52
M.Sc.IT Page No.: 1 Master of Science in Information Technology (M.Sc-IT) Detailed Syllabi: MSc.IT - First Semester IS 2101 FUNDMENTALS OF IT AND PROGRAMMING (4 Credits) Questions to be set: Eight (Four from each unit) Questions to be answered: Any Five selecting at least Two from each unit UNIT I Introduction to computers: Computer Definitions, The evolution of computers, characteristics of computers, Organization of a Computer. Computer Generation & Classifications: Generation of Computer, Classification of Computers, Distributed Computer System, Parallel Computers. Computer Memory: Memory System, Memory Cells, Memory Arrays, Random Access Memory (RAM), Read Only Memory (ROM), External Memory (Secondary Memory), Floppy Disk Drives, Compact Disk Read Only Memory, Magnetic Storage Drives, Physical Devices Used to construct Memories. Introduction to computer software: Computer Software, Overview of operating systems, Overview of application software, Overview of proprietary software, Overview of open source technology. UNIT II Software Development, Design and Testing: Software Development, Analysis and Design, Coding, Software Testing, Software Paradigms, Programming Methods, Software Applications. Operating System concepts: Operating System Concepts, Functions of Operating System, Development of Operating System, Operating System Components, Operating System Services, Operating Systems for Different Computers. Communication system concepts: Basic elements of communication system, Data Communication, Network Types, OSI Reference Model, Transmission Control Protocol/Internet protocol Model, Internet.

PROGRAMME GUIDE FOR

Embed Size (px)

Citation preview

Page 1: PROGRAMME GUIDE FOR

MScIT Page No 1

Master of Science in Information Technology (MSc-IT)

Detailed Syllabi

MScIT - First Semester

IS 2101 FUNDMENTALS OF IT AND PROGRAMMING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computers Computer ndash Definitions The evolution of computers

characteristics of computers Organization of a Computer

Computer Generation amp Classifications Generation of Computer Classification of

Computers Distributed Computer System Parallel Computers

Computer Memory Memory System Memory Cells Memory Arrays Random Access

Memory (RAM) Read Only Memory (ROM) External Memory (Secondary Memory)

Floppy Disk Drives Compact Disk Read Only Memory Magnetic Storage Drives Physical

Devices Used to construct Memories

Introduction to computer software Computer Software Overview of operating systems

Overview of application software Overview of proprietary software Overview of open source

technology

UNIT II

Software Development Design and Testing Software Development Analysis and Design

Coding Software Testing Software Paradigms Programming Methods Software

Applications

Operating System concepts Operating System Concepts Functions of Operating System

Development of Operating System Operating System Components Operating System

Services Operating Systems for Different Computers

Communication system concepts Basic elements of communication system Data

Communication Network Types OSI Reference Model Transmission Control

ProtocolInternet protocol Model Internet

MScIT Page No 2

REFERENCES

1 Alex Leon amp Mathews Leon (2009) Fundamentals of Information Technology Leon Tech

world

2 Gupta Vikas (2004) Comdex Computer Ki Wiley Dreamtech Delhi

3 Sinha P K amp Sinha Priti (2004) Computer Fundamentals BPB Publications

4 Levine R John Levine Young Margaret Osborne (2001) Windows XP the complete

reference McGraw

5 Ram B (2000) Computer fundamentals architecture and organization New Age

International

6 Stallings William (2010) Data and Computer Communications 9th Edition

7 Raman V Raja (1998) Introduction to Computers PHI

8 Miller Michael (2007) Absolute Beginners Guide to Computer Basics Que Publishing

2007

9 Wells Dolores (2009)Computer Concepts Basics Course Technology

MScIT Page No 3

IS 2102 DATA AND FILE STRUCTURES (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Structures Basics Structure and Problem Solving Data Structures Data Structure

Operations Algorithm Complexity and Time- Space Tradeoff

Algorithm ndash Complexity Notations Mathematical Notation and Functions Algorithm

Notation Control Structures Complexity of Algorithm Rate of Growth- Asymptotic Notation

Linked List Linked List and its representation in memory Traversing a Linked List Searching

a Linked List Memory Allocation and Garbage Collection Insertion into Linked list Deletion

from a Linked list Types of Linked List

Stacks and Queues Stack Applications of Stack Queue

Trees and Binary Trees Tree Definition and Concepts 3 Binary Tree Definition and

Concepts Types of Binary Tree Traversal on Binary Tree Representation of Binary Tree

Binary Search Tree Conversion of General Tree to Binary Tree Sequential and Other

Representations of Binary Tree Concept of Binary Search Tree (BST) Operations on BST

Balanced Trees Definition and Structure of AVL Tree Operations on AVL Tree Definition

and Structure of B-Tree Operations on B-Tree Applications of B-Tree

UNIT II

Graphs Basic Concepts about Graphs Matrix Representation of Graphs List Structures

Other Representations of Graphs Algorithms for Graph Traversal Spanning Trees

Applications of Graphs Topological Sorting Weighted Shortest Path ndash Dijkstrarsquos Algorithm

Minimum Spanning Tree (MST) Introduction to NP-Completeness

Dynamic Storage Management Dynamic Storage Management Memory Management

First-fit Storage Allocation Storage Release Buddy Systems Garbage Collection

MScIT Page No 4

Searching and Sorting Techniques Sorting- Notations and concepts Bubble sort Merge

sort Selection sort Heap sort Searching- Sequential searching Binary searching

File Structures External Storage Devices Introduction to File Organization Sequential Files

Indexed Sequential Files Direct Files

External Sorting Techniques External Sorting- Run lists Tape sorting Sorting on Disks

Generating Extended Initial Runs

External Searching Techniques External Searching Introduction to Static Hashing

Dynamic Hashing Techniques

REFERENCES

1 Jean-Paul Tremblay Paul G Sorenson (1991) An Introduction to Data Structures with

Applications Adarsh printers The McGraw-Hill

2 Seymour Lipschutz (2006) Data Structures Pashupati printers Tata McGraw-Hill

3 Patel R B (2000)Expert Data Structures with C New Delhi Khanna Book Publishing co

4 D Samanta (2006) Classic Data Structures New Delhi Prentice Hall of India private Ltd

MScIT Page No 5

IS 2103 OBJECT ORIENTED PROGRAMMING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Java Introduction history of Java Features of Java Java Development Kit

(JDK) Security in Java

Java Basics Keywords Working of Java Including Comments Data Types in Java

Variables in Java Using Classes in Java Declaring Methods in Java Code to Display Test

Value The main() Method Invoking a Method in Java Saving Compiling and Executing Java

Programs

Operators and Control Statements Operators Control Flow Statements

Arrays and Strings Arrays String Handling Special String Operations Character Extraction

String Comparison Searching Strings String Modification StringBuffer

Inheritance Package and Interface Inheritance Packages Defining a Package

Understanding CLASSPATH Interface- Defining an Interface Some Uses of Interfaces

Interfaces versus Abstract Classes

Exception Handling Definition of an Exception Exception Classes Common Exceptions

Exception Handling Techniques

Streams in Java Streams Basics The Abstract Streams Stream Classes Readers and

Writers Random Access Files Serialization

UNIT II

Applets What are Applets The Applet Class The Applet and HTML Life Cycle of an Applet

The Graphics Class Painting the Applet User Interfaces for Applet Adding Components to

user interface AWT (Abstract Windowing Toolkit) Controls

Event Handling Components of an Event Event Classes Event Listener Event-Handling

Adapter Classes Inner Classes Anonymous Classes

MScIT Page No 6

Swing Concepts of Swing Java Foundation Class (JFC) Swing Packages and Classes

Working with Swing ndash An Example Swing Components

Java Data Base Connectivity Java Data Base Connectivity Database Management

Mechanism for connecting to a back end database Loading the ODBC driver

RMI CORBA and Java Beans Remote Method Invocation (RMI) Common Object Request

Broker Architecture (CORBA) Java Beans

Networking in Java Networking in Java URL Objects

Java Server Pages and Servlets Java Server Pages (JSP)- What is needed to write JSP

based web application How does JSP look How to test a JSP Servlets- History of Web

Application Web Architecture Servlet Life Cycle

REFERENCES

1 Cole Brain Eckstein Robert Elliott James Loy Marc Wood David Javatrade Swing 2nd

Edition

2 Dr Pantham Raj Sathya Pure JFC swing-A code intensive premium reference

3 Joe Weber(1998) Using Java 12 4th edition Que

4 Herbert Schildt The Complete Reference Java2 6th Edition McGraw Hill

5 Sierra kathy Bates Bert Head First Java 2nd Edition OrsquoReilly Media

6 Horstmann S Cay Cornell Gary Core Java 2- Vol I and Vol II Java series Sun

Microsystems Press Prentice-Hall

MScIT Page No 7

IS 2104 SOFTWARE ENGINEERING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Approaches Evolving Role of Software Software Characteristics

Software Applications

Software Design Processes Software Engineering Definitions of Software Engineering The

Serial or Linear Sequential Development Model Iterative Development Model The

incremental Development Model The Parallel or Concurrent Development Model Hacking

Software Reliability Introduction to Software Reliability Software reliability metrics

Programming for Reliability- Fault avoidance Fault tolerance Software Reuse

Software Design Principles Introduction to Software Design System Models-data -flow

model Semantic data models Object models Data Dictionaries Software Design- The design

process Design Methods Design description Design strategies Design quality Architectural

Design- System structuring Control models Modular decomposition Domain-specific

architectures

Object Oriented Design Introduction to Object Oriented Design Object Oriented Design-

Objects Object Classes amp Inheritance Object identification An object-oriented design

example Object aggregation Service Usage Object Interface Design- Design evolution

Function oriented design Data ndashflow design Structural Decomposition- Detailed design

UNIT II

Configuration Management Introduction to Configuration Management Change

Management Version and Release Management- Version identification Release

management Version management tools Software Maintenance- The maintenance process

System documentation Maintenance costs Maintainability measurement Software

Reengineering Software Refactoring

Software Testing Techniques Software Testing Fundamental Testing Principles White Box

Testing Control Structure Testing Black Box Testing Boundary Value Analysis Testing GUIs

Testing Documentation and Help Facilities

MScIT Page No 8

Software Testing Assurance Verification and Validation- Validation Testing Validation Test

Criteria Test Plan- Test Documentation Test Strategies- Top-Down Testing Bottom-Up

Testing Thread testing Stress testing Back-to-back testing Principles of Testing Testing

methods and tools- Testing through reviews Black-box testing (Functional testing) White box

testing (glass-box testing) Testing software changes Additional requirements in testing OO

Systems System Testing Acceptance Testing Regression testing Metrics Collection

Computation and Evaluation Test and QA plan Managing Testing Functions

Software Testing Strategies Introduction to Software Testing Strategies Organizing for

software testing Software Testing Strategy Unit Testing- Unit Test Considerations Top-down

Integration Bottom-up Integration

Case Study System Requirements Architectural Alternatives

REFERENCES

1 Pressman Roger Software Engineering McGraw Hill Fifth Edition

2 Jalote Pankaj An Integrated Approach To Software EngineeringNarosa

3 W S Jawadekar Software EngineeringTMH

4 Mall R Fundamentals of Software Engineering Prentice Hall of India

5 Behferooz amp Hudson F JSoftware Engineering Fundamentals Oxford University Press

6 Pfleeger S L Software Engineering Theory and Practice Pearson Education

7 Peter James Software Engineering An Engineering Approach John Wiley

8 Sommerville Ian Software Engineering Pearson Education

IS 2161 OBJECT-ORIENTED PROGRAMMING ndash PRACTICAL (CREDITS 15)

A sample list of exercises is given below The list is not exhaustive

Exercise 1ldquoHello Worldrdquo Program

Exercise 2 Arithmetic Operations

Exercise 3 Largest of lsquonrsquo Numbers

Exercise 4 Matrix Multiplication

Exercise 5 Reversing a Given String

Exercise 6 Using Recursion

Exercise 7 Implementation of Inheritance

Exercise 8 Exception Handling

Exercise 9 File Handling

Exercise 10 Applet Programming

MScIT Page No 9

MScIT - Second Semester

IS 2201 OPERATING SYSTEMS (4 CREDITS)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Operating System ndash An Introduction- Definition and functions of Operating System

Evolution of Operating Systems-Simple Batch Operating Systems Multi-programmed Batched

Operating Systems Time- Sharing operating Systems Personal Computer Operating

Systems Multi-processor Operating Systems Distributed Systems Real-Time Systems

Operating system structures-Layered approach The kernel based approach The virtual

machine approach

Operating System Architecture Operating System as an Extended Machine Layered

Approach Micro-Kernels UNIX Kernel Components ModulesIntroduction to Virtual

Machines Virtual Environment amp Machine AggregationImplementation Techniques

Process Management Process Process State Process Control Block Process Scheduling

Operation on processes Co-operating Processes Threads

CPU Scheduling Algorithms Basic Concepts of Scheduling CPU-IO Burst Cycle

CPU Scheduler Pre-emptive non pre-emptive scheduling Dispatcher Scheduling Criteria

Scheduling Algorithms First come First Served Scheduling Shortest-Job-First Scheduling

Priority Scheduling Round-Robin Scheduling Multilevel Queue Scheduling Multilevel

Feedback Queue Scheduling Multiple-Processor Scheduling Real-Time Scheduling

Evaluation of CPU Scheduling Algorithms-Deterministic Modelling Queuing Models

Simulations Implementation

Process Synchronization Inter process Communication Basic Structure Naming Direct

Communication Indirect Communication Buffering The Critical-section problem Two

Process Solution Multiple Process Solutions Semaphores Monitors Hardware Assistance

Deadlocks System Model Deadlock Characterization Deadlock Handling Deadlock

Prevention Deadlock Avoidance-Safe State Resource-Allocation Graph Algorithm Bankerrsquos

Algorithm Deadlock Detection-Single Instance of a Resource Multiple Instances of a

Resource Recovery from Deadlock

MScIT Page No 10

Memory Management Logical versus Physical Address Space Swapping Contiguous

Allocation-Single partition Allocation Multiple Partition Allocation Fragmentation Paging-

Concept of paging Page Table Implementation Segmentation-Concept of Segmentation

Segmentation Hardware External Fragmentation

UNIT II

Virtual Memory Need for Virtual Memory Technique Demand Paging Page Replacement

Page Replacement Algorithms-FIFO Page Replacement Algorithm Optimal Algorithm LRU

page Replacement Algorithm Thrashing-Causes for Thrashing Working Set Model Page

Fault Frequency

File System Interface and Implementation Concept of a File- Attributes of a File

Operations on Files Types of Files Structure of File File Access Methods-Sequential Access

Direct Access Indexed Sequential Access Directory Structure Single Level Directory Two

Level Directory Tree Structured Directories Allocation Methods- Contiguous allocation

Linked allocation Indexed allocation Performance comparison Free Space Management

Directory Implementation

Input-Output Architecture IO Structure IO Control Strategies-Program controlled IO

Interrupt-controlled IO Direct memory access The IO Address Space

Operating Systems in Distributed Processing Centralized and Distributed Processing

Network Operating System (NOS) Architecture Functions of NOS Global Operating System

(GOS) Remote Procedure Call (RPC) Distributed File Management

Security and Protection Attacks on Security Computer Worms Computer Virus Security

Design Principles Authentication Protection Mechanism Encryption Security in Distributed

Environment

Multiprocessor Systems Multiprocessors Multiprocessor Classification Multiprocessor

Interconnections Types of Multiprocessor Operating Systems (MOS) MOS Functions and

Requirements Operating System Design and Implementation Issues

Windows Operating Systems Introduction Windows NT Architecture Windows 2000

Architecture Common Functionality

REFERENCES

1 Silberschatz Abraham amp Baer Galvin Peter Operating System Concepts PHI

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 2: PROGRAMME GUIDE FOR

MScIT Page No 2

REFERENCES

1 Alex Leon amp Mathews Leon (2009) Fundamentals of Information Technology Leon Tech

world

2 Gupta Vikas (2004) Comdex Computer Ki Wiley Dreamtech Delhi

3 Sinha P K amp Sinha Priti (2004) Computer Fundamentals BPB Publications

4 Levine R John Levine Young Margaret Osborne (2001) Windows XP the complete

reference McGraw

5 Ram B (2000) Computer fundamentals architecture and organization New Age

International

6 Stallings William (2010) Data and Computer Communications 9th Edition

7 Raman V Raja (1998) Introduction to Computers PHI

8 Miller Michael (2007) Absolute Beginners Guide to Computer Basics Que Publishing

2007

9 Wells Dolores (2009)Computer Concepts Basics Course Technology

MScIT Page No 3

IS 2102 DATA AND FILE STRUCTURES (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Structures Basics Structure and Problem Solving Data Structures Data Structure

Operations Algorithm Complexity and Time- Space Tradeoff

Algorithm ndash Complexity Notations Mathematical Notation and Functions Algorithm

Notation Control Structures Complexity of Algorithm Rate of Growth- Asymptotic Notation

Linked List Linked List and its representation in memory Traversing a Linked List Searching

a Linked List Memory Allocation and Garbage Collection Insertion into Linked list Deletion

from a Linked list Types of Linked List

Stacks and Queues Stack Applications of Stack Queue

Trees and Binary Trees Tree Definition and Concepts 3 Binary Tree Definition and

Concepts Types of Binary Tree Traversal on Binary Tree Representation of Binary Tree

Binary Search Tree Conversion of General Tree to Binary Tree Sequential and Other

Representations of Binary Tree Concept of Binary Search Tree (BST) Operations on BST

Balanced Trees Definition and Structure of AVL Tree Operations on AVL Tree Definition

and Structure of B-Tree Operations on B-Tree Applications of B-Tree

UNIT II

Graphs Basic Concepts about Graphs Matrix Representation of Graphs List Structures

Other Representations of Graphs Algorithms for Graph Traversal Spanning Trees

Applications of Graphs Topological Sorting Weighted Shortest Path ndash Dijkstrarsquos Algorithm

Minimum Spanning Tree (MST) Introduction to NP-Completeness

Dynamic Storage Management Dynamic Storage Management Memory Management

First-fit Storage Allocation Storage Release Buddy Systems Garbage Collection

MScIT Page No 4

Searching and Sorting Techniques Sorting- Notations and concepts Bubble sort Merge

sort Selection sort Heap sort Searching- Sequential searching Binary searching

File Structures External Storage Devices Introduction to File Organization Sequential Files

