Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Master of Science (M.SC.) - Computer Science Curriculum - 2013

Download as pdf or txt
Download as pdf or txt
You are on page 1of 50

1 ANNA UNIVERSITY, CHENNAI 25 CENTRE FOR DISTANCE EDUCATION

MASTER OF SCIENCE (M.Sc.) COMPUTER SCIENCE Curriculum - 2013


_

SEMESTER - I
CODE NO. Theory
DCS7101 DCS7102 DCS7103 DCS7104 DCS7105

COURSE TITLE Computer Organization & Design Problem Solving and Programming Database Management System Software Engineering Mathematical Foundations of Computer Science Programming Lab Database Management System Lab TOTAL

CREDITS 3 3 3 3 4 2 2 20

Practical
DCS7111 DCS7112

SEMESTER - II
CODE NO. Theory
DCS7201 DCS7202 DCS7203 DCS7204 DCS7205

COURSE TITLE Computer Networks Object Oriented Programming Data Structures and Algorithms Operating System Software Project Management Object Oriented Programming Lab Data Structures and Algorithms Lab TOTAL

CREDITS 3 3 3 3 3 2 2 19

Practical
DCS7211 DCS7212

SEMESTER - III
CODE NO. Theory
DCS7301 DCS7302 DCS7303 DCS7304 E1

COURSE TITLE Information Security Data Warehousing and Mining Web Programming Object Oriented Analysis and Design Elective I Web Programming Lab Software Development Lab TOTAL

CREDITS 3 3 3 3 3 2 2 19

Practical
DCS7311 DCS7312

SEMESTER - IV
CODE NO. Theory
E2 E3 DCS7411

COURSE TITLE Elective II Elective III Project Work TOTAL

CREDITS 3 3 12 18

LIST OF ELECTIVES III SEMESTER MSC ELECTIVE I

CODE NO. Theory


DCS7001 DCS7002 DCS7003

COURSE TITLE Mobile Computing XML and Web Services Theory of Computation

CREDITS 3 3 3

IV SEMESTER MSC ELECTIVE II

CODE NO. Theory


DCS7004 DCS7005 DCS7006

COURSE TITLE Computer Graphics and Multimedia Systems Ethical Hacking and Cyber Forensics Software Testing

CREDITS 3 3 3

V SEMESTER MSC ELECTIVE III

CODE NO. Theory


DCS7007 DCS7008 DCS7009

COURSE TITLE Cloud Computing Visual Programming E Commerce

CREDITS 3 3 3

ANNA UNIVERSITY CHENNAI M.Sc. (DISTANCE MODE) REGULATIONS 2013 SYLLABUS I TO IV SEMESTERS SEMESTER I DCS7101 COMPUTER ORGANIZATION & DESIGN
COURSE OBJECTIVES Understand the fundamentals of Boolean logic and functions. To have a thorough understanding of the basic structure and operation of a digital computer. Design and realize digital systems with basic gates and other components using combinational and sequential circuits. Discuss in detail the operation of the arithmetic and logic unit. To study the instruction sets and operation of a processor. To study the different ways of communicating with I/O devices and standard I/O Interfaces. To study the hierarchical memory system including cache memories and virtual memory.

CREDITS: 3

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Master the binary and hexadecimal number systems including computer arithmetic. Design and implement digital systems with basic gates and other components using combinational and sequential circuits. Be familiar with the Von Neumann architecture. Be familiar with the functional units of the processor and addressing modes, instruction sets. Be familiar with the memories and cache subsystem. Be familiar with different ways of communicating with I/O devices and standard I/O interfaces.

UNIT I

4 Digital systems, binary numbers, octal, hexadecimal conversions, signed binary numbers, complements, logic gates, Boolean algebra , K-maps, standard forms, NAND-NOR implementation Combinational circuits, adder, subtractor, ALU design, decoder, encoder, multiplexers, Sequential circuits: latches, flip-flops, registers, memories, up- down counters Von-neumann architecture, processor :definition, structure ,category, technology, ALU concept, stored programs, fetch execute cycle, instruction formats, clock rate instruction rate, pipeline, current processors, multi core processors Physical memory , addressing, virtual memory, address translation, paging, cache, L1,L2,L3 cache memories, cache mapping, LRU replacement Data transfer, Serial and Parallal data transfer, Full duplex- half duplex interaction, Bus interface, Programmed I/O, Polling, Interrupt driven I/O, Hardware interrupt mechanism, Interrupt vectors, Multi level of interrupts,DMA, buffer chaining, operation chaining

UNIT II

UNIT III

UNIT IV

UNIT V

REFERENCE BOOKS: 1. Morris mano, Digital design PHI/Pearson fourth edition 2006 2. Douglas E.Comer Essentials of Computer Architecture Pearson sixth edition 2012 3. Carl Hamacher, Zvonko Vranesic, Safwat Zaky, Computer Organization, Tata McGraw Hill, Fifth Edition, 2002 4. William Stallings, Computer Organization and Architecture Designing for Performance, Pearson Education, Seventh Edition, 2006. 5. David A Patterson and John L. Hennessy, Computer Organization and Design, The Hardware/Software Interface, Morgan Kaufmann / Elsevier, Third Edition, 2005.

DCS7102

PROBLEM SOLVING AND PROGRAMMING

CREDITS:3

COURSE OBJECTIVES Understand the various problem solving techniques. To be aware of the top down design technique. To learn the syntax of C. To be exposed to the file processing techniques of C. To be familiarized with the preprocessor directives.

COURSE OUTCOMES Upon completion of the course, the students should be able to Design and implement C programs for any given problem. Work with existing programs and modify it as per the requirements. Identify the errors in a C program. Identify the output of a C program without actually executing it. PROBLEM SOLVING - Introduction The ProblemSolving Aspect Top Down Design Implementation of Algorithms Program Verification The Efficiency of Algorithms The Analysis of Algorithms. BASICS OF C PROGRAMMING - Introduction to C Programming Environment History of C C Standard Library Basics of C Program Development Environment - Introduction to C Programming - A simple C Program Memory Concepts Arithmetic Decision Making Relational Operators Assignment Increment and Decrement OperatorsStructured Program Development Algorithms Pseudocode- Control Structures if , if/else Selection Structure. REPETITION CONTROL STRUCTURES, FUNCTIONS AND ARRAYS - Essentials of Repetition The while, do/while Repetition Structure - Counter-Controlled Repetition for Multiple Selection Switch Break Continue Logical Operators Functions- Definitions Prototypes Header Files Storage Classes Scope Rules RecursionComparing Iteration and Recursion. Arrays Declaration Usage Passing Arrays to Functions. POINTERS, STRINGS AND AGGREGATE DATA TYPES - Pointer Variable Declarations and Initialization Operators Uses--Pointer Expressions and Pointer Arithmetic Relationship between Pointers and Arrays Arrays of Pointers Pointers to Functions. Fundamentals of Strings and Characters Character Handling Library - String Handling

UNIT I

UNIT II

UNIT III

UNIT IV

6 Library. Structures- Definition Initialization Unions Bitwise Operators Enumeration Constants. UNIT V STREAMS, FILES AND PREPROCESSOR - Streams Formatting Output with printf - Formatting Input with scanf.Files SequentialAccess Files- Creation Reading Random-Access Files Creation Reading. C Preprocessor Introduction- #include - #define Symbolic Constants- Macros- Conditional Compilation - #error - #pragma Operators # and ## - Line Numbers Predefined Symbolic Constants.

