HEAD
CS701 Compiler Design
Introduction of Compiler, Major data Structure in compiler, BOOT Strapping & Porting, Compiler structure: analysis-synthesis model of compilation, various phases of a compiler, Lexical analysis: Input buffering , Specification & Recognition of Tokens, LEX.
Syntax analysis: CFGs, Top down parsing, Brute force approach, recursive descent parsing, transformation on the grammars, predictive parsing, bottom up parsing, operator precedence parsing, LR parsers (SLR,LALR, LR),Parser generation.Syntax directed definitions: Construction of Syntax trees, Bottom up evaluation of S-attributed definition, L-attribute definition, Top down translation, Bottom Up evaluation of inherited attributes Recursive Evaluation, Analysis of Syntax directed definition.
Type checking: type system, specification of simple type checker, equivalence of expression, types, type conversion, overloading of functions and operations, polymorphic functions. Run time Environment: storage organization, Storage allocation strategies, parameter passing, dynamic storage allocation , Symbol table
Intermediate code generation: Declarations, Assignment statements, Boolean expressions, Case statements, Back patching, Procedure calls Code Generation: Issues in the design of code generator, Basic block and flow graphs, Register allocation and assignment, DAG representation of basic blocks, peephole optimization, generating code from DAG.
Introduction to Code optimization: sources of optimization of basic blocks, loops in flow graphs, dead code elimination, loop optimization, Introduction to global data flow analysis, Code Improving transformations ,Data flow analysis of structure flow graph Symbolic debugging of optimized code.
Develop a lexical analyzer to recognize a few patterns.
Write a programme to parse using Brute force technique of Topdown parsing.
Develop LL (1) parser (Construct parse table also).
Develop an operator precedence parser (Construct parse table also)
Develop a recursive descent parser
Write a program for generating for various intermediate code forms
Three address code ii) Polish notation
Write a program to simulate Heap storage allocation strategy
Generate Lexical analyzer using LEX
Generate YACC specification for a few syntactic categories.
Given any intermediate code form implement code optimization techniques
Study of an Object Oriented Compiler.
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools , Pearson Education
2 Raghavan, Compiler Design, TMH Pub.
Louden. Compiler Construction: Principles and Practice, Cengage Learning
A. C. Holub. Compiler Design in C , Prentice-Hall Inc., 1993.
Mak, writing compiler & Interpreters, Willey Pub.
CS702 Distributed System
Architecture for Distributed System, Goals of Distributed system, Hardware and Software concepts, Distributed Computing Model, Advantages & Disadvantage distributed system, Issues in designing Distributed System,
Basic Concept of Distributed Share Memory (DSM), DSM Architecture & its Types, Design & Implementations issues In DSM System, Structure of Share Memory Space, Consistency Model, and Thrashing. Desirable features of good Distributed File System, File Model, File Service Architecture, File Accessing Model, File Sharing Semantics, File Catching Scheme, File Application & Fault tolerance. Naming: - Features, System Oriented Names, Object Locating Mechanism, Human Oriented Name.
API for Internet Protocol, Data Representation & Marshaling, Group Communication, Client Server Communication, RPC- Implementing RPC Mechanism, Stub Generation, RPC Messages. Synchronization: - Clock Synchronization, Mutual Exclusion, Election Algorithms:- Bully & Ring Algorithms.
Distributed Scheduling-Issues in Load Distributing, Components for Load Distributing Algorithms, Different Types of Load Distributing Algorithms, Task Migration and its issues. Deadlock-Issues in deadlock detection & Resolutions, Deadlock Handling Strategy, Distributed Deadlock Algorithms,
Distributed Data Base Management System(DDBMS), Types of Distributed Database, Distributed Multimedia:- Characteristics of multimedia Data, Quality of Service Managements. Case Study of Distributed System:- Amoeba, Mach, Chorus
Sinha, Distributed Operating System Concept & Design, PHI
Coulouris & Dollimore, Distributed System Concepts and Design, Pearson Pub
Singhal & Shivratari, Advance Concept in Operating System, McGraw Hill
Attiya & Welch, Distributed Computing, Wiley Pub.
Introduction to Storage Technology: Data proliferation, evolution of various storage technologies, Overview of storage infrastructure components, Information Lifecycle Management, Data categorization.
Storage Systems Architecture: Intelligent disk subsystems overview, Contrast of integrated vs. modular arrays, Component architecture of intelligent disk subsystems, Disk physical structure components, properties, performance, and specifications, RAID levels & parity algorithms, hot sparing, Front end to host storage provisioning, mapping and operation.
Introduction to Networked Storage: JBOD, DAS, NAS, SAN & CAS evolution and comparision. Applications, Elements, connectivity, standards, management, security and limitations of DAS, NAS, CAS & SAN.
Hybrid Storage solutions; Virtualization: Memory, network, server, storage & appliances. Data center concepts & requirements, Backup & Disaster Recovery: Principles
Managing & Monitoring: Industry management standards (SNMP, SMI-S, CIM), standard framework applications, Key management metrics (Thresholds, availability, capacity, security, performance).
Information storage on cloud :Concept of Cloud, Cloud Computing, storage on Cloud, Cloud Vocabulary, Architectural Framework, Cloud benefits, Cloud computing Evolution, Applications & services on cloud, Cloud service providers and Models, Essential characteristics of cloud computing, Cloud Security and integration.
G. Somasundaram & Alok Shrivastava (EMC Education Services) editors; Information Storage and Management: Storing, Managing, and Protecting Digital Information; Wiley India.
Ulf Troppens, Wolfgang Mueller-Friedt, Rainer Erkens, Rainer Wolafka, Nils Haustein; Storage Network explained : Basic and application of fiber channels, SAN, NAS, iSESI, INFINIBAND and FCOE, Wiley India.
John W. Rittinghouse and James F. Ransome; Cloud Computing : Implementation , Management and Security, CRC Press, Taylor Frances Pub.
Nick Antonopoulos, Lee Gillam; Cloud Computing : Principles, System & Application, Springer.
Anthony T. Velete, Toby J.Velk, and Robert Eltenpeter, Cloud Computing : A practical Approach, TMH Pub.
Saurabh , Cloud Computing : Insight into New Era Infrastructure, Wiley India.
Sosinsky, Cloud Computing Bible, Wiley India.
