78
Bachelor of Science in Network Security Syllabus Department of Computer Science & Information Technology

Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Bachelor of Science in Network Security

Syllabus

Department of Computer Science &

Information Technology

Page 2: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER I

* For students of other majors who opt for the course “General Tamil – II”

IV 16CANAA Non Major

Elective –I*

Introduction to

Information Technology

Prerequisites for Language – I and Non Major Elective – I

1. Students who have studied Tamil in school till Standard XII, can opt for the course

‘General Tamil – I’ / ‘Introduction to French – I’

• Those opting for the course ‘General Tamil – I’, should choose a ‘Non Major

Elective – I’ offered by any other department.

• Those opting for the course ‘Introduction to French – I’, should choose the course

‘Advanced Tamil – I’ as Non Major Elective – I.

2. Students who have not studied Tamil in School, should opt for the course ‘Introduction to

French – I’ (Language – I) and ‘Basic Tamil – I’ (Non Major Elective – I)

Part Course Code Course Type Title of the Paper Hours

/Week Credits

Marks Continuous

Internal

Assessment

End

Term Total

I 16ULT01 /

16ULF01 Language – I

General Tamil – I /

Introduction to French – I 3 3 40 60 100

II 16UES01 English – I Functional English 3 3 40 60 100

III

16NSC11 Core – I Data Structures and

Algorithms 3 5 40 60 100

16NSC12 Core-II Web Applications

Development 4 5 40 60 100

16NSC13 Core - III Emerging Technologies 5 5 40 60 100

16NSC14 Core-IV Computer Systems 4 5 40 60 100

16NSC15 Core-V Object Oriented

Programming-Java 4 5 40 60 100

IV Non Major

Elective – I

Offered by other

Departments 2 2 40 60 100

VI 16NSC1P Core Lab – I Object Oriented

Programming Lab 3 5 40 60 100

Total 30 38

Page 3: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER II

* For students of other majors who opt for the course “General Tamil – II”

IV 16CANAB Non Major

Elective -II*

Interactive Animation

Note

Prerequisite for ‘General Tamil – II’ is ‘General Tamil – I’

Prerequisite for ‘Introduction to French – II’ is ‘Introduction to French – I’

Prerequisite for ‘Basic Tamil – II’ is ‘Basic Tamil – I’

Prerequisite for ‘Advanced Tamil – II’ is ‘Advanced Tamil – I’

Part Course

Code Course Type Title of the Paper

Hours

/Week Credits

Marks Continuous

Internal

Assessment

End

Term Total

I 16ULT02/

16ULF02 Language – II

General Tamil – II /

Introduction to French – II 3 3 40 60 100

II 16UBE02 English – II English in Professional

and Business Settings-2 3 3 40 60 100

III

16NSC21 Core – VI System Analysis and

Design 3 5 40 60 100

16NSC22 Core – VII Data Analysis and

Design-Oracle 3 5 40 60 100

16NSC23 Core – VIII Networking Infrastructure 3 5 40 60 100

16NSA20 Allied I Internet Server

Management 3 3 40 60 100

IV 16NSNAB Non Major

Elective – II

Offered by other

Departments 2 2 40 60 100

VI 16NSC2P Core Lab – II DBMS LAB 3 5 40 60 100

Total 23 31

Page 4: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER III

* Course offered by the Department of CS&IT for students of other majors (Similarly

Student should take a Non Major Elective offered by other Departments)

Part Course

Code Course Type Title of the Paper

Hours

/Week Credits

Marks

Continuous

Internal

Assessmen

t

End

Term Total

I 16ULT03/

16ULF03

Language –

III

General Tamil – III /

Introduction to French –

III

3 3 40 60 100

II 16UBE03 English – II Executive Communication 3 3 40 60 100

III

16NSC31 Core –IX Employability and

Professional Development 3 5 40 60 100

16NSC32 Core – X Networking Technologies

5 5 40 60 100

16NSC32 Core – XI Computer Systems

Architecture 5 5 40 60 100

16NSA30 Allied II Information Systems in

Organisations 3 3 40 60 100

IV

16BTNAA/

16ATNAA

Non Major

Elective – II

Basic Tamil – I /

Advanced Tamil – I

2 2

40 60 100

16CANAC

Non Major

Elective –

III*

Website Design 40 60 100

VI 16qNSC3P Core lab - III Advanced Network

Programming Lab 3 5 40 60 100

Total 26 31

Page 5: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER IV

* Course offered by the Department of CS&IT for students of other majors (Similarly

Student should take a Non Major Elective offered by other Departments)

Part Course

Code Course Type Title of the Paper

Hours

/Week Credits

Marks Continuous

Internal

Assessment

End

Term Total

I 16ULT04/

16ULF04

Language –

IV

General Tamil – IV /

Introduction to French – IV 3 3 40 60 100

II 16UEB04 English – IV Executive Communication 3 3 40 60 100

III

16NSC41 Core – XII Mathematics for Software

Development 4 5 40 60 100

16NSC42 Core – XIII Programming in .NET 4 5 40 60 100

16NSC43 Core –XIV Operating System 4 5 40 60 100

16NSA40 Allied – III Business Skills for E-

Commerce 2 3 40 60 100

IV

16BTNAB/

16ATNAB

Non Major

Elective – II

Basic Tamil – II /

Advanced Tamil – II

2 2

40 60 100

16CANAD

Non Major

Elective –

IV*

Computer Security 40 60 100

VI 16NSC4P Core Lab IV

DOTNET Lab

4 5 40 60 100

Total 28 31

Page 6: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER V

Part

Course

Code

Course

Type Title of the Paper

Hours

/Week Credits

Marks

Continuous

Internal

Assessment

End

Term Total

III 16NSC51 Core-XV Linux Server Administration 4 5 40 60 100

16NSC52 Core-XVI Wireless Networks 4 5 40 60 100

16NSA51 Allied

Elective–I

Cryptography & Network

Security 3 3 40 60 100 16NSA52 Artificial Intelligence

16NSA53 Computer Security

V 16SBA51 Skill-Based

– I

Numerical Aptitude and

Logical Reasoning 2 2 40 60 100

16UES51 Compulsory

Course–

UGC

Environmental Science 2 2 40 60 100

VI 16NSC5P Core Lab-V Linux Lab 5 5 40 60 100

20 22

Page 7: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Total

Page 8: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER VI

Total Credits: 175

Part

Course

Code

Course

Type Title of the Paper

Hours

/Week Credits

Marks

Continuous

Internal

Assessment

End

Term Total

III 16NSC

61

Core-XVII Ethical Hacking 5 5 40 60 100

16NSC

62

Core-XVIII Cloud Computing 3 5 40 60 100

16NSA

61

Allied

Elective–II 1. Biometrics

3 3 40 60 100 16NSA

62 2. Distributed Computer

Architecture

16NSA

63 3. Neural Networks

V 16VED

04

Part – V

Course –III Value Education 2 2 40 60 100

16SBC

61

Skill-Based

– II Resource Management

Techniques 2 2 40 60 100

VI Project–I Project Work 5 5 40 60 100

Total 20 22

Page 9: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER - I

Page 10: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC11 DATA STRUCTURES AND ALGORITHMS

AIM

Provide learners with an understanding of how data structures are used in algorithms and

enables them to design and implement data structures.

UNIT – I: Understand data structures and algorithms

Data structures: array – set – stack – queue – list – tree - types :eg active- passive-

recursive.

Operations: types eg : create – empty – push – pop –insert –delete – search - sort.

UNIT – II : Understand data structures and algorithms

Design specification: using non-executable programme specification language eg

pseudocode - issues eg complexity in software development–interfaces - information

hiding. Creation: pre-conditions- post-conditions- error-conditions.

UNIT – III : Understand data structures and algorithms

Algorithms: sort eg insertion – quick – shell – merge – heapsort - selection sort - search eg

linear-binary- binary search tree - recursive eg binary tree traversals (preorder- inorder-

postorder).

UNIT – IV: Be able to implement data structures and algorithms

Implementation: sorting- searching and recursive algorithms - using eg arrays (single

and/ormulti-dimensional)-handle- pointer- class- methods - using an executable

programming language

UNIT – V : Understand how strings are structured and processed

String: structure eg sequence of characters- data type- character encoding.

Operations: types eg concatenation- find character- length- lowercase- substring-

trim.Algorithms: processing eg string searching-string sorting-string manipulation.

TEXT BOOK Goodrich M- Tamassia R – Data Structures and Algorithms in C++ (Wiley-

2010) ISBN-10: 0470383275 Goodrich M- Tamassia R – Data Structures and Algorithms in Java (Wiley-

2005) ISBN-10: 0471738840 Melhorn K- Sanders P – Algorithms and Data Structures: The Basic Toolbox

(Springer- 2008) ISBN-10: 3540779779

Page 11: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

WEBSITES http://ww3.datastructures.net

http://www.itl.nist.gov/div897/sqg/dads/

Page 12: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC12 WEB APPLICATIONS DEVELOPMENT

AIM

Enable learners to understand the concepts of web applications and apply the skills to

develop and test web applications using server-side technologies.

UNIT I: Understand the concepts of web application development

Users: types eg expert- regular- occasional- novice- special needs- requirements-

egpsychological- cultural- social and environmental- health and safety- education and

work.

Site analysis: purpose eg communication- real-time information- commercial- government-

education- business- entertainment- downloading/uploading- web storage- fit for purpose-

eg meets organisational and site AIM- planning- eg storyboarding- structure- hypermedia

linkage- search engine key words- graphical design- user interface- audio/video sources-

animation- text design- maintenance- eg plans- logs- disaster recovery- testing .

Accessibility: features eg alternative text- resizable fonts- support for screen readers-

adjustable fonts.

Legislation: laws- guidelines and standards- eg Disability Discrimination Act- Data

ProtectionAct- E-Commerce Regulations Act- W3C validation- copyright and intellectual

property rights.

Functionality: functions- eg shopping cart- reserve order- manage user profile- web

contentmanagement- upload files.

Scripting languages: server-side eg ASP (Active Server Pages)- ASP.NET- PHP

(HypertextPreprocessor)- JSP (Java Server Pages)- Cold Fusion- Perl- Java Applet- Flash -

advantages eg faster processing time- data processing- data storage- client-side eg

JavaScript- VBScript.

Security: security requirements- eg user accounts- account restrictions- procedures

forgranting and revoking access- terms of use- system monitoring.

UNIT II: Be able to design web applications Identification of need: nature of interactivity eg online transactions- static versus dynamic-

client needs and user needs- eg image - level of security- eg user/administrator access -

Page 13: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

development timescales- support and maintenance contracts- costs- visibility on search

engines - end user need eg appropriateness of graphics- complexity of site- delivery of

content.

