rgpv syllabus BE CBGS 7th Semester Microsoft Word - VII Sem IT _SY_
IT- 7001 – Cloud Computing
Unit-I
Introduction: Historical development ,Vision of Cloud Computing, Characteristics of cloud computing as per NIST , Cloud computing reference model ,Cloud computing environments, Cloud services requirements, Cloud and dynamic infrastructure, Cloud Adoption and rudiments .Overview of cloud applications: ECG Analysis in the cloud, Protein structure prediction, Gene Expression Data Analysis ,Satellite Image Processing ,CRM and ERP ,Social networking .
Unit-II
Cloud Computing Architecture: Cloud Reference Model, Types of Clouds, Cloud Interoperability & Standards, Scalability and Fault Tolerance,
Cloud Solutions: Cloud Ecosystem, Cloud Business Process Management, Cloud Service Management.
Cloud Offerings: Cloud Analytics, Testing Under Control, Virtual Desktop Infrastructure.
Unit –III
Cloud Management & Virtualization Technology: Resiliency, Provisioning, Asset management, Concepts of Map reduce , Cloud Governance, High Availability and Disaster Recovery. Virtualization: Fundamental concepts of compute ,storage, networking, desktop and application virtualization .Virtualization benefits, server virtualization, Block and file level storage virtualization Hypervisor management software, Infrastructure Requirements , Virtual LAN(VLAN) and Virtual SAN(VSAN) and their benefits .
Velte, “Cloud Computing- A Practical Approach” ,TMH Pub
Sosinsky, “ Cloud Computing” , Wiley Pub
IT- 7002 – Object Oriented Analysis and Design
Unit I: Overview of Object Oriented concepts: Objects and classes, abstraction, generalization and inheritance, encapsulation, multiple inheritance, aggregation abstraction classes, polymorphism, link and association, Need for object oriented approach
Unit II: System design life cycle, object oriented S/W development process model, Object Oriented Analysis, Object Modeling Technique (OMT): object model, function model, relationship among models, object diagrams, state diagrams, data flow diagrams, analysis.
Unit III: Object oriented Design: Overview of object design, Combination the models, Designing algorithms, design optimization, Implementation of control, Adjustment, Design of association, object representation, physical packaging, documenting design decision, comparison of use-case driven approach.
Unit IV: Translation Object Oriented design into implementation, Programming style, Documentation, characterization of object oriented languages, Comparison of object oriented language like C++, JAVA, object programming.
Unit V: Unified Modeling Language (UML): Class diagram sequence diagram Use case diagram, Collaboration, diagram, state, chart diagram, Activity diagram, component diagram, deployment diagram, Object oriented Database: Relational Vs .object oriented database, the architecture of object oriented database, query language for Object Oriented database.
References:-
Satzinger, Jackson and Burd, “Object oriented Analysis and design with the Unified Process”, CENGAGE Learning.
Michael Blaha and J. Rumbugh, “Object oriented Modeling and design with UML”, Pearson Education
O’Docherty, “Object Oriented Analysis and Design Understanding, System Development with UML2.0”, Wiley India.
List of Experiment:-
Ddraw Object, state, Data flow Diagram of ATM.
Draw Object, state, Data flow Diagram of Telephone Call.
Draw Object, state, Data flow Diagram of Library Information System.
Draw Object, state, Data flow Diagram of Airline reservation System.
Draw Object, state, Data flow Diagram of Calculator.
Draw Object, state, Data flow Diagram of College Management system.
Draw Object, state, Data flow Diagram of Payroll System.
Draw Object, state, Data flow Diagram of Railway Reservation system.
Draw Object, state, Data flow Diagram of Online Sales.
Draw Object, state, Data flow Diagram of Examination result display System of a University.
IT- 7003 – Wireless & Mobile Computing
Unit I: Antenna , radiation pattern, antenna types, antenna gain, propagation modes, types of fading. Model for wireless digital communication, multiple access technique-SDMA, TDMA, FDMA, CDMA, DAMA, PRMA, MAC/CA, Cellular network organization, operations of cellular system, mobile radio propogation effects, , handoff, power control, sectorization, traffic engineering, Infinite sources, lost calls cleared, grade of service, poison arrival process
Unit II: GSM- Services, system architecture, radio interface, logical channels, protocols, localization and calling, handover, security, HSCSD, GPRS-architecture, Interfaces, Channels, mobility management DECT, TETRA, UMTS.