Course: CS 7101 Network Management
Introduction to Network Managements, Network Management Framework, Network Based Managements, Evolution of Network Management: SGMP, CMIP, SNMP. Network Implementation and Management Strategies, Network Management Categories: Performance Management, Fault Management, Configuration Management, Security Managements, Accounting Managements. Network Management Configuration: Centralized Configuration, Distributed Configuration. Selected Management Strategy.
Management Information Base (MIB), Structure of Management Information, NMS Presentation of the SMI, NMS Meter-ware Network View. Remote Monitoring (RMON), RMON Group. Desktop Management: Desktop Management Interface(DMI), DMI Architecture, DMI Browser, DMI/SNMP Mapping, Desktop SNMP Extension Agents. Setting up LAN Access, SNMP Configuration.
Introduction, layering, OSI Layering, TCP/IP Layering, Protocols & Standards, Internet standards, Internet administration, Internet Addresses, Internet protocol: introduction, IP header, IP routing, subnet addressing, subnet mask, special case of IP addresses, Comparative Study of IPV4 & IPV6, port numbers Address Resolution Protocol, ARP packet format, Proxy ARP, ARP command, ARP Example, Reverse Address Resolution Protocol (RARP): Introduction, RARP Packet format, RARP Examples, RARP server design
Delivery and Routing of IP Packets, Routing Methods, Static versus Dynamic Routing, Routing table and Routing Module, Classless Addressing: CIDR. Internet Protocol (IP), Datagram, Fragmentation, Options, IP Package. Interior and Exterior Routing, Routing information protocol (RIP), Open shortest path first protocol (OSPF), BGP, GGP. Private Networks. Virtual Private Network (VPN), Network Address Translation (NAT). Unit –V
Internet Control Message Protocols (ICMP):- Types of message, message format, error reporting, query, checksum, ICMP Package. IGMP, IGMP Message and its Operation, IGMP Package.Transmission control protocol, Process-to-Process Communication, TCP Services Flow Control, TCP Timers. TCP Operation, TCP Package.. Application layers protocol, Telnet Protocol, File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), X-Window system protocol, Remote procedure call, and Network file system.
Forouzan, TCP/IP Protocol Suite 4th edition, TMH
J.Richard Burkey, Network Management Concept and Practice, PHI
Stevens, TCP/IP Illustrated Volume-I, Pearson
Tittel: TCP/IP, Cenage Learning
Uyless Black, TCP/IP and related protocols, McGraw Hill.
Doughals E. Comer, Internetworking with TCP/IP Vol. I, Principles, Protocols, and Architecture, Prentice Hall, India.
CS 7102 Real Time Fault Tolerant Systems
Unit-I
Structure of Real Time System, Performance Measure for real time system, Task Assignments,Fault Tolerant Scheduling, Real Time Vs General purpose Data Bases, Data Bases for Hard Real Time System, Real Time Communication
Unit-II
Fault Tolerance, Fault-Error-Failure. Redundancy, Error Detection, Damage Confinement, Error Recovery, Fault Treatment, Fault Prevention, anticipated and unanticipated Faults. Error models: General coding scheme Error detection techniques: Watchdog processors, Heartbeats, consistency and capability checking, Data audits, Assertions, Control-flow checking, Error control coding. Application: DHCP
Unit-III
Fault tolerance: Coding technique-fault tolerant self checking and fail safe circuits-fault tolerance in combinatorial and sequential circuits- synchronous and asynchronous fail safe circuits. Software fault tolerance: Process pairs, robust data structures, N version programming, Recovery blocks, Replica consistency & reintegration, multithreaded programs Application: VAX. Network fault tolerance: Reliable communication protocols, Agreement protocols, Database commit protocols -Application: Distributed SQL server Check pointing & Recovery - Application: Micro check pointing, IRIX Checkpoints
Unit-IV
Experimental Evaluation: Modelling and simulation based, Fault injection based - Application: NFTAPE fault injector . Modelling for performance, dependability and perform ability: dependability-specific methods (fault trees, reliability block diagrams), queues, stochastic Petri nets and stochastic activity networks - Application: Ultra SAN
Unit-V
Practical Systems for Fault Tolerance: - Application: Ad-hoc wireless network - Application: NASA Remote Exploration & Experimentation System Architecture: Fault tolerant computers - general purpose commercial systems-fault tolerant multiprocessor and VLSI based communication architecture. Fault tolerant software: Design-N-version programming recovery block - acceptance tests-fault trees- validation of fault tolerant systems.
REFERENCES :-
K.K.Pradhan, “Fault Tolerant computing theory and techniques” volume III. Prentice Hall,1989.
Krishna, Real Time System, TMH
Anderson and Lee, “Fault Tolerant principles and practice” ,PHI 1989.
Siewert, Real Time Embeded System, Cengage Learning.
Rajiv Mall, Real Time System, Pearson Edu.
Parag K. Lala, “Fault Tolerant and Fault Testable, Hardware design” PHI 1985.
Shem , toy Levei , Ashok K.Agarwala , “Fault Tolerant System design”, Tata McGraw Hill
CS 7103 Embedded Computer Systems
Unit – I
Introduction to Embedded systems
Embedded Systems Vs General Computing Systems, Classification of Embedded Systems, Major application areas of Embedded Systems, Purpose of Embedded systems ,Core of the Embedded system, Memory, Sensors and Actuators, Communication Interface, Embedded firmware, PCB and Passive Components, Characteristics and Quality attributes of a Embedded System .
Unit – II
Design of Embedded Systems with 8bit Microcontrollers-8051
Factors for considering in selecting a Controller ,Designing with 8051 microcontroller Different addressing modes supported by 8051 , Instruction set for 8051 microcontroller. Fundamental issues in Hardware Software Co-Design , Computational models in Embedded Design .
Unit – III
Embedded Hardware & Firmware Design and Development
Analog &Digital Electronic components, VLSI & Integrated circuit design, Electronic Design Automation tools , PCB layout Design and its fabrication
.Embedded firmware design approaches , Embedded firmware Development Languages ,Programming in Embedded C . Integration and testing of Embedded Hardware and Firmware , Safe & robust Design, Reliability, Faults, errors & Failure, Functional Design, Architecture Design, Prototyping.
Unit -IV
Embedded System Development Environment
Integrated Development Environment (IDE) , Types of files Generated on Cross- Compilation , Disassembler / Decompiler, Simulators, Emulators and Debugging, Boundary Scan.
Unit – V
Embedded Product Development Lifecycle(EDLC) and Trends in Embedded Industry
What is EDLC ,Objectives of EDLC , Different phases of EDLC , EDLC Approaches-Linear or waterfall model , Iterative Model , Prototyping/Evolutionary Model, Spiral Model . Processor trends in Industry , Embedded OS Trends , Development Language trends Open Standards, Frameworks and Alliances , Bottlenecks.