Indexed Sequential Files Direct Files

External Sorting Techniques External Sorting- Run lists Tape sorting Sorting on Disks

Generating Extended Initial Runs

External Searching Techniques External Searching Introduction to Static Hashing

Dynamic Hashing Techniques

REFERENCES

1 Jean-Paul Tremblay Paul G Sorenson (1991) An Introduction to Data Structures with

Applications Adarsh printers The McGraw-Hill

2 Seymour Lipschutz (2006) Data Structures Pashupati printers Tata McGraw-Hill

3 Patel R B (2000)Expert Data Structures with C New Delhi Khanna Book Publishing co

4 D Samanta (2006) Classic Data Structures New Delhi Prentice Hall of India private Ltd

MScIT Page No 5

IS 2103 OBJECT ORIENTED PROGRAMMING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Java Introduction history of Java Features of Java Java Development Kit

(JDK) Security in Java

Java Basics Keywords Working of Java Including Comments Data Types in Java

Variables in Java Using Classes in Java Declaring Methods in Java Code to Display Test

Value The main() Method Invoking a Method in Java Saving Compiling and Executing Java

Programs

Operators and Control Statements Operators Control Flow Statements

Arrays and Strings Arrays String Handling Special String Operations Character Extraction

String Comparison Searching Strings String Modification StringBuffer

Inheritance Package and Interface Inheritance Packages Defining a Package

Understanding CLASSPATH Interface- Defining an Interface Some Uses of Interfaces

Interfaces versus Abstract Classes

Exception Handling Definition of an Exception Exception Classes Common Exceptions

Exception Handling Techniques

Streams in Java Streams Basics The Abstract Streams Stream Classes Readers and

Writers Random Access Files Serialization

UNIT II

Applets What are Applets The Applet Class The Applet and HTML Life Cycle of an Applet

The Graphics Class Painting the Applet User Interfaces for Applet Adding Components to

user interface AWT (Abstract Windowing Toolkit) Controls

Event Handling Components of an Event Event Classes Event Listener Event-Handling

Adapter Classes Inner Classes Anonymous Classes

MScIT Page No 6

Swing Concepts of Swing Java Foundation Class (JFC) Swing Packages and Classes

Working with Swing ndash An Example Swing Components

Java Data Base Connectivity Java Data Base Connectivity Database Management

Mechanism for connecting to a back end database Loading the ODBC driver

RMI CORBA and Java Beans Remote Method Invocation (RMI) Common Object Request

Broker Architecture (CORBA) Java Beans

Networking in Java Networking in Java URL Objects

Java Server Pages and Servlets Java Server Pages (JSP)- What is needed to write JSP

based web application How does JSP look How to test a JSP Servlets- History of Web

Application Web Architecture Servlet Life Cycle

REFERENCES

1 Cole Brain Eckstein Robert Elliott James Loy Marc Wood David Javatrade Swing 2nd

Edition

2 Dr Pantham Raj Sathya Pure JFC swing-A code intensive premium reference

3 Joe Weber(1998) Using Java 12 4th edition Que

4 Herbert Schildt The Complete Reference Java2 6th Edition McGraw Hill

5 Sierra kathy Bates Bert Head First Java 2nd Edition OrsquoReilly Media

6 Horstmann S Cay Cornell Gary Core Java 2- Vol I and Vol II Java series Sun

Microsystems Press Prentice-Hall

MScIT Page No 7

IS 2104 SOFTWARE ENGINEERING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Approaches Evolving Role of Software Software Characteristics

Software Applications

Software Design Processes Software Engineering Definitions of Software Engineering The

Serial or Linear Sequential Development Model Iterative Development Model The

incremental Development Model The Parallel or Concurrent Development Model Hacking

Software Reliability Introduction to Software Reliability Software reliability metrics

Programming for Reliability- Fault avoidance Fault tolerance Software Reuse

Software Design Principles Introduction to Software Design System Models-data -flow

model Semantic data models Object models Data Dictionaries Software Design- The design

process Design Methods Design description Design strategies Design quality Architectural

Design- System structuring Control models Modular decomposition Domain-specific

architectures

Object Oriented Design Introduction to Object Oriented Design Object Oriented Design-

Objects Object Classes amp Inheritance Object identification An object-oriented design

example Object aggregation Service Usage Object Interface Design- Design evolution

Function oriented design Data ndashflow design Structural Decomposition- Detailed design

UNIT II

Configuration Management Introduction to Configuration Management Change

Management Version and Release Management- Version identification Release

management Version management tools Software Maintenance- The maintenance process

System documentation Maintenance costs Maintainability measurement Software

Reengineering Software Refactoring

Software Testing Techniques Software Testing Fundamental Testing Principles White Box

Testing Control Structure Testing Black Box Testing Boundary Value Analysis Testing GUIs

Testing Documentation and Help Facilities

MScIT Page No 8

Software Testing Assurance Verification and Validation- Validation Testing Validation Test

Criteria Test Plan- Test Documentation Test Strategies- Top-Down Testing Bottom-Up

Testing Thread testing Stress testing Back-to-back testing Principles of Testing Testing

methods and tools- Testing through reviews Black-box testing (Functional testing) White box

testing (glass-box testing) Testing software changes Additional requirements in testing OO

Systems System Testing Acceptance Testing Regression testing Metrics Collection

Computation and Evaluation Test and QA plan Managing Testing Functions

Software Testing Strategies Introduction to Software Testing Strategies Organizing for

software testing Software Testing Strategy Unit Testing- Unit Test Considerations Top-down

Integration Bottom-up Integration

Case Study System Requirements Architectural Alternatives

REFERENCES

1 Pressman Roger Software Engineering McGraw Hill Fifth Edition

2 Jalote Pankaj An Integrated Approach To Software EngineeringNarosa

3 W S Jawadekar Software EngineeringTMH

4 Mall R Fundamentals of Software Engineering Prentice Hall of India

5 Behferooz amp Hudson F JSoftware Engineering Fundamentals Oxford University Press

6 Pfleeger S L Software Engineering Theory and Practice Pearson Education

7 Peter James Software Engineering An Engineering Approach John Wiley

8 Sommerville Ian Software Engineering Pearson Education

IS 2161 OBJECT-ORIENTED PROGRAMMING ndash PRACTICAL (CREDITS 15)

A sample list of exercises is given below The list is not exhaustive

Exercise 1ldquoHello Worldrdquo Program

Exercise 2 Arithmetic Operations

Exercise 3 Largest of lsquonrsquo Numbers

Exercise 4 Matrix Multiplication

Exercise 5 Reversing a Given String

Exercise 6 Using Recursion

Exercise 7 Implementation of Inheritance

Exercise 8 Exception Handling

Exercise 9 File Handling

Exercise 10 Applet Programming

MScIT Page No 9

MScIT - Second Semester

IS 2201 OPERATING SYSTEMS (4 CREDITS)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Operating System ndash An Introduction- Definition and functions of Operating System

Evolution of Operating Systems-Simple Batch Operating Systems Multi-programmed Batched

Operating Systems Time- Sharing operating Systems Personal Computer Operating

Systems Multi-processor Operating Systems Distributed Systems Real-Time Systems

Operating system structures-Layered approach The kernel based approach The virtual

machine approach

Operating System Architecture Operating System as an Extended Machine Layered

Approach Micro-Kernels UNIX Kernel Components ModulesIntroduction to Virtual

Machines Virtual Environment amp Machine AggregationImplementation Techniques

Process Management Process Process State Process Control Block Process Scheduling

Operation on processes Co-operating Processes Threads

CPU Scheduling Algorithms Basic Concepts of Scheduling CPU-IO Burst Cycle

CPU Scheduler Pre-emptive non pre-emptive scheduling Dispatcher Scheduling Criteria

Scheduling Algorithms First come First Served Scheduling Shortest-Job-First Scheduling

Priority Scheduling Round-Robin Scheduling Multilevel Queue Scheduling Multilevel

Feedback Queue Scheduling Multiple-Processor Scheduling Real-Time Scheduling

Evaluation of CPU Scheduling Algorithms-Deterministic Modelling Queuing Models

Simulations Implementation

Process Synchronization Inter process Communication Basic Structure Naming Direct

Communication Indirect Communication Buffering The Critical-section problem Two

Process Solution Multiple Process Solutions Semaphores Monitors Hardware Assistance

Deadlocks System Model Deadlock Characterization Deadlock Handling Deadlock

Prevention Deadlock Avoidance-Safe State Resource-Allocation Graph Algorithm Bankerrsquos

Algorithm Deadlock Detection-Single Instance of a Resource Multiple Instances of a

Resource Recovery from Deadlock

MScIT Page No 10

Memory Management Logical versus Physical Address Space Swapping Contiguous

Allocation-Single partition Allocation Multiple Partition Allocation Fragmentation Paging-

Concept of paging Page Table Implementation Segmentation-Concept of Segmentation

Segmentation Hardware External Fragmentation

UNIT II

Virtual Memory Need for Virtual Memory Technique Demand Paging Page Replacement

Page Replacement Algorithms-FIFO Page Replacement Algorithm Optimal Algorithm LRU

page Replacement Algorithm Thrashing-Causes for Thrashing Working Set Model Page

Fault Frequency

File System Interface and Implementation Concept of a File- Attributes of a File

Operations on Files Types of Files Structure of File File Access Methods-Sequential Access

Direct Access Indexed Sequential Access Directory Structure Single Level Directory Two

Level Directory Tree Structured Directories Allocation Methods- Contiguous allocation

Linked allocation Indexed allocation Performance comparison Free Space Management

Directory Implementation

Input-Output Architecture IO Structure IO Control Strategies-Program controlled IO

Interrupt-controlled IO Direct memory access The IO Address Space

Operating Systems in Distributed Processing Centralized and Distributed Processing

Network Operating System (NOS) Architecture Functions of NOS Global Operating System

(GOS) Remote Procedure Call (RPC) Distributed File Management

Security and Protection Attacks on Security Computer Worms Computer Virus Security

Design Principles Authentication Protection Mechanism Encryption Security in Distributed

Environment

Multiprocessor Systems Multiprocessors Multiprocessor Classification Multiprocessor

Interconnections Types of Multiprocessor Operating Systems (MOS) MOS Functions and

Requirements Operating System Design and Implementation Issues

Windows Operating Systems Introduction Windows NT Architecture Windows 2000

Architecture Common Functionality

REFERENCES

1 Silberschatz Abraham amp Baer Galvin Peter Operating System Concepts PHI

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 3: PROGRAMME GUIDE FOR

MScIT Page No 3

IS 2102 DATA AND FILE STRUCTURES (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Structures Basics Structure and Problem Solving Data Structures Data Structure

Operations Algorithm Complexity and Time- Space Tradeoff

Algorithm ndash Complexity Notations Mathematical Notation and Functions Algorithm

Notation Control Structures Complexity of Algorithm Rate of Growth- Asymptotic Notation

Linked List Linked List and its representation in memory Traversing a Linked List Searching

a Linked List Memory Allocation and Garbage Collection Insertion into Linked list Deletion

from a Linked list Types of Linked List

Stacks and Queues Stack Applications of Stack Queue

Trees and Binary Trees Tree Definition and Concepts 3 Binary Tree Definition and

Concepts Types of Binary Tree Traversal on Binary Tree Representation of Binary Tree

Binary Search Tree Conversion of General Tree to Binary Tree Sequential and Other

Representations of Binary Tree Concept of Binary Search Tree (BST) Operations on BST

Balanced Trees Definition and Structure of AVL Tree Operations on AVL Tree Definition

and Structure of B-Tree Operations on B-Tree Applications of B-Tree

UNIT II

Graphs Basic Concepts about Graphs Matrix Representation of Graphs List Structures

Other Representations of Graphs Algorithms for Graph Traversal Spanning Trees

Applications of Graphs Topological Sorting Weighted Shortest Path ndash Dijkstrarsquos Algorithm

Minimum Spanning Tree (MST) Introduction to NP-Completeness

Dynamic Storage Management Dynamic Storage Management Memory Management

First-fit Storage Allocation Storage Release Buddy Systems Garbage Collection

MScIT Page No 4

Searching and Sorting Techniques Sorting- Notations and concepts Bubble sort Merge

sort Selection sort Heap sort Searching- Sequential searching Binary searching

File Structures External Storage Devices Introduction to File Organization Sequential Files

Indexed Sequential Files Direct Files

External Sorting Techniques External Sorting- Run lists Tape sorting Sorting on Disks

Generating Extended Initial Runs

External Searching Techniques External Searching Introduction to Static Hashing

Dynamic Hashing Techniques

REFERENCES

1 Jean-Paul Tremblay Paul G Sorenson (1991) An Introduction to Data Structures with

Applications Adarsh printers The McGraw-Hill

2 Seymour Lipschutz (2006) Data Structures Pashupati printers Tata McGraw-Hill

3 Patel R B (2000)Expert Data Structures with C New Delhi Khanna Book Publishing co

4 D Samanta (2006) Classic Data Structures New Delhi Prentice Hall of India private Ltd

MScIT Page No 5

IS 2103 OBJECT ORIENTED PROGRAMMING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Java Introduction history of Java Features of Java Java Development Kit

(JDK) Security in Java

Java Basics Keywords Working of Java Including Comments Data Types in Java

Variables in Java Using Classes in Java Declaring Methods in Java Code to Display Test

Value The main() Method Invoking a Method in Java Saving Compiling and Executing Java

Programs

Operators and Control Statements Operators Control Flow Statements

Arrays and Strings Arrays String Handling Special String Operations Character Extraction

String Comparison Searching Strings String Modification StringBuffer

Inheritance Package and Interface Inheritance Packages Defining a Package

Understanding CLASSPATH Interface- Defining an Interface Some Uses of Interfaces

Interfaces versus Abstract Classes

Exception Handling Definition of an Exception Exception Classes Common Exceptions

Exception Handling Techniques

Streams in Java Streams Basics The Abstract Streams Stream Classes Readers and

Writers Random Access Files Serialization

UNIT II

Applets What are Applets The Applet Class The Applet and HTML Life Cycle of an Applet

The Graphics Class Painting the Applet User Interfaces for Applet Adding Components to

user interface AWT (Abstract Windowing Toolkit) Controls

Event Handling Components of an Event Event Classes Event Listener Event-Handling

Adapter Classes Inner Classes Anonymous Classes

MScIT Page No 6

Swing Concepts of Swing Java Foundation Class (JFC) Swing Packages and Classes

Working with Swing ndash An Example Swing Components

Java Data Base Connectivity Java Data Base Connectivity Database Management

Mechanism for connecting to a back end database Loading the ODBC driver

RMI CORBA and Java Beans Remote Method Invocation (RMI) Common Object Request

Broker Architecture (CORBA) Java Beans

Networking in Java Networking in Java URL Objects

Java Server Pages and Servlets Java Server Pages (JSP)- What is needed to write JSP

based web application How does JSP look How to test a JSP Servlets- History of Web

Application Web Architecture Servlet Life Cycle

REFERENCES

1 Cole Brain Eckstein Robert Elliott James Loy Marc Wood David Javatrade Swing 2nd

Edition

2 Dr Pantham Raj Sathya Pure JFC swing-A code intensive premium reference

3 Joe Weber(1998) Using Java 12 4th edition Que

4 Herbert Schildt The Complete Reference Java2 6th Edition McGraw Hill

5 Sierra kathy Bates Bert Head First Java 2nd Edition OrsquoReilly Media

6 Horstmann S Cay Cornell Gary Core Java 2- Vol I and Vol II Java series Sun

Microsystems Press Prentice-Hall

MScIT Page No 7

IS 2104 SOFTWARE ENGINEERING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Approaches Evolving Role of Software Software Characteristics

Software Applications

Software Design Processes Software Engineering Definitions of Software Engineering The

Serial or Linear Sequential Development Model Iterative Development Model The

incremental Development Model The Parallel or Concurrent Development Model Hacking

Software Reliability Introduction to Software Reliability Software reliability metrics

Programming for Reliability- Fault avoidance Fault tolerance Software Reuse

Software Design Principles Introduction to Software Design System Models-data -flow

model Semantic data models Object models Data Dictionaries Software Design- The design

process Design Methods Design description Design strategies Design quality Architectural

Design- System structuring Control models Modular decomposition Domain-specific

architectures

Object Oriented Design Introduction to Object Oriented Design Object Oriented Design-

Objects Object Classes amp Inheritance Object identification An object-oriented design

example Object aggregation Service Usage Object Interface Design- Design evolution

Function oriented design Data ndashflow design Structural Decomposition- Detailed design

UNIT II

Configuration Management Introduction to Configuration Management Change

Management Version and Release Management- Version identification Release

management Version management tools Software Maintenance- The maintenance process

System documentation Maintenance costs Maintainability measurement Software

Reengineering Software Refactoring

Software Testing Techniques Software Testing Fundamental Testing Principles White Box

Testing Control Structure Testing Black Box Testing Boundary Value Analysis Testing GUIs

Testing Documentation and Help Facilities

MScIT Page No 8

Software Testing Assurance Verification and Validation- Validation Testing Validation Test

Criteria Test Plan- Test Documentation Test Strategies- Top-Down Testing Bottom-Up

Testing Thread testing Stress testing Back-to-back testing Principles of Testing Testing

methods and tools- Testing through reviews Black-box testing (Functional testing) White box

testing (glass-box testing) Testing software changes Additional requirements in testing OO

Systems System Testing Acceptance Testing Regression testing Metrics Collection

Computation and Evaluation Test and QA plan Managing Testing Functions

Software Testing Strategies Introduction to Software Testing Strategies Organizing for

software testing Software Testing Strategy Unit Testing- Unit Test Considerations Top-down

Integration Bottom-up Integration

Case Study System Requirements Architectural Alternatives

REFERENCES

1 Pressman Roger Software Engineering McGraw Hill Fifth Edition

2 Jalote Pankaj An Integrated Approach To Software EngineeringNarosa

3 W S Jawadekar Software EngineeringTMH

4 Mall R Fundamentals of Software Engineering Prentice Hall of India

5 Behferooz amp Hudson F JSoftware Engineering Fundamentals Oxford University Press

6 Pfleeger S L Software Engineering Theory and Practice Pearson Education

7 Peter James Software Engineering An Engineering Approach John Wiley

8 Sommerville Ian Software Engineering Pearson Education

IS 2161 OBJECT-ORIENTED PROGRAMMING ndash PRACTICAL (CREDITS 15)

