You are on page 1of 48

ANNA UNIVERSITY OF TECHNOLOGY MADURAI

MADURAI 625 002

CURRICULUM AND SYLLABI


UNDER REGULATIONS 2010-2011 FOR ALL AFFILIATED INSTITUTIONS

Course: M.E. – Computer Science and Engineering

First Semester

Subject
Title of the Subject L T P C
Code
MECS11 Discrete Mathematics 3 0 0 3
Advanced Data Structures and
MECS12 3 0 0 3
Algorithms
Network Engineering and
MECS13 3 0 0 3
management
Advanced Database
MECS14 3 0 0 3
technologies
MECS15 Computer Architecture 3 0 0 3

* Elective I 3 0 0 3
Advanced Data Structures
MECS16 0 0 3 2
Laboratory
Networks and Database
MECS17 0 0 3 2
laboratory

Second Semester

Subject
Title of the Subject L T P C
Code
Advanced distributed 3
MECS21 3 0 0
Computing
Soft Computing and
MECS22 3 0 0 3
Simulators
MECS23 Computer Network Security 3 0 0 3

MECS24 Compiler Design 3 0 0 3

** Elective II 3 0 0 3

** Elective III 3 0 0 3

MECS25 Compiler Laboratory 0 0 3 2


Soft Computing & Network
MECS26 0 0 3 2
Security Laboratory
1
Third Semester

Subject
Title of the Subject L T P C
Code
Virtualization and Cloud
MECS31 3 0 0 3
Computing
*** Elective IV 3 0 0 3

*** Elective V 3 0 0 3

MECS32 Project Thesis – Phase I 0 0 0 5

Fourth Semester

Subject
Title of the Subject L T P C
Code
MECS41 Project Thesis – Phase II 0 0 0 12

L – Lecture T – Tutorial P – Practical C- Credit

2
List of Electives

ELECTIVE I

Subject
Title of the Subject
Code
E1001 Object Oriented Systems Engineering

E1002 Multimedia Systems

E1003 Advanced JAVA technology

E1004 Digital Image processing

E1005 UNIX Internals

E1006 Open Source Systems

ELECTIVE II & III

Subject
Title of the Subject
Code
E2301 Software Project Management

E2302 XML & Web Services

E2303 Middleware technologies

E2304 Parallel computing and Multicore technologies

E2305 Mobile Technologies

E2306 Software reliability and project management

E2307 E-Commerce

E2308 Real-time systems

E2309 Network System Design Using Network Processor

E2310 Embedded Systems

E2311 Operation research

3
ELECTIVE IV & V

Subject
Title of the Subject
Code
E4501 Adhoc Networks

E4502 Bioinformatics

E4503 Recent trends in Mobile computing

E4504 Semantic Web

E4505 Data Warehousing and Data Mining

E4506 Agent based intelligent Systems

E4507 High speed networks

E4508 Decision support systems

E4509 Fault tolerant systems

E4510 Grid Computing

E4511 Wireless Sensor networks

4
SEMESTER – I

MECS11 - DISCRETE MATHEMATICS

L T P C
3 0 0 3

UNIT – I: FUNDAMENTAL STRUCTURES 9


Set theory:- Relationships between sets - Operations on sets - Set identities - Principle of
inclusion and exclusion - Minsets. Relations: – Binary relations - Partial orderings -
Equivalence relations. Functions: – Properties of functions - Composition of functions –
Inverse functions - Permutation functions.

UNIT – II: LOGIC 9


Propositional logic – Logical connectives – Truth tables – Normal forms (conjunctive and
disjunctive) - Predicate logic - Universal and existential quantifiers - Proof techniques –
direct and indirect – Proof by contradiction – Mathematical Induction.

UNIT – III: COMBINATORICS 9


Basics of counting – Counting arguments – Pigeonhole principle - Permutations and
Combinations - Recursion and Recurrence relations – Generating functions.

UNIT – IV: MODELING COMPUTATION AND LANGUAGES 9


Finite state machines – Deterministic and Non- deterministic finite state machines –
Turing Machines - Formal Languages – Classes of Grammars – Type_0 – Context
Sensitive – Context – Free – Regular Grammars – Ambiguity

UNIT – V: DISCRETE PROBABILITY 9


Finite probability - Probability distributions - Conditional Probability – Independence -
Bayes’ theorem - Mathematical expectation.

L -45 T-15 Total -60


REFERNCES

1. Judith L.Gersting, “Mathematical Structures for Computer Science”, Fifth


Edition, W.H. Freeman and Company, NY, 2003.
2. J.P. Tremblay and R. Manohar, “Discrete Mathematical Structures with
Applications to Computer Science”, TMH, 1997.
3. Kenneth H. Rosen, “Discrete Mathematics and its Applications”, Fifth Edition,
TMH, 2003.
4. R.P. Grimaldi, “Discrete and Combinatorial Mathematics”, Pearson Edition, New
Delhi 2002.
5. M.K. Venkataraman, N. Sridharan and N.Chandrasekaran, “Discrete
Mathematics”, The National Publishing Company, 2003.
5
MECS12 - ADVANCED DATA STRUCTURES
L T P C
3 0 0 3

Unit I:
Basic Concepts of OOPs – Templates Function and class templates – Algorithms-
performance analysis- time complexity and space complexity– ADT – List (Singly–
Doubly and Circular) Implementation – Array – Pointer – Cursor Implementation

Unit II:
Stacks and Queues – ADT– Implementation and Applications – Trees – General– Binary
– Binary Search – Expression Search – AVL – Introduction to Red Black trees and Splay
tree – B Trees – Implementations – Tree Traversals

Unit III:
Set – Implementation – Basic Operations on Set – Priority Queue – Implementation –
Graphs – Directed Graphs – Shortest Path Problem – Undirected Graph – Spanning Trees
– Graph Traversals-hash table representation- hash functions- collision resolution-
separate chaining- open addressing-linear probing- quadratic probing- double hashing-
rehashing

Unit IV:
Issues – Managing Equal Sized Blocks – Garbage Collection Algorithms for Equal Sized
Blocks – Storage Allocation for Objects with Mixed Sizes – Buddy Systems – Storage
Compaction

Unit V:
Searching Techniques – Sorting – Internal Sorting – Bubble Sort – Insertion Sort – Quick
Sort – Heap Sort – Bin Sort – Radix Sort – External Sorting – Merge Sort – Multiway
Merge Sort – Polyphase Sorting – Design Techniques – Divide and Conquer – Dynamic
Programming – Greedy Algorithm – Backtracking – Local Search Algorithms

REFERENCES:
1. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++”, Pearson
Education, 2002.
2. Aho Hopcroft Ullman, “Data Structures and Algorithms”, Pearson Education,
2002.
3. Horowitz Sahni, Rajasekaran, “Computer Algorithms”, Galgotia, 2000.
4. Tanenbaum A.S, Langram Y, Augestien M.J., ”Data Structures using C & C++”,
Prentice Hall of India, 2002.
5. Data structures, Algorithms and Applications in C++, S.Sahni, University Press
(India) Pvt.Ltd, 2nd edition, Universities Press Orient Longman Pvt. Ltd.
6. Data structures and Algorithms in C++, Michael T.Goodrich, R.Tamassia and
Mount, Wiley student edition, John Wiley and Sons.
7. Data structures using C and C++, Langsam, Augenstein and Tanenbaum, PHI.
6
MECS13 - NETWORK ENGINEERING AND MANAGEMENT

L T P C
3 0 0 3

Unit – I
Network Architecture – ISO/OSI layered architecture - TCP/IP reference Model – -
Types of Network - Transmission Media – Types of Modem – DSL, ADSL, Cable
Modem – Physical Layer Standard – RS232c, RS449, X.21& V.24. Data Link Layer-
Error Detection & correction, Flow control, Logical Link control and Medium access
Control 802.3, 802.4, 802.2, 802.11

Unit – II
Network layer – Services – Virtual Circuit – Datagram – Internetworking – Addressing –
Routing – Link State – Distance vector Routing – Congestion Control algorithm – IPV4 ,
IPV6, ICMP, ARP & RARP – Unicast Routing – RIP, OSPF, BGP – Multicast Routing
Protocols.

Unit – III
Transport layer - Services – Processes to Processes Delivery – Transmission Control
Protocol (TCP) – User Datagram Protocol – Data Traffic – Congestion Control and
Quality of Service – Application layer Design Issues – DNS, E-mail (SMTP), FTP,
HTTP, WWW

Unit – IV
Network Management – Areas of Management - Network Monitoring – Network
Controlling – SNMP – V1, V2, V3

Unit – V
RMON 1 – RMON 2 – Management Information Base – MIB – case study: NS2
Simulator

References:
1. William Stallings, Data and Computer Communications, Eighth Edition, Prentice
Hall of India Private Limited,2007
2. Brijendra Singh : Data Communication and Computer Networks, PHI, 2004.
3. Michael A.Gallo, William A. Hancock: Computer Communication and
Networking Technologies,Thomson Asia, 2003.
4. SNMP v1,v2,v3 & RMON 1 & 2 by William Stallings, Pearson Education Asia
Inc.,
5. Mani Subramanian, " Network Management Principles and practice ", Addison
Wesly New York, 2000.
6. Leon-Garcia, Widjaja : Communication Networks, Fundamental Concepts and
Key Architecture, TMH, 2nd Edition, 2004.
7. Gerd E.Keiser: Local Area Networks, TMH, 2nd Edition, 2002

7
MECS14 - ADVANCED DATABASE TECHNOLOGY
L T P C
3 0 0 3

UNIT I DISTRIBUTED DATABASES 5


Distributed Databases Vs Conventional Databases – Architecture – Fragmentation –
Query Processing – Transaction Processing – Concurrency Control – Recovery.

UNIT II OBJECT ORIENTED DATABASES 10


Introduction to Object Oriented Data Bases - Approaches - Modeling and Design -
Persistence – Query Languages - Transaction - Concurrency – Multi Version Locks -
Recovery.

UNIT III EMERGING SYSTEMS 10


Enhanced Data Models - Client/Server Model - Data Warehousing and Data Mining –
Web Databases – Mobile Databases.

UNIT IV DATABASE DESIGN ISSUES 10


ER Model - Normalization - Security - Integrity - Consistency - Database Tuning –
Optimization and Research Issues – Design of Temporal Databases – Spatial Databases.

UNIT V CURRENT ISSUES 10


Rules - Knowledge Bases - Active And Deductive Databases - Parallel Databases –
Multimedia Databases – Image Databases – Text Database

TOTAL = 45

REFERENCES:
1. Elisa Bertino, Barbara Catania, Gian Piero Zarri, “Intelligent Database Systems”,
Addison-Wesley, 2001.
2. Carlo Zaniolo, Stefano Ceri, Christos Faloustsos, R.T.Snodgrass,
V.S.Subrahmanian, “Advanced Database Systems”, Morgan Kaufman, 1997.
3. N.Tamer Ozsu, Patrick Valduriez, “Principles Of Distributed Database Systems”,
Prentice Hal International Inc., 1999.
4. C.S.R Prabhu, “Object-Oriented Database Systems”, Prentice Hall Of India, 1998.
5. Abdullah Uz Tansel Et Al, “Temporal Databases: Theory, Design And
Principles”, Benjamin Cummings Publishers, 1993.
6. Raghu Ramakrishnan, Johannes Gehrke, “Database Management Systems”,
Mcgraw Hill, Third Edition 2004.
7. Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System
Concepts”, Fourth Ediion, Mcgraw Hill, 2002.
8. R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Pearson
Education, 2004.