References:
Shibu, Introduction to Embedded System:, TMH
Barrett ,Embedded Systems :Design and Applications ,Pearson Education
Rajkamal, Embeded System, TMH
Vahid ,Givargis ,Embedded System Design ,Wiley
Balbno, Embedded Micro Computer System Cengage Learning
Siewert, Real Time Embeded System & Components, Cengage Learning
Peckol, Embeded System, Willey Indi
CS 7201 Network & Web Security
Introduction to Network Security, Computer Securit y and Cyber Security. Security Terminologies and Principle, Security Threats, Types of attacks (Operating System, application level, Shrink Wrap code, Misconfiguration attacks etc.). Introduction to Intrusion, Terminologies, Intrusion Detection System (IDS), Types of Intrusion Detection Systems, System Integrity Verifiers (SIVS).Indication of Intrusion: System Indications, File System Indications Network Indications. Intrusion Detection Tools ,Post attack IDS Measures & Evading IDS Systems. Penetration Testing, Categories of security assessments, Vulnerability Assessment, Types of Penetration Testing. Risk Management.
Cryptography, Classical Cryptographic Techniques, Encryption, Decryption, Code Breaking: Methodologies, Cryptanalysis, Cryptography Attacks, Brute-Force Attack, Use of Cryptography. Public key cryptography, Principles of Public key Cryptosystems, Cryptographic Algorithms RSA, Data Encryption Standard (DES), RC4, RC5, RC6, Blowfish, Key Management, Diffie-Hellman key exchange, elliptic curve cryptography.
Hash Functions, One-way Hash Functions, SHA (Secure Hash Algorithm), Authentication Requirements, Authentication Functions, Kerberos. Message Authentication codes ,Message Digest Functions, MD5, SSL (Secure Sockets Layer), SSH (Secure Shell), Algorithms and Security, Disk Encryption, Government Access to Keys (GAK)
IP Security, Web Security, Firewalls: Types, Operation, Design Principles, Trusted Systems. Computer Forensics, Need, Objectives,Stages & Steps of Forensic Investigation in Tracking Cyber Criminals, Incident Handling.
Hacking, Classes of Hacker (Black hats, grey hats, white hats, suicide hackers), Footprinting, Scanning (Types-Port, Network, Vulnerability), E-Mail Spiders, Overview of System Hacking Cycle.
Footprinting using footprinting tools(Open Source & Free)(ex-nslookup, ARIN, Whois, Google Earth etc..)
Scanning for vulnerabilities using (Angry IP, HPing2, IPScanner, Global Network Inventory Scanner, Net Tools Suite Pack.)
NetBIOS Enumeration Using NetView Tool, Nbtstat Enumeration Tool (Open Source).
Steganography using tools: Tool: Merge Streams, Image Hide, Stealth Files, Blindside, STools, Steghide, Steganos, Pretty Good Envelop, Stegdetect,.
Steganalysis - Stego Watch- Stego Detection Tool, StegSpy.
How to Detect Trojans by using – Netstat, fPort, TCPView, CurrPorts Tool, Process Viewer.
Lan Scanner using look@LAN, wireshark.
Understanding DoS Attack Tools- Jolt2 , Bubonic.c, Land and LaTierra, Targa, Nemesy Blast, Panther2, Crazy Pinger, Some Trouble, UDP Flood, FSMax.
William Stallings, “Cryptography and Network Security: Principles and Practice” Pearson
Charlie Kaufman, Radia Perlman, Mike Speciner, Michael Speciner, “ Network Security -
Private communication in a public world” TMH
Fourozon, “Cryptography & Network Security” TMH
Joseph Migga Kizza, Computer Network Security, , Springer International Edition
Atul Kahate,”Cryptography and Network Security” Mc Graw Hill
Carl Endorf, Eugene Schultz, Jim Mellander “INTRUSION DETECTION & PREVENSION” TMH
Neal, Krawetz, Introduction to Network Security,Cengage Learning
CS 7202 Simulation and Modeling
Unit-I
Nature of Simulation. Systems , Models and Simulation, Continuous and Discrete Systems, system modeling, concept of simulation, Components of a simulation study, Principles used in modeling Static and Dynamic physical models, Static and Dynamic Mathematical models Introduction to Static and Dynamic System simulation , Advantages ,Disadvantages and pitfalls of Simulation.
Types of System Simulation, Monte Carlo Method, Comparision of analytical and Simulation methods, Numerical Computation techniques for Continuous and Discrete Models, Distributed Lag Models, Cobweb Model.
Continuous System models, Analog and Hybrid computers, Digital-Analog Simulators, Continuous system simulation languages ,Hybrid simulation ,Real Time simulations.
Exponential growth and decay models, logistic curves ,Generalization of growth models , System dynamics diagrams, Multi segment models , Representation of Time Delays. Discrete and Continuous probability functions, Continuous Uniformly Distributed Random Numbers, Generation of a Random numbers, Generating Discrete distributions, Non-Uniform Continuously Distributed Random Numbers, Rejection Method.
Poisson arrival patterns, Exponential distribution, Service times, Normal Distribution Queuing Disciplines, Simulation of single and two server queue. Application of queuing theory in computer system. Discrete Events ,Generation of arrival patterns, Simulation programming tasks, Gathering statistics, Measuring occupancy and Utilization, Recording Distributions and Transit times .
GPSS: Action times, Succession of events, Choice of paths, Conditional transfers, program control statements . SIMSCRIPT: Organization of SIMSCRIPT Program, Names & Labels, SIMSCRIPT statements . Estimation methods , Relication of Runs, Batch Means , Regenerative techniques , Time Series Analysis , Spectral Analysis and Autoregressive Processes.
Simulate CPU scheduling algorithm using queueing system
a) FCFS b) SJF c) Priority Algo
Simulate multiplexer/concentrator using queuing system
Simulate congestion control algorithms.
Simulate disk scheduling algorithms.
Simulate a Manufacturing shop and write a program in GPSS.
Simulate Telephone system model and write a program in SIMSCRIPT.
Gorden G., System simulation, Prentice Hall.
