HEAD
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
Learn concepts of operating systems
Learn the mechanisms of OS to handle processes
Study of various mechanisms involved in memory management techniques
Gaining knowledge of deadlocks prevention and detection techniques
Analyzing disk management functions and techniques
Introduction to Operating Systems, Evaluation of OS, Types of operating Systems, system protection, Operating system services, Operating System structure, System Calls and System Boots, Operating System design and implementation, Spooling and Buffering.
Basic concepts of CPU scheduling, Scheduling criteria, Scheduling algorithms, algorithm evaluation, multiple processor scheduling. Process concept, operations on processes, threads, inter process communication, precedence graphs, critical section problem, semaphores, classical problems of synchronization,
Deadlock problem, deadlock characterization, deadlock prevention, deadlock avoidance, deadlock detection, recovery from deadlock, Methods for deadlock handling. Concepts of memory management, logical and physical address space, swapping, Fixed and Dynamic Partitions, Best-Fit, First-Fit and Worst Fit Allocation, paging, segmentation, and paging combined with segmentation.
Concepts of virtual memory, Cache Memory Organization, demand paging, page replacement algorithms, allocation of frames, thrashing, demand segmentation, Role of Operating System in Security, Security Breaches, System Protection, and Password Managment.
Disk scheduling, file concepts, File manager, File organization, access methods, allocation methods, free space managements, directory systems, file protection, file organization & access mechanism, file sharing implement issue, File Management in Linux, introduction to distributed systems.
Silberschatz ,”Operating system”, Willey Pub
Tanenbaum “ Modern Operating System” PHI Learning.
Dhamdhere, ”System Programming and Operating System”,TMH.
Stuart,”Operating System Principles, Design &Applications”,Cengage Learning
Operating System : Principle and Design by Pabitra Pal Choudhury, PHI Learning
Program to implement FCFS CPU scheduling algorithm.
Program to implement SJF CPU scheduling algorithm.
Program to implement Priority CPU Scheduling algorithm.
Program to implement Round Robin CPU scheduling algorithm.
Program to implement classical inter process communication problem(producer consumer).
Program to implement classical inter process communication problem(Reader Writers).
Program to implement classical inter process communication problem(Dining Philosophers).
Program to implement FIFO page replacement algorithm.
Program to implement LRU page replacement algorithm
Upon successful completion of this course the students will:
Gain knowledge of history of operating systems
Understand designissuesassociatedwithoperatingsystems
Gain knowledge ofvariousprocessmanagementconceptsincludingscheduling,synchronization,deadlocks
Understand conceptsofmemorymanagementincludingvirtualmemory
Understand issuesrelatedtofilesysteminterfaceandimplementation,diskmanagement
Befamiliarwithprotectionandsecuritymechanisms
BefamiliarwithvarioustypesofoperatingsystemsincludingUnix
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
To provide students with an overview of the concepts and fundamentals of computer networks
To familiarize with the basic taxonomy and terminology of computer networking area.
Describe how computer networks are organized with the concept of layered approach
To experience the designing and managing of communication protocols while getting a good exposure to the TCP/IP protocol suite
Importance of computer networks, broadcast and point to point networks, Local area networks and Wide area networks , ISO-OSI reference model, TCP/IP model , interfaces and services, Protocol data unit, connection oriented and connectionless services, service primitives, Binding Protocol Address- ARP & RARP, packet format, Encapsulation.
Data-Link layer: - Data link layer design issues, framing , flow & error control , physical addressing, Stop & Wait protocol ,Go back N ARQ ,selective repeat ARQ ,piggybacking and pipelining ,HDLC LAN Protocol stack-Logical link control and Media Access Control sublayer, IEEE 802.2 LLC Frame format; MAC layer Protocols- static and dynamic allocation, Pure and slotted ALOHA, Carrier sense multiple access, Persistent and non persistent CSMA, IEEE standard 802.3, 802.4, 802.5, FDDI,
The Network layer- logical addressing, classful & classless addressing, packet delivery & forwarding. unicast routing protocols , multicast routing protocols, Routing algorithm- Least Cost, Dijkstra's, Bellman-ford, Introduction to Internet protocol, IPv4 header, IPv4 Datagrams, Encapsulation, Fragmentation and Reassembly, IP routing, Subnet addressing, Subnet mask, Super netting- special case of IP addresses, Ipv6-Motivation, frame format and addressing. ICMP: Introduction, ICMP Header, ICMP message types.
Transport layer- TCP: Introduction ,Transport services , Process to process delivery, TCP ,congestion control algorithms, quality of service, headers, connection establishment and termination, timeout of connection establishment, maximum segment size, port no. and socket addresses, TCP timers, UDP: Introduction, UDP header, UDP checksum, UDP operations, encapsulation & decapsulation, queuing, SCTP-Services, transmission sequence number, stream identifier, stream sequence number, packet format.
Application layer - BOOTP:-operation, packet format, DHCP:-Address allocation, configuration & packet Format, DNS: Distribution of name spaces, DNS in the internet, FTP:-Connection, Communication, command processing, TFTP, E-Mail: SMTP, POP, IMAP, SNMP. study of internetworking devices and their configuration– switches, hubs, Bridges, routers and Gateways.
.“Computer Networks” - Tanenbaum ,PHI Learning
“Data Communication & Networks ” , Fourouzan TMH
“TCP/IP-Protocol suite”, Forouzan, TMH 3rd edition
“Computer Networks and Internets”, D.E.Comer, Pearson
“TCP/IP Illustrated” W. Richard Stevens, Volume I, Addison Wesley,
“Internetworking with TCP/IP Vol. I, II & III”, Comer , PHI Learning.
Upon successful completion of this course the students will:
Have agood understanding of the OSI Reference Model and its Layers
Identify core networking and infrastructure components and the roles they serve; and given requirements and constraints, design an IT infrastructure including devices, topologies, protocols, systems software, management and security;
Analyze the requirements for a given organizational structure and select the most appropriate networking architecture and technologies
Specify and identify deficiencies in existing protocols, and then go onto formulate new and better protocols
New Scheme Based On AICTE Flexible Curricula
Student learns some fundamental concepts in automata theory and designing of Finite Automata, conversion NFA to DFA. Application of Finite Automata in computer science and real world.