8
MECS15 - COMPUTER ARCHITECTURE

L T P C
3 0 0 3

UNIT I FUNDAMENTALS OF COMPUTER DESIGN AND PIPELINING 9


Fundamentals of Computer Design – Measuring and reporting performance –
Quantitative principles of computer design. Instruction set principles – Classifying ISA –
Design issues. Pipelining – Basic concepts – Hazards – Implementation – Multicycle
operations.

UNIT II INSTRUCTION LEVEL PARALLELISM WITH DYNAMIC


APPROACHES 9
Concepts – Dynamic Scheduling – Dynamic hardware prediction – Multiple issues –
Hardware based speculation – Limitations of ILP – Case studies.

UNIT III INSTRUCTION LEVEL PARALLELISM WITH SOFTWARE


APPROACHES 9
Compiler techniques for exposing ILP – Static branch prediction – VLIW – Advanced
compiler support – Hardware support for exposing more parallelism – Hardware versus
software speculation mechanisms – Case studies.

UNIT IV MULTIPROCESSORS AND MULTICORE ARCHITECTURES 9


Symmetric and distributed shared memory architectures – Performance issues –
Synchronizations issues – Models of memory consistency – Software and hardware
multithreading – SMT and CMP architectures – Design issues – Case studies.

UNIT V MEMORY AND I/O 9


Cache performance – Reducing cache miss penalty and miss rate – Reducing hit time –
Main memory and performance – Memory technology. Types of storage devices – Buses
– RAID – Reliability, availability and dependability – I/O performance measures –
Designing an I/O System

REFERENCES:

1. John L. Hennessey and David A. Patterson, “Computer Architecture – A


quantitative approach”, Morgan Kaufmann / Elsevier, 4th. Edition, 2007.
2. David E. Culler, Jaswinder Pal Singh, “Parallel Computing Architecture: A
hardware/software approach”, Morgan Kaufmann / Elsevier, 1997.
3. William Stallings, “Computer Organization and Architecture – Designing for
Performance”, Pearson Education, Seventh Edition, 2006.
4. Behrooz Parhami, “Computer Architecture”, Oxford University Press, 2006.

9
MECS16 - ADVANCED DATA STRUCTURES LAB

1. Linked lists
2. Multistacks
3. Double Ended Queue (Deques) & Circular Queues
4. Min Heap
5. Deaps
6. Leftist Heap
7. AVL Tree
8. B-Tree
9. Quick Sort
10. Greedy algorithm
11. Knapsack using Dynamic Programming
12. Graph coloring using backtracking

MECS17 - NETWORK AND DATABASE LAB

1. Socket Programming (Using Threads)


a. TCP Sockets
b. UDP Sockets
c. Applications using Sockets (Chat/File Transfer)
2. Simulation of Routing Protocols
3. Development of applications such as DNS/ HTTP
4. Performance evaluation of transport protocols using NS2 simulator.
5. Performance evaluation of any two routing protocols using NS2 simulator.
5. Study of all SQL commands
6. Implement the concept of Normalization
7. Implement the inventory control system with a reorder level
8. Develop a package for a bank to maintain its customer details
9. Develop a package for the payroll of a company

10
SEMESTER II

MECS21 - ADVANCED DISTRIBUTED COMPUTING


L T P C
3 0 0 3

UNIT I FUNDAMENTALS 9
Characterization of Distributed Systems – Examples – Resource Sharing and the Web –
Challenges – System Models – Architectural and Fundamental Models –Interprocess
Communication – The API for the Internet Protocols – External Data Representation and
Marshalling – Client–Server Communication – Group Communication – Case Study –
Distributed Objects and Remote Invocation – Communication between Distributed
Objects – Remote Procedure Call – Events and Notifications – Java RMI – Case Study.

UNIT II OPERATING SYSTEM ISSUES I 9


The OS Layer – Protection – Processes and Threads – Communication and Invocation –
OS Architecture – Security – Overview – Cryptographic Algorithms – Digital Signatures
– Cryptography Pragmatics – Case Studies – Distributed File Systems – File Service
Architecture– Sun Network File System – The Andrew File System.

UNIT III OPERATING SYSTEM ISSUES II 9


Name Services – Domain Name System – Directory and Discovery Services – Global
Name Service – X.500 Directory Service – Clocks – Events and Process States –
Synchronizing Physical Clocks – Logical Time and Logical Clocks – Global States –
Distributed Debugging – Distributed Mutual Exclusion – Elections – Multicast
Communication Related Problems.

UNIT IV DISTRIBUTED TRANSACTION PROCESSING 9


Transactions – Nested Transactions – Locks – Optimistic Concurrency Control –
Timestamp Ordering – Comparison – Flat and Nested Distributed Transactions – Atomic
Commit Protocols –Concurrency Control in Distributed Transactions – Distributed
Deadlocks – Transaction Recovery –Overview of Replication and Distributed
Multimedia Systems.

UNIT V PARALLEL PROGRAMMING USING MPI 9


Parallel Architectures - Parallel Algorithm Design - Message-Passing Programming -
Shared-memory Programming - Combining MPI and OpenMP - Matrix Multiplication

Total: 45

REFERENCES:
1. George Coulouris, Jean Dollimore and Tim Kindberg, “Distributed Systems
Concepts and Design”, Pearson Education, 3rd Edition, 2002.
2. Sape Mullender, “Distributed Systems”, Addison Wesley, 2nd Edition, 1993.
3. Albert Fleishman, “Distributed Systems Software Design and Implementation”,
Springer Verlag, 1994.
4. M. L .Liu, “Distributed Computing Principles and Applications”, Pearson
Education, 2004.

11
5. Andrew S Tanenbaum, Maartenvan Steen, “Distributed Systems, Principles and
Pardigms”, Pearson Education, 2002.
6. Mukesh Singhal, Niranjan G Shivaratri, “Advanced Concepts in Operating
Systems”, Tata McGraw Hill Edition, 2001.
7. Michael Quinn, “Parallel Programming In C With Mpi And Open Mp”, Tata
Mcgraw Hill, 2003

12
MECS22 - SOFT COMPUTING AND SIMULATORS
L T P C
3 0 0 3

UNIT I INTRODUCTION TO SOFT COMPUTING AND NEURAL NETWORKS 9

Evolution of Computing - Soft Computing Constituents – From Conventional AI to


Computational Intelligence - Machine Learning Basics

UNIT II FUZZY LOGIC 9

Fuzzy Sets – Operations on Fuzzy Sets – Fuzzy Relations – Membership Functions-


Fuzzy Rules and Fuzzy Reasoning – Fuzzy Inference Systems – Fuzzy Expert Systems –
Fuzzy Decision Making.

UNIT III NEURAL NETWORKS 9

Machine Learning Using Neural Network, Adaptive Networks – Feed forward Networks
– Supervised Learning Neural Networks – Radial Basis Function Networks -
Reinforcement Learning – Unsupervised Learning Neural Networks – Adaptive
Resonance architectures – Advances in Neural networks.

UNIT IV GENETIC ALGORITHMS 9

Introduction to Genetic Algorithms (GA) – Applications of GA in Machine Learning -


Machine Learning Approach to Knowledge Acquisition.

UNIT V MATLAB 9

Introduction to Matlab – Matlab Workspace – Arrays and array operations – Functions


and Files – Study of neural network toolbox and fuzzy logic toolbox – Simple
implementation of Artificial Neural Network and Fuzzy Logic.

TOTAL = 45

REFERENCES:
1. Jyh-Shing Roger Jang, Chuen-Tsai Sun, Eiji Mizutani, “Neuro-Fuzzy and Soft
Computing”, Prentice-Hall of India, 2003.
2. George J. Klir and Bo Yuan, “Fuzzy Sets and Fuzzy Logic-Theory and
Applications”, Prentice Hall, 1995.
3. James A. Freeman and David M. Skapura, “Neural Networks Algorithms,
Applications, and Programming Techniques”, Pearson Edn., 2003.
4. Melanie Mitchell, ’An introduction to Genetic Algorithm’, Prentice-Hall of India,
New Delhi, Edition: 2004
5. S.Rajasekaran and G.A Vijayalakshmi Pai,’Neural Networks, Fuzzy logic and
Genetic Algorithms, Synthesis and Applications’, Prentice Hall of India, New
Delhi-2003.
6. MATLAB Toolkit Manual

13
MECS23 - COMPUTER NETWORK SECURITY
L T P C
3 0 0 3
UNIT I FUNDAMENTALS
Introduction – Services, Mechanisms and Attacks, OSI security Architecture – Classical
Encryption Techniques – Stegnography – Block Ciphers and Data Encryption Standard –
Block Cipher Principles - Advanced Encryption Standard – AES Cipher; Contemporary
Symmetric Ciphers- Triple DES, Blowfish, RC5, Characteristics of Advanced Symmetric
Block Ciphers, RC4 Stream Cipher; Confidentiality using Symmetric Encryption-
Placement of Encryption Function, Traffic Confidentiality, Key Distribution, and
Random Number Generation.

UNIT II PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS


Public Key Cryptography and RSA- Principles of Public Key Cryptosystems, RSA
Algorithm; Key Management and other public key cryptosystems- Key Management,
Diffie-Hellman Key Exchange, Elliptic Curve arithmetic, Elliptic Curve Cryptography;
Message Authentication and Hash Functions- Authentication Requirements,
Authentication Functions, Message Authentication Codes, Hash Functions and MACs;
Hash Algorithms- MD5 Message Digest Algorithm; Secure Hash Algorithm, RIPEMD
160, HMAC; Digital Signatures and Authentication Protocols- Digital Signatures,
Authentication Protocols, Digital Signature Standards.

UNIT III NETWORK SECURITY PRACTICE


Authentication Applications- Kerberos, X.509 Authentication Service; Electronic Mail
Security- Pretty Good Privacy, S/MIME; IP Security- IP Security Overview, IP Security
Architecture, Authentication Header, Encapsulating Security Payload, Combining
Security Associations; Web Security- Web Security Considerations, Secure Sockets
Layer and Transport Layer Security, Secure Electronic Transaction.

UNIT IV SYSTEM SECURITY


Intruders- Intruder Detection, Password Management; Malicious Software- Virus and
Related Threats, Virus Counter Measures; Firewalls- Firewall Design Principles, Trusted
Systems.

UNIT V COMPUTER PRIVACY


Privacy at Risk – Privacy at Home – Privacy on the NET – Privacy at Work – Privacy in
Public – Privacy in the Future.

