student hand book for iv b.tech i sem - mlritm hand...student hand book for iv b.tech i sem computer...
Post on 15-Aug-2021
3 Views
Preview:
TRANSCRIPT
Department Of Computer Science and Engineering
STUDENT HAND BOOK
FOR
IV B.Tech I Sem
COMPUTER SCIENCE AND ENGINEERING
COURSE DESCRIPTION FORM
Course Title Cloud Computing
Course Code A70519
Regulation R13-JNTUH
Course Structure Lectures Tutorials Practical Credits
4 - - 4
Course Coordinator BRAHMAM Assoc.Prof
I. COURSE OVERVIEW:
Cloud Computing is a large-scale distributed computing paradigm which has become a driving
force for information technology over the past several years. The exponential growth data size in
scientific instrumentation/simulation and social media has triggered the wider use of cloud
computing services.We will explore solutions and learn design principles for building large
network-based systems to support both compute and data intensive computing across
geographically distributed infrastructure.
II. PREREQUISITES:
Level Credits Periods / Week Prerequisites UG 4 6 Computer Networks,DBMS
III. COURSE ASSESSMENT METHODS:
Session Marks
University
End Exam
Marks
Total Marks
Mid Semester Test
There shall be two midterm examinations. Each midterm examination
consists of subjective type and objective type tests.
The subjective test is for 10 marks of 60 minutes duration.
Subjective test of shall contain 4 questions; the student has to answer
2 questions, each carrying 5 marks.
The objective type test is for 10 marks of 20 minutes duration. It
consists of 10 Multiple choice and 10 objective type questions, the
student has to answer all the questions and each carries half mark.
First midterm examination shall be conducted for the first four units of
syllabus and second midterm examination shall be conducted for the
remaining portion.
Assignment
Five marks are earmarked for assignments.
There shall be two assignments in every theory course. Marks shall be
awarded considering the average of two assignments in each course.
75 100
IV. EVALUATION SCHEME:
S. No Component Duration Marks
1 I Mid Examination 80 minutes 20 2 I Assignment - 5 3 II Mid Examination 80 minutes 20 4 II Assignment - 5 5 External Examination 3 hours 75
V. COURSE OBJECTIVES:
I. To impart fundamental concepts in the area of cloud computing
II. To impart knowledge in applications of cloud computing
III. To introduce the broad perceptive of cloud architecture and model.
IV. To understand the concept of virtualization and design of cloud services.
V. To be familiar with the lead players in a cloud.
VI. To understand the features of Cloud Simulator.
VII. To apply different cloud programming model as per need.
VIII. To learn to design the trusted cloud computing system.
VI. COURSE OUTCOMES:
Upon successful completion of this course students will be able to:
1. Ability to use programming principles of computer graphics, including fundamental data-
structures and algorithms for rendering and modeling.
2. Knowledge of computer graphics algorithms and how to implement them.
VII HOW PROGRAM OUTCOMES ARE ASSESSED
Program Outcomes Level Proficiency
assessed by PO1 Engineering knowledge: Apply the knowledge of mathematics,
science, engineering fundamentals, and an engineering specialization
to the solution of complex engineering problems.
S
Assignment,
Exercises
PO2 Problem analysis: Identify, formulate, review research literature,
and analyze complex engineering problems reaching substantiated
conclusions using first principles of mathematics, natural sciences,
and engineering sciences.
S
Exercises
PO3 Design/development of solutions: Design solutions for complex
engineering problems and design system components or processes
that meet the specified needs with appropriate consideration for the
public health and safety, and the cultural, societal, and
environmental considerations.
H
Exercises
PO4 Conduct investigations of complex problems: Use research- based
knowledge and research methods including design of experiments,
analysis and interpretation of data, and synthesis of
the information to provide valid conclusions.
N
-----------
PO5 Modern tool usage: Create, select, and apply appropriate
techniques, resources, and modern engineering and IT tools
including prediction and modeling to complex engineering activities
with an understanding of the limitations.
N
-----------
PO6 The engineer and society: Apply reasoning informed by the
contextual knowledge to assess societal, health, safety, legal and
cultural issues and the consequent responsibilities relevant to the
professional engineering practice.
N
-------------
PO7 Environment and sustainability: Understand the impact of the
professional engineering solutions in societal and environmental
contexts, and demonstrate the knowledge of, and need for
sustainable development.
N
-------------
PO8 Ethics: Apply ethical principles and commit to professional ethics
and responsibilities and norms of the engineering practice. S
Seminars,
Discussions
PO9 Individual and team work: Function effectively as an individual,
and as a member or leader in diverse teams, and in multidisciplinary
settings.
N
--------------
PO10 Communication: Communicate effectively on complex engineering
activities with the engineering community and with society at large,
such as, being able to comprehend and write effective reports and
design documentation, make effective presentations, and give and
receive clear instructions.
N
---------------
PO11 Project management and finance: Demonstrate knowledge and
understanding of the engineering and management principles and
apply these to one‟s own work, as a member and leader in a team, to
manage projects and in multidisciplinary environments.
H
Exercises,
Discussions
PO12 Life-long learning: Recognize the need for, and have the
preparation and ability to engage in independent and life-long
learning in the broadest context of technological change.
N
------------------
N - None S - Supportive H - Highly Related
VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:
Program Specific Outcomes Level Proficiency
assessed by
PSO1 Applications of Computing: Ability to use knowledge in various
domains to provide solution to new ideas and innovations.
H Lectures,
Assignments
PSO2 Programming Skills: Identify required data structures, design suitable
algorithms, develop and maintain software for real world problems.
H
Projects
N - None S - Supportive H - Highly Related
IX. SYLLABUS:
UNIT I
System Modeling, Clustering and Virtualization: distributed system models and enabling
technologies, computer clusters for scalable parallel computing, virtual machines and
virtualization of clusters and data centers.
UNIT II
Foundations: introduction to cloud computing, migrating into cloud, enriching the integration
of service paradigm for cloud era, the enterprise cloud computing paradigm
UNIT III
Infra Structure As Service (IAAS)& Platform And Software Service(PAAS/SAAS): Virtual
machine provisioning and migration services, on the management of virtual machines for
cloud infrastructure, enhancing cloud computing environments using a cluster as service,
secure distributed data storage in cloud computing
Aneka, comet cloud, T-systems, work flow engine for clouds ,understanding scientific
applications for cloud environments
UNIT IV
Monitoring, Management And Applications :An Architecture for federated cloud computing
,SLA management in cloud computing, performance prediction for HPC on clouds, best
practices in Architecting cloud applications in the AWS cloud, building content delivery
networks using clouds, resource cloud mashups.
UNIT V
Governance and case studies: organizational readiness and change management in cloud age,
data security in cloud, legal issues in cloud computing, achieving production readiness for
cloud services.
Text Books 1. Cloud computing: principles and paradigms by rajkumar buyya, james Broberg and Andrzej
M.Goscinski,wiley,2011
2. Distributed and cloud computing , kai Hwang, Geofferyu C.fox, jack J.dongarra, Elsevier,
2012
References 1. Cloud Computing :A practical approach, Anthony T.velte, Toby J.velte, Robert
Elsenpeter,Tata McGraw Hill,2011
2. Enterprise Cloud Computing, Gautam Shroff, Cambridge University press,2010
3. Cloud computing: implementation ,management and security, john W .Ritting house ,james F.
Ransome ,CRC press,rp2012
4. Cloud applications architectures: building Applications and infrastructure in the cloud,George
Reese ,O reilly,SPD,rp2011
5. Cloud security and privacy: An Enterprise perspective on Risks and compliance,im Mather,
Subra Kumaraswamy,Shahed Latif,O reilly,SPD,rp2011
X. COURSE PLAN:
The course plan is meant as a guideline. There may probably be changes.
Lecture
No.
Learning
Objectives Topics to be covered Reference
1-2 To Understand The Different
Types Of Systems ,System
Models
SYSTEM MODELING,CLUSTURES AND
VIRTUALIZATION
T2:10-58
3
4-5
6
8
17 To Understand Different
Types Of Clusters‟, Different
Types Of Clusters‟
COMPUTER CLUSTURES
T2:68-168
18
19
20
21
22 To Define The Definition Of
Scalable Computing And
Virtualization, Virtual
Machines
Scalable Parallel Computing T2:174-286
23 Computer Clusters For Scalable Parallel
Computing
24 Virtual Machines And Virtualization Of
Clusters And Data Centers
25
26
27 To Understand What Is
Cloud And Able To Define
Cloud And Its Uses
The Enterprise Cloud Computing Paradigm T1:97-158
37
40 To Understand The
Infrastructure Of Cloud And
We Are Accessing That
From Cloud
Infrastructure As A Service(Iaas)&Platform
And Software As A Service(Paas/Saas)
T1:126-130
43-44 Basics Of Infrastructure As A
Service(Iaas)&Platform And Software As A
Service(Paas/Saas):
T1:140-144
45 Virtual Machines Provisioning And
Migration Services
T1:145-154
46 To Manage The Device
Which Are Virtualized
On The Management Of Virtual Machines
For Cloud Infrastructures,
T1:152-185
48 To Understand The Data
Storage In Cloud
Enhancing Cloud Computing Environments
Using A Cluster As A Service ,
T1:193-212
49 Secure Distributed Data Storage In Cloud
Computing.
T1:221-242
50 Aneka, Comet Cloud, T-Systems, T1:252-298
41
To Understand The
Applications Of Cloud And
Monitoring And
Management Of Cloud
Applications
Understanding Scientific Applications For
Cloud Environments.
T1:345-385
52 Monitoring, Management Applications: An
Architecture For Federated Cloud Computing
T1:393-410
53-54 Sla Management In Cloud Computing,
Resource Cloud Mashups
T1:413-429
55 Performance Prediction For Hpc On Cloud T1:437-445
56 Best Practices In Architecting Cloud
Applications In The Aws Cloud,
T1:459-542
57 Governance And Case Studies T1:551-567
58 Organizational Readiness And Change
Management In The Cloud Age,
T1:567-572
59 Data Security In The Cloud, T1:573-588
60 Achieving Production Readiness For Cloud
Services
T1:593-612
XI. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF
PROGRAM OUTCOMES:
Course
Objectives
Program Outcomes Program
Specific
Outcom
es PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
I S H H S
II S H S S
III H S
IV S S S
V S S
VI S S H H S
S =Supportive H = Highly Related
XII. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF THE
PROGRAM OUTCOMES:
Course
Objectives
Program Outcomes Program
Specific
Outco
mes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
1 S S
2 S S
S =Supportive H = Highly Related
COMPUTER SCIENCE AND ENGINEERING
ASSIGNMENT
Course Name : CLOUD COMPUTING
Course Code : A70519
Class : IV B. Tech ISemester
Branch : Computer Science and Engineering
Year : 2016 – 2017
Course Faculty : BRAHMAM Assoc.Prof
OBJECTIVES:
To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be
addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of
quality assurance in higher education. The major emphasis of accreditation process is to measure the
outcomes of the program that is being accredited.
In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in
incorporating philosophy of outcome based education in the process of problem solving and career
development. So, all students of the institute should understand the depth and approach of course to be
taught through this question bank, which will enhance learner‟s learning process.
S. No. Question Blooms
Taxonomy
Level
Course
Outcome
UNIT - I
1 Define distributed systems Knowledge 2
2 Write about parallel computing Create 1
3 Write about virtual machines Create 1
4 Define single system image Knowledge 2
5 Write about resources sharing in clustures Create 2
6 Explain briefly about HTC Understand 1
7 Write about distributed system models and enabling technologies Create 1
8 Explain in detail about system models and distributed cloud
computing
Understand 2
9 Explain about Design Principles of Computer Clusters Understand 2
10 List out the design principles of computer clustures Understand 1
UNIT – II
1 What is cloud computing? Enlist and Explain three service models,
and four deployment models of cloud computing.
Understand 1
2 Explain the system models for distributed and cloud computing? Understand 2
3 Explain the architecture of P2P system? Understand 2
4 Explain architectural design of compute and storage clouds? Understand 2
5 Explain the infrastructure of Grid computing in detail? Understand 2
6 Explain any six benefits of Software as Service in Cloud
computing?
Understand 2
S. No. Question Blooms
Taxonomy
Level
Course
Outcome
UNIT – III
1 Explain in detail about RVWS design? Understand 1
2 What is ANEKA cloud platform? Understand 2
3 Explain the technologies for data security in cloud computing? Understand 1
4 Implement in detail about hybrid cloud? Knowledge 2
5 Explain the importance of quality and security in clouds? Knowledge 1
6 Explain in detail about hybrid cloud implementation Understand 2
7 Draw a neat sketch for architectural overview Application 1
8 Explain about ANEKA resource provisioning service? Understand 2
UNIT - IV
1 Write about SAP systems in detail Understand 2
2 List out the business benefits of cloud computing Knowledge 2
3 List out the business benefits of cloud computing Knowledge 2
4 Explain about SLA management in cloud Understand 1
5 Explain about SLA management in cloud Understand 2
6 Draw a neat sketch for automated policy based management with
brief explanation
Application 1
7 Write about HPC systems and HPC on clouds Understand 2
8 List out the technical benefits of cloud computing Knowledge 2
9 Explain in detail about decouple your components Understand 2
UNIT - V
1 Explain about a framework to comprehend the competitive
environment
Understand 1
2 Explain about digital identity and data security Understand 2
3 Write about quality of service and value composition Understand 2
4 Explain about common change management models(CMMM) Understand 2
5 List out the cloud contracting models Knowledge 1
6 List out the data privacy and security issues Knowledge 1
7 Explain about management maturity model Understand 2
COMPUTER SCIENCE AND ENGINEERING
TUTORIAL QUESTION BANK
Course Name : CLOUD COMPUTING
Course Code : A30404
Class : IV B. Tech I Semester
Branch : CSE
Year : 2016 – 2017
Course Faculty : BRAHMAM Assoc.Prof
OBJECTIVES
To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to
be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of
quality assurance in higher education. The major emphasis of accreditation process is to measure the
outcomes of the program that is being accredited.
In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in
incorporating philosophy of outcome based education in the process of problem solving and career
development. So, all students of the institute should understand the depth and approach of course to be taught
through this question bank, which will enhance learner‟s learning process.
S No QUESTION Blooms
taxonomy
level
Course
Outcomes
UNIT - I
System Modeling, Clustering And Virtualization
Part - A (Short Answer Questions)
1 Define distributed systems Remember 1
2 Write about parallel computing Understand 1
3 Write about virtual machines Understand 1
4 Define single system image Understand 2
5 Write about resources sharing in clusters Understand 2
6 Explain briefly about HTC Remember 1
7 Write about middleware support for virtualization Remember 2
8 Explain briefly about HPC Remember 2
9 Write about virtual support at os level Remember 2
10 List the disadvantages of extending os level Remember 2
11 What are the basic characteristics of cloud computing? Understand 2
12 How does cloud computing provides on- demand functionality? Remember 2
13 Define multi core CPU? Remember 1
14 Define GPU? Remember 2
15 Define anything-as-a-service? Understand 1
16 Define private cloud, public cloud & hybrid cloud? Understand 2
17 Difference between distributed and parallel computing? Understand 2
18 Define cloud provider and cloud broker? Understand 2
19 List the design objectives of cloud computing? Remember 2
20 Why should one prefer public cloud over private cloud? Remember 2
Part - B (Long Answer Questions)
1 Write about distributed system models and enabling
technologies
Remember 1
2 Explain in detail about system models and distributed cloud
computing
Analyze 1
3 Explain about Design Principles of Computer Clusters Evaluate 2
4 List out the design principles of computer clustures Remember 2
5 Explain about Computer Clusters and MPP Architectures Understand 2
6 Write about technologies for network based system with suitable
diagrams
Remember 2
7 Write about Virtual Clusters and Resource Management Understand 2
8 Explain the virtualisation structure/Tools and mechanisms Understand 1
9 Explain the Cluster Architecture in detail? Understand 1
10 What is cloud computing? Enlist and Explain three service models,
and four deployment models of cloud computing
Remember 1
11 Explain the cloud eco system? Understand 1
12 Explain the NIST cloud computing reference architecture? Analyze 2
13 Explain the infrastructure of Grid computing in detail? Analyze 2
14 Explain multithreading model in detail? Understand 2
15 Explain the architecture of P2P system? Remember 2
16 Explain the infrastructure of Grid computing in detail? Remember 1
17 Explain the system models for distributed and cloud computing? Understand 2
18 Explain architectural design of compute and storage clouds? Understand 1
19 What is mean by Virtualization Middleware Understand 1
20 List the design issues in clusters? Remember 2
Part - C (Problem Solving and Critical Thinking Questions)
1 What are the three computing paradigms for cloud computing Analyze 2
2 Draw a neat graph for hype cycle for emerging technologies Evaluate 2
3 Sketch a three cloud service models in a cloud landscape of major
providers
Evaluate 2
4 Explain in detail about evaluation of SOA Evaluate 2
5 Explain in detail about evaluation of SOA Remember 2
6 Explain about parallel and distributed programming models Evaluate 2
7 Discuss GPU clusters for massive parallelism Remember 2
8 How does cloud architecture overcome the difficulties faced by
traditional architecture? What are the three differences that separate
out cloud architecture from the tradition one?
Evaluate 2
9 Explain the virtualization for data center automation? Evaluate 2
10 Explain the concept dynamic deployment of virtual clusters? Evaluate 2
UNIT - II
Part – A (Short Answer Questions)
1 Define cloud? Remember 1
2 How does cloud computing provides on demand functionality? Remember 2
3 Define cloud computing? Understand 2
4 List out characteristics of cloud computing? Remember 1
5 Define utility computing? Remember 2
6 List out the features of cloud computing? Remember 1
7 Define grid computing? Apply 1
8 What is autonomic computing? Analyze 1
9 List out the challenges in cloud Remember 1
10 What is boomi software? Remember 2
11 List the design goals for generic cloud? Remember 2
12 List the cloud enabling technologies? Create 2
13 Explain the QoS factors in cloud? Evaluate 1
14 Define hardware virtualization? Remember 2
15 Explain the storage virtualization? Remember 2
16 Define VM cloning? Create 1
17 Explain runtime support service? Evaluate 2
18 Define software stack? Remember 2
19 List out different layers which define cloud architecture? Remember 1
20 What is the use of “EUCALYPTUS” in cloud computing? Evaluate 2
Part - B (Long Answer Questions)
1 What is cloud computing? Enlist and Explain three service models,
and four deployment models of cloud computing.
Understand 2
2 Explain the system models for distributed and cloud computing? Analyze 2
3 Explain the architecture of P2P system? Analyze 2
4 Explain architectural design of compute and storage clouds? Understand 1
5 Explain the infrastructure of Grid computing in detail? Understand 1
6 Explain any six benefits of Software as Service in Cloud computing? Understand 2
7 Why is cloud called as eco system? justify Analyze 2
8 Difference between process virtual machines, host VMMs, native
VMMs.
Analyze 1
9 Explain the importance of virtualization Remember 1
10 “SOA as step forward cloud computing”, Explain? Understand 2
11 Discuss inter-cloud resource management. Analyze 2
12 Discuss in detail about global exchange of cloud resources. Understand 2
13 Mention the name of some large cloud providers and
databases?
Understand 2
14 As a infrastructure as a service what are the resources that are
provided by it?
Understand 1
15 Explain the different levels of virtualization implementation? Understand 2
16 Explain the OS level virtualization? List the pros and cons of
OS level virtualization?
Understand 2
17 Explain in details the tools and mechanisms for virtualization? Remember 2
18 Explain the different types of virtualization in detail? Understand 2
19 Explain the virtualization of CPU, Memory and I/O devices? Understand 2
20 Explain the virtualization of multi core processor? Remember 1
Part – C (Problem Solving and Critical Thinking)
1 Explain cloud computing architecture and cloud components? Evaluate 2
2 Explain the NIST reference architecture of cloud computing in
detail?
Evaluate 2
3 Explain risk from multi tenancy environment. How IDS can be used
in environment?
Evaluate 2
4 Discuss SAAS, PAAS, IAAS and compare them? Evaluate 2
5 Explain Information and Data Model for Virtual machine. Evaluate 2
6 How does cloud architecture overcome the difficulties faced by
traditional architecture? What are the three differences that separate
out cloud architecture from the tradition one?
Evaluate 2
7 Explain the infrastructure of Grid computing in detail? Remember 2
8 Explain multithreading model in detail? Evaluate 2
9 Mention some open source cloud computing platform databases? Evaluate 1
10 Explain the difference between cloud and traditional datacenters? Evaluate 1
UNIT-III
Infra Structure As Service (IAAS)& Platform And Software Service
Part - A (Short Answer Questions)
1 Define fault tolerance? Remember 2
2 What is load balancing? Understand 2
3 Explain in brief about public cloud and infrastructure services Understand 2
4 Write about Google app engine Understand 2
5 Sketch the Aneka architecture Understand 2
6 Draw a neat diagram for Open Nebula high level architecture Understand 2
7 Write about VM life cycle Remember 2
8 Explain in brief about private cloud and infrastructure services Remember 2
9 Write about Microsoft windows azure Understand 1
10 Define on demand service Remember 1
11 List the design goals for generic cloud? Understand 2
12 List the cloud enabling technologies? Understand 2
13 Explain the QoS factors in cloud? Remember 2
14 Define hardware virtualization? Understand 2
15 Explain the storage virtualization? Remember 2
16 Define VM cloning? Remember 2
17 Explain runtime support service? Remember 2
18 Define software stack? Remember 1
19 Define dynamic resource deployment? Remember 2
20 Define the provisioning of compute resources? Remember 2
Part – B (Long Answer Questions)
1 Explain in detail about RVWS design? Understand 2
2 What is ANEKA cloud platform? Remember 2
3 Explain the technologies for data security in cloud computing? Remember 2
4 Implement in detail about hybrid cloud? Understand 1
5 Explain the importance of quality and security in clouds? Evaluate 1
6 Explain in detail about hybrid cloud implementation Understand 2
7 Draw a neat sketch for architectural overview Understand 2
8 Explain about ANEKA resource provisioning service? Evaluate 2
9 Draw a neat a of autonomic cloud bridging Remember 2
10 List out the importance of quality and security in cloud Evaluate 2
11 Explain the cloud architecture with suitable block diagram? Understand 2
12 Explain the layered cloud architecture development? Understand 2
13 Explain the various design challenges for effective cloud computing
environment?
Understand 2
14 Explain the cloud service tasks and trends? Explain the different
methods of resource provisioning and platform deployment in detail
with a neat diagram?
Understand 2
15 Explain the provisioning of storage resources in detail? Understand 1
16
What is quality of service (QoS) monitoring in a cloud computing?
Enlist and Explain different issues in inter-cloud environments.
Understand 2
17 What is the use of “EUCALYPTUS” in cloud computing? Understand 1
18 Mention some open source cloud computing platform databases? Understand 1
19 Mention the name of some large cloud providers and databases? Understand 2
20 As a infrastructure as a service what are the resources that are
provided by it?
Understand 2
Part – C (Problem Solving and Critical Thinking)
1 Explain in detail about VM provisioning process Evaluate 2
2 Sketch a neat diagram for a deployment scenario network with Evaluate 1
3 Explain VM life cycle and VM monitoring Evaluate 2
4 Write about infrastructure enabling technology Evaluate 2
5 Explain in detail about automatic and selection process Evaluate 1
6 List out the technologies for data security in cloud computing Evaluate 1
7 Explain about scheduling techniques for advance reservation of
capacity
Evaluate 1
8 Write about RVWS design in detail Evaluate 1
9 Explain the cloud architecture with suitable block diagram? Evaluate 2
10 Explain the layered cloud architecture development? Evaluate 2
UNIT-IV
Monitoring, Management And Applications
Part – A (Short Answer Questions)
1 Write about federation Remember 1
2 Define isolation Remember 1
3 Explain in brief about the virtual execution environment manager Remember 1
4 Sketch a neat diagram for hosting of applications on servers Remember 2
5 Define federation scenarios Evaluate 2
6 Draw a flow chart of the SLA management in cloud Remember 2
7 Write about elasticity Apply 2
8 Write about grid and cloud Remember 2
9 Explain in brief about the virtual execution environment host Evaluate 2
10 List out the technical benefits of cloud computing Understand 1
11 Define BigTable? Remember 1
12 What is mean by NOSQL? Apply 1
13 Explain the Google‟s distributed lock service? Apply 1
14 Explain the Google‟s distributed lock service? Remember 2
15 Define SQLAzure? Remember 2
16 Define GFS? Remember 2
17 Define block replication Remember 2
18 List the characteristics of HDFS? Analyze 2
19 Define block replication? Apply 2
20 Define heart beat in Hadoop? Analyze 2
Part – B (Long Answer Questions)
1 Write about SAP systems in detail Remember 2
2 List out the business benefits of cloud computing Understand 2
3 List out the business benefits of cloud computing Remember 2
4 Explain about SLA management in cloud Understand 2
5 Explain about SLA management in cloud Remember 2
6 Draw a neat sketch for automated policy based management with
brief explanation
Apply 2
7 Write about HPC systems and HPC on clouds Apply 2
8 List out the technical benefits of cloud computing Remember 2
9 Explain in detail about decouple your components Remember 2
10 List out the technical benefits of cloud computing Evaluate 2
11 Explain in detail about decouple your components Evaluate 2
12 Explain the dataflow and control flow of MapReduce? Remember 2
13 Explain the architecture of MapReduce in Hadoop? Remember 2
14 Explain a user view of Google App Engine with suitable block
schematic
Remember 1
15 Explain the structure of BigTable data model? Remember 1
16 Explain the programming structure ofAmazon EC2? Remember 1
17 Explain the architecture of Amazon EC2 ? Remember 2
18 Explain the Microsoft Azure programming support? Remember 2
19 Discuss the architecture and components of OpenNebula? Remember 1
20 Explain the architecture of OpenStack system?
Part – C (Problem Solving and Critical Thinking)
1 List out the basic principles of cloud computing Create 2
2 Sketch a neat diagram for reservoir 1
3 Explain about security considerations Remember 1
4 Write about automated policy based management Create 2
5 Explain about traditional approaches to SLO management Evaluate 1
6 Write about amazon web services cloud Create 2
7 Draw a flow chart of the SLA management in cloud Evaluate 2
8 Write about elasticity Evaluate 1
9 Discuss the cloud software environment of Eucalyptus in detail. Evaluate 2
10 Mention what is Hypervisor in cloud computing and their types?
UNIT-V
Governance and case studies
Part - A (Short Answer Questions)
1 List out the strengths of information cards Evaluate 1
2 Draw a neat sketch of perception of quality Remember 1
3 Distinguish direct versus indirect distribution Remember 1
4 Write about cloud service life cycle Remember 2
5 List out the weakness of information cards Remember 2
6 Define service strategy Understand 2
7 Write about acceptance testing Remember 2
8 What is digital entity Remember 2
9 Write about service design Understand 2
10 What is data security Remember 2
11 What are the security challenges in cloud computing? Remember 1
12 Define security governance? Understand 1
13 Explain the security awareness in cloud? Remember 2
14 Define third party risk management? Understand 2
15 What are the layers in security architecture design? Remember 2
16 Define VM security? Understand 1
17 Explain change management? Understand 2
18 Define security images? Understand 2
19 What is mean by vulnerability assessment? Remember 2
20 Define data shredding technique. Remember 2
21 What is mean by password assurance testing? Remember 2
Part - B (Long Answer Questions)
1 Explain about a framework to comprehend the competitive
environment
Understand 1
2 Explain about digital identity and data security Understand 2
3 Write about quality of service and value composition Apply 2
4 Explain about common change management models(CMMM) Remember 1
5 List out the cloud contracting models Remember 1
6 List out the data privacy and security issues Create 1
7 Explain about management maturity model Remember 1
Prepared By: HOD, CSE
8 Write about acceptance testing Understand 1
9 Explain the Security challenges in cloud computing in detail? Understand 1
10 Explain the security architecture in detail? Understand 1
11 Explain the following
a. Security governance
b. Security monitoring
Remember 2
12 Explain the Secure Software Development Life Cycle? Remember 2
13 Explain in detail about Software-as-a-Service security? Remember 2
14 Explain the application security in detail? Analyze 1
15 Explain the data security and virtual machine security in detail? Analyze 1
16 Explain the identity management and access control in detail? Analyze 1
17 Explain the two fundamental functions, identity management and
access control, which are required for secure cloud computing.