Seila, Simulation Modeling, Cengage Learning
Law .,Simulation Modeling And Analysis, McGraw Hill
Deo, System Simulation with Digital Computer, PHI
Harrington, Simulation Modeling methods, McGraw Hill
Severance, “ System Modeling & Simulation, Willey Pub
CS 7203 Data Mining & Knowledge Discovery
Unit-I
Introduction, to Data warehousing, needs for developing data Warehouse, Data warehouse systems and its Components, Design of Data Warehouse, Dimension and Measures, Data Marts:-Dependent Data Marts, Independents Data Marts & Distributed Data Marts, Conceptual Modeling of Data Warehouses:-Star Schema, Snowflake Schema, Fact Constellations.
Multidimensional Data Model & Aggregates.
Unit-II
OLAP, Characteristics of OLAP System, Motivation for using OLAP, Multidimensional View and Data Cube, Data Cube Implementations, Data Cube Operations, Guidelines for OLAP Implementation, Difference between OLAP & OLTP, OLAP Servers:-ROLAP, MOLAP, HOLAP Queries.
UNIT-III
Introduction to Data Mining, Knowledge Discovery, Data Mining Functionalities, Data Mining System categorization and its Issues. Data Processing :- Data Cleaning, Data Integration and Transformation. Data Reduction, Data Mining Statistics. Guidelines for Successful Data Mining.
Unit-IV
Association Rule Mining:-Introduction, Basic, The Task and a Naïve Algorithm, Apriori Algorithms, Improving the efficiency of the Apriori Algorithm, Apriori-Tid, Direct Hasing and Pruning(DHP),Dynamic Itemset Counting (DIC), Mining Frequent Patterns without Candidate Generation(FP-Growth),Performance Evaluation of Algorithms,.
Unit-V
Classification:-Introduction, Decision Tree, The Tree Induction Algorithm, Split Algorithms Based on Information Theory, Split Algorithm Based on the Gini Index, Overfitting and Pruning, Decision Trees Rules, Naïve Bayes Method.
Cluster Analysis:- Introduction, Desired Features of Cluster Analysis, Types of Cluster Analysis Methods:- Partitional Methods, Hierarchical Methods, Density- Based Methods, Dealing with Large Databases. Quality and Validity of Cluster Analysis Methods.
References:
Berson: Data Warehousing & Data Mining &OLAP , TMH
Jiawei Han and Micheline Kamber, Data Mining Concepts & Techniques, Elsevier Pub.
Arun.K.Pujari, Data Mining Techniques, University Press.
N.P Gopalan: Data Mining Technique & Trend, PHI
Hand, Mannila & Smith: Principle of Data Mining, PHI
Tan, Introduction to Data Mining, Pearson Pub.
Duration: 6 weeks after the VI semester in the summer break, Assessment in VII semester.
For the assessment of industrial training undertaken by the students, following components are considered with their weightage.
Term work
In Industry Marks allotted
Attendance and General Discipline 10
Daily diary Maintenance 10
Initiative and participative attitude during training 10
Assessment of training by Industrial Supervisor 20 TOTAL 50
Practical/Oral Examination (Viva-Voce) In Institution Marks allotted
Training Report 25
Seminar and cross questioning (defense) 25
TOTAL 50
Marks of various components in industry should be awarded to the students, in consultations with the
Training and Placement Officer/Faculty of Institute and I/c of training from Industry. During training students will prepare a first draft of training report in consultation with section in-charge. After training they will prepare final draft with the help of T.P.O./Faculty of the institute. Then they will present a seminar on their training and they will face viva-voce on training in the institute.
The objective of undertaking industrial training is to provide work experience so that student’s engineering knowledge is enhanced and employment prospects are improved. The student should take this course as a window to the real World of Work and should try to learn as much as possible from real life experiences by involving and interacting with industry staff. Industrial training also provides an opportunity to students to select an engineering problem and possibly an industry guide for their Major Project in final semester.
Industrial training of the students is essential to bridge the wide gap between the classroom and industrial environment. This will enrich their practical learning and they will be better equipped to integrate the practical experiences with the classroom learning process.
During industrial training students must observe following to enrich their learning:
Industrial environment and work culture.
Organisational structure and inter personal communication.
Machines/ equipment/ instruments - their working and specifications.
Product development procedures and phases.
Project planning, monitoring and control.
Quality control and assurance.
Maintenance system.
Costing system.
Stores and purchase systems.
Layout of Computer/ EDP/MIS centres.
Roles and responsibilities of different categories of personnel.
Customer services.
Problems related to various areas of Work etc.
Faculty and TPO are supposed to plan industrial training in such a manner that students get exposure on most of the above arena in the field (world of work). Students are supposed to acquire the knowledge on
above by -
Observation,
Interaction with officials at the workplace
Study of Literature at the workplace (e.g. User Manual, standards, maintenance schedules, etc.)
"Hand's on" experience
Undertaking / assisting project work.
Solving problems at the work place.
Presenting a seminar.
Participating in-group meeting/ discussion.
Gathering primary and secondary data/ information through various sources, Storage, retrieval and analysis of the gathered data.
Assisting officials and managers in their working.
Undertaking a short action research work.
Consulting current technical journals and periodicals in the library.
Discussions with peers.
1.2 GUIDANCE TO THE FACULTY/TPO FOR PLANNING AND IMPLEMENTING THE INDUSTRIAL TRAINING
The industrial training programme, which is spread to 6 weeks’ duration, has to be designed in consultation with the authorities of the work place, keeping in view the need of the contents. Following are some of the salient points:
Spelling out the objectives of the industrial training in behavioral terms and same is informed in advance to the 1) students, 2) authorities of the work place and 3) supervising faculty members.
Discussing and preparing students for the training for which meetings with the students has to be planned.
Meeting with industrial personnel and orienting them regarding the objective of the training and the expectations of the programme.
Correspondence with the authorities of the work place.
Orientation classes for students on how to make the training most beneficial - monitoring daily diary, writing weekly reports, how to interact with various categories of industrial personnel, how to behave and undertake responsibilities, how to gather information from the workplace, ethics etc.
Guiding students to make individual plans (week wise/ day wise) to undertake industrial training
Developing a system of maintaining training records, by teachers for every batch of students for
convenient retrieval.
Inviting industrial personnel to deliver lectures on some aspects of training.
S.No. Activity Commencing Week Finishing week Remarks
Meeting with Principal
Meeting with Colleagues
Correspondence with work place (Industries concerned)
Meeting with authorities of work place
Orientation of students for industrial training
Scrutinizing individual training plan of students
Commencement of industrial training
First monitoring of industrial training
Second monitoring of industrial training
Finalization of Training report
Evaluation of performance at Industry level
Evaluation of industrial programme in the institution.