A sample list of exercises is given below The list is not exhaustive

Exercise 1ldquoHello Worldrdquo Program

Exercise 2 Arithmetic Operations

Exercise 3 Largest of lsquonrsquo Numbers

Exercise 4 Matrix Multiplication

Exercise 5 Reversing a Given String

Exercise 6 Using Recursion

Exercise 7 Implementation of Inheritance

Exercise 8 Exception Handling

Exercise 9 File Handling

Exercise 10 Applet Programming

MScIT Page No 9

MScIT - Second Semester

IS 2201 OPERATING SYSTEMS (4 CREDITS)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Operating System ndash An Introduction- Definition and functions of Operating System

Evolution of Operating Systems-Simple Batch Operating Systems Multi-programmed Batched

Operating Systems Time- Sharing operating Systems Personal Computer Operating

Systems Multi-processor Operating Systems Distributed Systems Real-Time Systems

Operating system structures-Layered approach The kernel based approach The virtual

machine approach

Operating System Architecture Operating System as an Extended Machine Layered

Approach Micro-Kernels UNIX Kernel Components ModulesIntroduction to Virtual

Machines Virtual Environment amp Machine AggregationImplementation Techniques

Process Management Process Process State Process Control Block Process Scheduling

Operation on processes Co-operating Processes Threads

CPU Scheduling Algorithms Basic Concepts of Scheduling CPU-IO Burst Cycle

CPU Scheduler Pre-emptive non pre-emptive scheduling Dispatcher Scheduling Criteria

Scheduling Algorithms First come First Served Scheduling Shortest-Job-First Scheduling

Priority Scheduling Round-Robin Scheduling Multilevel Queue Scheduling Multilevel

Feedback Queue Scheduling Multiple-Processor Scheduling Real-Time Scheduling

Evaluation of CPU Scheduling Algorithms-Deterministic Modelling Queuing Models

Simulations Implementation

Process Synchronization Inter process Communication Basic Structure Naming Direct

Communication Indirect Communication Buffering The Critical-section problem Two

Process Solution Multiple Process Solutions Semaphores Monitors Hardware Assistance

Deadlocks System Model Deadlock Characterization Deadlock Handling Deadlock

Prevention Deadlock Avoidance-Safe State Resource-Allocation Graph Algorithm Bankerrsquos

Algorithm Deadlock Detection-Single Instance of a Resource Multiple Instances of a

Resource Recovery from Deadlock

MScIT Page No 10

Memory Management Logical versus Physical Address Space Swapping Contiguous

Allocation-Single partition Allocation Multiple Partition Allocation Fragmentation Paging-

Concept of paging Page Table Implementation Segmentation-Concept of Segmentation

Segmentation Hardware External Fragmentation

UNIT II

Virtual Memory Need for Virtual Memory Technique Demand Paging Page Replacement

Page Replacement Algorithms-FIFO Page Replacement Algorithm Optimal Algorithm LRU

page Replacement Algorithm Thrashing-Causes for Thrashing Working Set Model Page

Fault Frequency

File System Interface and Implementation Concept of a File- Attributes of a File

Operations on Files Types of Files Structure of File File Access Methods-Sequential Access

Direct Access Indexed Sequential Access Directory Structure Single Level Directory Two

Level Directory Tree Structured Directories Allocation Methods- Contiguous allocation

Linked allocation Indexed allocation Performance comparison Free Space Management

Directory Implementation

Input-Output Architecture IO Structure IO Control Strategies-Program controlled IO

Interrupt-controlled IO Direct memory access The IO Address Space

Operating Systems in Distributed Processing Centralized and Distributed Processing

Network Operating System (NOS) Architecture Functions of NOS Global Operating System

(GOS) Remote Procedure Call (RPC) Distributed File Management

Security and Protection Attacks on Security Computer Worms Computer Virus Security

Design Principles Authentication Protection Mechanism Encryption Security in Distributed

Environment

Multiprocessor Systems Multiprocessors Multiprocessor Classification Multiprocessor

Interconnections Types of Multiprocessor Operating Systems (MOS) MOS Functions and

Requirements Operating System Design and Implementation Issues

Windows Operating Systems Introduction Windows NT Architecture Windows 2000

Architecture Common Functionality

REFERENCES

1 Silberschatz Abraham amp Baer Galvin Peter Operating System Concepts PHI

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 4: PROGRAMME GUIDE FOR

MScIT Page No 4

Searching and Sorting Techniques Sorting- Notations and concepts Bubble sort Merge

sort Selection sort Heap sort Searching- Sequential searching Binary searching

File Structures External Storage Devices Introduction to File Organization Sequential Files

Indexed Sequential Files Direct Files

External Sorting Techniques External Sorting- Run lists Tape sorting Sorting on Disks

Generating Extended Initial Runs

External Searching Techniques External Searching Introduction to Static Hashing

Dynamic Hashing Techniques

REFERENCES

1 Jean-Paul Tremblay Paul G Sorenson (1991) An Introduction to Data Structures with

Applications Adarsh printers The McGraw-Hill

2 Seymour Lipschutz (2006) Data Structures Pashupati printers Tata McGraw-Hill

3 Patel R B (2000)Expert Data Structures with C New Delhi Khanna Book Publishing co

4 D Samanta (2006) Classic Data Structures New Delhi Prentice Hall of India private Ltd

MScIT Page No 5

IS 2103 OBJECT ORIENTED PROGRAMMING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Java Introduction history of Java Features of Java Java Development Kit

(JDK) Security in Java

Java Basics Keywords Working of Java Including Comments Data Types in Java

Variables in Java Using Classes in Java Declaring Methods in Java Code to Display Test

Value The main() Method Invoking a Method in Java Saving Compiling and Executing Java

Programs

Operators and Control Statements Operators Control Flow Statements

Arrays and Strings Arrays String Handling Special String Operations Character Extraction

String Comparison Searching Strings String Modification StringBuffer

Inheritance Package and Interface Inheritance Packages Defining a Package

Understanding CLASSPATH Interface- Defining an Interface Some Uses of Interfaces

Interfaces versus Abstract Classes

Exception Handling Definition of an Exception Exception Classes Common Exceptions

Exception Handling Techniques

Streams in Java Streams Basics The Abstract Streams Stream Classes Readers and

Writers Random Access Files Serialization

UNIT II

Applets What are Applets The Applet Class The Applet and HTML Life Cycle of an Applet

The Graphics Class Painting the Applet User Interfaces for Applet Adding Components to

user interface AWT (Abstract Windowing Toolkit) Controls

Event Handling Components of an Event Event Classes Event Listener Event-Handling

Adapter Classes Inner Classes Anonymous Classes

MScIT Page No 6

Swing Concepts of Swing Java Foundation Class (JFC) Swing Packages and Classes

Working with Swing ndash An Example Swing Components

Java Data Base Connectivity Java Data Base Connectivity Database Management

Mechanism for connecting to a back end database Loading the ODBC driver

RMI CORBA and Java Beans Remote Method Invocation (RMI) Common Object Request

Broker Architecture (CORBA) Java Beans

Networking in Java Networking in Java URL Objects

Java Server Pages and Servlets Java Server Pages (JSP)- What is needed to write JSP

based web application How does JSP look How to test a JSP Servlets- History of Web

Application Web Architecture Servlet Life Cycle

REFERENCES

1 Cole Brain Eckstein Robert Elliott James Loy Marc Wood David Javatrade Swing 2nd

Edition

2 Dr Pantham Raj Sathya Pure JFC swing-A code intensive premium reference

3 Joe Weber(1998) Using Java 12 4th edition Que

4 Herbert Schildt The Complete Reference Java2 6th Edition McGraw Hill

5 Sierra kathy Bates Bert Head First Java 2nd Edition OrsquoReilly Media

6 Horstmann S Cay Cornell Gary Core Java 2- Vol I and Vol II Java series Sun

Microsystems Press Prentice-Hall

MScIT Page No 7

IS 2104 SOFTWARE ENGINEERING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Approaches Evolving Role of Software Software Characteristics

Software Applications

Software Design Processes Software Engineering Definitions of Software Engineering The

Serial or Linear Sequential Development Model Iterative Development Model The

incremental Development Model The Parallel or Concurrent Development Model Hacking

Software Reliability Introduction to Software Reliability Software reliability metrics

Programming for Reliability- Fault avoidance Fault tolerance Software Reuse

Software Design Principles Introduction to Software Design System Models-data -flow

model Semantic data models Object models Data Dictionaries Software Design- The design

process Design Methods Design description Design strategies Design quality Architectural

Design- System structuring Control models Modular decomposition Domain-specific

architectures

Object Oriented Design Introduction to Object Oriented Design Object Oriented Design-

Objects Object Classes amp Inheritance Object identification An object-oriented design

example Object aggregation Service Usage Object Interface Design- Design evolution

Function oriented design Data ndashflow design Structural Decomposition- Detailed design

UNIT II

Configuration Management Introduction to Configuration Management Change

Management Version and Release Management- Version identification Release

management Version management tools Software Maintenance- The maintenance process

System documentation Maintenance costs Maintainability measurement Software

Reengineering Software Refactoring

Software Testing Techniques Software Testing Fundamental Testing Principles White Box

Testing Control Structure Testing Black Box Testing Boundary Value Analysis Testing GUIs

Testing Documentation and Help Facilities

MScIT Page No 8

Software Testing Assurance Verification and Validation- Validation Testing Validation Test

Criteria Test Plan- Test Documentation Test Strategies- Top-Down Testing Bottom-Up

Testing Thread testing Stress testing Back-to-back testing Principles of Testing Testing

methods and tools- Testing through reviews Black-box testing (Functional testing) White box

testing (glass-box testing) Testing software changes Additional requirements in testing OO

Systems System Testing Acceptance Testing Regression testing Metrics Collection

Computation and Evaluation Test and QA plan Managing Testing Functions

Software Testing Strategies Introduction to Software Testing Strategies Organizing for

software testing Software Testing Strategy Unit Testing- Unit Test Considerations Top-down

Integration Bottom-up Integration

Case Study System Requirements Architectural Alternatives

REFERENCES

1 Pressman Roger Software Engineering McGraw Hill Fifth Edition

2 Jalote Pankaj An Integrated Approach To Software EngineeringNarosa

3 W S Jawadekar Software EngineeringTMH

4 Mall R Fundamentals of Software Engineering Prentice Hall of India

5 Behferooz amp Hudson F JSoftware Engineering Fundamentals Oxford University Press

6 Pfleeger S L Software Engineering Theory and Practice Pearson Education

7 Peter James Software Engineering An Engineering Approach John Wiley

8 Sommerville Ian Software Engineering Pearson Education

IS 2161 OBJECT-ORIENTED PROGRAMMING ndash PRACTICAL (CREDITS 15)

A sample list of exercises is given below The list is not exhaustive

Exercise 1ldquoHello Worldrdquo Program

Exercise 2 Arithmetic Operations

Exercise 3 Largest of lsquonrsquo Numbers

Exercise 4 Matrix Multiplication

Exercise 5 Reversing a Given String

Exercise 6 Using Recursion

Exercise 7 Implementation of Inheritance

Exercise 8 Exception Handling

Exercise 9 File Handling

Exercise 10 Applet Programming

MScIT Page No 9

MScIT - Second Semester

IS 2201 OPERATING SYSTEMS (4 CREDITS)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Operating System ndash An Introduction- Definition and functions of Operating System

Evolution of Operating Systems-Simple Batch Operating Systems Multi-programmed Batched

Operating Systems Time- Sharing operating Systems Personal Computer Operating

Systems Multi-processor Operating Systems Distributed Systems Real-Time Systems

Operating system structures-Layered approach The kernel based approach The virtual

machine approach

Operating System Architecture Operating System as an Extended Machine Layered

Approach Micro-Kernels UNIX Kernel Components ModulesIntroduction to Virtual

Machines Virtual Environment amp Machine AggregationImplementation Techniques

Process Management Process Process State Process Control Block Process Scheduling

Operation on processes Co-operating Processes Threads

CPU Scheduling Algorithms Basic Concepts of Scheduling CPU-IO Burst Cycle

CPU Scheduler Pre-emptive non pre-emptive scheduling Dispatcher Scheduling Criteria

Scheduling Algorithms First come First Served Scheduling Shortest-Job-First Scheduling

Priority Scheduling Round-Robin Scheduling Multilevel Queue Scheduling Multilevel

Feedback Queue Scheduling Multiple-Processor Scheduling Real-Time Scheduling

Evaluation of CPU Scheduling Algorithms-Deterministic Modelling Queuing Models

Simulations Implementation

Process Synchronization Inter process Communication Basic Structure Naming Direct

Communication Indirect Communication Buffering The Critical-section problem Two

Process Solution Multiple Process Solutions Semaphores Monitors Hardware Assistance

Deadlocks System Model Deadlock Characterization Deadlock Handling Deadlock

Prevention Deadlock Avoidance-Safe State Resource-Allocation Graph Algorithm Bankerrsquos

Algorithm Deadlock Detection-Single Instance of a Resource Multiple Instances of a

Resource Recovery from Deadlock

MScIT Page No 10

Memory Management Logical versus Physical Address Space Swapping Contiguous

Allocation-Single partition Allocation Multiple Partition Allocation Fragmentation Paging-

Concept of paging Page Table Implementation Segmentation-Concept of Segmentation

Segmentation Hardware External Fragmentation

UNIT II

Virtual Memory Need for Virtual Memory Technique Demand Paging Page Replacement

Page Replacement Algorithms-FIFO Page Replacement Algorithm Optimal Algorithm LRU

page Replacement Algorithm Thrashing-Causes for Thrashing Working Set Model Page

Fault Frequency

File System Interface and Implementation Concept of a File- Attributes of a File

Operations on Files Types of Files Structure of File File Access Methods-Sequential Access

Direct Access Indexed Sequential Access Directory Structure Single Level Directory Two

Level Directory Tree Structured Directories Allocation Methods- Contiguous allocation

Linked allocation Indexed allocation Performance comparison Free Space Management

Directory Implementation

Input-Output Architecture IO Structure IO Control Strategies-Program controlled IO

Interrupt-controlled IO Direct memory access The IO Address Space

Operating Systems in Distributed Processing Centralized and Distributed Processing

Network Operating System (NOS) Architecture Functions of NOS Global Operating System

(GOS) Remote Procedure Call (RPC) Distributed File Management

Security and Protection Attacks on Security Computer Worms Computer Virus Security

Design Principles Authentication Protection Mechanism Encryption Security in Distributed

Environment

Multiprocessor Systems Multiprocessors Multiprocessor Classification Multiprocessor

Interconnections Types of Multiprocessor Operating Systems (MOS) MOS Functions and

Requirements Operating System Design and Implementation Issues

Windows Operating Systems Introduction Windows NT Architecture Windows 2000

Architecture Common Functionality

REFERENCES

1 Silberschatz Abraham amp Baer Galvin Peter Operating System Concepts PHI

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 5: PROGRAMME GUIDE FOR

MScIT Page No 5

IS 2103 OBJECT ORIENTED PROGRAMMING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Java Introduction history of Java Features of Java Java Development Kit

(JDK) Security in Java

Java Basics Keywords Working of Java Including Comments Data Types in Java

Variables in Java Using Classes in Java Declaring Methods in Java Code to Display Test

Value The main() Method Invoking a Method in Java Saving Compiling and Executing Java

Programs

Operators and Control Statements Operators Control Flow Statements

Arrays and Strings Arrays String Handling Special String Operations Character Extraction

String Comparison Searching Strings String Modification StringBuffer

Inheritance Package and Interface Inheritance Packages Defining a Package

Understanding CLASSPATH Interface- Defining an Interface Some Uses of Interfaces

Interfaces versus Abstract Classes

Exception Handling Definition of an Exception Exception Classes Common Exceptions

Exception Handling Techniques

Streams in Java Streams Basics The Abstract Streams Stream Classes Readers and

Writers Random Access Files Serialization

UNIT II

Applets What are Applets The Applet Class The Applet and HTML Life Cycle of an Applet

The Graphics Class Painting the Applet User Interfaces for Applet Adding Components to

user interface AWT (Abstract Windowing Toolkit) Controls

Event Handling Components of an Event Event Classes Event Listener Event-Handling

Adapter Classes Inner Classes Anonymous Classes

MScIT Page No 6

Swing Concepts of Swing Java Foundation Class (JFC) Swing Packages and Classes

Working with Swing ndash An Example Swing Components

Java Data Base Connectivity Java Data Base Connectivity Database Management

Mechanism for connecting to a back end database Loading the ODBC driver

RMI CORBA and Java Beans Remote Method Invocation (RMI) Common Object Request

Broker Architecture (CORBA) Java Beans

Networking in Java Networking in Java URL Objects

Java Server Pages and Servlets Java Server Pages (JSP)- What is needed to write JSP

based web application How does JSP look How to test a JSP Servlets- History of Web

Application Web Architecture Servlet Life Cycle

REFERENCES

1 Cole Brain Eckstein Robert Elliott James Loy Marc Wood David Javatrade Swing 2nd

Edition

2 Dr Pantham Raj Sathya Pure JFC swing-A code intensive premium reference

3 Joe Weber(1998) Using Java 12 4th edition Que

4 Herbert Schildt The Complete Reference Java2 6th Edition McGraw Hill

5 Sierra kathy Bates Bert Head First Java 2nd Edition OrsquoReilly Media

6 Horstmann S Cay Cornell Gary Core Java 2- Vol I and Vol II Java series Sun

Microsystems Press Prentice-Hall

MScIT Page No 7

IS 2104 SOFTWARE ENGINEERING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Approaches Evolving Role of Software Software Characteristics

Software Applications

Software Design Processes Software Engineering Definitions of Software Engineering The

Serial or Linear Sequential Development Model Iterative Development Model The

incremental Development Model The Parallel or Concurrent Development Model Hacking

Software Reliability Introduction to Software Reliability Software reliability metrics

Programming for Reliability- Fault avoidance Fault tolerance Software Reuse

Software Design Principles Introduction to Software Design System Models-data -flow

model Semantic data models Object models Data Dictionaries Software Design- The design

process Design Methods Design description Design strategies Design quality Architectural

Design- System structuring Control models Modular decomposition Domain-specific

architectures

Object Oriented Design Introduction to Object Oriented Design Object Oriented Design-

Objects Object Classes amp Inheritance Object identification An object-oriented design

example Object aggregation Service Usage Object Interface Design- Design evolution

