Periyar University: Annexure - 15
Periyar University: Annexure - 15
Periyar University: Annexure - 15
PERIYAR UNIVERSITY
SALEM 638 011
PERIYAR INSTITUTE OF DISTANCE EDUCATIONS
(PRIDE)
NON SEMESTER
1
M.Sc. DEGREE
INFORMATION TECHNOLOGY
PRIDE
(Non Semester)
M.Sc. DEGREE INFORMATION TECHNOLOGY
S.No
First Year
1.
2.
3.
4.
Operating Systems
5.
Visual Programming
6.
7.
Software Engineering
8.
Computer
Oriented
Statistical
Numerical Methods
9.
10.
11.
Second year
12.
Distributed Systems
13.
Computer Networks
14.
15.
Elective I
16.
Elective II
17.
and
18.
Project
Elective 1:
E.1.1 Computer Graphics
E.1.2 Data Mining
E.1.3 Wireless Application Protocol
Elective 2:
E.2.1 E-Commerce
E.2.2 Object Oriented Analysis and Design
E.2.3 Client/Server Computing.
5. EXAMINATIONS
The examination shall be three hours duration to each paper at the
end of the Year. The candidate failing in any subject(s) will be permitted to
appear for each failed subject(s) in the subsequent examination. Practical
Examination should be conducted at the end of each year. At the end of
Second year viva-voce will be conducted on the basis of the Dissertation
submitted by the student. It should be an individual project. The vivavoce will be conducted by one internal and one external examiner jointly.
6.SCHEME OF EXMINTIONS
The Scheme of Examinations shall be as follows:
S.No Paper Code Title of the Paper
FIRST YEAR
1.
Duration
Fundamentals of Information
Marks
100
Technology
2.
100
3.
100
4.
Operating Systems
100
5.
Visual Programming
100
6.
100
7.
Software Engineering
100
8.
100
9.
100
10.
100
11.
SECOND YEAR
12.
100
Distributed Systems
100
13.
Computer Networks
100
14.
100
15.
Elective I
100
16.
Elective II
100
17.
100
18.
Project
200
Total
1900
Elective 1:
E.1.1 Computer Graphics
E.1.2 Data Mining
E.1.3 Wireless Application Protocol
Elective 2:
E.2.1 E-Commerce
E.2.2 Object Oriented Analysis and Design
E.2.3 Client/Server Computing
6
Practical
(ii)
40%
20%
Dissertation
a.
Report evaluation
b.
Viva-Voce
150 marks
50 marks
b.
c.
d.
e.
g.
h.
9. PASSING MINIMUM
The candidate shall be declared to have passed the examination if
the candidate secures not less than 50% marks in the University
examination in each paper/practical. However submission of a record
notebook is a must.
For the project work and viva-voce a candidate should secure 50%
of the marks for pass. The candidate should compulsorily attend viva-voce
examination to secure pass in that paper.
Candidate who do not obtain the required minimum marks for a
pass in a Paper/Project shall be required to appear and pass the same at
a subsequent appearance.
10. CLASSIFICATION OF SUCCESSFUL CANDIDATES
Candidates who secure not less than 60% of the aggregate marks in
the whole examination shall be declared to have passed the examination
in First Class. All other successful candidates shall be declared to have
passed in Second Class. Candidates who obtain 75% of the marks in the
aggregate shall be deemed to have passed the examination in First Class
with Distinction provided they pass all the examinations prescribed for
the course at the first appearance.
11. MAXIMUM DURATION FOR THE COMPLETION OF THE PG
PROGRAMME
The maximum duration for completion of the PG Programme shall
not exceed four academic year from the year of admission.
ANNEXURE I
PERIYAR UNIVERSITY
10
Course
Student Name
Register Number
Address of Organization/Institution
Designation
Place:
Date:
Qualification
Teaching Experience
Place:
Date:
ANNEXURE II
BONAFIDE CERTIFICATE
COMPANY ATTENDANCE CERTIFICATE
ACKNOWLEDGEMENT
CONTENTS
Chapter No.
Title
SYNOPSIS
1.
INTRODUCTION
SYSTEM CONFIGURATION
1.2.1 HARDWARE CONFIGURATION
1.2.2 SOFTWARE CONFIGURATION
2.
SYSTEM STUDY
2.1
EXISTING SYSTEM
2.1.1 DEMERITS
2.2
PROPOSED SYSTEM
2.2.1 SYSTEM STUDY
2.2.2 FEATURES
3.
