VIII Sem IT Syllabus 2021-22290322115311
VIII Sem IT Syllabus 2021-22290322115311
VIII Sem IT Syllabus 2021-22290322115311
Course Outcomes: At the end of the course student will be able to:
CO1 Apply symmetric cryptography techniques for Encryption and Decryption.
CO2 Apply asymmetric cryptography technique for Encryption and Decryption.
CO3 Explain the authentication techniques and IP security.
CO4 Identify the Software vulnerabilities and explain Email security.
CO5 Discuss the web issues and defense mechanisms.
Course Contents:
Unit I
Basic of Cryptography, secret key cryptography, Types of attack, Substitution ciphers, Transposition ciphers, block ciphers and
stream ciphers, Confusion and Diffusion, Data encryption standard, round function, modes of operation, cryptanalysis, brute
force attack, Security Goals (Confidentiality, Integrity, Availability).
Unit II
Public key Cryptography, modulo arithmetic, Greatest common divisor, Euclidean algorithm, RSA algorithm, hash function,
attack on collision resistance, Diffie hellman key exchange, Digital signature standard, elliptic curve cryptography.
Unit III
Authentication: One way Authentication, password based, certificate based, Mutual Authentication ,shared secret based, Asym-
metric based, Authentication and key agreement, centralized Authentication, eavesdropping, Kerberos, IP security overview:-
security association & Encapsulating security payload ,tunnel and transfer modes, internet key exchange protocol, Secure Socket
Layer(SSL), Transport Layer Security (TLS).
Unit IV
Software vulnerabilities: Phishing Attacks, buffer overflow vulnerability, Format String attack, Cross Site Scripting, SQL in-
jection Attacks, Email security:- Security services of E-mail ,Establishing keys, Privacy ,Authentication of the source, Message
integrity ,Non-Repudiation, Viruses, Worms, Malware.
Unit V
Web Issue: Introduction, Uniform Resource Locator/uniform resource identify, HTTP, Cookies, Web security problem, Penetra-
tion Testing, Firewalls:- functionality, Polices and Access Control, Packet filters, Application level gateway, Encrypted tunnel,
Security architecture, Introduction to intrusion detection system.
Reference:
1. Bernard Menezes, ”Network Security and Cryptography”, CENGAGE Learning.
2. Charlie Kaufman, ”Network Security”, PHI.
3. Forouzan, ”Cryptography & Network Security”, TMH
4. Randy Weaver, ”Network Infrastructure Security”, Cengage Learning.
5. Atual Kahate, ”Cryptography and Network Security”, TMH.
6. William Stalling, ”Cryptography and Network security”, Pearson.
Suggested Topics for Experiment::
1. Study of Network Security fundamentals.
2. Symmetric Cryptography Algorithm.
3. Asymmetric Crpytography Algorithm.
4. Sniffing and Spoofing. Virus and Trojans.
5. Various types of attacks.
Course Outcomes: At the end of the course student will be able to:
CO1 Compare TCP/IP and ISO-OSI Model and Design a wide area network using Subnetting
CO2 Use ICMP commands and Intra Inter domain routing
CO3 Understand TCP,UDP and SCTP
CO4 Establish sessions using application layer protocol like FTP,SMTP and POP
CO5 Apply network management application using management components
Course Contents:
Unit I
TCP/IP suite, Explaining Network Layer Protocols, Binding Protocol Address- Address Resolution Protocol & RARP, ARP &
RARP, packet format, Encapsulation, Internet protocol: Introduction, Ipv4 header, Ipv4Datagrams, Encapsulation, Fragmenta-
tion and Reassembly, IP routing, Subnet addressing, Subnet mask, Supernetting- special case of IP addresses, Ipv6-Motivation,
frame format and addressing, comparison of Ipv4 and Ipv6.