Obtain minimized DFA and Application of regular expression and conversion from RE to Finite Automata and Finite Automata to Regular Expression and Proving language are not regular.
Designing of CFG’s , Construction of parse trees, finding and removing ambiguity in grammars, simplification of CFG, Conversion of grammar to Chomsky Normal Form ,Greibach normal form.
Designing problems on Pushdown Automata and conversion of grammar to PDA, PDA to Grammar.
Designing Turing machines, understanding the working of various types of Turing machines and study P and NP type problem.
Introduction of the theory of computation, Finite state automata – description of finite automata, properties of transition functions, Transition graph, designing finite automata, FSM, DFA, NFA, 2-way finite automata, equivalence of NFA and DFA, Mealy and Moore machines.
Regular grammars, regular expressions, regular sets, closure properties of regular grammars, Arden’s theorem, Myhill-Nerode theorem, pumping lemma for regular languages, Application of pumping lemma, applications of finite automata, minimization of FSA.
Introduction of Context-Free Grammar - derivation trees, ambiguity, simplification of CFGs, normal forms of CFGs- Chomsky Normal Form and Greibach Normal forms, pumping lemma for CFLs, decision algorithms for CFGs, designing CFGs, Closure properties of CFL’s.
Introduction of PDA, formal definition, closure property of PDA, examples of PDA, Deterministic Pushdown Automata, NPDA, conversion PDA to CFG, conversion CFG to PDA.
Turing machines - basics and formal definition, language acceptability by TM, examples of TM, variants of TMs – multitape TM, NDTM, Universal Turing Machine, offline TMs, equivalence of single tape and multitape TMs. Recursive and recursively enumerable languages, decidable and undecidable problems – examples, halting problem, reducibility. Introduction of P, NP, NP complete, NP hard problems and Examples of these problems.
Daniel I.A. Cohen,“Introduction to Computer Theory”,Wiley India.
John E Hopcroft, Jeffrey D. Ullman and Rajeev Motwani, “Introduction to Automata Theory, Languages and Computation”, Pearson Education.
K.L.P Mishra & N.Chandrasekaran,“Theory of Computer Science”, PHI Learning.
Peter Linz, “Introduction to Automata Theory and Formal Languages”, Narosa Publishing.
John C Martin, “Introduction to languages and the theory of computation”, TATA McGraw Hill.
At the completion of the course, students will be able to...
Convertbetween finite automata, regular grammars, and regular expression representations of regular languages
Apply the pumping lemma for regular languages to determine if a language is regular
Convertbetweengrammars and push-down automata for context-free languages
Determine if a language is regular or context-free
Demonstrate that a grammar is ambiguous
Translate a context-free grammar from one form to another
Produce simple programs for a Turing Machine
Explain the concept of undecidability
List examples of undecidable problems
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
To introduce basic concepts of microprocessor
Tointroduceserialandparallelbusstandards.
To introduce programming in assembly language.
To introduce basic concepts of interfacing memory and peripheral devices to a microprocessor.
Evolution of microprocessor, single chip micro computers, Micro processor Application, Microprocessor and its architecture, addressing modes, instruction, Instruction sets, Arithmetic and Logic Instruction, Program control instruction, Introduction –8086 family, procedure and macros, connection , Timing and Troubleshooting interrupt, 80286, 80836 and 80486 micro processor system concept.
Microprocessor Cycle, AIU, Timing and control Unit, Register data, Address bus, Pin Configuration, Intel 8086 instruction, Opcode and operands, limitation word size. Programming the microprocessor Assembly language, The Pentium and Pentium Pro Micro Processorwith features, Pentium II, Pentium III and Pentium –IV Microprocessor with software changes. Instruction set for Intel 8086, Introduction Intimation and data formats, Addressing modes, Status flags, Symbols and abbreviations, programming of microprocessors, Assembly language, high level language, areas of application of various languages, Stacks, Sub routines system, software, commands in assembly language, software Development, Debugging program, Modular programming, Structured programming, Top-down, Bottom-up design , MACRO microprogramming.
Assembly language programming with Examples like Addition of 8/16-bit Binary number, subtraction of 8/16 bit binary number, Address partitioning, addressing mode, type of addressing mode, memory and I/o interfacing, Data transfer schemes, Interfacing device and I/o devices I/o ports, Basic I/o Interfacing MDS, Micro controllers, I/o processor and co-processors ,Microcomputer Development system, Single chip micro computers, intel 8748 intel 8051, inter 8096, intel 8049intel 2920/2921, I/o processor UPI-425,UPI-41,42, Co- processor, math processor math co-processor –8087, 80287, 80387DX 803875x
Bus Interface I/o port Addressing, decoding 8279, Programmable key board/display interface, 8254 Internal Timer, 16550 programmable communication interface A/D, 8259A Programmable Interrupt Controller, 8237 DMA Controller, Shared bus operation, disk Memory system Video display. ISA Bus, Extended ISA ( EISA) and VESA Local Buses, Peripheral Component Inter Connect (Pc I) Bus, Parallel Printer interface (LPT) Universal serial Bus (USB) Accelerated graphics port (AGP),Programmable Communication interfere 8251 VSART CRT Controller 8275, 6854, Floppy disk Controller 8272, I/o processor 8089.
Memory Unit, RAM,SRAM, DRAM,ROM, PROM EPROM, EEPROM Nonvolatile RAM semiconductor Technology for memory, Shift register, Magnetic Memory, Tap, disc, main memory and secondary memory
cache memory, program memory and Data Memory, Real and virtual memory Buses, memory Addressing capacity of CPU, processing speed of computer
Douglas V Hall, “Microprocessors and interfacing –Programming & Hardware” TMH
Barry B. Brey, “The intel Microprocessor –8086”, Pearson Education
Kenneth J.Ayala,”The 8086 Microproccessor: Programming & Interfacing The PC”,CengageLearning
Krishna Kant,”Microprocessors and Microcontrollers”, PHI Learning
A.K.Ray KM Bhurchandi, “Advanced Microprocessor and peripherals” McGraw Hill
R.S. Gaonkar ,”Microprocessors and interfacing”, TMH
At the completion of the course, students will be able to...