Function oriented design Data ndashflow design Structural Decomposition- Detailed design

UNIT II

Configuration Management Introduction to Configuration Management Change

Management Version and Release Management- Version identification Release

management Version management tools Software Maintenance- The maintenance process

System documentation Maintenance costs Maintainability measurement Software

Reengineering Software Refactoring

Software Testing Techniques Software Testing Fundamental Testing Principles White Box

Testing Control Structure Testing Black Box Testing Boundary Value Analysis Testing GUIs

Testing Documentation and Help Facilities

MScIT Page No 8

Software Testing Assurance Verification and Validation- Validation Testing Validation Test

Criteria Test Plan- Test Documentation Test Strategies- Top-Down Testing Bottom-Up

Testing Thread testing Stress testing Back-to-back testing Principles of Testing Testing

methods and tools- Testing through reviews Black-box testing (Functional testing) White box

testing (glass-box testing) Testing software changes Additional requirements in testing OO

Systems System Testing Acceptance Testing Regression testing Metrics Collection

Computation and Evaluation Test and QA plan Managing Testing Functions

Software Testing Strategies Introduction to Software Testing Strategies Organizing for

software testing Software Testing Strategy Unit Testing- Unit Test Considerations Top-down

Integration Bottom-up Integration

Case Study System Requirements Architectural Alternatives

REFERENCES

1 Pressman Roger Software Engineering McGraw Hill Fifth Edition

2 Jalote Pankaj An Integrated Approach To Software EngineeringNarosa

3 W S Jawadekar Software EngineeringTMH

4 Mall R Fundamentals of Software Engineering Prentice Hall of India

5 Behferooz amp Hudson F JSoftware Engineering Fundamentals Oxford University Press

6 Pfleeger S L Software Engineering Theory and Practice Pearson Education

7 Peter James Software Engineering An Engineering Approach John Wiley

8 Sommerville Ian Software Engineering Pearson Education

IS 2161 OBJECT-ORIENTED PROGRAMMING ndash PRACTICAL (CREDITS 15)

A sample list of exercises is given below The list is not exhaustive

Exercise 1ldquoHello Worldrdquo Program

Exercise 2 Arithmetic Operations

Exercise 3 Largest of lsquonrsquo Numbers

Exercise 4 Matrix Multiplication

Exercise 5 Reversing a Given String

Exercise 6 Using Recursion

Exercise 7 Implementation of Inheritance

Exercise 8 Exception Handling

Exercise 9 File Handling

Exercise 10 Applet Programming

MScIT Page No 9

MScIT - Second Semester

IS 2201 OPERATING SYSTEMS (4 CREDITS)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Operating System ndash An Introduction- Definition and functions of Operating System

Evolution of Operating Systems-Simple Batch Operating Systems Multi-programmed Batched

Operating Systems Time- Sharing operating Systems Personal Computer Operating

Systems Multi-processor Operating Systems Distributed Systems Real-Time Systems

Operating system structures-Layered approach The kernel based approach The virtual

machine approach

Operating System Architecture Operating System as an Extended Machine Layered

Approach Micro-Kernels UNIX Kernel Components ModulesIntroduction to Virtual

Machines Virtual Environment amp Machine AggregationImplementation Techniques

Process Management Process Process State Process Control Block Process Scheduling

Operation on processes Co-operating Processes Threads

CPU Scheduling Algorithms Basic Concepts of Scheduling CPU-IO Burst Cycle

CPU Scheduler Pre-emptive non pre-emptive scheduling Dispatcher Scheduling Criteria

Scheduling Algorithms First come First Served Scheduling Shortest-Job-First Scheduling

Priority Scheduling Round-Robin Scheduling Multilevel Queue Scheduling Multilevel

Feedback Queue Scheduling Multiple-Processor Scheduling Real-Time Scheduling

Evaluation of CPU Scheduling Algorithms-Deterministic Modelling Queuing Models

Simulations Implementation

Process Synchronization Inter process Communication Basic Structure Naming Direct

Communication Indirect Communication Buffering The Critical-section problem Two

Process Solution Multiple Process Solutions Semaphores Monitors Hardware Assistance

Deadlocks System Model Deadlock Characterization Deadlock Handling Deadlock

Prevention Deadlock Avoidance-Safe State Resource-Allocation Graph Algorithm Bankerrsquos

Algorithm Deadlock Detection-Single Instance of a Resource Multiple Instances of a

Resource Recovery from Deadlock

MScIT Page No 10

Memory Management Logical versus Physical Address Space Swapping Contiguous

Allocation-Single partition Allocation Multiple Partition Allocation Fragmentation Paging-

Concept of paging Page Table Implementation Segmentation-Concept of Segmentation

Segmentation Hardware External Fragmentation

UNIT II

Virtual Memory Need for Virtual Memory Technique Demand Paging Page Replacement

Page Replacement Algorithms-FIFO Page Replacement Algorithm Optimal Algorithm LRU

page Replacement Algorithm Thrashing-Causes for Thrashing Working Set Model Page

Fault Frequency

File System Interface and Implementation Concept of a File- Attributes of a File

Operations on Files Types of Files Structure of File File Access Methods-Sequential Access

Direct Access Indexed Sequential Access Directory Structure Single Level Directory Two

Level Directory Tree Structured Directories Allocation Methods- Contiguous allocation

Linked allocation Indexed allocation Performance comparison Free Space Management

Directory Implementation

Input-Output Architecture IO Structure IO Control Strategies-Program controlled IO

Interrupt-controlled IO Direct memory access The IO Address Space

Operating Systems in Distributed Processing Centralized and Distributed Processing

Network Operating System (NOS) Architecture Functions of NOS Global Operating System

(GOS) Remote Procedure Call (RPC) Distributed File Management

Security and Protection Attacks on Security Computer Worms Computer Virus Security

Design Principles Authentication Protection Mechanism Encryption Security in Distributed

Environment

Multiprocessor Systems Multiprocessors Multiprocessor Classification Multiprocessor

Interconnections Types of Multiprocessor Operating Systems (MOS) MOS Functions and

Requirements Operating System Design and Implementation Issues

Windows Operating Systems Introduction Windows NT Architecture Windows 2000

Architecture Common Functionality

REFERENCES

1 Silberschatz Abraham amp Baer Galvin Peter Operating System Concepts PHI

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 6: PROGRAMME GUIDE FOR

MScIT Page No 6

Swing Concepts of Swing Java Foundation Class (JFC) Swing Packages and Classes

Working with Swing ndash An Example Swing Components

Java Data Base Connectivity Java Data Base Connectivity Database Management

Mechanism for connecting to a back end database Loading the ODBC driver

RMI CORBA and Java Beans Remote Method Invocation (RMI) Common Object Request

Broker Architecture (CORBA) Java Beans

Networking in Java Networking in Java URL Objects

Java Server Pages and Servlets Java Server Pages (JSP)- What is needed to write JSP

based web application How does JSP look How to test a JSP Servlets- History of Web

Application Web Architecture Servlet Life Cycle

REFERENCES

1 Cole Brain Eckstein Robert Elliott James Loy Marc Wood David Javatrade Swing 2nd

Edition

2 Dr Pantham Raj Sathya Pure JFC swing-A code intensive premium reference

3 Joe Weber(1998) Using Java 12 4th edition Que

4 Herbert Schildt The Complete Reference Java2 6th Edition McGraw Hill

5 Sierra kathy Bates Bert Head First Java 2nd Edition OrsquoReilly Media

6 Horstmann S Cay Cornell Gary Core Java 2- Vol I and Vol II Java series Sun

Microsystems Press Prentice-Hall

MScIT Page No 7

IS 2104 SOFTWARE ENGINEERING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Approaches Evolving Role of Software Software Characteristics

Software Applications

Software Design Processes Software Engineering Definitions of Software Engineering The

Serial or Linear Sequential Development Model Iterative Development Model The

incremental Development Model The Parallel or Concurrent Development Model Hacking

Software Reliability Introduction to Software Reliability Software reliability metrics

Programming for Reliability- Fault avoidance Fault tolerance Software Reuse

Software Design Principles Introduction to Software Design System Models-data -flow

model Semantic data models Object models Data Dictionaries Software Design- The design

process Design Methods Design description Design strategies Design quality Architectural

Design- System structuring Control models Modular decomposition Domain-specific

architectures

Object Oriented Design Introduction to Object Oriented Design Object Oriented Design-

Objects Object Classes amp Inheritance Object identification An object-oriented design

example Object aggregation Service Usage Object Interface Design- Design evolution

Function oriented design Data ndashflow design Structural Decomposition- Detailed design

UNIT II

Configuration Management Introduction to Configuration Management Change

Management Version and Release Management- Version identification Release

management Version management tools Software Maintenance- The maintenance process

System documentation Maintenance costs Maintainability measurement Software

Reengineering Software Refactoring

Software Testing Techniques Software Testing Fundamental Testing Principles White Box

Testing Control Structure Testing Black Box Testing Boundary Value Analysis Testing GUIs

Testing Documentation and Help Facilities

MScIT Page No 8

Software Testing Assurance Verification and Validation- Validation Testing Validation Test

Criteria Test Plan- Test Documentation Test Strategies- Top-Down Testing Bottom-Up

Testing Thread testing Stress testing Back-to-back testing Principles of Testing Testing

methods and tools- Testing through reviews Black-box testing (Functional testing) White box

testing (glass-box testing) Testing software changes Additional requirements in testing OO

Systems System Testing Acceptance Testing Regression testing Metrics Collection

Computation and Evaluation Test and QA plan Managing Testing Functions

Software Testing Strategies Introduction to Software Testing Strategies Organizing for

software testing Software Testing Strategy Unit Testing- Unit Test Considerations Top-down

Integration Bottom-up Integration

Case Study System Requirements Architectural Alternatives

REFERENCES

1 Pressman Roger Software Engineering McGraw Hill Fifth Edition

2 Jalote Pankaj An Integrated Approach To Software EngineeringNarosa

3 W S Jawadekar Software EngineeringTMH

4 Mall R Fundamentals of Software Engineering Prentice Hall of India

5 Behferooz amp Hudson F JSoftware Engineering Fundamentals Oxford University Press

6 Pfleeger S L Software Engineering Theory and Practice Pearson Education

7 Peter James Software Engineering An Engineering Approach John Wiley

8 Sommerville Ian Software Engineering Pearson Education

IS 2161 OBJECT-ORIENTED PROGRAMMING ndash PRACTICAL (CREDITS 15)

A sample list of exercises is given below The list is not exhaustive

Exercise 1ldquoHello Worldrdquo Program

Exercise 2 Arithmetic Operations

Exercise 3 Largest of lsquonrsquo Numbers

Exercise 4 Matrix Multiplication

Exercise 5 Reversing a Given String

Exercise 6 Using Recursion

Exercise 7 Implementation of Inheritance

Exercise 8 Exception Handling

Exercise 9 File Handling

Exercise 10 Applet Programming

MScIT Page No 9

MScIT - Second Semester

IS 2201 OPERATING SYSTEMS (4 CREDITS)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Operating System ndash An Introduction- Definition and functions of Operating System

Evolution of Operating Systems-Simple Batch Operating Systems Multi-programmed Batched

Operating Systems Time- Sharing operating Systems Personal Computer Operating

Systems Multi-processor Operating Systems Distributed Systems Real-Time Systems

Operating system structures-Layered approach The kernel based approach The virtual

machine approach

Operating System Architecture Operating System as an Extended Machine Layered

Approach Micro-Kernels UNIX Kernel Components ModulesIntroduction to Virtual

Machines Virtual Environment amp Machine AggregationImplementation Techniques

Process Management Process Process State Process Control Block Process Scheduling

Operation on processes Co-operating Processes Threads

CPU Scheduling Algorithms Basic Concepts of Scheduling CPU-IO Burst Cycle

CPU Scheduler Pre-emptive non pre-emptive scheduling Dispatcher Scheduling Criteria

Scheduling Algorithms First come First Served Scheduling Shortest-Job-First Scheduling

Priority Scheduling Round-Robin Scheduling Multilevel Queue Scheduling Multilevel

Feedback Queue Scheduling Multiple-Processor Scheduling Real-Time Scheduling

Evaluation of CPU Scheduling Algorithms-Deterministic Modelling Queuing Models

Simulations Implementation

Process Synchronization Inter process Communication Basic Structure Naming Direct

Communication Indirect Communication Buffering The Critical-section problem Two

Process Solution Multiple Process Solutions Semaphores Monitors Hardware Assistance

Deadlocks System Model Deadlock Characterization Deadlock Handling Deadlock

Prevention Deadlock Avoidance-Safe State Resource-Allocation Graph Algorithm Bankerrsquos

Algorithm Deadlock Detection-Single Instance of a Resource Multiple Instances of a

Resource Recovery from Deadlock

MScIT Page No 10

Memory Management Logical versus Physical Address Space Swapping Contiguous

Allocation-Single partition Allocation Multiple Partition Allocation Fragmentation Paging-

Concept of paging Page Table Implementation Segmentation-Concept of Segmentation

Segmentation Hardware External Fragmentation

UNIT II

Virtual Memory Need for Virtual Memory Technique Demand Paging Page Replacement

Page Replacement Algorithms-FIFO Page Replacement Algorithm Optimal Algorithm LRU

page Replacement Algorithm Thrashing-Causes for Thrashing Working Set Model Page

Fault Frequency

File System Interface and Implementation Concept of a File- Attributes of a File

Operations on Files Types of Files Structure of File File Access Methods-Sequential Access

Direct Access Indexed Sequential Access Directory Structure Single Level Directory Two

Level Directory Tree Structured Directories Allocation Methods- Contiguous allocation

Linked allocation Indexed allocation Performance comparison Free Space Management

Directory Implementation

Input-Output Architecture IO Structure IO Control Strategies-Program controlled IO

Interrupt-controlled IO Direct memory access The IO Address Space

Operating Systems in Distributed Processing Centralized and Distributed Processing

Network Operating System (NOS) Architecture Functions of NOS Global Operating System

(GOS) Remote Procedure Call (RPC) Distributed File Management

Security and Protection Attacks on Security Computer Worms Computer Virus Security

Design Principles Authentication Protection Mechanism Encryption Security in Distributed

Environment

Multiprocessor Systems Multiprocessors Multiprocessor Classification Multiprocessor

Interconnections Types of Multiprocessor Operating Systems (MOS) MOS Functions and

Requirements Operating System Design and Implementation Issues

Windows Operating Systems Introduction Windows NT Architecture Windows 2000

Architecture Common Functionality

REFERENCES

1 Silberschatz Abraham amp Baer Galvin Peter Operating System Concepts PHI

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 7: PROGRAMME GUIDE FOR

MScIT Page No 7

IS 2104 SOFTWARE ENGINEERING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Approaches Evolving Role of Software Software Characteristics

Software Applications

Software Design Processes Software Engineering Definitions of Software Engineering The

Serial or Linear Sequential Development Model Iterative Development Model The

incremental Development Model The Parallel or Concurrent Development Model Hacking

Software Reliability Introduction to Software Reliability Software reliability metrics

Programming for Reliability- Fault avoidance Fault tolerance Software Reuse

Software Design Principles Introduction to Software Design System Models-data -flow

model Semantic data models Object models Data Dictionaries Software Design- The design

process Design Methods Design description Design strategies Design quality Architectural

Design- System structuring Control models Modular decomposition Domain-specific

architectures

Object Oriented Design Introduction to Object Oriented Design Object Oriented Design-

Objects Object Classes amp Inheritance Object identification An object-oriented design

example Object aggregation Service Usage Object Interface Design- Design evolution

Function oriented design Data ndashflow design Structural Decomposition- Detailed design

UNIT II

Configuration Management Introduction to Configuration Management Change

Management Version and Release Management- Version identification Release

management Version management tools Software Maintenance- The maintenance process

System documentation Maintenance costs Maintainability measurement Software

Reengineering Software Refactoring

Software Testing Techniques Software Testing Fundamental Testing Principles White Box

Testing Control Structure Testing Black Box Testing Boundary Value Analysis Testing GUIs

Testing Documentation and Help Facilities

MScIT Page No 8

Software Testing Assurance Verification and Validation- Validation Testing Validation Test

Criteria Test Plan- Test Documentation Test Strategies- Top-Down Testing Bottom-Up

Testing Thread testing Stress testing Back-to-back testing Principles of Testing Testing

methods and tools- Testing through reviews Black-box testing (Functional testing) White box

testing (glass-box testing) Testing software changes Additional requirements in testing OO

Systems System Testing Acceptance Testing Regression testing Metrics Collection

Computation and Evaluation Test and QA plan Managing Testing Functions

Software Testing Strategies Introduction to Software Testing Strategies Organizing for

software testing Software Testing Strategy Unit Testing- Unit Test Considerations Top-down

Integration Bottom-up Integration

Case Study System Requirements Architectural Alternatives

REFERENCES

1 Pressman Roger Software Engineering McGraw Hill Fifth Edition

2 Jalote Pankaj An Integrated Approach To Software EngineeringNarosa

3 W S Jawadekar Software EngineeringTMH

4 Mall R Fundamentals of Software Engineering Prentice Hall of India

5 Behferooz amp Hudson F JSoftware Engineering Fundamentals Oxford University Press

6 Pfleeger S L Software Engineering Theory and Practice Pearson Education

7 Peter James Software Engineering An Engineering Approach John Wiley

8 Sommerville Ian Software Engineering Pearson Education

IS 2161 OBJECT-ORIENTED PROGRAMMING ndash PRACTICAL (CREDITS 15)

A sample list of exercises is given below The list is not exhaustive

Exercise 1ldquoHello Worldrdquo Program

Exercise 2 Arithmetic Operations

Exercise 3 Largest of lsquonrsquo Numbers

Exercise 4 Matrix Multiplication

Exercise 5 Reversing a Given String

Exercise 6 Using Recursion

Exercise 7 Implementation of Inheritance

Exercise 8 Exception Handling

Exercise 9 File Handling

Exercise 10 Applet Programming

MScIT Page No 9

MScIT - Second Semester

IS 2201 OPERATING SYSTEMS (4 CREDITS)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Operating System ndash An Introduction- Definition and functions of Operating System

Evolution of Operating Systems-Simple Batch Operating Systems Multi-programmed Batched