CS701 Compiler Design
Introduction of Compiler, Major data Structure in compiler, BOOT Strapping & Porting, Compiler structure: analysis-synthesis model of compilation, various phases of a compiler, Lexical analysis: Input buffering , Specification & Recognition of Tokens, LEX.
Syntax analysis: CFGs, Top down parsing, Brute force approach, recursive descent parsing, transformation on the grammars, predictive parsing, bottom up parsing, operator precedence parsing, LR parsers (SLR,LALR, LR),Parser generation.Syntax directed definitions: Construction of Syntax trees, Bottom up evaluation of S-attributed definition, L-attribute definition, Top down translation, Bottom Up evaluation of inherited attributes Recursive Evaluation, Analysis of Syntax directed definition.
Type checking: type system, specification of simple type checker, equivalence of expression, types, type conversion, overloading of functions and operations, polymorphic functions. Run time Environment: storage organization, Storage allocation strategies, parameter passing, dynamic storage allocation , Symbol table
Intermediate code generation: Declarations, Assignment statements, Boolean expressions, Case statements, Back patching, Procedure calls Code Generation: Issues in the design of code generator, Basic block and flow graphs, Register allocation and assignment, DAG representation of basic blocks, peephole optimization, generating code from DAG.
Introduction to Code optimization: sources of optimization of basic blocks, loops in flow graphs, dead code elimination, loop optimization, Introduction to global data flow analysis, Code Improving transformations ,Data flow analysis of structure flow graph Symbolic debugging of optimized code.
Develop a lexical analyzer to recognize a few patterns.
Write a programme to parse using Brute force technique of Topdown parsing.
Develop LL (1) parser (Construct parse table also).
Develop an operator precedence parser (Construct parse table also)
Develop a recursive descent parser
Write a program for generating for various intermediate code forms
Three address code ii) Polish notation
Write a program to simulate Heap storage allocation strategy
Generate Lexical analyzer using LEX
Generate YACC specification for a few syntactic categories.
Given any intermediate code form implement code optimization techniques
Study of an Object Oriented Compiler.
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools , Pearson Education
2 Raghavan, Compiler Design, TMH Pub.
Louden. Compiler Construction: Principles and Practice, Cengage Learning
A. C. Holub. Compiler Design in C , Prentice-Hall Inc., 1993.
Mak, writing compiler & Interpreters, Willey Pub.
CS702 Distributed System
Architecture for Distributed System, Goals of Distributed system, Hardware and Software concepts, Distributed Computing Model, Advantages & Disadvantage distributed system, Issues in designing Distributed System,
Basic Concept of Distributed Share Memory (DSM), DSM Architecture & its Types, Design & Implementations issues In DSM System, Structure of Share Memory Space, Consistency Model, and Thrashing. Desirable features of good Distributed File System, File Model, File Service Architecture, File Accessing Model, File Sharing Semantics, File Catching Scheme, File Application & Fault tolerance. Naming: - Features, System Oriented Names, Object Locating Mechanism, Human Oriented Name.
API for Internet Protocol, Data Representation & Marshaling, Group Communication, Client Server Communication, RPC- Implementing RPC Mechanism, Stub Generation, RPC Messages. Synchronization: - Clock Synchronization, Mutual Exclusion, Election Algorithms:- Bully & Ring Algorithms.
Distributed Scheduling-Issues in Load Distributing, Components for Load Distributing Algorithms, Different Types of Load Distributing Algorithms, Task Migration and its issues. Deadlock-Issues in deadlock detection & Resolutions, Deadlock Handling Strategy, Distributed Deadlock Algorithms,
Distributed Data Base Management System(DDBMS), Types of Distributed Database, Distributed Multimedia:- Characteristics of multimedia Data, Quality of Service Managements. Case Study of Distributed System:- Amoeba, Mach, Chorus
Sinha, Distributed Operating System Concept & Design, PHI
Coulouris & Dollimore, Distributed System Concepts and Design, Pearson Pub
Singhal & Shivratari, Advance Concept in Operating System, McGraw Hill
Attiya & Welch, Distributed Computing, Wiley Pub.
Introduction to Storage Technology: Data proliferation, evolution of various storage technologies, Overview of storage infrastructure components, Information Lifecycle Management, Data categorization.
Storage Systems Architecture: Intelligent disk subsystems overview, Contrast of integrated vs. modular arrays, Component architecture of intelligent disk subsystems, Disk physical structure components, properties, performance, and specifications, RAID levels & parity algorithms, hot sparing, Front end to host storage provisioning, mapping and operation.
Introduction to Networked Storage: JBOD, DAS, NAS, SAN & CAS evolution and comparision. Applications, Elements, connectivity, standards, management, security and limitations of DAS, NAS, CAS & SAN.
Hybrid Storage solutions; Virtualization: Memory, network, server, storage & appliances. Data center concepts & requirements, Backup & Disaster Recovery: Principles
Managing & Monitoring: Industry management standards (SNMP, SMI-S, CIM), standard framework applications, Key management metrics (Thresholds, availability, capacity, security, performance).
Information storage on cloud :Concept of Cloud, Cloud Computing, storage on Cloud, Cloud Vocabulary, Architectural Framework, Cloud benefits, Cloud computing Evolution, Applications & services on cloud, Cloud service providers and Models, Essential characteristics of cloud computing, Cloud Security and integration.
G. Somasundaram & Alok Shrivastava (EMC Education Services) editors; Information Storage and Management: Storing, Managing, and Protecting Digital Information; Wiley India.
Ulf Troppens, Wolfgang Mueller-Friedt, Rainer Erkens, Rainer Wolafka, Nils Haustein; Storage Network explained : Basic and application of fiber channels, SAN, NAS, iSESI, INFINIBAND and FCOE, Wiley India.
John W. Rittinghouse and James F. Ransome; Cloud Computing : Implementation , Management and Security, CRC Press, Taylor Frances Pub.
Nick Antonopoulos, Lee Gillam; Cloud Computing : Principles, System & Application, Springer.
Anthony T. Velete, Toby J.Velk, and Robert Eltenpeter, Cloud Computing : A practical Approach, TMH Pub.
Saurabh , Cloud Computing : Insight into New Era Infrastructure, Wiley India.
Sosinsky, Cloud Computing Bible, Wiley India.
Course: CS 7101 Network Management
Introduction to Network Managements, Network Management Framework, Network Based Managements, Evolution of Network Management: SGMP, CMIP, SNMP. Network Implementation and Management Strategies, Network Management Categories: Performance Management, Fault Management, Configuration Management, Security Managements, Accounting Managements. Network Management Configuration: Centralized Configuration, Distributed Configuration. Selected Management Strategy.