Unit III: IEEE 802.11: LAN-architecture, 802.11 a, b and g, protocol architecture, physical layer, MAC layer , MAC management, HIPERLAN-protocol architecture, physical layer, access control sub layer, MAC sub layer. Bluetooth-user scenarios- physical layer, MAC layer.
Unit IV: Mobile IP, DHCP, Ad hoc networks: Characteristics, performance issue, routing in mobile host. Wireless sensor network, Mobile transport layer: Indirect TCP, Snooping TCP, Mobile TCP, Time out freezing, Selective retransmission, transaction oriented TCP. Introduction to WAP.
Unit V: Intruders, Intrusion detection, password management, viruses and related threads, worms, trojan horse defense, difference biometrics and authentication system, firewall design principle.
References:-
J. Schiller, “Mobile Communication”, Addision , Wiley
William Stalling, “Wireless Communication and Network”, Pearson Education
Dr. Kamilo Feher, “Wireless Digital communication”, PHI
William C.Y Lee, “Mobile Communication Design Fundamental” , John Wiley.
Suggested List of Practicals:
To implement mobile network using open source softwares like NS2 etc.
Implement Code Division Multiple Access (CDMA).
To write a programme to implement concept of frequency reuse when given size of geographical area and the set of available frequencies.
Study of OPNET tool for modeling and simulation of different cellular standards.
Study and Analysis of wired network.
Study and Analysis of wireless network.
Study and Analysis of Bluetooth.
Study of Mobile IP.
Write programs using WML (Wireless Markup Language)
IT 7004(A) Elective –III Cyber Security & Forensics
Unit I- Cybercrimes and Attacks
Introduction, Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Cyber defamation, Industrial Spying/Industrial Espionage, Hacking, Software Piracy, Password Sniffing, Credit Card Frauds, Cyberstalking, Botnets, Phishing, Pharming, Man-in-the-Middle attack, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Malware, Ransomware, Types of Identity Theft, Techniques of ID Theft, Cyber terrorism, Browser Attacks, Reverse Engineering, Cross site scripting
Unit II-Cyber Security Concepts
Introduction to Cyber Security, Cyber Security Goals, Cyber Security policy, Domain of Cyber Security Policy, Elements, Cyber Security Evolution, Implementing Hardware Based Security, Software Based Firewalls, Security Standards, Assessing Threat Levels, Forming an Incident Response Team, Reporting Cybercrime, Difference between cyber forensics and cyber security
Unit III-Cyber Forensics Fundamentals
Introduction to cyber forensics, needs of cyber forensic, cyber forensic and digital evidences, Internet Fraud, Storage Fundamentals, File System Concepts, challenges in cyber forensic, Data and Evidence Recovery- Deleted File Recovery, Data Recovery Tools, Data Recovery Procedures and Ethics, Preserve and safely handle original media, Document a "Chain of Custody", Complete time line analysis of computer files based on file creation, file modification and file access, Recover Internet Usage Data, Recover Swap Files/Temporary Files/Cache Files, Introduction to Encase Forensic Edition, Forensic Tool Kit (FTK) etc,
Unit IV- Cyber Forensics Investigation Introduction to Cyber Forensic Investigation, Investigation Tools, e-Discovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Encryption and Decryption methods, Search and Seizure of Computers, Recovering deleted evidences, Password Cracking.
Unit V- Cyber Laws
Introduction to IT laws & Cyber Crimes, Cyber Laws, IPR, Legal System of Information Technology, Social Engineering,
Reference Books
Nina Godbole and Sunit Belpure , Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Wiley
Jennifer L. Bayuk, J. Healey, P. Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss Cyber Security Policy Guidebook, John Wiley & Sons 2012.
Vivek sood, Cyber law simplified, Tata Mc GrawHill, Education (India).
Eoghan Casey, Handbook of digital forensic and investigation.
Clint P Garrison, Digital forensic for network, internet and cloud computing.
Panagiotis Kandlis, Digital crime and forensic science in cyberspace, information society
S.A Greece IDEA Group Publishing.
IT 7004(B) Elective –III E-Commerce & Governance
Unit I: Introduction to e-commerce: History of e-commerce, e-business models B2B, B2C, C2C, C2B, legal; environment of e-commerce, ethical issues, electronic data interchange, value chain and supply chain, advantages and disadvantages of e-commerce.
Unit II: Electronic Payment Systems: Credit cards, debit cards, smart cards, e-credit accounts, e- money, Marketing on the web, marketing strategies, advertising on the web, customer service and support, introduction to m-commerce, case study: e-commerce in passenger air transport.
