THIRD SEMESTERNo Paper Code Paper Hrs/Week Cr. EVALUATION(MARKS) Lecture Tutorial Practical Internal...

24
TH IRD SE M ES T E R w.e.f. Jan 2011 (Batch 2010-2012 Onwards) Master of Technology (Computer Science & Engineering) Sr.N o Paper Code Paper Hrs/Week Cr. EVALUATION(MARKS) Lecture Tutoria l Practic al Interna l Theory Externa l Total 1 Elective-IV 3 - - 3 40 60 - 100 2 Elective-V 3 - - 3 40 60 - 100 3 Elective-VI 3 - - 3 40 60 - 100 3 CSE-555 Seminar - 2 - 1 100 - - 100 4 CSE-557 Project - - 6 3 60 - 40 100 5 CSE-559 Elective-IV (Pr.) - - 3 1.5 60 - 40 100 Total 9 2 9 14.5 Elective Subjects-IV, V and VI CSE-513 (A) Mobile Computing CSE-513 (B) E-Commerce & ERP CSE-513 (C) Advanced Java CSE-513 (D) Ad Hoc Networks CSE-513 (E) Network Programming CSE-513 (F) Neural Networks CSE-513 (G) Network Security & Cryptography CSE-513 (H) Digital Signal Processing CSE- 513(I) Embedded Systems

Transcript of THIRD SEMESTERNo Paper Code Paper Hrs/Week Cr. EVALUATION(MARKS) Lecture Tutorial Practical Internal...

TH IRD SE MES TE R

w.e.f. Jan 2011 (Batch 2010-2012 Onwards)

Master of Technology (Computer Science & Engineering)

Sr.No

PaperCode

Paper Hrs/Week Cr.EVALUATION(MARKS)

Lecture Tutorial

Practical

Internal

Theory External

Total

1 Elective-IV 3 - - 3 40 60 - 100

2 Elective-V 3 - - 3 40 60 - 100

3 Elective-VI 3 - - 3 40 60 - 100

3 CSE-555 Seminar - 2 - 1 100 - - 1004 CSE-557 Project - - 6 3 60 - 40 1005 CSE-559 Elective-IV

(Pr.)- - 3 1.5 60 - 40 100

Total 9 2 9 14.5

Elective Subjects-IV, V and VI

CSE-513 (A) Mobile ComputingCSE-513 (B) E-Commerce & ERPCSE-513 (C) Advanced JavaCSE-513 (D) Ad Hoc NetworksCSE-513 (E) Network ProgrammingCSE-513 (F) Neural NetworksCSE-513 (G) Network Security & Cryptography CSE-513 (H) Digital Signal ProcessingCSE- 513(I) Embedded Systems

w.e.f. Jan 2011 (Batch 2010-2012 Onwards) Master of Technology (Computer Science & Engineering)

F O UR T H SE M ESTE R

S.No. PaperCode

Paper Hrs/Week Cr.EVALUATION(MARKS)

Lecture

Tutorial Practical

Internal Theory External Total

1 CSE-556 Dissertation &Comprehensive Viva- Voce

- - - - - - - -

w.e.f. Jan 2011 (Batch 2010-2012Onwards)

Master of Technology (Computer Science &Engineering)

Time 3 Hr. Maximum Marks: 60 Unit-1

Introduction: Challenges in mobile computing, coping with uncertainties,resource poorness, bandwidth, etc. Cellular architecture, co-channelinterference, frequency reuse, capacity increase by cell splitting.Evolution of mobile system: CDMA, FDMA, TDMA, GSM.Mobility Management: Cellular architecture, Co-channel interference,Mobility: handoff, types of handoffs; location management, HLR-VLRscheme, hierarchical scheme, predictive location management schemes.Mobile IP, cellular IP.