Explainthemicroprocessor’sandMicrocontroller’sinternalarchitecture
Applyknowledgeanddemonstrateprogrammingproficiencyusingthevariousaddressingmodesanddatatransf erinstructionsofthetargetmicroprocessorandmicrocontroller.
CompareacceptedstandardsandguidelinestoselectappropriateMicroprocessor(8085&8086)andMicrocontr ollertomeetspecifiedperformancerequirements.
Analyzeassemblylanguageprograms
DesignelectricalcircuitrytotheMicroprocessorI/Oportsinordertointerfacetheprocessortoexternaldevices.
Evaluateassemblylanguageprograms
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
The prime objective of this course is to teach the students to analyze, design and implement object-oriented
software systems
Michael Blaha, Object-Oriented modeling and Design with UML, PHI
Mahesh P. Matha, Object-Oriented Analysis and Design Using UML, PHI
D Jeya Mala and S. Geetha, Object-Oriented Analysis and Design Using UML, McGraw Hill
Andrew Haigh, Object-Orientd Analysis and Design, TMH
O’ Docherty, Object-Oriented Analysis and Design Understanding, System Development with UML 2.0, Wiley India
At the end of the course student will be able to:
Explain OOAD concepts
Perform object oriented analysis and develop static model of system after identifying classes and their relationships
Develop dynamic model of system by identifying states and events
Develop interaction model of system by drawing use case, sequence and activity diagrams
Select an appropriate design patternand effectively construct object-oriented programs
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
To present an overview of artificial intelligence (AI) principles and approaches
Develop a basic understanding of the building blocks of AI
Meaning and definition of artificial intelligence, Production systems, Characteristics of production systems, Study and comparison of breadth first search and depth first search techniques, other Search Techniques like hill Climbing, Best first Search. A* algorithm, AO* algorithms etc, and various types of control strategies.
Knowledge Representation, Problems in representing knowledge, knowledge representation using propositional and predicate logic, comparison of propositional and predicate logic, Resolution, refutation, deduction, theorem proving, inferencing, monotonic and non-monotonic reasoning.
Probabilistic reasoning, Baye's theorem, semantic networks, scripts, schemas, frames, conceptual dependency, fuzzy logic, forward and backward reasoning.
Game playing techniques like minimax procedure, alpha-beta cut-offs etc, planning, Study of the block world problem in robotics, Introduction to understanding, natural language processing.
Introduction to learning, Various techniques used in learning, Introduction to neural networks, applications of neural networks, common sense, reasoning, some example of expert systems.
Rich E and Knight K, “Artificial Intelligence”, TMH, New Delhi.
Nelsson N.J., “Principles of Artificial Intelligence”, Springer Verlag, Berlin.
Upon successful completion of this course the students will:
Be familiar with terminology used in this area
Explain what constitutes "Artificial" Intelligence and how to identify systems with Artificial Intelligence.
Know how to build simple knowledge-based systems
Have ability to apply knowledge representation, reasoning, and machine learning techniques to real- world problems
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
Discuss fundamentals of e-commerce, types and applications.
Evaluate the role of the major types of information systems in a business environment and their relationship to each other
Assess the impact of the Internet and Internet technology on business electronic commerce and electronic business
Identify the major e management challenges for building and using information systems and learn how to find appropriate solutions to those challenges.
Learn strategies for e-commerce, e government, Wireless Application Protocol, WAP technology and electronic payment system.
Definition of Electronic Commerce, Brief history of Ecommerce, e, E-Commerce: technology and prospects, incentives for engaging in electronic commerce, needs of E-Commerce, advantages and disadvantages, , Inter Organizational E-Commerce Intra Organizational E-Commerce, and Consumer to Business Electronic Commerce, Architectural framework ,Impact of E-commerce on business, E-Commerce Models.
Internet and Intranet based E-commerce- Issues, problems and prospects, Network Infrastructure, Network Access Equipments, Broadband telecommunication (ATM, ISDN, FRAME RELAY). Mobile Commerce: Introduction, Wireless Application Protocol, WAP technology, Mobile Information device. Emerging Client Server Security Threats, firewalls & Network Security.
Define e-Marketplace and Describe their Functions, Explain e-Marketplace types and their features, Describe the various types of auctions and list their characteristics, Discuss the benefits, limitations and impacts of auctions, E-Commerce in the wireless environment, Competition in the DE and impact on industry, Integration and e-Business suits, ERP, eSCM, CRM, e-Procurement definition, processes, methods and benefits , e- Payment, Discuss the categories and users of smart cards, Describe payment methods in B2B EC
Electronic Payments Overview of Electronics payments, Overview, The SET protocol, Payment Gateway, Digital Token based Electronics payment System, magnetic strip card, E-Checks, Smart Cards, Credit Card, Debit Card based EPS, Emerging financial Instruments, Home Banking, Online Banking.
Definition of e-Governments, theoretical background of e-governance, issues in e-governance applications, evolution of e-governance, Implementation, E-Government Services, Challenges and Opportunities, E- Government Benefits, e-governance models- broadcasting, critical flow, comparative analysis, mobilization and lobbying, interactive services / G2C2G.
Ravi Kalakota, Andrew Winston, “Frontiers of Electronic Commerce”, Addison Wesley.
Pete Lohsin , John Vacca “Electronic Commerce”, New Age International
Goel, Ritendra “E-commerce”, New Age International
Laudon, “E-Commerce: Business, Technology, Society”, Pearson Education
Bajaj and Nag, “E-Commerce the cutting edge of Business”, TMH
Turban, “Electronic Commerce 2004: A Managerial Perspective”, Pearson Education
Denieal Amor, “ The E-Business Revolution”, Addision Wesley
Diwan, Sharma, “E-Commerce” Excel
J. Satyanarayan, “E-government: The science of the possible”, PHI Learning Private Limited
C.S.R. Prabhu, “E-governence: concept and case study”, PHI Learning Private Limited
Upon successful completion of this course the student will be able to:
understand the e-business concepts.
understand the e-business models and infrastructure.
learn how e-business concepts are applied to different fields, such as: education, banking, tourism and so on.
willcome up with online business ideas and will be motivated to apply what they learned.