Management Information Base (MIB), Structure of Management Information, NMS Presentation of the SMI, NMS Meter-ware Network View. Remote Monitoring (RMON), RMON Group. Desktop Management: Desktop Management Interface(DMI), DMI Architecture, DMI Browser, DMI/SNMP Mapping, Desktop SNMP Extension Agents. Setting up LAN Access, SNMP Configuration.
Introduction, layering, OSI Layering, TCP/IP Layering, Protocols & Standards, Internet standards, Internet administration, Internet Addresses, Internet protocol: introduction, IP header, IP routing, subnet addressing, subnet mask, special case of IP addresses, Comparative Study of IPV4 & IPV6, port numbers Address Resolution Protocol, ARP packet format, Proxy ARP, ARP command, ARP Example, Reverse Address Resolution Protocol (RARP): Introduction, RARP Packet format, RARP Examples, RARP server design
Delivery and Routing of IP Packets, Routing Methods, Static versus Dynamic Routing, Routing table and Routing Module, Classless Addressing: CIDR. Internet Protocol (IP), Datagram, Fragmentation, Options, IP Package. Interior and Exterior Routing, Routing information protocol (RIP), Open shortest path first protocol (OSPF), BGP, GGP. Private Networks. Virtual Private Network (VPN), Network Address Translation (NAT). Unit –V
Internet Control Message Protocols (ICMP):- Types of message, message format, error reporting, query, checksum, ICMP Package. IGMP, IGMP Message and its Operation, IGMP Package.Transmission control protocol, Process-to-Process Communication, TCP Services Flow Control, TCP Timers. TCP Operation, TCP Package.. Application layers protocol, Telnet Protocol, File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), X-Window system protocol, Remote procedure call, and Network file system.
Forouzan, TCP/IP Protocol Suite 4th edition, TMH
J.Richard Burkey, Network Management Concept and Practice, PHI
Stevens, TCP/IP Illustrated Volume-I, Pearson
Tittel: TCP/IP, Cenage Learning
Uyless Black, TCP/IP and related protocols, McGraw Hill.
Doughals E. Comer, Internetworking with TCP/IP Vol. I, Principles, Protocols, and Architecture, Prentice Hall, India.
CS 7102 Real Time Fault Tolerant Systems
Unit-I
Structure of Real Time System, Performance Measure for real time system, Task Assignments,Fault Tolerant Scheduling, Real Time Vs General purpose Data Bases, Data Bases for Hard Real Time System, Real Time Communication
Unit-II
Fault Tolerance, Fault-Error-Failure. Redundancy, Error Detection, Damage Confinement, Error Recovery, Fault Treatment, Fault Prevention, anticipated and unanticipated Faults. Error models: General coding scheme Error detection techniques: Watchdog processors, Heartbeats, consistency and capability checking, Data audits, Assertions, Control-flow checking, Error control coding. Application: DHCP
Unit-III
Fault tolerance: Coding technique-fault tolerant self checking and fail safe circuits-fault tolerance in combinatorial and sequential circuits- synchronous and asynchronous fail safe circuits. Software fault tolerance: Process pairs, robust data structures, N version programming, Recovery blocks, Replica consistency & reintegration, multithreaded programs Application: VAX. Network fault tolerance: Reliable communication protocols, Agreement protocols, Database commit protocols -Application: Distributed SQL server Check pointing & Recovery - Application: Micro check pointing, IRIX Checkpoints
Unit-IV
Experimental Evaluation: Modelling and simulation based, Fault injection based - Application: NFTAPE fault injector . Modelling for performance, dependability and perform ability: dependability-specific methods (fault trees, reliability block diagrams), queues, stochastic Petri nets and stochastic activity networks - Application: Ultra SAN
Unit-V
Practical Systems for Fault Tolerance: - Application: Ad-hoc wireless network - Application: NASA Remote Exploration & Experimentation System Architecture: Fault tolerant computers - general purpose commercial systems-fault tolerant multiprocessor and VLSI based communication architecture. Fault tolerant software: Design-N-version programming recovery block - acceptance tests-fault trees- validation of fault tolerant systems.
REFERENCES :-
K.K.Pradhan, “Fault Tolerant computing theory and techniques” volume III. Prentice Hall,1989.
Krishna, Real Time System, TMH
Anderson and Lee, “Fault Tolerant principles and practice” ,PHI 1989.
Siewert, Real Time Embeded System, Cengage Learning.
Rajiv Mall, Real Time System, Pearson Edu.
Parag K. Lala, “Fault Tolerant and Fault Testable, Hardware design” PHI 1985.
Shem , toy Levei , Ashok K.Agarwala , “Fault Tolerant System design”, Tata McGraw Hill
CS 7103 Embedded Computer Systems
Unit – I
Introduction to Embedded systems
Embedded Systems Vs General Computing Systems, Classification of Embedded Systems, Major application areas of Embedded Systems, Purpose of Embedded systems ,Core of the Embedded system, Memory, Sensors and Actuators, Communication Interface, Embedded firmware, PCB and Passive Components, Characteristics and Quality attributes of a Embedded System .
Unit – II
Design of Embedded Systems with 8bit Microcontrollers-8051
Factors for considering in selecting a Controller ,Designing with 8051 microcontroller Different addressing modes supported by 8051 , Instruction set for 8051 microcontroller. Fundamental issues in Hardware Software Co-Design , Computational models in Embedded Design .
Unit – III
Embedded Hardware & Firmware Design and Development
Analog &Digital Electronic components, VLSI & Integrated circuit design, Electronic Design Automation tools , PCB layout Design and its fabrication
.Embedded firmware design approaches , Embedded firmware Development Languages ,Programming in Embedded C . Integration and testing of Embedded Hardware and Firmware , Safe & robust Design, Reliability, Faults, errors & Failure, Functional Design, Architecture Design, Prototyping.
Unit -IV
Embedded System Development Environment
Integrated Development Environment (IDE) , Types of files Generated on Cross- Compilation , Disassembler / Decompiler, Simulators, Emulators and Debugging, Boundary Scan.
Unit – V
Embedded Product Development Lifecycle(EDLC) and Trends in Embedded Industry
What is EDLC ,Objectives of EDLC , Different phases of EDLC , EDLC Approaches-Linear or waterfall model , Iterative Model , Prototyping/Evolutionary Model, Spiral Model . Processor trends in Industry , Embedded OS Trends , Development Language trends Open Standards, Frameworks and Alliances , Bottlenecks.