Unit III: E-Government, theoretical background of e-governance, issues in e-governance applications, evolution of e-governance, its scope and content, benefits and reasons for the introduction of e- governance, e-governance models- broadcasting, critical flow, comparative analysis, mobilization and lobbying, interactive services / G2C2G.
Unit IV: E-readiness, e-government readiness, E- Framework, step & issues, application of data warehousing and data mining in e-government, Case studies: NICNET-role of nation wide networking in egovernance, e-seva.
Unit V: E-Government systems security: Challenges and approach to e-government security, security concern in e-commerce, security for server computers, communication channel security, security for client computers.
References:-
Gary P. Schneider, “E-commerce”, Cengage Learning India.
C.S.R. Prabhu, “E-governence: concept and case study”, PHI Learning Private Limited.
V. Rajaraman, “Essentials of E-Commerce Technology”, PHI Learning Private Limited.
David Whiteley, “E-commerce study , technology and applications”, TMH.
J. Satyanarayan, “E-government: The science of the possible”, PHI Learning Private Limited.
P.T. Joseph, “E-Commerce An Indian Perspective”, PHI Learning Private Limited.
Hanson and Kalyanam, “E-Commerce and Web Marketing”, Cengage Learning India.
IT 7004 (C) Elective –III Simulation and Modeling
Unit I: PHYSICAL MODELING: Concept of system and environment, continuous and discrete system, linear and nonlinear system, stochastic activities, static and dynamic models, principles used in modeling, Basic simulation modeling, Role of simulation in model evaluation and studies, Advantages and Disadvantages of simulation. Modeling of systems, Iconic, analog and Mathematical Modeling.
Unit II: COMPUTER BASED SYSTM SIMULATION: Technique of simulation, Monte Carlo method, experimental nature of simulation, numerical computation techniques, calumnious system models, analog and hybrid simulation, feedback systems, Buildings simulation models- Financial Model for an office Building, Sensitivity analysis for office building Model.
Unit III: SYSTEM DYNAMICS MODELING: Identification of problem situation, Exponential Growth Model and Decay Model, Logistic Curve, System Dynamic Diagrams, Simulation of System Dynamics- Waiting Times in Single Server Queuing System.
Unit IV: PROBABILITY CONCEPTS IN SIMULATION: Stochastic variables, discrete and continuous probability functions, Distributed Random numbers, generation of random numbers-Uniform and Non Uniform Random numbers, variance reduction techniques-Introduction, Common Random numbers-Rationale, Applicability and Synchronization.
Unit V: SIMULATION SOFTWARE: Introduction, Comparison of Simulation Package with Programming Languages, Classification of Simulation Software, Desirable Software features, General Purpose Simulation Package-ARENA, EXTEND, Study of SIMULA, DYNAMO,
References:-
Gorden G., “System simulation”, Printice Hall.
Averill M Law “ Simulation Modeling and Analysis”, TMH
Seila, Ceric and Tadikamalla “ Applied Simulation Modeling”, Cengage Learning.
Severance, ” System Modelling & Simulation : An Introduction”,John Wiley
Payer T., “Introduction to system simulation”, McGraw Hill.
Allan Carrie, "Simulation and Modeling" McGraw Hill.
IT 7005 (A) Elective –IV Ad-hoc Networks
Unit I: Introduction :Introduction-Fundamentals of Wireless Communication Technology, The Electromagnetic Spectrum, GSM, GPRS, PCS, WLAN and UMTS, Components of Packet Radios,
Routing in PRNETs, Route calculation, Pacing techniques, Ad Hoc Wireless Networks, Heterogeneity in Mobile Devices, Wireless Sensor Networks, Traffic Profiles, Types of Ad Hoc Mobile Communications, Types of Mobile Host Movements, Challenges Facing Ad Hoc Mobile Networks.
Unit II: Ad Hoc wireless MAC protocols- Introduction, Synchronous and asynchronous MAC protocols, Problem in Ad Hoc channel access, Receiver-initiated and sender-initiated MAC protocols, Existing Ad Hoc MAC protocols, Ad Hoc Routing Protocols- Introduction, Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks, Classifications of Routing Protocols: Table-Driven Routing Protocols – Destination Sequenced Distance Vector (DSDV), Wireless Routing Protocol (WRP), Cluster Switch Gateway Routing (CSGR), Source-Initiated On-Demand Approaches - Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR), Temporally Ordered Routing Algorithm (TORA), Signal Stability Routing (SSR) Location- Aided Routing (LAR), Power-Aware Routing (PAR), Zone Routing Protocol (ZRP).