Unit II
ICMP: Introduction, ICMP Header, ICMP message types, ICMP timestamp request and reply, trace route, ping program, Intra
& inter domain routing-distance vector routing, RIP, Link State Routing, OSPF, Path Vector Routing, BGP, Unicast Routing
protocols, IGMP-IGMP message, operation, encapsulation.
Unit III
TCP: Introduction, services, headers, connection establishment and termination, timeout of connection establishment, maxi-
mum segment size- half, close, state transition diagram, port no. and socket addresses, TCP timers, UDP: Introduction, UDP
header, UDP checksum, UDP operations, encapsulation & decapsulation, queuing, SCTP-Services, transmission sequence num-
ber, stream identifier, stream sequence number, packet format.
Unit IV
BOOTP:-Operation, packet format, DHCP:-Address allocation, configuration & packet Format, DNS: Distribution of name
spaces, DNS in the internet, FTP:-Connection, Communication, command processing, TFTP, E-Mail: SMTP, POP, IMAP,SNMP:
Management components, SMI, MIB
Unit V
Introduction of ad-hoc/sensor networks: key definitions, advantages, unique constraints and challenges, applications, and wire-
less communications/radio characteristics. Media Access Control and routing protocols for Ad-Hoc wireless networks: issues,
classification and protocols. Networking Sensors: features, deployment of sensor networks, sensor tasking and control. Sensor
Network platforms and tools: Berkley Motes , Sensor network programming challenges ,Embedded Operating System. Transport
layer, QoS issues and security protocols for ad hoc and sensor networks. Simulators for wireless ad hoc and sensor networks.
Applications of Ad-Hoc/Sensor Network and Future Directions.
Reference:
1. Dayanand Ambawade, Dr. Deven shah, Prof. Mahendra Mehra , “Advance Computer Network”, Wiley India
2. Forouzan, “TCP/IP-Protocol suite”, TMH 3rd edition.
3. Comer, “Internetworking with TCP/IP Vol. I, II & III”, PHI Learning.
Course Outcomes: At the end of the course student will be able to:
CO1 Compare wireless ad hoc and mesh networks
CO2 Summarize medium access protocols of Wireless Mesh Networks.
CO3 Classify routing protocols of Wireless Mesh Networks.
CO4 Discuss security issues and challenges faced in Mesh Networking.
CO5 Outline the concept of WiMAX and Cognitive radio technologies.
Course Contents:
Unit I
Comparison between wireless ad hoc and mesh networks, Challenges in wireless mesh networks, Design issues in wireless mesh
networks, 802.11 Mesh Architecture, Architectural Design Issues, Capacity Scaling, Single-Radio, Multichannel Mesh Networks,
Multiradio Mesh.
Unit II
MAC layer protocols for Wireless Mesh Networks, Medium Access Control Design Issues, Design objective and challenges, Con-
ventional wireless MAC protocols, Advanced MAC protocols for WMNs, Protocols for mesh nodes equipped with directional
antennas, Multichannel MAC protocols, Contention-free MAC protocols for synchronized mesh networks, Advanced MAC fea-
tures proposed by the 802.11 TGs group, Trade-offs and constraints.
Unit III
Network layer protocols for Wireless Mesh Networks, General concepts of routing protocols, Classification of routing protocols,
Requirements on routing in wireless mesh Networks, Multipath routing for load balancing and fault tolerance, QoS routing,
Routing metrics, Routing protocols- AODV, DSR, OLSR etc.
Unit IV
Security technology overview, Mesh security issues, Security challenges, potential attacks to WMNs, Authentication, Secure
MAC layer, Secure routing, Key management and communication security, Intrusion detection, Authentication protocols.
Unit V
Scalability in WMN, Load Balancing in WMN, Hybrid wireless mesh networks including IEEE 802.16 WiMAX networks, Cog-
nitive radio, Definition and attributes, Cognitive radio architecture.
Reference:
1. Yan Zhang, Jijun Lio, Honglin Hu, “Wireless Mesh Networking-Architectures, Protocols & Standards”, Aurbech Publica-
tions, Taylor & Francis Group.