Remember 1
18 Explain the following
a. Autonomic Security
b. Risk management
Analyze 2
19 What are the measures included in GuestOS hardening technique ? Understand 1
20 How is intrusion detection implemented under SAAS model? Understand 1
Part – C (Problem Solving and Critical Thinking)
1 Write about a need for cloud mashups Evaluate 2
2 Write about cloud contracting models Evaluate 2
3 Write about quality of service and value composition. Evaluate 2
4 Explain about common change management models(CMMM) Evaluate 2
5 Explain about common change management models Evaluate 2
6 Explain about a framework to comprehend the competitive
environment
Evaluate 1
7 Define Distributed Denial-of-service attack Evaluate 1
8 Which security mechanism provides an effective control for data
confidentiality and integrity?
Evaluate 1
9 Define security governance Evaluate 1
10 EXPLAIN the layers in security architecture design? Evaluate 1
COMPUTER SCIENCE AND ENGINEERING
COURSE DESCRIPTION FORM
Course Title DATA WAREHOUSING AND DATA MINING
Course Code A70520
Regulation R13 - JNTUH
Course Structure Lectures Tutorials Practicals Credits
4
- - 4
Course Faculty N PUSHPALATHA Assoc.Prof
I. COURSE OVERVIEW:
The course addresses the concepts, skills, methodologies, and models of data warehousing. The
proper techniques for designing data warehouses for various business domains, and covers concepts
for potential uses of the data warehouse and other data repositories in mining opportunities are
addressed. Data mining, the extraction of hidden predictive information from large databases, is a
powerful new technology with great potential to help companies focus on the most important
information in their data warehouses. Data mining tools predict future trends and behaviors,
allowing businesses to make proactive, knowledge- driven decisions.
II. PREREQUISITE(S):
Level Credits Periods/ Week Prerequisites
UG 4 4 Database Management Systems, Probability & Statistics
III. COURSE ASSESSMENT METHODS:
University
Total Session Marks End Exam marks marks
Midterm Test
There shall be two midterm examinations. Each midterm examination consists of essay paper, objective paper and assignment.
The essay paper is for 10 marks of 60 minutes duration and shall contain
4 questions. The student has to answer 2 questions, each carrying 5 marks. The objective paper is for 10 marks of 20 minutes duration. It consists of 10 multiple choice and 10 fill-in-the blank questions, the student has to answer all the questions and each carries half mark.
First midterm examination shall be conducted for the first two and half
units of syllabus and second midterm examination shall be conducted for the remaining portion.
Five marks are earmarked for assignments. There shall be two Assignments in every theory course. Assignments are usually issued 75 100
at the time of commencement of the semester. These are of problem
solving in nature with critical thinking. Marks shall be awarded considering the average of two midterm tests in each course.
IV. EVALUATION SCHEME:
S. No Component Duration Marks
1. I Mid Examination 80 minutes 20
2. I Assignment - 5
3. II Mid Examination 80 minutes 20
4. II Assignment - 5
5. External Examination 3 hours 75
V. COURSE OBJECTIVES:
At the end of the course, the students will be able to:
I. Be familiar with mathematical foundations of data mining tools.
II. Understand and implement classical models and algorithms in data warehouses and data mining.
III. Characterize the kinds of patterns that can be discovered by association rule mining,
classification and clustering.
IV. Master data mining techniques in various applications like social, scientific and environmental context.
V. Develop skill in selecting the appropriate data mining algorithm for solving practical problems.
VI. Be familiar with the process of data analysis, identifying the problems, and choosing the
relevant models and algorithms to apply.
VI. COURSE OUTCOMES:
After completing this course the student must demonstrate the knowledge and ability to:
1. Ability to use data mining tools during Projects to build reliable products meeting the present
demands of the industry.
2. Ability to identify components in typical data warehouse architectures.
3. Understanding of why there is a need for data warehouse in addition to traditional Operational
database systems
VII. HOW PROGRAM OUTCOMES ARE ASSESSED:
Program Outcomes
Level Proficiency
assessed by
PO1 Engineering knowledge: Apply the knowledge of mathematics,
Assignments, science, engineering fundamentals, and an engineering H Tutorials specialization to the solution of complex engineering problems.
PO2 Problem analysis: Identify, formulate, review research Lectures, literature, and analyze complex engineering problems
reaching
H Assignments, substantiated conclusions using first principles of mathematics, Exams natural sciences, and engineering sciences.
PO3 Design/development of solutions: Design solutions for complex
engineering problems and design system components or
processes that meet the specified needs with appropriate S Mini Projects
consideration for the public health and safety, and the cultural,
societal, and environmental considerations.
PO4 Conduct investigations of complex problems: Use research-
based knowledge and research
methods including design of
S Projects experiments, analysis and interpretation of data, and synthesis of
the information to provide valid conclusions.
PO5 Modern tool usage: Create, select, and apply appropriate
techniques,
resources,
and modern engineering and IT tools
S Projects including prediction and modeling to complex engineering
activities with an understanding of the limitations.
PO6 The engineer and society: Apply reasoning informed by the
contextual knowledge to assess societal, health, safety, legal and
N -- cultural issues and the consequent responsibilities relevant to the
professional engineering practice.
PO7 Environment and sustainability: Understand the impact of the
professional engineering solutions in societal and environmental
N -- contexts, and demonstrate the knowledge of, and need for
sustainable development.
PO8 Ethics: Apply ethical Principle and
commit to professional
S Discussions ethics and responsibilities and norms of the engineering practice.
PO9 Individual and team work: Function effectively as an
individual, and as a member or leader in diverse teams, and in N --
multidisciplinary settings.
PO10 Communication: Communicate effectively on complex
engineering activities with the engineering community and with
society at large, such as, being able to comprehend and write N --
effective reports and design documentation, make effective
presentations, and give and receive clear instructions.
PO11 Project management and finance: Demonstrate knowledge and
understanding of the engineering and management principles and
N -- apply these to one‟s own work, as a member and leader in a
team, to manage projects and in multidisciplinary environments.
PO12 Life-long learning: Recognize the need for, and have the
preparation and ability to engage in independent and life-long S Projects
learning in the broadest context of technological change.
N - None S - Supportive H - Highly Related
VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:
Program Specific Outcomes Level Proficiency
assessed by
PSO1 Applications of Computing: Ability to use knowledge in various
domains to provide solution to new ideas and innovations.
H Lectures,
Assignments
PSO2 Programming Skills: Identify required data structures, design suitable
algorithms, develop and maintain software for real world problems.
H
Projects
N - None S - Supportive H - Highly Related
IX. SYLLABUS:
UNIT - I
Data warehouse: Introduction to Data warehouse, Difference between operational database systems
and data warehouses, Data warehouse characteristics, Data warehouse Architecture and its
components, Extraction-Transformation-Loading, Logical (Multi-Dimensional), Data Modeling,
Schema Design, Star and show-Flake Schema, Fact Consultation, Fact Table, Fully Addictive, Semi-
Addictive, Non Addictive Measures; Fact-Less Facts, Dimension Table Characteristics; OLAP
Cube, OLAP Operations, OLAP Server Architecture-ROLAP, MOLAP and HOLAP.
UNIT - II Introduction to Data Mining: Introduction, What is Data Mining, Definition, KDD, Challenges,
Data Mining Tasks, Data Processing, Data Cleaning, Missing data, Dimensionality Reduction,
Feature Subset Selections, Discretization and Binaryzation, Data Transformation; Measures of
Similarity and Dissimilarity-Basics.
UNIT - III Association Rules: Problem Definition, Frequent item set generation, The APRIORI Principle,
support and confidence measures, association rule generation; APRIORI algorithm. The Partition
Algorithms, FP-Growth Algorithms, Compact Representation of Frequent item Set-Maximal
Frequent item set, closed frequent item set.
UNIT - IV Classification: Problem Definition, General Approaches to solving classification problem,
Evaluation of Classifiers, Classification techniques, Decision Trees-Decision trees construction,
Methods, for expressing attribute test conditions, Measures for selecting the best split, Algorithm for
Decision tree induction; Naive-Bayes Classifier, Bayesian Belief Network; K-Nearest neighbor
classification-Algorithm and characteristics.
UNIT - V
Clustering: Problem Definition, Clustering Overview, Evaluation of Clustering algorithms,
partitioning clustering-K-Means Algorithm, K-Means Additional issues, PAM Algorithm;
Hierarchical Clustering-Agglomerative Methods and divisive methods, Basic Agglomerative
Hierarchical Clustering Algorithms Specific techniques, Key issues in Hierarchical Clustering,
Strengths and weakness; outlier detection.
Text books: 1. Jiawei Han and Micheline Kamber, “Data Mining: Concepts and Techniques”, 2e, Elsevier,
2008. 2. Pang-ning Tan Vipin Kumar Micaelsteinbanch, “Introduction to data mining “, Pearson
Education.
References: 1. Margaret H Dunham, “Data Mining Introductory and Advanced Topics”, 2e, Pearson Education,
2006. 2. Amitesh Sinha, “Data Warehousing”, Thomson Learning, 2007. 3. Arun K pujari, “Data Mining Techniques”, 3e, Universities Press. 4. VikramPudi, P Radha Krishna, “Data Mining”, Oxford University Press.
IX. COURSE PLAN:
At the end of the course, the students are able to achieve the following course learning
outcomes:
Lecture Topics to be covered
Course Learning Outcomes References
No.
1-3
Introduction to Data warehouse,
Difference between operational database
systems and data warehouses, Data
warehouse characteristics
Distinguish data warehouse
from other databases. T1: 3.1
4-6
Data warehouse Architecture and its
components, Extraction-
Transformation-Loading, Logical
(Multi-Dimensional),
Prepare Data warehouse
architecture. T1: 3.3
7-10
Modeling, Schema Design, Star and
show-Flake Schema, Fact Consultation,
Fact Table, Fully Addictive, Semi-
Addictive, Non Addictive Measures;
Fact-Less Facts, Dimension Table
Characteristics
Design Multidimensional Data
Model.
T1: 3.2
11-14
OLAP Cube, OLAP Operations, OLAP
Server Architecture-ROLAP, MOLAP
and HOLAP.
Implementation of Data
Warehouse. T1: 3.4-3.5
15-18
Introduction, Fundamentals of Data
Mining,
Definition, KDD, Challenges, Data
Mining Tasks
Outline the importance of data mining in big data technology.
T1: 1.1-1.7
19-23
Data Processing, Data Cleaning,
Missing data, Dimensionality
Reduction, Feature Subset Selections,
Data Transformation
List the data Preprocessing techniques.
T1: 2.1-2.5
24-26 Discretization and Binaryzation, Define data Discretization. T1: 2.6
Measures of Similarity and
Dissimilarity-Basics.
27-28
Association Rules: Problem Definition,
Frequent item set generation, The
APRIORI Principle
Illustrate the process of association rule mining T1: 5.3
29-30
Support and confidence measures,
association rule generation; APRIORI
algorithm.
Define basic concepts of Apriori Algorithm. T1: 5.2
31-33 The Partition Algorithms, FP-Growth
Algorithms,
Define basic concepts of frequent pattern mining. T1: 5.2
34-37
Compact Representation of Frequent
item Set-Maximal Frequent item set,
closed frequent item set.
Illustrate frequent item set.
T1: 5.1
38-41
Classification Problem Definition,
General Approaches to solving
classification problem, Evaluation of
Classifiers, Classification techniques.
Describe Classification.
T1: 6.1-6.2
42-45
Decision Trees-Decision trees
construction, Methods, for expressing
attribute test conditions, Measures for
selecting the best split, Algorithm for
Decision tree induction.
Construct an optimal decision tree for a given dataset.
T1: 6.3
46-48 Naive-Bayes Classifier, Bayesian Belief
Network
Classify Bayesian methods. T1: 6.4
49-50 K-Nearest neighbor classification-
Algorithm and characteristics.
Generalize the learning from your neighbors. T1: 6.9
51-52
Clustering Problem Definition,
Clustering Overview, Evaluation of
Clustering algorithms
Differentiate classification and clustering. T1: 7.1-7.3
53-55
partitioning clustering-K-Means
Algorithm, K-Means Additional issues,
PAM Algorithm
Understand partitioning methods used for clustering. T1: 7.4
56-58
Hierarchical Clustering-Agglomerative
Methods and divisive methods, Basic
Agglomerative Hierarchical Clustering
Algorithms Specific techniques
Identify various types of Hierarchical clustering techniques T1: 7.5
59-60
Key issues in Hierarchical Clustering,
Strengths and weakness; outlier
detection.
Analyze outlier detection methods. T1: 7.11
X. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:
Course
Program Outcomes
Program Specific
Outcomes
Objectives
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
I H S S
II H S S H
III H S S H
IV S S S S H
V S S S
VI H S
S – Supportive
H - Highly Related
XI. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM
OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:
Course
Program Outcomes
Program Specific
Outcomes
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
1 H S S S H
2 H S H
3 H S
S –Supportive H - Highly Related
COMPUTER SCIENCE AND ENGINEERING
ASSIGNMENT
Course Name DATA WAREHOUSING AND DATA MINING
Course Code : A70520
Class : IV B. Tech I Semester
Branch : Computer Science and Engineering
Year : 2016 - 17
Course Faculty : N PUSHPALATHA Assoc.Prof
OBJECTIVES To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited. In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in
incorporating philosophy of outcome based education in the process of problem solving and career
development. So, all students of the institute should understand the depth and approach of course to be
taught through this question bank, which will enhance learner‟s learning process.
ASSIGNMENT – I
S. No Question Blooms
Taxonomy Level
Course Outcome
UNIT - 1
1 Explain with an example the different schemas for multidimensional Understand
1 databases?
2 Explain about the concept description? And what are the differences Understand
3 between concept description in large databases and OLAP?
3 Differentiate operational database systems and data warehousing? Understand 2
4 Describe the three-tier data warehousing architecture? Knowledge 1
5 Describe the complex aggregation at multiple granularity? Knowledge 2
6 Discuss briefly about the data warehouse architecture? Understand 2
7 Demonstrate the efficient processing of OLAP queries? Understand 3
8 Compare the schemas for the multidimensional data models? Analyze 2
9 Explain the Data warehouse applications? Understand 2 10 Discuss briefly about the multidimensional data models?
Understand 3
S. No Question Blooms Taxonomy Level
Course Outcome
UNIT-II
1 Distinguish between the data warehouse and databases? How they
Understand 2
are similar? 2 Describe three challenges to data mining regarding data mining Knowledge 3
methodology and user interaction issues?
3 Discuss briefly about the data smoothing techniques? Understand 2
4 Explain Data Integration and Transformation? Understand 1
5 Describe the various data reduction techniques? Understand 3
6 Define data cleaning? Express the different techniques for handling missing values?
Knowledge 2
7 Explain data mining as a step in the process of knowledge discovery?
Understand 2
8 List and describe the five primitives for specifying a data mining task? Understand 2
9 Explain the difference between discrimination and classification?
Between characterization and clustering? Between classification and prediction? For each of these pairs of tasks, how are they similar?
Understand 2
10 Distinguish between the data warehouses and data mining? Understand 3 UNIT-III
1 Define the terms frequent item sets, closed item sets and association Knowledge 3
rules? 2 Discuss which algorithm is an influential algorithm for mining Understand 2
frequent item sets for boolean association rules? Explain with an
example? 3 Describe the different techniques to improve the efficiency of Knowledge 2
Apriori? Explain? 4 Discuss the FP-growth algorithm? Explain with an example? Understand 2
ASSIGNMENT – II
5 Discuss about mining multilevel association rules from transaction Understand 3
databases in detail? 6 Discuss about constraint-based association mining? Understand 2
7 Discuss about mining multilevel association rules from transaction Understand 3
databases in detail? 8 Describe about the correlation analysis using Chi-square? Knowledge 2
9 Explain what are additional rule constraints to guide mining? Understand 2 3 10 Illustrate about the correlation analysis using All-certainty
Measure?
Apply 2
UNIT - IV
1 Explain about the classification and prediction? Example with an Understand 3
example? 2 Discuss about basic decision tree induction algorithm? Understand 2
3 Summarize how does tree pruning work? What are some Understand 2 enhancements to basic decision tree induction?
4 Explain how scalable is decision tree induction? Explain? Understand 3
5 Describe the working procedures of simple Bayesian classifier? Knowledge 2
6 Discuss the back propagation algorithm and Explain? Understand 3
7 Explain about classifier accuracy? Explain the process of measuring Understand 2
the accuracy of a classifier? 8 Explain training of Bayesian belief networks? Understand 2
9 Explain briefly about the Navie Bayesian Classification? Understand 3
10 Differentiate classification and prediction methods? Understand 2
UNIT - V 1 Discuss the various types of data in cluster analysis? Understand 2
2 Explain the categories of major clustering methods? Understand 2
3 Write algorithms for k-means and k-medoids? Explain? Understand 2
4 Describe the different types of hierarchical methods? Understand 2
5 Discuss about the DBSCAN density-based methods? Understand 2
6 Demonstrate about the following hierarchical methods Understand 3 a)BIRCH
b)Chamelon 7 Explain the working of CLIQUE algorithm Understand 3
8 Define the distance-based outlier? Illustrate the efficient algorithms Knowledge 2
for mining distance-based algorithm? 9 Explain about the Statistical-based outlier detection? Understand 2
10 Explain about the agglomerative and divisive hierarchical methods? Understand 2
COMPUTER SCIENCE AND ENGINEERING
TUTORIAL QUESTION BANK
Course Name DATA WAREHOUSING AND DATA MINING
Course Code A70520
Class IV B. Tech I Semester
Branch Computer Science and Engineering
Year 2016 – 2017
Course Faculty N PUSHPALATHA Assoc.Prof
OBJECTIVES
To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be
addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the
outcomes of the program that is being accredited. In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in incorporating philosophy of outcome based education in the process of problem solving and career development. So, all students of the institute should understand the depth and approach of course to be taught through this question bank, which will enhance learner‟s learning process.
Blooms Course S. No Question Taxonomy Outcome
Level
UNIT - I
PART – A (Short Answer Questions) 1 Define online analytical processing? Knowledge 3 2 List the key features of data warehouse? Understand 3 3 Define data mart? Knowledge 3 4 Define enterprise warehouse? Knowledge 3 5 Define virtual warehouse? Knowledge 2 6 List the metadata repository? Understand 2 7 List the various multidimensional models? Understand 2 8 Explain about the star schema? Understand 2 9 Explain the snowflake schema? Understand 1
10 Define about the fact constellation model? Knowledge 1 11 Name the OLAP operations? Understand 1 12 Express what is slice and dice operation? Understand 1 13 Define Pivot operation? Knowledge 1 14 Distinguish between the OLAP Systems and Statistical databases? Understand 1 15 State the various views of data warehouse design? Understand 1 16 Define Relational OLAP(ROLAP) server? Knowledge 2 17 Explain Multidimensional OLAP(MOLAP) server? Understand 2 18 State what is Hybrid OLAP(HOLAP) server? Understand 3 19 Define Data warehouse? Knowledge 3
20 Define the use of concept hierarchy? Knowledge 1
Part - B (Long Answer Questions) 1 Differentiate operational database systems and data warehousing? Understand 2 2 Discuss briefly about the multidimensional data models? Understand 1
3 Explain with an example the different schemas for multidimensional databases? Understand 1
4 Describe the three-tier data warehousing architecture? Knowledge 1 5 Discuss the efficient processing of OLAP queries? Understand 2 6 Explain the data warehouse applications? Understand 3 7 Explain the architecture for on-line analytical mining? Understand 3 8 Describe the common techniques are used in ROLAP and MOLAP? Knowledge 1 9 Describe the complex aggregation at multiple granularity? Knowledge 2
10
Explain about the concept description? And what are the differences between concept description in large databases and OLAP? Understand 3
11 Discuss about Metadata Repository? Understand 2 12 Compare the schemas for the multidimensional data models? Analyze 2 13 Explain about the data warehouse implementation with an example? Understand 2 14 Discuss about types of OLAP Servers? Understand 2
15 Explain OLAP operations in the Multidimensional Data Model? Understand 3 16 Compare Enterprise warehouse, data mart, virtual warehouse? Analyze 2 17 Compare Data cleaning, data transformation? Analyze 2 18 Explain what are the differences between the three main types of
data warehouse usage: information processing, analytical processing and data mining? Discuss the motivation behind OLAP mining(OLAM)?
Understand 2
19 Explain a data warehouse can be modeled by either a star schema or a snowflake schema. Briefly describe the similarities and the differences of the two models, and then analyze their advantages and disadvantages with regard to one another?
Understand 3
20 Explain Indexing OLAP Data? Understand 3 Part - C (Problem Solving and Critical Thinking Questions)
1 Analyze that a data warehouse consists of the three dimensions time, doctor and patient, and the two measures count and charge, where charge is the fee that a doctor charges a patient for a visit. (a) Enumerate three classes of schemas classes of schemas that are popularly used for modeling data warehouses. (b) Draw a schema diagram for the above data warehouse using one of the schema classes listed in (a). (c) Starting with the base cuboid [day, doctor, patient], what specific OLAP operations should be performed in order to list the total fee collected by each doctor in 2004? (d) To obtain the same list, write an SQL query assuming the data is stored in a relational database with the schema fee (day, month, year, doctor, hospital,patient, count, charge).
Understand 3
2 State why, for the integration of multiple heterogeneous information sources, many companies in industry prefer the update-driven approach (which constructs and uses data warehouses), rather than the query-driven approach (which applies wrappers and integrators). Describe situations where the query-driven approach is preferable over the update-
Knowledge 3
driven approach.
3 Suppose that a data warehouse for Big University consists of the following four dimensions: student, course, semester, and instructor, and two measures count and avg grade. When at the lowest conceptual level (e.g., for a given student, course, semester, and instructor combination), the avg grade measure stores the actual course grade of the student. At higher combination. Compute the number of cuboids(a) Draw a snowflake schema diagram for the data warehouse. (b) Starting with the base cuboid [student, course, semester, instructor], what specific OLAP operations (e.g., roll-up from semester to year ) Should one perform inorder to list the average grade of CS courses for each Big University student. (c) If each dimension has five levels (including all), such as “student < major < status < university < all”, how many cuboids will this cube contain(including the base and apex cuboids)?
Apply 3
4 Suppose that a data warehouse consists of the four dimensions, date, spectator location, and game, and the two measures, count and charge, where charge is the fare that a spectator pays when watching a game on a given date. Spectators may be students, adults, or seniors, with each category having it‟s own charge rate. Write the following (a) Draw a star schema diagram for the data warehouse. (b) Starting with the base cuboid [ date,spectator,location,game], what specific OLAP operations should one perform in order to list the total charge paid by student spectators at GM_Place in 2004? (c) Bitmap indexing is useful in data warehousing. Taking this cube as an example,briefly discuss advantages and problems of using a bitmap index structure.
Apply 3
5 Design a data warehouse for a regional weather bureau. The weather bureau has about 1,000 probes, which are scattered throughout various land and ocean locations in the region to collect basic weather data, including air pressure, temperature, and precipitation at each hour. All data are sent to the central station, which has collected such data for over 10 years. Your design should facilitate efficient querying and on-line analytical processing, and derive general weather patterns in multidimensional space.
Create 2
6 Explain the computation of measures in a data cube: (a) Enumerate three categories of measures, based on the kind of aggregate functions used in computing a data cube. (b) For a data cube with the three dimensions time, location, and item, which category does the function variance belong to? Describe how to compute it if the cube is partitioned into many chunks. Hint: The formula for computing variance is
where xi is the average of N xis.
Understand 3
(c) Suppose the function is “top 10 sales”. Discuss how to
efficiently compute this measure in a data cube
7 Suppose that we need to record three measures in a data cube: min,
average, and median. Design an efficient computation and storage method for each measure given that the cube allows data to be deleted incrementally (i.e., in small portions at a time) from the cube.
Understand 3
8 Observe that a data warehouse contains 20 dimensions, each with about five levels of granularity. (a) Users are mainly interested in four particular dimensions, each having three frequently accessed levels for rolling up and drilling down. How would you design a data cube structure to efficiently support this preference? (b) At times, a user may want to drill through the cube, down to the raw data for one or two particular dimensions. How would you support this feature?
Knowledge 3
9 Observe A data cube, C, has n dimensions, and each dimension has exactly p distinct values in the base cuboid. Assume that there are no concept hierarchies associated with the dimensions. (a) What is the maximum number of cells possible in the base cuboid? (b) What is the minimum number of cells possible in the base cuboid? (c) What is the maximum number of cells possible (including both base cells and aggregate cells) in the data cube, C? (d) What is the minimum number of cells possible in the data cube, C?
Knowledge 3
10 Observe A popular data warehouse implementation is to construct a multidimensional database, known as a data cube. Unfortunately, this may often generate a huge, yet very sparse multidimensional matrix. Present an example illustrating such a huge and sparse data cube.
Knowledge 3
UNIT - II Part – A (Short Answer Questions)
1 Define data mining? Knowledge 1 2 Explain the definition of data warehouse? Understand 1 3 Distinguish between data mining and data warehouse? Understand 2 4 Identify any three functionality of data mining? Knowledge 3 5 Interpret major issues in data mining? Understand 1 6 Name the steps in the process of knowledge discovery? Knowledge 1 7 Discuss relational databases? Understand 1 8 State object –oriented Databases? Understand 1 9 Explain the spatial databases? Understand 2
10 Contrast heterogeneous databases and legacy databases? Understand 2 11 Differentiate classification and Prediction? Understand 2 12 Describe transactional data bases? Knowledge 2 13 List the types of data that can be mined? Knowledge 3 14 Define data cube? Knowledge 3 15 Define multidimensional data mining? Knowledge 3 16 Define data characterization? Knowledge 3 17 Express what is a decision tree? Understand 3 18 Explain the outlier analysis? Understand 3 19 Name the steps involved in data preprocessing? Understand 3 20 Interpret the dimensionality reduction? Understand 3
Part - B (Long Answer Questions)
1 Describe data mining? In your answer, address the following: a)Is it another hype? b)Is it a simple transformation of Technology developed from databases, statistics, and machine learning? c)Explain how the evolutions of database technology lead to data mining? d)Describe the steps involved in datamining when viewed as a process of knowledge discovery.
Understand 2
2 Distinguish between the data warehouse and databases? How they are similar?
Knowledge 2
3 Explain the difference between discrimination and classification? Between characterization and clustering? Between classification and prediction? For each of these pairs of tasks, how are they similar?
Understand 2
4 Describe three challenges to data mining regarding data mining methodology and user interaction issues?
Knowledge 2
5 Distinguish between the data warehouses and data mining? Knowledge 2 6 Discuss briefly about the data smoothing techniques? Understand 2 7 Explain Data Integration and Transformation? Understand 3 8 Describe the various data reduction techniques? Understand 3 9 Define data cleaning? Express the different techniques for
handling missing values? Knowledge 2 10 Differentiate between descriptive and predictive data mining? Understand 2 11 Explain data mining as a step in the process of knowledge discovery? Understand 3
12 Describe briefly Discretization and concept hierarchy generation for numerical data? Knowledge 3
13 Discuss about the concept hierarchy generation for categorical data? Understand 3
14 List and describe the five primitives for specifying a data mining task? Understand 3
15 Discuss issues to consider during data integration? Understand 1 16 Describe the following advanced database systems and applications:
object- relational databases, spatial databases, text databases, multimedia
databases, stream data, the World Wide Web.
Knowledge 2
17 Describe why concept hierarchies are useful in data mining. Knowledge 2 18 Describe the differences between the following approaches for the
integration of a data mining system with a database or data warehouse
system: no coupling, loose coupling, semitight coupling, and tight
coupling. State which approach you think is the most popular, and why
Knowledge 1
19 Explain Data quality can be assessed in terms of accuracy, completeness,
and consistency. Propose two other dimensions of data quality.
Understand 1
20 Apply the two methods below to normalize the following group of data:
200, 300, 400, 600, 1000
(a) min-max normalization by setting min = 0 and max = 1
(b) z-score normalization
Apply 2
Part – C (Problem Solving and Critical Thinking) 1 Suppose that the data for analysis includes the attribute age. The
age values for the data tuples are (in increasing order) 13, 15, 16, 16, 19, 20, 20, 21, 22, 22, 25, 25,25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52,70. Compute the following: (a) Mean of the data? Median? (b) mode of the data? Comment on the data‟s modality( i.e.,bimodal,trimodal,etc.). (c) midrange of the data?
Apply 1
2 Suppose that the data for analysis includes the attribute age. The age values for the data tuples are (in increasing order) 13, 15, 16, 16, 19,20,20,21,22,22,25,2525, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52,70. Compute the following: (a) Can you find (roughly) the first quartile (Q1) and the third quartile (Q3) of the data? (b) Give the five-number summary of the data. (c) Show a boxplot of the data. (d) How is a quantile-quantile plot different from a quantile plot?
