anna university of technology madurai ...autmdu.ac.in/syllabus/computerscienceengineeringpt.pdfrole...
TRANSCRIPT
ANNA UNIVERSITY OF TECHNOLOGY MADURAI MADURAI 625 002
REGULATIONS 2010
CURRICULUM AND SYLLABI
M.E. – COMPUTER SCIENCE AND ENGINEERING
SEMESTER III
SEMESTER IV
S.NO COURSE
CODE COURSE TITLE L T P
C
THEORY
1 10244CS201 Advanced Distributed Computing 3 0 0 3
2 10244CS202 Soft Computing and Simulators 3 0 0 3
3 10244CS203 Computer Network Security 3 0 0 3
PRACTICAL
4 10244CS208 Soft Computing & Network Security Laboratory
0 0 3 2
S.NO COURSE
CODE COURSE TITLE L T P
C
THEORY
1 10244CS204 Compiler Design 3 0 0 3
2 E02 Elective II 3 0 0 3
3 E03 Elective III 3 0 0 3
PRACTICAL
4 10244CS207 Compiler Laboratory 0 0 3 2
SEMESTER V
SEMESTER VI
S.NO COURSE
CODE COURSE TITLE L T P
C
1 10244CS301 Virtualization and Cloud
Computing 3 0 0 3
2 E04 Elective IV 3 0 0 3
3 E05 Elective V 3 0 0 3
PRACTICAL
4 10244CS304 Project Thesis – Phase I 0 0 0 5
TOTAL 14
S.NO COURSE
CODE COURSE TITLE L T P
C
PRACTICAL 1 10244CS401 Project Thesis – Phase II 0 0 0 12
TOTAL 12
List of Electives
S.NO COURSE
CODE COURSE TITLE L T P
C
ELECTIVE II (E02)
10244CSE21 Open Source Systems 3 0 0 3
10244CSE22 Software Project Management 3 0 0 3
10244CSE23 XML & Web Services 3 0 0 3
10244CSE24 Middleware technologies 3 0 0 3
10244CSE25 Parallel computing and Multicore
technologies 3 0 0 3
ELECTIVE III (E03)
10244CSE31 Mobile Technologies 3 0 0 3
10244CSE32 Software reliability and project
management 3 0 0 3
10244CSE33 E:Commerce 3 0 0 3
10244CSE34 Real time systems 3 0 0 3
10244CSE35 Network System Design Using
Network Processor 3 0 0 3
ELECTIVE IV (E04)
10244CSE41 Embedded Systems 3 0 0 3
10244CSE42 Operation research 3 0 0 3
10244CSE43 Adhoc Networks 3 0 0 3
10244CSE44 Bioinformatics 3 0 0 3
10244CSE45 Recent trends in Mobile computing
3 0 0 3
10244CSE46 Semantic Web 3 0 0 3
ELECTIVE V (E05)
10244CSE51 Data Warehousing and Data
Mining 3 0 0 3
10244CSE52 Agent based intelligent Systems 3 0 0 3
10244CSE53 High speed networks 3 0 0 3
10244CSE54 Decision support systems 3 0 0 3
10244CSE55 Fault tolerant systems 3 0 0 3
10244CSE56 Grid Computing 3 0 0 3
10244CSE57 Wireless Sensor networks 3 0 0 3
10244CS201 ADVANCED DISTRIBUTED COMPUTING
L T P C
3 0 0 3
UNIT I FUNDAMENTALS 9
Characterization of Distributed Systems – Examples – Resource Sharing and the Web –
Challenges – System Models – Architectural and Fundamental Models –Interprocess
Communication – The API for the Internet Protocols – External Data Representation and
Marshalling – Client–Server Communication – Group Communication – Case Study –
Distributed Objects and Remote Invocation – Communication between Distributed Objects –
Remote Procedure Call – Events and Notifications – Java RMI – Case Study.
UNIT II OPERATING SYSTEM ISSUES I 9
The OS Layer – Protection – Processes and Threads – Communication and Invocation – OS
Architecture – Security – Overview – Cryptographic Algorithms – Digital Signatures –
Cryptography Pragmatics – Case Studies – Distributed File Systems – File Service Architecture–
Sun Network File System – The Andrew File System.
UNIT III OPERATING SYSTEM ISSUES II 9
Name Services – Domain Name System – Directory and Discovery Services – Global Name
Service – X.500 Directory Service – Clocks – Events and Process States – Synchronizing
Physical Clocks – Logical Time and Logical Clocks – Global States – Distributed Debugging –
Distributed Mutual Exclusion – Elections – Multicast Communication Related Problems.
UNIT IV DISTRIBUTED TRANSACTION PROCESSING 9
Transactions – Nested Transactions – Locks – Optimistic Concurrency Control – Timestamp
Ordering – Comparison – Flat and Nested Distributed Transactions – Atomic Commit Protocols
–Concurrency Control in Distributed Transactions – Distributed Deadlocks – Transaction
Recovery –Overview of Replication and Distributed Multimedia Systems.
UNIT V PARALLEL PROGRAMMING USING MPI 9
Parallel Architectures : Parallel Algorithm Design : Message:Passing Programming :
Shared:memory Programming : Combining MPI and OpenMP : Matrix Multiplication
Total: 45
REFERENCES:
1. George Coulouris, Jean Dollimore and Tim Kindberg, ―Distributed Systems Concepts
and Design‖, Pearson Education, 3rd Edition, 2002.
2. Sape Mullender, ―Distributed Systems‖, Addison Wesley, 2nd Edition, 1993.
3. Albert Fleishman, ―Distributed Systems Software Design and Implementation‖, Springer
Verlag, 1994.
4. M. L .Liu, ―Distributed Computing Principles and Applications‖, Pearson Education,
2004.
5. Andrew S Tanenbaum, Maartenvan Steen, ―Distributed Systems, Principles and
Pardigms‖, Pearson Education, 2002.
6. Mukesh Singhal, Niranjan G Shivaratri, ―Advanced Concepts in Operating Systems‖,
Tata McGraw Hill Edition, 2001.
7. Michael Quinn, ―Parallel Programming In C With Mpi And Open Mp‖, Tata Mcgraw
Hill, 2003
10244CS202 SOFT COMPUTING AND SIMULATORS
L T P C
3 0 0 3
UNIT I INTRODUCTION TO SOFT COMPUTING AND NEURAL NETWORKS 9
Evolution of Computing : Soft Computing Constituents – From Conventional AI to Computational Intelligence : Machine Learning Basics
UNIT II FUZZY LOGIC 9
Fuzzy Sets – Operations on Fuzzy Sets – Fuzzy Relations – Membership Functions: Fuzzy Rules
and Fuzzy Reasoning – Fuzzy Inference Systems – Fuzzy Expert Systems – Fuzzy Decision Making.
UNIT III NEURAL NETWORKS 9
Machine Learning Using Neural Network, Adaptive Networks – Feed forward Networks –
Supervised Learning Neural Networks – Radial Basis Function Networks : Reinforcement
Learning – Unsupervised Learning Neural Networks – Adaptive Resonance architectures –
Advances in Neural networks.
UNIT IV GENETIC ALGORITHMS 9
Introduction to Genetic Algorithms (GA) – Applications of GA in Machine Learning : Machine
Learning Approach to Knowledge Acquisition.
UNIT V MATLAB 9
Introduction to Matlab – Matlab Workspace – Arrays and array operations – Functions and Files
– Study of neural network toolbox and fuzzy logic toolbox – Simple implementation of Artificial Neural Network and Fuzzy Logic.
TOTAL : 45
REFERENCES:
1. Jyh:Shing Roger Jang, Chuen:Tsai Sun, Eiji Mizutani, ―Neuro:Fuzzy and Soft
Computing‖, Prentice:Hall of India, 2003.
2. George J. Klir and Bo Yuan, ―Fuzzy Sets and Fuzzy Logic:Theory and Applications‖,
Prentice Hall, 1995.
3. James A. Freeman and David M. Skapura, ―Neural Networks Algorithms, Applications,
and Programming Techniques‖, Pearson Edn., 2003.
4. Melanie Mitchell, ‘An introduction to Genetic Algorithm‘, Prentice:Hall of India, New
Delhi, Edition: 2004
5. S.Rajasekaran and G.A Vijayalakshmi Pai,‘Neural Networks, Fuzzy logic and Genetic
Algorithms, Synthesis and Applications‘, Prentice Hall of India, New Delhi:2003.
6. MATLAB Toolkit Manual
10244CS203 COMPUTER NETWORK SECURITY
L T P C
3 0 0 3
UNIT I FUNDAMENTALS
Introduction – Services, Mechanisms and Attacks, OSI security Architecture – Classical
Encryption Techniques – Stegnography – Block Ciphers and Data Encryption Standard – Block
Cipher Principles : Advanced Encryption Standard – AES Cipher; Contemporary Symmetric
Ciphers: Triple DES, Blowfish, RC5, Characteristics of Advanced Symmetric Block Ciphers,
RC4 Stream Cipher; Confidentiality using Symmetric Encryption: Placement of Encryption
Function, Traffic Confidentiality, Key Distribution, and Random Number Generation.
UNIT II PUBLIC:KEY ENCRYPTION AND HASH FUNCTIONS
Public Key Cryptography and RSA: Principles of Public Key Cryptosystems, RSA Algorithm;
Key Management and other public key cryptosystems: Key Management, Diffie:Hellman Key
Exchange, Elliptic Curve arithmetic, Elliptic Curve Cryptography; Message Authentication and
Hash Functions: Authentication Requirements, Authentication Functions, Message
Authentication Codes, Hash Functions and MACs; Hash Algorithms: MD5 Message Digest
Algorithm; Secure Hash Algorithm, RIPEMD 160, HMAC; Digital Signatures and
Authentication Protocols: Digital Signatures, Authentication Protocols, Digital Signature
Standards.
UNIT III NETWORK SECURITY PRACTICE
Authentication Applications: Kerberos, X.509 Authentication Service; Electronic Mail Security:
Pretty Good Privacy, S/MIME; IP Security: IP Security Overview, IP Security Architecture,
Authentication Header, Encapsulating Security Payload, Combining Security Associations; Web
Security: Web Security Considerations, Secure Sockets Layer and Transport Layer Security,
Secure Electronic Transaction.
UNIT IV SYSTEM SECURITY
Intruders: Intruder Detection, Password Management; Malicious Software: Virus and Related
Threats, Virus Counter Measures; Firewalls: Firewall Design Principles, Trusted Systems.
UNIT V COMPUTER PRIVACY
Privacy at Risk – Privacy at Home – Privacy on the NET – Privacy at Work – Privacy in Public –
Privacy in the Future.
TOTAL:45
REFERENCES
1. William Stallings, ―Cryptography and Network Security‖, 3ed. Prentice Hall of India, New
Delhi ,2004
2. William Stallings, ―Network Security Essentials‖, 2 ed. Prentice Hall of India, New Delhi,
2004
3. Charlie Kaufman , ―Network Security: Private Communication in Public World‖, 2 ed.
Prentice Hall of India, New Delhi ,2004
4. Dan Tynan, Computer Privacy Annoyances, O‘Reilly Media, July 2005
10244CS204 COMPILER DESIGN
L T P C
3 0 0 3
UNIT I LEXICAL ANALYSIS
Compilers – Analysis of Source Program : Phases of Compiler – Compiler Construction Tools –
Role of a Lexical Analyzer – Specification and Recognition of Tokens – Finite Automata –
Regular Expression to Finite Automation.
UNIT II SYNTAX ANALYSIS
Role of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing – LEX
and YACC.
UNIT III INTERMEDIATE CODE GENERATION
Intermediate Languages – Declaration – Assignment Statements – Boolean Expressions – Flow
Control Statements – Back Patching.
UNIT IV CODE OPTIMIZATION
Code Optimization – Principal Sources of Optimization – Basic Blocks and Flow Graphs
Optimization of Basic Blocks – Code Improving Transformations.
UNIT V CODE GENERATION
Issues in the Design of a Code Generator – Run:Time Storage Management – Next Use
Information – A Simple Code Generator – DAG Representation of Basic Blocks – Peephole
Optimization – Code Generation from DAG.
TOTAL:45
REFERENCES
1. A.V. Aho, Ravi Sethi, J. D. Ullman, ―Compilers : Principles, Techniques and Tools‖,
Addison:Wesley Publishing Company, 1988.
2. Allen I. Holub, ―Compiler Design in C‖, Prentice Hall of India, 1993.
3. Fischer Leblanc, ―Crafting Compiler‖, Benjamin Cummings, Menlo Park,1988
10244CS207 COMPILER LABORATORY
1. Implementation of a Lexical Analyser
2. Computation of FIRST and FOLLOW sets
3. Construction of Predictive Parsing Table
4. Implementation of Shift Reduce Parsing
5. Computation of Leading and Trailing Sets
6. Computation of LR(0) items
7. Construction of DAG
8. Intermediate Code Generation
9. Use YACC and LEX to implement a parser for the same grammar as given in problem
10. Implement a recursive descent parser for an expression grammar that generates arithmetic
expressions with digits, + and *. 11. Use LEX tool to implement a lexical analyzer.
12. Write semantic rules to the YACC program in problem 5 and implement a calculator
that takes an expression with digits, + and * and computes and prints its value.
13. Implement the front end of a compiler that generates the three address code for a simple
language with: one data type integer, arithmetic operators, relational operators, variable
declaration statement, one conditional construct, one iterative construct and assignment
statement.
14. Implement the back end of the compiler which takes the three address code generated
in problem 13, and produces the 8086 assembly language instructions that can be
assembled and run using a 8086 assembler. The target assembly instructions can be
simple move, add, sub, jump. Also simple addressing modes are used.