2. Ian Akyildiz and Xudong Wang, Wireless Mesh Netowrk, John Wiley and Sons, March 2009.
3. Siva Ram Murthy and B. S. Manoj Adhoc wireless Netowrks: Architectures and Protocols, Prenticen Hall PTR, New
Jersey.
Course Outcomes: At the end of the course student will be able to:
CO1 Make Learner Conversant With The Social and Intellectual Property Issues Emerging From Cyberspace
CO2 Explore The Legal And Policy Developments in various domains to Regulate Cyberspace; with special
reference to IT Act of India
CO3 Develop Competencies For Dealing With Frauds And Deceptions And Other Cyber Crimes That Are
Taking Place on Cyberspace and Forensics knowledge to investigate them.
CO4 Give Learners In Depth Knowledge Of Information Technology Act And Legal Frame Work
CO5 To aware about various IPR issues in cyberspace and Regulations associated.
Course Contents:
Unit I
Cyber world: an overview, internet and online resources, security of information, digital signature, intellectual property (IP),
historical background of IP, IPR governance, National patent offices, the world intellectual property organization (WIPO).
Unit II
Introduction about the cyber space, cyber law, regulation of cyber space, scope of cyber laws: e-commerce; online contracts;
IPRs (copyright, trademarks and software patenting), e-taxation; e-governance and cyber crimes, cyber law in India with special
reference to Information Technology Act, 2000.
Unit III
Introduction to computer and cyber crimes. Cyber crimes and related concepts, distinction between cyber crimes and con-
ventional crimes, Cyber criminals and their objectives. Kinds of cyber crimes cyber stalking; cyber pornography, forgery and
fraud, crime related to IPRs, cyber terrorism; computer vandalism etc. Cyber forensics, computer forensics and the law, forensic
evidence, computer forensic tools.
Unit IV
Regulation of cyber crimes, Issues relating to investigation, issues relating to jurisdiction, issues relating to evidence, relevant
provisions under Information Technology Act 2000, Indian penal code, pornography Act and evidence Act etc.
Unit V
Copyright issues in cyberspace: linking, framing, protection of content on web site, international treaties, trademark issues in
cyberspace: domain name dispute, cyber squatting, uniform dispute resolution policy, computer software and related IPR issues.
Reference:
1. Nelson, Phillips, “Computer Forensics and Investigations”, Cengage Learning India.
Course Outcomes: At the end of the course student will be able to:
CO1 Understand software testing and testing activities.
CO2 Define object oriented testing and test case design
CO3 Design test plans and coverage analysis
CO4 Apply SQA in lifecycle of software project
CO5 Apply T&QA concept in a real life project
Course Contents:
Unit I
Introduction to software testing, concepts, issues and techniques, test activities, management and automation, Coverage and
usage testing based on checklist, input domain portioning and boundary testing.
Unit II
Object oriented testing: testing OOA and OOD models, object oriented testing strategies, test case design for OO software,
testing methods applicable at the class level, interclass test case design.
Unit III
Testing: Error, Fault and Failure, Test suite and test Harness, psychology of testing, levels of testing, Metrics: Coverage Analysis,
Reliability and defect removal efficiency.
Unit IV
SQA during software requirements, SQA during software design phase, SQA during software code and test, Advance quality
engineering topics.
Unit V
Human factors in software engineering: Human factors history, HCL requirements and design process, HCL testing.
Reference:
1. Ali Behforooz and Frederick J. Hudson, Software Engineering Fundamentals, Oxford University Press
2. JeffTain, Software Quality Engineering: Testing, Quality Assurance and Quantifiable improvement, Willy Pub.
3. Aditya Mathur, Foundation of Software Testing 1/e, Pearson Education
4. Paul C. Jorgensen, Software Testing, A Craftsman’s Approach, Second Edition, CRC Press
5. Pankaj Jalote’s Software engineering aA Precise Approach. Wiley India.
Course Outcomes: At the end of the course student will be able to:
CO1 Understand blockchain technology.