3.1
3.2
OUTPUT DESIGN/REPORT
3.3
CODE DESIGN
3.4
DATABASE DESIGN
3.5
SYSTEM DEVELOPMENT
4.
Page.No
CONCLUSION
BIBLIOGRAPHY
A. DATA FLOW DIAGRAMS
B. TABLE STRUCTURES
C. SAMPLE INPUT/FORMS
D. SAMPLE OUTPUTS/REPORTS
*Based on the Dissertation work, the above titles may be varied.
ANNEXURE III
A. Format of the title page
13
CENTRE NAME
PERIYAR INSTITUTE OF DISTANCE EDUCATION (PRIDE)
PLACE with Pin Code
MONTH - YEAR
14
This
is
to
certify
that
the
dissertation
for
the
degree
of
Master
of
Science
in
Date:
Place:
Submitted
for
the
Viva-Voce
Examination
held
on
_____________________
Internal Examiner
External Examiner
- Entropy of Information
Hierarchy
File
Organization
File
Types
Program
and
Various
Applications
Windows
explorer
DOS
17
UNIT V:
Internet: A Global Network TCP/IP Common Protocols for
Internet WWW HTML Web Browser Internet Addresses E-Mail
Other Services External and Internal Modem Selecting an ISP
Internet Accounts MS Internet Explorer Search Engines Requirement
for Internet Access IT Applications : Introduction - ER NET NICNET
Dedicated Networks Development in India Applications of IT.
Text Book:
1. D.S. Yadav, Foundations of Information Technology, New Age,
2006.
Reference Books:
1.
Malvino
leech,
Digital
Principles
and
Applications,
TMH.
Edn.1991.
2.
3.
18
and
Unions
Pointers
Recursion
Files:
Exception
Handling
Multithreading
applets
Graphics
Programming.
Text Books:
1.
2.
Reference Books:
1.
2.
21
4. OPERATING SYSTEMS
UNIT I:
Definition Early systems Batch processing Multiprogramming
Multiprocessing
Time
sharing
Personal
computer
systems
data
transfer
and
synchronization
Semaphore
implementing semaphores.
UNIT III:
Memory Management: levels of management Dynamic memory
allocation Design problem and solution Logical and physical memory
static, memory management Memory protection- Allocation to processes.
Virtual
Memory:
Fragmentation
and
compaction
Dealing
with
fragmentation Swapping Overlays Implementing virtual memory Virtual memory management page replacement Global and local page
replacement algorithms Evaluating paging algorithms Segmentation.
UNIT IV:
22
23
UNIT V:
I/O and Resource Management: I/O system software Disk device
driver access strategies Modeling of disks- Unification of files and I/O
devices Generalize disk drivers Disk catching SCSI device drivers.
Resource in OS Protection of resources User authentication
Mechanism for protecting hardware and software resources External
security.
Text Book:
1. Charles Crowley, Operating System A Design oriented
Approach, TMH, 1998.[Reprint of Irwin: Book team].
Reference Books:
1. William Stallings, Operating Systems, PHI, 1997.
2. Silberschatz, Peterson and Galvin, Operating System Concept,
Addison Wesley, 1991.
24
25
5. VISUAL PROGAMMING
UNIT I:
Windows Programming: GUI concept Hungarian notation Data
types handles Message driven architecture Message Processing &
Loop, GDI Brush, pen, font, cursor, menu, keyboard and mouse
handling Displaying test and graphics Dialog boxes controls
- Win
Circles Ellipse and Charts. Basic File Handling Building your own
Active X controls.
Text Books:
1. Charles Petzold, Programming Windows 95, Microsoft Press, 2000.
2. Cary Cornel Visual Basic 5 from the ground up, TMH, 1997.
Reference Books:
1. Mohammed Azam, Programming with Visual Basic, Vikas
Publishing House Pvt Ltd, 2001.
2. Steven Holzner, Visual Basic 6.0 Programming Black Book,
Dream Tech Press 2003.
6. DATABASE MANAGEMENT SYSTEMS
UNIT I:
Introduction: Purpose of database systems, data abstraction, data
models, instances and schemes data independence, data definition
languages, data manipulation language database manager, database
administer database users. Overall system structure.
UNIT II:
Relational model Structure of relational database the relational
algebra p tuple and domain relational calculus- modifying the databases.