REFERENCE BOOKS 1. R.G.Dromey, How to Solve it by Computer, Pearson Education, 2007. 2. H. M. Deitel and P. J. Deitel, C How to Program, 7th Edition, Pearson Education, 2013. 3. Pradip Dey, Manas Ghosh, Programming in C, Oxford University Press, 2007. 4. Cormen,Leiserson, Rivest, Stein, Introduction to Algorithms, McGraw Hill Publishers, 2002. 5. Kernigan Brian W., and Dennis M. Ritchie, The C Programming Language, Second Edition, Prentice Hall, 1988.

DCS7103

DATABASE MANAGEMENT SYSTEM

CREDITS:3

COURSE OBJECTIVES Learn the fundamentals of data models and to conceptualize and depict a database system using ER diagram. To make a study of SQL and relational database design. Understand the internal storage structures using different file and indexing techniques which will help in physical DB design. To know the fundamental concepts of transaction processing- concurrency control techniques and recovery procedure. Gain a fundamental knowledge about the Storage and Query processing Techniques

COURSE OUTCOMES Upon completion of the course, the students should be able to Design and create tables in database and query them Know how transaction processing is done Analyze and appraise different types of databases RELATIONAL DATABASES - Purpose of Database System - Views of data Data Models Database System Architecture Entity Relationship model E-R Diagrams -- Introduction to relational databases -The relational Model Keys - Relational Algebra Relational Calculus SQL fundamentals - Advanced SQL features Embedded SQL Dynamic SQL DATABASE DESIGN - Functional Dependencies Non-loss Decomposition Functional Dependencies First, Second, Third Normal Forms, Dependency Preservation Boyce/Codd Normal Form- Multivalued Dependencies and Fourth Normal Form Join Dependencies and Fifth Normal Form TRANSACTIONS - Transaction Concepts - Transaction Recovery ACID Properties System Recovery Media Recovery Two Phase Commit - Save Points SQL Facilities for recovery Concurrency Need for Concurrency Locking Protocols Two Phase Locking Deadlock- Recovery Isolation Levels SQL Facilities for Concurrency. IMPLEMENTATION TECHNIQUES - Overview of Physical Storage Media Magnetic Disks RAID Tertiary storage File Organization Organization of Records in Files Indexing and Hashing Ordered Indices B+ tree Index Files B tree Index Files Static Hashing Dynamic Hashing Query Processing Overview Catalog Information for Cost Estimation

UNIT I

UNIT II

UNIT III

UNIT IV

8 UNIT V ADVANCED TOPICS - Distributed Databases-Architecture-Transaction Processing-Data Warehousing and Mining-Classification-Association rules-Clustering-Information Retrieval- Relevance ranking-Crawling and Indexing the Web- Object Oriented Databases-XML Databases.

REFERENCE BOOKS: 1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, Database System Concepts,Sixth Edition, Tata McGraw Hill, 2011 2. C.J.Date, A.Kannan, S.Swamynathan, An Introduction to Database Systems, Eighth Edition, Pearson Education, 2006. 3. Ramez Elmasri, Shamkant B. Navathe, Fundamentals of Database Systems, Fifth Edition , Pearson, 2008. 4. Raghu Ramakrishnan, Database Management Systems, Fourth Edition, Tata McGraw Hill, 2010. 5. G.K.Gupta,Database Management Systems, Tata McGraw Hill, 2011.

DCS7104

SOFTWARE ENGINEERING

CREDITS: 3

COURSE OBJECTIVES To provide information about wider engineering issues that form the background to develop complex, evolving (software-intensive) systems. To plan a software engineering process to account for quality issues and nonfunctional requirements. To employ a selection of concepts and techniques to complete a small-scale analysis and design in mini projects. To impart knowledge to translate requirement specifications into a design, and then realize that design practically, all using an appropriate software engineering methodology. To provide basic knowledge about software project management.

COURSE OUTCOMES Upon completion of the course, the students should be able to Familiar with basic concepts of Software design and implementation Perform software testing on various applications Apply various software metrics on software quality products INTRODUCTION - Software Engineering Product and process process models - Waterfall Life cycle model Spiral Model Prototype Model fourth Generation Techniques Agile methods. REQUIREMENT ANALYSIS - Software Requirements Analysis and Specification Software Requirements Problem Analysis Requirements Specification Validation Metrics Summary. SOFTWARE DESIGN - Abstraction Modularity Software Architecture Cohesion Coupling Various Design Concepts and notations Real time and Distributed System Design Documentation Dataflow Oriented design Designing for reuse Programming standards. SOFTWARE TESTING - Coding Programming Practice Top-down and Bottom-up - structured programming Information Hiding Programming style Internal Documentation Verification Code Reading Static Analysis Symbolic Execution Code Inspection or Reviews Unit Testing Fundamentals Functional Testing versus structural Testing Coding.

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

10 SOFTWARE MAINTANANCE AND CONFIGURATION MANAGEMENT (SCM) - Need for Software maintenance Maintenance models - SCM Version Control SCM process Software Configuration Items Taxonomy Basics of Case tools. SOFTWARE METRICS AND QUALITY ASSURANCE - Scope Classification of metrics Measuring Process and Product attributes Direct and Indirect measures Reliability Software Quality Assurance Standards.

UNIT VI

REFERENCE BOOKS: 1. Pankaj Jalote, An Integrated Approach to Software Engineering, Third Edition, Narosa publications, 2011. 2. Ian Sommerville, Software engineering, Nineth Edition, Pearson Education Asia, 2010. 3. Roger S. Pressman, Software Engineering A practitioners Approach, Seventh Edition, Tata McGraw-Hill International Edition, 2009.

11

DCS7105

MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE

CREDITS:4

COURSE OBJECTIVES To introduce mathematical logic, combinatorial and counting techniques, Algebraic structures, Finite state system and grammar as Mathematical Foundation of computer Science so as to understand algorithms, computability and other theoretical aspects of Computer science. COURSE OUTCOMES Upon completion of the course, the students should be able to Understand mathematical logic and to develop analytical solutions for logical problems and they will be equipped with counting techniques to Solve combinatorial problems. Comprehend the algebraic structure and formal languages with their applications to handle abstract generalizations and computability. LOGIC - Statements - Connectives - Truth Tables - Normal Forms Predicate Calculus Inference -Theory for Statement Calculus. COMBINATORICS - Permutations and Combinations - Mathematical Induction - Pigeonhole principle - Principle of Inclusion and Exclusion Recurrence relations - Solution by generating functions and characteristics equations. ALGEBRAIC STRUCTURES - Groups - Cyclic group - Permutation group (Sn and Dn) - Substructures - Homomorphism -Cosets and Lagranges Theorem - Normal Subgroups - Rings and Fields (definition and examples). LATTICES - Partial order relation Posets - Hasse diagram - Lattices Special Lattices - Boolean Algebra. FINITE STATE AUTOMATA AND GRAMMARS - Finite state automata - Deterministic and non-deterministic model - languages accepted by Finite State Automata - Regular expressions - Context-free grammars - Derivation trees.

UNIT I UNIT II

UNIT III

UNIT IV UNIT V

REFERENCE BOOKS: 1. Trembley.J.P. and Manohar R., Discrete Mathematical Structures with Applications to Computer Science, Tata McGraw Hill Publishing Company Limited, New Delhi. Reprinted in 2007. 2. Grimaldi R.P. and Ramana B.V., Discrete and Combinatorial Mathematics, Pearson Education, Reprinted in 2006. (5th Edition). 3. Hopcroft J.E. and Ullman J.D., Introduction to Automata, Languages and Computation, Narosa Publishing House, 1987.