CO2 Explore the concepts of decentralization and its relationship with blockchain technology.
CO3 Apply Cryptography Concepts such as public and private key, Digital signature in blockchain.
CO4 Appreciate technical concepts related to bitcoin cryptocurrency
CO5 Analyze the working of Smart Contracts and Hyperledger
Course Contents:
Unit I
Distributed systems ,CAP theorem, Byzantine Generals problem Consensus - Consensus mechanisms Types of consensus mech-
anism, The history of blockchain ,Electronic cash- The concept of electronic cash, Introduction to Blockchain,Features of
Blockchain, Generic elements of a blockchain, Blockchain Application, Tiers of blockchain technology, Types of block chain,
Benefits and limitations of blockchain.
Unit II
Decentralization- Decentralization using blockchain, Blockchain and full ecosystem decentralization ,Requirements of a decen-
tralized application, operation of Decentralization, Platforms for decentralization, Methods of decentralization
Unit III
Basic Crypto Primitives: Cryptographic Hash Function, Properties of a hash function, Hash pointer and Merkle tree, SHA-256
,Digital Signature, AES,Public Key Cryptography, A basic cryptocurrency. Elliptic Curve Digital signature algorithm (ECDSA)
Unit IV
Bitcoin –Definitions,KEYS AND ADDRESSES, Transactions, THE SCRIPT LANGUAGE, Types of transaction,COINBASE
TRANSACTIONS, Unspent Transaction Output (UTXO), The structure of a block, MINING, TASK OF MINERS, PROOF
OF WORK, THE MINING ALGORITHM, MINING SYSTEMS,bitcoin network,wallet, Bitcoin payments.
Unit V
Smart Contracts-Definitions, Ricardian contracts, Smart contract templates, Oracles, Deploying smart contracts on a blockchain,introduc
of Ethereum, Hyperledger- Fabric, Blockchain explorer, Iroha etc, Hyperledger as a protocol, BLOCKCHAIN SERVICES, Saw-
tooth lake.
Reference:
1. Imran Bashir, ”Mastering Blockchain: A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps,
cryptocurrencies, Ethereum and more”, 3rd Edition, Packt Publishing, 2020.
Course Outcomes: At the end of the course student will be able to:
CO1 Explain basic concepts of image processing.
CO2 Illustrate the techniques employed for the enhancement of images
CO3 Understand image restoration model and image segmentation methods
CO4 Compare different colour models for colour image processing
CO5 Select the type of representation and description to be used for segmented regions to develop an
application.
Course Contents:
Unit I
Introduction and Digital Image Fundamentals: The origins of Digital Image Processing, Examples of Fields that use Digital
Image Processing, Fundamentals Steps in Image Processing, Elements of Digital Image Processing Systems, Image Sampling and
Quantization, Image transforms, perspective transformation, Some basic relationships like Neighbours, Connectivity, Distance
Measures between pixels, Linear and Non Linear Operations.
Unit II
Image Enhancement in the Spatial and Frequency Domain: Some basic Intensity Transformations, Histogram Processing, spa-
tial filtering, spatial convolution and correlation, generating spatial filter masks, Smoothing spatial filters, sharpening spatial
filters, Basic information of DFT, FFT, smoothing using frequency domain filters, sharpening using frequency domain filters,
Homomorphic filtering.
Unit III
Image Restoration and Image segmentation: A model of the Image Degradation / Restoration Process, Noise Models, Restoration
in the presence of Noise Only, Estimating degradation function. Image segmentation-Point , line and edge detection, Threshold-
ing, region based segmentation, watershed segmentation
Unit IV
Colour Image Processing: Colour fundamentals, Colour models, pseudo colour image processing, colour transformations, Image
segmentation based on colour
Unit V
Representation and Description: Representation, Boundary Descriptors, Regional Descriptors, Use of Principal Components for
Description, Introduction to Morphology, Some basic Morphological operations and Algorithms.
