Its
prevention – Attacking application logic – Logic flaws – Attacking other users – XSS –
Redirection attacks – HTTP header injection – Frame injection– Request forgery– JSON
hijacking – Session fixation – Local privacy attacks –Advanced exploiting techniques –
Its prevention.
UNIT III 9
UNIT IV 9
UNIT V 9
TOTAL = 45
REFERENCES
1. Dafydd Stuttard and Marcus Pinto, “The Web Application Hacker's Handbook:
Discovering and Exploiting Security Flaws” , Wiley Publications,2007.
2. William R.Cheswick, Steven M. Bellovin and Aviel D.Rubin, “Firewalls and
Internet Security – Repelling the Wily hacker”, Pearson Education, 2008.
Published May 24, 2004 by Prentice Hall. Part of the Prentice Hall Communications Engineering and Emerging
o Copyright 2004
o Dimensions: 7x9-1/4
o Pages: 880
o Edition: 1st
o Book
o ISBN-10: 0-13-147023-X
o ISBN-13: 978-0-13-147023-1
o eBook
o ISBN-10: 0-13-246574-4
o ISBN-13: 978-0-13-246574-8