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
To learn the basic concepts and techniques which form the object oriented programming paradigm
To identify Java language components and how they work together in applications.
To design and program stand-alone Java applications.
To learn how to use exception handling in Java applications.
To learn Java Event Handling
The Java Environment: Java Development Kit (JDK) , Java virtual machine, Java programming environment(compiler, interpreter, applet viewer, debugger), Java Applications Programming Interface(API),Basic idea of application and applet. Java as an object oriented language: objects, classes, encapsulation, inheritance and software reuse, polymorphism, abstract classes and abstract methods,: defining an interface, implementing & applying interfaces, variables in interfaces, extending interfaces, Packages,scopeandlifetime;Accessspecifies;Constructors;Copyconstructor;this pointer; finalize() method; arrays; Memory allocation and garbage collection
AWT: Containers and components, AWT classes, window fundamentals: Component, Container, Panel, Window, Frame, Canvas, AWT Controls, Layout Managers and Menus: adding and removing control, Labels, Button, Check Box, Radio Button, Choice, menu, Text area, Scroll list, Scrollbar; Frame; Layout managers- flow layout, Grid layout, Border layout, Card layout. Java Event Handling Model: Java’s event delegation model –Ignoring the event, Self-contained events, Delegating events; The event class hierarchy; There lationship between interface, methods called, parameters and event source; Adapter classes; Event classes action Event, Adjustment Event, Container Event, Focus Event, Item Event, Eye Event, Mouse Event, Text Event,Window Event. Applets: Applet security restrictions; the class hierarchy for applets; Life cycle of applet; HTMLTags for applet Introduction to Swing: swing library, Building application susing Swings
Multithreading and Exception Handling: Overview of simple threads, Basic idea of multi threaded programming, Thread synchronization: Locks, synchronized methods, synchronized block,Thread scheduling,Producer-consumerrelationship,Daemon thread,Basicidea ofexception handling,stack basedexecutionandexceptionpropagation,Exception types: Exception Handling:Try,Catch,Finally,Throw statement,Assertions
Input/Output:ExploringJavaI/O.,Directories,streamclassesTheBytestream:Inputstream,outputstream,file input stream, file output stream, print stream, Randomaccess file, the character streams, Buffered reader, buffered writer, print writer, serialization. JDBC: JDBC-ODBCbridge; The connectivity model; The driver manager; Navigating there sult set object contents; java.sql Package; The JDBCexception classes; Connecting to Remote database.
Java Networking: exploring java. Net package Networking Basics: Socket, Client server, reservedsockets,servers,Internetaddressing,TCPsockets,UDPsockets. RMI: Client/Server architecture, RMI registry services; Step sofcreating RMI Application and an example
Naughton&Schildt“TheCompleteReferenceJava
TataMcGraw Hill.2.Deitel “Java-How toProgram:”PearsonEducation,Asia.
Horstmann&Cornell “CoreJava2” (Vol I&II) ,SunMicrosystems.
LvanBayross“Java2.0”:BPBpublications.
Ivor Horton’s“BeginningJava2,JDK5Ed.,WileyIndia.
JavaProgrammingfor theabsolutebeginnersByRussell,PHILearning
Upon successful completion of this course the student will:
Have the knowledge of the structure and model of the Java programming language
use the Java programming language for various programming tasks
develop software in the Java programming language
evaluate user requirements for software functionality required to decide whether the Java programming language can meet user requirements
propose the use of certain technologies by implementing them in the Java programming language to solve the given problem
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
To learn Designing and developing Web applications
Designing Enterprise based applications by encapsulating an application’s business logic.
Designing applications using pre-built frameworks.
Java Database Connectivity(JDBC): JDBC Product, Types of Drivers, Two-Tier Client/Server Model, Three- Tier Client/Server Model, Basic Steps of JDBC, Creating and Executing SQL Statement, The Result Set Object, Working with Database MetaData Interface
Java Servlets:Servlet Interaction & Advanced Servlets, Life cycle of Servlet, Java Servlet Development Kit, Javax.servletpackage, Reading Servlet Parameters, Reading Initialization Parameters, The javax.servlet.http Package, Handling HTTP.
JavaServer Pages(JSP): JSP Technologies, Understanding the Client-Server Model, Understanding Web server software, Configuring the JSP Server, Handling JSP Errors, JSP Translation Time Errors, JSP Request Time Errors, Creating a JSP Error Page
Remote Method Invocation (RMI): RMI Architecture, Designing RMI application, Executing RMI application
Enterprise Java Beans (EJB): Types of EnterpriseJava beans, Session Bean & Entity Bean, Features of Session Bean, Life-cycle of Stateful Session Bean, Features of Entity Bean, Life-cycle of Entity Bean, Container- managed Transactions & Bean-managed Transactions, Implementing a container-managed Entity Bean
Struts: Introduction to the Apache Struts, MVC Architecture, Struts Architecture, How Struts Works? Introduction to the Struts Controller, Introduction to the Struts Action Class, Using Struts ActionFrom Class, Using Struts HTML Tags, Introduction to Struts Validator Framework, Client Side Address Validation in Struts, Custom Validators Example, Developing Application with Struts Tiles
Java the Complete Reference, ninth edition by Herbert Schild, Publisher: McGraw Hills
Head First EJB 3.0 by Kathy Sierra, Bert Bates, Publisher: O'Reilly Media 3.Head First Servlets and JSP by Bryan Basham, Kathy Sierra & Bert Bates, Publisher: O'Reilly Media
Just Hibernate, A Lightweight Introduction to the Hibernate Framework by Madhusudhan Konda, Publisher: O'Reilly Media
Programming Jakarta Struts, 2nd Edition by Chuck Cavaness, Publisher: O'Reilly Medi
Upon successful completion of this course students will be able to-
learn to access database through Java programs, using Java Data Base Connectivity (JDBC)
create dynamic web pages, using Servlets and JSP.
make a resusable software component, using Java Bean.
invoke the remote methods in an application using Remote Method Invocation (RMI)
understand the multi-tier architecture of web-based enterprise applications using Enterprise JavaBeans (EJB).
developStateful, Stateless and Entity Beans.
use Struts frameworks, which gives the opportunity to reuse the codes for quick development.