Reference:
1. R.C Gonzalez & Richard E Wood, “Digital Image Processing”, Addison Wesley Publishing
2. Anil K Jain, “Fundamentals of Digital image processing”. PHI.
3. Sonka, Hlavac, Boyle, “Digital image processing and computer vision”, Cengage learning, India Edition.
4. B Chanda, D. Dutta Majumder, “Digital image Processing and Analysis”, PHI.
Course Outcomes: At the end of the course student will be able to:
CO1 Understand geometric modeling and Virtual environment.
CO2 Study of design and implementation of Virtual Hardware and Software
CO3 Understand the system of human vision and its implication on perception and rendering.
CO4 Explain the concepts of motion and tracking in VR systems.
CO5 Develop Virtual Reality applications
Course Contents:
Unit I
Introduction to Virtual Reality: Virtual Reality and Virtual Environment: Introduction, Computer graphics, Real time computer
graphics, Flight Simulation, Virtual environment requirement, benefits of virtual reality, Historical development of VR, Scientific
Landmark 3D Computer Graphics: Introduction, The Virtual world space, positioning the virtual observer, the perspective
projection, human vision, stereo perspective projection, 3D clipping, Colour theory, Simple 3D modelling, Illumination models,
Reflection models, Shading algorithms, Radiosity, Hidden Surface Removal, Realism-Stereographic image.
Unit II
Geometric Modelling Geometric Modelling: Introduction, From 2D to 3D, 3D space curves, 3D boundary representation Geo-
metrical Transformations: Introduction, Frames of reference, Modelling transformations, Instances, Picking, Flying, Scaling the
VE, Collision detection Generic VR system: Introduction, Virtual environment, Computer environment, VR technology, Model
of interaction, VR Systems.
Unit III
Virtual Environment: Animating the Virtual Environment: Introduction, The dynamics of numbers, Linear and Non-linear
interpolation, the animation of objects, linear and non-linear translation, shape & object inbetween, free from deformation,
particle system. Physical Simulation: Introduction, Objects falling in a gravitational field, Rotating wheels, Elastic collisions,
projectiles, simple pendulum, springs, Flight dynamics of an aircraft.
Unit IV
VR Hardware and Software: Human factors: Introduction, the eye, the ear, the somatic senses. VR Hardware: Introduction,
sensor hardware, Head-coupled displays, Acoustic hardware, Integrated VR systems. VR Software: Introduction, Modelling
virtual world, Physical simulation, VR toolkits, Introduction to VRML
Unit V
VR Applications: Introduction, Engineering, Entertainment, Science, Training.The Future: Virtual environment, modes of in-
teraction
Reference:
1. John Vince, “Virtual Reality Systems “, Pearson Education Asia, 2007.
2. Anand R., “Augmented and Virtual Reality”, Khanna Publishing House, Delhi.
3. Adams, “Visualizations of Virtual Reality”, Tata McGraw Hill, 2000.
4. Grigore C. Burdea, Philippe Coiffet , “Virtual Reality Technology”, Wiley Inter Science,2nd Edition, 2006.
5. William R. Sherman, Alan B. Craig, “Understanding Virtual Reality: Interface,Application and Design”, Morgan Kauf-
mann, 2008.
6. www.vresources.org
7. www.vrac.iastate.edu
8. www.w3.org/MarkUp/VRM
Course Outcomes: At the end of the course student will be able to:
CO1 Use appropriate tool to implement the proposed project idea.
CO2 Analyze the results obtained and compare them with the existing results.
CO3 Compose the project work in the form of a research paper and try to publish it.
CO4 Demonstrate the project work at different stages of execution through presentations.
CO5 Compile the project work in the form of a project report.
Course Contents: