Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
413 views

Object Oriented Programming With Java-L-Scheme

This document outlines the syllabus for two courses: Object Oriented Programming with Java and Computer Networks and Security. The Java course covers topics like introduction to OOP concepts, Java environment, control structures, arrays, strings, classes and interfaces, packages, applets, exception handling, multithreading and I/O streams across 5 units. The Computer Networks course covers topics like data communications, OSI model, LAN protocols, TCP/IP suite, network security, applications of network security across 5 units. It includes concepts of transmission media, network devices, protocols like IP, TCP, UDP and application layer protocols. Network security topics include cryptography, internet security, system security, intrusion detection and wireless security issues
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
413 views

Object Oriented Programming With Java-L-Scheme

This document outlines the syllabus for two courses: Object Oriented Programming with Java and Computer Networks and Security. The Java course covers topics like introduction to OOP concepts, Java environment, control structures, arrays, strings, classes and interfaces, packages, applets, exception handling, multithreading and I/O streams across 5 units. The Computer Networks course covers topics like data communications, OSI model, LAN protocols, TCP/IP suite, network security, applications of network security across 5 units. It includes concepts of transmission media, network devices, protocols like IP, TCP, UDP and application layer protocols. Network security topics include cryptography, internet security, system security, intrusion detection and wireless security issues
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Object Oriented Programming with Java

"L" Scheme Syllabus - Sub Code: 25243


UNIT TOPIC

INTRODUCTION TO OOPS AND JAVA

II

CONTROL STRUCTURES, ARRAYS, AND VECTORS

III

STRINGS, CLASSES AND INTERFACES

IV

PACKAGES, APPLETS AND AWT CONTROLS

EXCEPTION HANDLING, MULTITHREADS AND I/O STREAMS

Unit 1:
1.1 Introduction to OOPS: Paradigms of Programming Languages - Basic concepts of Object Oriented Programming Differences between Procedure Oriented Programming and Object Oriented Programming - Objects and Classes Data abstraction and Encapsulation, Inheritance, Polymorphism, Dynamic binding, Message communication Benefits of OOP Application of OOPs. 1.2. Java : History Java features Java Environment JDK API. 1.3 Introduction to Java : Types of java program Creating and Executing a Java program Java Tokens: Keywords, Character set, Identifiers, Literals, Separator Java Virtual Machine (JVM) Command Line Arguments Comments in Java program.

Unit 2:
2.1. Elements: Constants Variables Data types - Scope of variables Type casting Operators: Arithmetic - Logical Bit wise operator Increment and Decrement Relational Assignment Conditional Special operator Expressions Evaluation of Expressions

2.2. Decision making and Branching: Simple if statement if else statement Nesting if else else if Ladder switch statement Decision making and Looping: While loop do While loop - for loop break labelled loop continue Statement.- Simple programs &nbsp 2.3. Arrays: One Dimensional Array Creating an array Array processing Multidimensional Array Vectors Wrapper classes Simple programs

Unit 3:
3.1 Strings: String Array String Methods String Buffer Class Simple programs 3.2. Class and objects: Defining a class Methods Creating objects Accessing class members Constructors Method overloading Static members Nesting of Methods this keyword Command line input Simple programs 3.3. Inheritance: Defining a subclass Deriving a sub class Single Inheritance Multilevel Inheritance Hierarchical Inheritance Overriding methods Final variables and methods Final classes Finalizer methods - Abstract methods and classes Visibility Control: Public access, Private access, friend, protected. Interfaces: Multiple Inheritance - Defining interface Extending interface - Implementing Interface - Accessing interface variables Simple programs

Unit 4:
4.1. Packages: Java API Packages System Packages Naming Conventions Creating & Accessing a Package Adding Class to a Package Hiding Classes Programs 4.2. Applets: Introduction Applet Life cycle Creating & Executing an Applet Applet tags in HTML Parameter tag Aligning the display - Graphics Class: Drawing and filling lines Rectangles Polygon Circles Arcs Line Graphs Drawing Bar charts Programs 4.3. AWT Components and Even Handlers: Abstract window tool kit Event Handlers Event Listeners AWT Controls and Event Handling: Labels TextComponent ActionEvent Buttons CheckBoxes ItemEvent - Choice Scrollbars Layout Managers- Input Events Menus Programs

Unit 5:
5.1. Exception Handling: Limitations of Error handling Advantages of Exception Handling Types of Errors Basics of Exception Handling try blocks throwing an exception catching an exception finally statement

5.2. Multithreading: Creating Threads Life of a Thread Defining & Running Thread Thread Methods Thread Priority Synchronization Implementing runnable interface Thread Scheduling. 5.3. I/O Streams: File Streams Advantages - The stream classes Byte streams Character streams. TEXT BOOKS<

Programming with Java - E. Balagurusamy Object oriented Programming in Java - Dr.G.Thampi REFERENCES