12

DCS7111
COURSE OBJECTIVES

PROGRAMMING LAB

CREDITS:2

To practice the syntax of C. To be exposed to the file processing techniques of C. To be familiarized with control structures, functions, arrays and files.

COURSE OUTCOMES Upon Completion of the course, the students should be able to:

Design and implement C programs for any given problem. Understand an existing program and modify it as per the requirements. Identify the errors in a C program. Produce the output of a C program by actually executing it.

EXPERIMENTS IN THE FOLLOWING TOPICS: Non-iterative control structures. Iterative control structures and arrays. Functions with parameters. Functions with arrays, structures as arguments. Character and String handling Libraries. Files Sequential access and random access. Preprocessor directives for other features like macros, conditional compilation.

13

DCS7112
COURSE OBJECTIVES

DBMS LAB

CREDITS:2

To understand the concepts of DBMS practically. To familiarize with SQL queries To write stored procedures in DBMS To learn front end tools and to integrate them with databases

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Design and Implement databases practically Formulate complex queries using SQL and execute them. Design and Implement applications that have GUI and access databases for backend connectivity

EXPERIMENTS IN THE FOLLOWING TOPICS: Data Definition, Manipulation of Tables and Views Database Querying Simple queries, Nested queries, Sub queries and Joins Triggers Transaction Control Embedded SQL Database Connectivity with Front End Tools Front End Tools / Programming Languages High level language extensions - PL/SQL Basics Procedures and Functions Database Design and Implementation (Case Study)

14

SEMESTER II DCS7201 COMPUTER NETWORKS CREDITS: 3

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Design and Implement databases practically Formulate complex queries using SQL and execute them. Design and Implement applications that have GUI and access databases for backend connectivity

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Trace the flow of information from one node to another node in the network Identify the component required to build different types of networks Understand the division of network functionalities into layers. Identify solution for each functionality at each layer Choose the required functionality at each layer for given application INTRODUCTION - Building a network Requirements Network Architecture OSI Internet Direct Link Networks Hardware building blocks Framing Error detection Reliable transmission. NETWORK FUNDAMENTALS - LAN Technology LAN Architecture BUS/Tree Ring Star Ethernet Token Rings Wireless. NETWORK LAYER - Packet Switching Switching and Forwarding Bridges and LAN switches Internetworking Simple Internetworking Routing. TRANSPORT LAYER - Reliable Byte Stream (TCP) Simple Demultiplexer (UDP) TCP Congestion Control Congestion Avoidance Mechanisms. PRESENTATION LAYER and APPLICATIONS - Presentation formatting Data compression Cryptographic Algorithms: RSA - DES Applications Domain Name Service Email - SMTP MIME HTTP SNMP.

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

15 TEXT BOOK: 1. Larry L. Peterson & Bruce S. Davie, Computer Networks - A systems Approach, 2nd Edition, Harcourt Asia/Morgan Kaufmann, 2000. REFERENCE BOOKS: 1. James F. Kurose and Keith W. Ross, Computer Networking - A Top Down Approach featuring the Internet, 1st Edition, Addison Wesley Publishing Company, 2001. 2. William Stallings, Data and Computer Communications, 5th Edition, PHI, 1997. 3. Andrew S. Tanenbaum, Computer Networks, Tata Mcgraw Hill, 3rd Edition, 2001.

16

DCS7202

OBJECT ORIENTED PROGRAMMING

CREDITS: 3

COURSE OBJECTIVES To understand the OO paradigm. To be aware of the OO design technique. To learn the syntax of C++. To be exposed to the file processing and exception handling techniques of C++. To be familiarized with the Standard Template Library.

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Design and implement C++ programs for any given problem. Understand an existing program and modify it as per the requirements. Identify the errors in a C++ program. Identify the output of a C++ program without actually executing it. Write generic programs using STL. FUNDAMENTALS - ObjectOriented Programming concepts Encapsulation Programming Elements Program Structure Enumeration Types Functions and Pointers Function Invocation Overloading Functions Scope and Storage Class Pointer Types Arrays and Pointers CallbyReference Assertions Standard template library. IMPLEMENTING ADTS AND ENCAPSULATION - Aggregate Type struct Structure Pointer Operators Unions Bit Fields Data Handling and Member Functions Classes Constructors and Destructors Static Member this Pointer reference semantics implementation of simple ADTs. POLYMORPHISM - ADT Conversions Overloading Overloading Operators Unary Operator Overloading Binary Operator Overloading Function Selection Pointer Operators Visitation Iterators containers List List Iterators. TEMPLATES - Template Class Function Templates Class Templates Parameterizing STL Algorithms Function Adaptors. INHERITANCE - Derived Class Typing Conversions and Visibility Code Reuse Virtual Functions Templates and Inheritance RunTime Type Identifications Exceptions Handlers Standard Exceptions.

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

17 REFERENCE BOOKS: Ira Pohl, ObjectOriented Programming Using C++, Pearson Education, Second Edition, 2003. 2. Stanley B.Lippman, Josee Lajoie, C++ Primer, Pearson Education, Third Edition, 2004. 3. Kamthane, Object Oriented Programming with ANSI and Turbo C++, Person Education, 2002. 4. Bhave , Object Oriented Programming With C++, Pearson Education , 2004.
1.

18

DCS7203 DATA STRUCTURES AND ALGORITHMS CREDITS: 3


COURSE OBJECTIVES To gain comprehensive introduction of common data structures, and algorithm design and analysis. To master the design of tree, sets and graph structures and its applications. To learn about sorting techniques and understand how common computational problems can be solved efficiently on a computer

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Describe, explain, and use abstract data types including stacks, queues and lists. Design and Implement Tree data structures and Sets. Design algorithms using graph structure to solve real-life problems Implement a variety of algorithms for sorting, including insertion sort, selection sort, merge sort, quick sort, and heap sort. Describe the asymptotic performance and algorithm design techniques studied in this course and understand the practical implications of that information. BASIC DATA STRUCTURES - From Problems to programs - Abstract Data Types - Data Types, Data Structures, and Abstract Data Types - The Running Time of a program - Calculating the Running Time of a program - Good Programming Practice; Basic Data Types: The Data Type List Implementation of Lists Stacks Queues Mappings - Stacks and Recursive Procedures TREES & SETS - Trees: Basic Terminology - The ADT Tree Implementation of Trees - Binary Trees; Basic operations on sets: Introduction to Sets - An ADT with Union, Intersection, and Difference A Bit-Vector Implementation of Sets; Advanced Set Representation Methods: Binary Search Trees - Time Analysis of Binary Search Tree operations Tries - Balanced Tree Implementations GRAPHS - Directed Graphs: Basic Definitions - Representations of Directed Graphs - The Single-Source Shortest Paths Problem - The AllPairs Shortest Path Problem - Traversals of Directed Graphs - Directed Acyclic Graphs - Strong Components; Undirected Graphs: Definitions Minimum-Cost Spanning Trees Traversals - Articulation Points and Biconnected Components - Graph Matching SORTING & ALGORITHM ANALYSIS - Sorting: The Internal Sorting Model - Some Simple Sorting Schemes - Quick Sort - Heap Sort Bin Sorting - A Lower Bound for Sorting by Comparisons - Order Statistics; Algorithm Analysis Techniques: Efficiency of Algorithms -

UNIT I

UNIT II

UNIT III

UNIT IV

19 Analysis of Recursive programs - Solving Recurrence Equations - A General Solution for a Large Class of recurrences UNIT V ALGORITHM DESIGN TECHNIQUES - Algorithm Design Techniques: Divide-and-Conquer Algorithms - Dynamic Programming Greedy Algorithms Backtracking - Local Search Algorithms

REFERENCE BOOKS: 1. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, Data Structures and Algorithms, Pearson Education, Reprint 2006. 2. Robert Sedgewick and Kevin Wayne, Algorithms, Fourth Edition, Pearson Education,2011. 3. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, Introduction to Algorithms, Third Edition, PHI Learning pvt. Limited, 2012. 4. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 2nd edition, Pearson Education, 2005.