REFERENCES

1. William Stallings, “Cryptography and Network Security”, 3ed. Prentice Hall of India,
New Delhi ,2004
2. William Stallings, “Network Security Essentials”, 2 ed. Prentice Hall of India, New
Delhi, 2004
3. Charlie Kaufman , “Network Security: Private Communication in Public World”, 2
ed. Prentice Hall of India, New Delhi ,2004
4. Dan Tynan, Computer Privacy Annoyances, O'Reilly Media, July 2005
14
MECS24 - COMPILER DESIGN
L T P C
3 0 0 3
UNIT I LEXICAL ANALYSIS
Compilers – Analysis of Source Program - Phases of Compiler – Compiler Construction
Tools – Role of a Lexical Analyzer – Specification and Recognition of Tokens – Finite
Automata – Regular Expression to Finite Automation.

UNIT II SYNTAX ANALYSIS


Role of a Parser – Context Free Grammars – Top-Down Parsing – Bottom-Up Parsing –
LEX and YACC.

UNIT III INTERMEDIATE CODE GENERATION


Intermediate Languages – Declaration – Assignment Statements – Boolean Expressions –
Flow Control Statements – Back Patching.

UNIT IV CODE OPTIMIZATION


Code Optimization – Principal Sources of Optimization – Basic Blocks and Flow Graphs
Optimization of Basic Blocks – Code Improving Transformations.

UNIT V CODE GENERATION


Issues in the Design of a Code Generator – Run-Time Storage Management – Next Use
Information – A Simple Code Generator – DAG Representation of Basic Blocks –
Peephole Optimization – Code Generation from DAG.

REFERENCES

1. A.V. Aho, Ravi Sethi, J. D. Ullman, “Compilers - Principles, Techniques and


Tools”, Addison-Wesley Publishing Company, 1988.
2. Allen I. Holub, “Compiler Design in C”, Prentice Hall of India, 1993.
3. Fischer Leblanc, “Crafting Compiler”, Benjamin Cummings, Menlo Park,1988

15
MECS25 - COMPILER DESIGN LAB

1. Implementation of a Lexical Analyser


2. Computation of FIRST and FOLLOW sets
3. Construction of Predictive Parsing Table
4. Implementation of Shift Reduce Parsing
5. Computation of Leading and Trailing Sets
6. Computation of LR(0) items
7. Construction of DAG
8. Intermediate Code Generation
9. Use YACC and LEX to implement a parser for the same grammar as given in problem
10. Implement a recursive descent parser for an expression grammar that generates
arithmetic expressions with digits, + and *.
11. Use LEX tool to implement a lexical analyzer.
12. Write semantic rules to the YACC program in problem 5 and implement a
calculator that takes an expression with digits, + and * and computes and prints
its value.
13. Implement the front end of a compiler that generates the three address code for
a simple language with: one data type integer, arithmetic operators, relational
operators, variable declaration statement, one conditional construct, one
iterative construct and assignment statement.
14. Implement the back end of the compiler which takes the three address code
generated in problem 13, and produces the 8086 assembly language instructions
that can be assembled and run using a 8086 assembler. The target assembly
instructions can be simple move, add, sub, jump. Also simple addressing modes
are used.

Note: Use ‘C’ compiler to implement 1 – 8 and Lex & Yacc tool for the rest.

MECS26 - SOFT COMPUTING & NETWORK SECURITY LAB

1. Implementation of any two Symmetric Key Algorithms


2. Implement RSA algorithm
3. Analyse the components of a Digital Certificate and Display it.
4. Capture and Analyze the Network traffic using Packet Analyser Tools.
5. Design and Simulate any one Arificial Neural Netwrok using MATLAB
6. Implementation of any one Real Time Problem using GA
7. Design and Simulate any one Real Time Problem using Fuzzy Based Systems.

Note: Use ‘Java / Dot NET’ compiler to implement 1 – 3 and MATLAB tool for
5 – 7 and Wire Shark or any tool for 4.

16
SEMESTER III

MECS31 - VIRTUALIZATION AND CLOUD COMPUTING


L T P C
3 0 0 3

UNIT I CLOUD COMPUTING


Understanding the Cloud Computing – Cloud Architecture – Cloud Storage –
Advantages, Disadvantages of Cloud Computing – Companies in the Cloud Today –
Developing Cloud Services – Web-Based Application – Pros and Cons of Cloud Service
Development – Types of Cloud Service Development – Software as a Service – Platform
as a Service – Web Services – On-Demand Computing – Discovering Cloud Services
Development Services and Tools – Amazon Ec2 – Google App Engine – IBM Clouds

UNIT II CLOUD COMPUTING FOR EVERYONE


Centralizing Email Communications – Collaborating on Schedules, To-Do Lists, Contact
Lists and Group Projects and Events – Cloud Computing for the Community and
Corporation, Using Cloud Services: Collaborating on Calendars, Schedules and Task
Management – Exploring Online Scheduling Applications, Online Planning and Task
Management – Collaborating on Event Management, Contact Management, Project
Management, Word Processing and Databases – Storing and Sharing Files

UNIT III VIRTUALIZATION & CLOUD COMPUTING *


Virtualization & Cloud Computing Overview – Case Study: Enterprise Virtualization &
Cloud Computing – Definitions – Hypervisor / Virtual Machine Monitor Architecture –
CPU Virtualization Extensions – Network and Storage Virtualization Architecture

UNIT IV VIRTUALIZED ENTERPRISE *


Smashing the Virtualized Stack – Case Study: Owning the Virtualized Enterprise – CPU
& Chipsets – VMM/Hypervisor/Host – VMs/Guest – Control & Management planes &
APIs.

UNIT V CLOUD SECURITY AND PRIVACY


Infrastructure security – Data Security and Storage – Identity and access management –
Security management in the cloud – privacy – Security as a cloud service.

REFERENCES
1. Michael Miller, Cloud Computing: Web-Based Applications That Change the
Way You Work and Collaborate Online, Que Publishing, August 2008.
2. Christofer Hoff, Rich Mogull, Craig Balding, Hacking Exposed: Virtualization &
Cloud Computing: Secrets & Solutions [Paperback], McGraw-Hill Osborne (20
Jan 2012) *
3. Haley Beard, Cloud Computing Best Practices for Managing and Measuring
Processes for On-demand Computing, Applications and Data Centers in the Cloud
with SLAs, Emereo Pty Limited, July 2008.
4. Tim Mather, Subra Kumaraswamy, Shahed Latif, Cloud Security and Privacy –
An Enterprise Perspective on Risks and Compliance, By O'Reilly Media, 2009

17
ELECTIVE LIST

ELECTIVE - I

E1001 - OBJECT ORIENTED SYSTEMS ENGINEERING

L T P C
3 0 0 3
UNIT I CLASSICAL PARADIGM
System Concepts – Project Organization – Communication – Project Management

UNIT II PROCESS MODELS


Life cycle models – Unified Process – Iterative and Incremental – Workflow – Agile
Processes

UNIT III ANALYSIS


Requirements Elicitation – Use Cases – Unified Modeling Language, Tools – Analysis
Object Model (Domain Model) – Analysis Dynamic Models – Non-functional
requirements – Analysis Patterns

UNIT IV DESIGN
System Design, Architecture – Design Principles - Design Patterns – Dynamic Object
Modeling – Static Object Modeling – Interface Specification – Object Constraint
Language

UNIT V IMPLEMENTATION, DEPLOYMENT AND MAINTENANCE


Mapping Design (Models) to Code – Testing - Usability – Deployment – Configuration
Management – Maintenance

Total No of periods: 45

REFERENCES

1. Bernd Bruegge, Alan H Dutoit, Object-Oriented Software Engineering, 2nd ed,


Pearson Education, 2004.
2. Craig Larman, Applying UML and Patterns 3rd ed, Pearson Education, 2005.
3. Stephen Schach, Software Engineering 7th ed, McGraw-Hill, 2007.
4. Ivar Jacobson, Grady Booch, James Rumbaugh, The Unified Software
Development Process, Pearson Education, 1999.
5. Alistair Cockburn, Agile Software Development 2nd ed, Pearson Education, 2007.

18
E1002 - MULTIMEDIA SYSTEMS

L T P C
3 0 0 3

UNIT I INTRODUCTION AND QOS 9


Introduction-QOS Requirements and Constraints-Concepts-Resources- Establishment
hase-Run-Time Phase-Management Architectures.

UNIT II OPERATING SYSTEMS 9


Real-Time Processing-Scheduling-Interprocess Communication-Memory and anagement-
Server Architecture-Disk Management.

UNIT III FILE SYSTEMS AND NETWORKS 9


Traditional and Multimedia File Systems-Caching Policy-Batching-Piggy backing
thernet-Gigabit Ethernet-Token Ring-100VG AnyLAN-Fiber Distributed Data Interface
(FDDI)- ATM Networks-MAN-WAN.

UNIT IV COMMUNICATION 9
Transport Subsystem-Protocol Support for QOS-Transport of Multimedia-Computer
upported Cooperative Work-Architecture-Session Management-MBone Applications.

UNIT V SYNCHRONIZATION 9
Synchronization in Multimedia Systems-Presentation-Synchronization Types-Multimedia
ynchronization Methods-Case Studies-MHEG-MODE-ACME.

Total No of periods: 45

REFERENCES
1. Ralf Steinmetz and Klara Nahrstedt, “Multimedia Systems”, Springer, I Edition
2004.
2. Ralf Steinmetz and Klara Nahrstedt, Media Coding and Content Processing,
Prentice hall, 2002.
3. Vaughan Taeltimedia, Tata McGraw Hill, 1999.
4. Mark J.B., Sandra K.M., Multimedia Applications Development using DVI
echnology, McGraw Hill, 1992.
5. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovacovic, D. A. Milovacovic ,
ultimedia Communication Systems: Techniques, Standards, and Networks,
Prentice Hall, 1st Edition, 2002
6. Ze-Nian Li and Mark S. Drew, Fundamentals of Multimedia, Pearson, 2004.

19
E1003 - ADVANCED JAVA TECHNOLOGY
L T P C
3 0 0 3

UNIT I JAVA FUNDAMENTALS 9


Java Virtual Machine – Reflection – I/O Streaming – Filter And Pipe Streams – Byte
Codes – Byte Code - Interpretation – Dynamic Reflexive Classes – Threading – Java
Native Interfaces – GUI Applications.
UNIT II NETWORK PROGRAMMING IN JAVA 9
Stream Customization – Sockets – Secure Sockets – Custom Sockets – UDP Datagrams –
Multicast Sockets – URL Classes – Reading Data From The Server – Writing Data –
Configuring The Connection – Reading The Header – Content Handlers – Telnet
Application – Java Messaging Services.
UNIT III DISTRIBUTED COMPUTING IN JAVA 9
Remote Method Invocation – Activation Models – RMI Custom Sockets – Object
Serialization – Call Back Model – RMI – IIOP Implementation – CORBA – IDL
Technology – Naming Services – CORBA Programming Models – JAR File Creation.
UNIT IV MULTI – TIER APPLICATION DEVELOPMENT 9
Server Side Programming – Servlets – Session Management – Cookies – HTTP
Communication – JDBC – Multimedia Data Handling – Java Media Framework –
Enterprise Applications.
UNIT V MOBILE APPLICATION DEVELOPMENT 9
Mobile Information Device Profile – Deployment Of Mobile Objects – Foundation
Profile – RMI Profile For Mobile Devices – Development Of Midlets – Mobile
Networking Applications.
TOTAL : 45

REFERENCES
1. Elliotte Rusty Harold, “Java Network Programming”, O’Reilly Publishers, 2000.
2. Cay S.Horstmann, Gary Cornell, “Core Java, Volume 1 And 2”, 5th Edition,
Pearson Education Publishers, 2003.
3. Topley, “J2ME In A Nutshell”, O’Reilly Publishers, 2002.
4. Hunt, “Guide to J2EE Enterprise Java”, Springer Publications, 2004.
5. Ed Roman, “Enterprise Java Beans”, Wiley Publishers, 1998.
6. Avstin, “Advance Programming For The Java2 Platform” ‘Pearson Education,
2001.