Unit III: Multicast routing In Ad Hoc Networks : Introduction, Issues in Designing a Multicast Routing Protocol, Operation of Multicast Routing Protocols, An Architecture Reference Model for Multicast Routing Protocols, Classifications of Multicast Routing Protocols, Tree-Based Multicast Routing Protocols, Mesh- Based Multicast Routing Protocols, Summary of Tree-and Mesh-Based Protocols - Energy-Efficient Multicasting, Multicasting with Quality of Service Guarantees, Application Dependent Multicast Routing, Comparisons of Multicast Routing Protocols.
Unit IV: Transport Layer, Security Protocols : Introduction, Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks, Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks, Classification of Transport Layer Solutions, TCP Over Ad Hoc Wireless Networks, Other Transport Layer Protocols for Ad Hoc Wireless Networks, Security in Ad Hoc Wireless Networks, Network Security Requirements, Issues and Challenges in Security Provisioning, Network Security Attacks, Key Management, Secure Routing in Ad Hoc Wireless Networks.
Unit V: QoS and Energy Management : Introduction, Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks, Classifications of QoS Solutions, MAC Layer Solutions, Network Layer
Solutions, QoS Frameworks for Ad Hoc Wireless Networks, Energy Management in Ad Hoc Wireless Networks – Introduction, Need for Energy Management in Ad Hoc Wireless Networks, Classification of Energy Management Schemes, Battery Management Schemes, Transmission
Power Management Schemes, System Power Management Schemes.
References Books:-
C. Siva Ram Murthy and B.S. Manoj “Ad Hoc Wireless Networks: Architectures and Protocols”, Pearson Education.
C.K. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems”, Pearson Education.
George Aggelou, “Mobile Wireless Networks”, Tata McGraw- Hill.
Charles E. Perkins, Ad Hoc Networking, Pearson Education.
IT 7005 (B)Elective –IV Artificial Intelligence
Unit I: Meaning and definition of artificial intelligence, Various types of production systems, Characteristics of production systems, Study and comparison of breadth first search and depth first search. Techniques, other Search Techniques like hill Climbing, Best first Search. A* algorithm, AO* algorithms etc, and various types of control strategies.
Unit II: Knowledge Representation, Problems in representing knowledge, knowledge representation using propositional and predicate logic, comparison of propositional and predicate logic, Resolution, refutation, deduction, theorem proving, inferencing, monotonic and nonmonotonic reasoning.
Unit III: Probabilistic reasoning, Baye's theorem, semantic networks, scripts, schemas, frames, conceptual dependency, fuzzy logic, forward and backward reasoning.
Unit IV: Game playing techniques like minimax procedure, alpha-beta cut-offs etc, planning, Study
of the block world problem in robotics, Introduction to understanding and natural languages processing.
Unit V: Introduction to learning, Various techniques used in learning, introduction to neural networks, applications of neural networks, common sense, reasoning, some example of expert systems.
References:-
Rich E and Knight K, “Artificial Intelligence”, TMH, New Delhi.
Nelsson N.J., “Principles of Artificial Intelligence”, Springer Verlag, Berlin.
IT 7005 (C)Elective –IV Embedded System
Unit I: Introduction to Embedded System, Categories, Requirements, Applications, Challenges and Issues. Core of Embedded system, Memory, Sensors and Actuators, communication interface, Embedded firmware, system components.
Unit II: Fundamental issues of hardware software co-design, computational models in embedded designdata flow graph, control flow graph, state machine model, sequential programmed model, concurrent model, unified modeling language.
Unit III: Architecture of 8085 microcontroller, memory organization, registers, interrupts, addressing modes, instruction sets.
Unit IV: Embedded firmware design approaches- OS based, Super loop based. Embedded firmware development languages- Assembly language based, high level language based, mixed. Programming in embedded C.
Unit V: Types of Operating system, Task, process and threads, Multi processing and multi task, Task scheduling, Task communication, Task synchronization.
References:-
Shibu K V, “Introduction to Embedded System”, TMH.
David E Simon, “An Embedded Software Primer”, Pearson education Asia, 2001.
Steven F. Barett, Daniel J. Pack, “Embedded Systems” Pearson education, First Impression 2008.
Vahid Frank, Tony Givargis, “Embedded System Design”, John Wiley and Sons, Inc.
Dream Tech Software Team, “Programming for Embedded Systems” Wiley Publishing house Inc.
Sriram V Iyer, Pankaj Gupta, “Embedded Real time Systems Programming”, TMH.
Raj Kamal, “Embedded Systems”, TMH.