Apply 1
3 Use the data for age given above answer the following. (a) Use smoothing by bin means to smooth the above data, using a bin depth of 3. Illustrate your steps. Comment on the effect of this technique for the given data (b) How might you determine outliers in the data? (c) What other methods are there for data smoothing?
Apply 1
4 Suppose a hospital tested the age and body fat data for 18 randomly selected adults with the following result age 23 23 27 27 39 41 47 49 50 %fat 9.5 26.5 7.8 17.8 31.4 25.9 27.4 27.2 31.2 age 52 54 54 56 57 58 58 60 61 %fat 34.6 42.5 28.8 33.4 30.2 34.1 32.9 41.2 35.7 Examine the following (a) the mean, median and standard deviation of age and %fat. (b) Draw the box plots for age and %fat. (c) Draw a scatter plot and a q-q plot based on these two variables.
Knowledge 2
5 Write an example where data mining is crucial to the success of a business. What data mining functions does this business need? Can they be performed alternatively by data query processing or simple statistical analysis?
Apply 2
6 Suppose your task as a software engineer at Big University is to design a data mining system to examine the university course database, which contains the following infor- mation: the name, address, and status (e.g., undergraduate or graduate) of each student, the courses taken, and the cumulative grade point average (GPA). Describe the architecture you would choose. What is the purpose of each component of this architecture?
Understand 2
7 Outliers are often discarded as noise. However, one person‟s garbage could be another‟s treasure. For example, exceptions in credit card transactions can help us detect the fraudulent use of credit cards. Taking fraudulence detection as an example, Write two methods that can be used to detect outliers and discuss which one is more reliable.
Apply 3
9 Examine the following consider the following data for analysis includes the attribute age. The age values for the data tuples are (in increasing order) 13, 15, 16, 16, 19, 20, 20, 21, 22, 22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52, 70. (a) Usemin-maxnormalizationtotransformthevalue 35 for age on to the range [0.0, 1.0]. (b) Use z-score normalization to transform the value 35 for age, where the standard deviation of age is 12.94 years. (c) Use normalization by decimal scaling to transform the value 35 for age. (d) Comment on which method you would prefer to use for the given data, giving reasons as to why.
Knowledge 3
10 Suppose a group of 12 sales price records has been sorted as follows Knowledge 2
follows: 5, 10, 11, 13, 15, 35, 50, 55, 72, 92, 204, 215
Examine the following methods by partition them into three bins
(a) equal-frequency (equidepth) partitioning
(b) equal-width partitioning
(c) clustering UNIT-III
Part - A (Short Answer Questions) 1 Define frequent patterns? Knowledge 3 2 Define closed itemset? Knowledge 3 3 State maximal frequent itemset? Understand 3 4 List the techniques of efficiency of Apriori algorithm? Understand 3 5 Explain ECLAT algorithms usage? Understand 1 6 Name the pruning strategies in mining closed frequent itemsets? Understand 2 7 Define substructure of a structural pattern? Knowledge 2 8 Interpret the rule of support for itemsets A and B? Understand 2 9 Classify the confidence rule for itemsets A and B? Understand 1
10 Define itemset? Knowledge 2 11 Name the steps in association rule mining? Understand 3 12 Explain the join step? Understand 1 13 Describe the prune step? Knowledge 1 14 State how can we mine closed frequent itemsets? Understand 2 15 Name the pruning strategies of closed frequent itemsets? Understand 3 16 Explain the two kinds of closure checking? Understand 3 17 Summarize the constraint-based mining? Understand 2 18 Describe the five categories of pattern mining constraints? Knowledge 1 19 List the applications of pattern mining? Understand 2 20 Define Support and Confidence? Knowledge 2
Part – B (Long Answer Questions)
1 Define the terms frequent itemsets, closed itemsets and association rules? Knowledge 2
2
Discuss which algorithm is an influential algorithm for mining frequent itemsets for boolean association rules? Explain with an example? Understand 2
3
Describe the different techniques to improve the efficiency of Apriori? Explain? Knowledge 2
4 Discuss the FP-growth algorithm? Explain with an example? Understand 3
5 Explain how to mine the frequent itemsets using vertical data format? Understand 1
6 Discuss about mining multilevel association rules from transaction databases in detail? Understand 3
7 Explain how to mine the multidimensional association rules from relational databases and data warehouses?
8 Describe briefly about the different correlation measures in association analysis?
9 Discuss about constraint-based association mining? Understand 2 10 Explain the Apriori algorithm with example? Understand 3 11 Discuss the generating association rules from frequent itemsets. Understand 3
Discuss about mining multilevel association rules from transaction databases in detail?
13 Describe multidimensional association rules using static Knowledge 3
Discretization? 14 Explain what are additional rule constraints to guide mining? Understand 3
Explain, how can we tell which strong association rules are really interesting? Explain with an example?
16 Describe about the correlation analysis using Chi-square? Knowledge 3 17 Apply the following rules on a database has five transactions. Let min sup =
60% and min con f = 80%.
TID items bought
T100 {M, O, N, K, E, Y}
T200 {D, O, N, K, E, Y }
T300 {M, A, K, E}
T400 {M, U, C, K, Y}
T500 {C, O, O, K, I ,E}
(a) Find all frequent itemsets using Apriori .
(b) List all of the strong association rules (with support s and
confidence
(c) matching the following metarule, where X is a variable
representing customers, and itemi denotes variables representing items (e.g.,
“A”, “B”, etc.):
∀x ∈ transaction, buys(X , item1) ∧ buys(X , item2) ⇒ buys(X ,
item3) [s, c]
Apply 2
18 Describe about the Mining closed Frequent Itemset Knowledge 2 19 Write a short example to show that items in a strong association rule
may actually be negatively correlated.
Apply 3
20 Explain Association rule mining often generates a large number of rules. Discuss effective methods that can be used to reduce the number of rules generated while still preserving most of the interesting rules.
Understand 3
Part – C (Problem Solving and Critical Thinking Questions) 1 The Apriori algorithm uses prior knowledge of subset support
properties. Analyze (a) That all nonempty subsets of a frequent itemset must also be frequent. (b) The support of any nonempty subset s 0 of itemset s must be at least as great as the support of s. (c) Given frequent itemset l and subset s of l, prove that the confidence of the rule “s 0 ⇒ (l − s 0 )” cannot be more than the confidence of “s ⇒ (l –s)”, where s 0 is a subset of s. (d) A partitioning variation of Apriori subdivides the transactions of a database D into n nonoverlapping partitions. Prove that any itemset that is frequent in D must be frequent in at least one partition of D.
Analyze 3
2 Implement three frequent itemset mining algorithms introduced in this chapter : (1) Apriori [AS94], (2) FP-growth [HPY00], and (3) ECLAT [Zak00] (mining using vertical data format), using a programming language that you are familiar with, such as C++ or Java.
Understand 2
Compare the performance of each algorithm with various kinds of large data set. Write a report to analyze the situations (such as data size, data distribution, minimal support threshold setting, and pattern density) where one algorithm may perform better than the others, and state why.
3 Suppose that a large store has a transaction database that is distributed among four locations. Transactions in each component database have the same format , namely Tj : {i1, . . . , im}, where Tj is a transaction identifier, and ik (1 ≤ k ≤ m) is the identifier of an item purchased in the transaction. Construct an efficient algorithm to mine global association rules (without considering multilevel associations). You may present your algorithm in the form of an outline. Your algorithm should not require shipping all of the data to one site and should not cause excessive network communication overhead.
Apply 3
4 Suppose that frequent itemsets are saved for a large transaction database, DB. Illustrate how to efficiently mine the (global) association rules under the same minimum support threshold if a set of new transactions, denoted as ∆DB, is (incrementally) added in?
Apply 3
5 Most frequent pattern mining algorithms consider only distinct items in a transaction However, multiple occurrences of an item in the same shopping basket, such as four cakes and three jugs of milk, can be important in transaction data analysis.
Analyze how can one mine frequent itemsets efficiently considering multiple occurrences of items? Propose modifications to the well-known algorithms, such as Apriori and FP-growth, to adapt to such a situation.
Analyze 1
6 A database has five transactions. Let min sup = 60% and min con f = 80%.
TID items bought
T100 {M, O, N, K, E, Y}
T200 {D, O, N, K, E, Y }
T300 {M, A, K, E}
T400 {M, U, C, K, Y}
T500 {C, O, O, K, I ,E}
Examine the following
(d) Find all frequent itemsets using FP-growth.
(e) List all of the strong association rules (with support s and confidence c)
matching the following metarule, where X is a variable representing
customers, and itemi denotes variables representing items (e.g., “A”, “B”,
etc.):
∀x ∈ transaction, buys(X , item1) ∧ buys(X , item2) ⇒ buys(X ,
item3)
[s, c]
Knowledge 3
7 The following contingency table summarizes supermarket transaction data, Knowledge 2
where hot dogs refers to the transactions containing hot dogs, hot dogs refers to the transactions that do not contain hot dogs, hamburgers refers to the transactions containing hamburg- ers, and hamburgers refers to the transactions that do not contain hamburgers.
hot dogs hot dogs row
hamburgers 2,000 500 2,500
hamburgers 1,000 1,500 2,500
col 3,000 2,000 5,000
Observe that the association rule “hot dogs ⇒ hamburgers” is mined.
Given a minimum support threshold of 25% and a minimum
confidence threshold of 50%, is this association rule strong? Based on
the given data, is the purchase of hot dogs independent of the purchase
of hamburgers? If not, what kind of correlation relationship exists
between the two? 8 Sequential patterns can be mined in methods similar to the mining of
association rules. Design an efficient algorithm to mine multilevel sequential patterns from a transaction database. An example of such a pattern is the following: “A customer who buys a PC will buy Microsoft software within three months,” on which one may drill down to find a more refined version of the pattern, such as “A customer who buys a Pentium PC will buy Microsoft Office within three months.”
Create 2
9 The price of each item in a store is nonnegative. The store manager is only interested in rules of the form: “one free item may trigger $200 total purchases in the same transaction.” Describe how to mine such rules efficiently.
Knowledge 2
10 The price of each item in a store is nonnegative. For each of the following cases, identify the kinds of constraint they represent and briefly discuss how to mine such association rules efficiently. (a) Containing at least one Nintendo game (b) Containing items the sum of whose prices is less than $150 (c) Containing one free item and other items the sum of whose prices is at least $200 (d) Where the average price of all the items is between $100 and $500
Understand 2
UNIT-IV Part – A (Short Answer Questions)
1 State classification? Understand 2 2 Define regression analysis? Knowledge 2 3 Name the steps in data classification? Understand 2 4 Define training tuple? Knowledge 2 6 Describe accuracy of a classifier? Knowledge 2 7 Differentiate supervised learning and unsupervised learning? Understand 3 8 Define the decision tree? Understand 2 9 Define information gain? Knowledge 2 10 State gain ratio? Understand 2 11 State Gini index? Understand 3 12 Explain tree pruning? Understand 3 14 Define the construction of naïve Bayesian classification? Understand 2 15 Explain the IF-THEN rules for classification? Understand 3 16 Explain Decision Tree Induction? Understand 3 17 List the Attribute Selection Measures? Knowledge 3 18 Define Bayes‟ Theorem? Understand 3
19 Define Naïve Bayesian Classification? Knowledge 3 20 Explain K-Nearest-Neighbor Classifiers? Understand 3
Part – B (Long Answer Questions) 1 Explain about the classification and prediction? Example with
an example?
2 Discuss about basic decision tree induction algorithm? Understand 2 3 Explain briefly various measures associated with attribute selection? Understand 3
4 Summarize how does tree pruning work? What are some enhancements to basic decision tree induction?
Understand 3
5 Explain how scalable is decision tree induction? Explain? Understand 3 6 Describe the working procedures of simple Bayesian classifier? Knowledge 2
7 Explain Bayesian Belief Networks? Understand 2
8 Discuss about k-nearest neighbor classifier and case-based reasoning? Understand 1
9 Explain about classifier accuracy? Explain the process of measuring the accuracy of a classifier? Understand 2
10 Describe any ideas can be applied to any association rule mining be applied to classification? Knowledge 3
11 Explain briefly about the Navie Bayesian Classification? Knowledge 3
12 Explain about the major issues regarding classifications and predictions? Understand 3
13 Differentiate classification and prediction methods? Understand 3 14 Explain briefly various measures associated with attribute selection? Understand 3 15 Explain training of Bayesian belief networks? Understand 3 16 Explain how tree pruning useful in decision tree induction? What is a
drawback of using a separate set of tuples to evaluate pruning? Understand 2
17 Explain for a given a decision tree, you have the option of (a) converting the decision tree to rules and then pruning the resulting rules, or (b) pruning the decision tree and then con- verting the pruned tree to rules. What advantage does (a) have over (b)?
Understand 2
18 Compare the advantages and disadvantages of eager classification (e.g., decision tree, Bayesian, neural network) versus lazy classification (e.g., k-nearest neighbor, case- based reasoning).
Understand 2
19 Write an algorithm for k-nearest-neighbor classification given k and n, the number of attributes describing each tuple.
Apply 2
20 Describe each of the following clustering algorithms in terms of the following criteria: (i) shapes of clusters that can be determined; (ii) input para- meters that must be specified; and (iii) limitations. (a) k-means (b) k-medoids
Knowledge 3
Part – C (Problem Solving and Critical Thinking Questions) 1 Illustrate why is tree pruning useful in decision tree induction?
Explain the drawback of using a separate set of tuples to evaluate pruning?
Apply 2
2 Given a decision tree, you have the option of (a) converting the decision tree to rules and then pruning the resulting rules, or (b) pruning the decision tree and then converting the pruned tree to rules. Explain advantage does (a) have over (b)?
Understand 3
3 Outline the major ideas of naive Bayesian classification. Explain why is naïve Bayesian classification called “naive”?
Understand 3
4 Design an efficient method that performs effective naıve Bayesian classification over an infinite data stream (i.e., you can scan the data stream only once). If we wanted to discover the evolution of such classification schemes (e.g., comparing the classification
Create 3
scheme at this moment with earlier schemes, such as one from a week ago),Construct modified design would you suggest?
5 The support vector machine (SVM) is a highly accurate classification method. However, SVM classifiers suffer from slow processing when training with a large set of data tuples. Explain how to overcome this difficulty and develop a scalable SVM algorithm for efficient SVM classification in large datasets.
Understand 3
6 It is important to calculate the worst-case computational complexity of the decision tree algorithm. Given data set D, the number of attributes n, and the number of training tuples |D|, Show that the computational cost of growing a tree is at most n×|D| × log(|D|).
Understand 3
7 Given a 5 GB data set with 50 attributes (each containing 100 distinct
values) and 512 MB of main memory in your laptop, outline an efficient
method that constructs decision trees in such large data sets. Justify your
answer by rough calculation of your main memory usage.
Create 2
8 What is associative classification? Why is associative classification able to achieve higher classification accuracy than a classical decision tree method? Explain how associative classification can be used for text document classification.
Understand 2
9 It is difficult to assess classification accuracy when individual data objects
may belong to more than one class at a time. In such cases, Explain on
what criteria you would use to compare different classifiers modeled
after the same data.
Understand 2
10 Describe each of the following clustering algorithms in terms of the following criteria: (i) shapes of clusters that can be determined; (ii) input para- meters that must be specified; and (iii) limitations. (a) k-means (b) k-medoids (c) CLARA (d) BIRCH (e) ROCK (f) Chameleon (g) DBSCAN
Understand 3
UNIT-V Part - A (Short Answer Questions)
1 Define Clustering? Knowledge 3 2 Illustrate the meaning of cluster analysis? Apply 2 3 Explain the fields in which clustering techniques are used? Understand 2 4 List out the requirements of cluster analysis? Knowledge 2 5 Express the different types of data used for cluster analysis? Understand 3 6 State interval scaled variables? Knowledge 3
7 Define Binary variables? And what are the two types of binary variables? Knowledge 3
8 Define nominal, ordinal and ratio scaled variables? Knowledge 3 9 Illustrate mean by partitioning method? Apply 3 10 Define CLARA and CLARANS? Knowledge 3 11 State hierarchical method? Knowledge 2 12 Differentiate agglomerative and divisive hierarchical clustering? Analyze 3 13 State K-Means method? Knowledge 3 14 Define Outlier Detection? Knowledge 2 20 Define Chameleon method? Knowledge 2
Part - B (Long Answer Questions) 1 Discuss the various types of data in cluster analysis? Understand 3 2 Explain the categories of major clustering methods? Understand 3
3 Write algorithms for k-means and k-medoids? Explain? Understand 3 4 Describe the different types of hierarchical methods? Understand 3 5 Demonstrate about the following hierarchical methods
a) BIRCH b) Chamelon
Understand 3
6 Explain about semi-supervised cluster analysis? Understand 3 7 Explain about the outlier analysis? Understand 3 8 Define the distance-based outlier? Illustrate the efficient algorithms
for mining distance-based algorithm?
Knowledge 3
9 Explain about the Statistical-based outlier detection? Understand 2 10 Describe about the distance-based outlier detection? Knowledge 2 11 Discuss about the density-based outlier detection? Understand 2 12 Demonstrate about the deviation-based outlier detection techniques? Apply 3 13 Demonstrate about the BIRCH hierarchical methods? Apply 3 14 Demonstrate about the ROCK(Robust Clustering using links)
hierarchical methods? Apply 3
15 Explain about the agglomerative and divisive hierarchical methods? Understand 3 16 Demonstrate how to compute the dissimilarity between objects
described by the following types of variables: (a) Numerical (interval-scaled) variables (b) Asymmetric binary variables (c) Categorical variables (d) Ratio-scaled variables (e) Nonmetric vector objects
Apply 2
17 Apply the following measurements for the variable age: 18, 22, 25, 42, 28, 43, 33, 35, 56, 28, standardize the variable by the following: (a) Compute the mean absolute deviation of age. (b) Compute the z-score for the first four measurements.
Apply 2
18 Illustrate the strength and weakness of k-means in comparison with the k-medoids algorithm. Also, illustrate the strength and weakness of these schemes in comparison with a hierarchical clustering scheme (such as AGNES).
Understand 2
19 Explain why is outlier mining important? Briefly describe the different approaches behind statistical-based outlier detection, distanced-based outlier detection, density-based local out- lier detection, and deviation-based outlier detection.
Understand 2
20 Apply the given following measurements for the variable age: 28, 32, 15, 42, 28, 43, 30, 32, 55, 26, standardize the variable by the following: (a) Compute the mean absolute deviation of age. (b) Compute the z-score for the first four measurements.
Apply 2
Part – C (Problem Solving and Critical Thinking Questions) 1
Given the following measurements for the variable age: 48, 12, 25, 42, 28,43,33,35, 56, 28, standardize the variable by the following: Compute (a) The mean absolute deviation of age. (b)The z-score for the first four measurements.
Apply 2
2 Given two objects represented by the tuples (22, 1, 42, 10) and (20, 0, 36,8): Compute (a) The Euclidean distance between the two objects. (b)The Manhattan distance between the two objects. (c) The Minkowski distance between the two objects, using p = 3.
Apply 3
3 Suppose that the data mining task is to cluster the following eight points(with (x,y) representing location) into three clusters. A1(2, 10), A2(2, 5), A3(8, 4), B1(5, 8),B2(7, 5), B3(6, 4), C1(1, 2), C2(4, 9). The distance function is Euclidean distance. Suppose initially we assign A1, B1, and C1 as the center of each cluster, respectively. Use the k-means algorithm to show only (a) The three cluster centers after the first round of execution and (b) The final three clusters
Apply 3
4 Explain why is it that BIRCH encounters difficulties in finding clusters of arbitrary shape but OPTICS does not? Can you propose some modifications to BIRCH to help it find clusters of arbitrary shape?
Analyze 3
5 Clustering has been popularly recognized as an important data mining task with broad applications. Show one application example for each of the following cases: (a) An application that takes clustering as a major data mining function (b) An application that takes clustering as a preprocessing tool for data preparation for other data mining tasks
Apply 2
6 Clustering has been popularly recognized as an important data mining task with broad applications. Give example for each of the following cases: (a) An application that takes clustering as a major data mining function (b) An application that takes clustering as a preprocessing tool for data preparation for other data mining tasks
Understand 3
7 Data cubes and multidimensional databases contain categorical, ordinal, and numerical data in hierarchical or aggregate forms. Based on what you have learned about the clustering methods, Design a clustering method that finds clusters in large data cubes effectively and efficiently.
Create 3
8 Human eyes are fast and effective at judging the quality of clustering methods for two- dimensional data. Design a data visualization method that may help humans visualize data clusters and judge the clustering quality for three-dimensional data? What about for even higher-dimensional data?
Create 3
9 Given the following measurements for the variable age: 29, 31, 25, 41, 27,43,33,35 56, 28, standardize the variable by the following: Compute (a) The mean absolute deviation of age. (b)The z-score for the first three measurements.
Apply 2
10 Given two objects represented by the tuples (21, 2, 41, 11) and (21, 1, 32,6): Compute (a) The Euclidean distance between the two objects. (b)The Manhattan distance between the two objects. (c) The Minkowski distance between the two objects, using p = 2.
Apply 2
Prepared by: HOD, CSE
COMPUTER SCIENCE AND ENGINEERING
COURSE DESCRIPTION FORM
Course Title : DESIGN PATTERNS
Course Code : 58063
Course Structure : Lectures Tutorials Practicals Credits
4 - - 4
Course Faculty : L DHANA LAKSHMI Assoc.Prof
I. COURSE OVERVIEW: The course covers a wide range of software development concepts, abilities, and skills, from
analyzing a problem to implementing a solution, also discuss the design patterns in Smalltalk MVC
architecture, Express representation invariants, understand their impact on efficiency an66 d ease of
implementation, and implement them as runtime assertions. Outlines the differences between
structural patterns and behavioral patterns of a model. The course Explains about common design
vocabulary. This course helps to determine how to be recognizing a design and they can reduce the
amount of refactoring, helps to use primitive techniques such as objects, inheritance, and
polymorphism. Describes problems that occur in a design how to resolve them and how to evaluate
them.
II. PREREQUISITES:
Level Credits Periods/Week Prerequisites
UG 4 4 Object Oriented Programming concepts, basic notations
of design, and basic data structures such as arrays, hash
tables, trees and lists.
III. COURSE ASSESSMENT METHODS:
Session Marks University End
Exam Marks
Total
Marks Mid Semester Test
There shall be 2 midterm examinations. Each midterm examination
consists of subjective type and Objective type tests.
The subjective test is for 10 marks, with duration of 1 hour.
Subjective test of each semester shall contain 4 questions; the
student has to answer 2 questions, each carrying 5 marks.
The objective type test is for 10 marks with duration of 20
minutes. It consists of 10 Multiple choice and 10 objective type
questions, the student has to answer all the questions and each
carries half mark. First midterm examination shall be conducted for
the first four units of syllabus and second midterm examination
shall be conducted for the remaining four units. Five marks are
given for assignments. There shall be two assignments in every
theory course. Marks shall be awarded considering the average of
two assignments in each course.
75
1000
IV. EVALUATION SCHEME:
S.No Component Duration Marks
1 I Mid Examination 80 Minutes 20
2 I Assignment - 05
3 II Mid Examination 80 Minutes 20
4 II Assignment - 05
5 External Examination 3 Hours 75
V. COURSE OBJECTIVES:
1. Demonstration of patterns related to object oriented design.
2. Describe the design patterns that are common in software applications.
3. Analyze a software development problem and express it.
4. Design a module structure to solve a problem, and evaluate alternatives;
5. Implement a module so that it executes efficiently and correctly;
6. Appreciate engineering issues in the development of software, such as the importance of addressing the
user's concerns, working with limited resources, maintainability and dependability.
7. Describes creational, structural and behavioural patterns.
8. Demonstrates the Case Study on designing a document editor.
VI. COURSE OUTCOMES:
Upon completion of this course, students will be able to:
1. Construct a design consisting of a collection of modules.
2. Exploit well-known design patterns (such as Iterator, Observer, Factory and Visitor).
3. Express the appropriate roles of sub typing and inheritance, and use them effectively.
4. Ability to understand and apply common design patterns to incremental/iterative development.
5. Ability to identify appropriate patterns for design of given problem.
6. Applying the software development concepts, abilities, and skills, from analyzing a problem for
implementing a solution.
VII. HOW PROGRAM OUTCOMES ARE ASSESSED:
Program Outcomes Level Proficiency assessed by PO1 Engineering knowledge: Apply the knowledge of
mathematics, science, engineering fundamentals,
and an engineering specialization to the solution of
complex engineering problems.
H Assignment, Exercises
PO2 Problem analysis: Identify, formulate, review
research literature, and analyze complex
engineering problems reaching substantiated
conclusions using first principles of mathematics,
natural sciences, and engineering sciences.
S Exercises
PO3 Design/development of solutions: Design
solutions for complex engineering problems and
design system components or processes that meet
the specified needs with appropriate consideration
for the public health and safety, and the cultural,
societal, and environmental considerations.
S Exercises
PO4 Conduct investigations of complex problems:
Use research-based knowledge and research
methods including design of experiments, analysis
and interpretation of data, and synthesis of the
information to provide valid conclusions.
N ……..
PO5 Modern tool usage: Create, select, and apply
appropriate techniques, resources, and modern
engineering and IT tools including prediction and
modelling to complex engineering activities with
an understanding of the limitations.
H Design, Exercises
PO6 The engineer and society: Apply reasoning
informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and
the consequent responsibilities relevant to the
professional engineering practice.
N ……..
PO7 Environment and sustainability: Understand the
impact of the professional engineering solutions in
societal and environmental contexts, and
demonstrate the knowledge of, and need for
sustainable development.
H Assignment, Exercises
PO8 Ethics: Apply ethical principles and commit to
professional ethics and responsibilities and norms
of the engineering practice.
S Seminars, Discussions
PO9 Individual and team work: Function effectively
as an individual, and as a member or leader in
diverse teams, and in multidisciplinary settings.
H Workshop
PO10
Communication: Communicate effectively on
complex engineering activities with the
engineering community and with society at large,
such as, being able to comprehend and write
effective reports and design documentation, make
effective presentations, and give and receive clear
instructions.
S Seminars, Paper
presentations
PO11 Project management and finance: Demonstrate
knowledge and understanding of the engineering
and management principles and apply these to
one‟s own work, as a member and leader in a team,
to manage projects and in multidisciplinary
environments.
H Design Exercises,
Discussions
PO12
Life-long learning: Recognize the need for, and
have the preparation and ability to engage in
independent and life-long learning in the broadest
context of technological change.
S Exams, Discussions
VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:
Program Specific Outcomes Level Proficiency
assessed by
PSO1 Applications of Computing: Ability to use knowledge in various
domains to provide solution to new ideas and innovations.
H Lectures,
Assignments
PSO2 Programming Skills: Identify required data structures, design suitable
algorithms, develop and maintain software for real world problems.
H
Projects
N - None S - Supportive H - Highly Related
IX. SYLLABUS: UNIT – I Introduction: What is a Design Pattern?, Design Patterns in Smalltalk MVC, Describing Design Patterns, Catalog of Design Patterns, The Catalog of Design Patterns, Organizing the Catalog, How Design Patterns Solve Design Problems, How to Select a Design Pattern, How to Use a Design Pattern. UNIT – II A Case Study: Designing a Document Editor: Design Problems, Document Structure, Formatting, Embellishing the User Interface, Supporting Multiple Look-and-Feel Standards, Supporting Multiple Window Systems, User Operations, Spelling Checking and Hyphenation, Summary. Creational Patterns: Abstract Factory, Builder, Factory Method, Prototype, Singleton, Discussion of Creational Patterns. UNIT – III Structural Patterns Part I: Adapter, Bridge, Composite. Structural Patterns Part II: Decorator, acade , Flyweight, Proxy.
UNIT – IV Behavioral Patterns Part I: Chain of Responsibility, Command, Interpreter, Iterator. Behavioral Patterns Part II: Mediator, Memento, Observer. UNIT – V Behavioral Patterns Part III (Cont‟d): State, Strategy, Template Method, Visitor, Discussion of Behavioral Patterns. What to Expect from Design Patterns, A Brief History, The Pattern Community An Invitation, A Parting Thought.
Text books:
1. Design Patterns by Erich Gamma, Pearson Education.
Reference books:
1. Pattern‟s in JAVA Vol-I by Mark Grand, Wiley DreamTech.
2. Pattern‟s in JAVA Vol-II by Mark Grand, Wiley DreamTech.
3. JAVA Enterprise Design Patterns Vol-III by Mark Grand, Wiley DreamTech.
4. Head First Design Patterns by Eric Freeman-Oreilly-spd.
5. Peeling Design Patterns, Prof. Meda Srinivasa Rao, Narsimha Karumanchi, CareerMonk
Publications.