Operating Systems Time- Sharing operating Systems Personal Computer Operating

Systems Multi-processor Operating Systems Distributed Systems Real-Time Systems

Operating system structures-Layered approach The kernel based approach The virtual

machine approach

Operating System Architecture Operating System as an Extended Machine Layered

Approach Micro-Kernels UNIX Kernel Components ModulesIntroduction to Virtual

Machines Virtual Environment amp Machine AggregationImplementation Techniques

Process Management Process Process State Process Control Block Process Scheduling

Operation on processes Co-operating Processes Threads

CPU Scheduling Algorithms Basic Concepts of Scheduling CPU-IO Burst Cycle

CPU Scheduler Pre-emptive non pre-emptive scheduling Dispatcher Scheduling Criteria

Scheduling Algorithms First come First Served Scheduling Shortest-Job-First Scheduling

Priority Scheduling Round-Robin Scheduling Multilevel Queue Scheduling Multilevel

Feedback Queue Scheduling Multiple-Processor Scheduling Real-Time Scheduling

Evaluation of CPU Scheduling Algorithms-Deterministic Modelling Queuing Models

Simulations Implementation

Process Synchronization Inter process Communication Basic Structure Naming Direct

Communication Indirect Communication Buffering The Critical-section problem Two

Process Solution Multiple Process Solutions Semaphores Monitors Hardware Assistance

Deadlocks System Model Deadlock Characterization Deadlock Handling Deadlock

Prevention Deadlock Avoidance-Safe State Resource-Allocation Graph Algorithm Bankerrsquos

Algorithm Deadlock Detection-Single Instance of a Resource Multiple Instances of a

Resource Recovery from Deadlock

MScIT Page No 10

Memory Management Logical versus Physical Address Space Swapping Contiguous

Allocation-Single partition Allocation Multiple Partition Allocation Fragmentation Paging-

Concept of paging Page Table Implementation Segmentation-Concept of Segmentation

Segmentation Hardware External Fragmentation

UNIT II

Virtual Memory Need for Virtual Memory Technique Demand Paging Page Replacement

Page Replacement Algorithms-FIFO Page Replacement Algorithm Optimal Algorithm LRU

page Replacement Algorithm Thrashing-Causes for Thrashing Working Set Model Page

Fault Frequency

File System Interface and Implementation Concept of a File- Attributes of a File

Operations on Files Types of Files Structure of File File Access Methods-Sequential Access

Direct Access Indexed Sequential Access Directory Structure Single Level Directory Two

Level Directory Tree Structured Directories Allocation Methods- Contiguous allocation

Linked allocation Indexed allocation Performance comparison Free Space Management

Directory Implementation

Input-Output Architecture IO Structure IO Control Strategies-Program controlled IO

Interrupt-controlled IO Direct memory access The IO Address Space

Operating Systems in Distributed Processing Centralized and Distributed Processing

Network Operating System (NOS) Architecture Functions of NOS Global Operating System

(GOS) Remote Procedure Call (RPC) Distributed File Management

Security and Protection Attacks on Security Computer Worms Computer Virus Security

Design Principles Authentication Protection Mechanism Encryption Security in Distributed

Environment

Multiprocessor Systems Multiprocessors Multiprocessor Classification Multiprocessor

Interconnections Types of Multiprocessor Operating Systems (MOS) MOS Functions and

Requirements Operating System Design and Implementation Issues

Windows Operating Systems Introduction Windows NT Architecture Windows 2000

Architecture Common Functionality

REFERENCES

1 Silberschatz Abraham amp Baer Galvin Peter Operating System Concepts PHI

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 8: PROGRAMME GUIDE FOR

MScIT Page No 8

Software Testing Assurance Verification and Validation- Validation Testing Validation Test

Criteria Test Plan- Test Documentation Test Strategies- Top-Down Testing Bottom-Up

Testing Thread testing Stress testing Back-to-back testing Principles of Testing Testing

methods and tools- Testing through reviews Black-box testing (Functional testing) White box

testing (glass-box testing) Testing software changes Additional requirements in testing OO

Systems System Testing Acceptance Testing Regression testing Metrics Collection

Computation and Evaluation Test and QA plan Managing Testing Functions

Software Testing Strategies Introduction to Software Testing Strategies Organizing for

software testing Software Testing Strategy Unit Testing- Unit Test Considerations Top-down

Integration Bottom-up Integration

Case Study System Requirements Architectural Alternatives

REFERENCES

1 Pressman Roger Software Engineering McGraw Hill Fifth Edition

2 Jalote Pankaj An Integrated Approach To Software EngineeringNarosa

3 W S Jawadekar Software EngineeringTMH

4 Mall R Fundamentals of Software Engineering Prentice Hall of India

5 Behferooz amp Hudson F JSoftware Engineering Fundamentals Oxford University Press

6 Pfleeger S L Software Engineering Theory and Practice Pearson Education

7 Peter James Software Engineering An Engineering Approach John Wiley

8 Sommerville Ian Software Engineering Pearson Education

IS 2161 OBJECT-ORIENTED PROGRAMMING ndash PRACTICAL (CREDITS 15)

A sample list of exercises is given below The list is not exhaustive

Exercise 1ldquoHello Worldrdquo Program

Exercise 2 Arithmetic Operations

Exercise 3 Largest of lsquonrsquo Numbers

Exercise 4 Matrix Multiplication

Exercise 5 Reversing a Given String

Exercise 6 Using Recursion

Exercise 7 Implementation of Inheritance

Exercise 8 Exception Handling

Exercise 9 File Handling

Exercise 10 Applet Programming

MScIT Page No 9

MScIT - Second Semester

IS 2201 OPERATING SYSTEMS (4 CREDITS)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Operating System ndash An Introduction- Definition and functions of Operating System

Evolution of Operating Systems-Simple Batch Operating Systems Multi-programmed Batched

Operating Systems Time- Sharing operating Systems Personal Computer Operating

Systems Multi-processor Operating Systems Distributed Systems Real-Time Systems

Operating system structures-Layered approach The kernel based approach The virtual

machine approach

Operating System Architecture Operating System as an Extended Machine Layered

Approach Micro-Kernels UNIX Kernel Components ModulesIntroduction to Virtual

Machines Virtual Environment amp Machine AggregationImplementation Techniques

Process Management Process Process State Process Control Block Process Scheduling

Operation on processes Co-operating Processes Threads

CPU Scheduling Algorithms Basic Concepts of Scheduling CPU-IO Burst Cycle

CPU Scheduler Pre-emptive non pre-emptive scheduling Dispatcher Scheduling Criteria

Scheduling Algorithms First come First Served Scheduling Shortest-Job-First Scheduling

Priority Scheduling Round-Robin Scheduling Multilevel Queue Scheduling Multilevel

Feedback Queue Scheduling Multiple-Processor Scheduling Real-Time Scheduling

Evaluation of CPU Scheduling Algorithms-Deterministic Modelling Queuing Models

Simulations Implementation

Process Synchronization Inter process Communication Basic Structure Naming Direct

Communication Indirect Communication Buffering The Critical-section problem Two

Process Solution Multiple Process Solutions Semaphores Monitors Hardware Assistance

Deadlocks System Model Deadlock Characterization Deadlock Handling Deadlock

Prevention Deadlock Avoidance-Safe State Resource-Allocation Graph Algorithm Bankerrsquos

Algorithm Deadlock Detection-Single Instance of a Resource Multiple Instances of a

Resource Recovery from Deadlock

MScIT Page No 10

Memory Management Logical versus Physical Address Space Swapping Contiguous

Allocation-Single partition Allocation Multiple Partition Allocation Fragmentation Paging-

Concept of paging Page Table Implementation Segmentation-Concept of Segmentation

Segmentation Hardware External Fragmentation

UNIT II

Virtual Memory Need for Virtual Memory Technique Demand Paging Page Replacement

Page Replacement Algorithms-FIFO Page Replacement Algorithm Optimal Algorithm LRU

page Replacement Algorithm Thrashing-Causes for Thrashing Working Set Model Page

Fault Frequency

File System Interface and Implementation Concept of a File- Attributes of a File

Operations on Files Types of Files Structure of File File Access Methods-Sequential Access

Direct Access Indexed Sequential Access Directory Structure Single Level Directory Two

Level Directory Tree Structured Directories Allocation Methods- Contiguous allocation

Linked allocation Indexed allocation Performance comparison Free Space Management

Directory Implementation

Input-Output Architecture IO Structure IO Control Strategies-Program controlled IO

Interrupt-controlled IO Direct memory access The IO Address Space

Operating Systems in Distributed Processing Centralized and Distributed Processing

Network Operating System (NOS) Architecture Functions of NOS Global Operating System

(GOS) Remote Procedure Call (RPC) Distributed File Management

Security and Protection Attacks on Security Computer Worms Computer Virus Security

Design Principles Authentication Protection Mechanism Encryption Security in Distributed

Environment

Multiprocessor Systems Multiprocessors Multiprocessor Classification Multiprocessor

Interconnections Types of Multiprocessor Operating Systems (MOS) MOS Functions and

Requirements Operating System Design and Implementation Issues

Windows Operating Systems Introduction Windows NT Architecture Windows 2000

Architecture Common Functionality

REFERENCES

1 Silberschatz Abraham amp Baer Galvin Peter Operating System Concepts PHI

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 9: PROGRAMME GUIDE FOR

MScIT Page No 9

MScIT - Second Semester

IS 2201 OPERATING SYSTEMS (4 CREDITS)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Operating System ndash An Introduction- Definition and functions of Operating System

Evolution of Operating Systems-Simple Batch Operating Systems Multi-programmed Batched

Operating Systems Time- Sharing operating Systems Personal Computer Operating

Systems Multi-processor Operating Systems Distributed Systems Real-Time Systems

Operating system structures-Layered approach The kernel based approach The virtual

machine approach

Operating System Architecture Operating System as an Extended Machine Layered

Approach Micro-Kernels UNIX Kernel Components ModulesIntroduction to Virtual

Machines Virtual Environment amp Machine AggregationImplementation Techniques

Process Management Process Process State Process Control Block Process Scheduling

Operation on processes Co-operating Processes Threads

CPU Scheduling Algorithms Basic Concepts of Scheduling CPU-IO Burst Cycle

CPU Scheduler Pre-emptive non pre-emptive scheduling Dispatcher Scheduling Criteria

Scheduling Algorithms First come First Served Scheduling Shortest-Job-First Scheduling

Priority Scheduling Round-Robin Scheduling Multilevel Queue Scheduling Multilevel

Feedback Queue Scheduling Multiple-Processor Scheduling Real-Time Scheduling

Evaluation of CPU Scheduling Algorithms-Deterministic Modelling Queuing Models

Simulations Implementation

Process Synchronization Inter process Communication Basic Structure Naming Direct

Communication Indirect Communication Buffering The Critical-section problem Two

Process Solution Multiple Process Solutions Semaphores Monitors Hardware Assistance

Deadlocks System Model Deadlock Characterization Deadlock Handling Deadlock

Prevention Deadlock Avoidance-Safe State Resource-Allocation Graph Algorithm Bankerrsquos

Algorithm Deadlock Detection-Single Instance of a Resource Multiple Instances of a

Resource Recovery from Deadlock

MScIT Page No 10

Memory Management Logical versus Physical Address Space Swapping Contiguous

Allocation-Single partition Allocation Multiple Partition Allocation Fragmentation Paging-

Concept of paging Page Table Implementation Segmentation-Concept of Segmentation

Segmentation Hardware External Fragmentation

UNIT II

Virtual Memory Need for Virtual Memory Technique Demand Paging Page Replacement

Page Replacement Algorithms-FIFO Page Replacement Algorithm Optimal Algorithm LRU

page Replacement Algorithm Thrashing-Causes for Thrashing Working Set Model Page

Fault Frequency

File System Interface and Implementation Concept of a File- Attributes of a File

Operations on Files Types of Files Structure of File File Access Methods-Sequential Access

Direct Access Indexed Sequential Access Directory Structure Single Level Directory Two

Level Directory Tree Structured Directories Allocation Methods- Contiguous allocation

Linked allocation Indexed allocation Performance comparison Free Space Management

Directory Implementation

Input-Output Architecture IO Structure IO Control Strategies-Program controlled IO

Interrupt-controlled IO Direct memory access The IO Address Space

Operating Systems in Distributed Processing Centralized and Distributed Processing

Network Operating System (NOS) Architecture Functions of NOS Global Operating System

(GOS) Remote Procedure Call (RPC) Distributed File Management

Security and Protection Attacks on Security Computer Worms Computer Virus Security

Design Principles Authentication Protection Mechanism Encryption Security in Distributed

Environment

Multiprocessor Systems Multiprocessors Multiprocessor Classification Multiprocessor

Interconnections Types of Multiprocessor Operating Systems (MOS) MOS Functions and

Requirements Operating System Design and Implementation Issues

Windows Operating Systems Introduction Windows NT Architecture Windows 2000

Architecture Common Functionality

REFERENCES

1 Silberschatz Abraham amp Baer Galvin Peter Operating System Concepts PHI

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 10: PROGRAMME GUIDE FOR

MScIT Page No 10

Memory Management Logical versus Physical Address Space Swapping Contiguous

Allocation-Single partition Allocation Multiple Partition Allocation Fragmentation Paging-

Concept of paging Page Table Implementation Segmentation-Concept of Segmentation

Segmentation Hardware External Fragmentation

UNIT II

Virtual Memory Need for Virtual Memory Technique Demand Paging Page Replacement

Page Replacement Algorithms-FIFO Page Replacement Algorithm Optimal Algorithm LRU

page Replacement Algorithm Thrashing-Causes for Thrashing Working Set Model Page

Fault Frequency

File System Interface and Implementation Concept of a File- Attributes of a File

Operations on Files Types of Files Structure of File File Access Methods-Sequential Access

Direct Access Indexed Sequential Access Directory Structure Single Level Directory Two

Level Directory Tree Structured Directories Allocation Methods- Contiguous allocation

Linked allocation Indexed allocation Performance comparison Free Space Management

Directory Implementation

Input-Output Architecture IO Structure IO Control Strategies-Program controlled IO

Interrupt-controlled IO Direct memory access The IO Address Space

Operating Systems in Distributed Processing Centralized and Distributed Processing

Network Operating System (NOS) Architecture Functions of NOS Global Operating System

(GOS) Remote Procedure Call (RPC) Distributed File Management

Security and Protection Attacks on Security Computer Worms Computer Virus Security

Design Principles Authentication Protection Mechanism Encryption Security in Distributed

Environment

Multiprocessor Systems Multiprocessors Multiprocessor Classification Multiprocessor

Interconnections Types of Multiprocessor Operating Systems (MOS) MOS Functions and

Requirements Operating System Design and Implementation Issues

Windows Operating Systems Introduction Windows NT Architecture Windows 2000

Architecture Common Functionality

REFERENCES

1 Silberschatz Abraham amp Baer Galvin Peter Operating System Concepts PHI

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 11: PROGRAMME GUIDE FOR

MScIT Page No 11

2 Tanenbaum S Andrew Operating Systems Design and Implementation Pearson

Education

3 Tanenbaum S Andrew Modern Operating Systems TMH

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 12: PROGRAMME GUIDE FOR

MScIT Page No 12

IS 2202 DATA BASE MANAGEMENT SYSTEMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Database Management System Concepts Significance of Database Database System

Applications Data Independence Data Modelling for a Database-Entities and their attributes

Relationships and types Advantages and Disadvantages of Database Management System

DBMS Vs RDBMS

Database System Architecture Three Level Architecture External Level Conceptual Level

Internal Level Mapping MySQL Architecture SQL Server 2000 Architecture Oracle

Architecture Database Management System Facilities Database Management System

Structure Distributed Processing

Database Models and Implementation Data Models and types of data Models- Relational

Data Model Hierarchical Model Network Data Model Object-Relational Model Object-

Oriented Model Entity-Relationship Model-Modelling using E-R Diagrams Notations used in

E-R Model Relationships and Relationship Types Associative Database Model

File Organization for Conventional DBMS Storage Devices and its Characteristics-

Magnetic Disks Physical Characteristics of Disks Performance Measures of Disks

Optimization of Disk-Block Access File Organization-Fixed-Length Records Variable-Length

Records Organization of records in files Sequential file Organization Indexed Sequential

Access Method (ISAM) Virtual Storage Access Method (VSAM)

An Introduction to RDBMS An informal look at the relational model Relational Database

Management System RDBMS Properties Overview of Relational Query Optimization System

Catalog in a Relational DBMS-Information Stored in the System Catalog How Catalogs are

Stored

SQL ndash 1 Introduction to SQL Categories of SQL Commands Data Definition Data

Manipulation Statements-SELECT - The Basic Form Sub queries Functions GROUP BY

Feature Updating the Database Data Definition Facilities

SQL ndash 2 Views Embedded SQL - Declaring Variables and Exceptions Embedding SQL

Statements Transaction Processing- Consistency and Isolation Atomicity and Durability

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 13: PROGRAMME GUIDE FOR

MScIT Page No 13

UNIT II

Relational Algebra Basic Operations Union Difference (-) Intersection() Cartesian

Product (x) Additional Relational Algebraic Operations-Projection () Selection () JOIN ()

Division ()

Relational Calculus Tuple Relational Calculus-Semantics of TRC Queries Examples of TRC

Queries Domain Relational Calculus Relational Algebra Vs Relational Calculus

Normalization Functional Dependency Anomalies in a Database Properties of Normalized

Relations First Normal Form Second Normal Form Third Normal Form Boyce-Codd Normal

Form (BCNF) Fourth and Fifth Normal Forms

Query Processing and Optimization Query interpretation Equivalence of expressions

Algorithm for executing query operations Heuristics of Query Optimization Semantic Query

Optimization Converting Query Tree to Query Evaluation Plan Cost Estimates in Query

Optimization Join Strategies for Parallel Processing

Distributed Databases Structure of Distributed Database Tradeoffs in Distributing the

Database-Advantages of Data Distribution Disadvantages of Data Distribution Design of

Distributed Databases Data Replication Data Fragmentation

Object Oriented DBMS Next Generation Database System New Database Application

Object Oriented Database Management System Features of Object Oriented System

Advantages of Object Oriented Database Management System Deficiencies of Relational

Database Management System Difference between Relational Database Management

System and Object Oriented Database Management System Alternative Object Oriented

Database Strategies

Object Relational Mapping Significance of Mapping Mapping Basics Mapping a Class

Inheritance Tree Mapping Object Relationships Modelling with Join Tables Open Source