20
E1004 - DIGITAL IMAGE PROCESSING
L T P C
3 0 0 3

UNIT I DIGITAL IMAGE FUNDAMENTALS


Elements of digital image processing systems, Elements of visual perception, psycho
visual model, brightness, contrast, hue, saturation, mach band effect, Color image
fundamentals -RGB,HSI models, Image acquisition and sampling, Quantization, Image
file formats, Two-dimensional convolution, correlation, and frequency responses.

UNIT II IMAGE TRANSFORMS


1D DFT, 2D transforms – DFT, DCT, Discrete Sine, Walsh, Hadamard, Slant, Haar,
KLT, SVD, Radon, and Wavelet Transform.

UNIT III IMAGE ENHANCEMENT AND RESTORATION


Histogram modification and specification techniques, Noise distributions, Spatial
averaging, Directional Smoothing, Median, Geometric mean, Harmonic mean, Contra
harmonic filters, Homomorphic filtering, Color image enhancement. Image Restoration –
degradation model, Unconstrained and Constrained restoration, Inverse filtering, Wiener
filtering, Geometric transformations – spatial transformations, Gray- Level interpolation,

UNIT IV IMAGE SEGMENTATION AND RECOGNITION


Edge detection. Image segmentation by region growing, region splitting and merging,
edge linking, Morphological operators: dilation, erosion, opening, and closing. Image
Recognition – Patterns and pattern classes, matching by minimum distance classifier,
Statistical Classifier. Matching by correlation, Neural network application for image
recognition.

UNIT V IMAGE COMPRESSION


Need for image compression, Huffman, Run Length Encoding, Arithmetic coding, Vector
Quantization, Block Truncation Coding. Transform Coding – DCT and Wavelet. Image
compression standards.
Total: 45
REFERENCES:
1. Rafael C. Gonzalez, Richard E.Woods, ‘Digital Image Processing’, Pearson
Education, Inc., Second Edition, 2004.
2. Anil K. Jain, ‘Fundamentals of Digital Image Processing’, Prentice Hall of India,
2002.
3. David Salomon : Data Compression – The Complete Reference, Springer Verlag
New York Inc., 2nd Edition, 2001
4. Rafael C. Gonzalez, Richard E.Woods, Steven Eddins, ‘ Digital Image Processing
using MATLAB’, Pearson Education, Inc., 2004.
5. William K.Pratt, ‘ Digital Image Processing’, John Wiley, NewYork, 2002.
6. Milman Sonka, Vaclav Hlavac, Roger Boyle, ‘Image Processing, Analysis, and
Machine Vision’, Brooks/Cole, Vikas Publishing House, II ed., 1999.
7. Sid Ahmed, M.A., ‘Image Processing Theory, Algorithms and Architectures’,
McGrawHill, 1995.
8. Lim, J.S., ‘Two Dimensional Signal and Image Processing’, Prentice-Hall, New
Jersey, 1990.

21
E1005 - UNIX INTERNALS
L T P C
3 0 0 3

UNIT I GENERAL OVERVIEW OF THE SYSTEM 9

History – System structure – User perspective – Operating system services –


Assumptions about hardware. Introduction to the Kernel : Architecture of the UNIX
operating system – Introduction to system concepts – Kernel data structures – System
administration – Summary and Preview.

UNIT II BUFFER CACHE 9


Buffer headers – Structure of the buffer pool – Advantages and disadvantages of the
buffer cache. Internal representation of files : Inodes – Structure of a regular file –
Directories – Conversion of a path name to an Inode – Super block – Other file types.

UNIT III SYSTEM CALLS FOR FILE SYSTEM 9


Open – Read – Write – File and record locking – Adjusting the position of file I/O –
LSEEK – Close – File creation – Creation of special files – Pipes – Dup – Mounting and
unmounting file systems

UNIT IV THE STRUCTURE OF PROCESSES 9


Process states and transitions – Layout of system memory – The context of a process –
Saving the context of a process. Process Control: Process creation – Signals – Process
termination – Awaiting process termination – Invoking other programs – The shell –
System boot and the INIT process.

UNIT V PROCESS SCHEDULING AND MEMORY MANAGEMENT


POLICIES 9
Process Scheduling – Memory Management Policies: Swapping – A hybrid system with
swapping and demand paging. The I/O Subsystem: Driver Interfaces– Disk Drivers-
Terminal Drivers.

REFERENCES
1. Maurice J. Bach, “The Design of the Unix Operating System”, Prentice Hall of
India, 2004.
2. Vahalia, “Unix Internals: The New Frontiers”, Pearson Education Inc, 2003.

22
E1006 - OPEN SOURCE SYSTEMS

L T P C
3 0 0 3

Unit –I 9
Overview of Free/Open Source Software-- Definition of FOSS & GNU, History of
GNU/Linux and the Free Software Movement , Advantages of Free Software and
GNU/Linux, FOSS usage , trends and potential—global and Indian.GNU/Linux OS
installation-- detect hardware, configure disk partitions & file systems and install a
GNU/Linux distribution ; Basic shell commands - logging in, listing files, editing files,
copying/moving files, viewing file contents, changing file modes and permissions,
process management ; User and group management, file ownerships and permissions,
PAM authentication ; Introduction to common system configuration files & log files ;
Configuring networking, basics of TCP/IP networking and routing, connecting to the
Internet (through dialup, DSL, Ethernet, leased line).

Unit – II 9
Configuring additional hardware - sound cards, displays & display cards, network cards,
modems, USB drives, CD writers ; Understanding the OS boot up process; Performing
every day tasks using gnu/Linux -- accessing the Internet, playing music, editing
documents and spreadsheets, sending and receiving email, copy files from disks and over
the network, playing games, writing CDs ; X Window system configuration and utilities -
- configure X windows, detect display devices ; Installing software – from source code as
well as using binary packages. Setting up email servers-- using postfix (SMTP services),
courier (IMAP & POP3 services), squirrel mail ( web mail services) ; Setting up web
servers -- using apache ( HTTP services), php (server-side scripting), perl ( CGI support)
; Setting up file services -- using samba ( file and authentication services for windows
networks), using NFS ( file services for gnu/Linux / Unix networks) ; Setting up proxy
services -- using squid ( http / ftp / https proxy services) ; Setting up printer services -
using CUPS (print spooler), foomatic (printer database)

Unit III 9
Setting up a firewall - Using netfilter and ip tables; Using the GNU Compiler Collection
– GNU compiler tools ; the C preprocessor (cpp), the C compiler (gcc) and the C++
compiler (g++), assembler (gas) ; Understanding build systems -- constructing make files
and using make, using autoconf and autogen to automatically generate make files tailored
for different development environments ; Using source code versioning and management
tools -- using CVS to manage source code revisions, patch & diff.

Unit IV 9
Understanding the GNU Libc libraries and linker -- linking against object archives (.a
libraries) and dynamic shared object libraries (.so libraries), generating statically linked
binaries and libraries, generating dynamically linked libraries ; Using the GNU
debugging tools -- gdb to debug programs, graphical debuggers like ddd, memory
debugging / profiling libraries mpatrol and valgrind ; Review of common programming
practices and guidelines for GNU/Linux and FOSS ; Introduction to Bash, sed & awk
scripting. Basics of the X Windows server architecture.

Unit V 9
23
Basics of the X Windows server architecture ; Qt Programming ; Gtk+ Programming ;
Python Programming ; Programming GUI applications with localization support.

REFERENCES:

1. N. B. Venkateshwarlu (Ed); Introduction to Linux: Installation and Programming,


B S Publishers; 2005.
2. Matt Welsh, Matthias Kalle Dalheimer, Terry Dawson, and Lar Kaufman,
Running Linux, Fourth Edition, O'Reilly Publishers, 2002.
3. Carla Schroder, Linux Cookbook, First Edition, O'Reilly Cookbooks Series, 2004

On-line material
1. Open Sources: Voices from the Open Source Revolution, First Edition, January 1999,
ISBN: 1-56592-582-3. URL: http://www.oreilly.com/catalog/opensources/book/toc.html
2. The Linux Cookbook: Tips and Techniques for Everyday Use, First Edition, Michael
Stutz, 2001. URL: http://dsl.org/cookbook/cookbook_toc.html
3. The Linux System Administrators' Guide, Lars Wirzenius, Joanna Oja, Stephen
Stafford, and Alex Weeks, December 2003. URL: http://www.tldp.org/guides.html
4. Using GCC, Richard Stallman et al. URL: http://www.gnu.org/doc/using.html
5. An Introduction to GCC, Brian Gough. URL:
http://www.networktheory.co.uk/docs/gccintro/
6. GNU Autoconf, Automake and Libtool, Gary V. Vaughan, Ben Elliston, Tom Tromey
and Ian Lance Taylor. URL: http://sources.redhat.com/autobook/
7. Open Source Development with CVS, Third Edition, Karl Fogel and Moshe Bar.
URL: http://cvsbook.red-bean.com/
8. Advanced Bash Scripting Guide, Mendel Cooper, June 2005. URL:
http://www.tldp.org/guides.html
9. GTK+/GNOME Application Development, Havoc Pennington. URL:
http://developer.gnome.org/doc/GGAD
10. Python Tutorial, Guido van Rossum, Fred L. Drake, Jr., Editor. URL:
http://www.python.org/doc/current/tut/tut.html

24
ELECTIVE II & III
E2301 - SOFTWARE PROJECT MANAGEMENT
L T P C
3 0 0 3

Unit 1 Introduction 9
Introduction to Software Project management and control –Scope of Project
management-Project Management Life cycle-Software Evolution and economics –
Software Management Process Framework-Disciplines of Software Management-
Measures and Measurements

Unit 2 Software Cost Estimation 10


Software Estimation – Problems with estimation – Decomposition Techniques - Cost
estimation Process – Delphi Technique –SLIM- COCOMO II – Function Point Analysis
– Estimation for Agile and Web development – Activity Based Costing and Economic
Value Added (EVA)- Balanced Score Card

Unit 3 Software Risk Management 9


Software Risks – Risk management Paradigm- Risk Categories – Risk Assessment -
Identification – Analysis - Prioritize – Ranking - Control – Risk Projection and
Refinement –FMEA

Unit 4 Software Metrics 10


Need of Software metrics – Software Metrics Classification – Product Metrics - Size -
Function Based – Quality - Source Code – Testing - Maintenance – Process metrics
Empirical Models - Statistical Models - Theory-based Models - Composite Models -
Reliability Models.