=======
rgpv syllabus BE CBGS 7th Semester Microsoft Word - VII Sem IT _SY_
IT- 7001 – Cloud Computing
Unit-I
Introduction: Historical development ,Vision of Cloud Computing, Characteristics of cloud computing as per NIST , Cloud computing reference model ,Cloud computing environments, Cloud services requirements, Cloud and dynamic infrastructure, Cloud Adoption and rudiments .Overview of cloud applications: ECG Analysis in the cloud, Protein structure prediction, Gene Expression Data Analysis ,Satellite Image Processing ,CRM and ERP ,Social networking .
Unit-II
Cloud Computing Architecture: Cloud Reference Model, Types of Clouds, Cloud Interoperability & Standards, Scalability and Fault Tolerance,
Cloud Solutions: Cloud Ecosystem, Cloud Business Process Management, Cloud Service Management.
Cloud Offerings: Cloud Analytics, Testing Under Control, Virtual Desktop Infrastructure.
Unit –III
Cloud Management & Virtualization Technology: Resiliency, Provisioning, Asset management, Concepts of Map reduce , Cloud Governance, High Availability and Disaster Recovery. Virtualization: Fundamental concepts of compute ,storage, networking, desktop and application virtualization .Virtualization benefits, server virtualization, Block and file level storage virtualization Hypervisor management software, Infrastructure Requirements , Virtual LAN(VLAN) and Virtual SAN(VSAN) and their benefits .
Velte, “Cloud Computing- A Practical Approach” ,TMH Pub
Sosinsky, “ Cloud Computing” , Wiley Pub
IT- 7002 – Object Oriented Analysis and Design
Unit I: Overview of Object Oriented concepts: Objects and classes, abstraction, generalization and inheritance, encapsulation, multiple inheritance, aggregation abstraction classes, polymorphism, link and association, Need for object oriented approach
Unit II: System design life cycle, object oriented S/W development process model, Object Oriented Analysis, Object Modeling Technique (OMT): object model, function model, relationship among models, object diagrams, state diagrams, data flow diagrams, analysis.
Unit III: Object oriented Design: Overview of object design, Combination the models, Designing algorithms, design optimization, Implementation of control, Adjustment, Design of association, object representation, physical packaging, documenting design decision, comparison of use-case driven approach.
Unit IV: Translation Object Oriented design into implementation, Programming style, Documentation, characterization of object oriented languages, Comparison of object oriented language like C++, JAVA, object programming.
Unit V: Unified Modeling Language (UML): Class diagram sequence diagram Use case diagram, Collaboration, diagram, state, chart diagram, Activity diagram, component diagram, deployment diagram, Object oriented Database: Relational Vs .object oriented database, the architecture of object oriented database, query language for Object Oriented database.
References:-
Satzinger, Jackson and Burd, “Object oriented Analysis and design with the Unified Process”, CENGAGE Learning.
Michael Blaha and J. Rumbugh, “Object oriented Modeling and design with UML”, Pearson Education
O’Docherty, “Object Oriented Analysis and Design Understanding, System Development with UML2.0”, Wiley India.
List of Experiment:-
Ddraw Object, state, Data flow Diagram of ATM.
Draw Object, state, Data flow Diagram of Telephone Call.
Draw Object, state, Data flow Diagram of Library Information System.
Draw Object, state, Data flow Diagram of Airline reservation System.
Draw Object, state, Data flow Diagram of Calculator.
Draw Object, state, Data flow Diagram of College Management system.
Draw Object, state, Data flow Diagram of Payroll System.
Draw Object, state, Data flow Diagram of Railway Reservation system.
Draw Object, state, Data flow Diagram of Online Sales.
Draw Object, state, Data flow Diagram of Examination result display System of a University.
IT- 7003 – Wireless & Mobile Computing
Unit I: Antenna , radiation pattern, antenna types, antenna gain, propagation modes, types of fading. Model for wireless digital communication, multiple access technique-SDMA, TDMA, FDMA, CDMA, DAMA, PRMA, MAC/CA, Cellular network organization, operations of cellular system, mobile radio propogation effects, , handoff, power control, sectorization, traffic engineering, Infinite sources, lost calls cleared, grade of service, poison arrival process
Unit II: GSM- Services, system architecture, radio interface, logical channels, protocols, localization and calling, handover, security, HSCSD, GPRS-architecture, Interfaces, Channels, mobility management DECT, TETRA, UMTS.