Object Relational Mapping Software

REFERENCES

1 Paul Beynon Davies Database Systems Third Edition

2 Ramakrishanan Raghu amp Gehrke Johannes Database Management Systems Second

Edition

3 Korth Sudarshan Silberschatz Database System Concepts Fourth Edition

4 Teorey Toby Lightstone Sam and Nadeau Tom Database Modeling amp Design Fourth

Edition

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 14: PROGRAMME GUIDE FOR

MScIT Page No 14

5 Navathe Elmasri Somayajulu Gupta Fundamentals of Database Systems Second

Empression

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 15: PROGRAMME GUIDE FOR

MScIT Page No 15

IS 2203 ANALYSIS AND DESIGN OF ALGORITHMS (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Algorithms Concept of Algorithm The role of algorithm in computing

Fundamentals of Algorithm Important Types of Algorithm Fundamental Data Structures

Fundamentals of the Analysis of Algorithm Efficiency Introduction Analysis Framework

Methodologies for Analyzing Algorithms Amortization Case Studies in Algorithm Analysis

Mathematical aspects and Analysis of Algorithms Asymptotic Notations and Basic

Efficiency Classes Mathematical Analysis of Non recursive Algorithms

Mathematical aspects and Analysis of Algorithms-2 Mathematical Analysis of Recursive

Algorithms empirical Analysis of Algorithms Algorithm visualization

Brute Force Method Brute Force Selection Sort and Bubble Sort Sequential Search and

Brute-Force String Matching Exhaustive Search

Divide and Conquer Introduction Merge sort Quick sort Binary Search Binary tree

traversals and related properties Stressenrsquos Matrix Multiplication

Decrease and Conquer Concepts of Decrease and Conquer Insertion Sort Depth First

Search Breadth First Search Topological Sorting Algorithms for Generating Combinatorial

Objects

UNIT II

Transform and Conquer Presorting Gaussian Elimination Balanced Search Trees Heaps

and Heap sort Problem Reduction

Space and Time Tradeoffs Sorting Input Enhancement in String Matching Hashing

Methodology Indexing Schemes

Dynamic programming-1 Overview of Dynamic Programming Fibonacci numbers Binomial

coefficient Warshallrsquos and Floydrsquos Algorithms

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 16: PROGRAMME GUIDE FOR

MScIT Page No 16

Dynamic programming-2 Principle of Optimality Optimal binary search trees knapsack

problem memory functions

Greedy Technique Introduction to Greedy Technique Primrsquos Algorithm Kruskalrsquos

Algorithm Dijkstrarsquos Algorithm Huffman Trees

Limitations of Algorithm Power Lower-Bound Arguments Decision Trees P NP and NP-

Complete Problems

Coping with the Limitations of Algorithm Power Backtracking Branch and Bound

Approximation Algorithms for NP-Hard Problems

REFERENCES

1 Puntambekar AA (2008) Analysis and Design of Algorithms Technical Publication 1st

Edition

2 Levitin Anany (2007) Introduction to the Design amp Analysis of Algorithms 2nd Edition

Pearson Education

3 Cormen H Thomas Leiserson E Charles RivestL Ronal Stein Clifford (2006)

Introduction to Algorithms 2nd Edition PHI 2006

4 E Horowitz S Sahni S Rajasekaran(2001) Computer Algorithms Galgotia Publications

5 Lee RCT Tseng SS Chang RC amp Tsa YT i(2005) Introduction to the Design and

Analysis of Algorithms A Strategic Approach TMH

6 Levitin A (2003) Introduction to the analysis and design of algorithms Dorling Kindersley

India

7 Cormen H Thomas (2003) Introduction to Algorithms Mc Graw-Hill Book Company

North America

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 17: PROGRAMME GUIDE FOR

MScIT Page No 17

IS 2204 DATA COMMUNICATION AND NETWORKING (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Computer Network Definition and Uses of Computer Network Criteria for a

Data Communication Network Classification of Computer network Network Architecture OSI

Reference Model

Data communication Data Communication Transmission Impairments Transmission

Medium

Data Encoding Line Encoding Types of Line Coding Analog-to-Digital Conversion- Pulse

code modulation (PCM) Delta modulation (DM)Transmission Modes

Data Link Layer Error Detection and Correction- One and two dimensional parity checks

Hamming code Cyclic redundancy check (CRC) Framing- Character stuffing Bit stuffing

Flow and Error Control

Error Correction and Detection Protocols Protocols for Noiseless Channels- Simplest

protocol Stop-and-wait protocol Protocols for Noisy Channels- Stop-and-wait automatic

repeat request Go ndash back ndash N ndash automatic repeat request Selective repeat automatic repeat

request

Data Link Control protocols High- level Data Link Control Protocol (HDLC) Point-to-Point

Protocol (PPP) MAC and LLC Sub-layers-Channel Allocation Problem Pure ALOHA and

Slotted ALOHA Persistent and non-persistent CSMA

Wired LANs Ethernet IEEE 802 Standards Standard Ethernet Changes in the Standard

Fast Ethernet Gigabit Ethernet

UNIT II

Unicast Routing Routing Characteristics Routing Algorithms Comparison of Routing

Algorithms

Broadcast and Multicast Routing Broadcast Routing Multicast Routing Routing in Ad Hoc

Networks

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 18: PROGRAMME GUIDE FOR

MScIT Page No 18

Traffic Engineering Principles Congestion Control Algorithms- General principles of

congestion control Congestion prevention policies Quality of Service- Traffic shaping Leaky

bucket algorithm Token bucket algorithm Integrated Services

Network Layer IP Addressing Scheme Subnet Addressing Subnet Masks IPV4 Addressing

IPV6 Addressing Address Resolution Protocol (ARP) Reverse Address Resolution Protocol

(RARP)

Transport Layer Services of Transport Layer Connection Establishment Connection

Release Transport Layer Protocols- TCP protocol UDP protocol Congestion

Application Layer Simple Mail Transfer Protocol (SMTP) Sendmail Tool File Transfer

Protocol (FTP) Telnet Protocol

Internet and WWW Internet basics Hypertext Transfer Protocol (HTTP) World Wide Web

(WWW) Security in Internet E-mail Security

REFERENCES

1 Andrew T Computer network 4theditionindia PHI

2 Douglas EC Computer networks and Internet 2ndeditionindia Pearson education

3 Forouzan B A Data communications and Networking 4theditionindia McGraw-Hill

companies

4 Schaum Series Computer Network

5 Stalling William Data communication and computer networks

IS 2271 -Mini Project (9-Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 19: PROGRAMME GUIDE FOR

MScIT Page No 19

MScIT - Third Semester

IS 2301Object Oriented Analysis and Design (OOAD) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Overview of Object Oriented Systems Development Two Orthogonal Views of the

Software Concept of Object Oriented Software Importance of Object Oriented Software

Object Oriented Future Object Oriented Systems Development Methodology Overview of

Unified Approach

Object Basics An Object Oriented Philosophy Objects Object Behavior Object Oriented

Properties Association and Aggregation

Object Oriented Systems Development Life Cycle The Process of Software Development

Developing Good Quality Software Use Case Driven Approach for Object Oriented Systems

Development Reusability

Object Oriented Methodologies Introduction Types of Object Oriented Methodologies

Patterns Unified Approach

Unified Modeling Languages (UML) Overview of Unified Modeling Language (UML) Static

and Dynamic Models UML Diagrams UML Class Diagrams Use-Case Diagrams UML

Dynamic Modeling Implementation diagrams Model Management Package and Model

Organization UML Extensibility UML Meta-Model

Object Oriented Analysis ndash Identifying Use-Cases Complexity in Object Oriented Analysis

Business Process Modeling and Business Object Analysis Use-Case Driven Object Oriented

Analysis Use-Case Model Developing Efficient Documentation

Object Analysis Classification Object Analysis Classification Theory Approaches for

Identifying Classes Class Responsibility Collaboration

UNIT II

Object Oriented Analysis ndash Identifying Relationships Attributes and Methods

Introduction Associations Inheritance Relationships A Part of Relationship-Aggregation

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 20: PROGRAMME GUIDE FOR

MScIT Page No 20

Class Responsibility Identifying Attributes and Methods Class Responsibility Defining

Attributes Object Responsibility Methods and Messages

Object Oriented Design Process and Design Axioms Design Process Design Axioms

Corollaries Design Patterns

Designing Classes The Object Oriented Design Principles UML Object Constraint Language

(OCL) Strategies for Designing Classes Class Visibility Designing Public Private and

Protected Protocols Designing Classes Refining Attributes Designing Methods and

Protocols Packages and Managing Classes

Access Layer Object Store and Persistence Database Management Systems Logical and

Physical Database Organization and Access Control Object Oriented Database Management

Systems (OODBMS) Object Relational Systems Designing Access Layer Classes

View Layer User Interface Design as a Creative Process Designing View Layer Classes

Purpose of a View Layer Interface Prototyping the User Interface

Software Quality Assurance Quality Assurance Tests Software Testing Techniques

Testing Strategies Impact of Object Orientation on Testing Test Cases Test Plan Myerrsquos

Debugging Principles

System Usability and Measuring User Satisfaction Usability Testing User Satisfaction

Test Analyzing User Satisfaction by Satisfaction Test Template Developing Usability Test

Plans and Test Cases

REFERENCES

1 Bahrami Ali (2008) Object Oriented System Development Tata McGraw Hill Edition

2 Ram Baugh James Blaha Michael Eddy Fredrick Lorensen William Object Oriented

Modeling and Design Prentice Hall New Jersey USA

3 Haigh Andrew (2001) Object Oriented Analysis and Design Tata McGraw-Hill

publications New Delhi

4 Booch Grady Rambaugh J Jacobson Ivar The UML Users guide Pearson Education

5 Jawadekar W S Waman S Jawadekar(2004) Software Engineering Principles and

PracticeTata McGraw-Hill Publishing

6 Atul Kahate (2004) Object Oriented Analysis amp Design Tata McGraw-Hill Publishing

7 Booch Grady (1987) Software Engineering with ADA Pearson

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 21: PROGRAMME GUIDE FOR

MScIT Page No 21

IS 2302 Web Technologies (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Web Basics Introduction Concept of Internet Protocols of Internet World Wide Web URL

Web Server Web Browser

HTML History of HTML (Hypertext Mark-up Language) Structure of HTML Document Text

Basics Structure of HTML Document Images and Multimedia Links and webs Document

Layout Cascading Style Sheet Creating Forms Frames and Tables

Dynamic HTML Introduction of DHTML CSS of DHTML Event Handling Data Binding

Browser Object Models

XML Introduction Introduction of XML Anatomy of XML document Element Tags 5

Markup Element and Attributes Document Type Definition (DTD)

XML Programming XML Objects Checking Validity Understanding XLinks XPointer Event-

driven Programming XML Scripting

XML Presentation Technology XML with Style Sheet Technologies XML Schema Creating

Element in XML Schema XML Schema Types

XML Processor Introduction of XML Processor Concept of DOM and SAX Introduction of

Java Script Objects in Java Script Dynamic HTML with Java Script

UNIT II

XMLHttpRequest XMLHttpRequest The XMLHttpRequest Object Events for the

XMLHttpRequest Object Request Object for XMLHttpRequest Response Object for

XMLHttpRequest

AJAX Introduction AJAX Introduction AJAX Components Handling Dynamic HTML with

Ajax CSS to Define Look and Feel Understand the XML Markup XMLHttpRequest

AJAX Using XML and XMLHttpRequest Ajax Using XML and XMLHttpRequest Accessing

Creating and Modifying XML Nodes Loading XML Data into an HTML Page Receiving XML

Responses Handling Response XML

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 22: PROGRAMME GUIDE FOR

MScIT Page No 22

PHP Introduction PHP Introduction Structure of PHP PHP Functions AJAX with PHP PHP

Code and the Complete AJAX Example

AJAX with Database AJAX Database Working of AJAX with PHP Ajax PHP Database

Form AJAX PHP MySQL Select Query

Active Server Page Introduction of ASP ASP ndash Variables ASP Control Structure ASP

Objectsrsquo Properties and Methods

ASP Database Connectivity Introduction ASP Components ASP Database Connection

ASP Scripting Components

REFERENCES

1 CXavier (2005) Web Technology Design 1st edition New age International publication

2 NP Gopalan and J Akilandeswari (2008) Web Technology lsquoA Developerrsquos Perspectiversquo

2nd Edition PHI publication

3 OrsquoReilly (2006) HTML amp XHTML The Definitive Guide 6th Edition USA Orsquoreilly media Inc

4 Teague JC (2001) DHTML and CSS for the World Wide Web Peachpit press

5 Mark Birbeck amp Jason Diamond (2001) Professional XML 2nd edition Wrox Press Ltd

6 Inc K S (2001) AJAXblack book new delhi Delhi India Dreamtech Press

7 Schmuller Joseph(2000) Dynamic HTML- BPB publications

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 23: PROGRAMME GUIDE FOR

MScIT Page No 23

IS 2331 High Speed Networks (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Frame Relay Network Introduction Packet-Switching Networks Frame Relay Networks

Asynchronous transfer mode ATM Protocol Architecture and Logical Connection ATM

Cells ATM Service Categories ATM Adaption Layer

High Speed LANs Fast Ethernet LAN Gigabit Ethernet ATM LAN Network Attached

Storage (NAS) Wireless LAN and Wi-Fi LAN Interoperability

Network Performance Evaluation Models Introduction Overview of Probability and

Stochastic Processes Queuing Analysis Self-Similarity Network Traffic

Congestion Management Part-1 Congestion ndash An Overview Effects of Congestion

Congestion Control Traffic Management

Congestion Management Part-2 Frame Relay Congestion Control Flow Control

Techniques Error Control Techniques

TCP Traffic and Congestion Control TCP Flow control TCP Congestion Control

Performance of TCP over ATM

UNIT II

ATM Traffic and Congestion Control ATM Traffic and Congestion Control Traffic

Management Framework ABR Traffic Management GFR Traffic Management

Integrated Services Integrated Service (IntServ) Model Flow and Service Description

Queuing Discipline Integrated Services in IP-ATM Networks

Differentiated Services Differentiated Service Architecture Scalability of DiffServ DiffServ

Functional Elements Per-Hop Behavior (PHB) Models of DiffServ

Protocols for Quality of Service (QoS) Support ndash Part I Multicasting Multicast Transport

Protocol (MTP) Resource Reservation Protocol (RSVP) Real-Time Transport Protocol (RTP)

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 24: PROGRAMME GUIDE FOR

MScIT Page No 24

Protocols for Quality of Service (QoS) Support ndash Part II Multiprotocol Label Switching

(MPLS) Subnet Bandwidth Management (SBM) QoS Architectures QoS Support for

Multicast

Internet Routing Basics and Design ndash1 Basics of Graph Theory Internet Routing

Principles Analysis of Shortest Route

Internet Routing Basics and Design ndash2 Intra-Domain Routing Protocol Border Gateway

Protocol Inter-Domain Routing Protocol (IDRP)

REFERENCES

1 Stallings W (2011) High Speed Networks and Internets 2nd ed India Pearson

2 Perros Harry G Harry (2002) An introduction to ATM network John Wiley amp sons LTD

3 Boisseau Marc Demange Michel Munier Jean-Marie (1994) High speed networks reprint

illustrated Wiley

4 Robertazzi TG (2000) Computer Networks and Systems Queuing Theory and

Performance Evaluation 3rd ed USA Springer

5 Kung HT (1997) Traffic Management for High Speed Networks Washington DC

National Academy Press

6 Warland amp Varaiya Pravin(2001) High Performance Communication Networksrdquo Jean

Harcourt Asia Pvt Ltd 2nd Edition

7 Pepelnjk Irvan Guichard Jim and Apcar Jeff(2003) ldquoMPLS and VPN architecturerdquo Cisco

Press Volume 1 and 2

8 Shanmugam R Padmini R amp Niveditha S (2002) Using TCPIP 2nd ed US A Que

Publishing

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 25: PROGRAMME GUIDE FOR

MScIT Page No 25

IS 2332 Distributed Operating System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction Distributed Computing Systems Distributed Computing System Models

Advantages of Distributed Systems Distributed Operating Systems Issues in Designing

Distributed Operating Systems Distributed Computing Environment

Message Passing Introduction Features of Message Passing Issues in IPC by Message

Passing Synchronization Buffering Process Addressing Failure Handling Group

Communication

Remote Procedure Calls The RPC Model Transparency of RPC Implementation of RPC

Mechanism STUB Generation RPC Messages Marshaling Arguments and Results Server

Management Parameter Passing Call Semantics Communication Protocol for RPCs

Complicated RPC Client-Server Binding Security

Distributed Shared Memory Distributed Shared Memory Systems (DSM) DSM ndash Design

and Implementation Issues Granularity ndash Block Size Structure of Shared Memory Space in a

DSM System Memory Coherence (Consistency) Models Memory Consistency models

Implementing Sequential Consistency Centralized ndash Server Algorithm Fixed Distributed ndash

Server Algorithm Dynamic Distributed Server Algorithm Implementing under RNMBs

Strategy Thrashing

Synchronization Introduction Clock Synchronization Clock Synchronization Algorithms

Distributed Algorithms Event Ordering Mutual Exclusion Deadlock Election Algorithms

UNIT II

Resource Management Introduction Desirable Features of a Good Global Scheduling

Algorithm Task assignment Approach Load ndash Balancing Approach Load ndash Sharing

Approach

Process Management Introduction Process Migration Threads

Distributed File Systems The Key Challenges of Distributed Systems Clientrsquos Perspective

File Services File Access Semantics Serverrsquos Perspective Implementation Stateful Versus

Stateless Servers Replication Caching Ceph

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 26: PROGRAMME GUIDE FOR

MScIT Page No 26

Naming Desirable Features of a Good Naming system Fundamental Terminologies and

Concepts System Oriented Names Object ndash Locating Mechanisms Human ndash Oriented

Names Name Caches Naming and Security

Security in Distributed Systems Potential attacks to Computer Systems Cryptography

Authentication Access Control Digital Signatures Design Principles

REFERENCES

1 Tanenbaum Distributed Operating Systems

2 Sinha k Pradeep (1997) Distributed Operating Systems Concepts and Design IEEE

Press

3 Paker Yakup Banātre Jean-Pierre Bozyiǧ it Muumlslim Berlin(1987) Distributed operating

systems theory and practice New York Springer-Verlag

4 Goscinski Andrzej(1991)Distributed operating systems the logical design Addison-

Wesley

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 27: PROGRAMME GUIDE FOR

MScIT Page No 27

IS 2333 Software Architecture (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Software Architecture The Architectural Concept Architectural Patterns