Unit 5 Project Management 7


Management Spectrum - People – Product – Process – Project – Client Relationship
management
Total = 45
Reference Books

1. McConnell, S. “Software Project: Survival Guide”, Microsoft Press, 1998. Royce,


W. “Software Project management: A Unified Framework”, Addison Wesley,
1998
2. Cooper, R., “The Rise of Activity-Based Costing- PartOne: What is an Activity-
Based Cost System?” Journal of Cost Management, Vol.2, No.2 (Summer 1988),
pp.45 – 54
3. Roger S.Pressman., “Software Engineering- A Practitioners approach”, 6th
edition,McGraw Hill International Edition
4. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE
Software, January 1991, pp32-41
5. Fenton, N.E., and Pfleeger, S.L.. “Software Metrics: A Rigorous and Practical
Approach, Revised” Brooks Cole, 1998
6. Tom Demarco, Controlling Software Project Management, Measurement,
Prentice Hall, New Jersey
7. Demarco, T. and Lister, T. “Peopleware: Productive Projects and Teams, 2nd Ed.”,
Dorset House, 1999
25
E2302 - XML AND WEB SERVICES
L T P C
3 0 0 3

1. INTRODUCTION 9
Role Of XML – XML and The Web – XML Language Basics – SOAP – Web Services –
Revolutions Of XML – Service Oriented Architecture (SOA).
2. XML TECHNOLOGY 9
XML – Name Spaces – Structuring With Schemas and DTD – Presentation Techniques –
Transformation – XML Infrastructure.
3. SOAP 9
Overview Of SOAP – HTTP – XML-RPC – SOAP: Protocol – Message Structure –
Intermediaries – Actors – Design Patterns And Faults – SOAP With Attachments.
4. WEB SERVICES 9
Overview – Architecture – Key Technologies - UDDI – WSDL – ebXML – SOAP And
Web Services In E-Com – Overview Of .NET And J2EE.
5. XML SECURITY 9
Security Overview – Canonicalization – XML Security Framework – XML Encryption –
XML Digital Signature – XKMS Structure – Guidelines For Signing XML Documents –
XML In Practice.
Total No. of Periods: 45

REFERENCE BOOKS:
1. Frank. P. Coyle, XML, Web Services And The Data Revolution, Pearson
Education, 2002.
2. Ramesh Nagappan , Robert Skoczylas and Rima Patel Sriganesh, “ Developing
Java Web Services”, Wiley Publishing Inc., 2004.
3. Sandeep Chatterjee, James Webber, “Developing Enterprise Web Services”,
Pearson Education, 2004.
4. McGovern, et al., “Java Web Services Architecture”, Morgan Kaufmann
Publishers, 2005.

26
E2303 - MIDDLEWARE TECHNOLOGIES
L T P C
3 0 0 3

UNIT I CLIENT / SERVER CONCEPTS 9


Client-Server − File server − Database server − Group server − Object server − Web
server − Middleware − General middleware − Service specific middleware − Client /
server building blocks − RPC − Messaging − Peer-to-Peer.
UNIT II EJB ARCHITECTURE 9
EJB − EJB architecture − Overview of EJB software architecture − View of EJB −
Conversation − Building and Ddeploying EJBs − Roles in EJB.
UNIT III EJB APPLICATIONS 9
EJB session beans − EJB entity beans − EJB clients − EJB deployment − Building an
application with EJB.
UNIT IV CORBA 9
CORBA − Distributed systems − Purpose − Exploring CORBA alternatives −
Architecture overview − CORBA and networking Model − CORBA object model −IDL
− ORB − Building an application with CORBA.
UNIT V COM 9
COM − Data types − Interfaces − Proxy and stub − Marshalling − Implementing
Server/Client − Interface pointers − Object creation − Invocation − Destruction −
Comparison COM and CORBA − Introduction to .NET − Overview of .NET architecture
− Marshalling − Remoting.
Total: 45

REFERENCES
1. Robert Orfali, Dan Harkey and Jeri Edwards, “The Essential Client/Server
2. Survival Guide”, Galgotia Publications Pvt. Ltd., 2002.
3. Tom Valesky, “Enterprise Java Beans”, Pearson Education, 2002
4. Jason Pritchard, “COM and CORBA side by side”, Addison Wesley, 2000
5. Jesse Liberty, “Programming C#”, 2nd Edition, O’Reilly Press, 2002.
6. Mowbray, “Inside CORBA”, Pearson Education, 2002.
7. Puder, “Distributed System Architecture – A Middleware Approach”,Elsevier,
2008.

27
E2304 - PARALLEL COMPUTING AND MULTICORE TECHNOLOGIES

L T P C
3 0 0 3

UNIT I PIPELINING AND ILP 9


Fundamentals of Computer Design - Measuring and Reporting Performance - Instruction
Level Parallelism and Its Exploitation - Concepts and Challenges - Overcoming Data
Hazards with Dynamic Scheduling – Dynamic Branch Prediction - Speculation - Multiple
Issue Processors – Case Studies.
UNIT II ADVANCED TECHNIQUES FOR EXPLOITING ILP 9
Compiler Techniques for Exposing ILP - Limitations on ILP for Realizable Processors -
Hardware versus Software Speculation - Multithreading: Using ILP Support to Exploit
Thread-level Parallelism - Performance and Efficiency in Advanced Multiple Issue
Processors - Case Studies.
UNIT III MULTIPROCESSORS 9
Symmetric and distributed shared memory architectures – Cache coherence issues -
Performance Issues – Synchronization issues – Models of Memory Consistency -
Interconnection networks – Buses, crossbar and multi-stage switches.
UNIT IV MULTI-CORE ARCHITECTURES 9
Software and hardware multithreading – SMT and CMP architectures – Design issues –
Case studies – Intel Multi-core architecture – SUN CMP architecture – IBM cell
architecture.- hp architecture.
UNIT V MEMORY HIERARCHY DESIGN 9
Introduction - Optimizations of Cache Performance - Memory Technology and
Optimizations - Protection: Virtual Memory and Virtual Machines - Design of Memory
Hierarchies - Case Studies.
TOTAL - 45

REFERENCES

1. John L. Hennessey and David A. Patterson, “Computer Architecture – A


quantitative approach”, Morgan Kaufmann / Elsevier, 4th. Edition, 2007.
2. David E. Culler, Jaswinder Pal Singh, “Parallel Computing Architecture: A
hardware/ software approach”, Morgan Kaufmann / Elsevier, 1997.
3. William Stallings, “Computer Organization and Architecture – Designing for
Performance”, Pearson Education, Seventh Edition, 2006.

28
E2305 - MOBILE TECHNOLOGIES
L T P C
3 0 0 3

UNIT I MOBILE DEVICE TECHNOLOGIES 9


Mobile Computing devices characteristics – Adaptation – Data dissemination and
Management –Heterogeneity – Interoperability – Context awareness – Language
localization issues – User Interfacedesign issues – Difference between UI design for
mobile devices and conventional systems – Mobile Agents -

UNIT II TERMINAL SOFTWARE PLATFORM TECHNOLOGIES 9


Introduction – Symbian OS: Introduction, Architecure,Applications for Symbion-
Controls and compound controls- Active objects- Localization- Security on the
Symbion.–Palm OS, Windows CE.NET– QUALCOMM, BREW, J2ME, – Pocket PC

UNIT III TELECOMMUNICATIONS: 9


GSM- DECTTETRA – UMTS- IMT-200 – Satellite Systems, CDMA and 3G:
Introduction , SpreadSpectrum,Technology-IS 95-CDMA versus GSM-Wireless Data-
third GenetrationNetworks, Applications on 3G.

UNIT IV LOCAL AREA AND WIDE AREA WIRELESS TECHNOLOGIES 9


IEEE 802.11 technologies – Infrared technologies – Bluetooth networks (OBEX
Protocol) – Personal Area Networks – Mobility Management – Mobile IP – Establishing
Wide area wireless networks – Concept and structure of ”cell” – Call establishment and
maintenance – Channel management – Frequency Assignment techniques.

UNIT V TRANSPORT AND APPLICATION LAYER: 9


Traditional TCP- Indirect TCP- Snooping TCP- Mobile TCP- Fast retransmit/ Fast
Recovery- Transmission/ Timeout Freezing – Selective Retransmission- Transaction
Oriented TCP, WAP Architecture – Datagram Protocol- Transport Layer Security-
Transaction Protocol- Session Protocol- Application Environment-Wireless Telephony
Application.

Total: 45
References
1. F.Adelstein, S.K.S. Gupta, “Fundamentals of Mobile and Pervasive Computing” Tata
McGraw Hill, 2005.
2. Ashoke Talukdar and Roopa Yavagal, “Mobile Computing”, Tata McGraw Hill, 2005
3. Next Generation Mobile Systems : 3G and Beyond-Wiely publications
4. 3G wireless Demystified- MCGraw Hill
5. 1. J.Schiller, Mobile Communication, Addison Wesley, 2000.

29
E2306 - SOFTWARE RELIABILITY AND PROJECT MANAGEMENT
L T P C
3 0 0 3

Unit 1 Introduction 7
Software Reliability – Ideas of Software Reliability – Ingredients of software reliability -
Challenges and difficulties in Software Reliability – Reliability Measurement -
Computation of Software reliability – Software Availability

Unit 2 Software Reliability Models 10


Classes of software reliability models - General procedure for reliability modeling - Time
Dependent Software Reliability Models- Time between failure reliability Models, Fault
Counting Reliability Models - Time Independent Software Reliability Models: Fault
injection model of Software Reliability, Input Domain Reliability Model, Orthogonal
defect classification, Software availability Models

Unit 3 Project Management 9


Software project management and control – Activities of Project Management – Project
Planning – Stepwise Project Planning-Project management Life cycle-Management
process framework-Software Risk Management-Risk Assessment-Risk Projection and
Refinement

Unit 4 Metrics and Estimation 10


Software Metrics-Classification - Product Metrics - Function Based, Quality Metrics,
Halsted’s Metrics – Process metrics - Empirical Models - Statistical Models and
Reliability Models – Software Estimation – Issues – Cost estimation method – COCOMO
II- Software Project Schedule

Unit 5 Team Management 9


Management Spectrum– Client Relationship management - Organizational Behaviour -
Selecting The RightPerson For The Job – Motivation – Hackman Job Characteristics
Model – Working In Groups – Becoming A Team –Decision Making – Leadership –
organizational Structures – Stress – Health And Safety– Case Studies.
Total = 45
References
1. Hoang Pham, “Software Reliability”, Springer Verlag, New York.
2. John D. Musa, “Software Reliability Engineered Testing”, Mc. Graw Hill, New
York.
3. Bob Hughes, Mikecotterell, “Software Project Management”, Third Edition, Tata
McGraw Hill, 2004
4. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE
Software, January 1991, pp32-41
5. Doron Reled, “Software Reliability Methods”, Springer Verlag, New York
6. R. Ramakumar, “Reliability Engineering: Fundamentals and Applications”,
Prentice Hall, New Delhi
7. McConnell, S. “Software Project: Survival Guide”, Microsoft Press, 1998. Royce,
W. “Software Project management: A Unified Framework”, Addison Wesley,
1998
8. Roger S.Pressman., “Software Engineering- A Practitioners approach”, 6th
edition,McGraw Hill International Edition
30
E2307 - E-COMMERCE TECHNOLOGY
L T P C
3 0 0 3

UNIT I INTRODUCTION 9
Infrastructure for Electronic Commerce - Networks - Packet Switched Networks -
TCP/IP Internet protocol - Domain name Services - Web Service Protocols - Internet
applications - Utility programs – Markup Languages - Web Clients and Servers -
Intranets and Extranets - Virtual private Network.
UNIT II CORE TECHNOLOGY 9
Electronic Commerce Models - Shopping Cart Technology - Data Mining - Intelligent
Agents – Internet Marketing - XML and E-Commerce
UNIT III ELECTRONIC PAYMENT SYSTEMS 9
Real world Payment Systems - Electronic Funds Transfer - Digital Payment -Internet
Payment Systems – Micro Payments - Credit Card Transactions - Case Studies.
UNIT IV SECURITY 9
Threats to Network Security - Public Key Cryptography - Secured Sockets Layer -
Secure Electronic Transaction - Network Security Solutions - Firewalls.
UNIT V INTER/INTRA ORGANIZATIONS ELECTRONIC COMMERCE 9
EDI - EDI application in business - legal, Security and Privacy issues - EDI and
Electronic commerce - Standards - Internal Information Systems - Macro forces - Internal
commerce - Workflow Automation and Coordination - Customization and Internal
commerce - Supply chain Management.
TOTAL: 45

REFERENCES
1. Ravi Kalakota and Andrew B Whinston , Frontiers of Electronic commerce,
Addison Wesley, 1996
2. Pete Loshin, Paul A Murphy , Electronic Commerce, 2nd Edition , Jaico
Publishers,1996.
3. Joseph P T , S J,E-Commerce - An Indian Perspective, second edtion, Prentice
Hall of India.2006.
4. David Whiteley, e - Commerce : Strategy, Technologies and Applications -
McGraw Hill,2000

31
E2308 - REAL TIME SYSTEMS.
L T P C
3 0 0 3

UNIT I INTRODUCTION 9
Introduction - Issues in Real Time Computing, Structure of a Real Time System. Task
Classes, Performance Measures for Real Time Systems, Estimating Program Run times.
Task Assignment and Scheduling - Classical Uniprocessor scheduling algorithms,
UniProcessor scheduling of IRIS Tasks, Task Assignment, Mode Changes, and Fault
Tolerant Scheduling.

UNIT II PROGRAMMING LANGUAGES AND TOOLS 9


Programming Language and Tools – Desired Language characteristics, Data Typing,
Control structures, Facilitating Hierarchical Decomposition, Packages, Run-time
(Exception) Error handling, Overloading and Generics, Multitasking, Low Level
programming, Task scheduling, Timing Specifications, Programming Environments,
Run-time Support.

UNIT III REAL TIME DATABASES 9


Real time Databases - Basic Definition, Real time Vs General Purpose Databases, Main
Memory Databases, Transaction priorities, Transaction Aborts, Concurrency Control
Issues, Disk Scheduling Algorithms, Two-phase Approach to improve Predictability,
Maintaining Serialization Consistency, Databases for Hard Real Time systems.

UNIT IV COMMUNICATION 9
Real-Time Communication - Communications Media, Network Topologies Protocols,
Fault Tolerant Routing. Fault Tolerance Techniques - Fault Types, Fault Detection. Fault
Error containment Redundancy, Data Diversity, Reversal Checks, Integrated Failure
handling.

UNIT V EVALUATION TECHNIQUES 9


Reliability Evaluation Techniques - Obtaining Parameter Values, Reliability Models for
Hardware Redundancy, Software Error models. Clock Synchronization - Clock, A
Nonfault-Tolerant Synchronization Algorithm, Impact of Faults, Fault Tolerant
Synchronization in Hardware, Fault Tolerant Synchronization in Software.
TOTAL = 45
REFERENCES:
1. C.M. Krishna, Kang G. Shin, “Real-Time Systems”, McGraw-Hill International
Editions, 1997.
2. Stuart Bennett, “Real Time Computer Control-An Introduction”,Second edition,
Prentice Hall PTR, 1994.
3. Peter D. Lawrence, “Real time Micro Computer System Design – An
Introduction”, McGraw Hill, 1988.
4. S.T. Allworth and R.N. Zobel, “Introduction to real time software
design”, Macmillan, II Edition, 1987.
5. R.J.A Buhur, D.L. Bailey, “ An Introduction to Real-Time Systems”, Prentice-
Hall International, 1999.
6. Philip.A.Laplante “Real Time System Design and Analysis” PHI , III Edition,
April 2004.

32
E2309 - NETWORK SYSTEM DESIGN USING NETWORK PROCESSOR
L T P C
3 0 0 3
UNIT I INTRODUCTION - PROTOCOLS AND PACKET FORMATS
Network systems and the Internet, Applications, packet processing, protocols and
layering, layer 1 and 2, layer 3, layer 4, protocol port numbers and de-multiplexing,
Encapsulation and transmission.

UNIT II PACKET PROCESSING


Introduction, packet buffer allocation, packet buffer size and copying, protocol layering
and copying, Heterogeneity and network byte order, IP datagram fragmentation and
reassembly, IP forwarding algorithm

UNIT III TCP ALGORITHM


TCP connection recognition algorithm, TCP splicing algorithm, Functions – Address
lookup and packet forwarding, error detection and correction, Fragmentation,
segmentation and reassembly, frame and protocol de-multiplexing, packet classification,
queuing and packet discard, Scheduling and timing, Authentication and privacy, traffic
measurement and policing , traffic shaping, timer management.

UNIT IV NETWORK PROCESSORS:


Introduction, motivation for embedded processors, RISC Vs CISC, need for custom
silicon, definition of NP, flexibility through programmability, instruction set, scalability
with parallelism and pipelining, cause and benefits of NP, NP functionality, packet
processing functions, Ingress and Egress processing, Parallel and distributed architecture,
architectural roles of NP, NP architectures – Introduction, architectural variety, primary
architectural characteristics, Architecture, packet flow and clock rates, software
architecture, assigning functionality to the process hierarchy, issues in scaling an NP.

UNIT V IXP2XXX
Introduction, IXP2xxx Architecture, Micro engines, Programming Models, Packet
processing in a single thread, Advanced programming, Applications: Switches, Routers,
Firewall, and Active Networks.
Total:45
REFERENCES:
1. Douglas E.Comer, “Network Systems Design using Network Processors”, Intel
IXP version,, Pearson Education. March 2003
2. Erik J. Johnson and Aaron Kunze, “IXP 2400/2800 Programming”, Intel Press,
April 2003
3. Uday R. Naik and Prashant R. Chandra, “ Designing High Performance
Networking Applications – Essential Insights for Developers of IXP2XXX
Network Processor Based Systems”, Intel Press, November 2004
4. Donald F. Hooper, “ Using IXP2400/2800 Development Tools – A Hands on
Approach to Network Processor Software Design”, Intel Press, August 2004
5. Patrick Crowley, Peter Z. Onufryk, Mark A. Franklin, Haldun Hadimioglu,
“Network Processors 2002: Design Principles and Practices”, Vol 1, Morgan
Kaufmann Publications, September 2002.

33
6. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
“Network Processor Design: Issues and Practices”, Vol 2, Academic Press,
December 2003.
7. Panos C. Lekkas, “Network Processors: Architectures, Protocols and Platforms
(Telecom Engineering”), McGraw Hill, July 2003

34
E2310 - EMBEDDED SYSTEMS
L T P C
3 0 0 3

UNIT I EMBEDDED COMPUTING 9


Challenges of Embedded Systems – Embedded system design process. Embedded
processors – ARM processor – Architecture, ARM and Thumb Instruction sets
UNIT II EMBEDDED C PROGRAMMING 9
C-looping structures – Register allocation – Function calls – Pointer aliasing – structure
arrangement – bit fields – unaligned data and endianness – inline functions and inline
assembly – portability issues.
UNIT III OPTIMIZING ASSEMBLY CODE 9
Profiling and cycle counting – instruction scheduling – Register allocation – conditional
execution – looping constructs – bit manipulation – efficient switches – optimized
primitives.
UNIT IV PROCESSES AND OPERATING SYSTEMS 9
Multiple tasks and processes – Context switching – Scheduling policies – Interprocess
communication mechanisms – Exception and interrupt handling - Performance issues.
UNIT V EMBEDDED SYSTEM DEVELOPMENT 9
Meeting real time constraints – Multi-state systems and function sequences. Embedded
software development tools – Emulators and debuggers. Design methodologies – Case
studies – Complete design of example embedded systems.
TOTAL = 45

REFERENCES
1. Andrew N Sloss, D. Symes, C. Wright,” ARM System Developers Guide”,
Morgan Kaufmann / Elsevier, 2006.
2. Michael J. Pont, “Embedded C”, Pearson Education, 2007.
3. Wayne Wolf, “Computers as Components: Principles of Embedded Computer
System Design”, Morgan Kaufmann / Elsevier, 2nd. edition, 2008.
4. Steve Heath, “Embedded System Design”, Elsevier, 2nd. edition, 2003.

35
E2311 - OPERATIONS RESEARCH
L T P C
3 0 0 3

UNIT I QUEUEING MODELS 9


Poisson Process – Markovian Queues – Single and Multi-server Models – Little’s
formula – Machine Interference Model – Steady State analysis – Self Service Queue.
UNIT II ADVANCED QUEUEING MODELS 9
Non- Markovian Queues – Pollaczek Khintchine Formula – Queues in Series – Open
Queueing Networks –Closed Queueing networks.
UNIT III SIMULATION 9
Discrete Even Simulation – Monte – Carlo Simulation – Stochastic Simulation –
Applications to Queueing systems.
UNIT IV LINEAR PROGRAMMING 9
Formulation – Graphical solution – Simplex method – Two phase method -
Transportation and Assignment Problems.
UNIT V NON-LINEAR PROGRAMMING 9
Lagrange multipliers – Equality constraints – Inequality constraints – Kuhn - Tucker
conditions – Quadratic Programming.
L: 45
REFERENCES:
1. Winston.W.L. “Operations Research”, Fourth Edition, Thomson – Brooks/Cole,
2003.
2. Taha, H.A. “Operations Research: An Introduction”, Ninth Edition, Pearson
Education Edition, Asia, New Delhi, 2002.
3. Robertazzi. T.G. “Computer Networks and Systems – Queuing Theory and
Performance
4. Evaluation”, Third Edition, Springer, 2002 Reprint.
5. Ross. S.M., “Probability Models for Computer Science”, Academic Press, 2002.

36
ELECTIVE IV & V

E4501 - ADHOC NETWORKS


L T P C
3 0 0 3
Unit 1. INTRODUCTION
Introduction-Fundamentals of Wireless Communication Technology – The
Electromagnetic Spectrum - Radio Propagation Mechanisms - Characteristics of the
Wireless Channel - IEEE 802.11a,b Standard – Origin Of Ad hoc: Packet Radio
Networks - Technical Challenges - Architecture of PRNETs - Components of Packet
Radios – Ad hoc Wireless Networks -What Is an Ad Hoc Network? Heterogeneity in
Mobile Devices - Wireless Sensor Networks - Traffic Profiles - Types of Ad hoc Mobile
Communications - Types of Mobile Host Movements - Challenges Facing Ad Hoc
Mobile Networks-Ad hoc wireless Internet
Unit 2. AD HOC ROUTING PROTOCOLS
Introduction - Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks -
Classifications of Routing Protocols -Table-Driven Routing Protocols – Destination
Sequenced Distance Vector - Wireless Routing Protocol - Cluster Switch Gateway
Routing - Source-Initiated On-Demand Approaches - Ad Hoc On- Demand Distance
Vector Routing - Dynamic Source Routing - Temporally Ordered Routing Algorithm -
Signal Stability Routing - Location-Aided Routing - Power-Aware Routing - Zone
Routing Protocol.
Unit 3. MULTICAST ROUTING IN AD HOC NETWORKS
Introduction - Issues in Designing a Multicast Routing Protocol - Operation of Multicast
Routing Protocols - An Architecture Reference Model for Multicast Routing Protocols -
Classifications of Multicast Routing Protocols - Tree-Based Multicast Routing Protocols:
Bandwidth Efficient Multicast Routing Protocol, Multicast Routing based on Zone
Routing, Associatively Based Ad Hoc Multicast Routing, Weight Based Multicast
Protocol, Multicast Ad Hoc On Demand Distance Vector Routing Protocol, Ad Hoc
Multicast Routing Protocol, Adaptive Shared Tree Multicast Routing Protocol -Mesh-
Based Multicast Routing Protocols - Energy-Efficient Multicasting - Multicasting with
Quality of Service Guarantees - Application-Dependent Multicast Routing .
Unit 4. TRANSPORT LAYER, SECURITY PROTOCOLS
Introduction - Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless
Networks - Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks -
Classification of Transport Layer Solutions - TCP Over Ad Hoc Wireless Networks -
Other Transport Layer Protocols for Ad Hoc Wireless Networks - Security in Ad Hoc
Wireless Networks - Network Security Requirements - Issues and Challenges in Security
Provisioning - Network Security Attacks - Key Management - Secure Routing in Ad Hoc
Wireless Networks
Unit 5. QoS AND ENERGY MANAGEMENT
Introduction - Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks -
Classifications of QoS Solutions - MAC Layer Solutions: Cluster TDMA, IEEE 802.11e
- Network Layer Solutions: Ticket Based QoS Routing Protocol, Predictive Location
Based QoS Routing Protocol, Bandwidth Routing Protocol, On Demand Link State
Multipath QoS Routing Protocol - QoS Frameworks for Ad Hoc Wireless Networks: QoS
Models, QoS Resource Reservation Signaling, INSIGNIA,SWAN- Energy Management
in Ad Hoc Wireless Networks –Introduction - Need for Energy Management in Ad Hoc
Wireless Networks - Classification of Energy Management Schemes - Battery

37
Management Schemes - Transmission Power Management Schemes - System Power
Management Schemes

REFERENCE BOOKS:
1. C. Siva Ram Murthy and B.S. Manoj “Ad Hoc Wireless Networks: Architectures and
Protocols”, Prentice Hall PTR,2004
2. C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall
PTR, 2001
3. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000

38
E4502 - BIO INFORMATICS
L T P C
3 0 0 3
1. INTRODUCTION 7
The Central Dogma – Killer Application – Parallel Universes – Watson’s Definition -
Top Down Vs Bottom Up Approach – Information Flow – Conversance-
Communications.
2. DATABASE AND NETWORKS 9
Definition – Data Management – Data Life Cycle – Database Technology – Interfaces –
Implementation – Networks: Communication Models – Transmission Technology
Protocols – Bandwidth – Topology – Contents – Security – Ownership – Implementation.
3. SEARCH ENGINES AND DATA VISUALIZATION 10
Search Process – Technologies – Searching And Information Theory – Computational
Methods – Knowledge Management – Sequence Visualizations – Structure
Visualizations – User Interfaces – Animation Vs Simulation
4. STATISTICS, DATA MINING AND PATTERN MATCHING 11
Statistical Concepts – Micro Arrays – Imperfect Data – Basics – Quantifying –
Randomness – Data Analysis – Tools Selection – Alignment – Clustering – Classification
– Data Mining Methods – Technology – Infrastructure Pattern Recognition – Discovery –
Machine Learning – Text Mining – Pattern Matching Fundamentals – Dot Matrix
Analysis – Substitution Matrix – Dynamic Programming – Word Method – Bayesian
Method – Multiple Sequence Alignment Tools.
5. MODELING SIMULATION AND COLLABORATION 8
Drug Discovery Fundamentals – Protein Structure – System Biology Tools –
Collaboration And Communication – Standards – Issues – Case Study.

Total No. Of Periods: 45

REFERENCE BOOKS:
1. Bryan Bergeron, “Bio Informatics Computing”, Prentice Hall, 2003.
2. T.K. Affward, D.J. Parry Smith, “Introduction to Bio Informatics”, Pearson
Education, 2001.
3. Pierre Baldi, Soren Brunak, “Bio Informatics – The Machine Learning
Approach”, 2nd Edition, First East West Press, 2003

39
E4503 - RECENT TRENDS IN MOBILE COMPUTING

L T P C
3 0 0 3
Unit I. INTRODUCTION 9
Medium Access Control : Motivation for Specialized MAC- SDMA- FDMA-
TDMACDMA- Comparison of Access mechanisms – Tele communications : GSM-
DECTTETRA – UMTS- IMT-200 – Satellite Systems: Basics- Routing- Localization-
Handover- Broadcast Systems: Overview – Cyclic Repetition of Data- Digital Audio
Broadcasting – Digital Video Broadcasting
Unit II. WIRELESS NETWORKS 9
Wireless LAN: Infrared Vs Radio Transmission – Infrastructure Networks- Ad hoc
Networks- IEEE 802.11 – HIPERLAN – Bluetooth- Wireless ATM: Working Group-
Services- Reference Model – Functions – Radio Access Layer – Handover- Location
Management- Addressing Mobile Quality of Service- Access Point Control Protocol

Unit III. MOBILE NETWORK LAYER 9


Mobile IP : Goals – Assumptions and Requirement – Entities – IP packet Delivery-
Agent Advertisement and Discovery – Registration – Tunneling and Encapsulation –
Optimization – Reverse Tunneling – IPv6 – DHCP- Ad hoc Networks , Mobile Transport
Layer, Application Layer
Unit IV. MOBILE TRANSPORT LAYER 9
Traditional TCP- Indirect TCP- Snooping TCP- Mobile TCP- Fast retransmit/ Fast
Recovery- Transmission/ Timeout Freezing – Selective Retransmission- Transaction
Oriented TCP
Unit V. WAP 9
Architecture – Datagram Protocol- Transport Layer Security- Transaction Protocol-
Session Protocol- Application Environment-Wireless Telephony Application

REFERENCE BOOKS
1. J.Schiller, Mobile Communication, Addison Wesley, 2000.
2. William Stallings, Wireless Communication and Networks, Pearson Education,
2003.
3. Singhal, WAP-Wireless Application Protocol, Pearson Education, 2003
4. Lother Merk, Martin. S. Nicklaus and Thomas Stober, Principles of Mobile
Computing, Second Edition, Springer, 2003.
5. William C.Y.Lee, Mobile Communication Design Fundamentals, John Wiley,
1993.

40
E4504 - SEMANTIC WEB
L T P C
3 0 0 3

1. INTRODUCTION 8
History – Semantic Web Layers –Semantic Web technologies – Semantics in Semantic
Web – XML: Structuring – Namespaces – Addressing – Querying – Processing
2. RDF 10
RDF and Semantic Web – Basic Ideas - RDF Specification – RDF Syntax: XML and
Non- XML - RDF elements – RDF relationship: Reification, Container, and collaboration
– RDF Schema – Editing, Parsing, and Browsing RDF/XML-RQL-RDQL
3. ONTOLOGY 10
Why Ontology – Ontology movement – OWL – OWL Specification - OWL Elements –
OWL constructs: Simple and Complex – Ontology Engineering : Introduction –
Constructing ontologies – Reusing ontologies – On-To-Knowledge Semantic Web
architecture
4. LOGIC AND INFERENCE 9
Logic – Description Logics - Rules – Monotonic Rules: Syntax, Semantics and examples
– Non-Monotonic Rules – Motivation, Syntax, and Examples – Rule Markup in XML:
Monotonic Rules, and Non-Monotonic Rules
5. APPLICATIONS OF SEMANTIC WEB TECHNOLOGIES 8
RDF Uses: Commercial and Non-Commercial use – Sample Ontology – e-Learning –
Web Services – Web mining – Horizontal information – Data Integration – Future of
Semantic Web
Total No. of Periods: 45

REFERENCES
1. Grigorous Antoniou and Van Hermelen - “A Semantic Web Primer”-The MIT
Press –2004
2. “Spinning the Semantic Web: Bringing the world wide web to its full potential” –
The MIT Press – 2004
3. Shelley Powers – “Practical RDF” – O’reilly publishers – First Indian Reprint :
2003

41
E4505 - DATA WAREHOUSING AND DATA MINING

L T P C
3 0 0 3
UNIT I DATA WAREHOUSING 9
Data Warehousing and Business Analysis - Data warehousing Components –Building a
Data warehouse – Mapping the Data Warehouse to a Multiprocessor Architecture –
DBMS Schemas for Decision Support – Online Analytical Processing (OLAP) – OLAP
and Multidimensional Data Analysis.

UNIT II DATAMINING - PREPROCESSING AND ASSOCIATION RULE


MINING 9
Data Mining - Data Mining Functionalities – Data Preprocessing – Data Cleaning – Data
Integration and Transformation – Data Reduction – Data Discretization and Concept
Hierarchy Generation. Association Rule Mining - Efficient and Scalable Frequent Item
set Mining Methods – Mining Various Kinds of Association Rules.

UNIT III CLASSIFICATION AND PREDICTION 9


Classification and Prediction - Issues Regarding Classification and Prediction –
Classification by Decision Tree Introduction – Bayesian Classification – Rule Based
Classification – Classification by Back propagation – Support Vector Machines –
Associative Classification – Other Classification Methods – Prediction – Accuracy and
Error Measures – Evaluating the Accuracy of a Classifier or Predictor

UNIT IV CLUSTERING 9
Cluster Analysis - Types of Data in Cluster Analysis – A Categorization of Major
Clustering Methods – Partitioning Methods – Hierarchical methods – Density-Based
Methods – Grid-Based Methods – Model-Based Clustering Methods – Clustering High-
Dimensional Data – Constraint- Based Cluster Analysis – Outlier Analysis.

UNIT V RECENT TRENDS 9


Mining Object, Spatial, Multimedia, Text and Web Data:
Multidimensional Analysis and Descriptive Mining of Complex Data Objects – Spatial
Data Mining – Multimedia Data Mining – Text Mining – Mining the World Wide Web.