Unit-2Publishing & Accessing Data in Air: Pull and push based data deliverymodels, data dissemination by broadcast, energy efficient indexingscheme for push based data delivery.Mobile agent technology, Distributed system structuring mechanisms,Mobile agent interaction model, Agent mobility, Agent-agentcommunications, Agent naming and locating

Unit-3Ad hoc Network Routing Protocols: Ad hoc network routing protocols,destination sequenced distance vector algorithm, cluster based gatewayswitch routing, global state routing, fish-eye state routing, dynamicsource routing, ad hoc on-demand routing, location aided routing, zonalrouting algorithm.

Unit-4Mobile Transaction and Commerce: Models for mobile transaction. Kangarooand Joey transactions, team transaction. Recovery model for mobiletransactions. Electronic payment and protocols for mobile commerce.

Note: Eight questions will be set by the examiners taking at least two questions from each unit. Students will be required to attempt five questions in all; at least one from each unit.

Books

1. Mobility: Processes, Computers, and Agents, Dejan Milojicic, FrederickDouglis, Richard Wheeler, Addison-Wesley Professional.

2. Ivan Stojmenovic´ (Editor), Handbook of Wireless Networks and MobileComputingm, Wiley, ISBN: 0-471-41902-8, February 2002

CSE-513 (A) Mobile Computing L T P C3 - - 3

3. Yi-Bing Lin & Imrich Chlamtac, “Wireless and Mobile NetworksArchitectures”, John Wiley & Sons, 2001.

4. Raj Pandya, “Mobile and Personal Communication systems and services”,Prentice Hall of India, 2001.

5. Frank Adelstein, Sandeep K S Gupta, Golden G. Richard III and LorenSchwiebert, Fundamentals of Mobile and Pervasive Computing, TMH, 2005

w.e.f. Jan 2011 (Batch 2010-2012Onwards)

Master of Technology (Computer Science &Engineering)

Time 3 Hr. Maximum Marks: 60

Unit 1Introduction and Concepts: Networks and Commercial Transactions –Internet and other novelties:networks and electronic transactions today, Model for commercialtransactions; Internet environment– Internet advantage, worlds wide web and other Internet Salesvenues; online commerce solutions.Electronic Payment Methods: Updating traditional transactions;secure online offline secure processing; private data networks,Security protocols.

Unit 2Electronic Commerce Providers: On-line Commerce options;Company profiles, ElectronicPayment System: Digital payment system; First virtual Internetpayment system; cyber cash model. On-line Commerce environments; E-commerce Servers.Digital Currencies Operational process of Digicash, EcashTrail; Using Ecash; Smart cards;Electronic Data interchange: basics, EDI versus Internet andEDI over Internet. Strategies, Techniques and Tools, Shoppingtechniques and online selling techniques.

Unit 3ERP – an Enterprise Perspective: Production finance, Personneldisciplines and their relationships,Transiting environment, MIS Integration for disciplines, Information/ workflow, Network Structure, Client Server Integrator System,Virtual Enterprise.ERP – Resource Management Perspective: Functional and Process ofResource, Management, Introduction to basic Modules of ERP System:HRD, Personnel Management, Training and Development, SkillInventory, Material Planning and Control, Inventory, forecasting,Manufacturing,Production Planning, Production Scheduling, Production Control,Sales and Distributions, Finance, Resource Management in globalscenario.

Unit 4ERP – Information System Perspective: Functional to OLAP (OnlineAnalysis and Processing), TP, OAS, KBS, MRP, BPR, SCM, REP, CRM, andInformation Communication Technology.

CSE-513 (B) E-Commerce & ERP L T P C3 - - 3

ERP – Key Managerial Issues: Concept Selling, IT Infrastructure,Implication, of ERP System on business Organization, Critical successfactors in ERP System, ERP Culture Implementation Issues, resistanceto change, ERP Selection issues, return on Investment, pre and postImplementation Issues.

Note: Eight questions will be set by the examiners taking at least twoquestions from each unit. Students will be required to attempt five questions in all; at least one from each unit.