Relational commercial languages SQL Query-by-example, Query
Integrity Constraints domain constraints referential integrity
functional dependencies assertions triggers.
UNIT III:
27
relational
data
to
files
data
DBTG
set
dictionary
storage,
buffer
management.
UNIT IV:
Network
data
model-
construct
and
restrictions,
Text Book:
1. Abraham
Siberschatz,
Henery
F.Korth
and
28
Sudharshan,
S.,
29
7. SOFTWARE ENGINEERING
UNIT I:
Introduction: Definition of software and software engineering
software
Myth
software
engineering
paradigm.
Software
project
Programming
languages
characteristics
efficiency,
Testing
software
testing
techniques
testing
31
UNIT V:
Software
maintenance
definition
and
characteristics
software
configuration
management.
Computer
aided
Engineering
and
applications,
MCGRAW
32
And
UNIT III:
Numerical Methods: Introduction Errors Machine computation
Transcendental and polynomial equation
initial approximation
differentiation
and
Integration
methods
based
on
34
Text Books:
1. S.P. Gupta, Statistical Methods, Sultan Chand & Sons, New Delhi,
2001. (Units I &II).
2. M.K.Jain, SRK Iyangar, R.K.Jain, Numerical Methods for Scientific
and
Dr.M.K.Venkatraman,
Numerical
methods
for
science
Engg,1997.
2.
35
&
36
MS - Access
1. Create a new database with various t1ables
2. Create different tables and assign relationships between them.
3. Create tables and develop action & cross tab queries
4. Create forms in column & tables style
C - Lab
1. Control Structures.
2. Arrays
3. String Manipulations
4. Function
5. Recursion
6. Structures
7. Pointers and
Arrays
Strings
Structures
8. File Manipulations
9. Command Line Arguments.
37
JAVA:
1. Classes and objects.
2. Arrays.
3. Inheritance.
4. Packages and Interfaces.
5. Exception Handling.
6. Threads.
7. Simple applet programs.
38
RDBMS:
1. Creation of tables executing All Queries.
PACKAGES IN D2K.
2. Library Management Systems.
3. Payroll.
4. Tourist Information System.
5. Banking System.
VISUAL BASIC:
1. Preparation of Arithmetic calculator.
2. Preparation of Students mark sheet.
3. Railway Reservation System.
4. Voters Information System.
5. Banking System.
6. Creating ActiveX Controls.
39
41
Text Books:
1.Mukesh Singal and Shivaratri N.G.Advanced, Concepts In Operating
System, McGraw Hill, 1994.
2.Tanenbaum A.S, Modern Operating Systems, PHI, 1996.
Reference Books:
1. Paul. M. & Sugart H.J, Distributes Systems, Methods And Tools For
Specification An Advanced Course, Springer Verlag, 1985.
2. Pradeep K. Sinha, Distributed Operating Systems Concepts And
Design, PHI, 1998.
42
topology
Backbone
design
Physical
layer
layer
Design
issues
Routing,
congestion,
isolated,
&
flooding,
broadcasting
distributed,
optimal,
Congestion
control
flow
based,
algorithms
UNIT IV:
Object Model and Collections: Introduction Object Referencing
Collections all the Children Dynamic Styles Dynamic Positioning
Using
the
frames
Collection
navigator
45
Object
Event
Model:
ONMOUSEOVER
and
ONMOUSEOUT-
form
processing
with
47
Text Book:
1. H.M. Deitel, P.J. Deitel and T.R.Nieto, Internet and World Wide
Web How to Program, Pearson Education Asia, 2003.
Reference Books:
1. Thomas A.Powell, The Complete Reference HTML and XHTML,
Fourth Edition, Tata McGraw Hill Pub., Company Ltd, 2000.
2. Achyut S. Godbole, Atul Kahate, Web Technologies TCP/IP to
internet
Application
Architectures,
48
Tata
McGraw
Hill
Pub.
15. ELECTIVE 1
16. ELECTIVE 2
49
ELECTIVE - 1
E 1.1 COMPUTER GRAPHICS
UNIT I:
Geometry and Line generation: Line Segments vectors Character
generation.
Graphics
Primitives,
Display
devices,
Display
file
- Interfacing filling
Steven
Harrington
Computer
Graphics
Programming
ELECTIVE - 1
E 1.2 DATA MINING
UNIT I:
Expanding universe of data production factor Data mining
Data mining versus query tools: Data mining in marketing practical
applications. Learning Self-learning computer systems machine
learning and methodology of science Concept learning.