Reference Models and Reference Importance of Software Architecture Architectural

Structures and Views

Architectural Styles Architectural Styles Other Familiar Architectures

Software Architecture ndash Case Studies Key Word in Context Instrumentation Software

Mobile Robotics Cruise Control Three Vignettes in Mixed Style Real Time Applications and

Distributed Applications

Architectural Quality Attributes Functionality and Architecture Architecture and Quality

Attributes System Quality Attributes Quality Attributes Scenario in Practice Other System

Quality Attributes

Achieving Quality Introduction Tactics Relationship of Tactics to Architectural Patterns

Architectural Patterns ndash1 Architectural Pattern From Mud to Structure- Layers Pipes and

filters Blackboard

Architectural Patterns ndash 2 Distributed Systems- Broker architectureInteractive Systems-

Model-View-Controller (MVC) Presentation-Abstraction-Control (PAC)

UNIT II

Architectural Patterns ndash 3 Adaptable Systems- Microkernel Reflection

Important Design Patterns Design Patterns Structural Decomposition Organization of

Work Access Control

Architectural Design Guidance User Interface Architecture The Quantified Design Space

Architectural Design Space Formalism

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 28: PROGRAMME GUIDE FOR

MScIT Page No 28

Formal Models and Specifications Z-Notation Formalizing an Architectural Style

Formalizing an Architectural Design Space

Linguistic Issues Architectural Description Language First Class Connectors Adding

Implicit Invocation to Traditional Programming Languages

Tools for Software Architecture CASE Tools Analysis and Design tools Software

Development Tools Software Tools for Architecture Design Excel as an Architecture Tool

Exploiting Style in Architectural Design Quality-Driven Software Architecture Design

Designing and Documenting Software Architecture Forming a Team Structure Creating a

Skeleton System Uses of Architectural Documentation Rules for Documentation Views

Documenting a View

REFERENCES

1 Bass Len Clements Paul Kazman Rick(2003) Software Architecture in Practice 2nd

Edition Pearson Education

2 Varma Vasudeva Software Architecture a Case Based Approach

3 Qin Zheng Xing Jiankuan Zheng Xiang (2008) Software Architecture

4 Shaw Mary and Garlan David (2009)Software Architecture ndash Perspective on an Emerging

Discipline

5 Buschmann Frank Meunier Regine Rohnert Hans Sommerlad Peter Stal Michael (2006)

Pattern-Oriented Software Architecture A System of Patterns - Volume 1 John Wiley and

Sons

6 Gamma E Helm R Johnson R Vlissides J(1995) Design Patterns- Elements of

Reusable Object-Oriented Software Addison-Wesley

7 Shaw Mary and Garlan David (2007) Software Architecture- Perspectives on an Emerging

Discipline Prentice-Hall of India

8 Busch Mann F R Meunier H Rohnert P Sommerlad and M Stal West Sussex (1996)

Software Architecture A System of Patterns

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 29: PROGRAMME GUIDE FOR

MScIT Page No 29

IS 2334 Open Source System (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Development Using Open Source Systems Overview of Open Source System

Open Source Software Development Models The FOSS Philosophy Social and Cultural

Impacts

Licensing Licensing Intellectual Proprietary Right Commercial License vs Open source

license

Open Source Licensing Contract and Copyright Law Basic principles of copyright law

contract and copyright open source software licensing issues with copyrights and patents

warranties

The MIT BSD Apache Licenses The MIT (or X) license the BSD license The apache

license

Academic free Licenses Overview of Academic Free Licenses Provisions under Academic

Free License (v20) Applications of AFL Philosophy of Open Source License

The GPL LGPL and Mozilla Licenses GNU general public license The GNU Library

General Public License The Mozilla Public License Applications and Comparisons of GPL

LGPL and MPL

QT Artistic and Creative Commons Licenses QT- Overview The Q public License

Artistic license (Perl) creative commons licenses

UNIT II

Non- Open Source Licenses Overview of Non-Open Source Licenses Classic Proprietary

License Sun Community Source License Microsoft Shared Source Initiative

Open Source Development- 1 Infrastructure needed for an open- source project Software

Development Life Cycle Building a Community

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 30: PROGRAMME GUIDE FOR

MScIT Page No 30

Open Source Development -2 Joining an Existing Open Source Project Ending an Open-

Source Project Open Source Within a Company Running Open Source Projects

Legal Impacts of Open Source and Free Software Licensing- 1 Entering contracts

statutory developments related to software contracts self- enforcing nature of open source

and free software licenses

Legal Impacts of Open Source and Free Software Licensing- 2 The global scope of open

source and free software licensing the negative effects of open source and free software

licensing

Legal Impacts of Open Source and Free Software Licensing- 3

Community Enforcement of Open Source and Free Software Licenses Compatible and

Incompatible Licensing

Software Development Using Open Source and Free Software Licenses Models of open

source and free software development Forking Choosing an open source or free software

license drafting open source licenses

REFERENCES

1 Andrew M Laurent St (2004) Understanding open source and free software licensing

1st edition OrsquoReilly Media Inc

2 Feller Joseph(2005) Perspectives on Free and Open Source Software MIT press Edition-

illustrated

3 Andrew M Laurent St (2004) Understanding open source and free software licensing

4 Kirk St Amant Still Brian (2007) Handbook of research on open source software

technological economic and social perspectives

5 Agerfalk Par J Boldyreff Cornelia Jesus M Barahona -Gonzalez (2010) Open Source

Software New Horizons

6 Michael R Overly Pike and Fischer (2003) The Open Source Handbook Inc Pike amp

Fischer ndash A BNA company

7 Dixon Rod (2004) Open source software law

8 Ludvig A Norin Fredrik Stockel Sweden (1998-05-20) Open-Source Software

Development Methodology

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 31: PROGRAMME GUIDE FOR

MScIT Page No 31

IS 2335 Embedded Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Embedded Computing Embedded System Complex Systems and Microprocessor

Categories of Embedded Systems Operating Systems for Embedded Systems

Embedded System Design Embedded System Design Process Formalism for System

Design

Embedded Processors Hardware Units and Devices Processor in the system Other

Hardware Units and Devices in a System Linking and Interfacing Buses and Units

The 8051 Architecture 8051 microcontroller IO Ports and Circuits Timers Counters Serial

Interface Interrupts

8051 Assembly Language Programming Registers in the 8051 8051 Assembly Language

Programming Assembling and Running an 8051 Program The 8051 program Counter and

ROM Space 8051 Data types and Directives 8051 Flag Bits and PSW Register 8051

Register Banks and Stack

8051 Instruction Set Addressing modes in 8051 Types of instructions in 8051 Descriptions

of 8051 Common Instructions

Interfacings with 8051 Interfacing with Keyboard Interfacing with DA and AD Converter

Interfacing with LCD Display Interfacing with Stepper Motor

UNIT II

Introduction to Real Time Operating Systems A Brief History of Operating Systems

Meaning and Types of operating system Definition of RTOS The Scheduler Objects and

Services Key Characteristics of an RTOS

Tasks and Tasks States Definition of a Task Task States and Scheduling Task Operations

Task Structure Synchronization and Communication

Semaphores Definition of Semaphore- Binary Semaphores Counting Semaphores Mutual

Exclusion (Mutex) Semaphores Typical Semaphore Operations Typical Semaphore Use

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 32: PROGRAMME GUIDE FOR

MScIT Page No 32

Message Queues Mailboxes and Pipes Message Queues Mailboxes Pipes Event

Registers Signals Condition Variables

Memory Management and Interrupt Routines in an RTOS Environment Memory

Management Timer Functions Device IO Management Interrupt routines in an RTOS

Environment Basic design using an RTOS Encapsulating Semaphores and Queues

Important Real Time operating Systems (RTOSs)

Advanced Architectures ndash I ARM Processor SHARC Processor Memory Organization

Instruction level Parallelism

Advanced Architectures ndash II Networks for Embedded Systems Isup2C Bus CAN Bus Internet

Enabled Systems

REFERENCES

1 Simon E David (2005) An Embedded Software Primer Pearson Education

2 Wolf Wayne (2008) Computers as Components-Principles of Embedded Computing

System Design Elsevier Inc

3 Kamal Raj (2008) Embedded Systems- Architecture Programming and Design Tata

McGraw Hill Education Private Limited

4 Ayala J Kenneth (2011) The 8051 microcontroller Thomson

5 Mazidi Gillispie Janice Mazidi A Muhammad (2000) The 8051 Microcontroller and

Embedded Systems Burlington Prentice Hall

6 Heffernan Donal (2002) 8051 tutorial University of Limerick

7 Mulani AO Godse AP (2009) Embedded Systems Pune Technical Publications

8 General RTOS Concepts Renesas Electronics Corporation

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 33: PROGRAMME GUIDE FOR

MScIT Page No 33

IS 2336 Graphics amp Multimedia Systems (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to computer graphics amp graphics systems Overview of computer graphics

Advantages of Interactive Graphics Image Processing as Picture Analysis Visualization RGB

color model Direct Table Lookup Table

Devices Over View of Graphic System Active and Passive Graphic Devices Computer

Graphics Software

Scan conversion Points amp lines Line drawing algorithms

Scan conversion -2 Circle generation algorithm Ellipse generating algorithm Scan Line Fill

Algorithm Boundary fill algorithm flood fill algorithm

2D Transformation Basic transformations Matrix representation amp homogeneous

coordinates transformations between coordinate systems Other Transformation in 2D

Composite Transformations in 2D

2D Viewing 2D Viewing pipeline Window to viewport Co-ordinate transformation clipping

operations polygon Clipping

3D transformation amp Viewing 3D transformations other transformations Rotation about an

arbitrary axis in space reflection through an arbitrary plane Projections 3D Viewing

UNIT II

Curves Introduction to Spline Curves Explicit Curves Parametric Spline Curves Bezier

Curves B-Spline Curves Non Uniform Rational B-Spline Curves Introduction to Surfaces

Hidden surfaces Hidden Surface Determination Visible-Surface Detection Methods z-buffer

algorithm Back Face Detection BSP tree Method Depth-Sort Algorithm Scan Line Method

Fractal Geometry Wire Frame Methods

Color amp shading models Color model Basic Lighting and Reflection Shading Texture

Mapping

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 34: PROGRAMME GUIDE FOR

MScIT Page No 34

Multimedia Introduction and Concepts of Multimedia uses of multimedia hypertext and

hypermedia Video Audio and Image Standards

Audio digital audio Music- MIDI basic concepts MIDI devices MIDI messages Processing

and sampling sound Compression

Video MPEG compression standard compression through redundancy Frame compression

Animation Types and Techniques of Animation key frame animation morphing Virtual

Reality concepts

REFERENCES

1 Donald D Hearn M Pauline Baker(2009) Computer Graphics Pearson Education

2 J Foley A van Dam S Feiner amp J Hughes(1996) Computer Graphics Principles and

Practice 2nd edition Addison-Wesley

3 Watt Alan(1999) 3D Computer Graphics3rd Edition

4 Hoggar S (1992) Mathematics for Computer Graphics Cambridge University Press

5 Bhatnagar G Mehta S amp Mitra S (2004) Introduction to Multimedia Systems India

Elsevier

6 Buford JFK (2007) Multimedia Systems India Pearson Education

7 Li Z amp Drew M S (2009) Fundamentals of Multimedia India Pearson Education

8 Parekh R (2007) Principles of Multimedia India Tata McGraw-Hill

IS 2361- Web Technologies Lab ( 15 credits)

Exercises

Following topics are to be covered through standard practical experiments

Exercise 1 - XML Exercise 2 ndash AJAX Exercise 3 - AJAX with Database Exercise 4- Active Server Page Exercise 5 - ASP Database Connectivity Exercise 6- SOAP Exercise 7 ndash J2ME

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 35: PROGRAMME GUIDE FOR

MScIT Page No 35

MScIT ndash Fourth Semester

IS 2401 Data Warehousing and Data Mining (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Data Warehouse Fundamentals Introduction OLTP Systems Characteristics amp Functions of

Data Warehouses Advantages and Applications of Data Warehouse Top- Down and Bottom-

Up Development Methodology Tools for Data warehouse development Data Warehouse

Types

Planning and Requirements Key Issues in Planning a Data Warehouse Planning and

Project Management in Data Warehouse Construction Data Warehouse Project

Data Warehouse Architecture Components of Data Warehouse Architecture Technical

Architectures Tool Selection Federated Data Warehouse Architecture

Dimensional Modeling E-R Modeling Dimensional Modeling E-R Modeling VS Dimensional

Modeling Data Warehouse Schemas Snowflake Schema Fact Constellation Schema

Extract Transform and Load ETL Overview ETL Requirements and Steps Data

Transformation Data Loading ETL Tools

Data Warehouse amp OLAP What is OLAP Multidimensional Data OLAP Architectures Data

Warehouse and OLAP Hypercubes amp Multicubes

Metadata Management in Data Warehouse Introduction to Metadata Categorizing

Metadata Metadata management in practice Tools for Metadata management

UNIT II

Introduction to Data Mining Meaning and Working of Data Mining Data Information and

Knowledge Relation between Data Warehousing and Data Mining Data Mining and

Knowledge Discovery Process Data Mining and Online Analytical Processing (OLAP) Data

Mining and Statistics Data Mining Technologies Data Mining Software

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 36: PROGRAMME GUIDE FOR

MScIT Page No 36

Business Intelligence Business Intelligence (BI) Business Intelligence Tools Business

Intelligence Infrastructure Business Intelligence Applications BI versus Data Warehouse BI

versus Data Mining Future of BI

Data Preprocessing Introduction Data Preprocessing Overview Data Cleaning Data

Integration and Transformation Data Reduction Discretization and Concept Hierarchy

Generation

Data Mining Techniques ndash An Overview Data mining Various Definitions Data Mining

Versus Database Management System (DBMS) Data Mining Techniques

Clustering Clustering Cluster Analysis Clustering Methods Clustering and Segmentation

Software Evaluating Clusters

Web Mining Introduction Terminologies Categories of Web Mining Applications of Web

Mining Agent Based and Data Base Approaches Web Mining Software

Applications of Data Mining Business Applications Using Data Mining Scientific

Applications Using Data Mining Other Applications

REFERENCES

1 PONNAIAH PAULRAJ Data Warehousing Fundamentals ndashWILEY STUDENT EDITION

John Wiley

2 HAN JIAWEI amp KAMBER MICHELINE (2009) Data Mining ndash Concepts and Techniques -

Harcourt India

3 PUJARI K ARUN Data Mining Technique University Press

4 Inmon W H Building the Data Warehouse Wiley Dreamtech India Pvt Ltd

5 Tan Pang-Ning Steinbach Michael Kumar Vipin (2007)Introduction to Data Mining -

Pearson Education

6 Dunham MH Data Mining Introductory and Advanced Topics Pearson Education

7 ANAHORY SAM amp MURRAY DENNIS Data Warehousing in the Real World Pearson

Edn Asia

8 Berry M and Linoff G Mastering Data Mining John Wiley

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 37: PROGRAMME GUIDE FOR

MScIT Page No 37

IS 2431 C and Net (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Net The C Environment NET Framework ndash An Overview Components of

NET Common Language Specification (CLS) Common Language Runtime (CLR) Microsoft

Intermediate Language (MSIL or IL) The Common Type System (CTS) NET Framework

Base Classes Web Services Web Forms and Windows Forms The Net Languages

An Overview of C Object Oriented Concepts C Program ndash Execution Sample Programs

Command Line Arguments Programming Examples Multiple Main Methods

Literals Variables and Data Types Keywords Identifiers Literals Variables Data Types

Boxing and Unboxing

Operators and Expressions Operator Precedence and Associativity Arithmetic Operators

Relational Operators Logical Operators Assignment Operators Increment and Decrement

Operators Conditional Operators Bitwise Operators Special Operators Type Conversions

Branching and Looping Structure Decision Making Statements The Switch Statement The

operator Decision Making and Looping Jumps in Loops Labeled Jumps

Arrays and Strings Single Dimensional Arrays Multidimensional ArraysJagged Arrays

System Array Class ArrayList Class Strings Regular Expressions

Methods in C Declaring Methods Main Method Invoking Methods Nesting of Methods

Method Parameters

UNIT II

Structures and Enumerations Structures- Defining a Structure Assigning Values to

Members Copying Structures Structures with Methods Nested Structures Classes Vs

Structures Guidelines to use Structures Enumerations- Enumerator Initialization Enumerator

Base Types Enumerator Type Conversion

Classes and Objects Classes Constructors amp Destructors Member Initialization lsquothisrsquo

Reference Variable Nesting of Classes Members Properties

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 38: PROGRAMME GUIDE FOR

MScIT Page No 38

Inheritance and Polymorphism Classical Inheritance Containment Inheritance Defining a

Subclass Visibility Control Subclass Constructor Method Overriding Hiding Methods

Abstract Classes Abstract Methods Sealed Classes Sealed Methods Polymorphism

Exception Handling Exceptions ndash An Overview Exception Handling Syntax Multiple Catch

Statements The Exception Hierarchy General Catch Handler Using lsquoFinallyrsquo Nested Try

Blocks User Defined Exceptions Operators ndash Checked and Unchecked

Interfaces Delegates and Events Defining Interfaces Extending Interfaces Implementing

Interfaces Explicit Interface Implementation Abstract Classes and Interfaces Delegates

Multicast Delegates Events

Managing Console IO Operations The Console Class Console Input and Output

Formatted Output Custom Numeric Format

Windows and Web Application Development Developing Windows Applications

Developing Web Applications

REFERENCES

1 Archer T amp Whitechapel A (2002) Inside C Microsoft Corporation

2 Balagurusamy E (2008) Programming in C ndash A Primer Second Edition Tata Mc Graw

Hill Publishing Company Limited

3 Gunnerson E (2000) A Programmerrsquos introduction to C Apress

4 Purdum J (2008) Beginning C 30 An introduction to Object Oriented Programming

Wiley India Pvt Ltd

5 Troelsen Andrew(2007) Pro C with NET 30 Special Edition Dream Tech Press

India

6 Balagurusamy E (2004) Programming in C 5th Reprint Tata McGraw Hill

7 Scheldt Herbert (2004)The Complete Reference C Tata McGraw Hill

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 39: PROGRAMME GUIDE FOR

MScIT Page No 39

IS 2432 Network Security (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Security in Computing Environment Need for Security Security Attack Security Services