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
Learn concepts of operating systems
Learn the mechanisms of OS to handle processes
Study of various mechanisms involved in memory management techniques
Gaining knowledge of deadlocks prevention and detection techniques
Analyzing disk management functions and techniques
Introduction to Operating Systems, Evaluation of OS, Types of operating Systems, system protection, Operating system services, Operating System structure, System Calls and System Boots, Operating System design and implementation, Spooling and Buffering.
Basic concepts of CPU scheduling, Scheduling criteria, Scheduling algorithms, algorithm evaluation, multiple processor scheduling. Process concept, operations on processes, threads, inter process communication, precedence graphs, critical section problem, semaphores, classical problems of synchronization,
Deadlock problem, deadlock characterization, deadlock prevention, deadlock avoidance, deadlock detection, recovery from deadlock, Methods for deadlock handling. Concepts of memory management, logical and physical address space, swapping, Fixed and Dynamic Partitions, Best-Fit, First-Fit and Worst Fit Allocation, paging, segmentation, and paging combined with segmentation.
Concepts of virtual memory, Cache Memory Organization, demand paging, page replacement algorithms, allocation of frames, thrashing, demand segmentation, Role of Operating System in Security, Security Breaches, System Protection, and Password Managment.
Disk scheduling, file concepts, File manager, File organization, access methods, allocation methods, free space managements, directory systems, file protection, file organization & access mechanism, file sharing implement issue, File Management in Linux, introduction to distributed systems.
Silberschatz ,”Operating system”, Willey Pub
Tanenbaum “ Modern Operating System” PHI Learning.
Dhamdhere, ”System Programming and Operating System”,TMH.
Stuart,”Operating System Principles, Design &Applications”,Cengage Learning
Operating System : Principle and Design by Pabitra Pal Choudhury, PHI Learning
Program to implement FCFS CPU scheduling algorithm.
Program to implement SJF CPU scheduling algorithm.
Program to implement Priority CPU Scheduling algorithm.
Program to implement Round Robin CPU scheduling algorithm.
Program to implement classical inter process communication problem(producer consumer).
Program to implement classical inter process communication problem(Reader Writers).
Program to implement classical inter process communication problem(Dining Philosophers).
Program to implement FIFO page replacement algorithm.
Program to implement LRU page replacement algorithm
Upon successful completion of this course the students will:
Gain knowledge of history of operating systems
Understand designissuesassociatedwithoperatingsystems
Gain knowledge ofvariousprocessmanagementconceptsincludingscheduling,synchronization,deadlocks
Understand conceptsofmemorymanagementincludingvirtualmemory
Understand issuesrelatedtofilesysteminterfaceandimplementation,diskmanagement
Befamiliarwithprotectionandsecuritymechanisms
BefamiliarwithvarioustypesofoperatingsystemsincludingUnix
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
To provide students with an overview of the concepts and fundamentals of computer networks
To familiarize with the basic taxonomy and terminology of computer networking area.
Describe how computer networks are organized with the concept of layered approach
To experience the designing and managing of communication protocols while getting a good exposure to the TCP/IP protocol suite
Importance of computer networks, broadcast and point to point networks, Local area networks and Wide area networks , ISO-OSI reference model, TCP/IP model , interfaces and services, Protocol data unit, connection oriented and connectionless services, service primitives, Binding Protocol Address- ARP & RARP, packet format, Encapsulation.
Data-Link layer: - Data link layer design issues, framing , flow & error control , physical addressing, Stop & Wait protocol ,Go back N ARQ ,selective repeat ARQ ,piggybacking and pipelining ,HDLC LAN Protocol stack-Logical link control and Media Access Control sublayer, IEEE 802.2 LLC Frame format; MAC layer Protocols- static and dynamic allocation, Pure and slotted ALOHA, Carrier sense multiple access, Persistent and non persistent CSMA, IEEE standard 802.3, 802.4, 802.5, FDDI,
The Network layer- logical addressing, classful & classless addressing, packet delivery & forwarding. unicast routing protocols , multicast routing protocols, Routing algorithm- Least Cost, Dijkstra's, Bellman-ford, Introduction to Internet protocol, IPv4 header, IPv4 Datagrams, Encapsulation, Fragmentation and Reassembly, IP routing, Subnet addressing, Subnet mask, Super netting- special case of IP addresses, Ipv6-Motivation, frame format and addressing. ICMP: Introduction, ICMP Header, ICMP message types.
Transport layer- TCP: Introduction ,Transport services , Process to process delivery, TCP ,congestion control algorithms, quality of service, headers, connection establishment and termination, timeout of connection establishment, maximum segment size, port no. and socket addresses, TCP timers, UDP: Introduction, UDP header, UDP checksum, UDP operations, encapsulation & decapsulation, queuing, SCTP-Services, transmission sequence number, stream identifier, stream sequence number, packet format.
Application layer - BOOTP:-operation, packet format, DHCP:-Address allocation, configuration & packet Format, DNS: Distribution of name spaces, DNS in the internet, FTP:-Connection, Communication, command processing, TFTP, E-Mail: SMTP, POP, IMAP, SNMP. study of internetworking devices and their configuration– switches, hubs, Bridges, routers and Gateways.
.“Computer Networks” - Tanenbaum ,PHI Learning
“Data Communication & Networks ” , Fourouzan TMH
“TCP/IP-Protocol suite”, Forouzan, TMH 3rd edition
“Computer Networks and Internets”, D.E.Comer, Pearson
“TCP/IP Illustrated” W. Richard Stevens, Volume I, Addison Wesley,
“Internetworking with TCP/IP Vol. I, II & III”, Comer , PHI Learning.
Upon successful completion of this course the students will:
Have agood understanding of the OSI Reference Model and its Layers
Identify core networking and infrastructure components and the roles they serve; and given requirements and constraints, design an IT infrastructure including devices, topologies, protocols, systems software, management and security;
Analyze the requirements for a given organizational structure and select the most appropriate networking architecture and technologies
Specify and identify deficiencies in existing protocols, and then go onto formulate new and better protocols
New Scheme Based On AICTE Flexible Curricula
Student learns some fundamental concepts in automata theory and designing of Finite Automata, conversion NFA to DFA. Application of Finite Automata in computer science and real world.