20

DCS7204
COURSE OBJECTIVES

OPERATING SYSTEM

CREDITS:3

To learn the Operating System basics. To study the process management of Operating system. To gain knowledge in the storage management and I/O systems of Operating system

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Ability to discuss on the basics of OS. In depth knowledge in process management, memory management and I/O management of various operating systems. To explore the case studies with various operating systems. OPERATING SYSTEMS OVERVIEW - Operating system Types of Computer Systems - Computer-system operation I/O structure Hardware Protection - System components System calls System programs System structure - Process concept Process scheduling Operations on processes Cooperating processes Interprocess communication Communication in client-server systems Multithreading models Threading issues. PROCESS MANAGEMENT - Scheduling criteria Scheduling algorithms Multiple-processor scheduling Real time scheduling Algorithm Evaluation Process Scheduling Models - The critical-section problem Synchronization hardware Semaphores Classic problems of synchronization critical regions Monitors - System model Deadlock characterization Methods for handling deadlocks Recovery from deadlock STORAGE MANAGEMENT - Memory Management Swapping Contiguous memory allocation Paging Segmentation Segmentation with paging. Virtual Memory: Background Demand paging Process creation Page replacement Allocation of frames Thrashing. I/O SYSTEMS - File concept Access methods Directory structure File-system mounting Protection - Directory implementation Allocation methods Free-space management - Disk scheduling Disk management Swap-space management.

UNIT I

UNIT II

UNIT III

UNIT IV

21 UNIT V CASE STUDY - The Linux System - History Design Principles Kernel Modules Process Management Scheduling Memory management File systems Input and Output Inter-process Communication Network Structure Security Windows 7 - History Design Principles System Components Environmental subsystems File system Networking.

REFERENCE BOOKS: 1. Abraham Silberschatz, Peter B. Galvin and Greg Gagne, Operating System Concepts, Ninth Edition, John Wiley and Sons Inc 2012. 2. Andrew S. Tanenbaum, Modern Operating Systems, Second Edition, Addison Wesley, 2001. 3. Gary Nutt, Operating Systems, Second Edition, Addison Wesley, 2001. 4. H M Deital, P J Deital and D R Choffnes, Operating Systems , Pearson Education, 2004.

22

DCS7205

SOFTWARE PROJECT MANAGEMENT

CREDITS: 3

COURSE OBJECTIVES To understand the cost evaluation techniques. To learn the concepts of project planning and monitoring. To understand the concepts of organizing teams for software projects.

COURSE OUTCOMES To perform planning and scheduling activities. Ability to draw activity network. Ability to manage people and project. INTRODUCTION TO SOFTWARE PROJECT MANAGEMENT - Project Definition Contract Management Activities Covered By Software Project Management Overview Of Project Planning Stepwise Project Planning. PROJECT EVALUATION - Strategic Assessment Technical Assessment Cost Benefit Analysis Cash Flow Forecasting Cost Benefit Evaluation Techniques Risk Evaluation. ACTIVITY PLANNING - Objectives Project Schedule Sequencing And Scheduling Activities Network Planning Models Forward Pass Backward Pass Activity Float Shortening Project Duration Activity On Arrow Networks Risk Management Nature Of Risk Types Of Risk Managing Risk Hazard Identification Hazard Analysis Risk Planning And Control. MONITORING AND CONTROL - Creating Framework Collecting The Data Visualizing Progress Cost Monitoring Earned Value Prioritizing Monitoring Getting Project Back To Target Change Control Managing Contracts Introduction Types Of Contract Stages In Contract Placement Typical Terms Of A Contract Contract Management Acceptance. MANAGING PEOPLE AND ORGANIZING TEAMS - Introduction Understanding Behavior Organizational Behaviour: A Background Selecting The Right Person For The Job Instruction In The Best Methods Motivation The Oldham Hackman Job Characteristics Model Working In Groups Becoming A Team Decision Making Leadership Organizational Structures Stress Health And Safety Case Studies.

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

23 REFERENCE BOOKS: Bob Hughes and MikeCotterell Software Project Management, Third Edition, TATA McGraw Hill Edition 2004. 2. Ramesh, Gopalaswamy: "Managing Global Projects ", Tata McGraw Hill, 2001. 3. Royce. Software Project Theory, Pearson Education, 1999. 4. P.Jalote Software Project Management In Practice, Pearson Education, 2000.
1.

24

DCS7211

OBJECT ORIENTED PROGRAMMING LAB

CREDITS: 2

COURSE OBJECTIVES To implement the OO design technique. To learn the syntax of C++ and features of C++. To be exposed to the file processing and exception handling techniques of C++. To be familiarized with the Standard Template Library.

COURSE OUTCOMES Ability to write C++ programs Implement the Stack & queue structures using C++ Ability to create Class Template files

EXPERIMENTS IN THE FOLLOWING TOPICS: Write a C++ Program to illustrate Enumeration and Function Overloading Write a C++ Program to illustrate Scope and Storage class Implementation of ADT such as Stack and Queues Write a C++ Program to illustrate the use of Constructors and Destructors and Constructor Overloading Write a Program to illustrate Static member and methods Write a Program to illustrate Bit fields Write a Program to overload as binary operator, friend and member function Write a Program to overload unary operator in Postfix and Prefix form as member and friend function Write a Program to illustrate Iterators and Containers Write a C++ Program to illustrate function templates Write a C++ Program to illustrate template class Write C++ Programs and incorporating various forms of Inheritance Write a C++ Program to illustrate Virtual functions Exception Handling

25

DCS7212 DATA STRUCTURES AND ALGORITHMS CREDITS: 2 LAB


COURSE OBJECTIVES To develop skills in design and implementation of data structures and their applications. To learn and implement linear, non linear and tree data structures To learn Set ADT and Graph data structures and its applications To study, implement and analyze of different sorting techniques.

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Work with basic data structures that are suitable for problems to be solved efficiently. Implementation of linear, tree, and graph structures and its applications. Implementation of various sorting techniques its algorithm design and analysis.

EXPERIMENTS IN THE FOLLOWING TOPICS: Abstract Data type Implementation of List, Stack and Queues. Tree ADT Tries Implementation Set ADT- Bit Vector Implementation Graph Representations Graph Traversals Shortest Path Implementation Spanning Tree Implementation Sorting Algorithms Implementation of Algorithms using Dynamic Programming, Backtracking

SEMESTER III

26

DCS7301

INFORMATION SECURITY

CREDITS: 3

COURSE OBJECTIVES Understand the security analysis principles Able to become familiar with Security Design.