Unit III: IEEE 802.11: LAN-architecture, 802.11 a, b and g, protocol architecture, physical layer, MAC layer , MAC management, HIPERLAN-protocol architecture, physical layer, access control sub layer, MAC sub layer. Bluetooth-user scenarios- physical layer, MAC layer.
Unit IV: Mobile IP, DHCP, Ad hoc networks: Characteristics, performance issue, routing in mobile host. Wireless sensor network, Mobile transport layer: Indirect TCP, Snooping TCP, Mobile TCP, Time out freezing, Selective retransmission, transaction oriented TCP. Introduction to WAP.
Unit V: Intruders, Intrusion detection, password management, viruses and related threads, worms, trojan horse defense, difference biometrics and authentication system, firewall design principle.
References:-
J. Schiller, “Mobile Communication”, Addision , Wiley
William Stalling, “Wireless Communication and Network”, Pearson Education
Dr. Kamilo Feher, “Wireless Digital communication”, PHI
William C.Y Lee, “Mobile Communication Design Fundamental” , John Wiley.
Suggested List of Practicals:
To implement mobile network using open source softwares like NS2 etc.
Implement Code Division Multiple Access (CDMA).
To write a programme to implement concept of frequency reuse when given size of geographical area and the set of available frequencies.
Study of OPNET tool for modeling and simulation of different cellular standards.
Study and Analysis of wired network.
Study and Analysis of wireless network.
Study and Analysis of Bluetooth.
Study of Mobile IP.
Write programs using WML (Wireless Markup Language)
IT 7004(A) Elective –III Cyber Security & Forensics
Unit I- Cybercrimes and Attacks
Introduction, Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Cyber defamation, Industrial Spying/Industrial Espionage, Hacking, Software Piracy, Password Sniffing, Credit Card Frauds, Cyberstalking, Botnets, Phishing, Pharming, Man-in-the-Middle attack, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Malware, Ransomware, Types of Identity Theft, Techniques of ID Theft, Cyber terrorism, Browser Attacks, Reverse Engineering, Cross site scripting
Unit II-Cyber Security Concepts
Introduction to Cyber Security, Cyber Security Goals, Cyber Security policy, Domain of Cyber Security Policy, Elements, Cyber Security Evolution, Implementing Hardware Based Security, Software Based Firewalls, Security Standards, Assessing Threat Levels, Forming an Incident Response Team, Reporting Cybercrime, Difference between cyber forensics and cyber security
Unit III-Cyber Forensics Fundamentals
Introduction to cyber forensics, needs of cyber forensic, cyber forensic and digital evidences, Internet Fraud, Storage Fundamentals, File System Concepts, challenges in cyber forensic, Data and Evidence Recovery- Deleted File Recovery, Data Recovery Tools, Data Recovery Procedures and Ethics, Preserve and safely handle original media, Document a "Chain of Custody", Complete time line analysis of computer files based on file creation, file modification and file access, Recover Internet Usage Data, Recover Swap Files/Temporary Files/Cache Files, Introduction to Encase Forensic Edition, Forensic Tool Kit (FTK) etc,
Unit IV- Cyber Forensics Investigation Introduction to Cyber Forensic Investigation, Investigation Tools, e-Discovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Encryption and Decryption methods, Search and Seizure of Computers, Recovering deleted evidences, Password Cracking.
Unit V- Cyber Laws
Introduction to IT laws & Cyber Crimes, Cyber Laws, IPR, Legal System of Information Technology, Social Engineering,
Reference Books
Nina Godbole and Sunit Belpure , Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Wiley
Jennifer L. Bayuk, J. Healey, P. Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss Cyber Security Policy Guidebook, John Wiley & Sons 2012.
Vivek sood, Cyber law simplified, Tata Mc GrawHill, Education (India).
Eoghan Casey, Handbook of digital forensic and investigation.
Clint P Garrison, Digital forensic for network, internet and cloud computing.
Panagiotis Kandlis, Digital crime and forensic science in cyberspace, information society
S.A Greece IDEA Group Publishing.
IT 7004(B) Elective –III E-Commerce & Governance
Unit I: Introduction to e-commerce: History of e-commerce, e-business models B2B, B2C, C2C, C2B, legal; environment of e-commerce, ethical issues, electronic data interchange, value chain and supply chain, advantages and disadvantages of e-commerce.
Unit II: Electronic Payment Systems: Credit cards, debit cards, smart cards, e-credit accounts, e- money, Marketing on the web, marketing strategies, advertising on the web, customer service and support, introduction to m-commerce, case study: e-commerce in passenger air transport.