Information Security Methods of Protection

Basics of Cryptography Terminologies used in Cryptography Substitution Techniques

Transposition Techniques

Encryption and Decryption Characteristics of Good Encryption Technique Properties of

Trustworthy Encryption Systems Types of Encryption Systems Confusion and Diffusion

Cryptanalysis

Symmetric Key Encryption Data Encryption Standard (DES) Algorithm Double and Triple

DES Security of the DES Advanced Encryption Standard (AES) Algorithm DES and AES

Comparison

Public Key Encryption Characteristics of Public Key System RSA Technique Key

Exchange Diffie-Hellman Scheme Cryptographic Hash Functions Digital Signature

Certificates Certificate Authorities

Protection of Computing Resources Secure Programs Non-malicious Program Errors

Viruses and Other Malicious Code Targeted Malicious Code Methods of Control

Security Features in Operating System Objects to be Protected Protection Methods of

Operating Systems Memory Protection File Protection User Authentication

UNIT II

Designing Trusted Operating Systems Types of Security Policies Models of Security

Design of OS

Network Security Network Concepts Threats in Networks Network Security Controls

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 40: PROGRAMME GUIDE FOR

MScIT Page No 40

IP Security Overview of IP Security (IPSec) IP Security Architecture Modes of Operation

Security Associations (SA) Authentication Header (AH) Encapsulating Security Payload

(ESP) Internet Key Exchange

Web Security Web Security Requirements Secure Socket Layer (SSL) Transport Layer

Security (TLS) Secure Electronic Transaction (SET)

Electronic Mail Security Threats to E-Mail Requirements and Solutions Encryption for

Secure E-Mail Secure E-Mail System

Firewalls Firewalls ndash Types Comparison of Firewall Types Firewall Configurations

Planning and Enforcing Security Policies Planning Security Policies Risk Analysis

Security Policies for an Organization External Security

REFERENCES

1 Pfleeger P Charles Pfleeger Lawrence Shari (2002) Security in Computing Prentice Hall

PTR (United States of America)

2 Salomon David (2006) Foundations of Computer Security Springer-Verlag (London)

3 Bishop Matt (2002) Computer Security Art and Science Addison Wesley (United States

of America)

4 Lehtinen Rick (2006) Computer Security Basics OReilly United States of America

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 41: PROGRAMME GUIDE FOR

MScIT Page No 41

IS 2433 Real Time Operating System (RTOS) (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Real Time Systems Introduction to Real Time Systems Classification of Real Time System

Concept of Computer Control Types of Real Time Operating Systems

Requirements for Real Time Systems Human Computer Interaction in Real Time Systems

Hardware Requirement for Real time Systems Specialized Processors Interfaces amp

Communications

Modeling Real-Time Systems Purpose of the Model Structural Elements Interfaces Event-

Triggered versus Time-Triggered Interrupts

Real Time Languages Overview of Real Time Languages Few Real Time Languages

Modula 2 as Real Time Language Ada as Real Time Language

Real Time Operating Systems ndash 1 RTOS Overview RTOS Components Task Management

amp Memory Management Scheduling Strategies Commercial Real-time Operating Systems

Real Time Operating Systems ndash 2 Intertask Communication and Synchronization Real

Time Kernels Practical Real Time Operating Systems

Design of Real Time Systems Planning and Development Phase Specification for Real-

Time Systems Preliminary Design Basic Software Engineering Principles Basic Design

Using an RTOS

UNIT II

Multi Processing Systems Parallel Processing Vector Computers Multiple Tasks

Dispatcher

Development Methodologies Yourdon Systems Method (YSM) The Ward and Mellor

Essential Model The Hatley and Pirbhai Requirements Model

Design Analysis ndash 1 Petri Nets Petri Nets and the Modeling of Systems Properties of Petri

Nets Scheduler Characteristics Real Time vs General Purpose Database

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 42: PROGRAMME GUIDE FOR

MScIT Page No 42

Design Analysis ndash 2 Transactions and Serializability Scheduling RTDB Transactions Disk

Scheduling

Fault Tolerance Techniques Failures Errors and Faults Error Detection Testing

Techniques

Security in RTOS A Model for Network Security Potential Attacks to Real Time Systems

Cryptography Authentication Design Principles

Case Study Fault ndash Tolerant Design A Case Study Case Study in Software Requirements

Specification for Four way Traffic Intersection Traffic Light Controller System

REFERENCES

1 Arnold S Berge (2002) Embedded systems design an Introduction to processes tools

and techniques

2 Hermann Kopetz (2002) Real time systems design principles for distributed embedded

applications (2nd edition)

3 Phillip A Laplante A John (2004) Real time systems design and analysis (3rd edition)

4 Qing Li Caroline Yao (2003) Real-time concepts for embedded systems (2nd edition)

5 Krishna C M Shin G Kang(1997) Real Time Systems Mc Graw Hill India

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 43: PROGRAMME GUIDE FOR

MScIT Page No 43

IS 2434 Customer Relationship Management (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to CRM CRM ndash Definition Origin and Evolution of CRM Importance of CRM

Types of CRM

CRM Architecture CRM Architecture ndash Overview CRM Technology Components Customer

Lifestyle Customer Interaction

Sales Force Automation (SFA) Definition and Need of SFA SFA ndash Features SFA

Functionality Barriers to Successful SFA

Technological Aspects of SFA Data SynchronizationFlexibility and Performance Reporting

Tools

Enterprise Marketing Automation Enterprise Marketing Automation Components of

Enterprise Marketing Automation Managing the Marketing Campaign Business Analytics

Tool

Enterprise Marketing Management Integrate Marketing into the Enterprise Response

Management

Customer Interaction Centers Evolution of Customer Interaction Centers (CICs) Planning a

Successful CIC Technological Implementation

UNIT II

Computer Telephony Integration Computer Telephone Integration ndash Overview Computer

Telephony Integration ndash Benefits Computer Telephony Integration ndash Functionality Web

Enabling the Call Center Automated Intelligent Call Routing and Monitoring

Implementing CRMndashI Kick off Meeting Requirements Gathering Scoping and Prioritizing

Projects Designing the Project Pre-implementation

Implementing CRMndashII Prototyping and Detailed Proposal Generation Development of

Customizations Power User Beta Testing and Data Import Training Rollout and Systems

Hand-off On-going Support System Optimization and Follow-up

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 44: PROGRAMME GUIDE FOR

MScIT Page No 44

Introduction to eCRM Overview of eCRM The Six lsquoErsquos of eCRM Features of eCRM

Differences Between CRM and eCRM eCRM Architecture

Introduction to Application Service Provider (ASP) Overview of ASP Application Server

Provider (ASP) ndash Features ASP ndash Value Chain Participants Specialized CRM ASPs

Advantages and Disadvantages of Implementing ASP

Data Driven and Process Driven CRM Data Driven CRM CRM Macro Business Processes

CRM Micro Business Processes Process Driven CRM

Internet and Social CRM Traffic Building Providing Quality Transaction Retention and

Measuring Result Social CRM CRM Tools

REFERENCES

1 PaulGreenberg CRM at the speed of light TMH

2 Kristin Anderson amp Carol Kerr Customer Relations Management TMH

3 Kumar A Sinha C amp Sharma R (2008) Customer Relationship Management -

Concepts amp Application India Sudha Offset Press

4 Brown S (2000) Customer Relationship Management - A Strategic Imperative in the

World of e-Business Canada John Wiley amp Sons

5 Goyal D P (2009) Enterprise Resource Planning New Delhi Tata McGraw-Hill

6 Philip B amp Douglas T (2004) Releasing CRMs Strategic Value New Jersey John

Wiley amp Sons Inc

7 Bayer M T (2001)Computer Telephony Demystified Vol 1 US A McGraw- Hill

8 Makkar U amp Makkar H K (2012) Customer Relationship Management New Delhi

Tata-McGraw Hill

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 45: PROGRAMME GUIDE FOR

MScIT Page No 45

IS 2435 Advanced Software Engineering (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Software Engineering Basics Software Engineering Terminologies Product Life Cycle

Project Life Cycle Models

Software Engineering Methodologies Components of Software Engineering Software

Development Models

Predictive vs Adaptive Approaches to SDLC Traditional Predictive Approaches to SDLC

Adaptive Approaches to SDLC Separation of Design and Construction Unpredictability of

Requirements

Agile Programming Introduction Flavors of Agile Development Agile Manifesto Refactoring

Techniques Limitations of The Agile Process

Extreme Programming XP Equation XP Values Assuming Sufficiency

Extreme Programming Practices Coding Practices Developer Practices Business

Practices

XP Events Iteration Planning Iteration Releasing

UNIT II

Extreme Programming Artifacts Story Cards Task Cards Bullpens

Roles of Extreme Programming Customerrsquos Roles Developerrsquos Roles Supplementary

Roles

Coding XP Style Balance Functionality with Simplicity Implement Only the Needed

Features Eliminate Repetition

Adopting XP Before Commencing XP Eliminating Fear and Working Together Starting

Feedback Including Managers and Customers

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 46: PROGRAMME GUIDE FOR

MScIT Page No 46

Agile Modeling with XP Agile Modeling ndash Principles Comparing XP and Agile Modeling

Scrum Methodology

Dynamic Systems Development Methodology (DSDM) Overview of DSDM The Principles

of DSDM Phases of DSDM Core Techniques Used in DSDM

XP Tools Java and XP Tools and Philosophies Open Source Toolkit

REFERENCES

1 EricM Burke Coyner MBrian Java Extreme Programming Cook book

2 Beck Kent (2002) Extreme programming explained Person Education Asia

3 Stewart (2002) Extreme programming Person Education Asia

4 Aggarwal K K (2001) Software Engineering 2nd ed Delhi New Age International

Publishers

5 Jawadekar W S (2008) Software Engineering Principles and Practice Tata McGraw-Hill

Publishing Company Limited

6 Jeffries R Anderson A amp Hendrickson C (2001) Extreme Programming Installed NJ

Addisson-Wesley

7 Hazzan O amp Dubinsky Y (2008) Agile Software Engineering London Springer-Verlag

London Limited

8 Stapleton J (2003) DSDM Business Focused Development Addison-Wesley

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 47: PROGRAMME GUIDE FOR

MScIT Page No 47

IS 2436 Cloud Computing (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Cloud Computing From Collaborative to Cloud- A Short History Functioning

of Cloud Computing Cloud Architecture Cloud Storage and Cloud Services Industrial

Applications

Business Values Service Modeling Infrastructure as a Service Platform as a Service

Software as a Service Massively Scaled Software as a Service

Inside Cloud Computing Sensational Feeling about Organization Deciding on Strategy

Governance Issues Monitoring Business Process IT Cost Management

Cloud Service Administration Service Level Agreements and Monitoring Support Services

Accounting Services Resource Management Service Management Untangling Software

Dependencies

Cloud Computing Technology Clients Security Network Services

Accessing the Cloud Platforms Web Applications API in Cloud Computing Browsers for

Cloud Computing

Cloud Data Management Data Security Data Location Data Control Securing Data for

Transport Scalability and Cloud Services Storage as A Service

UNIT II

Information Storage in Cloud Computing Storage as a Service Storage Providers Storage

Security Merits and Demerits of Cloud Storage

Discovery of Private and Hybrid Clouds Need for Privacy Comparing Public Private and

Hybrid Examining the Economics of the Private Cloud The Up Key Vendors

Cloud Computing Standards Best Practices and Standards Practical Issues Standards

Organizations and Groups

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 48: PROGRAMME GUIDE FOR

MScIT Page No 48

Desktop and Device Management Desktop Virtualisation Desktop Placement in the Cloud

Desktop Management

Cloud Governance IT Governance Deciding the Governor Risk Assessment of Running the

Cloud Working of Governance

Migrating to the Cloud Cloud Services for Individual Cloud Services Aimed at the Mid-

Market Enterprise-Class Cloud Offerings Migration

Future practice of cloud computing Analyze Your Service Best Practices How Cloud

Computing Might Move

REFERENCES

1 Miller Michael(2009) Cloud Computing Web-Based Applications That Change the Way

You Work and Collaborate Online Que Publications

2 Hurwitz Judith Bloor Robin Kaufman Marcia Halper Fern (2010) Cloud Computing for

Dummies Wiley Publishing Inc

3 David Linthicum S Cloud Computing and SOA Convergence in Your Enterprise A step by

step guide Addision Wesley Information Technology Series

4 Mather Tim Kumaraswamy Subra and Shahed Latif Cloud Security and Privacy An

enterprise perspective on Risks and Compliance Orielly Series

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 49: PROGRAMME GUIDE FOR

MScIT Page No 49

IS 2437 Wireless and Mobile Communication (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Wireless Telecommunication Systems and Networks Concepts of

Wireless Communication History and Evolution of Wireless Communication Different

Generations of Wireless Networks

Common Cellular System Components Cellular networks architecture Signal strength and

cell area Common cellular netowrks components Components Identification and call

establishment

Wireless Network Architecture and Operation Fundamentals of Cellular Architecture

Mobility Management in Wireless Network Power Management in Wireless Network Security

in Wireless Network

GSM Architecture Fundamentals of GSM Network GSM Frequency Band GSM PLMN

GSM Objectives GSM Services GSM PLMN Subsystems

GSM Interface and Protocol Stack GSM PLMN Interfaces GSM Radio Interface GSM

Abis Interface GSM A Interface GSM Interface for Connecting Other Components Mapping

of GSM Layers onto OSI Layers Protocols Used Across Other Interfaces of GSM

GSM TDMA Techniques GSM and TDMA Techniques GSM Channels GSM Identifiers

GSM System Operation and Traffic Cases GSM System Operations Traffic Cases in GSM

Network Handover in GSM Network

UNIT II

CDMA Technology CDMA overview CDMA channels Concept CDMA system operations

Speech Coding in GSM Speech coding in GSM Speech coding methods Speech codec

attributes LPAS ITU-T Standards

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 50: PROGRAMME GUIDE FOR

MScIT Page No 50

Waveform Coding and Call Flow in GSM Waveform Coding GSM Vocoders Data

Encryption in GSM Call flow in GSM

Wireless Modulation Techniques Concept of Modulation Wireless Modulation Techniques

Air Interface Path Loss Models Multiple Access Techniques

Wireless Modulation Techniques ndash 2 Orthogonal Frequency Division Multiplexing (OFDM)

Ultra Wide Band Radio Techniques Diversity Techniques GSM Hardware

Wireless Local Area Networks Evolution of Wireless LANs Wireless LAN Topologies

Wireless LAN Requirements IEEE 80211 Standards IEEE 80215 Standards IEEE 80216

Standards Wireless LAN Applications

Wi-Fi and Wimax Technology Wi-Fi (80211) WiMAX(80216)

REFERENCES

1 Mullet(2006) Wireless Telecom Systems and networks Thomson Learning

2 Rappaport TS (2003) Wireless Communications Principles and Practice Second

Edition Pearson Education Prentice Hall of India Third Indian Reprint

3 Lee WCY (2002) Mobile Cellular Telecommunication MGH

4 Agrawal D P(2007) Wireless communication 2nd Edition Thomson learning

5 Tse David Viswanath Pramod (2005) Fundamentals of Wireless Communication

Cambridge

6 Agarwal Dharma Prakash and Zeng An Qing Introduction to Wireless and Mobile systems

Second Edition Thomson

7 Lee C Y William(1995) Mobile Cellular Telecommunications Analog and Digital Systems

Second Edition Tata McGraw Hills

8 Kumar Vijay Garg Wireless communications and networking Springer

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 51: PROGRAMME GUIDE FOR

MScIT Page No 51

IS 2438 Enterprise Resource Planning (4 Credits)

Questions to be set Eight (Four from each unit)

Questions to be answered Any Five selecting at least Two from each unit

UNIT I

Introduction to Enterprise Resource Planning Introduction Benefits of ERP Business

Process Reengineering Data Warehousing Data Mining Supply Chain Management

Reasons for the Growth of ERP Reasons for the Growth of ERP Scenario and Justification

of ERP in India Evaluation of ERP Various Modules of ERP Advantages of ERP

Understanding ERP Overview of Enterprise Integrated Management Information Business

Modelling ERP for Small Businesses ERP for Make to Order Companies

Business Process Mapping Business Process Mapping in ERP ERP Implementation

Process Hardware Environment for ERP Implementation

ERP Implementation Precautions in ERP Implementation ERP Post Implementation

Options Guidelines for ERP Implementation

ERP and Related TechnologiesndashI Business Process Re-engineering Management

Information System Executive Information System (EIS)

ERP and Related TechnologiesndashII Decision Support Systems (DSS) Supply Chain

Management

UNIT II

ERP ModulesndashI ERP Finance Module Plant Maintenance

ERP ModulendashII Quality Management Materials Management Module

ERP ImplementationndashI Pre-evaluation Screening Package Evaluation Project

Planning Phase

ERP ImplementationndashII Gap Analysis Hidden Cost Vendors Consultants Human

Resource

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)

Page 52: PROGRAMME GUIDE FOR

MScIT Page No 52

Post Implementation Phases Re-Engineering Configuration Implementation Team

Training Testing Going Live and End User Training Post Implementation (Maintenance

Mode)

ERP and E-commerce Future Directives in ERP ERP and Internet Critical Factors Guiding

Selection and Evaluation of ERP Strategies for Successful ERP Implementation Critical

Success Factors in ERP Implementation Failure Factors in ERP Implementation Integrating

ERP into Organisation

Using ERP Tools ERP Software and Tools Case Study 1 SAPR3 at Tata Steel

Case Study 2 Pantaloon

REFERENCES

1 Sadagopan S ERP- A Managerial Perspective Tata McGraw Hill

2 Leon Alex Enterprise Resource Planning Tata McGraw Hill

3 Kumar Vinod Garg and Krishnan Venkita NK (2004) Enterprise Resource Planning ndash

Concepts and Practice PHI

4 Sharma Pankaj (2004) Enterprise Resource Planning New Delhi APH Publishing

5 Mary Sumner (2008) Enterprise Resource Planning Pearson Education

6 Magal SR amp Word J (2011) Integrated Business Processes with ERP Systems 1st

edition Wiley

IS 2475 Project (20 Credits)

A project work of minimum 16 weeks duration has to be carried out in the area relevant to the

curriculum The project work may be carried out in groups of students comprising of 2-3

students or individually under the supervision of faculty member(s)