Design tools: concept designing- eg mood boards- storyboarding - layout techniques

egframes- tables- block level containers (DIV)- inline containers (SPAN) - templates-

colour schemes- screen designs- use case diagrams- pseudo code - other eg outline of

content- database design- eg data flow diagrams- entity relationship diagrams

Database design: documenting the design- back end design- eg defining relationships-

normalisation- naming conventions- front end design- eg user interface- security measures

UNIT III: Be able to implement web applications Structure: layout of pages – navigation - format of content and cascading style sheets

(CSS) - page elements- eg headings- rules- frames- buttons- text and list boxes-

hyperlinks/anchors- graphical images- clickable images/maps - interactive features- eg

catalogue of products- shopping cart- images and animation

Content: proofed- correct and appropriate- reliability of information source- structured

forpurpose- eg prose- bullets- tables

Development: mark-up languages eg HTML (Hypertext Mark-up Language)- DHTML

(DynamicHypertext Mark-up Language) - client-side scripting languages eg JavaScript-

VBScript - features and advantages of software languages - web authoring software tools

Tools and techniques: navigation diagram eg linear- hierarchy or matrix - building

interactivitytools- eg pseudo-code for client-server scripting - adding animation and

audio/visual elements - ensuring compliance with W3C - meta-tagging - cascading style

sheets

UNIT IV: Be able to implement web applications

Server-side interaction: manage and process data- eg client- server - action events -

actionresponses - login/logout Server-side scripting languages: ASP- JSP- PHP- Cold Fusion- Perl Database connectivity: common methods of using/accessing databases on a web server

egSQL (Structured Query Language) – MySQL - ODBC (Open Database Connectivity) -

Page 14: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

JDBC (Java Database Connectivity) - ADODB (ActiveX Data Objects). Web-programming concepts: objects - eg response- request- application- session- server-

error- file system- text stream- drive- file- folder- dictionary - ADO – components - eg email-

file- file uploads- date/time - syntax- variables - procedures- forms – cookies – sessions -

applications.

UNIT V: Be able to test web applications Review: functionality testing (user environments- links and navigation) – content - check

againstuser requirements- user acceptance - audit trail of changes. Mechanisms: browser compatibility testing - platform testing - script-language testing -

validHTML - server-script and database-script code - checking functionality against

requirements - check internal and external hyperlinks to other web pages and media content

(web files- web documents- images) - error detection - error messages - dry running. Feedback: record feedback- eg surveys- questionnaire- interviews - analyze feedback-

presentresults.

Supportive documentation: test plan (test data- expected results- actual results) - test

results -programmer guidance- user guidance (instructions).

Testing by: types eg administrator- user- automated scripts.

RESOURCES Books Hurwitz D- MacDonald B – Learning ASP.NET 3.5 (O'Reilly Media- 2008) 978-

0596518455 Nixon R – Learning PHP- MySQL- and JavaScript (O'Reilly Media- 2009) 978-0-596-

15713-5 Parsons D – Dynamic Web Application Development Using XML and Java (Thompson

Learning- 2008) ISBN-10: 1844805417 Schwartz R et al – Learning Perl (O’Reilly Media- 2008) ISBN-10: 0596520107 Stobart R – Dynamic Web Application Development Using PHP and MySQL (Thompson

Learning- 2008) ISBN-10: 1844807533 Websites W3Schools Online Web Tutorials – www.w3schools.com

Page 15: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC13 EMERGING TECHNOLOGIES

AIM: Enable learners to explore current and cutting-edge technological developments- disciplines

and advancements that have been- and are still being made- within the field of emerging

technologies.

UNIT I: Understand emerging technologies Definition: cutting edge developments- contemporary advances in technology-

convergingtechnologies- technical innovations- gaining competitive advantage- disciplines

and domains emerging technologies cover Environments: prototype and fully-developed technologies eg low carbon technologies

andfuels- nanotechnologies- biotechnology- information technology- cognitive science-

robotics- genetic engineering- artificial intelligence- optical computing- 4G technologies-

swarm technologies- medicine- transportation.

UNIT II: Understand the impact of emerging technologies on society

Current developments: current research- development stages- future plans- costs-

prototypemodels eg analysis of predicted/outcome results- implementation or roll-out of the

technology- testing- costs Society: implications eg electric car - impact upon manufacturers of cars- fuel companies-

fuel distributors- consumers- government initiatives and legislation

UNIT III: Be able to conduct research into emerging technologies Emerging technology selection: initial emerging technology case studies- research

orinvestigation- environment to provide the basis of in-depth research into an

emerging technology. eg low-carbon fuels Research approaches: using primary and or secondary sources of information to gather

theresearch material and evidence- using qualitative and quantitative data sources- using

paper-based and electronic information sources

UNIT IV: Be able to conduct research into emerging technologies

Research outcome: presenting research findings and outcome- target audience for

deliveryand feedback- presentation delivery eg research paper- formal report- oral

presentation- discussion forum- blog- tools eg statistical analysis tools- application software

and professional packages to support delivery

UNIT V:Understand the ethical implications of emerging technologies

Page 16: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Ethical implications: ethical considerations and implications associated with

emergingtechnologies- exploring ethics associated with testing emerging technologies

and their environments eg laboratories Ethical committees: ethical committees or bodies eg 3TU Centre for Ethics and

Technology-United Nations Educational- Scientific and Cultural Organisation (UNESCO

Ethics of Science and Technology Programme)

Resources Websites http://en.wikipedia.org/wiki/Emerging_technologies www.cesweb.org/emergingTech/default.asp www.technologyreview.com/special/emerging/

Page 17: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC14 COMPUTER SYSTEMS

AIM: Enable learners to understand computer systems and apply theoretical knowledge to practical

application when building , configuring and maintaining computer systems.

UNIT I: Understand the function of computer systems

Computer systems: microcomputers eg personal computers- mobile computers-

minicomputers eg mid-range servers- workstations- mainframes eg large scale network

systems- supercomputers eg high performance systems- models- multiprocessing

Environments: home- business- computer gaming- networking- real-time-

communication. Function: main components (Arithmetic Logic Unit (ALU)- control unit- memory

andinput/output devices)- connection eg busses- Central Processing Unit (CPU) (control

unit- arithmetic logic unit- registers- input/output)- memory (Random Access Memory

(RAM)- Read Only Memory (ROM)- registers- programmable- cache)- auxiliary storage-

computer architecture

UNIT II: Understand the function of computer systems

Hardware: central processing unit- motherboard- power supply unit- cooling units-

backingstorage eg hard disc drive- controllers- ports- main memory- memory types-

battery- specialised cards eg Peripheral Component Interconnect (PCI)- Accelerated

Graphics Port (AGP)- network- graphics- modem- sound- optical drives- performance

factors Software: systems software eg operating systems- utility programs- library programs-

translator programs- applications software eg special purpose software- be-spoke software-

performance factors Peripherals: printers- plotters- cameras- scanners- keyboard and mouse- monitors-

displayadapters- multimedia devices- storage media- networking- portable drives- plug and

play components- performance factors

UNIT III: Be able to design computer systems Needs analysis: client and system requirements- problems/limitations with

current/newsystem- functionality- costs- timescales- resources- investigation/analytical

techniques eg interviews- questionnaires

Page 18: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Selection: costs- client requirements- maintenance contracts- outputs required-

compatibility-system integration eg home entertainment- storage capacity- accessibility-

performance eg speed- time- power- efficiency- effectiveness- usability- alternative solutions System specification: client requirements- system requirements- system components-

configuration- time- tools and resources- alternatives eg processor types- backup options-

security measures- documentation

UNIT IV: Be able to build and configure computer systems Health and safety: health and safety practices- electrostatic precautions eg antistatic

mats-antistatic wrist straps System installation: hardware: assemble and disassemble a computer system-

installmotherboard- processor- heat-sink and fan- memory- power supply unit and connect

to internal components- install hard disc drive- optical drive- install specialised cards eg

graphics- network- modem- audio- install and configure software eg operating system-

application software- utility software- install peripheral devices eg printer- scanner-

camera- install communication devices eg modem- router System configuration: configure Basic Input Output System (BIOS) eg date/time-

powermanagement- security- install latest antivirus/security updates- update user

profiles- configure desktop- icon size- font size- colour- background- customise menu-

file management- files and folders- setting file/folder sharing permissions- peripheral

devices- printer- scanner- camera- communication devices System testing: fault detection- Power On Self-Test (POST)- diagnostic faults-

troubleshootdevices- technical support documentation eg reference manuals- online

manufacturer support- test hardware eg input/output devices- peripheral devices- test

software- documentation eg test plan

UNIT V: Be able to undertake routine maintenance on computer systems Software maintenance: upgrade software eg virus definition files- patches/updates-

scheduling maintenance tasks- utility software eg defragmentation- clean-up- back-up-

system profilers- other third party utility software eg compression utilities-

spyware/malware removal Hardware maintenance: upgrade hardware- install and configure new peripherals eg

printers-scanners- install and configure additional or replacement devices eg hard drive-

memory- graphics- sound- optical media- network- cleaning equipment File management: manage files/folders- back-up procedures

Page 19: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Resources

Books Anfinsin- D – IT Essentials: PC Hardware and Software Companion Guide (Cisco

Press- 2010) ISBN 158713263X Dick- D – The PC Support Handbook: The Configuration and Systems Guide (Dumbreck

Publishing- 2009) ISBN 9780954171131

MacRae K – The Computer Manual: The Step-by-step Guide to Upgrading and Repairing a

PC(Haynes Group- 2002) ISBN 1859608884 MacRae K and Marshall G – Computer Troubleshooting: The Complete Step-by-step

Guide toDiagnosing and Fixing Common PC Problems- Second Edition (Haynes

Group- 2008)ISBN 1844255174 White R and Downs T – How Computers Work (Que- 2003) ISBN 0789730332 Journals Computer Weekly Which? Computer Websites www.bized.co.uk

www.computerweekly.com

Page 20: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC15 OBJECT ORIENTED PROGRAMMING - JAVA

AIM Provide learners with an understanding of the principles of object oriented programming as

an underpinning technological concept in the field of programming, data management and

systems development.

UNIT I: Understand the Principles of object oriented programming

Characteristics of objects: Inheritance- polymorphism- encapsulation- public classes-

private classes- public methods- private method

IDE: typical elements source code editor- compiler- interpreter- build automation tools-

debugger

An Overview of Java: Object Oriented Programming – Simple Program – ‘if’ Statement –

‘for’ Loop – using blocks of Code – Lexical Issues – Java Class Libraries – Data Types –

Variables – Arrays - Operators – Selection Statements – Iteration Statements – Jump

Statements

UNIT II:

Software engineering: Encapsulation- reuse- method overloading- instance variables-

classes- abstract classes- interfaces

Variables: public instance variables- private instance variables- static references

Class Fundamentals: Declaring Objects – Assigning Object Reference Variables –

Introducing Methods – Constructors – ‘this’ Keyword – Garbage Collection- finalize()

Method – Overloading Methods – Using Object as Parameters – Argument Passing –

Returning Objects – Recursion – Access Control – ‘static’ Keyword – Nested and Inner

Classes – String Class – Command Line Arguments

UNIT III:

Inheritance: Using ‘super’ Keyword – Multilevel Hierarchy – Constructors – Method

Overriding – Dynamic Method Dispatch – Abstract Classes – ‘final’ Keyword – Object Class

– Packages – Access Protection – Importing Packages – Interfaces

Page 21: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Exception Handling: Exception Types – Uncaught Exceptions – ‘try’ And ‘catch’ Blocks –

Multiple ‘try’ Clauses – Nested ‘try’ Statements – ‘throw’ Keyword – ‘throws’ Keyword –

‘finally’ Keyword – Built-in Exceptions.