Unit III: E-Government, theoretical background of e-governance, issues in e-governance applications, evolution of e-governance, its scope and content, benefits and reasons for the introduction of e- governance, e-governance models- broadcasting, critical flow, comparative analysis, mobilization and lobbying, interactive services / G2C2G.
Unit IV: E-readiness, e-government readiness, E- Framework, step & issues, application of data warehousing and data mining in e-government, Case studies: NICNET-role of nation wide networking in egovernance, e-seva.
Unit V: E-Government systems security: Challenges and approach to e-government security, security concern in e-commerce, security for server computers, communication channel security, security for client computers.
References:-
Gary P. Schneider, “E-commerce”, Cengage Learning India.
C.S.R. Prabhu, “E-governence: concept and case study”, PHI Learning Private Limited.
V. Rajaraman, “Essentials of E-Commerce Technology”, PHI Learning Private Limited.
David Whiteley, “E-commerce study , technology and applications”, TMH.
J. Satyanarayan, “E-government: The science of the possible”, PHI Learning Private Limited.
P.T. Joseph, “E-Commerce An Indian Perspective”, PHI Learning Private Limited.
Hanson and Kalyanam, “E-Commerce and Web Marketing”, Cengage Learning India.
IT 7004 (C) Elective –III Simulation and Modeling
Unit I: PHYSICAL MODELING: Concept of system and environment, continuous and discrete system, linear and nonlinear system, stochastic activities, static and dynamic models, principles used in modeling, Basic simulation modeling, Role of simulation in model evaluation and studies, Advantages and Disadvantages of simulation. Modeling of systems, Iconic, analog and Mathematical Modeling.
Unit II: COMPUTER BASED SYSTM SIMULATION: Technique of simulation, Monte Carlo method, experimental nature of simulation, numerical computation techniques, calumnious system models, analog and hybrid simulation, feedback systems, Buildings simulation models- Financial Model for an office Building, Sensitivity analysis for office building Model.
Unit III: SYSTEM DYNAMICS MODELING: Identification of problem situation, Exponential Growth Model and Decay Model, Logistic Curve, System Dynamic Diagrams, Simulation of System Dynamics- Waiting Times in Single Server Queuing System.
Unit IV: PROBABILITY CONCEPTS IN SIMULATION: Stochastic variables, discrete and continuous probability functions, Distributed Random numbers, generation of random numbers-Uniform and Non Uniform Random numbers, variance reduction techniques-Introduction, Common Random numbers-Rationale, Applicability and Synchronization.
Unit V: SIMULATION SOFTWARE: Introduction, Comparison of Simulation Package with Programming Languages, Classification of Simulation Software, Desirable Software features, General Purpose Simulation Package-ARENA, EXTEND, Study of SIMULA, DYNAMO,
References:-
Gorden G., “System simulation”, Printice Hall.
Averill M Law “ Simulation Modeling and Analysis”, TMH
Seila, Ceric and Tadikamalla “ Applied Simulation Modeling”, Cengage Learning.
Severance, ” System Modelling & Simulation : An Introduction”,John Wiley
Payer T., “Introduction to system simulation”, McGraw Hill.
Allan Carrie, "Simulation and Modeling" McGraw Hill.
IT 7005 (A) Elective –IV Ad-hoc Networks
Unit I: Introduction :Introduction-Fundamentals of Wireless Communication Technology, The Electromagnetic Spectrum, GSM, GPRS, PCS, WLAN and UMTS, Components of Packet Radios,
Routing in PRNETs, Route calculation, Pacing techniques, Ad Hoc Wireless Networks, Heterogeneity in Mobile Devices, Wireless Sensor Networks, Traffic Profiles, Types of Ad Hoc Mobile Communications, Types of Mobile Host Movements, Challenges Facing Ad Hoc Mobile Networks.
Unit II: Ad Hoc wireless MAC protocols- Introduction, Synchronous and asynchronous MAC protocols, Problem in Ad Hoc channel access, Receiver-initiated and sender-initiated MAC protocols, Existing Ad Hoc MAC protocols, Ad Hoc Routing Protocols- Introduction, Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks, Classifications of Routing Protocols: Table-Driven Routing Protocols – Destination Sequenced Distance Vector (DSDV), Wireless Routing Protocol (WRP), Cluster Switch Gateway Routing (CSGR), Source-Initiated On-Demand Approaches - Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR), Temporally Ordered Routing Algorithm (TORA), Signal Stability Routing (SSR) Location- Aided Routing (LAR), Power-Aware Routing (PAR), Zone Routing Protocol (ZRP).