COURSE OUTCOMES Able to Develop Security Models using SDLC Implement Logical and Physical Security Perform Recovery using Disaster Recovery Techniques INTRODUCTION - Information Security Concepts Critical Characteristics of Information - Components of an Information System The CIA Triad, Securing the Components - Balancing Security and Access - The SDLC - Moving towards a Secure SDLC process SECURITY INVESTIGATION - Need for Security, Business Needs, Threats, Vulnerabilities, Attacks, Legal and Ethical issues in Security, Evolving a code of Professional Conduct for Information Security Professionals SECURITY ANALYSIS - Risk Management : Identifying, Assessing, Mitigating, Transferring and Accepting Risk, Issues of Due Care and Due Diligence LOGICAL DESIGN - Blueprint for Security, Information Security Policy, Standards and Practices, ISO 27001/ISO 17799, NIST Models, VISA International Security Model, Design of Security Architecture, Planning for Continuity PHYSICAL DESIGN - Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access Control Devices, Physical Security, Security and Personnel

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

UNIT VI

27 BUSINESS CONTINUITY & DISASTER RECOVERY - The need for BC and DR Process, The BIA process, Understanding RTO and RPO as a business driven metrics, Selecting the appropriate BC and DR strategies, Testing and Maintenance of BC and DR Plans

REFERENCE BOOKS 1. Michael E Whitman and Herbert J Mattord, Principles of Information Security, Vikas Publishing House, New Delhi, 2010 2. Micki Krause, Harold F. Tipton, Handbook of Information Security Management, Vol 1-3 CRC Press LLC, 2009. 3. Matt Bishop, Computer Security Art and Science, Pearson/PHI, 2008.

28

DCS7302

DATA WAREHOUSING AND DATA MINING

CREDITS: 3

COURSE OBJECTIVES To Understand Data mining principles and techniques and Introduce DM as a cutting edge business intelligence To expose the students to the concepts of Datawarehousing Architecture and Implementation To study the overview of developing areas Web mining, Text mining and ethical aspects of Data mining To identify Business applications and Trends of Data mining

COURSE OUTCOMES Upon Completion of the course, the students will be able to Evolve Multidimensional Intelligent model from typical system Discover the knowledge imbibed in the high dimensional system Evaluate various mining techniques on complex data objects UNIT I DATA WAREHOUSE - Data Warehousing - Operational Database Systems vs Data Warehouses - Multidimensional Data Model - Schemas for Multidimensional Databases OLAP operations Data Warehouse Architecture Indexing OLAP queries & Tools DATA MINING & DATA PREPROCESSING - Introduction to KDD process Knowledge Discovery from Databases - Need for Data Preprocessing Data Cleaning Data Integration and Transformation Data Reduction Data Discretization and Concept Hierarchy Generation. ASSOCIATION RULE MINING - Introduction - Data Mining Functionalities - Association Rule Mining - Mining Frequent Itemsets with and without Candidate Generation - Mining Various Kinds of Association Rules - Constraint-Based Association Mining. CLASSIFICATION & PREDICTION - Classification vs Prediction Data preparation for Classification and Prediction Classification by Decision Tree Introduction Bayesian Classification Rule Based Classification Classification by Back propagation Support Vector Machines Associative Classification Lazy Learners Other Classification Methods Prediction Accuracy and Error Measures Evaluating the Accuracy of a Classifier or Predictor Ensemble Methods Model Section.

UNIT II

UNIT III

UNIT IV

UNIT V

29 CLUSTERING - Cluster Analysis: - Types of Data in Cluster Analysis A Categorization of Major Clustering Methods Partitioning Methods Hierarchical methods Density-Based Methods Grid-Based Methods Model-Based Clustering Methods Clustering High- Dimensional Data Constraint-Based Cluster Analysis Outlier Analysis.

REFERENCE BOOKS: 1. Jiawei Han and Micheline Kamber Data Mining Concepts and Techniques Second Edition, Elsevier, Reprinted 2011. 2. K.P. Soman, Shyam Diwakar and V. Ajay Insight into Data mining Theory and Practice, Easter Economy Edition, Prentice Hall of India, 2006. 3. G. K. Gupta Introduction to Data Mining with Case Studies, Easter Economy Edition, Prentice Hall of India, 2006. 4. Pang-Ning Tan, Michael Steinbach and Vipin Kumar Introduction to Data Mining, Pearson Education, 2007.

30

DCS7303
COURSE OBJECTIVES

WEB PROGRAMMING

CREDITS: 3

To understand the basics of HTML. To learn the concepts of XML related technologies. To learn the fundamentals of java. To understand the importance of server side programming and web development.

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Design and implementation of web forms and client side validation. XML authoring, Parsing, and related technologies. Object oriented concept programming using Java. Design and development of GUI based applications using Swing components. Design and development of servlet and JSP application with database connectivity. HTML AND JAVA SCRIPT - World Wide Web XHTML Cascading Style Sheet - JavaScript java script objects - Date Array pattern matching using regular expressions Dynamic documents with java script HTML 5 new features XML TECHNOLOGIES - XML validating XML - DTD XML schema XPath XLink parsing XML using DOM parsing XML using SAX transforming XML with XSL Integrating XML with database AJAX RSS JSON JAVA BASICS - Overview of Java Java Fundamentals Classes, Objects and Methods Arrays and Array Lists String String Builder ReguIar expressions class pattern class matcher - Packages and Interfaces Exception Handling. JAVA GUI AND DATABASE CONNECTIVITY - Generic classes Generic methods Applets Applet life cycle methods Applets based GUI GUI components Basic of Swings Accessing database with JDBC - basics SERVER SIDE SCRIPT - Overview of servlets Servlet API servlet life cycle servlet configuration running servet with database connectivity - servlet support for cookies Session tracking Java server pages JSP Case study/ Applications Developing Dynamic, Data driven web sites.

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

31 REFERENCE BOOKS: 1. Robert W. Sebesta, Programming with World Wide Web, Pearson Education, 2008. 2. Paul Deitel and Harvey Daitel, Java How to program, Ninth Edition, PHI, 2012. 3. Kogent Solutions, Java 6 Programming Black book, Dreamtech Press, 2007

32

DCS7304

OBJECT ORIENTED ANALYSIS AND DESIGN

CREDITS: 3

COURSE OBJECTIVES To understand the basics of object oriented analysis and design To learn UML models and tools To apply design patterns to various applications.

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Familiarize with the topics of object oriented System designs Design patterns using UML Apply design patterns to various applications INTRODUCTION - An overview Object basics Object state and properties Behavior Methods Messages Information hiding Class hierarchy Relationships Associations Aggregations- Identity Dynamic binding Persistence Metaclasses Object oriented system development life cycle. METHODOLOGY AND UML - Introduction Survey Rumbugh, Booch, Jacobson methods Patterns Frameworks Unified approach Unified modeling language Static and Dynamic models UML diagrams Class diagram Usecase diagrams Dynamic modeling Model organization Extensibility. OBJECT ORIENTED ANALYSIS - Identifying Usecase Business object analysis Usecase driven object oriented analysis Usecase model Documentation Classification Identifying object, relationships, attributes, methods Super-sub class A part of relationships Identifying attributes and methods Object responsibility OBJECT ORIENTED DESIGN - Design process Axions Colollaries Designing classes Class visibility Refining attributes Methods and protocols Object storage and object interoperability Databases Object relational systems Designing interface objects Macro and Micro level processes The purpose of a view layer interface SOFTWARE QUALITY - Quality assurance Testing strategies Object orientation testing Test cases Test Plan Debugging principles Usability Satisfaction Usability testing Satisfaction testing

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

33 TEXT BOOKS: 1. Ali Bahrami, Object Oriented System Development, McGraw Hill International Edition, 1999. REFERENCE BOOKS: 1. Craig Larman, Applying UML and Patterns, 2nd Edition, Pearson, 2002. 2. Grady Booch, James Rumbaugh, Ivar Jacobson, The Unified Modeling Language User Guide, Addison Wesley Long man, 1999. 3. Bernd Bruegge, Allen H. Dutoit, Object Oriented Software Engineering using UML, Patterns and Java, Pearson 2004

34

DCS7311

WEB PROGRAMMING LAB

CREDITS: 2

COURSE OBJECTIVES To learn web page creation. To understand the real time requirements of web page such as validation, use of DOM, role of XML. To understand OOP concepts and basics of Java language. To learn and use client server architecture based applications. To explore server side functionalities of an application.