References:
Shibu, Introduction to Embedded System:, TMH
Barrett ,Embedded Systems :Design and Applications ,Pearson Education
Rajkamal, Embeded System, TMH
Vahid ,Givargis ,Embedded System Design ,Wiley
Balbno, Embedded Micro Computer System Cengage Learning
Siewert, Real Time Embeded System & Components, Cengage Learning
Peckol, Embeded System, Willey Indi
CS 7201 Network & Web Security
Introduction to Network Security, Computer Securit y and Cyber Security. Security Terminologies and Principle, Security Threats, Types of attacks (Operating System, application level, Shrink Wrap code, Misconfiguration attacks etc.). Introduction to Intrusion, Terminologies, Intrusion Detection System (IDS), Types of Intrusion Detection Systems, System Integrity Verifiers (SIVS).Indication of Intrusion: System Indications, File System Indications Network Indications. Intrusion Detection Tools ,Post attack IDS Measures & Evading IDS Systems. Penetration Testing, Categories of security assessments, Vulnerability Assessment, Types of Penetration Testing. Risk Management.
Cryptography, Classical Cryptographic Techniques, Encryption, Decryption, Code Breaking: Methodologies, Cryptanalysis, Cryptography Attacks, Brute-Force Attack, Use of Cryptography. Public key cryptography, Principles of Public key Cryptosystems, Cryptographic Algorithms RSA, Data Encryption Standard (DES), RC4, RC5, RC6, Blowfish, Key Management, Diffie-Hellman key exchange, elliptic curve cryptography.
Hash Functions, One-way Hash Functions, SHA (Secure Hash Algorithm), Authentication Requirements, Authentication Functions, Kerberos. Message Authentication codes ,Message Digest Functions, MD5, SSL (Secure Sockets Layer), SSH (Secure Shell), Algorithms and Security, Disk Encryption, Government Access to Keys (GAK)
IP Security, Web Security, Firewalls: Types, Operation, Design Principles, Trusted Systems. Computer Forensics, Need, Objectives,Stages & Steps of Forensic Investigation in Tracking Cyber Criminals, Incident Handling.
Hacking, Classes of Hacker (Black hats, grey hats, white hats, suicide hackers), Footprinting, Scanning (Types-Port, Network, Vulnerability), E-Mail Spiders, Overview of System Hacking Cycle.
Footprinting using footprinting tools(Open Source & Free)(ex-nslookup, ARIN, Whois, Google Earth etc..)
Scanning for vulnerabilities using (Angry IP, HPing2, IPScanner, Global Network Inventory Scanner, Net Tools Suite Pack.)
NetBIOS Enumeration Using NetView Tool, Nbtstat Enumeration Tool (Open Source).
Steganography using tools: Tool: Merge Streams, Image Hide, Stealth Files, Blindside, STools, Steghide, Steganos, Pretty Good Envelop, Stegdetect,.
Steganalysis - Stego Watch- Stego Detection Tool, StegSpy.
How to Detect Trojans by using – Netstat, fPort, TCPView, CurrPorts Tool, Process Viewer.
Lan Scanner using look@LAN, wireshark.
Understanding DoS Attack Tools- Jolt2 , Bubonic.c, Land and LaTierra, Targa, Nemesy Blast, Panther2, Crazy Pinger, Some Trouble, UDP Flood, FSMax.
William Stallings, “Cryptography and Network Security: Principles and Practice” Pearson
Charlie Kaufman, Radia Perlman, Mike Speciner, Michael Speciner, “ Network Security -
Private communication in a public world” TMH
Fourozon, “Cryptography & Network Security” TMH
Joseph Migga Kizza, Computer Network Security, , Springer International Edition
Atul Kahate,”Cryptography and Network Security” Mc Graw Hill
Carl Endorf, Eugene Schultz, Jim Mellander “INTRUSION DETECTION & PREVENSION” TMH
Neal, Krawetz, Introduction to Network Security,Cengage Learning
CS 7202 Simulation and Modeling
Unit-I
Nature of Simulation. Systems , Models and Simulation, Continuous and Discrete Systems, system modeling, concept of simulation, Components of a simulation study, Principles used in modeling Static and Dynamic physical models, Static and Dynamic Mathematical models Introduction to Static and Dynamic System simulation , Advantages ,Disadvantages and pitfalls of Simulation.
Types of System Simulation, Monte Carlo Method, Comparision of analytical and Simulation methods, Numerical Computation techniques for Continuous and Discrete Models, Distributed Lag Models, Cobweb Model.
Continuous System models, Analog and Hybrid computers, Digital-Analog Simulators, Continuous system simulation languages ,Hybrid simulation ,Real Time simulations.
Exponential growth and decay models, logistic curves ,Generalization of growth models , System dynamics diagrams, Multi segment models , Representation of Time Delays. Discrete and Continuous probability functions, Continuous Uniformly Distributed Random Numbers, Generation of a Random numbers, Generating Discrete distributions, Non-Uniform Continuously Distributed Random Numbers, Rejection Method.
Poisson arrival patterns, Exponential distribution, Service times, Normal Distribution Queuing Disciplines, Simulation of single and two server queue. Application of queuing theory in computer system. Discrete Events ,Generation of arrival patterns, Simulation programming tasks, Gathering statistics, Measuring occupancy and Utilization, Recording Distributions and Transit times .
GPSS: Action times, Succession of events, Choice of paths, Conditional transfers, program control statements . SIMSCRIPT: Organization of SIMSCRIPT Program, Names & Labels, SIMSCRIPT statements . Estimation methods , Relication of Runs, Batch Means , Regenerative techniques , Time Series Analysis , Spectral Analysis and Autoregressive Processes.
Simulate CPU scheduling algorithm using queueing system
a) FCFS b) SJF c) Priority Algo
Simulate multiplexer/concentrator using queuing system
Simulate congestion control algorithms.
Simulate disk scheduling algorithms.
Simulate a Manufacturing shop and write a program in GPSS.
Simulate Telephone system model and write a program in SIMSCRIPT.
Gorden G., System simulation, Prentice Hall.