Books:1. Ravi lalakota, Andrew Whinston: Frontiers of Electronics Commerce,1996, Addison Wesley.2. V.K. Garg and N.K. Venkita Krishna: Enterprise Resource Planning

– Concepts and practice, 1998, PHI.3. John Antonio, Fernandz: The SAP/3 Handbook, TMH.4. Denial Amor: The E-Business Revolution, Addison Welsey.5. From Edi to E-Commerce: A Business Initiative: Sokol TMH.6. Greenstein and Feinman: E-Commerce, TMH.7. Diwan, Sharma: E-Commerce Excel.

8. Asset International “ Net Commerce”, TMH.9. E-Commerce – Jaffrey F. Rayport, Bernard J. Jaworski, 2002, TMH.10. Bajan and Nag: E-Commerce: The cutting Edge of Business, TMH.11. Electronic Commerce – Security, Risk Management and Control, Greenstein, Geinman, 2002, TMH.

w.e.f. Jan 2011 (Batch 2010-2012Onwards)

Master of Technology (Computer Science &Engineering)

Time 3 Hr. Maximum Marks: 60

UNIT-IMulti-threading: Revision, Daemon Threads, Thread Groups, Race Conditions,Locking objects, Read/Write locks, Synchronizers: Barriers, Semaphores

Java Database Connectivity (JDBC): What is RDBMS, Introduction to JDBC,JDBC Driver types, SQL: SELECT, INSERT, UPDATE, java.sql package:DriverManager, Connection, Statement, ResultSet, SQLException,PreparedStatement, meta-data, Transactions: save points, batch updates

UNIT-IIJava Servlets: WWW, HTML Basics, HTTP, CGI, Life cycle of a Servlet,ServletConfig, SevletContext, Reading Servlet parameters, HttpServlet,HttpServletRequest, HttpServletResponse, HttpSession, Handling HTTPrequest and response, Cookies, Session Tracking.

Java Server Pages: Implicit Objects, JSP Directives, scripting elements,Extracting fields and values, attributes, Sessions in JSP, Cookies

UNIT-IIISwings: Working with Applets, icons, labels, text filds, buttons,Checkbox, radio buttons, Combo box, Tabbed panes, scroll panes, Trees,lists and tables.

Remote Method Invocation (RMI): What is RMI, Object Serialization, RMIlayer model, Skelton, Stub, java.rmi package: Remote interface, Naming,RMISecurityManager, RemoteException, java.rmi.registry package: Registryinterface, LocateRegistry, java.rmi.server package: RemoteObject,RemoteServer. Parameter passing of non-remote and remote objects, Cloningremote objects, Introduction to IDL, CORBA, Running a java client toaccess a remote object in C++

UNIT-IVJava Beans: need of beans, basic bean writing, building applications withbeans, jar files, naming patterns, Bean property types: simple, indexed,bound, constrained; BeanInfo classes, java beans persistence

CSE-513 (C) Advanced Java L T P C3 - - 3

XML: introduction to XML, structure of XML document, parsing an XMLdocument, Validating an XML document: Document Type Definitions, XMLschema, Using namespaces, using SAX Parser, Generating XML documents

Note: Eight questions will be set by the examiners taking at least two questions from each unit. Students will be required to attempt five questions in all; at least one from each unit.

Books:1. Java How to Program, 6th Edition, H.M. Deitel, P.J. Deitel, , Pearson

Education, New Delhi2. Core Java 2 Volume II-Advanced Features, Cay S. Horstmann, Gray

Cornell, Sun Microsystems Press, Pearson Education, New Delhi3. Java Network Programming, 3rd Edition, Elliotte Rusty Harold,

O’Reilly Publication, New Delhi.Herbert Schildt, the Complete Reference. Java, 7th Edition, Tata McGrawHill Pub, New Delhi.

w.e.f. Jan 2011 (Batch 2010-2012Onwards)

Master of Technology (Computer Science &Engineering)

Time 3 Hr. Maximum Marks: 60

Unit 1 Fundamentals: Fundamentals of Wireless Communication Technology – TheElectromagnetic Spectrum – Radio Propagation Mechanisms – Characteristics of theWireless Channel – IEEE 802.11a–b Standard – Origin of Ad hoc Packet RadioNetworks – Technical Challenges – Architecture of PRNETs – Components of PacketRadios – Ad hoc Wireless Networks – What is an Ad Hoc Network? Heterogeneity inMobile Devices – Wireless Sensor Networks – Traffic Profiles – Types of Ad hocMobile Communications – Types of Mobile Host Movements – Challenges Facing Ad hocMobile Networks- Ad hoc wireless Internet.