UNIT IV:

Multithreading: Thread Model – Main Thread – Creating a Thread – Multiple Thread –

‘isalive’ and ‘join’ – Thread Priorities – Synchronization – Inter-Thread Communication –

Suspending – Resuming – Stopping Threads – Multithreading

JDBC: Setting the JDBC Connectivity with a Backend Database.

UNIT V:

String Handling: String Constructors – String Length – Special String Operations –

Character Extraction – String Comparison – Searching Strings – Modifying a String – Data

Conversion Using ‘valueof()’ – Changing the Case of Characters within a String – String

Buffer

Resources Books Kaldahl B – EZ Flash MX: Animation- Action Script and Gaming for Macromedia Flash

(Trafford Publishing- 2004) ISBN 1612006171 Lemay L and Cadenhead R – Sams Teach Yourself Java 2 in 21 Days- 4th Edition

(Sams- 2004) ISBN 0672326280 Schildt H – C++: A Beginner’s Guide- 2nd Edition (McGraw-Hill Education- 2003) ISBN

0072232153 Templeman J and Olson A – Microsoft Visual C++ .NET Step by Step: Version 2003

(Microsoft Press US- 2003) ISBN 0735619077 Websites http://java.sun.com/docs/books/tutorial/

http://msdn.microsoft.com/en-us/visualc/default.aspx

Page 22: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16CAC1P OBJECT ORIENTED PROGRAMMING LAB

1. Create a Java Application to Multiply Two Matrix

2. Create a Java Application to Implement Function Overloading

3. Create a Java Application to Find Maximum and Minimum value using Command

line argument

4. Create a Java Application to Implement Single Inheritance

5. Create a Java Application to Implement Multiple Inheritance

6. Create a Java Application to Implement Abstract Classes

7. Create a Java Application to Implement Built-In Exception and User-Defined

Exception

8. Create a Java Application to Create Package

9. Create a Java Application to Implement Multiple Inheritance using Interfaces

10. Create a Java Application to Implement Multithreading

11. Create a Java Application to Store and Retrieve Student Details in Database using

JDBC

12. Create a Java Application to Implement Animation in Applet

Page 23: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16CANAA INTRODUCTION TO INFORMATION TECHNOLOGY

OBJECTIVE

The main objective of this course is to:

• Acquire basic knowledge of Information Technology applications

• equip students with computer components and internet basics

UNIT – I

Introduction: Information Systems – Software and Data – IT in Business and Industry – IT

in the Home and at Play – IT in Education and Trading – IT in Entertainment and the Arts –

IT in Science- Engineering And Mathematics – Computers In Hiding – Computers in

Satellite – Computers in Medical.

UNIT – II

Components of Computer: Block diagram of a Computer -The Computer System and

Central Processing Unit – Types of Computers – Corporate and Departmental Computers –

Desktop- Super Computers and Personal Computers – The Anatomy of Computer – The

Foundation of Modern Information Technology: Binary Numbers – Digital Signals – Bits

Bytes – Central Processing Unit – Memory.

UNIT – III

INPUT and OUTPUT: I/O Devices – Keyboards – Inputting Text – Graphics – Pointing

Devices – The Foundation of Modern Outputs: Pixels and Resolutions – Fonts – Color –

Display Screens – Printers Secondary Storage: How Data is Stored? Storage Characteristics –

Storage Media: Floppy Disk Drives – Optical Disk – Backing Up Data – Storage devices

(Primary and Secondary)

UNIT – IV

Software: Introduction – User Interface – Application Programs- System Software –

Operating Systems: Mobile OS- Introduction – Types – File Management and Utilities –

Major Software Issues

UNIT – V

Internet and World Wide Web: Introduction – History of Internet - The Web – Getting

Connected to the Web – Locating Information on the Web – Web Multimedia – Web

Browsers – Search Engine – Social Networks.

TEXT BOOK:

1. Dennis P. Curtin- Kim Foley- Kunal Sen- Cathleen Morin- “Information Technology:

The breaking Wave”- Tata McGraw-Hill Publishing

Page 24: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

REFERENCE BOOK

1. S. Maria John-“Information Technology: Its application on the SSI Sector”-

Discovery Publishing House- 2003

Page 25: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER - II

Page 26: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC21 SYSTEM ANALYSIS AND DESIGN AIM Provide learners with the knowledge and skills needed to undertake a systems analysis

investigation by following a recognized methodology. UNIT I: Understand different systems life cycles

Lifecycle models: examples eg Systems Development Life Cycle (SDLC)- Rapid

ApplicationsDesign (RAD)- Spiral- Agile- Dynamic Systems Design Methodology

(DSDM)- Waterfall and Prototyping Lifecycle procedure/stage: lifecycle stages within different models- lifecycle stages

examples eg (feasibility study- analysis- design- implementation- testing- review) or

(analysis- design- implementation- maintenance- planning)

UNIT II: Understand the importance of a feasibility study

Fact-finding techniques: eg- interviews- observation- investigation of

documentation-questionnaires- focus groups Feasibility criteria: issues eg legal- social- economic- technical- timescales-

organisationalconstraints Components: purpose- structure- intended audience- outcomes

UNIT III: Be able to perform a systems investigation

Identify requirements: stakeholders- requirements identification- requirements

specificationeg scope- inputs- outputs- processes and process descriptors- consideration of

alternate solutions- quality assurance required Constraints: specific to activity eg costs- organisational policies- legacy systems-

hardwareplatforms

UNIT IV: Be able to perform a systems investigation Report documentation: structure eg background information- problem statements-

datacollection process and summary- recommendations- appendices

UNIT V: Be able to perform a systems investigation

Systems analysis terminology and tools: data stores and entities- data flows-

processrepresentation techniques relationships – 1:1- 1: Many (1:M) and Many:

Many (M:M) Investigation: eg upgrading computer systems- designing new systems

Page 27: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Techniques: examples relevant to methodology chosen eg Context Diagrams- Data

FlowDiagrams (DFDs)- Entity Relationship Diagrams (ERDs)- Business Systems Options

(BSOs)- Technical Systems Options (TSOs)- quality considerations eg Total Quality

Management (TQM)

Resources Books Dennis A and Haley Wixom B – Systems Analysis and Design (John Wiley & Sons

Ltd- 2009) ISBN-10: 0470400315 Lejk M and Deeks D – An Introduction to System Analysis Techniques- 2nd Edition

(Addison Wesley- 2002) ISBN-10: 0201797135 Websites www.freetutes.com/systemanalysis/

Page 28: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC22 DATA ANALYSIS AND DESIGN - ORACLE

AIM:

To provide learners with the knowledge and skills needed to understand- design-

query and implement database systems.

UNIT – I :Data models and database technologies

Data models: Hierarchical- Network- Relational- data manipulation languages- data

definition languages- data independence- data redundancy issues- data integrity- schema- eg

tables fields relationships- views- indexes- conceptual scheme- physical scheme- data

dictionary.

UNIT – II

Approaches: top down and bottom up- tools and techniques eg entity analysis- Entity

Relation Diagrams (ERDs)- determinancy diagrams- data flow diagrams- entities- attributes

and key identifiers- relationship types and enterprise rules- degrees of relationships-

functional dependency- first- second and third normal forms - New developments: dynamic

storage- data mining and data warehousing- web enabled database applications- other

developments eg multimedia databases- document management systems- digital libraries

UNIT – III: Design and implement relational database systems

Designs: data types- entity and referential constraints- conversion of logical database design

to a physical implementation- tools and techniques- issues around the degree of

normalisation chosen- verification and validity checks- data definition- control mechanisms.

Requirements: requirements specification- relational requirements- other requirements eg

need to integrate with legacy systems- future requirements- timescales- costs - User interface:

requirements eg functionality- reliability- consistency- performance- menu driven- HCI

interface

UNIT – IV: Use manipulation and querying tools

Data manipulation: query languages- visual tools- typical tasks eg for database

maintenance- inserts- updates and amendments - Queries and reporting: query languages and

query by example (QBE)- formatting- functions/formulae- report writing tools

UNIT - V: Test and document relational database systems

Control mechanisms. example systems eg TQM(Total Quality Management)- connection to

requirements specification- sign off procedures - Testing procedures: test plans- test models

Page 29: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

eg white box- black box- test documentation- other eg organisational requirements- user

documentation eg help menu- pop-ups- hot-spots

Reference Books Avison D and Fitzgerald G – Information Systems Development: Methodologies-

Techniques andTools (McGraw Hill Higher Publishing Company- 2006) ISBN 0077114175 Chao L – Database Development and Management (CRC Press- 2006) ISBN 0849392381 Connolly T and Begg C – Database Systems: A Practical Approach to Design-

Implementation andManagement (Addison Wesley- 2004) ISBN 0321210255 Howe D – Data Analysis for Database Design (Butterworth-Heinemann Ltd-

2001) ISBN 0750650869 Kroenke D – Database Concepts-2nd Edition (Prentice Hall- 2004) ISBN 0131451413 Ponniah P – Database Design and Development: An Essential Guide for IT Professionals:

VisibleAnalyst Set (John Wiley & Sons Inc- 2006) ISBN 0471760943 Ritchie C – Relational Database Principles (Thomson Learning- 2002) ISBN 0826457134 Websites www.deeptraining.com/litwin/dbdesign/FundamentalsOfRelationalDatabaseDesign.aspx www.geekgirls.com/menu_databases.htm www.smart-it-consulting.com/database/progress-database-design-guide/

Page 30: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC23 NETWORKING INFRASTRUCTURE

AIM To provide learners with an understanding of networking infrastructures- the directory

based system that supports the addressing and resource management of any large scale

networked system.

UNIT I:Understand the principles of network infrastructure management

Name resolution: services eg Domain Name System (DNS)- eDirectory- Active

Directory-requirements eg addressing- resource management- user management-

services management- security of resources- access control Technology: resources eg servers supporting networking infrastructure management-

routers- printers- switches- firewalls- clients- wireless access- cabled access- remote

workstations- 3G based remote access

UNIT II:Understand the principles of network infrastructure management

Security: resources eg rights management- resource availability- user management-

accesstimes- group allocation- timed access- encryption- authentication- Virtual Private

Network (VPN)- tunneling- remote access- RADIUS (Remote Access Dial In Support)-

TACACS (Terminal Access Controller Access-Control System)- IPSec- certificate

authorities- PKI (Public Key Infrastructure)

UNIT III:Be able to design complex network infrastructure systems Addressing: naming methodology- delivery of addresses- identification of devices and

resources Rights: designing user and group rights- access rights to resources- access to files- access

toprinters- access to services Security: creation of remote access services- deployment of VPN access- time based rules-

trust management- access control and login- logging- system activity audit trail Deployment: scalable- use of technology- adaptable- change management-

commercialrequirements- supportive of environment

UNIT IV: Be able to implement complex network infrastructure systems

Addressing: application of naming methodology- delivery of addresses

Page 31: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Rights: issue of rights to users- apply rights to groups- apply access rights to resources-

access to files- access to printers- access to external services Security management: remote access services- deployment of VPN access rules- trust

management- access control and login- logging- system activity audit trail Interaction: with external DNS- with other directory services- with existing directory

servicesinfrastructure

UNIT V:Be able to test complex network infrastructure systems

System assurance: security of system- access- availability- visibility of all resources

User assurance: valid access issued- group access- inheritance of rights Documentation:

test plan- test results- analyse results

Resources Books Mackin J and McLean I – MCSE Implementing- Managing & Maintaining a Windows

Server 2003Network Infrastructure (Microsoft- 2006) ISBN-10: 0735622884 White G et al – CompTIA Security+ All-in-One Exam Guide- Second Edition (McGraw

Hill- 2009) ISBN-10: 0071601279

Page 32: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSA21 INTERNET SERVER MANAGEMENT

AIM To enable learners to implement and manage secure internet technologies for

networking systems.