Let us Java - Yashavant Kanetkar - BPB Publications, New Delhi - First Edition 2012 An Introduction to Oops with Java - C Thomas WU - TataMc-Graw Hill, New Delhi - 4th Edition Object oriented Programming through Java - ISRD Group - TataMc-Graw Hill, New Delhi - Eight Reprint 2011 Java for students - Ajay dharwani - Shroff Distributors and publishers - Second Edition March 2011 Java for Beginners - Shirish Chavan - Shroff Distributors and publishers - Fourth Print October 2009 Internet and Java Programming - Harish kumar Taluja - Firewall Media, Chennai - First Edition : 2008 Reprint : 2010 Object Oriented Programming through Java - P.Radhakrishna - University Press - First Edition 2007 Programming in Java - Sachin Malhotra and Saurabh Chaudhay - Oxford University Press - 2010 Core Java for Beginners - Rashmi Kanta Day - Vikas Publishing Ltd 2011

Computer Networks And Security

"L" Scheme Syllabus - Sub Code: 25242


UNIT TOPIC

DATA COMMUNICATIONS

II

OSI MODEL AND LAN PROTOCOLS

III

TCP/IP SUIT

IV

NETWORK SECURITY

APPLICATIONS OF NETWORK SECURITY

Unit 1:
1.1 Data Communication: Components of a data communication Data flow: Simplex Half duplex Full duplex; Networks Network criteria Types of Connections: Point to point multipoint; Topologies: Star, Bus, Ring, Mesh, Hybrid Advantages and Disadvantages of each topology. 1.2. Types of Networks: Need for computer Networks - LAN MAN WAN CAN HAN Internet Intranet Extranet , Client-Server, Peer to Peer Networks. 1.3 Transmission Media : Characteristics of Transmission Media - Classification of transmission media - Guided Twisted pair Coaxial Fiber optics Unguided Radio waves Infrared Low Orbit satellite (LOS) VSAT Cabling and Standards 1.4. Network devices: Features and Concepts of Switches Routers (Wired and Wireless) Gateways.

Unit 2:

2.1. Network Models: Protocol definition - Standards - OSI Model Layered architecture Functions of all layers. 2.2. 802.X Protocols : Concepts and PDU format of CSMA/CD (802.3) Token bus (802.4) Token ring (802.5) Ethernet Types of Ethernet (Fast Ethernet, gigabit Ethernet) Comparison between 802.3, 802.4 and 802.5 2.3. FDDI: Frame format Advantages and disadvantages of FDDI. 2.4 Switching: Definition Circuit switching Packet switching Message switching. 2.5 ISDN : Concepts Services Layers Broad Band ISDN

Unit 3:
3.1. Overview of TCP / IP: OSI & TCP/IP Transport Layer Protocol Connection Oriented and Connectionless Services Sockets - TCP & UDP. 3.2. Network Layers Protocol: IP Interior Gateway Protocols (IGMP, ICMP, ARP, RARP Concept only). 3.3. IP Addressing : Dotted Decimal Notation Subnetting & Supernetting VLSM TechniqueIPv6 (concepts only) 3.4 Application Layer Protocols: FTP Telnet SMTP HTTP DNS POP.

Unit 4:
4.1. Introduction to Network security: Definition Need for security Principles of Security - Attacks Types of Attacks Criminal attacks Legal Attacks Passive and Active attacks Security Services Security Mechanisms 4.2. Cryptography: Definition Symmetric Encryption principles Symmetric Block Encryption Algorithms DES, AES Stream ciphers RC4 Cipher block modes of operation - Approaches to message Authentication Hash function Secure Hash function Digest function Public key cryptography Principles RSA - Diffe-Hellman algorithm Digital Signature ( Definition only) 4.3. Internet Security: Email security S.MIME - IP security Overview IP Security Architecture Authentication header - Web security - SSL, TLS ,SET ( Concepts only)

Unit 5:
5.1. System Security : Viruses-worms-Trojan horses-SPAM 5.4 Security Mechanism : Introduction Types of Firewalls Packet filters Application gateways Limitations of firewalls 5.4 Intrusion : Intruders Intruder detection Classification of Intruder Detection systems Honey pots 5.5 Wireless Security Issues: Definition and Types -Transmission Security, Authentication , WLAN Detection, Eaves Dropping, Active Attacks, WEP Definition and Features TEXT BOOKS 1. Data Communication and networking - Behrouz A.Forouzan - TataMc-Graw Hill, New Delhi Fourth Edition 2. Data and Computer Communications - William Stallings - Prentice-Hall of India - Eighth Edition 3. Cryptography & Network Security - Atul Kahath - TataMc-Graw Hill, - New Delhi - Sixth Edition 4. Network Security Essentials Applications and Standards - William Stallings - Pearson Education - Third Edition 5. Network Security A beginners Guide - Eric Maiwald TataMc Graw-Hill - Second Edition REFERENCES

Computer Communication Networks - Achyut S. Godbole Data Communication and Computer Networks - Dr.M. Jain Sathish Jain Practical Cryptography - Bruce, Schneier Cryptography and Network Security - Behrouz A.Forouzan, Debdeep Mukhopadhyay Computer Network - S.S.Shinde New Age

You might also like