Obtain minimized DFA and Application of regular expression and conversion from RE to Finite Automata and Finite Automata to Regular Expression and Proving language are not regular.
Designing of CFG’s , Construction of parse trees, finding and removing ambiguity in grammars, simplification of CFG, Conversion of grammar to Chomsky Normal Form ,Greibach normal form.
Designing problems on Pushdown Automata and conversion of grammar to PDA, PDA to Grammar.
Designing Turing machines, understanding the working of various types of Turing machines and study P and NP type problem.
Introduction of the theory of computation, Finite state automata – description of finite automata, properties of transition functions, Transition graph, designing finite automata, FSM, DFA, NFA, 2-way finite automata, equivalence of NFA and DFA, Mealy and Moore machines.
Regular grammars, regular expressions, regular sets, closure properties of regular grammars, Arden’s theorem, Myhill-Nerode theorem, pumping lemma for regular languages, Application of pumping lemma, applications of finite automata, minimization of FSA.
Introduction of Context-Free Grammar - derivation trees, ambiguity, simplification of CFGs, normal forms of CFGs- Chomsky Normal Form and Greibach Normal forms, pumping lemma for CFLs, decision algorithms for CFGs, designing CFGs, Closure properties of CFL’s.
Introduction of PDA, formal definition, closure property of PDA, examples of PDA, Deterministic Pushdown Automata, NPDA, conversion PDA to CFG, conversion CFG to PDA.
Turing machines - basics and formal definition, language acceptability by TM, examples of TM, variants of TMs – multitape TM, NDTM, Universal Turing Machine, offline TMs, equivalence of single tape and multitape TMs. Recursive and recursively enumerable languages, decidable and undecidable problems – examples, halting problem, reducibility. Introduction of P, NP, NP complete, NP hard problems and Examples of these problems.
Daniel I.A. Cohen,“Introduction to Computer Theory”,Wiley India.
John E Hopcroft, Jeffrey D. Ullman and Rajeev Motwani, “Introduction to Automata Theory, Languages and Computation”, Pearson Education.
K.L.P Mishra & N.Chandrasekaran,“Theory of Computer Science”, PHI Learning.
Peter Linz, “Introduction to Automata Theory and Formal Languages”, Narosa Publishing.
John C Martin, “Introduction to languages and the theory of computation”, TATA McGraw Hill.
At the completion of the course, students will be able to...
Convertbetween finite automata, regular grammars, and regular expression representations of regular languages
Apply the pumping lemma for regular languages to determine if a language is regular
Convertbetweengrammars and push-down automata for context-free languages
Determine if a language is regular or context-free
Demonstrate that a grammar is ambiguous
Translate a context-free grammar from one form to another
Produce simple programs for a Turing Machine
Explain the concept of undecidability
List examples of undecidable problems
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
To introduce basic concepts of microprocessor
Tointroduceserialandparallelbusstandards.
To introduce programming in assembly language.
To introduce basic concepts of interfacing memory and peripheral devices to a microprocessor.
Evolution of microprocessor, single chip micro computers, Micro processor Application, Microprocessor and its architecture, addressing modes, instruction, Instruction sets, Arithmetic and Logic Instruction, Program control instruction, Introduction –8086 family, procedure and macros, connection , Timing and Troubleshooting interrupt, 80286, 80836 and 80486 micro processor system concept.
Microprocessor Cycle, AIU, Timing and control Unit, Register data, Address bus, Pin Configuration, Intel 8086 instruction, Opcode and operands, limitation word size. Programming the microprocessor Assembly language, The Pentium and Pentium Pro Micro Processorwith features, Pentium II, Pentium III and Pentium –IV Microprocessor with software changes. Instruction set for Intel 8086, Introduction Intimation and data formats, Addressing modes, Status flags, Symbols and abbreviations, programming of microprocessors, Assembly language, high level language, areas of application of various languages, Stacks, Sub routines system, software, commands in assembly language, software Development, Debugging program, Modular programming, Structured programming, Top-down, Bottom-up design , MACRO microprogramming.
Assembly language programming with Examples like Addition of 8/16-bit Binary number, subtraction of 8/16 bit binary number, Address partitioning, addressing mode, type of addressing mode, memory and I/o interfacing, Data transfer schemes, Interfacing device and I/o devices I/o ports, Basic I/o Interfacing MDS, Micro controllers, I/o processor and co-processors ,Microcomputer Development system, Single chip micro computers, intel 8748 intel 8051, inter 8096, intel 8049intel 2920/2921, I/o processor UPI-425,UPI-41,42, Co- processor, math processor math co-processor –8087, 80287, 80387DX 803875x
Bus Interface I/o port Addressing, decoding 8279, Programmable key board/display interface, 8254 Internal Timer, 16550 programmable communication interface A/D, 8259A Programmable Interrupt Controller, 8237 DMA Controller, Shared bus operation, disk Memory system Video display. ISA Bus, Extended ISA ( EISA) and VESA Local Buses, Peripheral Component Inter Connect (Pc I) Bus, Parallel Printer interface (LPT) Universal serial Bus (USB) Accelerated graphics port (AGP),Programmable Communication interfere 8251 VSART CRT Controller 8275, 6854, Floppy disk Controller 8272, I/o processor 8089.
Memory Unit, RAM,SRAM, DRAM,ROM, PROM EPROM, EEPROM Nonvolatile RAM semiconductor Technology for memory, Shift register, Magnetic Memory, Tap, disc, main memory and secondary memory
cache memory, program memory and Data Memory, Real and virtual memory Buses, memory Addressing capacity of CPU, processing speed of computer
Douglas V Hall, “Microprocessors and interfacing –Programming & Hardware” TMH
Barry B. Brey, “The intel Microprocessor –8086”, Pearson Education
Kenneth J.Ayala,”The 8086 Microproccessor: Programming & Interfacing The PC”,CengageLearning
Krishna Kant,”Microprocessors and Microcontrollers”, PHI Learning
A.K.Ray KM Bhurchandi, “Advanced Microprocessor and peripherals” McGraw Hill
R.S. Gaonkar ,”Microprocessors and interfacing”, TMH
At the completion of the course, students will be able to...