UNIT I: Understand internet technologies

Internet technologies and communication protocols: protocols eg TCP/IP

(TransmissionControl Protocol/Internet Protocol)- OSI (Open Systems Interconnection)-

DNS (Domain Name System)- DHCP (Dynamic Host Configuration Protocol)- SNMP

(Simple Network Management Protocol)- routing and remote access- telnet- ports and

addresses- internet organisations eg ICANN (Internet Corporation for Assigned Names and

Numbers)- InterNIC (Internet Network Information Center)- IEEE (Institute of Electric and

Electronic Engineers)- subnetting and supernetting

UNIT II:Understand internet technologies

Internet services: services- eg intranet- email- e-Commerce- instant messaging- wikis-

blogs-certificate services- directory services- internetworking servers eg ISP (Internet

Service Provider)- World Wide Web- FTP (File Transmission Protocol)- database servers- e-

Commerce servers- news servers- email servers- proxy servers- media servers- directory

servers

Networking technologies and concepts: devices- eg hub- switch routers-

networkmanagement concerns- eg client/server environment- user and group management-

resources management- security- network attacks- firewall- ethical and legal issues- servers

and server performances- user access issues

UNIT III: Understand internet server architectures

Internet server technologies: architecture eg modular- server structure eg core units-

basicfunctionality- request handling mechanisms- performance and access issues- examples

eg IIS (Internet Information Services)- Apache Hardware and software: required components eg CPU (Central Processing Unit)-

memory-storage devices- network connectivity- operating system- cost of running an

internet server

Page 33: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

UNIT IV:Be able to implement internet server and services

Planning installation: procedures- eg examine and evaluate network infrastructure- select

asuitable internet server- undertake pre installation activities- eg downloading and

extracting the required files- preparing the required installation scripts- configuring the

network server and the operating system for internet server inclusion- plan server required

information- eg domain names- URLs (Uniform Resource Locators)- consider

customisation issues

UNIT V:Be able to manage internet server and services

Configure internet services: services eg web services- FTP- SMTP (Simple Mail

TransferProtocol)- proxy- certificate authority- configure site properties eg site bindings-

IP (Internet Protocol)- address hosting- port numbers hosting- host header hosting- default

document filenames- directory browsing- publish websites Testing: documentation- eg test plan (test data- expected results- actual results)- test results

Resources Books Bennett M et al – Professional Microsoft FAST Search (Wiley- 2010) ISBN-10: 0470584661 Comer D – Hands-on Networking with Internet Technologies (Addison Wesley-

2004) ISBN-10: 0131486969 Donahue G – Network Warrior (O’Reilly Media- 2007) ISBN-10: 0596101511 Ford A – Apache 2 Pocket Reference (O’Reilly Media- 2008) ISBN-10: 0596518889 Miller M – Internet Technologies Handbook: Optimizing the IP Network (Wiley

Blackwell- 2004) ISBN-10: 0471480509 Olifer N- Olifer V – Computer Networks: Principles- Technologies and Protocols for

NetworkDesign (Wiley- 2005) ISBN-10: 0470869828

Page 34: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC2P DATABASE MANAGEMENT SYSTEM LAB

1. Define and manipulate table using SQL commands (DDL, DML and DCL).

2. Practical Based on Implementing the Constraints.

• NULL and NOT NULL, • Primary Key and Foreign Key Constraint

• Unique, Check and Default Constraint

3. Practical for Retrieving Data Using following clauses.

• Simple select clause, • Accessing specific data with Where, Ordered By,

Distinct and Group By

4. Practical Based on Aggregate Functions.

• AVG, • COUNT, • MAX, • MIN, • SUM, • CUBE

5. Practical Based on implementing all String functions, date, time .

6. Practical Based on implementing use of union, intersection, set difference.

7. Implement Nested Queries & JOIN operation.

8. Write a PL/SQL program to create employee pay bill using if statement.

9. Write a PL/SQL program using looping statements.

10. Write a PL/SQL program to implement exception Handling.

11. Write a PL/SQL program to create procedure.

12. Write a PL/SQL program to implement function

13. Write a PL/SQL program to implement Cursor.

14. Write a PL/SQL program to create package with function and procedure

15. Write a PL/SQL program to create trigger.

Page 35: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER - III

Page 36: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC31 - EMPLOYABILITY AND PROFESSIONAL DEVELOPMENT

Aim To provide learners with the opportunity to acquire employability skills required for effective employment and

to manage their own personal and professional development.

UNIT I: Be able to take responsibility for own personal and professional development Responsibilities: own responsibilities eg personal responsibility, direct and

indirectrelationships and adaptability, decision-making processes and skills, ability to learn

and develop within the work role; other eg employment legislation, ethics, employment

rights and responsibilities Performance objectives: setting and monitoring performance objectives Individual appraisal systems: uses of performance appraisals eg salary levels and

bonuspayments, promotion, strengths and weaknesses, training needs; communication;

appraisal criteria eg production data, personnel data, judgemental data; rating methods eg

ranking, paired comparison, checklist, management by objectives; skills audit (personal

profile using appropriate self-assessment tools); evaluating self-management; personal and

interpersonal skills; leadership skills

UNIT II:

Motivation and performance: application and appraisal of motivational theories

andtechniques, rewards and incentives; manager’s role; self-motivational factors. Development plan: current performance; future needs; opportunities and threats to

careerprogression; aims and objectives; achievement dates; review dates; learning

programme/activities; action plans; personal development plan Portfolio building: developing and maintaining a personal portfolio Transcripts:

maintaining and presenting transcripts including curriculum vitae

UNIT III:Be able to demonstrate acquired interpersonal and transferable skills

Effective communication: verbal and non-verbal eg awareness and use of body language,openness and

responsiveness, formal and informal feedback to and from colleagues; IT as an effective communication

medium; team meetings Interpersonal skills: soft skills eg personal effectiveness, working with others, use of initiative,negotiating

skills, assertiveness skills, social skills Time management: prioritising workloads; setting work objectives; using time effectively;making and

keeping appointments; reliable estimates of task time

UNIT IV:Understand the dynamics of working with others

Page 37: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Working with others: nature and dynamics of team and group work; informal and

formalsettings; purpose of teams and groups eg long-term corporate objectives/strategy;

problem solving and short-term development projects; flexibility/adaptability; team player

Teams and team building: selecting team members eg specialist roles, skill

andstyle/approach mixes; identification of team/work group roles; stages in team

development eg team building, identity, loyalty, commitment to shared beliefs, team health

evaluation; action planning; monitoring and feedback; coaching skills; ethics; effective

leadership skills, eg, setting direction, setting standards, motivating, innovative, responsive,

effective communicator, reliability, consistency

UNIT V:Be able to develop strategies for problem solving Specification of the problem: definition of the problem; analysis and clarification Identification of possible outcomes: identification and assessment of various

alternativeoutcomes Tools and methods: problem-solving methods and tools Plan and implement: sources of information; solution methodologies; selection

andimplementation of the best corrective action eg timescale, stages, resources, critical

path analysis Evaluation: evaluation of whether the problem was solved or not; measurement of

solutionagainst specification and desired outcomes; sustainability

Resources Books NCCER – Basic Employability Skills: Trainee Guide 00108-09 (Prentice Hall, 2009) ISBN 013609919X Thompson Leigh, L – Making the Team: A Guide for Managers (Pearson Education, 2008) ISBN

9780136037767 Websites www.prospects.ac.uk www.stemnet.org.uk/resources/employability_skills_guide.cfm

Page 38: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC32 NETWORKING TECHNOLOGIES

AIM

To enable learners to understand computer networking concepts - how they work

- how they operate and the protocols - standards and the models associated with

networking technology.

UNIT – I

Networking principles: Role of networks: purpose – benefits - resource implications -

communications - working practice - commercial opportunity - information sharing -

collaboration - System: types - eg peer based - client-server - cloud - cluster - centralised

- virtualized - Networking standards: conceptual models eg OSI model - TCP/IP model -

standards: eg IEEE 802.x –

UNIT – II

Networking principles: Topology: logical eg Ethernet - Token Ring - physical eg star -

ring - bus - mesh - tree - ring Communication: bandwidth - throughput - Protocols:

relationship to networking standards - purpose of protocols - routed protocols eg IPv4 -

IPv6 - FTP - HTTP - SMTP - POP3 - SSL - management of protocols for addressing -

routing protocols eg RIP - RIPv2 - OSPF - OSPFv3 - BGP

UNIT – III

Networking components: Hardware components: workstation eg mobile - fixed - handheld

- console - servers - switches - routers - cabling - hubs - repeaters - bridges - wireless

devices - mobile eg 3G - 4G - GPRS - Software components: software eg client software -

server software - client operating system - server operating system - Server: type eg firewall

- email - web - file - database - combination - virtualisation - terminal services server -

Server selection: cost - purpose - operating system requirement - Workstation: hardware eg

network card - cabling - permissions - system bus - local-system architecture eg memory -

processor - I/O devices

UNIT – IV

Design networked systems: Bandwidth: expected average load - anticipated peak load -

local internet availability - cost constraints - Users: quality expectations - concept of system

Page 39: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

growth Applications: security requirements - quality of service needs - Communications:

suited to devices - suited to users - supportive of lifestyle desires - supportive of

commercial requirements - Scalable: able to support device growth - able to support addition

of communication devices - able to cope with bandwidth use and trend changes - protocol

utilisation - addressing - Selection of components: supporting infrastructure needs -

supporting connectivity requirements

UNIT – V:

Support networked systems: Devices: installation of communication devices - allocation of

addresses - local client configuration - server configuration - server installation -

Connectivity: installation of internet work communication medium Testing: communication -

bandwidth - User access: bandwidth - applications - devices Policy review: bandwidth -

resource availability - System monitoring: utilisation - bandwidth needs - monitoring user

productivity Maintenance schedule: backups - upgrades - security - auditing

Books Burgess M – Principles of Network and System Administration, 2nd Edition (John Wiley

and Sons Ltd, 2003) ISBN 0470868074 Hallberg B – Networking: A Beginner’s Guide, 4th Edition (Osborne/McGraw-Hill

US, 2005) ISBN 0072262125 Limoncelli T and Hogan C – The Practice of System and Network Administration (Addison

Wesley, 2001) ISBN 0201702711 Lowe D – Networking All-in-One Desk Reference for Dummies, 2nd Edition (Hungry

Minds Inc US, 2005) ISBN 0764599399 More M, Southwick P, Pritsky T and Riggs C – Telecommunications: A Beginner’s Guide

(McGraw-Hill Education, 2001) ISBN 0072193565 Olifer N and Olifer V – Computer Networks: Principles, Technologies and Protocols for

NetworkDesign (John Wiley and Sons Ltd, 2005) ISBN 0470869828 Schiller J – Mobile Communications, 2nd Edition (Addison Wesley, 2003) ISBN

0321123816 Subramanian M – Network Management: An Introduction to Principles and Practice

(Addison Wesley, 2000) ISBN 0201357429 Websites

Page 40: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

www.cisco.com www.howstuffworks.com www.webopedia.com www.wikipedia.org

Page 41: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC33 COMPUTER SYSTEMS ARCHITECTURE

Aim

To enable learners to understand the underlying architecture and components behind the

functioning of computer systems. UNIT I: Understand how data can be represented within computer systems Numeric data: conversions between different representations of data - representing

integernumbers in different number bases - converting between number bases using

integer numbers eg denary to binary - denary to hexadecimal - binary to hexadecimal -

performing arithmetic operations in different number bases - representing fixed-point

numbers in different number bases - representing floating-point numbers in binary Types of data: representing bit patterns for different types of data eg graphics - video -

audioand other data - graphics eg bitmap (resolution - colour depth - file calculations) -

vector (objects - properties) - sound (compression - sampling resolution - sampling rate -

streaming audio - quality) - video (compression - encoding - streaming - quality) -

analogue data - digital data - analogue signals - digital signals - data conversion eg

analogue to digital - file formats eg mp3 - mp4 - wav - avi

UNIT II:Understand the logical operations and coding of data

Boolean logic: logic gates - truth tables - use of logic gates in integrated circuits -

logicaloperations eg AND - OR - NOT - NAND - NOR - XOR Coding of data: sign and magnitude - two’s compliment - floating point - binary coded

decimal - coding of character data eg ASCII (American Standard Code for Information

Interchange)

UNIT III: Understand the functions of processing unit Key components: Central Processing Unit (CPU) - memory - interfaces - clock -

buses - diagrammatic representation - Von Neuman architectures Central Processing Unit: control unit - ALU (Arithmetic Logic Unit) - general purpose

registers - special purpose registers eg instruction pointer - accumulator - core eg single -

multiple - features eg pipelining - multiprocessing - parallel processing - polling -

interrupts UNIT IV: Understand the functions of computer system components

Page 42: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Memory: I/O maps - Direct Memory Access (DMA) - ROM (Read Only Memory) -

cache - RAM(Random Access Memory) eg static - dynamic - flash Buses: system bus - address bus - control bus - physical connections to components eg

CentralProcessing Unit - memory - input/output (I/O) devices - system buses

Peripherals: Types eg hard disc - printer - scanner - network card UNIT V: Understand the principles of processor operations CPU instruction sets: Reduced Instruction Set Computer (RISC) - Complex Instruction

SetComputer (CISC) - clock rate - performance levels

Addressing: modes eg immediate - relative - address bus - addressing in the fetch-

executecycle

Machine operations: how they are organised and represented - role of the instructiondecoder

- low-level programs - assembly code instructions eg fetch - load - add - decision making

and branching - using registers - transferring data between registers - fetch-execute cycle -

program storage - data storage - addressing

Reference Books

• Blum R – Professional Assembly Language Programming (John Wiley &

Sons - 2005) ISBN-10 0764579010 - ISBN-13 978-0764579011

• Gaura E - Hibbs D and Newman R – Computer Systems Architecture

(Lexden - 2008) ISBN-10 1904995098 - ISBN-13 978-1904995098

• Goodstein R – Boolean Algebra (Dover - 2007) ISBN-10 0486458946 - ISBN-13

978-0486458946 Website

freecomputerbooks.com/compscArchitectureBooks.html

Page 43: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSA31 INFORMATION SYSTEMS IN ORGANIZATIONS

AIM

To provide learners with an understanding of how organisations use information

systems to help them manage their specific needs.

UNIT – I

Functional areas of an organisation: typical areas eg finance - accounts - human

resources - stock control - sales - marketing - research and development - production -

distribution - customer service - administration

UNIT – II

Information needs: requirements analysis eg strategic - tactical - operational - data

requirements eg inputs - outputs - processing activities - information distribution

requirements eg location - department - individual

UNIT - III

Information systems: types eg business information systems - decision support

systems - management information systems - executive information systems - office

information systems - transaction processing systems - expert systems - global

information systems - data warehouse systems - enterprise systems - enterprise resource

planning systems - integrated information systems

UNIT – IV

Information and data: definition of information and data - sources of information -

information requirements and the needs for information at different levels within an

organisation - storing information and its importance with regard to security - accuracy

and relevance - outputs eg payroll - invoicing - ordering - bookings - stock control -

personnel records - goods tracking - decision making - marketing - customer service

UNIT - V

Management information: reports eg sales report - college enrolment statistics -

marketing analysis (brick v click) - Gathering information: defining requirements -

establishing sources of information - defining other factors to be considered eg

constraints - Selecting information: analysis of eg validity - accuracy - currency -

relevance - identifying alternatives

Page 44: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16CANAC WEB DESIGNING WITH HTML

AIM

The main objective of this course is to

• Impart the knowledge about the World Wide Web- Internet- web pages.

• Prepare the students to designs websites using HTML- DHTML.

UNIT – I

Internet Basics: Web browser – Web Sites - URL – DNS – Portals –Security and Privacy

issues- HTML: Basic tags- Elements – Attributes- Headings –Paragraphs- Formatting.

UNIT – II

Basic HTML: HTML Hyperlinks-Images- Tables –Lists- Blocks –Comments –Frames-

Layout- Colors-Color names.

UNIT – III

Forms: Text field- Password field- Radio Button- Checkbox- Submit button- Text area-

Drop-down List- Form Attributes- Video- Audio.

UNIT – IV

CSS: Introduction- Syntax- Selectors- Backgrounds- Text- Fonts-Links- Tables- Box Model-

Types of CSS-Align.

UNIT – V

CSS 3: Introduction- Borders- Background- Gradients- Font effects- Font- 2D Transforms-

3D Transforms-Transitions-Animation.

TEXT BOOKS

1. HTML-XHTML & CSS-6th Edition- Elizabeth Castro

REFERENCE BOOK

1. McGraw-Hill Glencoe-“Introduction to Web Design Student Edition”- Illustrated

Edition- McGraw-Hill- 2010

Page 45: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER - IV

Page 46: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC41 MATHEMATICS FOR SOFTWARE DEVELOPMENT

AIM

To provide learners with an understanding of the underlying mathematical concepts that

support the diverse fields supported by software engineers.

UNIT -1 Understand core mathematical skills for software engineers

Algebra: basic notation and rules of algebra - multiplication and factorization of algebraic

expressions involving brackets - algebraic equations and simultaneous linear equations -

quadratic equations involving real roots

Geometry: types and properties of triangles - Pythagoras’ Theorem - geometric properties

of a circle - trigonometry: eg sine - cosine and tangent functions - angular measure

Vectors: representation of a vector by a straight line - equal and parallel vectors -

magnitude of a vector - vector addition and subtraction - scalar multiplication - linear

transformations - rotations - reflections - translations - inverse transformations - axioms

of a vector space

UNIT – 2 Understand the application of Relations and Matrix concepts

Relations: domain - range - Cartesian product - universal relation - empty relation -

inverse relation - reflexive - symmetric and transitive properties - equivalence relations

Matrices: addition and subtraction - scalar multiplication - matrix multiplication -

properties of addition and multiplication of matrices - transpose of a matrix - determinant -

identify matrix - inverse of a matrix - condition for a matrix to be singular - solution of

simultaneous linear equations

Application in programming: use of variables and operators - using mathematics based

commands - arrays - conditional statements - pseudo code - demonstration code

UNIT – 3 Understand the application of Sets

Sets: definitions of set and element - representation of sets using Venn diagrams - universal

and empty sets - finite and infinite sets - N - Z and R - operations on sets - subsets -

notation - predicates - laws of set theory - idempotent - associative - commutative -

Page 47: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

distributive - identity - involution - complement - De Morgan’s laws

UNIT -4 Understand the application of Propositional Calculus

Propositional calculus: simple and compound propositions - conjunction - disjunction -

negation - implication and bi-implication - truth tables - validity - principle of

mathematical induction - logical argument and deductive proof

Boolean laws of propositional calculus: idempotent - associative - commutative -

distributive - identity - involution - complement - De Morgan’s Laws

UNIT -5 Be able to apply statistical techniques to analyze data

Techniques: frequency distribution - mean - median - variance - deviation - correlation

probability - factorial notation - permutations and combinations - laws of probability -

conditional probability - Bayesian Networks

References:

Books Press W et al – Numerical Recipes 3rd Edition: The Art of Scientific Computing

(Cambridge University Press - 2007) ISBN-10: 0521880688

Press W et al – Numerical Recipes Source Code CD-ROM 3rd Edition: The Art of Scientific

Computing (Cambridge University Press - 2007) ISBN-10: 0521706858

Golub G - Van Loan C – Matrix Computations (Johns Hopkins Studies in the Mathematical

Sciences)

(John Hopkins University Press - 1996) ISBN-10: 0801854148

Haggarty R – Discrete Mathematics for Computing (Addison Wesley - 2001) ISBN-10:

0201730472

Schwartz JT et al – Set Theory for Computing: From Decision Procedures to Declarative

Programming with Sets (Monographs in Computer Science) (Springer 2001) ISBN-10:

0387951970

Rothenberg R – Basic Computing for Calculus (McGraw Hill - 1985) ISBN-10:

007054011X

Websites www.mathsandcomputing.com/

Page 48: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC42 PROGRAMMING IN DOT NET

AIM

To provide learners with an understanding of the principles of programming using a .NET

framework as an underpinning technological concept in the fields of programming and

systems development.

UNIT I : Understand the principles of programming using a .NET framework Version: current version - backwards compatibility - design considerations -

alternativeimplementations Design features: interoperability - common runtime engine - language independence -

baseclass library - deployment - security - portability .NET languages: eg C# - C++ - F# - J# - PowerShell - JScript .NET - IronPython -

IronRuby - VisualBasic - IronLISP - L# - P#

UNIT II : Understand the Architecture of .NET framework Architecture: Common Language Infrastructure (CLI) - assemblies - metadata - security -

classlibrary - memory management - framework versions (architecture) eg 3.5 - 3.0 - 2.0

- common language runtime and the .NET framework class libraries UNIT III : Be able to design .NET solutions Selection: identification of .NET compatible programming language - identification of

.NETprogramming libraries - selection of development environment Design methodology: reuse of existing system - adaptation of code - GUI template -

graphicalinterface - design guides - state and interaction diagrams - screen layouts - data

storage - event procedures and descriptions Specification: input - output - processes - user need - purpose Creation of application: use of development environment - debugging Delivery environment: mobile - handheld - web based - desktop - dedicated device -

server Interaction: exchange of data - compliance - compatibility - recognition of standards

employed - environment

UNIT IV : Be able to implement .NET solutions Tools and techniques: use of tool boxes and controls - selection - loops - event handlers -

Page 49: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

eventdriven triggers - listeners - objects and object properties - menus - debugging tools Data: variables - data types - declaring variables - scope of variables -

UNIT V :Be able to implement .NET methods and classes

Constants Programming: use of methods - use of ‘traditional coding’ Complexity: multiple .NET classes - multiple code elements Reference Books

• Esposito D – Programming Microsoft ASP.NET MVC (Microsoft - 2010) ISBN-10:

0735627142

• Libert J - Horovitz A – Programming .NET 3.5 (O’Reilly - 2008) ISBN-10:

059652756X

• Lowy J – Programming .NET Components: Design and Build .NET Applications Using

Component-Oriented Programming (O’Reilly - 2005) ISBN-10: 0596102070

Websites

http://msdn.microsoft.com/en-gb/library/zw4w595w.aspx

www.dotnet-guide.com/

www.programmingtutorials.com/vbnet.aspx

Page 50: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSA41 BUSINESS SKILLS FOR E-COMMERCE

AIM

To enable learners to apply the business skills needed to design an e-Commerce solution

for an organization.

UNIT -1 Understand the structure and aims of business organisations

Organisations: type eg private - public - voluntary - charitable business organisations -

aims eg profit - market share - Return on Capital Employed (ROCE) - sales - growth -

customer service - Political - Economic - Social and Technological (PEST) analysis

UNIT – 2 Understand roles of Stakeholders and Business Functions

Stakeholders: identification of stakeholders - satisfying stakeholder objectives -

pluralist perspectives - the concept of corporate mission objectives and policies Business functions: key internal business functions eg marketing - sales - accounting -

administration - Management Information Systems (MIS) - operations

UNIT – 3 Understand the impact of e-Commerce

Consumer impact: empowered customers eg online sales - direct communication with

customers - greater choice - lower prices - availability of new products - global markets

- new marketing models - on-line advertising Business impact: global business and consumer markets - issues eg challenge of new

technology - security issues - impact and implications of dealing with customers on-line -

creating new distribution channels - greater competition - challenge to monopoly power -

re-training of staff - lower overheads - new selling chains - legislation

UNIT -4 Be able to design e-Commerce solutions

Objectives: business idea eg unique selling proposition - business-to-business opportunities

- business to consumer markets - domain name Market research: purpose of research eg identifying information sources - online and

offline competition - types of research eg primary - secondary Target markets: market analysis eg size - characteristics - dynamics - competitors -

historical background - emerging trends - market share - market segmentation Key processes: technology requirements eg hardware - software - security - maintenance -

back end systems - supply sources - distribution channels

Page 51: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

e-Commerce: payment systems eg electronic cheque - PayPal - NoChex - credit or debit

cards - start-up capital - working capital - funding sources UNIT -5 Understanding E-commerce Securities and Legislation

Security: key areas eg prevention of hacking - viruses - identity theft - firewall - impact

on site performance - Secure Sockets Layer (SSL) - Secure HTTP (HTTPS) - digital

certificates - strong passwords - alternative authentication methods Legislation: relevant legislation eg Data Protection Act 1998 - Computer Misuse Act 1990

- Consumer Credit Act 1974 - Trading Standards - Freedom of Information Act 2000 -

copyright legislation

References:

Chaffey D – E-business and E-Commerce Management - Fourth Edition (FT Prentice

Hall - 2009) ISBN 0273719602 Courtland B - Thill J – Business in Action (Pearson - 2010) ISBN 0132546884 Hall D - Jones R - Raffo C - Anderton A - Chambers I and Gray D – Business Studies

(Causeway Press - 2008) ISBN 1405892315 Laudon K - Guercio Traver C – E-Commerce 2010: International Version: Business -

Technology - Society (Pearson - 2009) ISBN 0135090784 Malmsten E - Leander K - Portanger E and Drazin C – Boo Hoo: A Dot.com Story from

Concept to Catastrophe (Arrow Books Ltd - 2002) ISBN 0099418371 Rich J – Design and Launch an eCommerce Business in a Week (Entrepreneur Magazine's

Click Starts) (Entrepreneur Press - 2008) ISBN 1599181835 Ridderstrale J and Nordstrom K – Funky Business Forever (Prentice Hall - 2007) ISBN

0273714139 Stanwick P - Stanwick S – Understanding Business Ethics (Prentice Hall - 2008) ISBN

013173542X Vise D – The Google Story (Pan - 2008) ISBN 0330508121 Wood G and Mellahi K – The Ethical Business: Possibilities - Challenges and Controversies (Palgrave Macmillan - 2002) ISBN 0333949935 Journals Business Review Magazine (Phillip Allan Publishers – see www.phillipallan.co.uk) The Economist (The Economist Newspaper Group - Inc)

Page 52: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC43 OPERATING SYSTEM

AIM

The main objective of this course is to:

• have basic knowledge about Operating Systems

• impute basic features of operating system

• provide practical knowledge in Operating System

UNIT – I

Introduction: Definition – Mainframe – Multiprocessor – Distributed – Clustered – Real-

Time – Hand-Held System – Input Output and Storage Structure – Hardware Protection –

Network Structure

System Components: Services – Calls – Programs Structure – System Design –

Implementation and Generation –Mobile OS.

UNIT – II

Process Management: Process Concepts – Scheduling – Operations – Co-Operation

Processes – Inter-Process Communication.

Process Synchronization: Critical Section Problem – Synchronization Hardware –

Semaphores – Classic Problems – Critical Regions

UNIT – III

Deadlocks: Deadlock Characterization – Prevention- Avoidance And Detection - Recovery

From Deadlock.

UNIT – IV

Storage Management: Swapping – Contiguous Memory Allocation – Paging –

Segmentation – Segmentation with Paging – Demand Paging – Process Creation – Page

Replacement – Implementation of Virtual Memory

UNIT – V

File Management: File Concepts and Access Methods – Directory Structure &

Implementation Allocation Methods – Free Space Management

Input and Output Systems: Disk Structure – Scheduling and Management – Swap Space

Management

TEXT BOOK

1. Silbeschartz- A.Galvin P.B- Gaghe.G- “Operating System Concepts”- John Wiley &

Sons

2. Achyut S.Godbole “Operating Systems”- Tata McGraw Hill

Page 53: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

REFERENCE BOOKS

1. Milan Kovic- “Operating System Concepts and Design”- Tata McGraw Hill- 1997.

Page 54: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC4P Dot Net PROGRAMMING LAB

1. Create a simple web site using VB.Net

2. Implement Cookies in VB.NET

3. Create a website to transfer the information between pages using VB.Net

4. Implement session state using ASP.Net

5. Implement Application State using ASP.Net

6. Create a program using Validation controls using VB.Net

7. Create a calendar using Rich-Controls using VB.Net

8. Create a Ad-Rotator using Rich-Controls using VB.Net

9. Create a program to insert and display data in to data based using ADO using VB.Net

10. Create a program to update data in database using ADO using VB.Net

11. Display the data from database using Grid view using VB.Net

Page 55: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16CANAD COMPUTER SECURITY

OBJECTIVE

The goal for students in this course is to learn the Fundamentals of Computer Security-

including:

• Principles of Computer Security

• Basic Cryptography

• Authentication

• Program Security

• Malicious code (viruses- worms- Trojan horses)

• Firewalls

UNIT – I

Principles of Computer Security: The Meaning of Computer Security – Attacks – Methods

of Defense

UNIT – II

Elementary Cryptography: Terminology and Background – Substitution Ciphers –

Transpositions (Permutations) – Symmetric Encryption – Public Key Encryption Systems

(Asymmetric Encryption) – The Data Encryption Standard – The AES Encryption Algorithm

UNIT – III

Malicious Code: Trojan Horses – Computer Viruses – Computer Worms – Other Forms of

Malicious Logic – Defenses Viruses – Trapdoors – Salami Attack – Threats in Networks

UNIT – IV

User Authentication Basics: Biometrics – Using GPS to Determine Location – File

Protection Mechanisms – Firewalls – Secure E-Mail

UNIT – V

Privacy Concepts: Privacy Principles and Policies – Authentication and Privacy – Privacy

on the Web – E-Mail Security – Impacts on Emerging Technologies

TEXT BOOK

1. Charles P. Pfleeger- Shari L. Pfleeger- “Security in Computing”- Prentice Hall- 2006.

REFERENCE BOOKS

1. Micki Krause- Harold F. Tipton- “Handbook of Information Security Management”-

Vol.1-3 CRC Press LLC- 2004.

Page 56: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

2. Matt Bishop- “Computer Security Art and Science”- Pearson/PHI- 2002.

Page 57: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER V

Page 58: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC51 LINUX SERVER ADMINISTRATION Unit: 1

System preparation: Basic hardware requirements - Get RHL - Installation requirements -

Installation options - system setup options. Fundamental command line skills: shells -

standard command line tools - the management of text files - local online documentation -

network printer - network configuration.

Unit: 2

BOOT Process: BIOS and the UEFI - boot loaders and GRUB - between grub and login -

control by run level - time synchronization.

Unit: 3

Linux File system Administration: Storage management and partitions’ - File system

Formats - basic Linux file systems and directories - Logical Volume Management -

Volume Encryption with the Linux Unified Key setup - File system management - The

Automounter.

Unit: 4

Package Management: The Red Hat Package Manager - RPM commands - Dependency

problems and yum command - Package Management tools -

Unit: 5

User Administration: User Account Management - Administrative Control - User and

Shell Configuration - User and Network Authentication - Special Groups.

Text Book:

Book Name: RHCSA/RHCE Red Hat Linux Certification Study Guide - Sixth Edition.

Author Name: Michael Jang. Publisher Name: TMH Publications.

Page 59: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC52 WIRELESS NETWORKS

UNIT I:PHYSICAL AND WIRELESS MAC LAYER ALTERNATIVES

Wired transmission techniques: design of wireless modems, power efficiency, out of band

radiation, applied wireless transmission techniques, short distance base band transmission,

UWB pulse transmission, broad Modems for higher speeds, diversity and smart receiving

techniques, random access for data oriented networks, integration of voice and data traffic.

UNIT II:WIRELESS NETWORK PLANNING AND OPERATION

Wireless networks topologies, cellular topology, cell fundamentals signal to interference ratio

calculation, capacity expansion techniques, cell splitting, use of directional antennas for cell

sectoring, micro cell method, overload cells, channels allocation techniques and capacity

expansion FCA, channel borrowing techniques, DCA, mobility management, radio resources

andpower management securities in wireless networks.

UNIT III:WIRELESS WAN

Mechanism to support a mobile environment, communication in the infrastructure, IS-95

CDMA forward channel, IS – 95 CDMA reverse channel, pallert and frame formats in IS –

95, IMT – 2000; forward channel in W-CDMA and CDMA 2000, reverse channels in W-

CDMA and CDMA-2000, GPRS and higher data rates, short messaging service in GPRS

mobile application protocols.

UNIT IV : WIRELESS LAN

Historical overviews of the LAN industry, evolution of the WLAN industry, wireless home

networking, IEEE 802.11. The PHY Layer, MAC Layer, wireless ATM, HYPER LAN,

HYPER LAN–2.

UNIT V : WPAN AND GEOLOCATION SYSTEMS

IEEE 802.15 WPAN, Home RF, Bluetooth, interface between Bluetooth and 802.11, wireless

geolocation technologies for wireless geolocation, geolocation standards for E.911 service.

TEXT BOOKS

1. Kaveh Pahlavan, Prashant Krishnamoorthy, Principles of Wireless Networks, - A united

approach - Pearson Education, 2010.

REFERENCES

1. Jochen Schiller, Mobile Communications, Person Education – , 2nd Edn.

Page 60: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

2. X.Wang and H.V.Poor, Wireless Communication Systems, Pearson education, 2004.

3. M.Mallick, Mobile and Wireless design essentials, Wiley Publishing Inc. .

4. P.Nicopolitidis, M.S.Obaidat, G.I. papadimitria, A.S. Pomportsis, Wireless Networks,

John Wiley & Sons, .

Page 61: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

CRYPTOGRAPHY & NETWORK SECURITY AIM

To understand the principles of encryption algorithms- conventional and public key

cryptography - detailed knowledge of authentication - hash functions and application level

security mechanisms.

UNIT I

INTRODUCTION: OSI Security Architecture - Classical Encryption techniques – Cipher

Principles – Data Encryption Standard – Block Cipher Design Principles and Modes of

Operation - Evaluation criteria for AES – AES Cipher – Triple DES – Placement of

Encryption Function – Traffic Confidentiality

UNIT II

PUBLIC KEY CRYPTOGRAPHY: Key Management – DiffieHellman key Exchange –

Elliptic Curve Architecture and Cryptography - Introduction to Number Theory –

Confidentiality using Symmetric Encryption – Public Key Cryptography and RSA.

UNIT III

AUTHENTICATION AND HASH FUNCTION : Authentication requirements –

Authentication functions – Message Authentication Codes – Hash Functions – Security of

Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash Algorithm –

RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital Signature

Standard.

UNIT IV

NETWORK SECURITY: Authentication Applications: Kerberos – X.509 Authentication

Service – Electronic Mail Security – PGP – S/MIME - IP Security – Web Security.

UNIT V

SYSTEM LEVEL SECURITY: Intrusion detection – password management – Viruses and

related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems.

TEXT BOOK

1. William Stallings - “Cryptography and Network Security – Principles and Practices” -

Prentice Hall of India - Third Edition - 2003

REFERENCE BOOKS

1. Atul Kahate - “Cryptography and Network Security”- Tata McGraw-Hill - 2003.

2. Bruce Schneier - “Applied Cryptography” - John Wiley & Sons Inc - 2001.

3. Charles B. Pfleeger - Shari Lawrence Pfleeger - “Security in Computing” - Third Edition

- Pearson Education - 2003.

Page 62: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

COMPUTER SECURITY

OBJECTIVE

The goal for students in this course is to learn the Fundamentals of Computer Security-

including:

• Principles of Computer Security

• Basic Cryptography

• Authentication

• Program Security

• Malicious code (viruses- worms- Trojan horses)

• Firewalls

UNIT – I

Principles of Computer Security: The Meaning of Computer Security – Attacks – Methods

of Defense

UNIT – II

Elementary Cryptography: Terminology and Background – Substitution Ciphers –

Transpositions (Permutations) – Symmetric Encryption – Public Key Encryption Systems

(Asymmetric Encryption) – The Data Encryption Standard – The AES Encryption Algorithm

UNIT – III

Malicious Code: Trojan Horses – Computer Viruses – Computer Worms – Other Forms of

Malicious Logic – Defenses Viruses – Trapdoors – Salami Attack – Threats in Networks

UNIT – IV

User Authentication Basics: Biometrics – Using GPS to Determine Location – File

Protection Mechanisms – Firewalls – Secure E-Mail

UNIT – V

Privacy Concepts: Privacy Principles and Policies – Authentication and Privacy – Privacy

on the Web – E-Mail Security – Impacts on Emerging Technologies

TEXT BOOK

2. Charles P. Pfleeger- Shari L. Pfleeger- “Security in Computing”- Prentice Hall- 2006.

REFERENCE BOOKS

3. Micki Krause- Harold F. Tipton- “Handbook of Information Security Management”-

Vol.1-3 CRC Press LLC- 2004.

4. Matt Bishop- “Computer Security Art and Science”- Pearson/PHI- 2002.

Page 63: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

ARTIFICIAL INTELLIGENCE

AIM:

To learn the basics of designing intelligent agents that can solve general purpose

problems, represent and process knowledge, plan and act, reason under uncertainty and

can learn from experiences.

UNIT I PROBLEM SOLVING

Introduction – Agents – Problem formulation – uninformed search strategies – heuristics

– informed search strategies – constraint satisfaction.

UNIT II LOGICAL REASONING

Logical agents – propositional logic – inferences – first-order logic – inferences in firstorder

logic – forward chaining – backward chaining – unification – resolution

UNIT III PLANNING

Planning with state-space search – partial-order planning – planning graphs – planning

and acting in the real world.

UNIT IV UNCERTAIN KNOWLEDGE AND REASONING

Uncertainty – review of probability - probabilistic Reasoning – Bayesian networks –

inferences in Bayesian networks – Temporal models – Hidden Markov models.

UNIT V LEARNING

Learning from observation - Inductive learning – Decision trees – Explanation based

learning – Statistical Learning methods - Reinforcement Learning.

TEXT BOOK:

1. S. Russel and P. Norvig, “Artificial Intelligence – A Modern Approach”, Second

Edition, Pearson Education, 2003.

REFERENCES:

1. David Poole, Alan Mackworth, Randy Goebel, ”Computational Intelligence : a logical

approach”, Oxford University Press, 2004.

2. G. Luger, “Artificial Intelligence: Structures and Strategies for complex problem

solving”, Fourth Edition, Pearson Education, 2002.

3. J. Nilsson, “Artificial Intelligence: A new Synthesis”, Elsevier Publishers, 1998.

Page 64: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Skill Based – I - NUMERICAL APTITUDE & LOGICAL REASONING

OBJECTIVE

• This course is really an asset to those who plan to appear competitive examination

conducted by Banks, LIC, Railways, M.C.A, CAT, MAT, etc., and other executive

posts.

• It is very much hoped that the subject matter will create a confidence among the

students and it will help them like an idle student

• When we follow the reasoning which eliminates the impossible choices until only the

correct solution remains, then we will acquire the mastery needed to tackle any

problem of logical deduction.

UNIT – I: Numbers

Number - Problems on Numbers - HCF & LCM – Square Root & Cube Root

UNIT – II: Problems on Average, Ratio, Age and Probabilities

Average - Ratio & Proportion - Problems on Age - Probabilities

UNIT – III: Time and Business Problems

Time and work -Time and Distance – Simple Interest - Compound Interest - Profit and Loss

UNIT – IV: Verbal Intelligence Test

Alphabetical Sequence Tests - Analogy Tests - Calendar Tests - Clock Tests - Coding and

Decoding Tests - Direction Sense Tests - Relations Tests - Common Sense Test - Odd Man

Out Tests - Number Series Tests - Seating Arrangements Tests

UNIT – V: Non Verbal Intelligence Test

Series, Analogies and Classification

REFERENCE BOOKS

• Quantitative Aptitude By R.S.Aggarwal

• A Modern Approach to Verbal & Non verbal Reasoning By R.S.Aggarwal

REFERENCE WEBSITE

• www.indiabix.com

• www.developeyourreasoning.com

Page 65: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

Compulsory Course - ENVIRONMENTAL SCIENCE

OBJECTIVE

This course AIMs at bringing awareness about the environment among students.

UNIT – I NATURAL RESEOURCES and ECO SYSTEMS

Multidisciplinary nature of environmental studies – Definition – Scope – Importance –

Awareness- Forest Resources – Water Resources – Mineral Resources – Food Resources –

Energy Resources – Land Resources What is Eco system – Types – Structure and Function –

Producer – Consumers and Decomposers – Energy Flow – Ecological Succession – Food

Chains- Food Webs and Ecological Pyramids

UNIT – II BIODIVERSITY AND ITS CONSERVATION

Introduction – Definition – Conservation value – Biodiversity Levels – Hotpot – Threats –

Endangered and Endemic Species of India – Conservation

UNIT – III SOCIAL ISSUES AND THE ENVIRONMENT

Unsustainable to Sustainable Development – Water Conservation – Urban problems related

to energy – Resettlement and Rehabilitation of People – Environmental Pollution Causes

Effects and Control measures of Air Pollution – Water pollution – Soil Pollution – Marine

Pollution – Noise Pollution – Thermal pollution – Nuclear Hazards- Environmental Ethics

UNIT – IV HUMAN POPULATION AND THE ENVIRONMENT

Population growth – Explosion – Family Welfare Programme – Human Health – Human

Rights – Value Education – HIV and AIDS – Women and Child Welfare – Role of IT

UNIT – V FIELD WORK

Visit to local area – Polluted Site – Study of Common Plants- Insects- Birds – Ecosystem –

Visit to Sanctuaries

TEXTBOOK

Richard T. Wright- “Environmental Science: Toward a Sustainable Future”- 9th Edition

Page 66: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

SEMESTER VI

Page 67: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC61 ETHICAL HACKING

Objectives

To introduce and elucidate on:

i. Concepts of Hacking

ii. Ethics of Hacking

iii. Defensive mechanisms of Hacking

Unit – I:

Introduction to Ethical Disclosure: Ethics of Ethical Hacking – Recognizing the Gray Areas

in Security – Vulnerability Assessments – Penetration Testing – Ethical Hacking and the

Legal System – The rise of Cyberlaw – Understanding Individual Cyberlaws – Proper and

Ethical Disclosure – Different Teams and Points of Views – CERT’s current process – Full

Disclosure Policy.

Unit – II:

Penetration Testing and Tools: Social engineering attacks – Conducting a Social engineering

attack – Common attacks used in penetration testing – Physical Penetration attacks –

Conducting a physical penetration – Defending against physical penetration – Insider attacks

– Conducting an insider attack – Defending against insider attacks.

Unit – III:

Exploiting: Basic Linux exploits – Stack operations – Buffer overflows – Local buffer

overflow exploits – Exploit Development Process – Windows exploits – Compiling and

debugging windows programs – writing windows exploits – Understanding SEH –

Understanding Windows memory protections – Bypassing Windows memory protections.

Unit – IV:

Vulnerability Analysis: Passive Analysis – Reverse Engineering – Instrumentation tools –

Fuzzing – Instrumented Fuzzing tools and techniques - Client-side browse exploits – Internet

explorer security – Finding new browser-based vulnerabilities – Heap spray to exploits –

Protecting from Client-side exploits.