Unit 2Ad hoc Routing Protocols: Introduction – Issues in Designing a Routing Protocolfor Ad Hoc Wireless Networks – Classifications of Routing Protocols – Table–Driven Routing Protocols – Destination Sequenced Distance Vector (DSDV) –Wireless Routing Protocol (WRP) – Cluster Switch Gateway Routing (CSGR) – Source–Initiated On–Demand Approaches – Ad hoc On–Demand Distance Vector Routing (AODV)– Dynamic Source Routing (DSR) –Temporally Ordered Routing Algorithm (TORA) –Signal Stability Routing (SSR) –Location–Aided Routing (LAR) – Power–AwareRouting (PAR) – Zone Routing Protocol (ZRP).

Unit 3Multicasting in Ad hoc Networks: Introduction – Issues in Designing a MulticastRouting Protocol – Operation of Multicast Routing Protocols – An ArchitectureReference Model for Multicast Routing Protocols –Classifications of MulticastRouting Protocols – Tree–Based Multicast Routing Protocols– Mesh–Based MulticastRouting Protocols – Summary of Tree and Mesh based Protocols – Energy–EfficientMulticasting – Multicasting with Quality of Service Guarantees – Application –Dependent Multicast Routing – Comparisons of Multicast Routing Protocols.

Unit 4Transport Layer – Security Protocols: Introduction – Issues in Designing aTransport Layer Protocol for Ad hoc Wireless Networks – Design Goals of aTransport Layer Protocol for Ad hoc Wireless Networks –Classification ofTransport Layer Solutions – TCP over Ad hoc Wireless Networks – Other TransportLayer Protocols for Ad hoc Wireless Networks – Security in Ad Hoc WirelessNetworks – Network Security Requirements – Issues and Challenges in Security

CSE-513 (D) Ad Hoc Networks L T P C3 - - 3

Provisioning – Network Security Attacks – Key Management – Secure Routing in Adhoc wireless networks.

Note: Eight questions will be set by the examiners taking at least twoquestions from each unit. Students will be required to attempt five questions inall; at least one from each unit.

Books: 1. C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Networks Architectures

and Protocols”, Prentice Hall, PTR, 2004. 2. C. K. Toh, “Ad Hoc Mobile Wireless Networks Protocols and Systems”,Prentice Hall, PTR, 2001.3. Charles E. Perkins, “Ad Hoc Networking”, Addison Wesley, 2000.

w.e.f. Jan 2011 (Batch 2010-2012Onwards)

Master of Technology (Computer Science &Engineering)

Time 3 Hr. Maximum Marks: 60 UNIT 1 INTRODUCTION Architecture of UNIX, File System, Process in UNIX, Process Control Block, System Calls: fork, exec, wait, signal and signal handlers, The C compiler with its options, Static and Dynamic Memory Management. UNIT 2 ELEMENTARY TCP SOCKETS

Introduction to Socket Programming – Overview of TCP/IPProtocols –Introduction to Sockets – Socket address Structures – Byteordering functions – address conversion functions – Elementary TCPSockets – socket, connect, bind, listen, accept, read, write, closefunctions – Iterative Server – Concurrent Server.

UNIT 3 APPLICATION DEVELOPMENT TCP Echo Server – TCP Echo Client – Posix Signal handling – Server

with multiple clients – boundary conditions: Server process Crashes,Server host Crashes, Server Crashes and reboots, Server Shutdown – I/Omultiplexing – I/O Models – select function – shutdown function – TCPecho Server (with multiplexing) – poll function – TCP echo Client (withMultiplexing)

UNIT 4 SOCKET OPTIONS, ELEMENTRY UDP SOCKETS Socket options – getsocket and setsocket functions – generic socketoptions – IP socket options – ICMP socket options – TCP socket options – Elementary UDP sockets – UDPecho Server – UDP echo Client – Multiplexing TCP and UDP sockets – Domain name system – gethostbynamefunction – Ipv6 support in DNS – gethostbyadr function – getservbyname and getservbyportfunctions.