Explainthemicroprocessor’sandMicrocontroller’sinternalarchitecture
Applyknowledgeanddemonstrateprogrammingproficiencyusingthevariousaddressingmodesanddatatransf erinstructionsofthetargetmicroprocessorandmicrocontroller.
CompareacceptedstandardsandguidelinestoselectappropriateMicroprocessor(8085&8086)andMicrocontr ollertomeetspecifiedperformancerequirements.
Analyzeassemblylanguageprograms
DesignelectricalcircuitrytotheMicroprocessorI/Oportsinordertointerfacetheprocessortoexternaldevices.
Evaluateassemblylanguageprograms
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
The prime objective of this course is to teach the students to analyze, design and implement object-oriented
software systems
Michael Blaha, Object-Oriented modeling and Design with UML, PHI
Mahesh P. Matha, Object-Oriented Analysis and Design Using UML, PHI
D Jeya Mala and S. Geetha, Object-Oriented Analysis and Design Using UML, McGraw Hill
Andrew Haigh, Object-Orientd Analysis and Design, TMH
O’ Docherty, Object-Oriented Analysis and Design Understanding, System Development with UML 2.0, Wiley India
At the end of the course student will be able to:
Explain OOAD concepts
Perform object oriented analysis and develop static model of system after identifying classes and their relationships
Develop dynamic model of system by identifying states and events
Develop interaction model of system by drawing use case, sequence and activity diagrams
Select an appropriate design patternand effectively construct object-oriented programs
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
To present an overview of artificial intelligence (AI) principles and approaches
Develop a basic understanding of the building blocks of AI
Meaning and definition of artificial intelligence, Production systems, Characteristics of production systems, Study and comparison of breadth first search and depth first search techniques, other Search Techniques like hill Climbing, Best first Search. A* algorithm, AO* algorithms etc, and various types of control strategies.
Knowledge Representation, Problems in representing knowledge, knowledge representation using propositional and predicate logic, comparison of propositional and predicate logic, Resolution, refutation, deduction, theorem proving, inferencing, monotonic and non-monotonic reasoning.
Probabilistic reasoning, Baye's theorem, semantic networks, scripts, schemas, frames, conceptual dependency, fuzzy logic, forward and backward reasoning.
Game playing techniques like minimax procedure, alpha-beta cut-offs etc, planning, Study of the block world problem in robotics, Introduction to understanding, natural language processing.
Introduction to learning, Various techniques used in learning, Introduction to neural networks, applications of neural networks, common sense, reasoning, some example of expert systems.
Rich E and Knight K, “Artificial Intelligence”, TMH, New Delhi.
Nelsson N.J., “Principles of Artificial Intelligence”, Springer Verlag, Berlin.
Upon successful completion of this course the students will:
Be familiar with terminology used in this area
Explain what constitutes "Artificial" Intelligence and how to identify systems with Artificial Intelligence.
Know how to build simple knowledge-based systems
Have ability to apply knowledge representation, reasoning, and machine learning techniques to real- world problems
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
Discuss fundamentals of e-commerce, types and applications.
Evaluate the role of the major types of information systems in a business environment and their relationship to each other
Assess the impact of the Internet and Internet technology on business electronic commerce and electronic business
Identify the major e management challenges for building and using information systems and learn how to find appropriate solutions to those challenges.
Learn strategies for e-commerce, e government, Wireless Application Protocol, WAP technology and electronic payment system.
Definition of Electronic Commerce, Brief history of Ecommerce, e, E-Commerce: technology and prospects, incentives for engaging in electronic commerce, needs of E-Commerce, advantages and disadvantages, , Inter Organizational E-Commerce Intra Organizational E-Commerce, and Consumer to Business Electronic Commerce, Architectural framework ,Impact of E-commerce on business, E-Commerce Models.
Internet and Intranet based E-commerce- Issues, problems and prospects, Network Infrastructure, Network Access Equipments, Broadband telecommunication (ATM, ISDN, FRAME RELAY). Mobile Commerce: Introduction, Wireless Application Protocol, WAP technology, Mobile Information device. Emerging Client Server Security Threats, firewalls & Network Security.
Define e-Marketplace and Describe their Functions, Explain e-Marketplace types and their features, Describe the various types of auctions and list their characteristics, Discuss the benefits, limitations and impacts of auctions, E-Commerce in the wireless environment, Competition in the DE and impact on industry, Integration and e-Business suits, ERP, eSCM, CRM, e-Procurement definition, processes, methods and benefits , e- Payment, Discuss the categories and users of smart cards, Describe payment methods in B2B EC
Electronic Payments Overview of Electronics payments, Overview, The SET protocol, Payment Gateway, Digital Token based Electronics payment System, magnetic strip card, E-Checks, Smart Cards, Credit Card, Debit Card based EPS, Emerging financial Instruments, Home Banking, Online Banking.
Definition of e-Governments, theoretical background of e-governance, issues in e-governance applications, evolution of e-governance, Implementation, E-Government Services, Challenges and Opportunities, E- Government Benefits, e-governance models- broadcasting, critical flow, comparative analysis, mobilization and lobbying, interactive services / G2C2G.
Ravi Kalakota, Andrew Winston, “Frontiers of Electronic Commerce”, Addison Wesley.
Pete Lohsin , John Vacca “Electronic Commerce”, New Age International
Goel, Ritendra “E-commerce”, New Age International
Laudon, “E-Commerce: Business, Technology, Society”, Pearson Education
Bajaj and Nag, “E-Commerce the cutting edge of Business”, TMH
Turban, “Electronic Commerce 2004: A Managerial Perspective”, Pearson Education
Denieal Amor, “ The E-Business Revolution”, Addision Wesley
Diwan, Sharma, “E-Commerce” Excel
J. Satyanarayan, “E-government: The science of the possible”, PHI Learning Private Limited
C.S.R. Prabhu, “E-governence: concept and case study”, PHI Learning Private Limited
Upon successful completion of this course the student will be able to:
understand the e-business concepts.
understand the e-business models and infrastructure.
learn how e-business concepts are applied to different fields, such as: education, banking, tourism and so on.
willcome up with online business ideas and will be motivated to apply what they learned.
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
To learn the basic concepts and techniques which form the object oriented programming paradigm
To identify Java language components and how they work together in applications.