Total = 45

REFERENCES
1. Jiawei Han and Micheline Kamber “Data Mining Concepts and Techniques”
Second Edition, Elsevier, Reprinted 2008.
2. Alex Berson and Stephen J. Smith “Data Warehousing, Data Mining & OLAP”,
Tata McGraw – Hill Edition, Tenth Reprint 2007.
3. K.P. Soman, Shyam Diwakar and V. Ajay “Insight into Data mining Theory and
Practice”, Easter Economy Edition, Prentice Hall of India, 2006.
4. G. K. Gupta “Introduction to Data Mining with Case Studies”, Easter Economy
Edition, Prentice Hall of India, 2006.
5. Pang-Ning Tan, Michael Steinbach and Vipin Kumar “Introduction to Data
Mining”, Pearson Education, 2007.

42
E4506 - AGENT BASED INTELLIGENT SYSTEMS
L T P C
3 0 0 3
UNIT I INTRODUCTION 9
Definitions - Foundations - History - Intelligent Agents-Problem Solving-Searching -
Heuristics - Constraint Satisfaction Problems - Game playing.
UNIT II KNOWLEDGE REPRESENTATION AND REASONING 9
Logical Agents-First order logic-First Order Inference-Unification-Chaining- Resolution
Strategies-Knowledge Representation-Objects-Actions-Events
UNIT III PLANNING AGENTS 9
Planning Problem-State Space Search-Partial Order Planning-Graphs-Nondeterministic
Domains-Conditional Planning-Continuous Planning-MultiAgent Planning.
UNIT IV AGENTS AND UNCERTAINITY 9
Acting under uncertainty – Probability Notation-Bayes Rule and use – Bayesian
Networks-Other Approaches-Time and Uncertainty-Temporal Models- Utility Theory -
Decision Network – Complex Decisions.
UNIT V HIGHER LEVEL AGENTS 9
Knowledge in Learning-Relevance Information-Statistical Learning Methods-
Reinforcement Learning-Communication-Formal Grammar-Augmented Grammars-
Future of AI.
Total No of periods: 45
REFERENCES:
1. Stuart Russell and Peter Norvig, “Artificial Intelligence - A Modern Approach”,
2nd Edition, Prentice Hall, 2002
2. Michael Wooldridge, “An Introduction to Multi Agent System”, John Wiley,
2002.
3. Patrick Henry Winston, Artificial Intelligence, III Edition, AW, 1999.
4. Nils.J.Nilsson, Principles of Artificial Intelligence, Narosa Publishing House,
1992.

43
E4507 - HIGH SPEED NETWORKS
L T P C
3 0 0 3
UNIT I HIGH SPEED NETWORKS 9
Frame Relay Networks – Asynchronous transfer mode – ATM Protocol Architecture,
ATM logical Connection, ATM Cell – ATM Service Categories – AAL. High Speed
LAN’s: Fast Ethernet, Gigabit Ethernet, Fibre Channel – Wireless LAN’s.
UNIT II CONGESTION AND TRAFFIC MANAGEMENT 9
Queuing Analysis- Queuing Models – Single Server Queues – Effects of Congestion –
Congestion Control – Traffic Management – Congestion Control in Packet Switching
Networks – Frame Relay Congestion Control.
UNIT III TCP AND ATM CONGESTION CONTROL 9
TCP Flow control – TCP Congestion Control – Retransmission – Timer Management –
Exponential RTO backoff – KARN’s Algorithm – Window management – Performance
of TCP over ATM. Traffic and Congestion control in ATM – Requirements – Attributes
– Traffic Management Frame work, Traffic Control – ABR traffic Management – ABR
rate control, RM cell formats, ABR Capacity allocations – GFR traffic management.
UNIT IV INTEGRATED AND DIFFERENTIATED SERVICES 9
Integrated Services Architecture – Approach, Components, Services- Queuing Discipline,
FQ, PS, BRFQ, GPS, WFQ – Random Early Detection, Differentiated Services.
UNIT V PROTOCOLS FOR QOS SUPPORT 9
RSVP – Goals & Characteristics, Data Flow, RSVP operations, Protocol Mechanisms –
Multiprotocol Label Switching – Operations, Label Stacking, Protocol details – RTP –
Protocol Architecture, Data Transfer Protocol, RTCP.
L-45 T-15 Total-60
REFERENCES
1. William Stallings, “High Speed Networks and Internet”, Second Edition, Pearson
Education, 2002.
2. Warland, Pravin Varaiya, “High Performance Communication Networks”, Second
Edition, Jean Harcourt Asia Pvt. Ltd., 2001.
3. Irvan Pepelnjk, Jim Guichard, Jeff Apcar, “MPLS and VPN Architecture”, Cisco
Press, Volume 1 and 2, 2003.

44
E4508 - DECISION SUPPORT SYSTEMS
L T P C
3 0 0 3

UNIT-I INTRODUCTION
Introduction : DSS definition- characteristics- History of DSS- Components of DSS-
Data and Model Management-DSS knowledge base- user interfaces- DSS user-
categories and classes of DSS’s- Decision and Decision Makers : Decision Makers-
Decision styles- Decision effectiveness- Hardness of Decisions

UNIT-II DECISION MAKING


Typology of Decisions: Decision theory- Rational Decision Making- Bounded
Rationality-Process of choice – Cognitive processes-Heuristics in Decision Making-
Effectiveness and efficiency- Decisions in the Organization: Understanding the
Organization- Organization culture- power and politics- organization Decision making

UNIT-III DECISION PROCESSES


Modeling Decision Processes: Problem definition and its structure – decision models-
types of probability and its forecasting techniques- sensitivity analysis- Group Decision
Support : Group Decision making- the problem with groups- concepts and definition of
MDM technology – MDM activities- virtual workplace-Executive Information
system(EIS):history of EIS-characteristics of executives- EIS components-making EIS
workfuture of executive Decision making and EIS.
UNIT-IV SYSTEM PERSPECTIVE OF DSS
Perspective of DSS: System – DSS in the context of information system- Information
quality issues in DSS design- DSS information system architecture- role of Internet in
DSS development and use- Designing and Building DSS: Strategies of DSS Analysis and
Design- DSS Developer-tools for DSS development- DSS user
Interface Issues
UNIT-V IMPLEMENTATION OF DSS
Implementing DSS: DSS Implementation- Patterns of Implementation- System
Evaluation-Importance of Integration-Creativity Decision making: Definition of
creativity- occurrence of creativity- creative problem solving techniques-introduction to
intelligent DSS (AI, Expert system and Knowledge based systems)– DSS in the 21st
century-future of DSS, EIS and DSS technologies

REFERENCES
1. George M .Marakas, "Decision Support Systems", 2nd Edition, Pearson
Education, 2005.
2. Efraim Turban, Jay E.Aronson, Ting-Peng Liang, "Decision Support Systems and
Intelligent Systems", 7th Edition, Pearson Education, 2006.

45
E4509 - FAULT TOLERANT SYSTEMS
L T P C
3 0 0 3
UNIT – I Fundamental Concepts
Definitions of fault tolerance, fault classification, fault tolerant attributes and system
structure. Fault-Tolerant Design Techniques: Information redundancy, hardware
redundancy, and time redundancy.
UNIT – II Dependability Evaluation Techniques
Reliability and availability models: (Combinatorial techniques, Fault-Tree models,
Markov models), Performability Models. Architecture of Fault-Tolerant Computers
(case study): General-purpose systems, high-availability systems, long-life systems,
critical systems.
UNIT – III Software Fault Tolerance
Software faults and their manifestation, design techniques, reliability models.
UNIT – IV Fault Tolerant Parallel/Distributed Architectures
Shared bus and shared memory architectures, fault tolerant networks.
UNIT – V Recent topics in fault tolerant systems
Security, fault tolerance in wireless/mobile networks and Internet.

REFERENCES
1. Fault-Tolerant Computer System Design D.K. Pradhan, 2003
2. Design and Analysis of Fault-Tolerant Digital Systems, B.W.Johnson, Addison-
Wesley, 1989
3. Fault-Tolerant Computing, Theory and Techniques, Volumes I and II , D.K.
Pradhan, Prentice Hall, 1986
4. Reliable Computer Systems: Design and Evaluation, D.P.Siewiorek and
R.S.Swartz, Digital Press, 1992
5. Probability and Statistics with Reliability, Queueing and Computer Science
Application, K.S.Trivedi, Prentice Hall, 1982

46
E4510 - GRID COMPUTING
L T P C
3 0 0 3

1. GRID COMPUTING INITIATIVES


Introduction - Definition - Scope of grid computing – Grid Computing Organizations and
their roles – Grid Computing analog – Grid Computing road map.

2. GRID COMPUTING APPLICATIONS AND TECHNOLOGIES


Merging the Grid services Architecture with the Web Services Architecture – OGSA –
Sample use cases – OGSA platform components – OGSI – OGSA Basic Services.

3. GRID COMPUTING TOOL KITS


The Globus Toolkit 4 – GT4 Java WS core: state full webservice – Singleton, Multiple
Resources – Life Cycle Management – Persistent Resources – GT4 Security: GSI – The
security Descriptor – Authentication – Authorization – Resource level security.

4. GLOBUS TOOL KIT


Installing the Globus Toolkit 4 – WSDL Primer – Command Line Clients – Examples.

5. CASE STUDY
Case Study: GridSim: Installing the simulator – examples – Alchemi Toolkit: Owner,
Manager and Executor cluster – Prime number generation example. (Web References)

REFERENCE BOOKS:
1. Joshy Joseph & Craig Fellenstein, “Grid Computing”, PHI, PTR-2003.
2. Borja Sotomayor & Lisa Childers, Globus Toolkit® 4: Programming Java
Services, Morgan Kaufmann, 2006
3. Ahmar Abbas, “Grid Computing: A Practical Guide to technology and
Applications”, Charles River media – 2003.

47
E4511 - WIRELESS SENSOR NETWORKS
L T P C
3 0 0 3
UNIT I INTRODUCTION
Over view of sensor networks- Constraints and challenges – Advantages of sensor
networks- Applications- Collaborative processing – Key definitions in sensor networks –
Tracking scenario – Problem formulation – Distributed representation and interference of
states – Tracking multiple objects – sensor models- Performance comparison and metrics.
UNIT II NETWORKING SENSORS
Key assumption - Medium access control – S-MAC protocol – IEEE 802.15.4 standard
and ZigBee - General Issues - Geographic, Energy – Aware Routing - Attribute based
routing.
UNIT III INFRASTRUCTURE ESTABLISHMENT
Topology control – Clustering -Time Synchronization – Localization – Task driven
sensing – Role of sensor nodes – Information based tasking - Routing and aggregation.
UNIT IV SENSOR NETWORK DATABASE
Sensor Database Challenges – Querying the physical environment – Interfaces – In-
network aggregation – Data centric storage – Data indices and range queries –
Distributed Hierarchical aggregation – Temporal data.
UNIT V SENSOR NETWOR PLATFORMS AND TOOLS
Sensor Node Hardware – Sensor network programming challenges – Node level software
platforms – Operating system TinyOS – Node level simulators – State centric
programming – Applications and future directions.
Total: 45
REFERENCE:
1. Feng Zhao, Leonidas Guibas, “Wireless sensor networks an information
processing approach”, Mogan kanufmann publishers, 2004

48

You might also like