6. Design Patterns Explained by Alan Shalloway, Pearson Education.
7. Pattern Oriented Software Architecture, F. Buschmann & Others, John Wiley & Sons.
X. COURSE PLAN:
The course plan is meant as a guideline. There may probably be changes.
Lecture
No
Course Learning Outcomes Topics to be covered References
1-3 Recognize the importance of design
and design patterns.
What is a design pattern?, Design
patterns in Smalltalk MVC. T1 pg:1-6
4-8 Listing contents of catalog of
design patterns.
Describing Design Patterns, The
Catalog of Design Patterns, Organizing
the Catalog.
T1 pg:6-11
9-12 Determine object granularity and
specify object interfaces.
How Design Patterns Solve Design
Problems, How to Select a Design
Pattern, How to use a Design Pattern.
T1 pg:11-29
13-18 Outlines the problems of Lexi‟s
design.
Designing a Document Editor: Design
Problems, Document Structure,
Formatting, Embellishing the User
Interface.
T1 pg:33-43
19-22 Summarize command class and
subclasses.
Supporting Multiple Look-and Feel
Standards, Supporting Multiple
Window Systems.
T1 pg:47-51
23-27 Describe interactor class and
subclasses.
User Operations Spelling Checking and
Hyphenation, Summary. T1 pg:58-76
28-35 Lists out the importance of
creational patterns.
Abstract Factory, Builder, Factory
Method. T1 pg:87-107
36-40 Reviews the importance of prototype
pattern.
Prototype, Singleton, Discussion of
Creational Patterns. T1 pg:117-135
41-44 Identify the importance of structural
patterns.
Adapter, Bridge, Composite. T1 pg:139-163
45-49 Summarizes the implementation
issues when applying the bridge
pattern.
Decorator, Façade, Flyweight, Proxy.
T1 pg:175-207
50-52 Outlines the importance of
behavioral patterns.
Chain of Responsibility, Command,
Interpreter, Iterator. T1 pg:223-257
53-55 Use of observer, state, strategy in
behavioral patterns.
Mediator, Memento, Observer, State,
Strategy. T1 pg:273-315
56-58 Identify the need of template
method.
Template Method, Visitor, Discussion
of Behavioral Patterns. T1 pg:325-345
59 Summarizes the importance of
design patterns.
What to Expect from Design Patterns, A
Brief History. T1 pg:351-355
60 Reviews the template of design
patterns.
The Pattern Community An Invitation,
A Parting Thought. T1 pg:356-358
XI. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF
PROGRAM OUTCOMES:
Course
Objectives
Program Outcomes
Program
Specific
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO9 PO10 PO11 PO12 PSO1 PSO2
1 S H S
2 S H
3 S S S
4 H
5 H S S S
6 H
7 H S S
8 S H S
S= Supportive H = Highly Related
XII. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF
PROGRAM OUTCOMES:
Course
Outcomes
Program Outcomes
Program
Specific
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO9 PO10 PO1
1
PO12 PSO1 PSO2
1 S
2 S S H
3 H H S
4 H S
5 S
6 S
S= Supportive H = Highly Related
COMPUTER SCIENCE AND ENGINEERING
ASSIGNMENT
Course Name DESIGN PATTERNS
Course Code A70530
Class IV B. Tech I Semester
Branch Computer Science and Engineering
Year 2015 - 16
Course Faculty L DHANA LAKSHMI Assoc.Prof
OBJECTIVES To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited.
In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in incorporating
philosophy of outcome based education in the process of problem solving and career development. So, all students of
the institute should understand the depth and approach of course to be taught through this question bank, which will
enhance learner‟s learning process.
ASSIGNMENT – I
S. No Question Blooms
Taxonomy Level
Course
Outcome
UNIT - I
1. List the advantages of design patterns. Write short notes on use of
design patterns.
Knowledge 2
2. Discuss the MVC architecture in small talk. Understand 2
3. Explain how to describe design patterns. Understand 1
4. List the different sections of design patterns. Explain about them. Knowledge 1
5. Name the patterns along with their intents that are included in the
catalog of design patterns.
Apply 2
6. State and Explain the classification of design patterns. knowledge 3
7. List the various ways of organizing the design patterns. Knowledge 2
8. Compare inheritance verses parameterized types. Evaluate 3
9. Explain the Design patterns relationships Understand 2
10. Compare run-time and compile-time structure Analyze 4
11. List the common causes for redesigning of design patterns Knowledge 3
12. Explain the Frameworks in detail Understand 2
13. Write about the role of Toolkit in designing pattern Understand 2
14. Explain how Delegation is used in design pattern Knowledge 2
15. Explain the Catalogs of design patterns Understand 2
UNIT - II
1. Explain the process of recursive composition in building a
document.
Understand 2
2. Explain in detail about the „Glyph‟ abstract class. Understand 3
3. Discuss the goals and constraints in choosing an internal
representation for a document.
Understand 3
4. Explain partial Glyph class hierarchy with a neat diagram. Understand 3
5. Explain composition and compositor class relationship with a
neat diagram.
Understand 2
6. Define formatting. How can the textual analysis problem of
document editor be solved using design patterns?
Knowledge 4
7. Discuss the two embellishments that can be added to Lexi‟s user
interface. Signify the role of decorator pattern in embellishment.
Understand 4
8. Explain about abstracting object creation in detail. Understand 2
9. Memorize the useful techniques for implementing the abstract
factory pattern.
Evaluate 2
10. Give the sample code for abstract factory design pattern. Understand 2
11. Explain the implementation of abstract factory. Understand 2
12. Discuss about structure, applicability, participants of abstract
factory method.
Understand 4
13. Discuss the implementation issues of builder design pattern. Understand 4
14. Explain the structure of builder design pattern with class diagram
and describe the collaboration with a sequence diagram.
Understand 3
15. Describe in detail about how Multiple Window Systems is
supported
Knowledge 2
UNIT – III
1. Describe the intent, motivation and applications of composite
patterns. knowledge 1
2. Discuss the importance of implementation in composite structural
pattern. Understand 2
3. Give the intent, applicability and structure of composite design
pattern and Explain it. Understand 1
4. Explain the structure of composite pattern with a class diagram. Understand 2
5. Describe the consequences of composite design pattern. knowledge 3
6. Explain composite pattern with an example from drawing editor. Understand 2
7. Explain the structure of decorator pattern with suitable example. Understand 2
8. Explain the motivation for decorator method with relevant
patterns. Understand
2
9. Sketch the structure of composite pattern. Knowledge 2
10. Define composite and Proxy pattern Understand 2
ASSIGNMENT – II
1. Explain the structure of decorator design pattern with a class
diagram.
Understand 2
2. Explain the structure of façade design pattern with class diagram
and consequences.
Understand 2
3. Explain the consequences of flyweight method with its structure. Understand 3
4. Explain structure of flyweight pattern with suitable example. Understand 3
5. Explain the structure of decorator design pattern with a class
diagram.
Understand 2
6. Explain the structure of Proxy design pattern with a class
diagram.
Understand 2
7. Explain the structure of Adapter design pattern with class
diagram and consequences.
Understand 2
8. Define Intent and Consequences of bridge pattern. Understand 2
9. Define Façade pattern. Understand 2
10. Define decorator pattern. Understand 2
UNIT – IV
1. Explain the uses of command design pattern and its structure
with class diagram. Also Explain the implementation issues.
Understand 2
2. Explain the implementation and consequences of command
pattern.
Understand 4
3. Explain the implementation issues of command pattern with
sample code.
Understand 4
4. Explain the collaborations and consequences of command
method.
Understand 4
5. Explain the interpreter design pattern and discuss the
consequences and implementation issues.
Understand 4
6. Discuss the implementation issues of Iterator. Understand 4
7. Explain the structure of mediator design pattern with a class
diagram and discuss the collaboration with a sequence diagram.
Understand 3
8. Discuss about intent, motivation, structure, applicability and
consequences of a mediator behavioral pattern.
Understand 2
9. Explain the participants, collaborations, implementation and
sample code of the mediator pattern.
Understand 2
10. Explain the known uses of memento method. Understand 2
11. Explain the uses of Chain of Responsibility design pattern and its
structure with class diagram. Also Explain the implementation
issues.
Understand
2
12. Explain the Observer design pattern and discuss the
consequences and implementation issues.
Understand 2
13. Discuss the consequences and implementation issues of memento
design pattern.
Knowledge 2
14. Explain the uses of Iterator design pattern and its structure with
class diagram
Understand 2
15. Explain the known uses of Observer method Understand 2
UNIT – V
1. Explain the implementation issues of Strategy design pattern. Understand 2
2. Explain the implementation issues of observer design pattern. Understand 2
3. Explain how design patterns affect the way object-oriented
software is designed.
Understand 3
4. Discuss the several ways the design pattern affect the way object-
oriented software is designed.
Understand 3
5. Discuss design patterns as a supplement to the existing methods. Understand 4
6. Discuss the history of design patterns. Understand 2
7. Differentiate Alexander‟s patterns and Design patterns. Analyze 4
8. Write about the two ways of grouping the patterns according to
Christopher Alexander.
Apply 3
9. Compare and contrast between Abstract Class vs Concrete Class Analyze 3
10. Discuss about Alexander‟s pattern languages Knowledge 2
11. Discuss a briefly history of design patterns Knowledge 2
12. Discuss the consequences and implementation issues of Visitor
design pattern.
Understand 4
13. Discuss about intent, motivation, structure, applicability and
consequences of a Template Method behavioral pattern.
Knowledge 3
14. Explain the State design pattern and discuss the consequences
and implementation issues.
Understand 3
15. Write the sample code for Template method and Visitor patterns Understand 3
COMPUTER SCIENCE AND ENGINEERING
TUTORIAL QUESTION BANK
Course Name : DESIGN PATTERNS
Course Code : A70530
Class : IV B. Tech I Semester
Branch : Computer Science and Engineering
Year : 2016 – 2017
Course Faculty : L DHANA LAKSHMI Assoc.Prof
OBJECTIVES
To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be
addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality
assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of
the program that is being accredited.
In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in
incorporating philosophy of outcome based education in the process of problem solving and career
development. So, all students of the institute should understand the depth and approach of course to be taught
through this question bank, which will enhance learner‟s learning process.
PART – A (SHORT ANSWER QUESTIONS)
S No Question Blooms
Taxonomy Level
Course
Outcome
UNIT – I
INTRODUCTION:WHAT IS A DESIGN PATTERN
PART – A (SHORT ANSWER QUESTIONS)
1. Define design pattern. Knowledge 2
2. List the four elements of design patterns. Knowledge 1
3. Distinguish a class and an object. Analyze 1
4. Give an example for class structure. Understand 2
5. Sketch MVC architecture. Knowledge 2
6. State the meaning of a solution. Knowledge 1
7. Write the different sections of design patterns. Apply 3
8. Give the meaning of Intent. Understand 4
9. List the four essential elements of design pattern Knowledge 2
10. Define catalog of design patterns Knowledge 2
11. Define the two categories on which design pattern depends Knowledge 2
12. Explain how design patterns solve design problems Understand 4
13. Differentiate Inheritance and composite Analyze 2
14. Explain how to select a design pattern Understand 4
15. List out the patterns used in design patterns Knowledge 2
PART – B (LONG ANSWER QUESTIONS)
1 List the advantages of design patterns. Write short notes on use of Knowledge 2
S No Question Blooms
Taxonomy Level
Course
Outcome
design patterns.
2 Discuss the MVC architecture in small talk. Understand 2
3 Explain how to describe design patterns. Understand 1
4 List the different sections of design patterns. Explain about them. Knowledge 1
5 Name the patterns along with their intents that are included in the
catalog of design patterns.
Apply 2
6 State and Explain the classification of design patterns. knowledge 3
7 List the various ways of organizing the design patterns. Knowledge 2
8 Compare inheritance verses parameterized types. Evaluate 3
9 Explain the Design patterns relationships Knowledge 2
10 Compare run-time and compile-time structure Analyze 4
11 List the common causes for redesigning of design patterns Understand 3
12 Explain the Frameworks in detail Knowledge 2
13 Write about the role of Toolkit in designing pattern Knowledge 2
14 Explain how Delegation is used in design pattern Knowledge 2
15 Explain the Catalogs of design patterns Understand 2
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
1. A reputed software company is developing CAD software. It is
required that the software should read licenses details, number of
simultaneous users, permitted features etc., from a configuration file
with a specific syntax. Design the software with suitable design
pattern and Explain with a class diagram. Briefly discuss the
consequences and implementation issues.
Understand
2
2. Discuss the following aspects of behavioral patterns briefly: (i)
Should communication be encapsulated or distributed. (ii) Decoupling
senders and receivers.
Understand
2
3. Write about (i) documentation and learning aid. (ii) Alexander‟s
pattern languages. Apply
4
4. Write the code for connecting two objects by applying suitable design
pattern. Knowledge
4
5. Explain about which optimization technique is used to hide the data
from client. Understand
2
6. Distinguish between inheritance and composition Analyze 4
7. What is the use of object diagram in modeling? Explain. Knowledge 4
8. Explain the step - by - step approach for selecting the design pattern. Knowledge 4
9. Explain the compile time structure of a object oriented program Understand 2
10. List and Explain the reusable object oriented design
aspects of a pattern. Knowledge
4
UNIT – II
A CASE STUDY: DESIGNING A DOCUMENT EDITOR
PART – A (SHORT ANSWER QUESTIONS)
1. Give the meaning of “WYSIWYG”. Understand 3
2. Define Lexi. Knowledge 2
3. Define an abstract class. Knowledge 2
4. Write the meaning of a document. Apply 4
5. Differentiate compositor and composition. Analyze 2
S No Question Blooms
Taxonomy Level
Course
Outcome
6. Define formatting. Knowledge 2
7. Define an Iterator class. Knowledge 2
8. Define creational patterns. Knowledge 2
9. List five types of creational patterns. Knowledge 2
10. Define abstract factory design pattern. Knowledge 1
11. Define builder pattern. Knowledge 1
12. Give example of class diagram. Understand 2
13. Define structure and applicability of abstract factory method. Knowledge 2
14. Define the User operations Understand 4
15. Define Prototype design pattern Understand 4
PART – B (LONG ANSWER QUESTIONS)
1. Explain the process of recursive composition in building a document. Understand 2
2. Explain in detail about the „Glyph‟ abstract class. Understand 3
3. Discuss the goals and constraints in choosing an internal
representation for a document.
Understand 3
4. Explain partial Glyph class hierarchy with a neat diagram. Understand 3
5. Explain composition and compositor class relationship with a neat
diagram.
Understand 2
6. Define formatting. How can the textual analysis problem of document
editor be solved using design patterns?
Knowledge 4
7. Discuss the two embellishments that can be added to Lexi‟s user
interface. Signify the role of decorator pattern in embellishment.
Understand 4
8. Explain about abstracting object creation in detail. Understand 2
9. Memorize the useful techniques for implementing the abstract factory
pattern.
Evaluate 2
10. Give the sample code for abstract factory design pattern. Understand 2
11. Explain the implementation of abstract factory. Understand 2
12. Discuss about structure, applicability, participants of abstract factory
method.
Understand 4
13. Discuss the implementation issues of builder design pattern. Understand 4
14. Explain the structure of builder design pattern with class diagram and
describe the collaboration with a sequence diagram.
Understand 3
15. Describe in detail about how Multiple Window Systems is supported Knowledge 2
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
16. Explain how design patterns can solve the design problems of a
document editor. Knowledge 4
17. Discuss in detail about the representation of a document structure Understand 2
18. What is the importance of creational patterns in design of particular
pattern? Understand
2
19. Draw and Explain the structure of abstract factory and also Explain
the various participants involved in it. Knowledge
4
20. Explain the role of formatting in creation of a document editor Knowledge 4
21. What are the liabilities and techniques for implementing the abstract
factory pattern? Explain them. Knowledge
3
22. Draw and Explain the interaction diagram that illustrates the
cooperation between a builder and director. Knowledge
3
23. What are the different criteria that select the right pattern for a given Knowledge 3
S No Question Blooms
Taxonomy Level
Course
Outcome
problem?
24. What is the relationship between different participants present in
prototype pattern? Knowledge
2
25. Explain the importance of Look-and-Feel standards in design of a
document Understand
2
UNIT – III
STRUCTURAL PATTERN PART – A (SHORT ANSWER QUESTIONS)
16. Define structural patterns. Knowledge 2
17. List different types of structural patterns. Knowledge 3
18. Discuss the role of participants. Understand 3
19. Define bridge pattern. Knowledge 2
20. Define Intent and Consequences of bridge pattern. Knowledge 3
21. Define composite design pattern. Knowledge 4
22. Sketch the structure of composite pattern. Knowledge 3
23. Define decorator pattern. Knowledge 2
24. List the use of decorator pattern. Knowledge 2
25. Sketch the structure of decorator pattern. Knowledge 1
26. List the benefits of decorator pattern. Knowledge 3
27. Define Façade pattern. Knowledge 2
28. Sketch the structure of Façade pattern. Knowledge 1
29. Define composite pattern Understand 2
30. Define Proxy pattern Understand 2
PART – B (LONG ANSWER QUESTIONS) 1. Describe the intent, motivation and applications of composite
patterns.
knowledge 1
2. Discuss the importance of implementation in composite structural
pattern.
Understand 3
3. Give the intent, applicability and structure of composite design pattern
and Explain it.
Understand 1
4. Explain the structure of composite pattern with a class diagram. Understand 2
5. Describe the consequences of composite design pattern. knowledge 3
6. Explain composite pattern with an example from drawing editor. Understand 2
7. Explain the structure of decorator pattern with suitable example. Understand 2
8. Explain the motivation for decorator method with relevant patterns. Understand 2
9. Explain the structure of decorator design pattern with a class diagram. Understand 2
10. Explain the structure of façade design pattern with class diagram and
consequences.
Understand 3
11. Explain the consequences of flyweight method with its structure. Understand 3
12. Explain structure of flyweight pattern with suitable example. Understand 2
13. Explain the structure of decorator design pattern with a class diagram. Understand 2
14. Explain the structure of Proxy design pattern with a class diagram. Understand 2
15. Explain the structure of Adapter design pattern with class diagram
and consequences.
Understand 2
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS) 16. Explain the significance of proxy patterns with a suitable example. Understand 2
S No Question Blooms
Taxonomy Level
Course
Outcome
17. Explain the applicability and collaborations of a adapter pattern Understand 2
18. Explain how to decouple the abstraction from its implementation. Knowledge 4
19. Write and Explain the consequences, applicability and
implementation issues of a flyweight patterns. Understand 2
20. Explain the role of creational patterns in design of the patterns Knowledge 4
21. Distinguish between abstract class and concrete class Analyze 2
22. Explain the role of interaction diagrams in design patterns. Understand 2
23. What are the different issues to be considered while applying the
decorator pattern? Understand 2
24. What relation exists between the different participants involved in
composite pattern? Explain it in detail. Understand 2
25. Draw and Explain the multiple inheritance interface that illustrates
relation between different participants in the adapter pattern. Knowledge 4
UNIT – IV
BEHAVIORAL PATTERNS
PART – A (SHORT ANSWER QUESTIONS)
16. Define behavioral pattern. Knowledge 2
17. Define behavioral class pattern. Knowledge 2
18. Define behavioral object pattern. Knowledge 2
19. Define command pattern. Knowledge 2
20. Sketch sequence diagram for any example pattern. Knowledge 3
21. Sketch the structure of server in election commission. Knowledge 3
22. Define interpreter pattern. Knowledge 2
23. Write the intentions of mediator pattern. Apply 3
24. Define mediator pattern. Knowledge 2
25. Sketch the structure of mediator pattern. Knowledge 1
26. Write about Chain of Responsibility Understand 2
27. Define Memento pattern Knowledge 2
28. Define Observer pattern Knowledge 2
29. Define Iterator pattern Knowledge 2
30. Sketch the structure and applicability of Observer pattern Knowledge 3
PART – B (LONG ANSWER QUESTIONS)
1. Explain the uses of command design pattern and its structure with
class diagram. Also Explain the implementation issues.
Understand 2
2. Explain the implementation and consequences of command pattern. Understand 4
3. Explain the implementation issues of command pattern with sample
code.
Understand 4
4. Explain the collaborations and consequences of command method. Understand 4
5. Explain the interpreter design pattern and discuss the consequences
and implementation issues.
Understand 4
6. Discuss the implementation issues of Iterator. Understand 4
7. Explain the structure of mediator design pattern with a class diagram
and discuss the collaboration with a sequence diagram.
Understand 3
8. Discuss about intent, motivation, structure, applicability and
consequences of a mediator behavioral pattern.
Understand 2
S No Question Blooms
Taxonomy Level
Course
Outcome
9. Explain the participants, collaborations, implementation and sample
code of the mediator pattern.
Understand 2
10. Explain the known uses of memento method. Understand 2
11. Explain the uses of Chain of Responsibility design pattern and its
structure with class diagram. Also Explain the implementation issues.
Understand 2
12. Explain the Observer design pattern and discuss the consequences and
implementation issues.
Understand 2
13. Discuss the consequences and implementation issues of memento
design pattern.
2
14. Explain the uses of Iterator design pattern and its structure with class
diagram
Understand 2
15. Explain the known uses of Observer method Understand 2
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
1. List and Explain the various constructors and functions present in
iterator and list-iterator Understand
2
2. What are the issues to be considered when designing the chain of
responsibility
pattern?
Knowledge
4
3. List and Explain the variants and alternatives of iterator pattern. Understand 2
4. What is the motivation for mediator pattern? Explain Understand 2
5. What is an iterator? Explain the various operations that an iterator
supports. Explain them in detail. Knowledge
4
6. List and Explain the variants and alternatives of iterator pattern. Knowledge 4
7. Give brief description about the command history. Knowledge 4
8. List and Explain the various participants involved
in design of the interpreter Knowledge
4
9. Explain Double Dispatch and Single Dispatch for behavioral design
pattern Understand
2
10. What are the two models used in behavioral pattern? Knowledge 4
UNIT – V
BEHAVIORAL PATTERNS-II
PART – A (SHORT ANSWER QUESTIONS)
1. Write the intent of memento pattern. Apply 3
2. Sketch the structure of memento pattern. Knowledge 3
3. Define the phrase “objects for states”. Knowledge 3
4. Define state pattern. Knowledge 2
5. Sketch the structure of state pattern. Knowledge 3
6. List the situations where state pattern can be used. Knowledge 2
7. Define table driven approach. Knowledge 4
8. Write the sample code for Strategy pattern Understand 2
9. Write about the collaborations of Visitor pattern Knowledge 2
S No Question Blooms
Taxonomy Level
Course
Outcome
10. Explain about the consequences of Template pattern Knowledge 3
11. Write about the Pattern community Knowledge 3
12. Explain about the patterns in software Knowledge 2
13. Write about the lifecycle of Object Oriented Software Understand 4
14. Explain how objects are used as arguments Knowledge 4
15. Define double-dispatch and single-dispatch Understand 3
PART – B (LONG ANSWER QUESTIONS)
1. Explain the implementation issues of Strategy design pattern. Understand 2
2. Explain the implementation issues of observer design pattern. Understand 2
3. Explain how design patterns affect the way object-oriented software
is designed.
Understand 3
4. Discuss the several ways the design pattern affect the way object-
oriented software is designed.
Understand 3
5. Discuss design patterns as a supplement to the existing methods. Understand 4
6. Discuss the history of design patterns. Understand 2
7. Differentiate Alexander‟s patterns and Design patterns. Analyze 4
8. Write about the two ways of grouping the patterns according to
Christopher Alexander.
Apply 3
9. Compare and contrast between Abstract Class vs Concrete Class Analyze 3
10. Discuss about Alexander‟s pattern languages Knowledge 2
11. Discuss a briefly history of design patterns Knowledge 2
12. Discuss the consequences and implementation issues of Visitor design
pattern.
Knowledge 4
13. Discuss about intent, motivation, structure, applicability and
consequences of a Template Method behavioral pattern.
Knowledge 3
14. Explain the State design pattern and discuss the consequences and
implementation issues.
Understand 3
15. Write the sample code for Template method and Visitor patterns Understand 3
PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)
1. Discuss with suitable scenarios, how state, strategy and visitor
patterns can solve design problems. Understand
2
2. What to except from design pattern Understand 3
3. Explain the importance of object diagram in modeling, With the help
of a suitable example Knowledge
4
4. What is a template? In which way a design pattern will be described.
Explain in detail Understand
2
5. Explain the common causes for redesign a design pattern Understand 2
6. Explain the role of behavioral patterns in design of the patterns. Understand 2
7. What is the key idea of state pattern? Explain it in detail. Understand 2
8. Explain Documentation, Learning –Aid and An Adjunct to existing
systems in detail. Knowledge
4
9. “Should Communication encapsulated or distributed” Explain. Knowledge 4
10. Explain Decoupling senders and receivers. Knowledge 4
COMPUTER SCIENCE AND ENGINEERING
COURSE DESCRIPTION FORM
Course Title INFORMATION RETREVAL SYSTEM
Course Code A70533
Regulation R13 - JNTUH
Course Structure Lectures Tutorials Practical‟s Credits
4 - - 4
Course Faculty K SURESH Asst.Prof
I. COURSE OVERVIEW:
The main objective of this course is to present the scientific support in the field of information
search and retrieval. This course explores the fundamental relationship between information retrieval, hypermedia architectures, and semantic models, thus deploying and testing several
important retrieval models such as vector space, Boolean and query expansion. It discusses implementation and evaluation issues of new algorithms like clustering, pattern searching, and
stemming with advanced data/file structures, indirectly facilitating a platform to implement comprehensive catalogue of information search tools while designing an e-commerce web site.
II. PREREQUISITE(S):
Level Credits Periods/ Week Prerequisites UG 4 4 Computer Programming
III. COURSE ASSESSMENT METHODS:
University Total
Session Marks End Exam marks marks
Midterm Test
There shall be two midterm examinations. Each midterm examination
consists of essay paper, objective paper and assignment.
The essay paper is for 10 marks of 60 minutes duration and shall contain 4 questions. The student has to answer 2 questions, each carrying 5 marks.
The objective paper is for 10 marks of 20 minutes duration. It consists of
10 multiple choice and 10 fill-in-the blank questions, the student has to
answer all the questions and each carries half mark.
First midterm examination shall be conducted for the first two and half
units of syllabus and second midterm examination shall be conducted for
the remaining portion. 75 100
Five marks are earmarked for assignments. There shall be two assignments
in every theory course. Assignments are usually issued at the time of
commencement of the semester. These are of problem solving in nature
with critical thinking. Marks shall be awarded considering the average of
two midterm tests in each course.
IV. EVALUATION SCHEME:
S. No Component Duration Marks
1. I Mid Examination 80 minutes 20
2. I Assignment - 5
3. II Mid Examination 80 minutes 20
4. II Assignment - 5
5. External Examination 3 hours 75
V. COURSE OBJECTIVES:
At the end of the course, the students will be able to:
I. Be familiar with genesis and diversity of information retrieval situations for text and hyper
media.
II. Provide hands-on experience store, and retrieve information from www using semantic
approaches
III. Be Familiar with various indexing and pattern search techniques of information retrieval.
IV. Master the usage of different data/file structures in building computational search engines.
V. Master and evaluate the performance of information retrieval using advanced techniques such
as classification, clustering, and filtering over multimedia.
VI. Be familiar with ranked retrieval of a very large number of documents with hyperlinks between
VII. Master Information visualization technologies like Cognition and perception in the Internet or
Web search engine.
VI. COURSE OUTCOMES:
After completing this course the student must demonstrate the knowledge and ability to:
1. An ability to understand information Retrieval System Capabilities
2. Information about cataloging and Indexing
3. Understand User Search Techniques and Text Search Algorithms
VII. HOW PROGRAM OUTCOMES ARE ASSESSED:
Program Outcomes
Level
Proficiency assessed by
PO1 Engineering knowledge: Apply
the knowledge of mathematics,
Assignments, science, engineering fundamentals, and an engineering specialization H Tutorials to the solution of complex engineering problems.
PO2 Problem analysis: Identify, formulate, review research literature, and
analyze complex engineering problems
reaching substantiated
H Assignments conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
PO3 Design/development of solutions: Design solutions for complex
engineering problems and design system components or processes that
meet the specified needs with appropriate consideration for the public S Mini Projects
health and safety, and the cultural, societal, and environmental
considerations.
PO4 Conduct investigations of complex problems: Use research-based
knowledge and research methods
including design of experiments,
S Projects analysis and interpretation of data, and synthesis of the information to
provide valid conclusions.
PO5 Modern tool usage: Create, select, and apply appropriate techniques,
resources, and modern engineering and IT tools including prediction
S Mini Projects and modeling to complex engineering activities with an understanding
of the limitations.
PO6 The engineer and society: Apply reasoning informed by the
contextual knowledge to assess
societal, health, safety, legal and
S Assignments cultural issues and the consequent responsibilities relevant to the
professional engineering practice.
PO7 Environment and sustainability: Understand the impact of the
professional engineering solutions in societal and environmental N --
contexts, and demonstrate the knowledge of, and need for sustainable
development.
PO8 Ethics: Apply ethical principles and commit to professional ethics and
N -- responsibilities and norms of the engineering practice.
PO9 Individual and team work: Function effectively as an individual, and
as a member or leader in diverse teams, and in multidisciplinary N --
settings.
PO10 Communication: Communicate effectively on complex engineering
activities with the engineering community and with society at large,
such as, being able to comprehend and write effective reports and S Assignments
design documentation, make effective presentations, and give
and
receive clear instructions.
PO11 Project management and finance: Demonstrate knowledge and
understanding of
the engineering and management
principles and
N -- apply these to one‟s own work, as a member and leader in a team, to
manage projects and in multidisciplinary environments.
PO12 Life-long learning: Recognize the need for, and have the preparation
and ability to engage in independent and life-long learning in the S Projects
broadest context of technological change.
N - None S - Supportive H - Highly Related
VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:
Program Specific Outcomes Level Proficiency
assessed by
PSO1 Applications of Computing: Ability to use knowledge in various
domains to provide solution to new ideas and innovations.
H Lectures,
Assignments
PSO2 Programming Skills: Identify required data structures, design suitable
algorithms, develop and maintain software for real world problems.
H
Projects
N - None S - Supportive H - Highly Related
IX. SYLLABUS:
UNIT - I Introduction: Retrieval Strategies : Vector Space Model , Probabilistic retrieval strategies : Simple term weights, Non binary independence model, Language models.
UNIT – II
Retrieval Utilities : Relevance feedback , Clustering , N-grams , Regression analysis , Thesauri.
UNIT – III
Retrieval Utilities : Semantic networks , Parsing.
Cross-Language Information Retrieval : Introduction, Crossing the Language barrier.
UNIT – IV
Efficiency : Inverted Index , Query Processing ,Signature files , Duplicate document detection.
UNIT – V
Integrated Structured Data and Text: A Historical progression , Information retrieval as a relational
application , Semi-structured search using a relational schema.
Distributed Information retrieval: A Theoretical model of distributed retrieval ,Web search.
Text Books: David A. Grossman,Ophir Frieder,Information Retrieval- Algorithms and Heuristic,
Springer , 2nd edition(Distributed by Universities Press),20004. Reference Books: 1. Gerald J. Kowalski, Mark T. Maybury.Information Storage and Retrieval Systems Springer
2000 2. Soumen Chakrabarti,Mining the Web:Discovering Knowledge from Hypertext Data,Morgan-
Kaufmann Publishers,2002.
3. Christopher D. Manning, Prabhakar Raghavan, Hinrich. Schütze, Introduction to Information Retrieval, Cambridge University Press, Cambridge,England,20009.
Reference/Suggested Papers: Douglass R. Cutting, David R. Kargerd, Jan O. Pedersen, John W. Tukey: Scatter/Gather: a
cluster-based approach to browsing large document collections – 1992 Cited 423 times. Jay M. Ponte, W. Bruce Croft: A language modeling approach to information retrieval - 1998
Cited 721 times. Thomas Hofmann: Probabilistic latent semantic indexing - 1999 Cited 768 times. Jinxi Xu, W. Bruce Croft: Query expansion using local and global document analysis - 1996
Cited 412 times. Yiming Yang, Xin Liu: A re-examination of text categorization methods - 1999 Cited 643
Times. Kalervo jarvelin, Jaana Kekalanin: IR evaluation methods for retrieving highly relevant
documents - 2000 Cited 379 times. Jaime Carbonell, Jade Goldstein: The use of MMR, diversity-based reranking for reordering
documents and producing Summaries - 1998 Cited 478 times.
Jonathan L. Herlocker, Joseph A. Konstan, Al Borchers, and John Riedl: An algorithmic
framework for performing collaborative filtering - 1999 Cited 578 times. Chengxiang Zhai, John Lafferty: A study of smoothing methods for language models applied
to Ad Hoc information Retrieval - 2001 Cited 451 time.
X. COURSE PLAN: At the end of the course, the students are able to achieve the following course learning
outcomes:
Lecture Topics to be covered Course Learning Outcomes Reference
No.
1-2 Introduction to Information Retrieval Understand the Functional T1: 1 Systems. Precision and Recall. overview of IRS
3-4 Retrieval Strategies:Vector space model. Illustrate the model for a query with different documents.
T1: 2.1
5-7 Probabilistic retrieval strategies:simple term weights.
Applying weights to terms. T1: 2.2 – 2.2.1
8 Non binary independence model Illustrate normalization of
document length. T1: 2.2.2
9-11 Language models:Smoothing Understand probability for each term with smoothing.
T1: 2.3
12-14 Retrieval Utilities:Relevance feedback in
the vector space model and probabilistic model
Understand relevance feedback
T1: 3.1
. 15-18 Clustering Understand different
clustering algorithms. T1: 3.2
19-20 N grams Understand the N gram
datastructure. T1: 3.4
21 Regression Analysis Understand the Probability
of relevance. T1: 3.5
22-25 Thesauri Understand the Construction
of and generating thesauri. T1: 3.6
26-27 Retrieval Utilities:Semantic networks Illustrate about different
distance measures T1: 3.7
28-29 Parsing Understand different parses T1: 3.8
30 Cross-Language Information retrieval:Introduction
Understand the evaluation of Cross-Language Information retrieval
T1: 4.1
31-33 Crossing the language barrier Understand query and T1: 4.2
document translation 34-36 Efficiency:Inverted index
Illustrate the construction and compression of inverted index
T1: 5.1
37-38 Query processing Illustrate index modifications and simplifications
T1: 5.2
39-40 Signature of files Describe the scanning to
remove false positives T1: 5.3
41-42 Duplicate document detection Describe exact and similar
duplicates T1: 5.4
43-44 Integratedstructured data and text:A
Historical progression Understand user defined operators
T1: 6.2
45-49
Information retrieval as a relational application
Illustrate the proximity searches
T1: 6.3
50-51 Semi structured search using a relational
schema Explain the storage and tracking XML documents
T1: 6.4
52-53 Distributed Information Retrieval:A
Theoritical model of distributed retrieval Understand the distributed retrieval models
T1: 8.1
54-55 Web search Understand different web
searches T1: 8.2
XI. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF
PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:
Course
Program Outcomes
Program Specific
Outcomes
Objectives
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
I H H S S H S
II S H S H S H S
III H H H S H S H
IV S S S S
V H S S S H
VI H H S H H H
VII S H S H H S H H
S-Supportive H-Highly Related
XII. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:
Course
Program Outcomes
Program Specific
Outcome
s
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
1 H S H S S H
2 H S S S
3 H H
S – Supportive H - Highly Related
COMPUTER SCIENCE AND NGINEERING
ASSIGNMENT
Course Name INFORMATION RETRIEVAL SYSTEM
Course Code A70533
Class IV B. Tech I Semester
Branch Computer Science and Engineering
Year 2016 – 17
Course Faculty K SURESH Asst.Prof
OBJECTIVES:
To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be
addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality
assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of
the program that is being accredited.
In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in
incorporating philosophy of outcome based education in the process of problem solving and career
development. So, all students of the institute should understand the depth and approach of course to be
taught through this question bank, which will enhance learner‟s learning process.
ASSIGNMENT – I & II
S. No
Questions
Blooms
Taxonomy
Level
Course
Outcome
s
UNIT – I
1 Differentiate DBMS with information retrieval system? Understand 2
2 Explain IRS browse capabilities? Understand 1
3 List 3 differences between data retrieval and information retrieval? Remember 2
4 Explain Precision and Recall?
Understand 1
5 Define similarity coefficient in vector space model? Apply 2
6 Differentiate relevant retrieved and non-relevant retrieved? Apply 2
7 Differentiate browsing vs. Searching? Understand 1
8 Differentiate digital libraries and data warehouses? Understand 1
9 List 5 challenges of searching for information o the web? Remember 1
10 Explain about the objectives of IRS? Apply 2
UNIT – II
1 Explain N-gram data structure? Remember 3
2 Describe regression analysis? Apply 3
3 Define term co-ocurrence? Remember 2
4 Explain the concept of information extraction? Remember 2
5
Explain top-down and bottom-up procedure used in hierarchically clustered
collections?
Understand 2
6 List six different sort orders to expand initial query in
probabilistic model?
Remember 3
7 Explain relevance feedback? Remember 2
8 Discuss about clustering algorithms? Understand 2
9 Discuss efficiency uses in clustering? Understand 3
10 Define regression analysis? Understand 3
UNIT – III
1 Define K-distance? Apply 2
2 Discuss translation? Apply 2
3 Explain clustering? Understand 3
4 Define cross language information retrieval? Remember 2
5 Define query translation? Remember 3
6 Define phrase translation? Apply 3
7 Define document translation Remember 3
8 Define unbalanced approach of choosing translation? Understand 3
9 Discuss about structured queries? Remember 3
10 Define cross language information retrieval? Remember 2
UNIT – IV
1 Define is term clustering? Remember 3
2 Describe are various types of automatic term clustering techniques? Remember 1
3 Describe hypertext linkages? Understand 2
4 Describe document clustering? Understand 2
5 Define about hierarchy of clusters with example? Remember 1
6 Describe the technique for term clustering? Understand 2
7 Describe the process of thesaurus generation? Understand 2
8
Describe Cliques? Apply 1
9 Define single link? Understand 1
10 Differentiate Cliques and single link? Remember 1
UNIT – V
1 Describe various information visualization technologies? Remember 2
2 Describe in short about searching the internet? Understand 2
3 Define relevance feed back? Understand 2
4 Define Rocchio algorithm for relevance method? Understand 1
5 Describe about relevance feedback techniques? Understand 2
6 Define the features related to cognitions and perception?
Understand 2
7 Describe search statements and binding? Understand 2
8 Define Similarity measures? Understand 3
9 Define ranking? Understand 3
10 Describe Similarity measures and ranking? Understand 3
COMPUTER SCIENCE AND ENGINEERING
TUTORIAL QUESTION BANK
Course Name INFORMATION RETRIEVAL SYSTEM
Course Code A70533
Class IV B. Tech I Semester Branch Computer Science and Engineering
Year 2016 – 17
Course Faculty K SURESH Asst.Prof
OBJECTIVES:
To meet the challenge of ensuring excellence in engineering education, the issue of quality needs
to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means
of quality assurance in higher education. The major emphasis of accreditation process is to measure the
outcomes of the program that is being accredited. In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in
incorporating philosophy of outcome-based education in the process of problem solving and career development. So, all students of the institute should understand the depth and approach of course to be taught through this question bank, which will enhance learner‟s learning process.
PART - A (SHORT ANSWER QUESTIONS)
S No
Question Blooms
Taxonomy Level
Course
Outcome
UNIT – I
Part - A (Short Answer Questions) 1 Define information retrieval system? Knowledge 1 2 Differentiate DBMS with information retrieval system? Understand 1 3 Differentiate browsing vs. Searching? Knowledge 1 4 Explain your answer with relevant example Can information retrieval
system be related to a database management system? Knowledge 1
5 Define briefly terms
1. Precision
2. Recall
Knowledge 1
6 List 5 challenges of searching for information o the web? Knowledge 1
7 List 3difference between data retrieval and information retrieval? Knowledge 1
8 Differentiate the terms relevant and retrieved? Understand 1
9 Advantages of information retrieval system? Understand 1
10 Define vector space model? Knowledge 2
11 Define Retrieval Strategies? Knowledge 2
12 Define Smoothing? Understand 2
13 Define similarity coefficient to compute similarity between query
and document?
Understand 2
14 Explain the following statement In order to evaluate the Understand 1
effectiveness of a web search engine for general users, Would it
generally be more Important to measure precision or recall?
15 Differentiate digital libraries and data warehouses? Knowledge 1
Part - B (Long Answer Questions)
1 Explain the differences between Information Retrieval Systems
and DBMS?
Apply 1
2 Explain similarity coefficient and determine the ranking of
following documents
Q:gold silver truck
D1:shipment of gold damaged in a fire
D2:delivery of silver arrived in a silver truck
D3:shipment of gold arrived in a truck
Knowledge 2
3 Explain the concept of simple term weights for the above query
and documents?
Understand 2
4 Explain inverse document frequency? Evaluate 1
5 Explain about the objectives of IRS? Understand 1
6 Discuss term frequencies? with an example? Evaluate 2
7 Explain, How the information retrieval system is related to
database Management system?
Understand 2
8 Explain about the objectives of IRS?
Understand 2
9 Explain the concept of non binary independence model for the
above query and documents?
Understand 1
10 Explain the concept smoothing for the above query and
documents
Understand 2
11 Discuss Similarities between vector space model and
probabilistic retrieval Strategy?
Understand 1
12 Explain the construction of vector document? Knowledge 2
13 Explain similarity coefficient and determine the ranking of
following documents in Probabilistic retrieval strategy?
Q:gold silver truck
D1:shipment of gold damaged in a fire
D2:delivery of silver arrived in a silver truck
D3:shipment of gold arrived in a truck
Evaluate 2
14 Discuss the term Frequencies for the following
Q:new new times
D1:new York times
D2:new York posts
D3:loss angels times
Evaluate 2
15 Define IDF and calculate the same for the above query and
documents?
Knowledge 2
Part - C (Problem Solving and Critical Thinking Questions)
1 Explain the Estimation of Document Vectors for the following
3 documents
D1:New York Times
D2:New York Post
D3: Los Angeles Times
Q:New New Times
Understand 2
2 Explain the use of invert index in vector space model? Apply 1
3 Define Term weight? Understand 1
4 Explain inverse document frequency? Apply 2
5 Discuss about vector space model? Understand 2
6 Discuss about Retrieval Strategies? Apply 2
7 Calculate the precision and recall scores for the search A
Database contain 9Records .A Search was Conducted on that
Topic and 7 Records were retrieved .Of the 7 records
retrieved,4 were relevant?
Apply 1
8 Calculate the precision and recall scores for the search A
Database contain 80 Records .A Search was Conducted on that
Topic and 60 Records were retrieved .Of the 60 records
retrieved,45 were relevant?
Understand 1
9 Explain the Estimation of Non-Binary independent model for
the following 3 documents
D1:New York Times
D2:New York Post
D3: Los Angeles Times
Q:New New Times
Knowledge 2
10 Explain the Estimation of Smoothing in language model for
the following 3 documents
D1:New York Times
D2:New York Post
D3: Los Angeles Times
Q:New New Times
Apply 2
UNIT – II
Part - A (Short Answer Questions)
1 Explain the purpose of retrieval utilities? Knowledge 3
2 Explain the concept of clustering as a retrieval utility? Understand 3
3 Explain how Relevance feedback is used to improve the results
of retrieval strategy?
Knowledge 1
4 Explain N-gram data structure? Knowledge 2
5 Describe regression analysis? Knowledge 2
6 Define term co-occurrence? Knowledge 2
7 Explain six different sort orders to expand initial query in
probabilistic model?
Knowledge 2
8 Explain three different bottom-up procedures used in
hierarchically clustered collections?
Understand 3
9 Explain k-means algorithm? Apply 3
10 Discuss efficiency uses in clustering? Understand 3
11 Discuss the formula for the basic weight in the probabilistic
retrieval strategy?
Knowledge 2
12 Discuss four variations for composing the new query? Knowledge 2
13 Discuss three variations used in feedback iterations? Knowledge 2
14 Explain how users are involved in relevance feedback? Knowledge 2
15 Define simple link clustering? Understand 3
Part - B (Long Answer Questions)
1 Explain about relevance feedback in vector space model? Understand 3
2 Explain about relevance feedback in probabilistic model? Understand 3
3 Discuss the use of manually generated thesaurus? Knowledge 2
4 Explain the concept of thesauri by constructing term-term
similarity matrix?
Knowledge 3
5 Explain the approach of regression analysis to estimate the
probability of relevance?
Knowledge 3
6 Explain how n-grams are used for detection and correction of
spelling errors?
Knowledge 3
7 Define clustering and Explain hierarchical agglomerative
clustering?
Understand 3
8 Explain the usage of document clustering to generate a
thesaurus?
Knowledge 2
9 Explain clustering with single value decomposition? Knowledge 3
10 Explain term context used in thesaurus? Knowledge 2
11 Discuss clustering without a recomputed matrix? Knowledge 3
12 Describe extended relevance ranking with manual thesaurus? Knowledge 2
13 Explain Rocchio and Buckshot clustering algorithm? Apply 3
14 Explain Damshek work for implementing five gram based
measure of relevance?
Knowledge 2
15 Explain six different sort orders to expand initial query with the
number of iterations to perform successful relevance feedback?
Understand 3
Part - C (Problem Solving and Critical Thinking Questions)
1 Explain the use of probabilistic model in relevance feedback? Knowledge 3
2 Differentiate single link clustering, complete linkage and group
average?
Apply 3
3 Explain clustering without pre computed matrix? Understand 3
4 Explain n-gram developed by D Amore and Mah? Understand 2
5 Explain term co-occurrences in automatically constructed
thesauri?
Understand 2
6 Explain relevance feedback process with diagram? Knowledge 3
7 Explain vector space relevance feedback process? Apply 3
8 Discuss about partial query expansion? Understand 2
9 Discuss about hierarchically clustered collections? Understand 3
10 Discuss efficiency uses? Understand 3 UNIT – III
Part - A (Short Answer Questions)
1 Discuss R-distance for calculating distance between query and
document?
Understand 2
2 Describe how ranking is based on constrained spreading
activation?
Knowledge 2
3 Explain how NLP is used to reduce ambiguity in language? Knowledge 2
4 Define cross language information retrieval? Apply 2
5 Define query translation? Understand 2
6 Define phrase translation? Understand 2
7 Explain the concept of pruning translation? Understand 2
8 Define document translation? Knowledge 3
9 Explain the approach of balancing queries? Knowledge 3
10 Discuss about k-distance? Knowledge 3
11 Describe evaluation of distance measures? Knowledge 2
12 Discuss about performance of cross language information
retrieval system?
Apply 1
13 Define parsing? Understand 2
14 Discuss seven groups of relations into which a thesaurus is
combined?
Understand 3
15 Explain the use of pivot language in translation? Knowledge 1
Part - B (Long Answer Questions)
1 Explain the concept of semantic networks for automatic
relevance ranking?
Create 2
2 Explain why parsing is an essential feature of information
retrieval system?
Understand 2
3 Explain three different types of translations? Apply 2
4 Discuss unbalanced and structured queries approaches for
choosing translations?
Understand 1
5 Explain about syntactic parsing? Understand 3
6 Differentiate R-distance and K-distance? Knowledge 2
7 Discuss balanced and pivot language approaches for choosing
translations?
Knowledge 1
8 Explain what resources used to implement Cross language
retrieval system?
Apply 3
9 Explain the measure to evaluate the performance of Cross
language information retrieval system?
Understand 3
10 Discuss four questions to be answered to Cross language
barrier?
Understand 3
11 Explain about four different approaches in choosing
translations?
Knowledge 1
12 Explain how bilingual term list is used to improve accuracy? Knowledge 1
13 Explain the use of POS word sense tagging? Knowledge 2
14 Explain how message understanding conference focuses on
information extraction?
Knowledge 2
15 Explain the concept of distance measures in a semantic
network?
Knowledge 2
Part - C (Problem Solving and Critical Thinking Questions)
1 Differentiate R-distance and K-distance? Apply 2
2 Explain simple phrases and complex phrases? Understand 2
3 Explain balanced query and structured query? Understand 2
4 Discuss about unbalanced queries? Apply 2
5 Discuss about quality of bilingual term lists? Understand 3
6 Describe the method used to translate a query? Understand 2
7 Explain the measures used to evaluate the performance of
cross-language information retrieval systems?
Apply 2
8 Explain the resources used to implement cross-language
information retrieval systems?
Understand 3
9 Discuss ranking based on constrained spreading activation? Understand 3
10 Describe developing query term based on concepts? Apply 3 UNIT - IV
Part - A (Short Answer Questions)
1 Explain index pruning? Knowledge 2
2 Explain posting list? Understand 2
3 Define document file? Understand 2
4 Describe index? Understand 3
5 Explain about I-Match? Understand 3
6 Describe the method to find exact duplicates? Understand 3
7 Describe scanning to remove false positives? Understand 2
8 List two advantages of index file? Knowledge 2
9 Classify different types of files? Knowledge 2
10 Define weight file? Understand 2
11 Explain about two top-down algorithms? Understand 2
12 Explain index compression algorithms? Knowledge 2
13 Define Fixed length Index Compression? Knowledge 2
14 Define variable length index compression? Understand 2
15 Explain about cutoff based on document frequency? Understand 2
Part - B (Long Answer Questions)
1 Explain methods to reorder documents prior to indexing? Understand 3
2 Discuss methods to compress an inverted index? Knowledge 3
3 Define efficiency? Explain about inverted index? Knowledge 3
4 Explain about throughput-optimized compression? Create 2
5 Explain various top-down and bottom-up algorithms? Create 2
6 Explain how inverted index allows quick search of a posting
list?
Understand 3
7 Explain about duplicate document detection? Evaluate 3
8 Describe method to build an inverted index? Understand 2
9 Describe the method for finding similar duplicates? Understand 2
10 Explain how signature files are used to detect duplicates? Understand 2
11 Describe three methods to characterize posting list? Create 3
12 Discuss about query processing? Understand 2
13 Discuss about partial result set retrieval? Evaluate 2
14 Explain about I-match used in duplicate document detection? Understand 2
15 Explain vector space simplifications? Understand 13
Part - C (Problem Solving and Critical Thinking Questions)
1 Explain about Digital Libraries and Data Warehouses? Understand 2
2 Differentiate “Digital Library” and an Information Retrieval
System? What new areas of information retrieval research may
be important to support a Digital Library?
Understand 2
3 Explain about Browse Capabilities? Understand 2
4 Define Indexing? Explain the objectives of indexing and also
discuss about Automatic indexing?
Understand 3
5 Define two major data structures in any information system? Understand 3 6 Describe the similarities and differences between term
stemming algorithms and n-grams?
Knowledge 3
7 Explain in detail about Vector Weighting. What are the general
problems with the Vector Model?
Knowledge 2
8 Explain about Natural Language Processing. Describe how use
of Natural Language Processing will assist in the
disambiguation process?
Knowledge 3
9 Explain Similarity Measures and Ranking? Understand 2 1
0 Discuss two major approaches to generating queries? Explain in
detail?
Apply 2
UNIT - V
Part - A (Short Answer Questions)
1 Define Data Integrity? Knowledge 2
2 Define performance? Understand 1
3 Define Portability? Understand 2
4 Explain are the extensions to SQL? Understand 2
5 List different types of User-defined Operators? Understand 2
6 Explain NFN Approaches? Understand 3
7 Define proximity searches works? Understand 3
8 Explain the operators used in Boolean query? Understand 3
9 Define Boolean Retrieval? Understand 2
10 Define Relational Information Retrieval system? Understand 3
11 Discuss about Relational Schema? Understand 2
12 Explain storing XML Metadata? Knowledge 3
13 Discuss about XML-QL? Knowledge 3
14 What is an Index? Understand 3
15 Define attributes in Index? Understand 3
Part - B (Long Answer Questions)
1 Explain about historical progression? Create 2
2 Discuss briefly about user-defined operators? Understand 2
3 Explain Non-first normal form approaches? Understand 2
4 Discuss about information retrieval as a relational application? Understand 2
5 Explain about Boolean queries? Apply 2
6 Discuss about proximity searches? Understand 2
7 Explain the computation of relevance using unchanged SQL? Create 3
8 Describe semi-structured search using a relational schema? Create 3
9 Explain how static relational schema support XML-QL? Apply 3
10 Discuss about relational information retrieval system? Understand 3
11 Explain the method of tracking XML documents? Understand 3
12 Explain how index table models an XML index? Understand 3
13 Explain about a theoretical model of distributed retrieval? Create 3
14 Describe centralized information retrieval system model? Create 3
15 Describe distributed information retrieval system model? Apply 1
Part - C (Problem Solving and Critical Thinking Questions)
1 Discuss evaluation of web search engines? Knowledge 2
2 Explain how run time performance is a disadvantage of
information retrieval?
Knowledge 2
3 Explain how information retrieval becomes relational
application?
Knowledge 3
4 Explain about relevance ranking? Understand 3
5 Discuss how XML has become the standard for platform –
independent data exchange?
Understand 3
6 Explain how data integrity and portability are disadvantages of
information retrieval?
Understand 3
7 Explain how semi structured search is performed using
relational schema?
Knowledge 3
8 Explain two methods of distributed retrieval? Knowledge 3
9 Discuss briefly about web search? Knowledge 3
COMPUTER SCIENCE AND ENGINEERING
COURSE DESCRIPTION FORM
Course Title LINUX PROGRAMMING
Course Code A70511
Regulation R13
Course Structure Lectures Tutorials Practicals Credits
4 1 3 4
Course Faculty B SAI MANOGNA Asst.Prof
I. COURSE OVERVIEW:
The main objective of this course is to present the fundamental ideas behind the Linux operating system.
Explores fundamental relationship between principles of Linux file system and Linux system calls,
Implement extensive scripting techniques with the BASH Shell and advanced Programming Languages.
Designing and developing client server applications in Linux using major methods of Inter Process (IPC)
and concurrent programming, it also emphasizes files, process and signals. Provides extensive
implementation skills in multithread based socket programming.
II. PREREQUISITES:
Level Credits Periods / Week Prerequisites
UG 4 5 Computer Programming, Computer Networks
III. MARKS DISTRIBUTION:
Session Marks University End
Exam marks
Total
marks
Mid Semester Test:
There shall be 2 midterm examinations. Each midterm examination consists of
subjective test. The subjective test is for 20 marks, with duration of 2 hours.
Subjective test of each semester shall contain 5 one mark compulsory
questions in part-A and part-B contains 5 questions, the student has to answer
3 questions, each carrying 5 marks.
First midterm examination shall be conducted for the first two and half units
of syllabus and second midterm examination shall be conducted for the
remaining portion.
Five marks are earmarked for assignments. There shall be two assignments in
every theory course. Marks shall be awarded considering the average of two
assignments in each course. Five marks are earmarked for assignments. There
shall be two assignments
75
100
IV. EVALUATION SCHEME:
S. No Component Duration Marks
1 I Mid Examination 80 minutes 20
2 I Assignment - 05
3 II Mid Examination 80 minutes 20
4 II Assignment - 05
5 External Examination 3 hours 75
V. COURSE OBJECTIVES:
I. Be familiar with genesis and diversity of Both Linux and Unix System utilities.
II. Be familiar with shell scripts in Bourne shell Environment
III. Be familiar with the basics of Kernel support for process and user level process.
IV. Be familiar with File Systems, Signal generation and handling.
V. Master the usage of Inter Process Communication (IPC) and distinguish different concurrent
mechanisms.
VI. Provide hands-on experience to implement multitasking with TCP/UDP socket system calls
VII. Master analyzing and writing solutions to problems using the above techniques.
VI. COURSE OUTCOMES:
1. Able do basic UNIX OS administration tasks, including account management.
2. Able to use the Unix file system.
3. Able to perform basic UNIX networking tasks including setting up a LAN using NIS.
4. Able to use Unix programming tools: compilers, Make utility, debugger, profiler, version control.
5. Able to read-understand-write short scripts in a Unix shell
VII. HOW PROGRAM OUTCOMES ARE ASSESSED:
Program Outcomes Level Proficiency
assessed by
PO1 Engineering knowledge: Apply the knowledge of mathematics,
science, engineering fundamentals, and an engineering specialization
to the solution of complex engineering problems.
H Assignments,
Tutorials
PO2 Problem analysis: Identify, formulate, review research literature, and analyze complex engineering problems reaching substantiated
conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
H
Assignments
PO3 Design/development of solutions: Design solutions for complex
engineering problems and design system components or processes that
meet the specified needs with appropriate consideration for the public
health and safety, and the cultural, societal, and environmental
considerations.
S
Mini Projects
PO4 Conduct investigations of complex problems: Use research-based
knowledge and research methods including design of experiments,
analysis and interpretation of data, and synthesis of the information to
provide valid conclusions.
S
Projects
PO5 Modern tool usage: Create, select, and apply appropriate techniques,
resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding
of the limitations.
S
Mini Projects
PO6 The engineer and society: Apply reasoning informed by the
contextual knowledge to assess societal, health, safety, legal and
cultural issues and the consequent responsibilities relevant to the
professional engineering practice.
S
--
PO7 Environment and sustainability: Understand the impact of the
professional engineering solutions in societal and environmental
contexts, and demonstrate the knowledge of, and need for sustainable
development.
N
--
PO8 Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice. N --
PO9 Individual and team work: Function effectively as an individual, and
as a member or leader in diverse teams, and in multidisciplinary
settings.
N
--
PO10 Communication: Communicate effectively on complex engineering
activities with the engineering community and with society at large,
such as, being able to comprehend and write effective reports and
design documentation, make effective presentations, and give and
receive clear instructions.
H
Mini Projects
PO11 Project management and finance: Demonstrate knowledge and
understanding of the engineering and management principles and
apply these to one‟s own work, as a member and leader in a team, to
manage projects and in multidisciplinary environments.
S
Projects
PO12 Life-long learning: Recognize the need for, and have the preparation
and ability to engage in independent and life-long learning in the
broadest context of technological change.
S
Projects
N - None S - Supportive H - Highly Related
VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:
Program Specific Outcomes Level Proficiency
assessed by
PSO1 Applications of Computing: Ability to use knowledge in various
domains to provide solution to new ideas and innovations.
H Lectures,
Assignments
PSO2 Programming Skills: Identify required data structures, design suitable
algorithms, develop and maintain software for real world problems.
H
Projects
N - None S - Supportive H - Highly Related
IX. SYLLABUS:
UNIT I:
Linux Utilities: File handling utilities, Security by file permissions, Process utilities, Disk utilities,
Networking commands, Filters, Text processing utilities and Backup utilities, sed – scripts, operation,
addresses, commands, applications, awk – execution, fields and records, scripts, operation, patterns,
actions, Associative Arrays,String and Mathematical functions, system commands in awk, Applications.
Shell Programming with Bourne again shell(bash): Introduction, shell responsibilities, pipes and
Redirection, here documents, running a shell script, the shell as a programming language, shell meta
characters, file name substitution, shell variables, command substitution, shell commands, the
environment, quoting, test command, control structures, arithmetic in shell, shell script examples, interrupt
processing, functions, debugging shell scripts.
UNIT II:
Files and Directories: File Concept, File System Structure, File metadata- Inodes, kernel support for
files, System calls, Kernel support for files, System calls for File I/O Operations- open, creat, read, write ,
close, lseek, dup2file, filestatus information- stat family, File and record locking-fcntl function, File
permissions- chmod,fchmod, file ownership-chown, lchown, fchown, links- softlinks and hardlinks-
Symlink, Link,Unlink Directories: Creating, removing and changing directories- mkdir, rmdir, chdir,
obtaining current working directory-getcwd, Directory contents, Scanning Directories- Opendir, readdir,
closedir, rewinddir functions
UNIT III:
Process: Process concept, Layout of a C program image in main memory, Process environment list,
environment variables, getenv, setenv, Kernel support for process, process identification. process control -
process creation, replacing a process image, waiting for a process, process termination, zombie process,
orphan process, System call interface for Process management- fork, vfork, exit, wait, waitpid, exec
family, Process groups, Sessions and controlling Terminal, diff b/n threads and process
Signals: Introduction to signals, Signal generation and handling, Kernel support for signals, Signal
function, unreliable signals, reliable signals, kill, raise , alarm, pause, abort, sleep functions.
UNIT IV:
Inter process Communication: Introduction to IPC, IPC between processes on a single computer system,
IPC between processes on different systems. Pipes- creation, IPC between related processes using unnamed
pipes, FIFOs-creation, IPC between unrelated processes using FIFOs (Named pipes), difference between
unnamed and named pipes, pope n and pclose library functions.
Message Queues: Kernel support for messages, APIs for message queues, client/server example.
Semaphores: Kernel support for semaphores, APIs for semaphores. file locking with semaphores.
UNIT V:
Shared Memory: Kernel support for shared memory, APIs for shared memory, shared memory example.
Sockets – Introduction to Berkeley Sockets, IPC over a network, Client-Server model, Socket address
structures (Unix domain and internet domain), Socket system calls for connection oriented protocol and
connectionless protocol, example-client/server programs-Single Server-Client connection, Multiple
simultaneous Clients, Socket options-stockpot and fcntl system calls, Comparison of IPC mechanisms.
Text Books:
1. T.Chan, “UNIX System Programming using C++”, PHI.
2. Sumitabha Das, “UNIX Concepts and Applications”, 4e, TMH, 2006.
3. N.Matthew, R.Stones, Wrox, “Beginning Linux Programming”, 4e, Wiley India Edition.
References:
1. Robert Love, “Linux System Programming”, O‟Reilly.
2. W.R.Stevens, “UNIX Network Programming”, PHI.
3. Graham Glass, King Ables, “UNIX for programmers and users”, 3e, Pearson Education, 2003.
4. W.R.Stevens, “Advanced Programming in the Unix environment”, 2e, PHI, Pearson Education.
5. A.Hoover, “System Programming with C and UNIX”, Pearson.
6. Kumar Saurabh,”Unix Programming”, 1e, Wiley India pvt Ltd.
7. B.A.Forouzan and R.F.Gilberg, “UNIX and Shell programming”, Cengage Learning.
X. COURSE PLAN:
At the end of the course, the students are able to achieve the following course learning outcomes:
Lectur
e No.
Topics to be covered Course Learning
Outcomes
Reference
1-2 A brief history of Linux,
architecture of Linux, features of
Linux
Understand history of Linux
and its features
T2: 1.1, 2.1-2.2
3-4 Linux utilities-File handling
utilities, Security by file
permissions
Use system level scripts to
create and manage simple file processing operations.
T2: 4.7-4.8,
5.3-5.4
5-6 Process utilities, disk
utilities, Networking
commands, Filters
Illustrate manipulating
of information.
T2: 3.10,15.6,
17.5-17.6
7-8 Text processing utilities,
Backup utilities
Understand restoring
and retrieving text. T2: 12.3-12.9
15.9-15.10
9 sed – scripts, operation, addresses,
commands, applications
Understand two data buffers:
the active pattern space.
T2: 13.4
10-11 awk – execution, fields and
records, scripts, operation,
patterns, actions, Functions, using
system commands in awk
Demonstrate pattern scanning and processing in problem solving.
T2: 18.1-18.12
12-13 Working with the Bourne again
shell(bash): introduction, shell
responsibilities, pipes and input
Redirection, output redirection.
Understand basic shell scripting.
T2: 8.5
14 Documents, running a shell script Understand shell
script execution.
T2: 14.14
15 The shell as a programming language, shell meta characters, file name substitution
Classify use special
characters
T2: 8.9
16-17 Shell command substitution, shell
commands, environment, quoting, test command, control structures
Illustrate forwarding
the command output
into another context
T2: 8.4, 8.10
18-19 Arithmetic in shell, shell script examples, interrupt processing, functions, debugging shell scripts.
Develop solutions to
complex tasks.
T2: 14.5-T14.17
20 Files: File Concept, file system
structure, Inodes, file attributes,
file types, library functions
Demonstrate the use of the formatting specifiers of io.
R4: 4.1-4.14
21-22 The standard I/O (fopen, fclose,
fflush, fseek, fgetc, getc, getchar,
fputc, putc, putchar, fgets, gets
etc.)
Demonstrate standard stream
and buffer based input and
output system calls.
R4: 5.1-5.9
23 Formatted I/O, stream errors,
kernel support for files
Demonstrate layout of
what's being printed.
R4: 5.10-5.11
24-25 File descriptors ,low level file access
open,create,read,write,close,lseek,stat
family,umask,dup,dup2
Demonstrate modification
and editing.
R4: 3.1-3.12,
4.2
26-27 fcntl, file and record locking Demonstrate security
concepts in files. R4: 3.13
28 File and directory management-
Directory file APIs, symbolic links
and hard links.
Discuss scanning and
linking methods.
R4: 4.20-4.22,
4.15-4.17
29-31 Process kernel support for process,
process attributes, process hierarchy,
process states, process composition,
process creation and termination
Understand internal
procedures and states of IPC
R4: 8.1-8.9
32-33 Zombie process, orphan process. Illustrate daemons and varieties.
R4: 8.6
34 Signals – Introduction to signals,
Signal generation and handling,
Kernel support for signals, Signal
function.
Classify processes to respond
to asynchronous events. R4: 10.1-10.3
35-36 Unreliable signals, reliable
signals, kill, raise, alarm, Pause,
abort, and sleep functions.
Understand and to
handle exceptional
situations.
R4: 10.4-
10.19
37-38 Interprocess Communication:
Introduction to IPC, IPC between
processes on a single computer system,
IPC between processes on different
systems, pipes.
Demonstrate inter
related process
communication
R4: 14.1-14.4
39 FIFOs and examples. Demonstrate named pipes. R4: 14.5
40 Introduction to three types of IPC
(Linux)-message queues,
semaphores and shared memory.
Discuss types of restricting
and accessing different
resources.
R4: 14.6
41-43 Message Queues- Kernel support
for messages, Linux APIs for
messages, Client/server example.
Demonstrate dividing up
work among to balance work
over multiple processes.
R4: 14.7
44 Semaphores- Kernel support for
semaphores
Demonstrate user variables
and semaphore operations,
provided at the kernel level.
R4: 14.8
45-46 File locking with semaphores.
Linux APIs for semaphores
Solve security hurdles using
programming interface of
Linux
R4: 14.8
47 Shared Memory- Kernel support
for shared memory
Demonstrate common
memory portion which other
processes
R4: 14.9
48-49 Linux APIs for shared memory,
semaphore and shared memory
Illustrate common
memory sharing
interfacing example.
R4: 14.9
50-51 Multithreaded Programming –
Differences between threads and processes, thread structure and
uses, threads and lightweight
Processes.
Demonstrate parallelism
in Linux based system calls.
T1: 13.1-13.2
52 POSIX Thread APIs, Creating
Threads thread attributes
Demonstrate concurrency in Linux APIs.
T1: 13.4
53-54 Thread synchronization
with semaphores
Demonstrate multiple
processes to a common
resource in Linux based
parallel
T1: 13.5
55-57 Thread synchronization with
mutexes, example programs
Demonstrate multiple threads
access the same resource for
read and write.
T1: 13.5
58 Sockets: introduction to sockets Understand end to end network communication
R2: 15.1
59-60 Socket system calls for connection
oriented protocol
Understand tcp based system
calls
R2: 15.5
61-62 Connectionless protocol Understand udp protocol
system calls
R2: 15.5
63-64 Example-client/server programs Demonstrate connection
oriented, connectionless
communications in two and
three
R2: 15.5
XI. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:
Course
Objectives
Program Outcomes Program
Specific
Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
I H H S S H S
II S H S H S S S
III H H S S H H H
IV S S S S
V H S S S S
VI S H S H H H
VII S H S H H S H H
S– Supportive H - Highly Related
XII. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT
OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:
Course
Outcomes
Program Outcomes Program
Specific
Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
1 H S H S H
2 H S S S
3 H H
4 S S H H
5 S S
S - Supportive H - Highly Related
COMPUTER SCIENCE AND ENGINEERING
ASSIGNMENT
Course Name : LINUX PROGRAMMING
Course Code : A70511
Class : IV B. Tech I Semester
Branch : CSE
Year : 2016 – 2017
Course Faculty : B SAI MANOGNA Asst.Prof
OBJECTIVES: To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed,
debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher
education. The major emphasis of accreditation process is to measure the outcomes of the program that is being
accredited.
In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in incorporating
philosophy of outcome based education in the process of problem solving and career development. So, all students of
the institute should understand the depth and approach of course to be taught through this question bank, which will
enhance learner‟s learning process.
S. No
Question
Blooms
Taxonomy Level
Course Outcome
UNIT-I
1 Discuss elaborately the Unix kernel architecture with neat block diagram. Apply 1
2 Differentiate windows and Linux operating system and analyze important
system calls?
Understand 1
3 Illustrate security concepts in both Linux and windows operating systems? Apply 1
4 Illustrate „rlogin‟ , „telnet‟, „ftp‟, „arp‟, network commands with example? Apply 1
5 Explain cat, ls, mv, ln commands with examples? Understand 1
6
Illustrate by creating employee file with field eid, ename, designation, salary
each field is separated with pipe( | ). Write Linux commands for the following
queries:
Display part of information i.e eid, salary of all employees using Unix
commands.
Count and display of employee in employee file using Unix command
Search for “manager” in employee file and display all details of employee.
Understand 1
7 Illustrate awk command and write program to print the fields 1 and 4 of a file
that is passed as a command line argument. The file contains lines of
information that is separated by "," as delimiter. The awk program must print
at the end the average of all 4th field data.
Understand 1
8 Discuss how will you emulate wc -l using awk? Understand 1
9 Explain which character is used to search a pattern in the beginning of each
line using grep command?
Knowledge 1
10 Explain line addressing and content addressing using SED, each with an
example.
Knowledge 1
11 Define shell script? How shell programs are executed? Write different types
of shells in Linux programming along with advantages.
Knowledge 2
12 Draw a neat diagram and Explain the relationship between the kernel and
shell of the UNIX Operating system.
Understand 2
13 Write briefly about case control structure in sh with examples. Write briefly
about "||" operator in sh.
Knowledge 2
14 Write a shell script to create a menu which displays the list of files, current
users, and contents of a particular file and process status of the system based
on the user choice.
Apply 2
15 Read a filename, take a variable c for count, and execute cat command in for
loop, increment the variable till loop ends, and display the count/variable.
Write a Shell program to count the number of words in a file.
Apply 2
16 Read a number and initialize a variable res=1, and compute res=res*num,
decrement num by one and perform the same action till num greater than zero.
Write a shell program to calculate the factorial of a given number.
Apply 2
17 Illustrate the Fibonacci numbers are generated by setting F0=0, F1=1, and
then using the recursive formula Fn = Fn - 1 + Fn - 2 to get the rest. Thus the
sequence begins: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34 …. Write a Shell program to
generate above Fibonacci series.
Understand 2
18 Write a shell program to count no of lines in a text file which starts with a Apply 2
S. No
Question
Blooms
Taxonomy Level
Course Outcome
specified letter (Use grep command).
19 Write a shell script to read starting number and ending number and display
prime numbers in between two numbers using shell script. For eg. 1 to 20 is 2
3 5 7 11 13, 17, 19.
Apply 2
20 Write a shell script to read a file name and convert the content of a file to
uppercase letters.
Apply 2
UNIT-II
1 Create file – student file with fields sid, sname, percentage of marks, address
and store 10 lines of content and display last five lines. Write a program to
implement tail command in C language.
Apply 3
2 Explain the following functions with syntax:
(a) stat() (b) read() (c) fcntl() (d) lseek()
Understand 3
3 Discuss the characters that are used as wild cards by the shell. Explain their
meaning and illustrate their usage. Write a note on character class.
Understand 3
4 Explain about memory management functions malloc(), calloc(), realloc(),
free() with suitable example.
Understand 3
5 Create file – file5 and store 10 lines of content and display line number before
each line. Implement nl command in C language
Knowledge 3
6 Illustrate to create file – file4 and store names of students. Display the
content in descending order and also display number of lines in file4.
Knowledge 3
7 Write a program that takes one or more file/directory names as command line
input and reports the following information on the file.
i.File type.
ii.Number of links.
iii.Time of last access.
Read, Write and Execute permissions.
Apply 3
8 Explain about memory management functions malloc(), calloc(), realloc(),
free() with suitable example.
Understand 3
9 Write a C program for wc command using system calls or library functions. Apply 3
10 Write a C program that demonstrates redirection of standard output to a file.
(ex: ls > f1)
Apply 3
UNIT-III
1 Write a program to find sum of odd numbers by child process and sum of
even numbers by parent processes of given range numbers using fork function.
Apply 4
2 Explain difference between zombie processes and orphan process with
example.
Understand 4
3 Define Signals? Mention the different sources of signals. What are the three
dispositions the process has when signals occur? List an four signals along
with one or two line explanation. Write a program to setup handlers for
SIGINT and SIGALARM signals
Knowledge 4
4 Illustrate to create a new process (using fork()) and find sum of odd numbers
by child process, sum of even numbers by parent process in c language.
Knowledge 4
5 Write a signal handler which catches SIGFPE and performs certain action. Apply 4 6 Explain difference between zombie processes and orphan process with
example.
Understand 4
7 Define region lock? What are the rules about the specification of the region to
be locked or unlocked?
Understand 4
S. No
Question
Blooms
Taxonomy Level
Course Outcome
8 Write a program to find sum of odd numbers by child process and sum of
even numbers by parent processes of given range numbers using fork function.
Apply 4
UNIT-IV
1 Read a value „n‟ from standard input at sender side and send to receiver to find
power(n,2), Receiver receives the number „n‟ and finds power(n,2) and sends result to
sender. Write a program to implement two way communication using pipe‟s.
Apply 5
2 Define FIFOs? How they are different from pipes? Give an example
application where FIFO can be used.
Knowledge 5
3 Distinguish between pipes and named pipe. Apply 5
4 Write a c program to implement two way communication using fifos to
exchange information between sender and receiver. (Message=”IARE”).
Apply 5
5 Explain about the “Message Queue structures in the Kernel”? Write a c
program to send 3 messages by sender and read 3 messages by receiver using
same message queue id. Implement one way communication using message
queues.
Understand 5
6 Illustrate difference between pipes and message queues IPC. Apply 5
7 Define semaphores? What is their purpose? List and Explain the APIs used to
create and control the semaphores.
Knowledge
5
8 Explain about the “Kernel data structure for a semaphore set”. Write about
the semaphore adjustment on “exit”. Explain about the importance of SEM
UNDO.
Understand 5
9 Define Shared memory? Write various functions implemented in shared
memory. Explain in brief about each function.
Knowledge 5
10 Explain “how to control, attach and detach a shared memory segment. Understand 5
11 Write a program for shared memory forms of IPC using producer consumer
relation in such a way that consumer should read only after the producer has
written some text to the shared memory.
Apply 5
12 Write a C program to allow cooperating processes to lock a resource for
exclusive use, using a) Semaphores b) flock or lockf system calls.
Apply 5
UNIT-V
1 Explain thread synchronization with Mutexes? Give example. Understand 4
2 Explain the following in thread with example:
i. Thread identification
ii. Thread creation
iii. Thread termination
iv. Thread synchronization.
Understand 4
3 Discuss what happens if your main thread terminates before termination of
child thread? How can you prevent a thread becoming a "zombie"?
Understand 5
4 Explain thread synchronization with semaphore? Give example. Understand 4
5 Explain about IPV6 socket address structure and compare it with IPV4 and
Unix socket address structures.
Understand 2
6 Write a program to implement UDP client server application in which client
takes a file name from the command line and sends to the server. Server
returns the content of received file to the client.
Knowledge 3
7 Define socket? Describe the socket API. Write a C program to illustrate the
process of creating socket, initializing the socket address structure and
Knowledge 3
S. No
Question
Blooms
Taxonomy Level
Course Outcome
establishing a connection from client to the server. Assume the server IP
address as 10.10.2.5 and port number = 8000. The client after establishing a
connection should send “Hello World” message and wait for a reply of reverse
of same string. 8 Write a program to design a TCP client – server application which takes IP
address, Port number and string to be echoed as command line inputs in client
application and implements echo service.
Knowledge 3
9 Write a program to implement TCP client server application in which client
takes an integer value from the command line and sends to the server. Server
returns the factorial of the received integer value to the client.
Knowledge 4
10 List well-known ports? List some well-known ports. Knowledge 3
11 Write a program to implement UDP client server application in which client
takes an file name from the command line and sends to the server. Server
returns the content of received file to the client.
Knowledge 4
COMPUTER SCIENCE AND ENGINEERING
TUTORIAL QUESTION BANK
Course Name : LINUX PROGRAMMING
Course Code : A70511
Class : IV B. Tech I Semester
Branch : Computer Science and Engineering
Year : 2016- 17
Course Faculty : B SAI MANOGNA Asst.Prof
OBJECTIVES
To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be
addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality
assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of
the program that is being accredited.
In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in
incorporating philosophy of outcome based education in the process of problem solving and career
development. So, all students of the institute should understand the depth and approach of course to be taught
through this question bank, which will enhance learner‟s learning process.
S No QUESTION Blooms
taxonomy
level
Course
Outcomes
UNIT – I
Part - A (Short Answer Questions)
1. Explain importance of pyramid architecture in Linux? Knowledge 1
2. Explain kernel and its importance in security concepts of Linux? Understand 2
3. Explain different types of shells in Unix/Linux? Knowledge 2
4. Differentiate BASH and CSH? Knowledge 1
5. Explain vi editor and some editing commands in Linux? Knowledge 2
6. Explain listing of files in Linux? Knowledge 1
7. Explain links and its uses in Linux? Knowledge 2
8. Illustrate moving of files in Linux environment with examples? Understand 2
9. Illustrate „rlogin‟ command with example? Understand 1
10. Illustrate „telnet‟ command with example? Understand 1
11. Explain ftp and its importance in Unix? Knowledge 2
12. Explain importance of arp in Linux Understand 1
13. Differentiate tar and cpio commands? Understand 1
14. Illustrate creating a new directory in Linux with example? Knowledge 2
15. Explain deleting of directory and its contents with examples? Understand 1
16. Differentiate copying and moving files in Linux environment? Understand 1
17. Explain about „comm‟command? Knowledge 2
18. Explain about „grep‟command? Understand 1
19. Explain about „awk‟ command? Understand 1
20. Explain about „tee‟ command? Knowledge 2
21. Differentiate between a processes and program? Understand 1
22. Illustrateabout job control commands with examples? Understand 1
23. Explainabout background job and foreground job in Linux? Knowledge 2
24. Explain about „ps‟ command Understand 1
25. Explain about „telnet‟ command Understand 1
26. Explain about „ulimit‟ command ulimit. Knowledge 2
27. Illustrate „pg‟ command with example? Understand 1
28. Illustrate „more‟ command with example? Understand 1
29. Illustrate and permissions in Linux environment? Knowledge 4
30. Explain the security and compare with windows and dos operating
systems?
Understand 5
31. Explain how Unix operating system provides more security than any other
operating system.
Knowledge 5
32. Explain command substitutions with examples? Knowledge 3
33. Explain add, delete, view, actions in Linux ? Knowledge 3
34. Explain how debugging can be done in a shell script. Knowledge 4
35. Explain printing login information. Knowledge 4
36. Differentiate between different types of shells available in UNIX. Knowledge 4
37. Demonstrate shell program for the following scenario where printing
current time in upper right corner of the screen, while user can do normal
job at prompt.
Understand 4
38. Explain the significance of single quote and double quote. Understand 5
39. What does the shell do with the meta characters if it finds in the
command line?
Knowledge 4
40. Demonstrate by writing a shell script to find the factorial of a number. Knowledge 4
41. Distinguish between user Defined variables and environment
variables with example?
Understand 5
42. Describe about I/O Redirection operations in Linux? Knowledge 5
43. Describe any four built in variables in Shell and Demonstrate their usage
by example?
Knowledge 3
44. Explain by script to display GOOD MRNG, GOOD AFTERNOON,
GOOD NIGHT based on system time whenever user logs on.
Knowledge 4
45. discuss about here documents? Understand 5
46. Write a shell script that determines the period for which a specified user is
working on the system?
Knowledge 5
47. Explain how the shell treat a command line passed to it. Knowledge 3
48. Write a shell script to find and delete all file with the word “Unix". Knowledge 4
49. Briefly Describe various shell and environment various. Understand 5
50. Write a shell script to count the specified number of lines in a text file
without using wc command
Understand 5
51. What does the shell do with the meta characters if it finds in the
command line?
Knowledge 5
52. Demonstrate by writing a shell script to find the factorial of a number. Knowledge 3
Part - B (Long Answer Questions)
1 Explain pyramid architecture and kernel in Linux with neat
diagrams?
Knowledge 1
2 Explain different types of shells in Unix/Linux? Differentiate
BASH and CSH?
Knowledge 2
3 Explain vi editor and some editing commands in Linux? Explain
listing of files in Linux?
Understand 2
4 Explain links, file moving and its uses in Linux? Explain cp
command with examples?
Knowledge 1
5 Differentiate ssh and telnet and login procedure? Understand 1
6 Illustrate „rlogin‟ „telnet‟ command with example? Knowledge 2
7 Explain arp command and its options with example? Understand 2
8 Explain ftp and its importance in Unix? Differentiate tar and cpio, tar
commands?
Understand 1
9 Illustrate creating a new directory in Linux os with example and list
out the available files?
Understand 2
10 Explain deleting of directory and its contents with examples?
Differentiate copying and moving files in Linuxenvironment?
Knowledge 1
11 Explain about „comm‟command? Explain about „grep‟ command?
Explainabout „tee‟and more commands?
Understand 2
12 Explain about „awk andsed command? Understand 1
13 Differentiate between a process, and program? Illustrate about job
control commands with examples?
Evaluate 2
14 Explain about background job and foreground jobs in Linux? Explain
about „ps‟ comm. and „telnet‟ command
Understand 2
15 Explain about „ulimit‟and, mount commads? Illustrate„pg‟ and more
command with example?
Understand 2
16 Explain Moving processes to the background and foreground with an
example?
Understand 3
17 Explain the significance of single quote and double quote. Understand 4
18 Explain about meta characters in the command line? Demonstrate by
writing a shell script to find the factorial of a number.
Knowledge 5
19 Distinguish between between user Defined variables and
environment variables with example?
Knowledge 4
20 Describeabout I/O Redirection operations, built in variables in Shell. Knowledge 5
21 Explain by writing a script using system time, toshow GOOD Morning, GOOD AFTERNOON, GOODNIGHT.
Knowledge 4
22 Demonstrate by writing script that determines the period for which a
specified user is working on the system?
Knowledge 5
23 Explain how the shell treat a command line passed to it. Knowledge 5
24 Explain by writing shell script that receives any number of file names as
arguments checks if every argument supplied is a file or a directory?
Knowledge 5
25 Explain by writing an awk script to find the number of characters, words
and lines in a file.
Understand 5
26 Explain by writing shell script to find and delete all file with the word
“Unix".
Understand 4
27 Explain by writing shell script to count the specified number of lines in a
text file without using wc command?
Knowledge 4
28 Demonstrate by writing a shell script to find the factorial of a number. Knowledge 5
29 Explain by writing shell script that receives any number of file names as
arguments checks if every argument supplied is a file or a directory?
Knowledge 4
30 Explain Moving processes to the background and foreground with an
example?
Understand 3
Part - C (Problem Solving and Critical Thinking Questions)
1 Differentiate windows and Linux operating system and analyse
important system calls?
Understand 1
2 Differentiate DOS and Linux operating system? Knowledge 2
3 Illustratesecurity concepts in both Linux and windows operating
systems?
Understand 2
4 Illustrate script called „sayHi‟, put this script into your startup file
called .bash profile, the script should run as soon as you logon to system,
and it print any one of the following message in info box using dialog
utility, if installed in your system, If dialog utility is not installed then
use echo statement to print message: -Good Morning, GoodAfternoon,
Good Evening, according to system time.
Knowledge 3
5 Illustrateby writing script, that will print, Message "Hello World”, in
Bold and Blink effect, and in different colors like red, brown etc using echo command.
Knowledge 4
UNIT - II
Part – A (Short Answer Questions)
1 Differentiate between advisory locking and mandatory locking. Understand 5
2 Explain about symlink ( ) function with example? Knowledge 4
3 Explain about link ( ) function with example? Knowledge 4
4 Explain about unlink ( ) function with example? Knowledge 3
5 Explain about symlink ( ) function with example? Understand 3
6 Define a system call? Understand 5
7 Differentiate systemcall with library function?. Knowledge 3
8 Explain about dot and dot dot directories in the file system? Understand 4
9 Define symbolic link? Knowledge 5
10 Define hard link? Understand 5
11 Differentiate symbolic link instead of a hard link. Understand 4
12 Define fcntl ( ) function with example? Understand 5
13 Define read () function with example? Knowledge 5
14 Define write () function with example? Knowledge 3
15 Define stat () function with example? Knowledge 4
16 Define create () function with example? Understand 4
17 Define getc ( ) with example? Knowledge 5
18 Define fgetc ( ) with example? Knowledge 3
19 Define fprint ( ) with example? Understand 3
20 Define fscanf ( ).with example? Understand 3
21 Differentiate getc ( ) and fgetc ( ) with example? Understand 5
22 Differentiate stat ( ) and fsat ( ) with example? Understand 3
23 Differentiate printf ( ) Vs fprint () with example? Understand 3
24 Differentiate scanf ( ) Vs fscanf (with example? Understand 3
25 Differentiate getc ( ) and fgetc ( ) with example? Understand 4
Part - B (Long Answer Questions)
1 Explain fprint (), fscanf () with examples? Understand 5
2 Differentiate between advisory locking and mandatory locking. Understand 2
3 Explain about symlink ( ) function with example? Explain about link ( )
function with example?
Knowledge 3
4 Explain about unlink ( ) functions with example? Explain about symlink ( )
functions with example?
Understand 4
5 Define a system call? Differentiate systemcall with library function? Understand 4
6 Explain about dot and dot dot directories in the file system? Knowledge 5
7 Define symbolic link? Hard link with examples? Knowledge 4
8 Differentiate symbolic link instead of a hard link. Knowledge 4
9 Define fcntl ( ), read (), write () writen () function with examples? Knowledge 5
10 Describe the characteristics of Unix File System. Knowledge 3
11 Describe about Low Level File I/O System Calls. Understand 3
12 Describe usage of dup(), dup2() system calls with example? Understand 4
13 Define stat () and create () function with examples? Knowledge 4
14 Describe open ( ) function in Linux with examples? Knowledge 4
15 Explain getc ( ) and fgetc ( ) with examples? Knowledge 5
9 Explain fprint () and fscanf ( ).with example? Knowledge 3
10 Differentiate getc ( ) and fgetc ( ) with example? Knowledge 3
11 Differentiate stat ( ) and fstat ( ) with example? Understand 3
12 Explain fprint (), fscanf () with examples? Understand 3
13 Differentiate between advisory locking and mandatory locking. Understand 3
14 Describe open ( ) function in Linux with examples? Knowledge 3
15 Explain getc ( ) and fgetc ( ) with examples? Knowledge 3
16 Explain fprint () and fscanf ( ).with example? Knowledge 3
17 Differentiate getc ( ) and fgetc ( ) with example? Knowledge 3
18 Differentiate stat ( ) and fstat ( ) with example? Understand 3
Part – C (Problem Solving and Critical Thinking)
1 Differentiate and analyse non-blocking IO operations in both
windows and Linux operating systems?
Knowledge 5
Differentiate and analyse blocking IO operations in both windows and
Linux operating systems?
Understand 5
2 Illustrate to redirect the standard input (stdin) and the standard output
(stdout) of a process, so that scanf () reads from the pipe and printf ()
writes into the pipe?
Knowledge 4
3 Differentiate and analyse non-blocking IO operations in both
windows and Linux operating systems?
Knowledge 4
UNIT-III
Part - A (Short Answer Questions)
1 Describe process creation? Understand 3
2 Describe process termination? Understand 3
3 Differentiate process creation and termination? Understand 3
4 Describe signal function? Understand 3
5 Describe reliable signals. Understand 3
6 Describe orphan process with example? Understand 4
7 Illustrate SIGKILL with an example? Knowledge 4
8 Illustrate SIGINT with an example? Understand 5
9 Differentiate SIGKILL and SIGINT? Understand 4
10 Illustrate fork() with example? Knowledge 5
11 Illustrate fork() with example? Knowledge 3
12 Differentiate fork( ) with vfork ( )? Understand 3
13 Describe exec () with example? Understand 3
14 Illustrate exit ( ) function? Understand 3
15 Describe all flavours of excec () function? Knowledge 5
16 Define zombie processes with example?. Understand 3
17 Illustrate redirection of standard output to file abc.txt Understand 4
18 Explain about signal () function? Understand 4
19 Define wait () with example? Understand 5
20 Define waitpid () with example? Understand 2
21 Differentiate between wait ( ) and waitpid ( ). Understand 3
22 Differentiate reliable and unreliable signals with suitable example? Knowledge 3
23 Explain the mechanism for handling a signal with example? Understand 3
Part – B (Long Answer Questions)
1 Describe Process Creation Process Termination with example? Understand 3
2 Describe Signal function and Reliable signals with example? Knowledge 3
3 Define orphan process and zombie process with example? Knowledge 3
4 Describe SIGKILL and SIGINT with examples? Understand 3
5 Illustrate fork (), vfork () with example s? Knowledge 3
6 Differentiate fork ( ) with vfork ( )? Understand 3
7 Describe all versions of exec () with examples? Understand 3
8 Describe all flavours of excec () function? Knowledge 3
9 Illustrate zombie processes with example? Understand 3
10 Illustrate redirection of standard output to file abc.txt Understand 3
11 Explain about signal () function? Understand 3
12 Define wait () and waitpid () with examples? Knowledge 3
13 Differentiate between wait ( ) and waitpid ( ). Knowledge 3
14 Differentiate reliable and unreliable signals with examples. Knowledge 4
15 Explain the mechanism for handling a signal with example? Understand 5
Part – C (Problem Solving and Critical Thinking)
1 Differentiate and analyse non-blocking IO operations in both
windows and Linux operating systems?
Knowledg
e
3
2 Differentiate and analyse blocking IO operations in both windows and
Linux operating systems?
Understan
d
3
3 Illustrate to redirect the standard input (stdin) and the standard output
(stdout) of a process, so that scanf () reads from the pipe and printf ()
writes into the pipe?
Knowledg
e
4
UNIT-IV
Part – A (Short Answer Questions)
1 Describe message queue with syntax and example? Knowledge 3
2 DescribeFIFO concept with example?? 4
3 Describe simulate sleep and wakeup technology in Linuxipc Understand 4
4 Illustrate making fifo from command prompt? Understand 5
5 Describe mkfifo ( ) system call by example? Understand 5
6 Describe Pipes opening concept with example? Understand 5
7 Describepipes? Explain their limitations. Understand 5
8 Explain how pipes are created and used in IPC with examples?
Explain name space and importance in Linux?
Understand 5
9 Describe msgsnd ( ) with example? Understand 5
10 Describe msgrcv ( ), msgctl () with example? Understand 4
11 Illustrate about IPC_CREAT? Understand 5
12 Illustrate about IPC_EXEC? Knowledge 5
13 Explain about msgtyp with example? Knowledge 5
14 Describe IPC _PRIVATE with example? Understand 4
15 Describe pipe () system call? Understand 5
16 Differentiate between kill() and rise()? Knowledge `4
17 Differentiate low level piping and formatted piping? Knowledge 4
18 Differentiate between named pipes and unnamed pipes? Understand 5
19 Explain about fork () system call? Understand 5
20 Describe O-NDELAY flag with example? Knowledge 5
21 Explain message-queue communication by example? Knowledge 5
22 Explain priority queue with example? Understand 5
23 Explain about shared-memory segment. Knowledge 4
24 Explain about shared-memory segment with example? Knowledge 4
25 Illustrate about V IPC semaphore mechanism with example? Evaluate 3
26 Explain about achieving IPC using shared memory? Understand 3
272 Explain about achieving IPC using semaphores? Understand 5
8 Explain about synchronization? How synchronization is achieved with
semaphores?
Knowledge 5
29 Explain the structure of a thread. Discuss its uses. Knowledge 5
30 Explain the kernel data structure for shared memory with a neat diagram.
Explain the APIs associated for creating and destroying a shared memory
Understand 5
31 Differentiate between thread and light weight process. Understand 4
32 Explain how semaphores are used to control thread operations on shared
memory
Understand 4
33 Explain about all functions related to semaphores. Understand 4
34 Explain with a program how to copy file data from server to client using
shared memory.
Understand 4
35 Explain with a program how to copy file data from server to client using
semaphores.
Understand 4
36 Explain about shmget() function? Understand 4
37 Differentiate semaphore with shared memory IPC Mechanisms. Knowledge 4
38 Illustrate to transfer data between two unrelated processes using shared
memory.
Understand 4
39 Explain about shmcntl () function? Understand 4
Part – B (Long Answer Questions)
1 Describe message queue with syntax and example? Understand 5
2 Describe FIFO concept with example? Explain name space and
importance in Linux?
Knowledge 5
3 Describe sleep and wakeup technology in Linux PC. Illustrate
making FIFIO from command prompt?
Understand 4
4 Describe mkfifo ( ), pipe opening concept by example? Understand 5
5 Illustrate pipes? Explain their limitations. Explain how pipes are
created and used in IPC with an examples
Understand 4
6 Describe msgsnd ( ), msgrcv ( ) with example? Knowledge 4
7 Illustrate about IPC_CREAT with example? Understand 4
8 Illustrate about IPC_EXEC? Explain about msgtyp with example? Knowledge 4
9 Describe IPC _PRIVATE, pipe () system call with example? Understand 4
10 Differentiate between kill (), raise () with example? Understand 4
11 Explain about fork () and O-NDELAY flag with example? Understand 4
12 Explain message-queue communication by example? Explain
priority queue with example?
Understand 5
13 Explain the advantages of FIFO‟s over pipes. Understand 5
14 Explain two way communication using FIFOs? Understand 5
15 Explain about shared-memory segment with example?. Knowledge 3
16 Illustrate about V IPC semaphore mechanism with example. Understand 3
17 Explain about achieving IPC using shared memory? Knowledge 3
18 Explain about achieving IPC using semaphores? Knowledge 3
19 Explain about synchronization and How synchronization is achieved
with Semaphores?
Knowledge 3
20 Explain the structure of a thread and kernel data structure for shared
memory with a neat diagram?
Understand 3
21 Explain the system functions associated for creating and
destroying a shared memory?
Understand 3
22 Differentiate between thread and light weight process with system calls? Understand 3
23 Explain how semaphores are used to control thread operations on shared
memory
Knowledge 3
24 Explain about all functions related to semaphores? Knowledge 3
25 Explain with a program how to copy file data from server to client using
shared memory.
Knowledge 3
26 Explain with a program how to copy file data from server to client using
semaphores.
Understand 3
27 Differentiate semaphore with shared memory IPC Mechanisms. Understand 3
28 Illustrate text transfer between two unrelated processes using
shared memory.
Knowledge 3
Part – C (Problem Solving and Critical Thinking)
1 Illustrate by writing c program to handle a user Defined signal by
example?
Knowledge 5
2 Illustrate by writing c program where process forks to a child, then waits
for someone to terminate?
Understand 4
3 Illustrate by writing c program where process forks to a child, and create
a child process by using forks and suddenly terminates itself.
Knowledge 4
4 Illustrate ipc facility to show system limits? Knowledge 4
5 Illustrate to displays last operation time in each ipc facility. Knowledge 5
6 Demonstrate race conditions with shared memory? Knowledge 3
UNIT-V
Part - A (Short Answer Questions)
1 Differentiate between multithreaded programming and single
threaded programming?
Knowledge 2
2 Illustrate pthread create ( ) function? Understand 3
3 Explain pthread kill ( ) function with example? Understand 4
4 Explain about various POSIX APIs for mutual exclusion and locks with
example?
Understand 5
5 Illustrate about thread synchronization with mutex locks? Knowledge 5
6 Illustrate about POSIX APIs of semaphores? Understand 5
7 Explain thread synchronization with semaphores with example? Knowledge 5
8 Explain about Light Weight Processes? Understand 5
9 Explain about Thread structure? Understand 5
10 Explain about Semaphores? Understand 5
11 Explain about Mutexes? Understand 5
12 Explain about Threads? Understand 4
13 Illustrate multithreaded programming? Understand 4
14 Explain about the APIs used to Demonstrate the attributes for a thread Understand 4
15 Define deadlock? Illustrate about the mutex lock to prevent
deadlock condition?
Knowledge 4
16 Differentiate single threaded and multithreaded programming? Understand 4
17 Illustrate with a neat diagram about threads, and light weight processes? Understand 4
18 Explain about separate kernel stack and light weight processes? Understand 5
19 Describe disadvantage of single threaded programming? Understand 5
20 Describe advantages of multithreaded programming? Understand 5
21 Differentiate process and threads? Knowledge 3
22 Demonstrate client and server programming using TCP protocol? Understand 3
23 Differentiate stream sockets and raw sockets? Understand 4
24 Demonstrate client and server programming using UDP protocol? Understand 5
25 Explain about socket( ) function in Linux? Understand 5
26 Explain about listen( ) function in Linux? Knowledge 5
27 Explain about accept( ) function in Linux? Understand 5
28 Explain about bind( ) function in Linux? Understand 3
29 Explain about read() function in Linux? Understand 5
30 Explain about write() function in Linux? Knowledge 4
31 Explain about „TCP NODELAY‟ syntax? Understand 4
32 Differentiate IP V4 AND IPV6? Understand 4
33 Explain bzero () function? Understand 5
34 Explain about byte ordering in Linux? Understand 5
35 Explain about how TCP connections are established and
terminated.
Understand 3
36 Demonstrate echo server and echo client using 3333 port in tcp style? Knowledge 3
37 Explain how small and big packets handled in transferring client server
environment?
Understand 3
38 Explain tcp socket connection establishment with a neat diagram? Understand 5
39 Explain udp connection establishment with a neat diagram? Understand 5
40 Demonstrate client and server programming using TCP protocol? Understand 5
41 Differentiate client server models in tcp and udp? Knowledge 4
42 Explain sendTo () with example? Understand 4
43 Explain recvFrom () with example? Understand 4
Part - B (Long Answer Questions)
1 Illustrate about thread synchronization with mutex locks with examples? Knowledge 5
2 Differentiate between multithreaded programming and single
threaded programming.
Understand 5
3 Illustrate pthread create ( ) function with examples? Understand 2
4 Explain pthread kill ( ) function with example? Knowledge 4
5 Explain about various POSIX APIs for mutual exclusion and locks
with example
Understand 4
6 Illustrate about POSIX APIs of semaphores? Understand 4
7 Explain thread synchronization with semaphores with example? Understand 4
8 Explain about Thread structure with examples? Knowledge 3
9 Explain about Semaphores with examples? Knowledge 3
10 Explain about Mutexes in Threads. With examples? Knowledge 3
11 Illustrate multithreaded programming? Understand 2
12 Explain about the APIs used to Demonstrate the attributes for a
thread
Understand 3
13 Illustrate about the mutex lock to prevent deadlock condition. Knowledge 3
14 Differentiate single threaded and multithreaded programming? Understand 3
15 Illustrate with a neat diagram about threads, and light weight
processes?
Understand 4
16 Explain about separate kernel stack and light weight processes? Understand 5
17 Describe disadvantage of single threaded programming?
Describe advantages of multithreaded programming.
Knowledge 5
Prepared By: HOD, CSE
18 Explain about Linux API‟s for shared memory with neat diagram? Knowledge 4
19 Illustrate posix thread APIs for basic Process and Threads with
examples?
Knowledge 5
20 Explain about how semaphores values can be incremented or
decremented with examples?
Understand 5
21 Demonstrate client and server programming using TCP protocol with
neat diagram?
Knowledge 5
22 Differentiate stream sockets and raw sockets and related system calls? Understand 5
23 Demonstrate client and server programming using UDP protocol with
neat diagram?
Understand 4
24 Explain about socket ( ) , listen( ), accept( )system calls in Linux? Understand 5
25 Explain about bind (), read (), write () functions in Linux? Knowledge 4
26 Explain about sendTo () and recvFrom () functions in Linux? Knowledge 4
27 Explain about TCP NODELAY syntax with a small program? Knowledge 4
28 Explain all byte ordering and manipulation functions with
examples?
Knowledge 4
29 Explain about how TCP connections are established and
terminated.
Understand 5
30 Demonstrate echo server and echo client using 6666 port in tcp style? Understand 5
31 Explain how small and big packets handled in transferring client
server environment?
Understand 5
32 Explain tcp socket connection establishment with a neat diagram? Knowledge 5
33 Explain udp data transfer with a neat diagram? Knowledge 5
Part – C (Problem Solving and Critical Thinking)
1 Illustrate by writing a c program to implement Thread structure? Knowledg
e
5
2 Illustrate by writing a c program to implement thread_mutex_lock () and
unlock ()?
Knowledg
e
4
3
Illustrate by writing a c program to implement tcp chat client server? Understan
d
5
4 Illustrate by writing a c program to implement udp chat client server? Understan
d
4
COMPUTER SCIENCE AND ENGINEERING
COURSE DESCRIPTION FORM
Course Title MOBILE COMPUTING
Course Code A70536
Regulation R13 – JNTUH
Course Structure Lectures Tutorials Practicals Credits
5
- - 4
Course Faculty Dr.Balarengadurai Prof
I. COURSE OVERVIEW
This course is offered for those who are interested in understanding and building systems support mechanisms for mobile computing systems including client-server web/database/file systems, and mobile ad hoc and sensor networks for achieving the goal of anytime, anywhere computing in wireless mobile environments. The technologies involved to realize such a system will be covered and the fundamental concepts of mobile computing are introduced. These include mobility and service management, data management, routing in mobile ad hoc and sensor networks, and security issues for mobile systems. While mobile computing covers many topics, in this course our main focus will be on mobility, data and service management, and security issues in mobile computing environments.
II. PREREQUISITE(S):
Level Credits Periods/ Week Prerequisites UG 4 5 Computer Networks, Operating
Systems
III. MARKS DISTRIBUTION:
University Total
Session Marks End Exam
marks
marks
Midterm Test There shall be two midterm examinations. Each midterm examination
consists of essay paper, objective paper and assignment. The essay paper is for 10 marks of 60 minutes duration and shall contain 4 Uuestions. The student has to answer 2 questions, each carrying 5 marks. The objective paper is for 10 marks of 20 minutes duration. It consists of
10 multiple choice and 10 fill-in-the blank questions, the student has to
answer all the questions and each carries half mark.
First midterm examination shall be conducted for the first two and half
units of syllabus and second midterm examination shall be conducted for
the remaining portion. Five marks are earmarked for assignments. There
shall be two assignments in every theory course.
Assignments are usually issued at the time of commencement of the
semester. These are of problem solving in nature with critical thinking
Marks shall be awarded considering the average of two midterm tests in
each course.
75 100
IV. EVALUATION SCHEME:
S. No Component Duration Marks
1. I Mid Examination 80 minutes 20
2. I Assignment - 5
3. II Mid Examination 80 minutes 20
4. II Assignment - 5
5. External Examination 3 hours 75
V. COURSE OBJECTIVES:
At the end of the course, the students will be able to:
I. Able to understand the concept of mobile computing paradigm, its novel applications and
limitations.
II. To learn the typical mobile networking infrastructure through a popular GSM protocol as well as their architecture.
III. To illustrate the issues and solutions of various layers of mobile networks, namely MAC layer,
Network layer and transport layer.
IV. To estimate the database issues in mobile environments and data delivery models and also issues in the QoS.
V. Be familiar with the ad hoc networks, applications and their
challenges.
VI. To learn the platforms and protocols used in mobile
environment.
VI. COURSE OUTCOMES:
After completing this course the student must demonstrate the knowledge and ability to:
1. An understanding of the characteristics and limitations of mobile hardware devices including
their user-interface modalities.
2. Ability to develop applications that are mobile-device specific and demonstrate current practice
in mobile computing contexts.
3. Awareness of professional and ethical issues, in particular those relating to security and privacy
of user data and user behavior
VII. HOW PROGRAMS ARE ACCESSED:
Program Outcomes
Level
Proficiency
assessed by
PO1 Engineering knowledge: Apply the knowledge of mathematics, Laboratory
science, engineering fundamentals, and an engineering H
Experiments
specialization to the solution of complex engineering problems.
PO2 Problem analysis: Identify, formulate, review research literature,
and analyze complex engineering problems reaching substantiated H --
conclusions using first principles of mathematics, natural sciences,
and engineering sciences.
PO3 Design/development of solutions: Design solutions for complex
engineering problems and design system components or processes Tutorials,
that meet the specified needs with appropriate consideration for H Laboratory
the public health and safety, and the cultural, societal, and Experiments
environmental considerations.
PO4 Conduct investigations of complex problems: Use research-
based knowledge and research methods including design of H Assignments
experiments, analysis and interpretation of data, and synthesis of
the information to provide valid conclusions.
PO5 Modern tool usage: Create, select, and apply appropriate
techniques, resources, and modern engineering and IT tools H
Assignments,
including prediction and modeling to complex engineering Exams
activities with an understanding of the limitations.
PO6 The engineer and society: Apply reasoning informed by the
contextual knowledge to assess societal, health, safety, legal and N --
cultural issues and the consequent responsibilities relevant to the
professional engineering practice.
PO7 Environment and sustainability: Understand the impact of the
professional engineering solutions in societal and environmental N --
contexts, and demonstrate the knowledge of, and need for
sustainable development.
PO8 Ethics: Apply ethical principles and commit to professional ethics S --
and responsibilities and norms of the engineering practice.
PO9 Individual and team work: Function effectively as an individual,
and as a member or leader in diverse teams, and in S Tutorials,Exams
multidisciplinary settings.
PO10 Communication: Communicate effectively on complex
engineering activities with the engineering community and with
society at large, such as, being able to comprehend and write N --
effective reports and design documentation, make effective
presentations, and give and receive clear instructions.
PO11 Project management and finance: Demonstrate knowledge and
understanding of the engineering and management principles and N --
apply these to one‟s own work, as a member and leader in a team,
to manage projects and in multidisciplinary environments.
PO12 Life-long learning: Recognize the need for, and have the Future scope or
preparation and ability to engage in independent and life-long S projects
learning in the broadest context of technological change. discussion
N - None S - Supportive H - Highly Related
VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:
Program Specific Outcomes Level Proficiency
assessed by
PSO1 Applications of Computing: Ability to use knowledge in various
domains to provide solution to new ideas and innovations.
H
Lectures,
Assignments
PSO2 Programming Skills: Identify required data structures, design
suitable algorithms, develop and maintain software for real world
problems.
H
Projects
N - None S - Supportive H - Highly Related
IX. SYLLABUS
UNIT – I:
Introduction
Mobile Communications, mobile computing- Paradigm, Promises/Novel Applications and Impediments and Architecture: Mobile and Handheld Devices, Limitations of Mobile and Handheld Devices. GSM: Services, System Architecture, Radio Interfaces, Protocols, Localization, Calling, Handover, Security, New Data Services, GPRS, CSHSD, DECT.
UNIT – II:
Wireless Medium Access Control (MAC) Motivation for a specialized MAC(Hidden and exposed terminals. Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN (IEEE802.11). Mobile Network Layer: IP and mobile IP Network Layers, Packet Delivery and handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP
UNIT – III:
Mobile Transport Layer
Conventional TCP/IP Protocols, Indirect TCP, Snooping TCP, Mobile TCP, other transport layers protocols
for Mobile Networks. Database Issues: Database Hoarding & Caching Techniques, C-S Computing & Adaptation, Transactional Models, Query Processing, Data Recovery Process & QoS Issues.
UNIT – IV: Data Dissemination and Synchronization: Communications Asymmetry, Classification of Data Delivery Mechanisms, Data Dissemination Broadcast Models, Selective Tuning and Indexing Methods, Digital Audio and Video Broadcasting(DAB & DVB). Data Synchronization- Introduction, Software, and Protocols.
UNIT – V:
Mobile Ad hoc Networks (MANETs) Introduction, Applications & Challenges of a MANET, Routing, Classification of Routing Algorithms, Algorithms such as DSR, AODV, DSDV, etc., Mobile Agents, Service Discovery. Protocols and Platforms for Mobile Computing: WAP, Bluetooth, XML, J2ME, JavaCard,PalmOS,Windows CE, Symbian OS, Linux for Mobile Devices, Android.
Text Books: 1. Jochen Schiller, “Mobile Communications”, Addison-Wesley, 2e, 2004. 2. Raj Kamal, “Mobile Computing”, Oxford University Press, 2007, ISBN: 0195686772.
References: 1. Jochen Schiller, “Mobile Communications”, Addison-Wesley, 2e, 2004.
2. Stojmenovic and Cacute, “Handbook of Wireless Networks and Mobile Computing”, Wiley, 2002, ISBN: 047141908.
3. Reza Behravanfar, “Mobile Computing Priniciples: Designing and Developing Mobile Applications with UML and XML”, Cambridge University Press, Oct 2004, ISBN: 0521817331
X. COURSE PLAN:
At the end of the course, the students are able to achieve the following course learning outcomes:
Lecture Topics to be covered
Course Learning Reference
No. Outcomes
1-3 Introduction to mobile communications, mobile Understand the basic T1:1.1-1.8,
computing- paradigm, applications, architecture concept of mobile T2:1.2
and limitations of mobile and hand held devices. computing
4-7 GSM Services, system architecture, radio Describe the GSM and T1:3.3-3.7
interfaces, protocols, CSHSD, DECT. GPRS architecture T2:2.3
8-9 Localization, calling, handover, security, new Discuss about the GSM T1:3.3
data services. services T2:2.3
10 Wireless Medium Access Control (MAC), Explain about MAC layer T1:4.1
motivation for a specialized MAC (Hidden and
exposed terminals. Near and far terminals).
11-12 MAC protocols for GSM and Wireless LAN Discuss about MAC T1:4.1
(IEEE802.11) protocols
13-14 Collision Avoidance :MACA, MACAW Generalize the Collision T1:3.8,4.1
Protocols Avoidance protocols T2:2.5-3.1
15-17 Mobile IP Network Layer :IP and mobile IP Demonstrate about the T1:4.4
network layers, packet delivery and handover mobile IP network Layer
management
18-21 Location management and registration, Describe about the location T1:4.5,4.6,4
tunneling and encapsulation, route optimization, management and .7
DHCP registration
22-24 Mobile transport layer, conventional TCP/IP Explain about the mobile T1:4.9, 6.1
protocols, indirect TCP, snooping TCP transport layer protocols
25-28 Mobile TCP and other transport protocols Summarize about the T1:5.2
mobile TCP
29-32 Database hoarding & caching techniques, C-S Discuss about the database T1:5.1.5.4
computing & adaptation. issues
33-37 Transactional models, query processing, data Explain about the T1:8.1-8.6
recovery process & QoS issues. transactional models
38-41 Data dissemination and synchronization, Describe about the data T1:6.1-6.7
communications asymmetry, classification of dissemination and
data delivery mechanisms, data dissemination synchronization
broadcast model.
42-46 Selective tuning and indexing methods, digital Illustrate about the T1:7.6,7.7
audio and video broadcasting (DAB & DVB). selective tuning and
data synchronization- introduction, software, indexing methods
and protocols.
47-51 Mobile Adhoc networks(MANETs) Interpret the MANETs and T1:10.1-
introduction, applications & challenges of a their applications 10.5
MANET
52-55 Classification of routing algorithms such as Discuss about the routing T1:11.3 DSR, AODV ,DSDV , etc algorithms
56-59 Mobile agents, service discovery and protocols. Explain about the MANET T1:11.3 services
60-61 Protocols and platforms for mobile computing Analyze about the protocols T1:10.6- WAP, Bluetooth, XML, J2ME and platforms 10.13
62-63 Java Card, Palm OS, Windows CE, Symbian Understand various T2:9.1 OS, Linux for Mobile Devices,Android operating systems
X. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:
Course
Program Outcomes
Program Specific
Outcomes
Objectives
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
I H S H H
II S H S H
III H S H H
IV S H H H
V H S H S
VI S H H H
S – Supportive H - Highly Related
XI. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:
Course
Program Outcomes
Program
Specific
Outcomes
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
1 H H H
2 H H H
3 H H S H
S – Supportive H - Highly Related
COMPUTER SCIENCE AND ENGINEERING
ASSIGNMENT
Course Name MOBILE COMPUTING
Course Code A70536
Class IV B. Tech I Semester
Branch Computer Science and Engineering
Year 2016 - 17
Course Faculty Dr.Balarengadurai Prof
OBJECTIVES
To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to
be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of
quality assurance in higher education. The major emphasis of accreditation process is to measure the
outcomes of the program that is being accredited.
In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in
incorporating philosophy of outcome based education in the process of problem solving and career
development. So, all students of the institute should understand the depth and approach of course to be
taught through this question bank, which will enhance learner‟s learning process.
ASSIGNMENT – I & II
S. No
Questi
on
Blooms
Taxonomy
Level
Course
Outcome
UNIT - 1
1 Explain the system architecture of GSM? Understand 2 2 Discuss the mobile, bearer, supplementary and teleservices of
GSM?
Understand 2 3 Define the following
Fixed and wired
Mobile and wired
Fixed and wireless
Mobile and wireless
Knowledge 1
4 Define mobile computing. Discuss the two kinds of mobility? Knowledge 1 5 Explain the different mobile applications? Understand 1 6 Discuss the types of handover and services available in GSM? Understand 3 7 Explain the GPRS architecture reference model? Understand 3 8 Describe DECT system functions, architecture and protocols? Knowledge 3 9 Describe various protocols used in WLL and Explain the services? Knowledge 3
10 Explain about High-Speed circuit switched data? Understand 3 UNIT – II
1 Explain about MAC Layer? Understand 2 2 Distinguish between classical and slotted aloha multiple access
techniques?