COURSE OUTCOMES Upon Completion of the course, the students should be able to:

Make Web site creation and validation. Work with XML based technologies. Develop simple console application using Java. Develop GUI application using Swing and Applet. Build web based applications using JDBC, Servlet / JSP.

EXPERIMENTS: (Open source software are to be used) Creation of web pages having dynamic contents and validation using java script Creation of XML file and validation using XML schema and generation of XML using tools Simple xml based applications using DOM, SAX and XSL Basic Java programming covering objects, inheritance, polymorphism, interfaces, packages and exception handling String handling programs and regular expression programs Creation of applet based GUIs Application involving applet based GUI, JDBC, Servlet, JSP, cookies and session tracking.

35

DCS7312

SOFTWARE DEVELOPMENT LAB

CREDITS: 2

COURSE OBJECTIVES Understand project planning Able to Analysis and Design Application Able to Implement and Test Software

COURSE OUTCOMES Able to Draw DFD and UML Diagrams Able to Write programs for Design Generate and Execute Test cases

Apply the following to typical application problems: 1. 2. 3. 4. 5. 6. 7. Project Planning Software Requirement Analysis Software Estimation Software Design Data Modelling & Implementation Software Testing Software Debugging

A possible set of applications may be the following: a. b. c. d. e. f. g. Library System Student Marks Analyzing System Text Editor. Create a dictionary. Telephone dictionary. Simulator Software for Parallel Processing Operation. Inventory System.

36

ELECTIVES
ELECTIVE I

DCS7001
COURSE OBJECTIVES Able

MOBILE COMPUTING

CREDITS: 3

To understand the principles of wireless communication To understand wireless LAN protocols To become familiar with mobile Routing protocols

COURSE OUTCOMES Able to Develop Mobile Application Implement MAC protocols Able to perform Optimal Routing WIRELESS COMMUNICATION - Challenges of Wireless Transmission - Multi-carrier modulation - Spread Spectrum - Satellite Communication - Broadcast systems - Multiplexing - FDMA, TDMA and CDMA - Cellular organization of mobile telephone networks - Operation of cellular networks - Frequency Reuse - Tessellation - Handoff - Capacity Improvement WIRELESS NETWORKS - IEEE 802.11 Wireless LAN - Architecture Modes of Operation - CSMA/CA and its variants - Wireless LAN security - Bluetooth networks - Generation of cellular networks - Overview of GSM - GPRS Network Architecture and Operations - UMTS and IMT 2000 - Packet Switching Domain - Core Network - Radio Access Network - LTE - Control Plane - User Plane L3 AND L4 WIRELESS PROTOCOLS - Mobile IP - Mobility features in IPv6 - Proactive and reactive ad hoc routing protocols - DSDV, DSR and AODV - Limitations of Traditional TCP in wireless networks - TCP improvements for Wireless Networks Indirect TCP, Snoop TCP, Mobile TCP - Security issues in network layer and transport layer

UNIT I

UNIT II

UNIT III

37 UNIT IV MOBILE COMPUTING PLATFORM - PDA - Device characteristics and Software components - Smart Phone - Convergence of Mobile devices - J2ME - Modes, Data store, GUI support - HTTP Connection Interface Push Registry - Application development using Android APIs - Palm OS Architecture and Program Development - Overview of other mobile Operating Systems MOBILE INTERNET - WAP - WAP Gateways - WML - VoiceXML Mobile Messaging - Multimedia Messaging Service - Synchronized Multimedia Integration Language - Application Servers - Internet portals - Device management - Synchronization Models - Communication to Servlets and Web Services - Location aware Mobile computing - IP Multimedia Subsystem

UNIT V

TEXT BOOKS: 1. Asoke Talukder, Hasan Ahmed, Rupa Yavagal, Mobile Computing: Technology, Applications and Services Creation, Second Edition, TMH, 2010. 2. William Stallings, Wireless Communication and Networks, Pearson, 2009. REFERENCE BOOKS: 1. Jochen Schiller, Mobile Communications, Second Edition, Pearson, 2009. 2. Uwe Hansmann et al, Principles of Mobile Computing, Springer, 2003. 3. Ivan Stojmenovic, Handbook of Wireless Networks and Mobile Computing, Wiley, 2002.

38

DCS7002 XML AND WEB SERVICES


COURSE OBJECTIVES Able to understand XML Data Representation Create Web Services Develop Security Mechanisms for XML Data.

CREDITS: 3

COURSE OUTCOMES Able to Design Web Databases To compose and Deploy Web Services Implement Security principles XML FUNDAMENTALS - XML structuring with schema DTD XML Schema XML Processing DOM SAX Presental XSL Transformation XSLT XPath XQuery DISTRIBUTED INFORMATION SYSTEM - Distributed information system Design of IB Architecture of IB Communication in an IS Middleware RPC TP monitors Object brokers Message oriented middleware EAI EAI Middleware Workflow Management benefits and limitations Web technologies for Application Integration. WEB SERVICES - Web Services Definition Web Services and EAI Web Services Technologies web services Architecture SOAP WSDL UDDI WS Addressing WS Routing WS- Security WS Policy Web Service invocation framework web services using java WS using .NET mobile web service. XML SECURITY - XML Security and meta framework XML signature XML Encryption SAML XKMS WS Security RDF semantic Web service. SERVICE COMPOSITION - Service Coordination and Composition coordination protocols WS Coordination WS transaction RosttaNet ebXML WSCI Service Composition Service Composition Models Dependencies between coordination and composition BPEL Current trends.

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

REFERENCE BOOKS: 1. Gystavo Alonso, Fabio casasi, Hareemi kuno, vijay machiraju, web Services concepts, Architecture and Applications, Springer, 2004. 2. Ron Schmelzer etal XML and Web Services, Pearson Education, 2002. 3. Sandeep chatterjee and james webber, Developing 4. Enterprise web services: An Architects and Guide, Practice Hall, 2004. 5. Freunk p.coyle, XML, web Services and the Data Revolution, Pearson, 2002.