Note: Eight questions will be set by the examiners taking at leasttwo questions from each unit. Students will be required to attempt five questions in all; at least one fromeach unit.

CSE-513 (E) Network Programming L T P C3 - - 3

BOOKS

1. W. Richard Stevens, “UNIX NETWORK PROGRAMMING Vol-I” Second Edition, Pearson Education.

2. William Stallings, “SNMP, SNMPv2, SNMPv3 and RMON 1 and 2”, Third Edition, Addison Wesley.

3. D.E. Comer, “Intrenetworking with TCP/IP Vol- III”, (BSD Sockets Version), second Edition, PHI.

w.e.f. Jan 2011 (Batch 2010-2012 Onwards)Master of Technology (Computer Science &

Engineering)

Time 3 Hr. Maximum Marks: 60

Unit 1Introduction: History, overview of biological Neuro-System,Mathematical Models of Neurons, ANN architecture, Learningrules, Learning Paradigms-Supervised, Unsupervised andreinforcement Learning.

Unit 2Supervised Learning and Neurodynamics: Perceptron trainingrules, Delta, Back propagation training algorithm, HopfieldNetworks, Associative Memories.

Unit 3Unsupervised and Hybrid Learning: Principal Component Analysis,Self-organizing Feature Maps, ART networks, LVQ.

Unit 4Applications: Applications of Artificial Neural Networks toFunction Approximation, Regression, Classification, Blind SourceSeparation, Time Series and Forecasting.

Note: Eight questions will be set by the examiners taking at least two questions from each unit. Students will be required toattempt five questions in all at least one from each unit.

Books: 1. Anderson J.A., An Introduction to Neural Networks ,PHI.2. Haykin S., Neural Networks-A Comprehensive Foundations,Prentice-Hall International, New Jersey.3. Freeman J.A., D.M. Skapura, Neural Networks: Algorithms,Applications and Programming Techniques , Addison-Wesley.4. Golden R.M., Mathematical Methods for Neural Network

Analysis and Design , MIT Press, Cambridge.5. Cherkassky V., F. Kulier, Learning from Data-Concepts, Theoryand Methods , John Wiley, New York.6. Anderson J.A., E. Rosenfield, Neurocomputing:

CSE-513 (F) Neural Networks L T P C3 - - 3

Foundatiions of Research, MIT Press, Cambridge, MA.7. Kohonen T., Self-Organizing Maps , 2nd Ed., SpringerVerlag, Berlin.8. Patterson D.W., Artificial Neural Networks: Theory andApplications , Prentice Hall, Singapore, 1995.

w.e.f. Jan 2011 (Batch 2010-2012Onwards)

Master of Technology (Computer Science &Engineering)

Time 3 Hr. Maximum Marks: 60

Unit1Introduction: Need and basic goals for Computer security, Basicsecurity components, security threats.Cryptography: Cryptosystem, Type of cryptography, substitution and transposition ciphers, cryptographic principles, secret – key algorithms: DES, Breaking DES, AES, and IDEA, Public –key algorithms: RSA.

Unit2Authentication protocols: Digital signatures- Secret key and public keysignatures, DSS, message digest,MD5 and Secure Hash algorithms ,PGP, PKI, SSL, KDC protocols,Diffie-Hellman Key exchange, Needham Schroeder protocol, Passwords-technology and administration, Kerberos, principles of database systemsecurity, IPsec, VPN.

Unit3Operating system security: Access control, Security models: introduction to discretionary v/s mandatory access control, Bell-La Padula model, Biba model, Chinese wall model.