Understand 2
3 Compare and contrast SDMA,TDMA,FDMA and CDMA
techniques?
Understand 3 4 Explain the following problems of wireless transmission?
i. Exposed terminal and hidden terminal ii .Near and far terminals
Understand 2
5 Describe about TDMA .How does the near/far effect influence
TDMA systems?
Knowledge 3
6 Discuss in detail about MACA? Understand 2 7 Explain about CDMA systems? Understand 2 8 Compare CSMA, DAMA, ISMA and PRMA techniques? Understand 2 9 Discuss briefly about SAMA? Understand 2
10 Define multiplexing and Explain about the different kinds of
multiplexing? Techniques?
Knowledge 3
11 Define the following
I .Mobile and corresponding nodes
Home and foreign networks
Home and foreign agents
Care-Of-address and its variants.
Knowledge 3
12 Explain with neat diagram of Agent advertisement packet of
mobile IP?
Understand 3 13 List all the requirements for a mobile IP? Knowledge 3 14 Describe the methods of tunneling and encapsulation in mobile IP? Knowledge 3 15 Write a note on route optimization in mobile IP? Understand 2 16 Explain with the help of a neat sketch how packet delivery takes
place to and from the mobile node?
Understand 3
17 Discuss agent solicitation and agent advertisement messages are
needed?
Understand 3 18 Explain the various fields of registration request packet of mobile
IP?
Understand 2 19 Describe about DHCP? Knowledge 3 20 Explain IP-in-IP encapsulation? Understand 3
UNIT -III
1 Discuss how traditional TCP cannot be used in mobile network? Understand 3 2 Explain the indirect TCP? Understand 3 3 Distinguish between snooping TCP and Mobile TCP? Understand 2 4 Compare different TCP enhancements? Understand 2 5 Explain in detail classical enhancements to TCP for mobility? Understand 2 6 Explain about mobile TCP? Understand 2 7 Discuss congestion control in traditional TCP and Explain the
concepts of slow start and congestion threshold?
Understand 2
8 Explain the working of transaction-oriented TCP? Understand 3 9 Discuss in detail about the selective retransmission technique in
TCP?
Understand 3 10 Explain the mechanism of fast retransmit/fast recovery in TCP and
transmission/time-out freezing in TCP?
Understand 3
11 Describe hoarding techniques? Knowledge 3 12 Explain about caching invalidation mechanisms? Understand 3 13 Define the following
Cache access protocols
Prefetching
Knowledge 2
14 Discuss data cache and web cache maintenance in mobile
environments?
Understand 2 15 Explain in detail about the client-server computing with
adaptation?
Understand 2 16 Discuss the transactional model of database? Understand 2 17 Explain the Query processing of database? Understand 2 18 Define quality of service and Explain the issues ensuring of QOS
in mobile environment?
Knowledge 2
19 Explain the process of data recovery? Understand 3 20 Define transaction and Explain the ACID properties associated
with database transaction?
Knowledge 2
UNIT-IV
1 Explain the communication asymmetry that arises in data-
dissemination?
Understand 3 2 Distinguish between push-based and pull-based mechanism of
data dissemination?
Understand 3
3 Explain about Selective tuning and indexing techniques in mobile
computing?
Understand 3
4 Explain in detail about the hybrid push-pull based data delivery
mechanism?
Understand 3
5 Discuss briefly about Directory method and Hash-based methods
of selective tuning and indexing?
Understand 3
6 Define indexing and Explain various types of indexing techniques? Knowledge 3 7 Discuss temporal addressing, broadcast addressing and use of
header selective tuning indexing techniques?
Understand 3
8 Explain the following i .index-based method
i .Distributed index-based method ii .Flexible indexing method
Understand 3
9 Explain about Data Dissemination Broadcast Models? Understand
3 10 Discuss about Data synchronization? Understand 2 UNIT-V
1 Discuss briefly about MANETs? Understand 2 2 Explain about cellular networks and adhoc wireless networks? Understand 2 3 Discuss the challenges /issues faced by mobile ad hoc networks? Understand 2 4 List and Explain the properties of mobile ad hoc networks? Knowledge 2 5 Explain routing algorithms based on the variations in network
topology?
Understand 3 6 Explain about different categories of routing protocols? Understand 3 7 Define the following I.AODV routing ii.DSR
iii.TORA IV.ABR.
Knowledge 3
8 Describe ZRP hybrid routing protocols in MANETs? Knowledge 3 9 Discuss the security issues in MANET? Understand 3
10 Explain about Mobile Agents and Service Discovery? Understand 3 11 Discuss the role of WAP forum in wireless web accessing? Understand 3 12 Define WAP and Explain its characteristics? Knowledge 2 13 Explain the architecture of wireless application protocol? Understand 2 14 Discuss in detail about the Wireless Datagram protocol? Understand 3 15 Explain about wireless transport layer security? Understand 2 16 Explain wireless session protocol of the session layer? Understand 3 17 Discuss the origin of Bluetooth technology and five criteria
satisfied by it?
Understand 3 18 Describe the physical layer of Bluetooth? Knowledge 3 19 Explain about LMP and L2CAP protocol in Bluetooth? Understand 2 20 Discuss the configuration and profile of J2ME in detail? Understand 3
COMPUTER SCIENCE AND ENGINEERING
TUTORIAL QUESTION BANK
Course Name MOBILE COMPUTING
Course Code A70536
Class IV B. Tech I Semester
Branch Computer Science and Engineering
Year 2016 – 17
Course Faculty Dr.Balarengadurai Prof
OBJECTIVES:
To meet the challenge of ensuring excellence in engineering education, the issue of quality
needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the
principal means of quality assurance in higher education. The major emphasis of accreditation
process is to measure the outcomes of the program that is being accredited.
In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a
lead in incorporating philosophy of outcome based education in the process of problem solving
and career development. So, all students of the institute should understand the depth and
approach of course to be taught through this question bank, which will enhance learner‟s
learning process.
S. No.
Questions
Bloom’s
Taxonomy
Level
Course
Outcome
UNIT-I
Part - A (Short Answer Questions)
1 Define wireless communication? Knowledg
e
1 2 Explain the uses of wireless Technology? Understan
d
1 3 Define CDMA? Knowledg
e
2 4 Explain how is localization done in GSM are reflected in the
database? Understan
d
3 5 Define a signal? Knowledg
e
1 6 Explain polarization? Understan
d
3 7 State the challenges in wireless communication? Knowledg
e
3 8 State the types of multiplexing? Knowledg
e
3 9 Explain advantages and disadvantages of CDMA? Understan
d
1 10 Explain the type of wireless networks? Understan
d
3 11 State some limitations of mobile computing? Understan
d
3 12 Define a terms GSM and GPRS? Knowledg
e
3 13 Define Ad hoc Networks? Knowledg
e
1 14 Define function of AuC? Knowledg
e
2
15 Explain the types of multiplexing? Understand 3
16 Define FDD? Knowledge 1 17 Define the types of antenna? Knowledge 3 18 Define SDMA? Knowledge 1 19 Describe several versions in CSMA? Understand 3 20 Describe two sub layers in DLC. Understand 2
Part - B (Long Answer Questions) 1 Define the process of call handover when a mobile station moves? Knowledge 3 2 Explain functioning of a cellular network. How the given set of
frequencies are used to increase capacity of a network?
Understand 3
3 Explain how interconnected mobile services switching centers
enable a mobile station to communicate to another over long
distance?
Understand 1
4 Describe the functioning of a smartcard. Why is secured hardware
and software required for a smartcard?
Understand 3
5 Show the various subsystems and units in the GSM system
architecture. How do these subsystems and units differ from those in
GPRS?
Understand 2
6 Explain using schematic diagrams the synchronous, asynchronous,
and synchronous packet types of data transfer?
Understand 3
7 Explain the working of a sensor-actuator pair by giving an example? Understand 3
8 Discuss the advantage and disadvantage of cellular system with
small cells?
Understand 3
9 Explain FDMA in detail? Understand 2
10 Discuss SDMA in detail? Understand 2
11 Explain the various applications of mobile computing? Understand 2
12
Explain Why do MAC scheme in wired network fail in wireless
networks and how does the multiple access with collision avoidance
(MACA) scheme work?
Understand
3
13 Explain the architecture of GSM with a neat diagram? Understand 2
14 Explain How is routing carried out in GSM networks? Understand 2
15
Explain in detail about
Mobile Terminated Call
Mobile Originated Call With suitable diagrams?
Understand
2
16 List the various handovers carried out in GSM and Explain any one
of them in detail?
Knowledge 2
17 Explain How is Mobility Management done in GSM ? Understand 2
18 Explain in detail about the General Packet Radio Service (GPRS)? Understand 3
Part - C (Problem Solving and Critical Thinking Questions)
1
Discover the current numbers of subscribers for the different
systems. As mobile communication boom, no printed number is
valid for too long?
Apply
3
2 Check out strategies of different network operators while migrating
towards third generations systems. Why is a single common system
not in sight?
Evaluate
3
3 Explain how will the next generation of wireless systems be
different from the 3G technologies?
Apply 3
4 Briefly Explain why security mechanisms are becoming increasingly
important in wireless networks?
Apply 3
5 Explain why the international availability of the same ISM bands is
important?
Apply 3
6
Explain why, typically is digital modulation not enough for radio
transmission. What are general goals for digital modulation. What
are typical schemes?
Apply
3
7
Assume all stations can hear all other stations. One station has to
transmit and senses the carrier idle. Why can a collision still occur
after the transmission?
Apply
3
8 Explain the term interference in the space,time,frequency, and code
domain?
Understand 2
9 Consider duplex channels, what are the alternatives for
implementation in wireless networks? What about typical wired
networks?
Apply 2
10
Recall the problem of hidden and exposed terminals . What happens
in the case of such terminals if Aloha,slotted aloha, reservation
Aloha, or MACA is used?
Apply
3
11 Explain how are guard spaces realized between users in CDMA? Understand 2
UNIT – II
Part - A (Short Answer Questions)
1 Analyze the problems of Wireless Transmission? Apply 2 2 List the Services of GSM? Knowledge 3 3 Explain the different types of Satellite Orbits? Understand 2 4 Explain how the Is IEEE 802.11 and Wi Fi same/ State the purpose
of WiFi?
Understand 2
5 Define handover? Knowledge 2 6 Describe the definition for GPRS? Knowledge 1 7 Define DAB? Knowledge 3 8 Define WAP architecture? Knowledge 3 9 Define multipath effects and interference? Knowledge 3
10 List the process of DAB center? Knowledge 2 11 Explain about DVB container? Understand 2 12 List the registers maintained by the gateway of satellite? Knowledge 2 13 State the primary goal of IEE 802.11? Knowledge 2 15 Explain Why generic routing encapsulation is used? Understand 3 16 Explain Advantages of wireless LAN? Understand 3 17 Explain the need for mobile IP? Understand 3 18 List down the goals of wireless LAN? Knowledge 2 19 List the requirements of mobile IP? Knowledge 2 20 Explain the design goals of mobile IP? Understand 3 21 Explain the term mobile node? Understand 3 22 Explain about IP packet delivery? Understand 2 23 Discuss about agent discovery? Understand 3 24 Describe about Tunneling? Understand 3 25 Explain about encapsulation? Understand 2
Part - B (Long Answer Questions)
1 List the frequency bands and number of sub-carriers or carriers in a
CDMA2000 system?
Knowledge 2
2
Define the FHSS frequency-hopping technique. How does it help in
receiving signals in the presence of frequency selective fading of the
signals?
Knowledge
1
3 List the basic features of CDMA systems. Explain soft handover? Knowledge 2
4
Explain how space, time, frequency, and code division methods
control the simultaneous access to the medium by multiple source or
channels of mobile terminals and base transceivers?
Understand
3
5 Expain the functions of IS-95 processing units for convolution,
symbol repetition, interleaving, long code sequence generator?
Analyze 3
6 Explain the use of multiple carriers by orthogonal coding. How does
an OFDMA system differ from a CDMA system?
Analyze 3
7 Analyze the recommended standards in IMT-2000? Analyze 2
8 Compare the features of HSPA and LTE pre 4G? Understand 3 9 Describe forward-and reverse link structure and frames in IS-95? Understand 3
10 Explain in detail the three phases of EY-NMPA in Hiperlan? Understand 2 11 List the various information bases in Hiperlan and Explain the same? Knowledge 2 12 Discuss the architecture of Bluetooth in detail? Understand 2 13 Explain the architecture of WI FI in detail? Understand 3 14 Explain the architecture of WIMAX in detail? Understand 3 15 Describe Hiperlan architecture with suitable diagrams? Understand 3 16 List out the various MAC management services and Explain any 2
of them in detail?
Knowledge 3
17 Draw the MAC frame format and Explain its various fields in detail? Knowledge 2 18 Explain DFWMAC-DCF using CSMA /CA? Understand 3 19 Explain DFWMAC-DCF with polling? Understand 2 20 Explain mobile TCP. How does supervisory host send TCP packets
to the mobile node and to a fixed TCP connection? Give the
advantages and disadvantages of mobile TCP?
Understand
2
21 Explain IP sec suite of protocols? Understand 3 22 Describe the explicit notification schemes. What are the changes
required at the receiver and the transmitter to enable explicit
notifications?
Understand 3
6 23 Describe slow start of congestion control. How can fast recovery
takes place in the congestion avoidance phase.?
Understand 2
24 Explain the difference between the connection less and connection
oriented protocols. Give Examples.?
Understand 3
25 Explain how registration of a Mobile Node is carried out with
appropriate request and reply packet formats?
Understand 3
26 Explain how
End to End packet delivery is done in mobile IP?
Agent advertisement is done in mobile IP?
Understand
2
27 Explain five layers in the IP protocol? Explain the functions of each
layer?
Understand 3
28 Explain in detail about the IP in IP and minimal encapsulations? Understand 2
29 Explain in detail about GRE encapsulation with the appropriate
packet format?
Understand 3
30 Describe the process of optimization in Mobile IP with a suitable
timeline diagram?
Understand 2
31 Explain in detail about DHCP? Understand 3 32 Discuss DSDV routing in detail? Understand 3 33 Discuss DSR routing in detail? Understand 2 34 Explain Why is conventional routing in wired networks not suitable
for wireless networks? Substantiate your answers with suitable
examples?
Understand 3
35 Explain How is multicast routing carried out in ad-hoc networks? Understand 2 Part - C (Problem Solving and Critical Thinking Questions)
1 Explain the typical data rates in DECT. How are they achieved
considering the TDMA frames?
Understand 3
2 Explain multiplexing schemes that are applied in DECT and for
what purpose?
Understand 2
3 Explain the new infrastructure needed for GPRS, but not for
HSCSD? Which components are new and what their purpose?
Understand 3
4 Compare the complexity of DECT with that of GSM? Apply 2 5 Name basic applications for satellite communication and describe
the trends?
Apply 2
6 Discuss the concept of handover in connection with the satellite
communication system?
Apply 2
7 Describe indirect TCP. Explain the modifications in indirect TCP as
the selective repeat protocol and mobile end transport protocol?
Apply
3 8 Explain the characteristics do the different orbits have? What are
their pros and cons?
Understand 3
9 List the basic features of CDMA systems. Explain soft handover? Apply 3 10 Write the general problems of satellite signals travelling from a
satellite to a receiver?
Apply 3
UNIT-III
Part - A (Short Answer Questions)
1 State the functions which support service and connection control? Knowledge 3 2 List the three Low Power States provided by Bluetooth? Knowledge 2 3 Explain How user datagram protocol is used? Understand 2 4 Define COA? Knowledge 2 5 Explain different types of handover? Understand 1 6 Explain Advantage and Disadvantage of Mobile TCP? Understand 3 7 Define Transparency? Knowledge 2 8 Show the indirect TCP model with neat diagram? Understand 2 9 Translate other methods of mobile TCP layers? Understand 2
10 Explain about traditional TCP? Understand 2 11 Discuss about congestion control? Understand 3 12 Describe slow start? Understand 3 13 Explain about indirect TCP? Understand 3 14 List advantages of Indirect TCP? Knowledge 3 15 Describe the term snooping TCP? Understand 3 16 Discuss about mobile TCP? Understand 2 17 List the advantages of mobile TCP? Knowledge 2 18 Explain selective retransmission? Understand 2 19 Define generic routing encapsulation? Knowledge 2 20 Discuss about binding request? Understand 2 21 Define the need of routing? Knowledge 2 22 List the requirements for the development of mobile IP standard? Knowledge 3 23 List database transactional models? Knowledge 3 24 Define Perfecting? Knowledge 3 25 List database hoarding techniques? Knowledge 3 26 Explain the mobile node? Understand 3 27 Discuss about the data recovery process? Understand 2 28 Explain need of routing? Understand 3 29 Describe data caching? Understand 2 30 Describe about client server computing? Understand 3 31 List the transaction models? Knowledge 2 32 Discuss about query processing? Understand 2 33 Explain about data recovery process? Understand 3 34 Explain three-tier architecture? Understand 2 35 Define Quality of Service? Knowledge 2 36 List advantages of hoarding the data at mobile device? Knowledge 2
Part - B (Long Answer Questions) 1 Explain the sequence number, window size, and acknowledgement
number fields used in data flow control at TCP transport layer?
Understand 2
2 List the special requirements in transport layer protocols in case of
2.5G/3G mobile networks.?
Knowledge 3
3 Explain fast transmission and fast recovery triggered? Understand 2 4 Explain mobile TCP. How does a supervisory host send TCP
packets to the mobile node and to a fixed connection?
Understand 2
5 Explain transaction oriented TCP. How does the integration of
connection establishment, data transfer, and close functions?
Understand 3
6 Describe the special requirements in transport layer protocols in case
of 2.5G networks?
Understand 2
7 Describe slow start of congestion control. How can fast recovery
takes place in the congestion avoidance phase?
Understand 3
8 Explain the functions of snooping sub layer in the functions? Understand 2 9 List the advantages and disadvantages of snooping TCP? Knowledge 2
10 Describe the modifications in snooping sub-layer functions? Understand 3 11 Write about special requirements in transport layer? Understand 3 12 Explain in detail about WAP architecture? Understand 3
13 Write notes on WDP and WTLS? Understand 3
14 Write notes on wireless sessions protocol? Understand 3 15 Discuss about WAE? Understand 3 16 Discuss about WTP and its classes? Understand 2 17 Explain the following: Snooping TCP and Indirect TCP.? Understand 3 18 Explain classical TCP improvements and snooping TCP? Understand 2 19 Discuss about the WWW programming model in detail? Understand 3 20 Explain about the architecture of WTA? Understand 3 21 Explain the situations in which a database can crush. How does a
database recover using a recovery manager?
database recover using a recovery manager.?database recover using a
recovery manager.?database recover using a recovery manager.?
database recover using a recovery manager.?
Understand 2
22 Discuss in detail about any two Pervasive Applications of your
choice in detail.?
Understand 3
23 Explain about the various hardware components involved in
Pervasive Computing Devices.?
Understand 1
24 Write the advantages of hoarding data at the mobile device? Understand 3 25 Write brief notes on the following.
Speech Recognition
Handwriting recognition
Haptic Interfaces
QWERTY and FITALY keyboards?
3
4
26 Explain in detail about Bio-Metrics. List out its merits and
demerits?
Understand 3
27 Explain how is synchronization carried out in a Pervasive
Environment? Write brief notes on the syncML tool?
Understand 2
28 Explain the various issues related to device management and how
are they dealt with?
Understand 2
29 Explain how a Pervasive Web Application can be secured using an
„Authentication Proxy‟?
Understand 2
30 Describe data caching architecture? Understand 2 31 Explain how security is achieved in MVC and JSP based
applications?
Understand 2 32 Write the advantages and disadvantages of stateless and stateful
cache invalidation?
Understand 3
33 Discuss in detail about the access form PCs.? Understand 2 34 Explain the advantages of using an adaption mechanism in client-
server architecture.?
Understand 3
35 Explain how is access carried out in case of a PDA? Understand 2 36 Explain in detail about access via WAP? Understand 2
37 Explain the database transaction models and ACID rules? Understand 2 38 Explain data recovery process in detail? Understand 3 39 Explain about power aware computing? Understand 3
Part - C (Problem Solving and Critical Thinking Questions)
1
Explain 2G and 3G systems can bothe transfer data. Compare these
approaches with DAB/DVB and list reasons for and against the use
of DAB/DVB?
Understand
3
2 Explain which web pages would be appropriate for distribution via
DAB/DVB?
Understand 2
3 Define IEEE 802.11, Hiper LAN2, and Bluetooth respectively. Solve
the hidden and terminal problem?
Apply 2
4 Discuss in what solutions can collisions occur in all three networks? Understand 3
5 Distinguish between collisions on PHY and MAC layer? Apply 3
6 If Bluetooth is a commericial success , what are remaining reasons
for the use of infrared transmission for WLANs?
Apply 3
7 Explain packet flow if two mobile nodes communicate and both are
in foreign networks?
Understand 3
8 Explain how tunneling works in general and especially for mobile
IP using IP-in-IP minimal, and generic routing encapsulation,
respectively?
Understand 2
9 Explain the benefits of location information for routing in ad-hoc
networks, which problems arise?
Understand 3
10 List the entities of mobile IP and describe data transfer from a
mobile node to a fixed node and vice-versa. Why and where is
encapsulation needed?
Knowledge
1 11 Name the main difference between multi-hop adhoc networks and
other networks?
Apply 3
UNIT – IV
Part - A (Short Answer Questions)
1 Explain about Push- based data delivery mechanisms? Understand 1 2 Explain about Selective Tuning? Understand 3 3 Define Hash-based method? Knowledge 2 4 Define local optimization? Knowledge 2 5 Define Directory method? Knowledge 2 6 List the various types of indexing techniques? Knowledge 3 7 Define data dissemination broadcast models? Knowledge 3 8 Define data dissemination broadcast models? Knowledge 2 9 Explain flat disk model? Understand 3
10 Explain directory method? Understand 3 11 Explain about communications asymmetry? Understand 2 12 List advantages of pull based mechanisms? Knowledge 2 13 Explain about hybrid mechanisms? Understand 2 14 Discuss about hash based mechanisms? Understand 3 15 Explain about index based mechanisms? Understand 2 16 Write about communication asymmetry? Understand 2 17 Explain temporal addressing? Understand 3 18 Explain about data delivery methods? Understand 2 19 Explain about demand data scheduling? Understand 2 20 Explain distributed index based method? Understand 2
Part - B (Long Answer Questions) 1 Explain with diagram client and server framework? Understand 3 2 Explain different types of synchronization? Understand 2
3 Explain the need for domain-dependent specific rules. Explain the
term WBXML?
Understand 3
4 Explain digital audio broadcasting..? Understand 3 5 Describe pull-based data delivery mechanism. What are the
advantages and disadvantages of pull-based data delivery?
Understand 3
6 Explain push based data delivery methods in detail? Understand 3 7 Explain selective tuning and indexing techniques? Understand 3 8 Write about communication asymmetry with neat diagram? 3 9 Explain push-pull mechanism. In detail Explain about IPP? Understand 3
10 Which type of indexing is suitable for broad casting data through
wireless channel? Why?
Understand 2
11 List out the advantages of data broad cast over point to point access? Knowledge 3
12
Explain the following selective tuning techniques.
Temporal addressing.
Broadcast addressing
Index based method.
Distributed index based method?
Understand
3
13 Explain data delivery methods in detail? Understand 3 14 The push based broadcast are not suitable for large data size?
Justify.
Analyze 2 15 Explain about on demand data scheduling? Understand 3 16 List the steps involved in retrieving the indexed data frames? Knowledge 3
Part - C (Problem Solving and Critical Thinking Questions) 1 Show the interaction of mobile IP with standard TCP. Draw the
packet flow from a fixed host to a mobile host?
Apply 3
2 Name the requriments for a mobile IP and justify them. Does mobile
IP fulfill them all?
Apply 3
3 List the entities of mobile IP and describe data transfer from a
mobile node to a fixed node and vice versa?
Knowledge 2
4 Show the steps required for a handover from one foreign agent to
another foreign agent including layer 2 and layer3?
Apply 3
5
Explain packet flow if two mobile nodes communicate and both are
in networks. What additional routes do packets take if reverse
tunneling is required?
Understand
3 UNIT-V
Part - A (Short Answer Questions)
1 Mention the sensor networks applications? Understand 2 2 List the properties of MANETs? Knowledge 2 3 Explain fixed infrastructure architecture? Understand 3 4 Define spectrum? Knowledge 3 5 Define applications of MANETs? Knowledge 3 6 Define routing algorithms? Knowledge 1 7 Explain wireless sensor networks? Understand 1 8 Analyze distributed network characteristics? Understand 2 9 Explain flat routing table driven protocol? Understand 3
10 List the characteristics of MANETs? Knowledge 3 11 Explain the need for Ad Hoc networks? Understand 2 12 Explain routing in MANETs? Understand 2 13 List the types of MANET routing algorithms? Knowledge 2 14 Explain DSDV? Understand 2 15 Discuss about dynamic source routing? Understand 2 16 List the advantages in DSR? Knowledge 2 17 Explain CGSR? Understand 1 18 Discuss about security in MANETs? Understand 2
19 Explain memory and file management? Understand 1 20 Describe java card? Understand 2 21 Write the techniques for composing applications? Understand 2 22 Explain about operating systems? Understand 2 23 Show that an XML document which can be used as Contacts in a
mobile smart phone?
Understand 3
24 Identify the I/O devices in subsystems management? Understand 2 25 Mention the properties in windows phone 7 OS features? Understand 3 26 Explain how does data store in windows CE databases and files? Understand 2 27 Explain how are the applications developed for a windows phone 7
device?
Understand 2
28 Explain memory manager features in Windows CE? Understand 1 29 Write the functions of program and storage memories? Understand 1 30 Define symbian OS? Understand 1
Part - B (Long Answer Questions)
1 Write about the application of wireless sensor networks in home
personal area networking?
Understand 2
2 Explain MANETs. How does a MANETs differ from a fixed
infrastructure network?
Understand 1
3 Describe an application of defining the cluster of nodes and features
of CGSR protocol.
Understand 3
4 Explain how MANETs are deployed in various applications? Understand 1 5 Describe the properties of MANETs? Understand 3 6 Explain the requirements of a mobile file system over the
conventional one?
Understand 3
7 Write the advantages of MANETs and wireless sensor networks
integrated with IPv6?
Understand 1
8 Explain in role of a gateway in connecting using different protocols
?
Understand 3 9 Discuss CODA file system? Understand 2
10 Describe TORA. Compare the features of TORA with DSR and
AODV protocols?
Understand 2
11 Compare the reactive and proactive routing protocols? Understand 2
12
How does dynamic source routing handle routing? What is the
motivation behind dynamic source routing compared to other routing
algorithms fixed networks?
Understand 2
5 13 Explain the security threats to a MANET? Why a MANET faces
grater security threats than a fixed infrastructure networks?
Understand 1
14 Describe security problems in MANETs? Understand 3 15 Explain destination sequence distance vector routing algorithm in
MANETs?
Understand 2
16 Explain in detail AODV routing algorithm for MANETS? Understand 2 17 Explain the disadvantages of MANETS? Understand 1 18 Explain mobile ad-hoc network? Explain in detail about MANETS? Understand
3
19 Explain CLDC and CDC configurations? Understand 2 20 Explain J2ME architecture? Understand 2 21 Write the packages in J2SE? Explain the APIs and class libraries in
each?
Understand 2
22 Compare DOM and SAX models of the documents. How are these
parsed? Explain with examples?
Understand 2
23 Write requirements for JAvaCard virtual machine? Knowledge 2
24 Explain XML based languages used in mobile application? Give
examples?
Understand 2
Prepared by HOD
Part - C (Problem Solving and Critical Thinking Questions)
1
Name mechanisms to improve web access for handheld devices.
What is their common problem and what led finally to the
development of WAP?
Evaluate
2
2 Compare the presented protocol stacks for WAP 2.0 and give
application examples?
Apply 2
3 Name advantages and disadvantages of user acknowledgement in
WTP. What are typical applications for both cases?
Apply 2
4 Explain the primary goals of WAP Forum efforts and how they are
reflected in the intial WAP protocol architecture?
Understand 3
5 Explain why is strong consistency of file systems problematic in a
wireless and mobile environment? What are the alternatives?
Understand 1
6
Name key difference between WAP 1.x and i-mode. What were
problems in the early WAP days and why was i-mode that successful
in Japan?
Apply
2
top related