To design and program stand-alone Java applications.
To learn how to use exception handling in Java applications.
To learn Java Event Handling
The Java Environment: Java Development Kit (JDK) , Java virtual machine, Java programming environment(compiler, interpreter, applet viewer, debugger), Java Applications Programming Interface(API),Basic idea of application and applet. Java as an object oriented language: objects, classes, encapsulation, inheritance and software reuse, polymorphism, abstract classes and abstract methods,: defining an interface, implementing & applying interfaces, variables in interfaces, extending interfaces, Packages,scopeandlifetime;Accessspecifies;Constructors;Copyconstructor;this pointer; finalize() method; arrays; Memory allocation and garbage collection
AWT: Containers and components, AWT classes, window fundamentals: Component, Container, Panel, Window, Frame, Canvas, AWT Controls, Layout Managers and Menus: adding and removing control, Labels, Button, Check Box, Radio Button, Choice, menu, Text area, Scroll list, Scrollbar; Frame; Layout managers- flow layout, Grid layout, Border layout, Card layout. Java Event Handling Model: Java’s event delegation model –Ignoring the event, Self-contained events, Delegating events; The event class hierarchy; There lationship between interface, methods called, parameters and event source; Adapter classes; Event classes action Event, Adjustment Event, Container Event, Focus Event, Item Event, Eye Event, Mouse Event, Text Event,Window Event. Applets: Applet security restrictions; the class hierarchy for applets; Life cycle of applet; HTMLTags for applet Introduction to Swing: swing library, Building application susing Swings
Multithreading and Exception Handling: Overview of simple threads, Basic idea of multi threaded programming, Thread synchronization: Locks, synchronized methods, synchronized block,Thread scheduling,Producer-consumerrelationship,Daemon thread,Basicidea ofexception handling,stack basedexecutionandexceptionpropagation,Exception types: Exception Handling:Try,Catch,Finally,Throw statement,Assertions
Input/Output:ExploringJavaI/O.,Directories,streamclassesTheBytestream:Inputstream,outputstream,file input stream, file output stream, print stream, Randomaccess file, the character streams, Buffered reader, buffered writer, print writer, serialization. JDBC: JDBC-ODBCbridge; The connectivity model; The driver manager; Navigating there sult set object contents; java.sql Package; The JDBCexception classes; Connecting to Remote database.
Java Networking: exploring java. Net package Networking Basics: Socket, Client server, reservedsockets,servers,Internetaddressing,TCPsockets,UDPsockets. RMI: Client/Server architecture, RMI registry services; Step sofcreating RMI Application and an example
Naughton&Schildt“TheCompleteReferenceJava
TataMcGraw Hill.2.Deitel “Java-How toProgram:”PearsonEducation,Asia.
Horstmann&Cornell “CoreJava2” (Vol I&II) ,SunMicrosystems.
LvanBayross“Java2.0”:BPBpublications.
Ivor Horton’s“BeginningJava2,JDK5Ed.,WileyIndia.
JavaProgrammingfor theabsolutebeginnersByRussell,PHILearning
Upon successful completion of this course the student will:
Have the knowledge of the structure and model of the Java programming language
use the Java programming language for various programming tasks
develop software in the Java programming language
evaluate user requirements for software functionality required to decide whether the Java programming language can meet user requirements
propose the use of certain technologies by implementing them in the Java programming language to solve the given problem
New Scheme Based On AICTE Flexible Curricula Information Technology, V-Semester
To learn Designing and developing Web applications
Designing Enterprise based applications by encapsulating an application’s business logic.
Designing applications using pre-built frameworks.
Java Database Connectivity(JDBC): JDBC Product, Types of Drivers, Two-Tier Client/Server Model, Three- Tier Client/Server Model, Basic Steps of JDBC, Creating and Executing SQL Statement, The Result Set Object, Working with Database MetaData Interface
Java Servlets:Servlet Interaction & Advanced Servlets, Life cycle of Servlet, Java Servlet Development Kit, Javax.servletpackage, Reading Servlet Parameters, Reading Initialization Parameters, The javax.servlet.http Package, Handling HTTP.
JavaServer Pages(JSP): JSP Technologies, Understanding the Client-Server Model, Understanding Web server software, Configuring the JSP Server, Handling JSP Errors, JSP Translation Time Errors, JSP Request Time Errors, Creating a JSP Error Page
Remote Method Invocation (RMI): RMI Architecture, Designing RMI application, Executing RMI application
Enterprise Java Beans (EJB): Types of EnterpriseJava beans, Session Bean & Entity Bean, Features of Session Bean, Life-cycle of Stateful Session Bean, Features of Entity Bean, Life-cycle of Entity Bean, Container- managed Transactions & Bean-managed Transactions, Implementing a container-managed Entity Bean
Struts: Introduction to the Apache Struts, MVC Architecture, Struts Architecture, How Struts Works? Introduction to the Struts Controller, Introduction to the Struts Action Class, Using Struts ActionFrom Class, Using Struts HTML Tags, Introduction to Struts Validator Framework, Client Side Address Validation in Struts, Custom Validators Example, Developing Application with Struts Tiles
Java the Complete Reference, ninth edition by Herbert Schild, Publisher: McGraw Hills
Head First EJB 3.0 by Kathy Sierra, Bert Bates, Publisher: O'Reilly Media 3.Head First Servlets and JSP by Bryan Basham, Kathy Sierra & Bert Bates, Publisher: O'Reilly Media
Just Hibernate, A Lightweight Introduction to the Hibernate Framework by Madhusudhan Konda, Publisher: O'Reilly Media
Programming Jakarta Struts, 2nd Edition by Chuck Cavaness, Publisher: O'Reilly Medi
Upon successful completion of this course students will be able to-
learn to access database through Java programs, using Java Data Base Connectivity (JDBC)
create dynamic web pages, using Servlets and JSP.
make a resusable software component, using Java Bean.
invoke the remote methods in an application using Remote Method Invocation (RMI)
understand the multi-tier architecture of web-based enterprise applications using Enterprise JavaBeans (EJB).
developStateful, Stateless and Entity Beans.
use Struts frameworks, which gives the opportunity to reuse the codes for quick development.