Unit4Malicious Code: Epidemic of viruses: types of viruses, preventionfrom virus, life cycle of a virus,immunization, Trojan horse and bombs with examples, writing antivirus/ Trojan codes, Security Tools:Firewall and Intrusiondetection systems.

Note: Eight questions will be set by the examiners taking at least twoquestions from each unit. Students will be required to attempt five questions in all at least one from each unit.

Books

CSE-513 (G) Network Security & L T P C3 - - 3

1. Richard H. Baker, Network security, Mcgraw HillInternational Ed. 19962. B. Schneier , Applied Cryptography, JohnWiley New York, 19963. C. Kaufman et. Al, Network security, PrenticeHall International, 19984. Sean Convery, “ Network Security Architectures, Publishedby Cisco Press, First Ed. 20045. William Stalling “Cryptography and NetworkSecurity” Pearson Education6. Charels P. Pfleeger “Security inComputing” Prentice Hall7. Jeff Crume “Inside InternetSecurity” Addison Wesley.

w.e.f. Jan 2011 (Batch 2010-2012Onwards)

Master of Technology (Computer Science &Engineering)

Time 3 Hr. Maximum Marks: 60

Unit 1Systems and signal processing, classifications of signals, concept of frequency in continuous time and discrete, time signals. Analog to digital and digital-to-analog conversion, Discrete time signals, Discretetime systems, LTI systems, difference equations, implementation of discrete time systems.

Unit 2Z- transform and its Applications: Z Transform, properties of Z-transform, Inversion of Z transform, applications of Z transform. Discrete Fourier Transform(DFT), properties of DFT, Linear filtering methodsbased on the DFT, frequency analysis of signals using the DFT.

Unit 3Fast Fourier transform and its applications: FFT algorithms (Radix 2 FFT) algorithm, Implementation ofDiscrete time systems, Structures for FIR systems, direct form structure, Cascade form structure, parallel form, structures for IIR systems, cascade, direct form and parallel form structures.

Unit 4Design of Digital Filters: Design of IIR filters, Bilinear transformation and impulse invariance method,Matched Z transformation design of FIR filters with different methods.

Note: Eight questions will be set by the examiners taking at least twoquestions from each unit. Students will be required to attempt five questions in all; at least one from each unit.

Books1. John G. Proakis and Dimitris G. Manolakis, Digital Signal Processing,PHI2. Oppenheim & Schaffer, Digital Signal Processing, PHI.3. Rabiner & Gold, Digital Signal Processing applications.

CSE-513 (H) Digital Signal L T P C3 - - 3

4. S.K., Mitra, Digital Signal Processing, TMH.5. S. Salivayhan, A Vallavraj, C. Gnanapriya, Digital Signal Processing, TMH.

.

3

4

w.e.f. Jan 2011 (Batch 2010-

2012 Onwards)Master of Technology (Computer Science &

Engineering)

Time 3 Hr. Maximum Marks: 60

Unit1Real Time Operating System overview, Introduction to processmodels, Interrupt routines in an RTOS environment,encapsulating semaphores and queues, hard real-timescheduling consideration, saving memory space.

Unit216 & 32 bit microprocessor and micro-controller and DSPhardware with reference to embedded system.

Unit3Embedded software development tools and compilers, host andtarget machines, linker/locators for embedded software, crosscompilers, cross assemblers and tool chairs, basic concept ofdevice drivers, serial communication interface device driver.

Unit4Communication protocol with special reference to embeddedsystem, TCP/IP, VDP wireless protocol, IRDA, Blue tooth IEE8.8.11.

Note: Eight questions will be set by the examiners taking at least two questions from each unit. Students will be required to attempt five questions in all at least one from each unit.

BOOKS:1. An embedded system primer by David E. Simon, 1999, Addison-Wesley.2. TCP/IP Lean: Web Servers for embedded systems by Jeramy Bentham, 2002.

CSE-513 (I) Embedded Systems L T P C3 - - 3

5

3. Real – time programming: A guide to 32 bit embedded development, Rick Grchan, 1999.

6