UNIT II:
Data warehouse need Designing decision support systems
integration with data mining Client/Server and data warehousing
Multi-processing machine Cost justification.
UNIT III:
Knowledge
discovery
process
Data
selection
Cleaning
52
to
tables
from
keys
53
to
statistical
dependencies
Text Book:
1. Pieter Adrianns, Dolf Zantinge, Data Mining, Addison Wesley,
1998.
Reference Books:
1. Arun K.Puzari, Data mining concepts and Techniques, India pot.
Ltd, 2003.
2. Jiawei Han and Micheline kanber, Harcourt, C.S.R. Prabhu, Data
warehousing Concepts, Techniques, products and Applications,
PHI, 2002.
54
ELECTIVE - 1
E 1.3 WIRELESS APPLICATION PROTOCOL
UNIT I:
Introduction Market Convergence Enabling Convergence Key
Services for the Mobile Internet Business Opportunities. Making the
Internet Mobile, Challenges and Pitfalls The Origins of WAP WAP
Architecture Components of the WAP Standard Network Infrastructure
services Supporting WAP Clients WAP Architecture Design Principles
Relationship to other Standards.
UNIT II:
The Wireless Markup Language: Overview The WML Document
Model WML Authoring URLs Identify Content Markup Basics WML
Basics Basic Content Events, Tasks and Bindings Variables
Controls Miscellaneous Markup Sending Information Application
Security Document Type Declaration Errors and Browser Limitations.
UNIT III:
55
Application
Creation
Tool
Box
Future
WTA
Text Book:
1. Sandeep Singhal, Thomas, Bridgman, Lalitha Suryanarayana and
Others, The Wireless Applications Protocol, Addison Wesley,
2001.
Reference Book:
56
57
ELECTIVE - 2
E 2.1 E- COMMERCE
UNIT I:
E-Commerce in the Beginning: What is E-Commerce Advantages
and Limitations of E-Commerce The Role of Strategy in E-Commerce
Value Chains in E-Commerce Integrating E-Commerce Managerial
Implications The Internet and the World Wide Web: The Internet Today
In the Beginning Unique Benefits of the internet Searching Online Bulletin
Board
Systems
(BBSs)
and
Pay
Services
Some
Web
Over
Cookies What Makes a Web Site Usable Web Site Content and Traffic
Management.
UNIT III:
Payment Systems: Form Barter to Money Requirements for
Internet-based Payments Electronic Payment Media Issues and
58
60
ELECTIVE - 2
E 2.2 OBJECT ORIENTED ANALYSIS AND DESIGN
UNIT I:
The Object Model: The Evolution of the Object Model Elements o
the Object Model Applying Object Model, Classes and Objects: The
nature of an Object Relationships among objects.
UNIT II:
Classes and Objects: The nature of the Class Relationships among
Classes The Interplay of Classes and Objects On building quality
classes and objects. Classification: The importance of proper classification
Identifying proper Classes and Objects Key Abstraction Mechanism.
UNIT III:
UML- Metal Model Purpose of Analysis and Design Overview of
the Process inception Elaboration Co9nstruction Refactoring
Transition Iterative Development Use Cases.
UNIT IV:
Class Diagrams: Essentials Interaction Diagram Class Diagram:
Advanced Concepts.
UNIT V:
Packages and Collaborations State Diagram Activity Diagram
Physical Diagram UML and Programming.
Text Books:
1. Grady Booch, Object Oriented Analysis and Design, Pearson Edn,
2000.
61
ELECTIVE - 2
E 2.3 Client /server computing
UNIT I:
Basic concepts of client /server: Characteristics. File servers
transaction servers groupware servers object servers web severs fat
servers or fat clients 2-tier client/server building blocks. Operating
system services: Base services extended services server scalabilityclient anatomy.
UNIT II:
NOS middleware peer-to-peer communication Remote Procedure
Calls MOM middleware SQL database servers: Server architecture
stored procedures triggers rules.
UNIT III:
Online transaction processing Decision support systems OLTP
vs. DSS Data warehouses: elements hierarchies replication vs. direct
62
distributed
system
management-components
63
Text Book
1.
Reference Book
1. Dawna Travis Dewire, Client /Server Computing, Tata Mc Graw
Hill 2003.
64
65