[go: up one dir, main page]

0% found this document useful (0 votes)
37 views90 pages

BSC Csit Syllabus Description

The document outlines the course structure for Cryptography (CSC316), detailing its objectives, syllabus, and assessment methods. It covers various cryptographic concepts including classical and modern ciphers, symmetric and asymmetric encryption, hash functions, and network security protocols. Additionally, it includes laboratory work requirements and references for further reading.

Uploaded by

Pujan Thapa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views90 pages

BSC Csit Syllabus Description

The document outlines the course structure for Cryptography (CSC316), detailing its objectives, syllabus, and assessment methods. It covers various cryptographic concepts including classical and modern ciphers, symmetric and asymmetric encryption, hash functions, and network security protocols. Additionally, it includes laboratory work requirements and references for further reading.

Uploaded by

Pujan Thapa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 90

Course Title: Cryptography Full Marks: 60+20+20

Course No: CSC316 Pass Marks: 24+8+8


Nature of the Course: Theory + Lab Credit Hours: 3
Year/Semester: Third/Fifth

Course Description: The course introduces the underlying the principles and design of
cryptosystems. The course covers the basics concepts of cryptography including: traditional ciphers,
block ciphers, stream ciphers, public and private key cryptosystems. The course also includes the
theory of hash functions, authentication systems, network security protocols and malicious logic.

Course Objectives: The objectives of this course are to familiarize the students with cryptography
and its applications. The students will be able to develop basic understanding of cryptographic
mechanisms.

Detail Syllabus

Chapters / Units Teaching Teaching Hours


Methodology
Unit I: Introduction and Classical Ciphers Class Lecture 7 Hours
+
1.1. Security: Computer Security, Information Lab Session
Security, Network Security,
CIA Triad: Confidentiality, Integrity,
Availability,
Cryptography, Cryptosystem, Cryptanalysis,
Security Threats:,
Attacks: Passive (Release of message, Traffic
analysis), Active (Replay, Denial of service)
Security Services: Authentication, Access
Control, Nonrepudiation
Security Mechanisms, Policy and Mechanism

1.2. Classical Cryptosystems:


Hierarchy of cipher
Substitution Techniques:
- Monoalphabetic: Ceasar Cipher, Hill
- Polyalphabetic: Vigenere Cipher (Variants:
vernam, one time pad), Playfair

Transposition Techniques: Rail Fence Cipher

1.3. Modern Ciphers: Block Ciphers, Stream


Ciphers,Symmetric Ciphers, Asymmetric
Ciphers
Unit II: Symmetric Ciphers Class Lecture 10Hours
+
2.1. Fiestel Cipher Structure, Substitution Lab Session
Permutation Network (SPN)

2.2. Data Encryption Standards (DES): Key


Generation, Encryption and Decryption Process,
Weak Keys in DES, Double DES, Meet in
Middle Attack, Triple DES

2.3. Finite Fields: Basic concepts of Groups, Rings,


and Fields, GCD, Euclidean Algorithm, Modular
Arithmetic, Set of Residue (Zn), Congruence,
Residue classes, Quadratic residue, Operations
on Zn (Addition, Subtraction, Multiplication),
Properties of Zn, Inverses: Additive Inverse,
Multiplicative Inverse, Relatively Prime,
Extended Euclidean Algorithm, Galois Fields
(GF(p) & GF(2n)), Polynomial Arithmetic :
Addition, Multiplication and Division over
Galois Field

2.4. International Data Encryption Standard (IDEA):


Key Generation, Encryption and Decryption
Process

2.5. Advanced Encryption Standards (AES): Key


Generation, Encryption and Decryption Process

2.6. Modes of Block Cipher Encryptions (Electronic


Code Book, Cipher Block Chaining, Cipher
Feedback Mode, Output Feedback Mode,
Counter Mode)

Unit III: Asymmetric Ciphers Class Lecture 8 Hours


+
3.1. Number Theory: Prime Numbers, Primality Lab Session
Testing, Miller-Rabin Algorithm,Fermat’s
Theorem, Euler’s Totient Function andEuler’s
Theorem, Primitive Root, Discrete Logarithms

3.2. Public Key Cryptosystems, Applications of


Public Key Cryptosystems

3.3. Distribution of public key, Distribution of secret


key by using public key cryptography, Diffie-
Hellman Key Exchange, Man-in-the-Middle
Attack

3.4. RSA Algorithm: Key Generation, Encryption


and Decryption Process
3.5. Elgamal Cryptographic System: Key Generation,
Encryption and Decryption Process

Unit IV: Cryptographic Hash Functions and Class Lecture 8Hours


Digital Signatures +
Lab Session
4.1. Message Authentication, Message
Authentication Functions, Message
Authentication Codes

4.2. Hash Functions, Properties of Hash functions,


Applications of Hash Functions

4.3. Message Digests: Details of MD4 and MD5


algorithms

4.4. Secure Hash Algorithms: Details of SHA-1 and


SHA-2 algorithms, Comparison of SHA
parameters, SHA-512

4.5. Digital Signatures: Direct Digital Signatures,


Arbitrated Digital Signature

4.6. Digital Signature Standard: The DSS Approach,


Digital Signature Algorithm(DSA)

4.7. Digital Signature Standard: The RSA Approach

Unit V: Authentication Class Lecture 3 Hours


+
5.1. Authentication System, Lab Session

5.2. Password Based Authentication, Dictionary


Attacks (Online and Offline),

5.3. Challenge Response System, One Way


Authentication, Mutual Authentication

5.4. Biometric System

5.5. Needham-Schroeder Scheme, Kerberos Protocol,


Kerberos 5
Unit VI: Network Security and Public Key Class Lecture 6 Hours
Infrastructure +
Lab Session
6.1. Overview of Network Security

6.2. Digital Certificates and X.509 certificates,


Certificate Life Cycle Management

6.3. PKI trust models, PKIX

6.4. Email Security: Pretty Good Privacy (PGP),


Services provided by PGP
6.5. Secure Socket Layer (SSL) Protocol

6.6. Transport Layer Security (TLS) Protocol

6.7. IP Security (IPSec) Protocol

6.8. Firewalls, Firewall Characteristics, Types of


Firewalls: Packet filtering firewall, Circuit-level
gateway, Stateful inspection firewall, Proxy
firewall, Next-generation firewall

Unit VII: Malicious Logic (3 Hrs) Class Lecture 6 Hours


+
7.1.Malicious Logic, Types of Malicious Logic: Lab Session
Virus, Worm, Trojan Horse, Zombies, Denial of
Service Attacks,

7.2. Intrusion, Intruders and their types (Masquerader,


Misfeasor, Clandestine),Intrusion Detection
System: Statisticalanomaly detection, Rule-based
detection

Text Book:
1. W. Stallings, Cryptography and Network Security: Principles and Practice