Unit III: Multicast routing In Ad Hoc Networks : Introduction, Issues in Designing a Multicast Routing Protocol, Operation of Multicast Routing Protocols, An Architecture Reference Model for Multicast Routing Protocols, Classifications of Multicast Routing Protocols, Tree-Based Multicast Routing Protocols, Mesh- Based Multicast Routing Protocols, Summary of Tree-and Mesh-Based Protocols - Energy-Efficient Multicasting, Multicasting with Quality of Service Guarantees, Application Dependent Multicast Routing, Comparisons of Multicast Routing Protocols.
Unit IV: Transport Layer, Security Protocols : Introduction, Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks, Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks, Classification of Transport Layer Solutions, TCP Over Ad Hoc Wireless Networks, Other Transport Layer Protocols for Ad Hoc Wireless Networks, Security in Ad Hoc Wireless Networks, Network Security Requirements, Issues and Challenges in Security Provisioning, Network Security Attacks, Key Management, Secure Routing in Ad Hoc Wireless Networks.
Unit V: QoS and Energy Management : Introduction, Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks, Classifications of QoS Solutions, MAC Layer Solutions, Network Layer
Solutions, QoS Frameworks for Ad Hoc Wireless Networks, Energy Management in Ad Hoc Wireless Networks – Introduction, Need for Energy Management in Ad Hoc Wireless Networks, Classification of Energy Management Schemes, Battery Management Schemes, Transmission
Power Management Schemes, System Power Management Schemes.
References Books:-
C. Siva Ram Murthy and B.S. Manoj “Ad Hoc Wireless Networks: Architectures and Protocols”, Pearson Education.
C.K. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems”, Pearson Education.
George Aggelou, “Mobile Wireless Networks”, Tata McGraw- Hill.
Charles E. Perkins, Ad Hoc Networking, Pearson Education.
IT 7005 (B)Elective –IV Artificial Intelligence
Unit I: Meaning and definition of artificial intelligence, Various types of production systems, Characteristics of production systems, Study and comparison of breadth first search and depth first search. Techniques, other Search Techniques like hill Climbing, Best first Search. A* algorithm, AO* algorithms etc, and various types of control strategies.
Unit II: Knowledge Representation, Problems in representing knowledge, knowledge representation using propositional and predicate logic, comparison of propositional and predicate logic, Resolution, refutation, deduction, theorem proving, inferencing, monotonic and nonmonotonic reasoning.
Unit III: Probabilistic reasoning, Baye's theorem, semantic networks, scripts, schemas, frames, conceptual dependency, fuzzy logic, forward and backward reasoning.
Unit IV: Game playing techniques like minimax procedure, alpha-beta cut-offs etc, planning, Study
of the block world problem in robotics, Introduction to understanding and natural languages processing.
Unit V: Introduction to learning, Various techniques used in learning, introduction to neural networks, applications of neural networks, common sense, reasoning, some example of expert systems.
References:-
Rich E and Knight K, “Artificial Intelligence”, TMH, New Delhi.
Nelsson N.J., “Principles of Artificial Intelligence”, Springer Verlag, Berlin.
IT 7005 (C)Elective –IV Embedded System
Unit I: Introduction to Embedded System, Categories, Requirements, Applications, Challenges and Issues. Core of Embedded system, Memory, Sensors and Actuators, communication interface, Embedded firmware, system components.
Unit II: Fundamental issues of hardware software co-design, computational models in embedded designdata flow graph, control flow graph, state machine model, sequential programmed model, concurrent model, unified modeling language.
Unit III: Architecture of 8085 microcontroller, memory organization, registers, interrupts, addressing modes, instruction sets.
Unit IV: Embedded firmware design approaches- OS based, Super loop based. Embedded firmware development languages- Assembly language based, high level language based, mixed. Programming in embedded C.
Unit V: Types of Operating system, Task, process and threads, Multi processing and multi task, Task scheduling, Task communication, Task synchronization.
References:-
Shibu K V, “Introduction to Embedded System”, TMH.
David E Simon, “An Embedded Software Primer”, Pearson education Asia, 2001.
Steven F. Barett, Daniel J. Pack, “Embedded Systems” Pearson education, First Impression 2008.
Vahid Frank, Tony Givargis, “Embedded System Design”, John Wiley and Sons, Inc.
Dream Tech Software Team, “Programming for Embedded Systems” Wiley Publishing house Inc.
Sriram V Iyer, Pankaj Gupta, “Embedded Real time Systems Programming”, TMH.