Unit – V:

Malware Analysis: Collecting Malware and Initial Analysis – Malware – Honeynet

Technology – Catching Malware – Initial analysis of Malware – Hacking Malware – Trends

in Malware – de-obfuscating Malware – Reverse engineering Malware.

Text Book:

1. Allen Harper - Jonathan Ness - “Gray Hat Hacking: The Ethical Hacker’s

Handbook” - 3rd edition - Tata McGraw Hill - 2010.

References:

1. Manthan Desai - “Basics of Ethical Hacking: Hacking for Beginners” - Hacking

Tech - 2010.

Page 68: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

16NSC62 - CLOUD COMPUTING

Unit-1

1. Cloud Computing Basics

1.1. Cloud Computing Overview

1.2. Applications

1.3. Intranets and the Cloud

1.4. First Movers in the Cloud.

1.5. Organization and Cloud Computing:

1.6. Benefits -

1.7. Limitations

1.8. Security Concerns

1.9. Regulatory Issues

1.10. Cloud Computing with Titans:

1.11. Google - EMC

1.12. NetAPP - Microsoft

1.13. Amazon - Salesforce.com

1.14. IBM - Partnerships

Unit-2

2. The business case for going to the cloud:

2.1 Cloud Computing Services

2.2 business usages

2.3 Deleting your datacenter - salesforce.com. Thomson Reuters.

2.4 Cloud Computing technology:

2.5 Hardware and Infrastructure:

2.6 Clients - Security - Network - Services.

2.7 Accessing the Cloud:

2.8 Platforms - Web Applications -

2.9 Web API’s - Web Browsers.

Unit-3

3. Cloud Storage:

Page 69: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

3.1 Overview of cloud storage

3.2 Cloud Storage Service Providers.

3.3 Standards:

3.4 Application

3.5 Client

3.6 Infrastructure

3.7 Service.

3.8

Unit-4

4. Cloud computing at work:

4.1 Software as a service:

4.2 Overview -

4.3 Driving forces -

4.4 Company offerings - Industries -

4.5 Software plus services: Overview

4.6 mobile Device Integration

4.7 Providers - Microsoft Online.

4.8 Developing Applications: Google - Microsoft

4.9 Intuit Quick base

4.10 Cast Iron Cloud -

4.11 Bungee Connect - Development -

4.12 Troubleshooting - Application Management.

Unit-5

5. Local clouds and Thin Clients: Virtualization -

5.1 Server Solutions - Thin clients.

5.2 Migrating the cloud: Cloud Services for individuals

5.3 Cloud services at the Mid-market

5.4 Enterprise-class Cloud offerings

5.5 migration.

5.6 Future Of Cloud Computing:

Page 70: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

5.7 Analyzing Services -

5.8 Best Practices.

TEXT BOOK:

Cloud Computing - Author Name: Anthony T.Velte - Toby J Velte - Robert Elsenpeter -

Publisher: TMH Publications.

Page 71: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

BIOMETRICS

OBJECTIVE

The main AIM of this course are to:

1. understand Biometric Security Methods

2. acquire knowledge on various Biometric components

UNIT – I

Introduction: Benefits of Biometric Security – Verification and Identification – Basic

Working of Biometric Matching – Accuracy – False Match Rate – False Non-Match Rate –

Failure to Enroll Rate – Derived Metrics – Layered Biometric Solutions

UNIT – II

Finger Scan: Features – Components – Operation (Steps) – Competing Finger Scan

Technologies – Strength and Weakness. Types of Algorithms used for Interpretation

UNIT – III

Facial Scan: Features – Components – Operation (Steps) – Competing Facial Scan

Technologies – Strength and Weakness

UNIT – IV

Iris Scan: Features – Components – Operation (Steps) – Competing Iris Scan Technologies

– Strength and Weakness

UNIT – V

Voice Scan: Features – Components – Operation (Steps) – Competing Voice Scan (Facial)

Technologies – Strength and Weakness

Other Physiological Biometrics: Hand Scan – Retina Scan – AFIS (Automatic Finger Print

Identification Systems) – Signature Scan- Keystroke Scan

TEXT BOOKS:

1. Samir Nanavati- Michael Thieme- Raj Nanavati- “Biometrics – Identity Verification

in a Networked World”- Wiley DreamTech

REFERENCE BOOK

1. John D. Woodward Jr.- “Biometrics- The Ultimate Reference”- Wiley DreamTech

Page 72: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

DISTRIBUTED COMPUTER ARCHITECTURE

UNIT I: Hardware Architecture - Symmetric Multiprocessing, Distributed Shared Memory,

Multicomputer.

UNIT II: Software Architecture - Client server architecture, 3-tier architecture, N-tier

architecture, Peer-to-peer

UNIT III: Cluster computing, Grid computing.

UNIT IV: Semantic Web and Virtualization

UNIT V: Recent trends in processor technologies - Superscalar processors, Multi-core

processors, embedded processors.

Resources: 1. Research Papers

Page 73: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

NEURAL NETWORKS AIM

• To understand the pattern recognition process

• To learn about the structure of the basic neuron

• To explain about the neural networking algorithms

Unit 1:

Introduction: Humans and Computers, the Structure of the Brain, learning in Machines, the

differences.

Pattern Recognition:

Introduction, pattern recognition in perspective, pattern recognition-a definition, feature

vectors and feature space, discriminate functions, classification techniques

Unit II:

The basic Neuron: Introduction: Modeling the single neuron, learning in simple neuron,

the perception a vector perspective, the perception learning rule, proof,limitations of

perceptions.

The multiplayer Perception:

Introduction, altering the perception model, the new model the learning rule, the multiplayer

perception algorithm, the XOr problem reverted-applications.

Unit III

Kohenen Self-Organizing Networks: Introduction, the Kohenen algorithm, weight-training

Neighborhoodds, reducing the neighbourhoods, Learning vector quantization, the Phonetic

typewriter.

Unit IV

Hop field Networks: The hope field model, the energy landscape, the Bolt man machine,

constraint satisfaction

Unit V

Adaptive Resonance Memory: Adaptive resonance theory-architecture and operation, ART

algorithm, Training the ART network,classification,conclusion,Summary of ART

ASSOCIATIVE MEMORY: Hardware and Software implementation, Optical computing,

optical computing and neural networks.

REFERENCE BOOKS:

1. Neural Computing: An Introduction-R.Beale and T.Jackson,Adam Hilger,1990

2. Pao.Y.H, Adptive Pattern recognition and Neural Networks, Addison Wesley,1989.

Page 74: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

VALUE EDUCATION

OBJECTIVE

• To sensitize the student towards value formation.

• To deepen the understanding- motivate and take responsibility with regard to making

positive personal and social choices.

• To inspire individuals to choose their own personal- social- moral and spiritual values

and be aware of practical methods for developing and deepening them.

UNIT – I VALUES AND THE INDIVIDUAL

Values meaning – The Significance of Values – Classification of Values – need of Value

Education – Values and the individual: Self Discipline- Self Confidence- Self Initiative-

Empathy- Compassion- Forgiveness- honesty and Courage

UNIT – II VALUES AND RELIGION

Karmayoga in Hinduism – Love and Justice in Christianity – Brotherhood in Islam –

Compassion in Buddhism – Ahimsa in Jainism and Courage in Sikhism – Need for Religious

harmony

UNIT – III VALUES AND SOCIETY

Definition of Society – Democracy – Secularism – Socialism – Gender Justice – Human

Rights – Socio-Political Awareness – Social Integration – Social Justice

UNIT – IV PROFESSIONAL VALUES

Definition – Accountability – Willingness to learn – Team Spirit – Competence Development

– Honesty – Transparency – Respecting Others – Democratic Functioning – Integrity and

Commitment

UNIT – V ROLE OF SOCIAL INSTITUTIONS IN VALUE FORMAITON

Role of Family – Peer Group – Society – Educational Institutions – Role Models- and Mass

Media in value formation

REFERENCE

1. Subramanyam. K- Values in Education- Madurai- Ramana Publications- 1995

2. Joseph K.P- Peace and Value Education: A Creative Response to Consumerism and

Communalism- Hyderabad- National Institute of Peace and Value Education- 2003

Page 75: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

3. Bedi Kiran- What Went Wrong . . . and Continues- Delhi- UBS Publishers and

Distributors Pvt. Ltd.- 2005

4. Tagore Rabindranth- Personality- New Delhi- Macmillan India Ltd.

Page 76: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

RESOURCE MANAGEMENT TECHNIQUES

AIM

Introduce students to some of the techniques - methodologies and models used in Operations

Research (OR). Operations Research (or Management Science) is a field of Applied

Mathematics that uses mathematical methods and computers to make rational decisions in

solving a variety of optimization problems. Most OR techniques require the use of computer

software to solve large - complex problems in industry - business - science and technology

- management - decision support and other areas and disciplines. In this course

Deterministic Problems are considered – the data and future outcomes are known with

certainty.

UNIT – I

Operations Research: Introduction – Definition – Origin and Development of OR – Models

in OR and General Solution Methods for OR – Decision Making – Applications of OR

Models – Uses and Limitations of OR – Mathematical Formulation of LPP – Graphical

Solution of LPP

UNIT – II

Simplex Method: Definition – Computation procedure – Artificial Variable Techniques –

Big-M Method – Two Phase Method

UNIT – III

Assignment Problem: Mathematical Formulation of Assignment Problem – Assignment

Algorithm – Assignment Problem – Routing Problem – Traveling Salesman Problem

UNIT – IV

Transportation Problem: Mathematical Formulation of Transportation Problem – Finding

Initial Basic Feasible Solution – North West Corner Rule – Least Cost or Matrix Minima

Method – Vogel’s Approximation Method – Moving Towards Optimality – Degeneracy in

Transportation Problem – MODI Method – Unbalanced Transportation Problem

UNIT – V

Numerical Scheduling by PERT/CPM: Introduction – Network Scheduling by

PERT/CPM: Introduction – Network & Basic Components – Rules of Network Construction

– Critical Path Method –PERT Calculations –Advantages of Network (PERT/CPM)

TEXT BOOKS

1. Swarup Kanti - Gupta .S.P - Mohan Man - “Operations Research” - Sultan and

Chand & Sons - Delhi - 2008

2. Kapoor.V.K - “Operations Research” - Sultan and Chand & Sons - Delhi - 1995

REFERENCE BOOKS

Page 77: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

1. Sharma.S.D - “Operations Research” - Nath Kedar and Nath Ram & Co.Publication -

2001

Sharma.K - “Operations Research Theory and Applications” - Macmillan India Ltd - 1997

Page 78: Department of Computer Science & Information Technology · 3 3 40 60 100 III 16NSC21 Core – VI System Analysis and Design 3 5 40 60 100 16NSC22 Core – VII Data Analysis and Design-Oracle

PROJECT WORK

Course

Code

Course

Type Title of the Paper Duration Credits

Marks

Continuous

Internal

Assessment

End

Term Total

CAC6Q Project – I Project Work 3 Months 5 40 60 100