Reference Books:
1. William Stallings, Network Security Essentials: Applications and Standards
2. Matt Bishop, Computer Security, Art and Science.
3. Mark Stamp, Information Security: Principles and Practices.
4. Bruce Schneier, Applied Cryptography.
5. Douglas. R. Stinson. Cryptography: Theory and Practice.
6. B. A. Forouzan, Cryptography & Network Security, Tata Mc Graw Hill.
Laboratory Work Manual

Student should write programs and prepare lab sheet for all of theunits in the syllabus. Students
should implement cryptographic algorithmsand protocols mentioned in each. The choice of
programming language can be decided by the instructor and student as per their comfort. The
instructors have to prepare lab sheets for individual units covering the concept of the units as per the
requirement. All of the lab reports should be evaluated during the corresponding weeks of hands on
practice. The lab session for above chapters should be as per following description however the
depth of lab works are not limited to the below mentioned contents only. The lab report might cover
the following list of the programs.
Write the program to illustrate the followings
 Monoalphabetic Ciphers: Ceasar, Hill
 Polyalphabetic Cipher: Vigenere Cipher (Vernam, OTP), Playfair
 Transposition Cipher: Rail Fence Cipher
 Some basic components of DES like functioning of S-Box, Key generation
 Modular Arithmetic (Finding additive inverse, multiplicative inverse (Extended
Euclidean algorithm, relatively prime)
 Number Theory (Primality testing, Totient function, Primitive root)
 Diffie-Helman Key Exchange, RSA Algorithm, Elgamal Cryptographic System
 Some basic logic for Malicious code
Model Question
Tribhuvan University
Institute of Science and Technology

Course Title:Cryptography Full Marks: 60


Course No: CSC316 Pass Marks: 24
Level: B. Sc CSIT Third Year/ Fifth Semester Time: 3 Hrs

Section A
Long Answer Questions
Attempt any TWO questions. [2×10=20]

1. Mention the families SHA-2? Describe how 160-bit of hash value is generated by taking
an input message of variable size using SHA-1? [2+8]
2. Discuss how encryption and decryption is done using RSA? In a RSA system, a user
Named Ram has chosen the primes 5 and 7 to create a key pair. The public key is
(eRam,n) and the private key is (dRam, n). Compute the private and public key pairs.
Suppose another user Sita knows public key of Ram and want to send the plaintext “hi”
to Ram using RSA Scheme. Show how Sita has encrypted the plaintext and Ram has
decrypted the ciphertext. [5+5]
3. Describe the working principle of Fiestel Cipher Structure.Give the encryption and
decryption procedure for 2-DES and 3-DES. Find the multiplicative inverse of 7 in Z11
using Extended Euclidean Algorithm.
[4+2+4]

Section B
Short Answer Questions
Attempt any EIGHT questions. [8×5=40]

4. Define authentication system. How challenge response systems can be used as


authentication approach? [1+4]
5. Define SSL. How SSL Record Protocol provides security in Secure Socket Layer
Protocol? [1+4]
7 8
6. Decrypt the message “CMAL” using the Hill cipher with the key   . Show
11 11
your calculations and the result.
7. Divide 5x2 + 4x + 6 by 2x + 1 over GF(7). [5]
8. Differentiate between virus, worm and trojan horse. [5]
9. Describe the purpose of PKI trust model? List any four types of firewall. [3 + 2]
10. What is digital signature? How DSS Approach is used to generate digital signature?
[1+4]
11. Define Euler totient function. Find out whether 3 is primitive root of 7? [1 + 4]

12. Write Short Notes On (Any TWO) [2.5 + 2.5]


a. Vernam Cipher
b. Kerberos Protocol
c. Intrusion Detection System
Course Title: Software Engineering
Course no: CSC-351
Credit hours: 3

Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)

Course Synopsis: Discussion on types of software, developing process and


maintaining the software.

Goal: This course introduces concept of software development paradigm and


implementing these in real world.

Course Contents:

Unit 1: 11 Hrs.

1.1 Introduction to Software Engineering: Definition of software, software


engineering. Comparing between other engineering and software engineering.

1.2 System Engineering: Introduction to System, System properties, system and their
environment, system modeling.

1.3 Software Process: Introduction, software process model, process iteration,


software specification, software design and implementation, software validation,
software evolution.

1.4 Project Management: Introduction, management activities, project planning,


project scheduling, risk management.

Unit 2: 12 Hrs.

2.1 Software Requirements: Introduction, Types of requirements, requirements


engineering process: Feasibility study, requirements elicitation and analysis,
requirement validation, requirement management.

2.2 Software Prototyping: Introduction, prototyping in the software process, rapid


prototyping techniques, user interface prototyping.
2.3 Formal Specification: Introduction, formal specification in software process,
interface specification, behavioral specification.

Unit 3: 6 Hrs.

3.1 Architectural Design: Introduction, system structuring, control models, modular


decomposition, domain specific architecture.

3.2 Object Oriented Design: Introduction, Features of object oriented design, object
oriented software engineering.
Unit 4: 16 Hrs.

4.1 Verification & Validation: Introduction, verification and validation planning,


software inspection, cleanroom software development.

4.2 Software Testing: Introduction, types of testing, testing work benches.


4.3 Critical system validation: Introduction, formal methods and critical systems,
reliability validation, safety assurance, security assessment.
4.4 Software Cost Estimation: Introduction, productivity, estimation techniques.

4.5 Software Reengineering: Introduction, source code translation, reverse


engineering.

Laboratory works: Developing the software techniques explained in the course.

Homework
Text Books: Software Engineering, 7th Edition, Ian Sommerville, PEARSON
EDUCATON ASIA

Reference: Software Engineering: A Practitioner’s Approach, 6 th Edition,


Roger S. Pressman, McGraw Hill International Edition.

Assignment: Assignment should be given from the above units in throughout the
semester.

Computer Usage: No specific

Prerequisite: C, C++, Data Structure, Automata Theory, System Analysis &


Design

Category Content: Science Aspect: 60%


Design Aspect: 40%
Course Title: Complier Design and Construction
Course no: CSC-352
Credit hours: 3

Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)

Course Synopsis: Analysis of source program. The phases of compiler.

Goal: This course introduces fundamental concept of compiler and its different phases.

Course Contents:

Unit. 1: 6 Hrs.

1.5 Introduction to compiling: Compilers, Analysis of source program, the phases of


compiler, compiler-construction tools.
1.6 A Simple One-Pass Compiler: Syntax Definition, Syntax directed translation,
Parsing, Translator for simple expression, Symbol Table, Abstract Stack
Machines.

Unit 2: 19 Hrs.

2.4 Lexical Analysis: The role of the lexical analyzer, Input buffering, Specification
of tokens, Recognition of tokens, Finite Automata, Regular Expression to an
NFA, Design of a lexical analyzer generator 5 hrs.
2.5 Syntax Analysis: The role of parser, Context free grammars, Writing a grammars,
Top-down parsing, Bottom-up parsing, Operator-preceding parsing, LR parsing,
Ambiguous grammar.
2.6 Syntax Directed Translation: Syntax-directed definition, Syntax tree and its
construction, Evaluation of S-attributed definitions, L-attributed, Top-down
translation, Recursive evaluators.
2.7 Type Checking: Type systems, Specification of a simple type checker, Type
conversions.

Unit 3: 13 Hrs.

3.3 Intermediate Code Generation: Intermediate languages, Declarations,


Assignments Statements, Boolean Expressions, Back patching.
3.4 Code Generator: Issues in design of a code generator, the target machine, Run –
time storage management, Basic blocks and flow graphs, a simple code generator,
Peephole organization, Generating code from dags, Dynamic programming code-
generation algorithm, Code-generator generators.
3.5 Code Optimization: The principal sources of optimization, Optimization of basic
blocks, loops in flow graphs.

Unit 4: 7 Hrs.
4.6 Writing a Compilers: Planning a compiler, Approaches to compiler development,
the compiler development environment, Testing and Maintenance.
4.7 Comparing some compliers: Pascal Complier, C compiler, C++ complier.

Laboratory works:

1 Writing a complier, optimization techniques, comparing the compilers.


2. Construction of Lexical Analyser.
3. Construction of Parser
4. Development of Code Generator
5. Write a code to show the function of symbol table.
6. Implement the parsing techniques.
7. Show the application of different types of grammar.
8. Implement the lexical analyzer generator.
9. Implement the type conversation.
10. The course instructor is allowed to create a group two students.
a. Assign them to write a small compiler.

Text Books: Compilers, Principles, Techniques, and Tools, Pearson Education


Asia.
Reference:

Homework
Assignment: Assignment should be given from the above units in throughout the
semester.

Computer Usage: No specific

Prerequisite: C, C++, Data Structure, Automata Theory

Category Content: Science Aspect: 25%


Design Aspect: 75%
Course Title: Web Technologies
Course no: CSC-353
Credit hours: 3

Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)

Course Synopsis: This course introduces the client server web technology.

Goal: To expose the students with client and server side web programming.

Course Contents:

Unit 1. Introduction: 4 Hrs.

Review of web technology, Review of HTML and JAVA Script

Unit 2. Issues of Web Technology: 6 Hrs.

Architectural issues of web layer, HTTP & FTP Protocols, Tier Technology: 2-Tier,
3-Tier and n-Tier

Unit 3. The Client Tier: 12 Hrs.

Representing content, XML, DTD’s, Schemas, Stylesheets and Transformation: CSS,


XSL/XSLT, SAX, and DOM, Client-side Programming

Unit 4. The Server Tier: 20 Hrs.

Web Server Concept, Creating Dynamic Content, Using Control Flow to control
Dynamic Control Generation, Sessions and State, Error handling, Authentication,
Architecting web application, Using tag libraries, Writing tag libraries

Unit 5. Introduction to Advanced Server Side Issues: 3 Hrs.

Laboratory works: The laboratory should cover all the topics mentioned above.

Text / Reference Books:

Matt J. Crouch, ASP.NET and VB.NET Web Programming, Pearson Education Asia,
2002

Rahul Banerjee, Internetworking Technologies, Prentice-Hall of India Limited, Fourth


Edition, 2000
Course Title: Real Time System
Course no: CSC-354
Credit hours: 3

Nature of course: Theory (3 Hrs.)

Course Synopsis: This course introduces the real time technology


.
Goal: The main objective of this course is to address issue in scheduling,
resource access control, and communication in the real time system

Unit 1. Introduction 3 Hrs.

Digital control, High-level controls, Signal processing, Real time applications

Unit 2. Hard versus Soft Real-Time Systems 4 Hrs.

Jobs and processors, Release times, Deadlines, and timing constraints, Hard and soft
timing constraints, Hard real-time systems, Soft real-time systems,

Unit 3. Reference Model of Real-Time Systems 4 Hrs.

Processor and resources, Temporal parameters of real-time workload, Periodic task


model, Precedence constraints and data dependency, Other dependencies, Functional
parameters, Resource parameters of jobs and parameters of resources, Scheduling
hierarchy

Unit 4. Approaches to Real-Time Scheduling 4 Hrs.

Clock-driven approach, Weighted round-robin approach, Priority-driven approach,


Dynamic versus static system, Effective release times and deadlines, Optimality of
the EDF and LST algorithms, Nonoptimality of the EDF and LST algorithms,
Challenges in validating timing constraints in priority-driven systems, Off-line versus
on-line scheduling,

Unit 5. Clock-Driven Scheduling 5 Hrs.

Notations and assumptions, Static, Timer-driven scheduler, General structure of


cyclic schedules, Cyclic executives, Improving the average response time of aperiodic
jobs, Scheduling sporadic jobs, Practical considerations and generalization,
Algorithm for constructing static schedules, Pros and cons of clock-driven scheduling

Unit 6. Priority-Driven Scheduling of Periodic Tasks 6 Hrs.

Static assumption, Fixed-priority versus dynamic-priority algorithms, Maximum


schedule utilization, Optimality of the RM and DM algorithms, A schedulability test
for fixed-priority tasks with short response times, schedulability test for fixed-priority
tasks with arbitrary response times, Sufficient schedulability conditions for the RM
and DM algorithms, Practical factor

Unit 7. Scheduling Aperiodic and Sporadic Jobs in Priority-Driven Systems 6 Hrs.

Assumptions and approaches, Deferrable servers, Sporadic servers, Constant


utilization, total bandwidth, and weighted fair-queuing servers, Slack stealing in
deadline-driven systems, Slack stealing in fixed-priority systems, Scheduling of
sporadic jobs, Real-time performance for jobs, with soft timing constraints, Low-level
scheme for integrated scheduling

Unit 8. Resources and Resource Access Control 5 Hrs.

Assumptions on resources and their usage, Effects of resources contention and


resource access control, Nonpreemptive critical sections, Basic priority-inheritance
protocol, Basic priority-ceiling protocol, Stack-based, priority-ceiling (ceiling-
priority) protocol, Use of priority-ceiling protocol in dynamic-priority system,
Preemption-ceiling protocol, Controlling accesses to multiple-unit resources,
Controlling concurrent accesses to data objects,

Unit 9. Multiprocessor Scheduling, Resource Access Control and


Synchronization 5 Hrs.

Model of multiprocessor and distributed systems, Task assignment, Multiprocessor


priority-ceiling protocol, Elements of scheduling algorithms for end-end periodic
tasks, End-to-end tasks in heterogeneous systems, Predictability and validation of
dynamic multiprocessor systems.

Unit 10. Real –Time Communication 6 Hrs.

Model of real-time communication, Priority-based service disciplines for switched


networks, Weighted round-robin service disciplines, Medium access-control
protocols of broadcast networks, Internet and resource reservation protocols, Real -
time protocol, Communication in multi computer systems

Text / Reference Book:

1. Real-Time Systems, Jane W. S. Liu, Pearson Education Asia, 2003


Course Title: Introduction to Artificial Intelligence
Course no: CSC-355
Credit hours: 3

Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)

Course Synopsis: This course introduces the problem solving techniques, problem
representation and machine learning.

Goal: The main objective of this course is to provide basic knowledge of Artificial
Intelligence, with acquaintance of different search techniques and AI applications.

Course Contents:

Unit 1. Introduction to Artificial Intelligence 4 Hrs.

Artificial Intelligence and related fields, brief history of AI, applications of Artificial
Intelligence, Definition and importance of Knowledge, and Learning.

Unit 2. Problem Solving 6 Hrs.

Problem Definition, Problem as a state space search, Problem formulation, Problem


types, Well-defined problems, Constraint satisfaction problem, Game playing,
Production systems.

Unit 3. Search Techniques 9 Hrs.

Uninformed search techniques- depth first search, breadth first search, depth limit
search, and search strategy comparison, Informed search techniques-hill climbing,
best first search, greedy search, A* search, Adversarial search techniques-minimax
procedure, alpha beta procedure

Unit 4. Knowledge Representation, Inference and Reasoning 12 Hrs.

Formal logic-connectives, truth tables, syntax, semantics, tautology, validity, well-


formed-formula, propositional logic, predicate logic, FOPL, interpretation,
quantification, horn clauses, rules of inference, unification, resolution refutation
system (RRS), answer extraction from RRS, rule based deduction system, Statistical
Reasoning-Probability and Bayes' theorem and causal networks, reasoning in belief
network

Unit 5. Structured Knowledge Representation 4 Hrs.

Representations and Mappings, Approaches to Knowledge Representation, Issues in


Knowledge Representation, Semantic nets, frames, conceptual dependencies and
scripts
Unit 6. Machine Learning 4 Hrs.

Concepts of learning, learning from examples, explanation based learning, learning


by analogy, learning by simulating evolution, learning by training neural nets,
learning by training perceptrons.

Unit 7. Applications of Artificial Intelligence 6 Hrs.

Expert Systems, Neural Network, Natural Language Processing, Machine Vision

Laboratory work: Laboratory exercises should be conducted in either LISP or


PROLOG. Laboratory exercises must cover the fundamental
search techniques, simple question answering, inference and
reasoning.

Text / Reference books:

 E. Rich and Knight, Artificial Intelligence, McGraw Hill.


 D. W. Patterson, Artificial Intelligence and Expert Systems, Prentice Hall.
 P. H. Winston, Artificial Intelligence, Addison Wesley.
 Stuart Russel and Peter Norvig, Artificial Intelligence A Modern Approach, Pearson
 Ivan Bratko, PROLOG Programming for Artificial Intelligence, Addison Wesley.
Course Title: Fundamentals of E-Commerce
Course no: CSC-356
Credit hours: 3

Nature of course: Theory (3 Hrs.)

Course Synopsis: Discussion on types of commerce, doing business in electronics,


infrastructure of electronic commerce.

Goal: This course introduces basic concept of commerce and discusses the basic needs
of electronic commerce.

Course Contents:

Unit 1: 14 Hrs.

1.7 Introduction to Electronic Commerce: Introduction of commerce, Electronic


commerce framework, electronic commerce and media convergence, the anatomy
of e-commerce application.

1.8 The Network for Electronic Commerce: Need of network, market forces
influencing the I-way, components of I-way, network access equipment, and
global information distribution network.

1.9 The Internet as a Network Infrastructure: Introduction, the Internet terminology,


NSFNET: Architecture and Components, Internet governance: The Internet
Society.

Unit 2: 23 Hrs.

2.8 Network Security & Firewalls: Client-Server network security, security threats in
client-server, firewalls and network security, data & message security, encrypted
documents and electronic mail.

2.9 Electronic Commerce & World Wide Web: Introduction, architectural framework
for electronic commerce, WWW as an architecture, security in the web.

2.10 Consumer Oriented Electronic Commerce: Introduction, consumer oriented


application, mercantile process models, mercantile models from the consumer’s
perspective, mercantile models from the merchant’s perspective.

2.11 Electronic Payment Systems: Introduction, types of electronic payment system,


digital token based electronic payment systems, smart cards and electronic
payment systems, credit cards systems, Threat on electronic payment system.

Unit 3: 8 Hrs.
3.6 Inter-organizational Commerce & Electronic Data Interchange: Introduction, EDI
application in business, EDI: legal, security, and privacy issues, EDI and
electronic commerce.

3.7 The Corporate Digital Library: Introduction, dimensions of electronic commerce


systems, types of digital documents, Issues behind document infrastructure,
corporate data warehouses.

Laboratory works: Developing the small electronic payment system.

Text Books: Frontiers of Electronic Commerce, 5th Edition, Kalkotia and


Whinston, Pearson Education Asia

Homework
Assignment: Assignment should be given from the above units in throughout the
semester.

Computer Usage: No specific

Prerequisite: C, C++, Data Structure, System Analysis & Design

Category Content: Science Aspect: 60%


Design Aspect: 40%
Course Title: Advanced Database Management System
Course No: CSC-401
Credit Hours: 3

Nature of Course: Theory (3Hrs.) + Lab (3Hrs.)

Synopsis: To study the concept of advanced database techniques

Goals: To study the further advanced database techniques beyond the fundamental database
techniques which were covered in the sophomore year (fourth semester) BCScIT course, and thus to
acquaint the students with some relatively advanced issues. At the end of the course students should
be able to: critically assess new developments in database technology, Interpret and explain the
impact of emerging database standards, evaluate the contribution of database theory to practical
implementations of database management systems.

Course Contents:

Unit 1: The Relational Model of Data and RDBMS Implementation Techniques 5 Hrs.

Theoretical concepts, Relational model conformity and Integrity, Advanced SQL programming,
Query optimization, Concurrency control and Transaction management, Database performance
tuning, Distributed relational systems and Data Replication, Security considerations

Unit 2: The Extended Entity Relationship Model and Object Model: 6 Hrs.

The ER model revisited, Motivation for complex data types, User defined abstract data types and
structured types, Subclasses, Super classes, Inheritance, Specialization and Generalization,
Constraints and characteristics of specialization and Generalization, Relationship types of degree
higher than two.

Unit 3: Emerging Database Management System Technologies 18 Hrs.

Object Oriented database concepts; Object Relational database concepts; Active database concepts;
Temporal database concepts; Spatial database concepts and architecture; Deductive databases and
Query processing; Mobile Databases; Geographic Information Systems.

Unit 4: New database applications and environments 8 Hrs.

Data Warehousing and Data Mining, Multimedia; Mobility; Multidatabases; Native XML databases
(NXD), Internet

Unit 5: Database Related Standards 8 Hrs.

SQL standards, SQL 1999, SQL: 2003, Object Data Management Group (ODMG) version 3.0
standard, Standards for interoperability and integration e.g. Web Services, SOAP, XML related
specifications, e.g. XQuery, XPath.

Laboratory Projects: The course involves a mini project using any one of the popular
Commercial Object-Oriented DBMS software such as Oracle, MS SQL
Server etc, along with any MVC software development framework.

Reference Books:
1. Elmasri and Navathe, Fundamentals of Database Systems, Pearson Education
2. Raghu Ramakrishnan, Johannes Gehrke, Database Management Systems,
McGraw-Hill
3. Korth, Silberchatz, Sudarshan , Database System Concepts, McGraw-Hill.
4. Peter Rob and Coronel, Database Systems, Design, Implementation and
Management, Thomson Learning.
5. C. J. Date & Longman, Introduction to Database Systems, Pearson Education

Prerequisite: Be familiar with at least one OO programming language such as .Net or C++ or Java,
Fundamentals of DBMS, SQL

Homework Homework assignments can be given according to the course Assignments:


covered throughout the semester.

Computer Usage: Windows or Linux based PC or workstation, Commercial OODBMS


software package and MVC software development framework installed at the
server.

Category Content: Science Aspects: 60%


Design Aspects: 40%
Course Title: Internet Technology
Course no: CSC-402
Credit hours: 3

Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)

Course Synopsis: Study on internet protocols, client/server applications and web services.
Designing and applications of internet and intranet system.

Goal: This course deals on the practical application of internetworking technologies to private
intranets for information management and public internets for electronic commerce students will learn
theoretical details, strategies for designing sites, techniques for creating their technical infrastructures,
methods for developing content, and techniques for site deployment and management.

Course Contents:

1. Introduction 5Hrs.

1.1. History and Development of Internets and Intranets


1.2. IANA, RIR/NIR/LIR and ISPs for internet number management
1.3. Internet Domain and Domain Name System
1.4. Internet Access Overview
1.5. Internet Backbone Networks: Optical Backbone, Marine Cables, Teleports, Satellite and
Terrestrial Links

2. Internet Protocol Overview 6Hrs.

2.1. TCP/IP and the IP Layer overview


2.2. IPv4 and IPv6 Address Types and Formats
2.3. IPv4 and IPv6 Header Structure
2.4. Internet RFCs

3. Protocols and Client/Server Applications 6Hrs.

3.1. Standard Protocols: SMTP, E-mail Message (RFC22), PGP, POP, IMAP, HTTP, FTP
3.2. N-Tiered Client/Server Architecture
3.3. Universal Internet Browsing
3.4. Multiprotocol Support

4. HTTP and the Web Services 8Hrs.

4.1. HTTP, Web Servers and Web Access


4.2. Universal naming with URLs
4.3. WWW Technology: HTML, DHTML, WML, XML
4.4. Tools: WYSIWYG Authoring Tools
4.5. Helper applications: CGI; PERL, JAVA, JAVA SRIPTS, PHP, ASP, .NET Applications
4.6. Introduction to AJAX (Programming)
4.7. Browser as a rendering engine: text, HTML, gif and jpeg

5. Designing Internet Systems and Servers 8Hrs.

5.1. Designing of Internet System Network Architecture


5.2. Choice of platforms
5.3. Server Concepts: WEB, Proxy, RADIUS, MAIL
5.4. Cookies
5.5. Load Balancing: Proxy Arrays
5.6. Server Setup and Configuration Guidelines
5.7. Security and System Administration Issues, Firewalls and Content Filtering

6. Internet and Intranet Systems Development 6Hrs.

6.1. Introductions
6.2. Benefits and drawbacks of intranets
6.3. Protocols, Structure and Scope of Networks
6.4. Intranets Resource Assessments: Network Infrastructure, Clients and Server Resources
6.5. Intranet Implementation Guidelines
6.6. Content Design, Development, Publishing and Management
6.7. Intranet Design with Open source Tools: DRUPAL, JUMLA
6.8. Tunneling Protocols: VPN

7. Internet and Intranet Applications 6Hrs.

7.1. General Applications: Email, WWW, Gopher, Online Systems


7.2. Multimedia and Digital Video/Audio Broadcasting: Video/Audio Conferencing, Internet
Relay Chat (IRC)
7.3. Broadband Communications, Policy, xDSL and Cable Internet
7.4. VoIP, GoIP and IP Interconnection
7.5. Datacenters and Data warehousing, packet clearing house
7.6. Unified Messaging Systems
7.7. Fundamental of e-Commerce
7.8. Concept of Grid and Cloud Computing

Laboratory Work: Laboratory should include features like packet capturing and analysis, design of
internet/intranet system, proxy administration, firewall configuration and management, VPN,
implementation of IRC, Content development with JUMLA/DRUPALmentioned in the syllabus.

Reference books:

1 Computer Networks; Andrew S. Tanenbaum, Prentice Hall India limited, New Delhi, 2010.
2 Internet and Intranet Engineering; Daniel Minoli, MGraw-Hill India Limited, New Delhi,
2009.
3 Internetworking with TCP/IP; Comer, D.E and Stevens
Course Title: Advanced Java Programming
Course Code: CSC-403
Credit Hours: 3

Nature of the course: Theory (3 Hrs.) +Lab (3 Hrs)

Course Synopsis: A study in Java language techniques beyond the introductory course. Emphasis
will include, GUI and event-driven programming, Database Connectivity, Socket Programming,
Remote Method Invocation and Servlets and JSP Technology

Goal: The purpose of this course is to present the concept of GUI programming and JDBC, Socket
programming and remote objects, and JSP Technology. Since software components are best learned
by implementation, each student will complete a project independently which will involve the design
and implementation three software components.

Course Contents:

Unit 1: Programming in Java 8 Hrs.

1.1 Introduction to Java: Java Architecture, Advantages of Java, PATH and CLASSPATH
variables, Compiling and Running Java Programs
1.2 Class and Object: Creating Classes, Interfaces, Creating Objects, Access Modifiers, Arrays,
Packages, Inheritance
1.3 Exception Handling and Threading: Try, Catch, Finally, Throws, Creating Multithreaded
Programs, Thread Life Cycle
1.4 File IO: Byte Stream Classes (FilleInputStream and FileOutputStream), Character Stream
Classes(FileReader and FileWriter), RandomAccessFile Class

Unit 2: User Interface Components with Swing 10 Hrs.

2.1 Swing and MVC Design Patterns: Design Pattern, MVC Pattern, MVC Analysis of Swing
Buttons
2.2 Layout Management: Border Layout, Grid Layout, Gridbag Layout, Group Layout, Using No
Layout managers, Custom layout Managers
2.3 Text Input: Text Fields, Password Fields, Text Areas, Scroll Pane, Label and Labeling
Components
2.4 Choice Components: Check Boxes, Radio Buttons, Borders, Combo Boxes, Sliders
2.5 Menus: Menu Building, Icons in Menu Items, Check box and Radio Buttons in Menu Items,
Pop-up Menus, Keyboard Mnemonics and Accelerators, Enabling and Design menu Items,
Toolbars, Tooltips
2.6 Dialog Boxes: Option Dialogs, Creating Dialogs, Data Exchange, File Choosers, Color
Choosers
2.7 Components Organizers: Split Panes, Tabbed Panes, Desktop Panes and Internal Frames,
Cascading and Tiling
2.8 Advance Swing Components: List, Trees, Tables, Progress Bars

Unit 3: Even Handling 4 Hrs.

3.1 Introduction: Standard Event Handling, Using Delegated Class, Using Action Commands,
Listener Interfaces, Adapter Classes
3.2 Handling Events: Action Events, Key Events, Focus Events, Window Event, Mouse Event,
Item Events
Unit 4: Database Connectivity 4 Hrs.
4.1 Design of JDBC: Driver Types, Typical Uses of JDBC
4.2 JDBC Configuration: Database URLS, Driver JAR Files, Starting Database, Registering
Driver class, Connecting to the database
4.3 Executing SQL Statements: Managing Connections, Statements, Result Set, SQL Exceptions,
Populating Databse
4.4 Query Execution: Prepared Statements, Reading and Writing LOBs, SQL Escapes, Multiple
Results, Scrollable Result Sets, Updateable Result Sets, Row Sets and Cached Row Sets,
Transactions.

Unit 5: Network Programming 5 Hrs.

5.1 Networking Basics: Transmission control Protocol(TCP), User Datagram Protocol (UDP),
Ports, IP Address Network Classes in JDK
5.2 Working with URLS: Connecting to URLS, Reading Directly from URLS, InetAddress Class
5.3 Sockets: TCP Sockets, UDP Sockets, Serving Multiple Clients, Half Close, Interruptible
Sockets, Sending Email

Unit 6: Java Beans 3 Hrs.


6.1 Introduction: Creating, Updating and Reading From JAR Files, Java Beans, Advantages of
Java Beans, Class vs Beans, BDK and Bean Box
6.2 Java Bean: Creating a Java Bean, Creating a Bean Manifest File, Creating a Bean JAR File,
Using a New Bean, Adding Controls to Beans, Giving a Bean Properties, Creating Bound
Properties, Giving a Bean Methods, Giving a Bean an Icon

Unit 7: Servlets and Java Server pages 8Hrs.

7.1 Servelets: Introduction to Servlets,Life cycle of servlets, Java Servlets Development Kit,
Creating, Compiling and running servlet, The servlet API ( javax.servlet package), Reading
the servlet Parameters, Reading Initialization parameter, The javax.servlet.http.Package,
Handling HTTP Request and Response (GET / POST Request), Using Cookies, Session
Tracking
7.2 Java Server Pages: Advantage of JSP technology (Comparision with ASP / Servlet), JSP
Architecture, JSP Access Model, JSP Syntax Basic (Directions, Declarations, Expression,
Scriplets, Comments), JSP Implicit Object, Object Scope, Synchronization Issue, Exception
Handling, Session Management, Creating and Processing Forms.

Unit 8: RMI and CORBA 3Hrs.

8.1 Remote Method Invocation: Introduction of RMI, Architecture of RMI, Remote Objects,
Creating and Executing RMI Applications
8.2 CORBA: Introduction to CORBA, Architecture of CORBA, Functioning of CORBA
Applications, CORBA Services

Laboratory Works: Student should design at least two Projects. Desktop Application (Address Book,
Library system etc), Simple network Application (e.g. Chatting Application) or Simple Web
Applications (online banking Application, Online Music Application, etc)

Reference Books:
1. Cay Horstmann and Grazy Cornell, Core Java Volume I-Fundamentals, Eighth Edition
2. Cay Horstmann and Grazy Cornell, Core Java Volume II-Advance Features, Eighth Edition
3. Steven Holzner, Java 2 Pagramming-AWT, Swing, XML and Java Beans Black Book,
Dreamtech Press
4. Pallvi Jain and Shadab Siddiqui, J2EE Professional Projects, Premier Press

Prerequisites: Any One Course in Object Oriented Programming


Course Title: Project Work
Course no: CSC-404

Credit hours: 3

Nature of course: Project

Course Synopsis: This course introduces students to the practical environment. Special focus
will be given in enabling students with the skills pertaining to the analysis,
design, and development, installation, testing and servicing a corporate
organization. The course has a practical approach to building real application.

Goal: To develop the skills associated with analysis design and development of meaningful and
efficient real world application

Course Contents:

1. Problem Identification
2. Problem Specification
3. Analysis and design
4. System Development
5. Installation and Testing
6. System Maintenance

The content of this course is divided into six different phases; the students will first involve
themselves in identifying a problem that needs to be addressed. Such problem needs to be specified
precisely and several solutions need to be prescribed, out if which the most viable will be selected.
The selected proposed solution now has to be analyzed properly and design. This might involve the
use of tools depending upon the nature of the problem and environment.

Text Books: None

Prerequisite: Depending upon types of project

Evaluation Criteria of Project Work.

 Analysis and design


 Presentation skill
 Questions Answer
 Scope of Work / Future Implementation of Project
 Overall documentation of project work

Evaluation of Project Work:

Internal Evaluation (At the mid of project work by supervisor, HOD/coordinator)


Final Evaluation with External (At the end of the project by External, Internal and Supervisor).

Marks Allocation

Supervisor 60

Internal 20

External 20

Total 100
Course Title: Software Project Management
Course no: CSC-408
Credit Hours: 3

Nature of course: Theory (3Hrs.) +Practical (3Hrs.)

Course Synopsis: Concept of software project, software project management framework

Goal: This course introduces the concepts of Software Project, software project management
framework, project evaluation, Software quality assurance and project management and its tools.

Course contents:

Unit-1: Introduction to Software Project Management (SPM) 5 Hrs.

Software engineering problem and software product, software product attributes, Definition of a
Software Project (SP), SP Vs. other types of projects activities covered by SPM, categorizing SPs,
Project management cycle, SPM framework, types of project plan

Unit-2: Project Organization, Scheduling and management issues 5 Hrs.

Project life cycle and product life cycle, project planning and scheduling, resource allocation

Unit-3: Project Evaluation & Estimation: 6 Hrs.

Cost benefit analysis, cash flow forecasting, cost benefit evaluation techniques, risk evaluation.
Selection of an appropriate project report; Choosing technologies, choice of process model, structured
methods, rapid application development, water fall-, V-process-, spiral- models. Prototyping, delivery

Unit-4: Activity planning 7 Hrs.

Objectives of activity planning, project schedule, projects and activities, sequencing and scheduling
activities, network planning model, representation of lagged activities, adding the time dimension,
backward and forward pass, identifying critical path, activity throat, shortening project , precedence
networks

Unit-5: Resource allocation 4 Hrs.

Introduction, the nature of resources, identifying resource requirements, scheduling resources creating
critical paths, counting the cost, being specific, publishing the resource schedule, cost schedules, the
scheduling sequence.

Unit-6: Monitoring the control 4 Hrs.

Introduction, creating the frame work, collecting the data, visualizing progress, cost monitoring,
earned value, prioritizing monitoring, getting the project back to target, change control
Unit-7: Managing contracts and people 5 Hrs.

Introduction, types of contract, stages in contract, placement, typical terms of a contract, contract
management, acceptance, Managing people and organizing terms: Introduction, understanding
behavior, organizational behavior: a back ground, selecting the right person for the job, instruction in
the best methods, motivation, working in groups, becoming a team, decision making, leadership,
organizational structures, conclusion, further exercises.

Unit-8: Software quality assurance and testing 5 Hrs.

Testing principles and objectives, test plan, types and levels of testing, test strategies, program
verification and validation, software quality, SEI-CMM,SQA activities, QA organization structure,
SQA plan.

Unit-9: Project management and project management tools 4 Hrs.


Software configuration management, SCM tasks and roles, Risk management, risk management
process, SPM tools.

Laboratory Work: Project on Software Project Management

Reference Books:
1. Software project management-Rajiv Chopra, 2009
2. Software Project Management by Bob Hughes and Mike Cotterell, Latest Publication
3. Software Engineering – A Practitioner’s approach, Roger S. Pressman Latest Publication
4. Software Project Management, Walker Royce, 1998, Addison Wesley.
5. Managing Global software Projects, Ramesh, 2001, TMH
Course Title: Data Warehousing and Data Mining
Course no: CSC- 451
Credit hours: 3

Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)

Course Synopsis: Analysis of advanced aspect of data warehousing and data mining.

Goal: This course introduces advanced aspects of data warehousing and data mining,
encompassing the principles, research results and commercial application of the current
technologies

Course Contents:

Unit- 1 5 Hrs.

Concepts of Data Warehouse and Data Mining including its functionalities, stages of Knowledge
discovery in database(KDD) , Setting up a KDD environment, Issues in Data Warehouse and
Data Mining, Application of Data Warehouse and Data Mining

Unit-2 4 Hrs.

DBMS vs. Data Warehouse, Data marts, Metadata, Multidimensional data model, Data Cubes,
Schemas for Multidimensional Database: Stars, Snowflakes and Fact Constellations.

Unit- 3 6 Hrs.

Data Warehouse Architecture, Distributed and Virtual Data Warehouse, Data Warehouse
Manager, OLTP, OLAP, MOLAP, HOLAP, types of OLAP, servers.

Unit- 4 4 Hrs.

Computation of Data Cubes, modeling: OLAP data, OLAP queries, Data Warehouse back end
tools, tuning and testing of Data Warehouse.
Unit- 5 4Hrs.

Data Mining definition and Task, KDD versus Data Mining, Data Mining techniques, tools and
application.

Unit- 6 5Hrs.
Data mining query languages, data specification, specifying knowledge, hierarchy specification,
pattern presentation & visualization specification, data mining languages and standardization of
data mining.
Unit- 7 6 Hrs.

Mining Association Rules in Large Databases: Association Rule Mining, why Association
Mining is necessary, Pros and Cons of Association Rules, Apriori Algorithm.

Unit- 8 7 Hrs.
Classification and Prediction: Issues Regarding Classification and Prediction, Classification by
Decision Tree Induction, Introduction to Regression, Types of Regression, Introduction to
clustering, K-mean and K-Mediod Algorithms.

Unit- 9 4 Hrs.

Mining Complex Types of Data: Mining Text Databases, Mining the World Wide Web, Mining
Multimedia and Spatial Databases.

Laboratory Works: Cover all the concept of datawarehouse and mining mention in a course

Samples
1. Creating a simple data warehouse
2. OLAP operations: Roll Up, Drill Down, Slice, Dice through SQL- Server
3. Concepts of data cleaning and preparing for operation
4. Association rule mining though data mining tools
5. Data Classification through data mining tools
6. Clustering through data mining tools
7. Data visualization through data mining tools

Reference books:

1. Data Mining Concepts and Techniques, Morgan Kaufmann J. Han, M Kamber Second
Edition ISBN: 978-1-55860-901-3
2. Data Warehousing in the Real World – Sam Anahory and Dennis Murray, Pearson Edition
Asia.
3. Data Mining Techniques – Arun K Pujari, University Press.
4. Data Mining- Pieter Adriaans, DolfZantinge
5. Data Mining, Alex Berson,StephenSmith,KorthTheorling,TMH.
6. Data Mining, Adriaans, Addison-Wesley Longman.
Course Title: Internship
Course no: CSC-452
Credit hours: 6
Nature of course: Project

Course Synopsis
The students are required to complete a six credit (minimum ten weeks/180 hour long) internship
as a part of the course requirement. Industry is a crucial requirement of the Internship course and
this will have to be secured before getting started with the course. The work that the students
perform during the Internship will have to be supervised by the faculty members as well as by
representatives from the participating Industries. The internship experience is expected to enable
the students to assist in the resolution of complex problem associated with Database systems.

At the end of the Internship, the student(s) are required to write a report on their internship work.
Such a report needs to be structured according to the prescribed format. The Report forms a
major aspect of the evaluation of the Internship work.

Goal
Main goal is to assist students in focusing their interests, thus aiding in their professional carrier.
It gives students the opportunity to re-examine their career objectives and explore the variety of
opportunities in the field of computer networking.

Preparation
Students, the advisors, and the industry/organization, with which the student team is affiliated,
will have to agree on a problem that needs to be addressed during the internship. An internship is
designed by the advisor and the student according to mutual interests, needs and availability of
related industry/organization. To develop a rewarding program, at the beginning of the
internship, the advisor and student are asked to establish an internship plan, in the form of
written objectives and goals, and to develop a strategy for attaining those goals. The plan may
include a schedule of activities that need to be carried out in order to reach a solution for the
problem being addressed. The internship plan is not intended to be rigid. Advisor may be unable
to assess certain responsibilities until the student demonstrates his or her ability. The plan should
be flexible and subject to revision. The advisor and student should assess the student's progress
throughout the term of the internship both to evaluate the student's performance, and to establish
new directions as needed.
Role of the Advisor
Advisors are expected to share their experience, insight, and enthusiasm with the student
throughout the internship. They should continually monitor the progress of the student, assessing
written and oral communications and guiding the development of the student's technical and
managerial skills, effectiveness and presentation of self. Advisors are expected to submit a post-
internship evaluation of the student's accomplishments and abilities and of the internship
program in general.
Role of the Student
In order for the internship to be a mutually beneficial experience, a student should begin with a
definition of his/her objectives and specific interests for the minimum of 10-week/180 hour
period to ensure that appropriate activities and projects are selected by the advisor and the
student. The student will be responsible for the timely completion and professional quality of all
activities and projects assigned. The student is expected to speak frequently with the advisor on
his/her progress and interest in other projects, as well as to discuss observations and questions
about meetings, projects and other activities with which he/she is involved.
The student is required to submit to Advisor, within the first two weeks of the internship, a brief
plan for the internship.
Internship Group Size and document preparation
 Each group must be of maximum 4 Students
 Each student should prepare Individual document on the basis of his/her part in the group
project.
 Supervisors must be assigned to each group
Domain/Scope of Internship (Project Implementation /Research)
-Bank
-Hospitals
-Software Companies
-NTC, Ncell and other Telecommunication Sectors
-Government Organizations (IT Related) etc
Report Format
APA Format
Tentative Contents of Report
- Abstract
- Introduction (organization +Work Done )
- Statement of the problem and Objective
- Literature Review and methodology (Optional)
- System Analysis
- System Design
- Implementation
- System Testing
- Limitation/future enhancement
- Conclusion
- References and Bibliography
Evaluation Criteria
Proposal Defense : 10% weight {Evaluated by Supervisor and Mentor}
Mid-Term : 30% weight {Evaluated by Supervisor and Mentor}
End-Term : 60% weight.
Proposal Defese (At beginning of the internship)
- Topic Selection with Proposal (5 of total)
- Presentation (5% of total).
Mid-Term (After 2 month)
- Program Design (10% of total)
- Demo Presentation (10% of total).
- Viva (10% of total)
End-Term (After Completion of internship and before final Exam)
- Depth of work (15% of total)
- Report (25% of total)
- Viva (10% of total)
- Presentation (10% of total)
Note: External examiner assigned from TU will be present in final presentation. External
Examiner along with Supervisors, Mentor will evaluate internship of students.
Proportion of the marks will be same for all evaluators.
Course Title: Cloud Computing
Course No: CSC-458
Credit Hours: 3