39

DCS7003

THEORY OF COMPUTATION

CREDITS: 3

COURSE OBJECTIVES Able to Understand the equivalence of NFA, DFA and Regular Expression Write Grammar for a Language Develop a PDA

COURSE OUTCOMES Able to write programs for Logical Analysis Write programs to Syntax Analysis Implement stack operations for PDA REGULAR EXPRESSIONS AND LANGUAGES - Introduction to Formal Proof Additional Forms of proof Inductive proofs Regular Expressions Regular and Non Regular Languages - Closure Properties of Regular Languages - Proving Languages Not to Be Regular - Decision Properties of Regular Languages AUTOMATA - Finite Automata Deterministic Finite Automata Nondeterministic Finite Automata Finite Automata with Epsilon Transitions - Kleenes Theorem Equivalence and Minimization of Automata - Finite Automata and Regular Expressions CONTEXT-FREE GRAMMARS AND LANGUAGES - Context-Free Grammars Parse Trees Ambiguity in Grammars and Languages Phases of a complier - Lexical Analysis Parsing Compiler Design using Lexical Analysis and Parsing Grammars for Natural Language Processing PUSHDOWN AUTOMATA AND TURING MACHINES - Definition Languages of a Pushdown Automata Equivalence of Pushdown Automata and Context-Free Grammars - Deterministic Pushdown Automata, Normal forms for Context-Free Grammars Pumping Lemma for Context-Free Languages - Closure and Decision Properties of ContextFree Languages - Turing Machines Programming Techniques for Turing Machines - Basic Turing Machine Extensionss UNDECIDABILITY - Not Recursively Enumerable Language Recursively Enumerable Undecidable problem Undecidable Problems about Turing Machines Posts Correspondence Problem - The classes P and NP - NP-complete problems

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

40 TEXT BOOKS: 1. J.E.Hopcroft, R.Motwani and J.D Ullman, Introduction to Automata Theory, Languages and Computations, Second Edition, Pearson Education, 2009 2. J.Martin, Introduction to Languages and the Theory of Computation, Third Edition, TMH, 2008. REFERENCE BOOKS: 1. H.R.Lewis and C.H.Papadimitriou, Elements of The theory of Computation, Second Edition, Pearson Education/PHI, 2007. 2. Micheal Sipser, Introduction of the Theory and Computation, Thomson Brokecole, 2003. 3. Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman, Compilers: Principles, Techniques, & Tools, Second Edition Boston: Addison-Wesley, 2007

41 ELECTIVE II

DCS7004

COMPUTER GRAPHICS AND MULTIMEDIA SYSTEMS

CREDITS:3

COURSE OBJECTIVES To understand the basic concepts of graphics designs. To familiarize the student with the transformation and projection techniques To expose the student to various color models.

COURSE OUTCOMES Upon Completion of the course, the students should be able to Implement basic graphics transformation and projection techniques. Design an application that incorporates different concepts of various color models. Apply and explore new techniques in the areas of compression techniques. To appreciate the use of multimedia authoring tools and multimedia compression techniques INTRODUCTION - Overview of Graphics System - Bresenham technique Line Drawing and Circle Drawing Algorithms - DDA - Line Clipping - Text Clipping. 2D TRANSFORMATIONS - Two dimensional transformations Scaling and Rotations - Interactive Input methods - Polygons - Splines Bezier Curves - Window view port mapping transformation. 3D TRANSFORMATIONS - 3D Concepts - Projections Parallel Projection - Perspective Projection Visible Surface Detection Methods Visualization and polygon rendering Color models XYZ-RGB-YIQCMY-HSV Models - animation Key Frame systems - General animation functions - morphing. OVERVIEW OF MULTIMEDIA - Multimedia hardware & software Components of multimedia Text, Image Graphics Audio Video Animation Authoring. MULTIMEDIA SYSTEMS AND APPLICATIONS - Multimedia communication systems Data base systems Synchronization Issues Presentation requirements Applications Video conferencing Virtual reality Interactive video video on demand

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

42 TEXT BOOKS: 1. Hearn D and Baker M.P, Computer graphics C Version, 2nd Edition, Pearson Education, 2004 (unit 1, 2 &3). 2. Ralf Steinmetz, Klara steinmetz, Multimedia Computing, Communications and Applications, Pearson education, 2004 (unit 4 & 5). REFERENCE BOOKS: 1. Siamon J. Gibbs and Dionysios C. Tsichritzis, Multimedia programming, Addison Wesley, 1995. 2. John Villamil, Casanova and Leony Fernanadez, Eliar, Multimedia Graphics, PHI, 1998.

43

DCS7005

ETHICAL HACKING & CYBER FORENSICS

CREDITS: 3

COURSE OBJECTIVES To understand the hacking techniques of computer forensics. To learn about data recovery methods. To identity the threats in computer forensics

COURSE OUTCOMES Able to distinguish between hackers and normal users. To apply the principles of computer forensics for security. To implement the data recovery methods. To manage threats and the tactics. ETHICAL HACKING - Foundation for Ethical Hacking-Ethical Hacking in Motion-Hacking Network Hosts-Hacking Operating SystemsHacking Applications. TYPES OF COMPUTER FORENSICS - Computer Forensics Fundamentals Types of Computer Forensics Technology Types of Vendor and Computer Forensics Services. DATA RECOVERY - Data Recovery Evidence Collection and Data Seizure Duplication and Preservation of Digital Evidence Computer Image Verification and Authentication. ELECTRONIC EVIDENCE - Discover of Electronic Evidence Identification of Data Reconstructing Past Events Networks. THREATS - Fighting against Macro Threats Information Warfare Arsenal Tactics of the Military Tactics of Terrorist and Rogues Tactics of Private Companies.

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

TEXT BOOKS: 1. John R. Vacca, Computer Forensics, Firewall Media, 2004. 2. Kevin Beaver, Hacking For Dummies, John Wiley & Sons, 2012. REFERENCE BOOKS: 1. Chad Steel, Windows Forensics, Wiley India, 2006. 2. Majid Yar, Cybercrime and Society, Sage Publications, 2006. 3. Robert M Slade, Software Forensics, Tata McGrawHill, 2004.

44

DCS7006
COURSE OBJECTIVES

SOFTWARE TESTING

CREDITS: 3

To introduce the basics and necessity of Software testing To introduce various testing techniques along with software production To introduce the concepts of Software bugs and its impact

COURSE OUTCOMES Upon Completion of the course, the students should be able to: Perform automated testing using test tools Document the testing procedures INTRODUCTION - Software Testing background software bugs- cost of bugs-software testing realities- Testing Axioms Precision and Accuracy-verification and validation- quality and reliability-testing and quality assurance. SOFTWARE TESTING METHODOLOGY - Functional testingStructural testing Static and Dynamic testing low level specification test techniques Equivalence Partitioning Data testing State Testing formal reviews coding standards and guidelines code review checklist data coverage- code coverage. SOFTWARE TESTING TECHNIQUES - Configuration testing Compatibility tests foreign language testing usability testing testing the documentation - testing for software security website testing. AUTOMATED TESTING AND TEST TOOLS - Benefits of automation and tools viewers and monitors drivers stubs stress and load tools analysis tools- software test automation random testing beta testing TEST DOCUMENTATION - Goal of Test Planning test phases test strategy resource requirements test schedule writing and tracking test cases- Bug tracking systems metrics and statistics- risks and issues

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

REFERENCE BOOKS: 1. Glenford J.Myers, Tom Badgett, Corey Sandler, The Art of Software Testing,3rd edition, John Wiley & Sons publication, 2012. 2. Ron Patton, Software testing , second edition, Pearson education, 2009. 3. Boris Beizer, Software testing techniques,DreamTech Press,2009. 4. Srinivasan Desikan, Gopalaswamy Ramesh, Software testing- Principles and Practices, Pearson education, 2009.