Seila, Simulation Modeling, Cengage Learning
Law .,Simulation Modeling And Analysis, McGraw Hill
Deo, System Simulation with Digital Computer, PHI
Harrington, Simulation Modeling methods, McGraw Hill
Severance, “ System Modeling & Simulation, Willey Pub
CS 7203 Data Mining & Knowledge Discovery
Unit-I
Introduction, to Data warehousing, needs for developing data Warehouse, Data warehouse systems and its Components, Design of Data Warehouse, Dimension and Measures, Data Marts:-Dependent Data Marts, Independents Data Marts & Distributed Data Marts, Conceptual Modeling of Data Warehouses:-Star Schema, Snowflake Schema, Fact Constellations.
Multidimensional Data Model & Aggregates.
Unit-II
OLAP, Characteristics of OLAP System, Motivation for using OLAP, Multidimensional View and Data Cube, Data Cube Implementations, Data Cube Operations, Guidelines for OLAP Implementation, Difference between OLAP & OLTP, OLAP Servers:-ROLAP, MOLAP, HOLAP Queries.
UNIT-III
Introduction to Data Mining, Knowledge Discovery, Data Mining Functionalities, Data Mining System categorization and its Issues. Data Processing :- Data Cleaning, Data Integration and Transformation. Data Reduction, Data Mining Statistics. Guidelines for Successful Data Mining.
Unit-IV
Association Rule Mining:-Introduction, Basic, The Task and a Naïve Algorithm, Apriori Algorithms, Improving the efficiency of the Apriori Algorithm, Apriori-Tid, Direct Hasing and Pruning(DHP),Dynamic Itemset Counting (DIC), Mining Frequent Patterns without Candidate Generation(FP-Growth),Performance Evaluation of Algorithms,.
Unit-V
Classification:-Introduction, Decision Tree, The Tree Induction Algorithm, Split Algorithms Based on Information Theory, Split Algorithm Based on the Gini Index, Overfitting and Pruning, Decision Trees Rules, Naïve Bayes Method.
Cluster Analysis:- Introduction, Desired Features of Cluster Analysis, Types of Cluster Analysis Methods:- Partitional Methods, Hierarchical Methods, Density- Based Methods, Dealing with Large Databases. Quality and Validity of Cluster Analysis Methods.
References:
Berson: Data Warehousing & Data Mining &OLAP , TMH
Jiawei Han and Micheline Kamber, Data Mining Concepts & Techniques, Elsevier Pub.
Arun.K.Pujari, Data Mining Techniques, University Press.
N.P Gopalan: Data Mining Technique & Trend, PHI
Hand, Mannila & Smith: Principle of Data Mining, PHI
Tan, Introduction to Data Mining, Pearson Pub.
Duration: 6 weeks after the VI semester in the summer break, Assessment in VII semester.
For the assessment of industrial training undertaken by the students, following components are considered with their weightage.
Term work
In Industry Marks allotted
Attendance and General Discipline 10
Daily diary Maintenance 10
Initiative and participative attitude during training 10
Assessment of training by Industrial Supervisor 20 TOTAL 50
Practical/Oral Examination (Viva-Voce) In Institution Marks allotted
Training Report 25
Seminar and cross questioning (defense) 25
TOTAL 50
Marks of various components in industry should be awarded to the students, in consultations with the
Training and Placement Officer/Faculty of Institute and I/c of training from Industry. During training students will prepare a first draft of training report in consultation with section in-charge. After training they will prepare final draft with the help of T.P.O./Faculty of the institute. Then they will present a seminar on their training and they will face viva-voce on training in the institute.
The objective of undertaking industrial training is to provide work experience so that student’s engineering knowledge is enhanced and employment prospects are improved. The student should take this course as a window to the real World of Work and should try to learn as much as possible from real life experiences by involving and interacting with industry staff. Industrial training also provides an opportunity to students to select an engineering problem and possibly an industry guide for their Major Project in final semester.
Industrial training of the students is essential to bridge the wide gap between the classroom and industrial environment. This will enrich their practical learning and they will be better equipped to integrate the practical experiences with the classroom learning process.
During industrial training students must observe following to enrich their learning:
Industrial environment and work culture.
Organisational structure and inter personal communication.
Machines/ equipment/ instruments - their working and specifications.
Product development procedures and phases.
Project planning, monitoring and control.
Quality control and assurance.
Maintenance system.
Costing system.
Stores and purchase systems.
Layout of Computer/ EDP/MIS centres.
Roles and responsibilities of different categories of personnel.
Customer services.
Problems related to various areas of Work etc.
Faculty and TPO are supposed to plan industrial training in such a manner that students get exposure on most of the above arena in the field (world of work). Students are supposed to acquire the knowledge on
above by -
Observation,
Interaction with officials at the workplace
Study of Literature at the workplace (e.g. User Manual, standards, maintenance schedules, etc.)
"Hand's on" experience
Undertaking / assisting project work.
Solving problems at the work place.
Presenting a seminar.
Participating in-group meeting/ discussion.
Gathering primary and secondary data/ information through various sources, Storage, retrieval and analysis of the gathered data.
Assisting officials and managers in their working.
Undertaking a short action research work.
Consulting current technical journals and periodicals in the library.
Discussions with peers.
1.2 GUIDANCE TO THE FACULTY/TPO FOR PLANNING AND IMPLEMENTING THE INDUSTRIAL TRAINING
The industrial training programme, which is spread to 6 weeks’ duration, has to be designed in consultation with the authorities of the work place, keeping in view the need of the contents. Following are some of the salient points:
Spelling out the objectives of the industrial training in behavioral terms and same is informed in advance to the 1) students, 2) authorities of the work place and 3) supervising faculty members.
Discussing and preparing students for the training for which meetings with the students has to be planned.
Meeting with industrial personnel and orienting them regarding the objective of the training and the expectations of the programme.
Correspondence with the authorities of the work place.
Orientation classes for students on how to make the training most beneficial - monitoring daily diary, writing weekly reports, how to interact with various categories of industrial personnel, how to behave and undertake responsibilities, how to gather information from the workplace, ethics etc.
Guiding students to make individual plans (week wise/ day wise) to undertake industrial training
Developing a system of maintaining training records, by teachers for every batch of students for
convenient retrieval.
Inviting industrial personnel to deliver lectures on some aspects of training.
S.No. Activity Commencing Week Finishing week Remarks
Meeting with Principal
Meeting with Colleagues
Correspondence with work place (Industries concerned)
Meeting with authorities of work place
Orientation of students for industrial training
Scrutinizing individual training plan of students
Commencement of industrial training
First monitoring of industrial training
Second monitoring of industrial training
Finalization of Training report
Evaluation of performance at Industry level
Evaluation of industrial programme in the institution.