Nature of the course: Theory (3Hrs.) + Lab (3Hrs.)

Course synopsis: This course gives an introduction to cloud computing and its techniques. The
topics covered include; introduction to cloud computing, cloud architecture,
cloud service models, Service Oriented Architectures, security in cloud
computing, disaster management in clouds.

Goal: Cloud computing has become a great solution for providing a flexible, on-demand, and
dynamically scalable computing infrastructure for many applications. Cloud computing
also presents a significant technology trends, and it is already obvious that it is reshaping
information technology processes and the IT marketplace. Thus objective of this course is
to introduce the aspects of cloud computing issues.

Course Contents:

Unit1: Introduction 10 Hrs.

Defining the Cloud, The Emergence of Cloud Computing, Cloud-Based Services, Grid
Computing or Cloud Computing, Components of Cloud Computing, Cloud Computing
Deployment Models: Public, Private, Hybrid, Benefits of Using a Cloud Model, Legal Issues in
Using Cloud Models, Characteristics of Cloud Computing, Evolution of Cloud Computing,
Challenges for the Cloud computing, Grid Computing, Distributed Computing in Grid and Cloud

Unit2: Cloud Service Models 15 Hrs.

Communication-as-a-Service (CaaS): Advantages of CaaS, Fully Integrated, Enterprise-Class


Unified Communications, Infrastructure-as-a-Service (IaaS): Modern On-Demand Computing,
Amazon’s Elastic Cloud, Amazon EC2 Service Characteristics, Monitoring-as-a-Service (MaaS),
Protection Against Internal and External Threats, Platform-as-a-Service (PaaS): The Traditional
On-Premises Model, The New Cloud Model, Key Characteristics of PaaS, Software-as-a-Service
(SaaS): SaaS Implementation Issues, Key Characteristics of SaaS, Benefits of the SaaS Model,
Jericho Cloud Cube Model

Unit 3: Building Cloud Networks 9 Hrs.

Evolution from Managed service providers (MSP) to Cloud Computing, Single Purpose
architectures to multi-purpose architectures, Data center virtualization, Cloud data center,
Service Oriented Architectures (SOA), Combining and SOA, Characterizing SOA, Open Source
Software in data centers
Unit 5 : Security in Cloud Computing 11 Hrs.

Cloud Security Challenges, Software-as-a-Service Security: Security management, Risk


Management, Security Monitoring and Incident Response, Security Architecture Design,
Vulnerability Assessment, Data Privacy and Security, Application Security, Virtual Machine
Security, disaster Recovery, Disasters in cloud, Disaster management

Laboratory work: As a part of lab work, the students are highly encouraged
 To simulate the concept of virtualization using virtualization programs/systems.
 To understand and practice examples of cloud services and applications.
 To understand and implement distributed storage and security issues in cloud computing.

Reference Books:

1. Cloud Computing: Implementation Management and Security, John W. Rittinghouse


and James F. Ransome (Recommended for Unit 1, 2, 3 4)

2. Cloud Application architecture, George Reese (Recommended for Unit 4)

3. Cloud Computing for Dummies, Judith Hurwitz, Robin Bloor, Marcia Kaufman, Fern
Halper(Recommended for Unit 3)

4. Handbook of cloud computing, Borko Furht, Armando Escalante (Recommended for


Unit 1)

5. Cloud Computing and SOA Convergence in your Enterprise, a step by step guide,
David S. Linthicum (Recommended for Unit 1, 2, 3)
Course Title: Geographical Information System
Course no: CSC-459
Credit hours: 3

Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)

Course Synopsis: Basic concepts of Geographical Information System

Goal: The course covers about spatial data modelling and database design, capturing the real
world, spatial analysis and visualization, overview of open GIS

Course Contents:

Unit 1: Introduction 6hrs.


1.1 Overview, History and concepts of GIS
1.2 Scope and application areas of GIS
1.3 Purpose and benefits of GIS
1.4 Functional components of GIS
1.5 Importance of GPS and remote sensing data in GIS

Unit2: Digital mapping concept 3 hrs.

2.1 Map concept: map elements, map layers, map scales and representation
2.2 Map projection: coordinate system and projection system

Unit 3: spatial data modeling and database design 9 hrs.

3.1 introduction to geographic phenomena and data modeling


3.2 spatial relationships and topology
3.3 scale and resolution
3.4 vector, raster and digital terrain model
3.5 Spatial database design with the concepts of geodatabase.

Unit 4: capturing the real world 8hrs.

4.1 different methods of data capture


4.2 map projection and spatial reference
4.3 data preparation, conversion and integration
4.4 quality aspects of spatial data
4.5 GPS
4.6 Remote Sensing

Unit 5: spatial analysis and visualization 7hrs.


5.1 spatial analysis
i. overlay
ii. buffering
5.2 map outputs and its basic elements

Unit 6: introduction to spatial data infrastructure 8hrs.

6.1 SDI concepts and its current trend


6.2 The concept of metadata and clearing house
6.3 Critical factors around SDIs

Unit 7: Open GIS 4hrs.

7.1 Introduction of open concept in GIS


7.2 Open source software for spatial data analysis
7.3 Web Based GIS system
7.4 System Analysis and Design with GIS

Laboratory work: The lab should cover at least the concepts given the chapters

Reference books:

1- Principles of geographic information systems: An introductory textbook, international


institute for Geo-information science and Earth observation, the Netherlands- By rolf De
By, Richard A. knippers, yuxian sun
2- ESRI guide to GIS analysis Andy Mitchell, ESRI press, Red lands
3- GIS Cook BOOK

You might also like