45

ELECTIVE III

DCS7007
COURSE OBJECTIVES Understand

CLOUD COMPUTING

CREDITS: 3

Cloud Services and Application Become familiar with MAP REDUCE Techniques Know about Cloud Tools and Programming

COURSE OUTCOMES Able to Implement Virtualization Techniques Store and Retrieve Data in Cloud Provide Security through programs. UNIT I INTRODUCTION - Evolution of Cloud Computing System Models for Distributed and Cloud Computing NIST Cloud Computing Reference Architecture -IaaS On-demand provisioning Elasticity in cloud Egs of IaaS providers - PaaS Egs. Of PaaS providers - SaaS Egs. Of SaaS providers Public , Private and Hybrid clouds. VIRTUALIZATION - Basics of virtualization - Types of Virtualization Implementation Levels of Virtualization - Virtualization Structures - Tools and Mechanisms - Virtualization of CPU, Memory, I/O Devices Desktop virtualization Server Virtualization. CLOUD INFRASTRUCTURE - Architectural Design of Compute and Storage Clouds Layered Cloud Architecture Development Design Challenges - Inter Cloud Resource Management Resource Provisioning and Platform Deployment Global Exchange of Cloud Resources. PROGRAMMING MODEL - Parallel and Distributed programming Paradigms MapReduce , Twister and Iterative MapReduce Hadoop Library from Apache Mapping Applications - Programming Support Google App Engine, Amazon AWS - Cloud Software Environments Eucalyptus, Open nebula, OpenStack.

UNIT II

UNIT III

UNIT IV

46 UNIT V SECURITY IN THE CLOUD - Security Overview Cloud Security Challenges Software-as-a-Service Security Security Governance Risk Management Security Monitoring Security Architecture Design Data Security Application Security Virtual Machine Security.

TEXT BOOKS: 1. Distributed and Cloud Computing, From Parallel Processing to the Internet of Things by Kai Hwang, Geoffrey C Fox, Jack G Dongarra, Morgan Kaufmann Publishers, 2012. 2. Cloud Computing: Implementation, Management, and Security by John W.Rittinghouse and James F.Ransome : CRC Press 2010 REFERENCE BOOKS: 1. Cloud Computing, A Practical Approach by Toby Velte, Anthony Velte, Robert Elsenpeter: TMH, 2013 2. Cloud Application Architectures: Building Applications and Infrastructure in the Cloud: Transactional Systems for EC2 and Beyond (Theory in Practice (O'Reilly)) by George Reese: O'Reilly 3. James E. Smith, Ravi Nair, Virtual Machines: Versatile Platforms for Systems and Processes, Elsevier/Morgan Kaufmann, 2005. 4. Katarina Stanoevska-Slabeva, Thomas Wozniak, Santi Ristol, Grid and Cloud Computing A Business Perspective on Technology and Applications, Springer.

47

DCS7008

VISUAL PROGRAMMING

CREDITS: 3

COURSE OBJECTIVES Able to Understand windows Environment Write programs in Visual Basic Understand the concepts of VC++

COURSE OUTCOMES Able to Develop windows Applications User Interface Design using VB Application Development using VC++ WINDOWS PROGRAMMING - The windows programming Model Event driven programming GUI concepts Overview of Windows programming Creating and displaying the window Message Loop windows procedure WM_PAINT message WM_DESTROY message Data types Resources An Introduction to GDI Device context Text output Scroll Bars Keyboard Mouse Menus. VISUAL BASIC PROGRAMMING - Visual Basic Applications Form and properties Variables and Constants Variant type Procedure scope Main Control statements control arrays Creating and using Controls Menus and Dialogs Programming fundamentals Objects and instances Debugging Responding to mouse events Drag and Drag drop events Responding to keyboard events keypress, keyup, keydown events Using grid control Graphics controls shape and line control File system controls Common dialog controls Processing files Accessing databases with the data controls. VISUAL C++ PROGRAMMING - Visual C++ components Introduction to Microsoft Foundation Classes Library Getting started with AppWizard Class Wizard Event handling Keyboard and Mouse events - WM_SIZE, WM_CHAR messages - Graphics Device Interface Pen, Brush, Colors, Fonts - Single and Multiple document interface Reading and Writing documents - Resources Bitmaps creation, usage of BMP and displaying a file existing as a BMP. CONTROLS - Dialog Based Applications, controls Animate control, image list, CRect tracker Tree control CtabControl Dynamic controls slider control progress control Inheriting CTreeView

UNIT I

UNIT II

UNIT III

UNIT IV

48 CRicheditView Modal Dialog, Modeless Dialog CColorDialog CfileDialog. UNIT V ADVANCED CONCEPTS - Domain Name System Email World Wide Web (HTTP) Simple Status bars Splitter windows and multiple views Dynamic Link Library Data base Management with ODBC TCP/IP Winsock and WinInet, ActiveX control creation and usage Container class.

TEXT BOOKS: 1. Charles Petzold, Windows Programming, Microsoft press, 1996. 2. J. David Kruglirski, Programming Microsoft Visual C++, Fifth Edition, Microsoft press, 1998. 3. Marion Cottingham Visual Basic, Peachpit Press, 1999. REFERENCE BOOKS: 1. Steve Holzner, Visual C++ 6 programming, Wiley Dreamtech India Private Ltd., 2003. 2. Kate Gregory Using Visual C++, Prentice Hall of India Pvt., Ltd., 1999. 3. Herbert Sheildt, MFC from the Ground Up. 4. Deitel , Visual Basic 6.0 How To Program, Pearson Education, 1999.

49

DCS7009
COURSE OBJECTIVES Able to Understand

E COMMERECE

CREDITS: 3

the TCP/IP networks Electronic payment systems E-Security principles

COURSE OUTCOMES Able to create XML and Web Databases Implement Electronic payment systems Implement E-Security systems Introduction: Infrastructure for Electronic Commerce - Networks - Packet Switched Networks - TCP/IP Internet protocol - Domain name Services Web Service Protocols - Internet applications - Utility programs - Markup Languages - Web Clients and Servers - Intranets and Extranets - Virtual private Network. Core Technology: Electronic Commerce Models - Shopping Cart Technology - Data Mining - Intelligent Agents Internet Marketing XML and E-Commerce Electronic Payment Systems: Real world Payment Systems - Electronic Funds Transfer - Digital Payment -Internet Payment Systems Micro Payments - Credit Card Transactions Mobile Marketing and Advertisement - Case Studies. Security: Threats to Network Security - Public Key Cryptography Secured Sockets Layer - Secure Electronic Transaction - Network Security Solutions - Firewalls. Inter/Intra Organizations Electronic Commerce: EDI - EDI application in business - legal, Security and Privacy issues - EDI and Electronic commerce - Standards - Internal Information Systems - Macro forces Internal commerce - Workflow Automation and Coordination Customization and Internal commerce - Supply chain Management.

UNIT I

UNIT II

UNIT III

UNIT IV

UNIT V

TEXT BOOK: 1. Ravi Kalakota and Andrew B Whinston , Frontiers of Electronic commerce,

50 Pearson Education, 2003 REFERENCE BOOKS: 1. Brian E.Mennecke, Troy J.Strader, Mobile Commerce: (Soft Cover): Technology,Theory and Applications, Idea group Inc., IRM Press,2003 2. Pete Loshin, Paul A Murphy, Electronic Commerce, 2nd Edition, Jaico Publishers, 1996. 3. David Whiteley, e - Commerce : Strategy, Technologies and Applications McGraw Hill, 2000.

You might also like