Note: Use ‘C’ compiler to implement 1 – 8 and Lex & Yacc tool for the rest.
10244CS208 SOFT COMPUTING & NETWORK SECURITY LAB
1. Implementation of any two Symmetric Key Algorithms
2. Implement RSA algorithm
3. Analyse the components of a Digital Certificate and Display it.
4. Capture and Analyze the Network traffic using Packet Analyser Tools.
5. Design and Simulate any one Arificial Neural Netwrok using MATLAB
6. Implementation of any one Real Time Problem using GA
7. Design and Simulate any one Real Time Problem using Fuzzy Based Systems.
Note: Use ‘Java / Dot NET’ compiler to implement 1 – 3 and MATLAB tool for 5 – 7
and Wire Shark or any tool for 4.
SEMESTER III
10244CS301 VIRTUALIZATION AND CLOUD COMPUTING
L T P C
3 0 0 3
UNIT I CLOUD COMPUTING
Understanding the Cloud Computing – Cloud Architecture – Cloud Storage – Advantages,
Disadvantages of Cloud Computing – Companies in the Cloud Today – Developing Cloud
Services – Web:Based Application – Pros and Cons of Cloud Service Development – Types of
Cloud Service Development – Software as a Service – Platform as a Service – Web Services –
On:Demand Computing – Discovering Cloud Services Development Services and Tools –
Amazon Ec2 – Google App Engine – IBM Clouds
UNIT II CLOUD COMPUTING FOR EVERYONE
Centralizing Email Communications – Collaborating on Schedules, To:Do Lists, Contact Lists
and Group Projects and Events – Cloud Computing for the Community and Corporation, Using
Cloud Services: Collaborating on Calendars, Schedules and Task Management – Exploring
Online Scheduling Applications, Online Planning and Task Management – Collaborating on
Event Management, Contact Management, Project Management, Word Processing and
Databases – Storing and Sharing Files
UNIT III VIRTUALIZATION & CLOUD COMPUTING *
Virtualization & Cloud Computing Overview – Case Study: Enterprise Virtualization & Cloud
Computing – Definitions – Hypervisor / Virtual Machine Monitor Architecture – CPU
Virtualization Extensions – Network and Storage Virtualization Architecture
UNIT IV VIRTUALIZED ENTERPRISE *
Smashing the Virtualized Stack – Case Study: Owning the Virtualized Enterprise – CPU &
Chipsets – VMM/Hypervisor/Host – VMs/Guest – Control & Management planes & APIs.
UNIT V CLOUD SECURITY AND PRIVACY
Infrastructure security – Data Security and Storage – Identity and access management – Security
management in the cloud – privacy – Security as a cloud service.
TOTAL:45
REFERENCES
1. Michael Miller, Cloud Computing: Web:Based Applications That Change the Way You
Work and Collaborate Online, Que Publishing, August 2008.
2. Christofer Hoff, Rich Mogull, Craig Balding, Hacking Exposed: Virtualization & Cloud
Computing: Secrets & Solutions [Paperback], McGraw:Hill Osborne (20 Jan 2012) *
3. Haley Beard, Cloud Computing Best Practices for Managing and Measuring Processes
for On:demand Computing, Applications and Data Centers in the Cloud with SLAs,
Emereo Pty Limited, July 2008.
4. Tim Mather, Subra Kumaraswamy, Shahed Latif, Cloud Security and Privacy – An
Enterprise Perspective on Risks and Compliance, By O'Reilly Media, 2009
10244CSE11 OBJECT ORIENTED SYSTEMS ENGINEERING
L T P C
3 0 0 3
UNIT I CLASSICAL PARADIGM
System Concepts – Project Organization – Communication – Project Management
UNIT II PROCESS MODELS
Life cycle models – Unified Process – Iterative and Incremental – Workflow – Agile Processes
UNIT III ANALYSIS
Requirements Elicitation – Use Cases – Unified Modeling Language, Tools – Analysis Object
Model (Domain Model) – Analysis Dynamic Models – Non:functional requirements – Analysis
Patterns
UNIT IV DESIGN
System Design, Architecture – Design Principles : Design Patterns – Dynamic Object Modeling
– Static Object Modeling – Interface Specification – Object Constraint Language
UNIT V IMPLEMENTATION, DEPLOYMENT AND MAINTENANCE
Mapping Design (Models) to Code – Testing : Usability – Deployment – Configuration
Management – Maintenance
Total: 45
REFERENCES
1. Bernd Bruegge, Alan H Dutoit, Object:Oriented Software Engineering, 2nd
ed, Pearson
Education, 2004.
2. Craig Larman, Applying UML and Patterns 3rd
ed, Pearson Education, 2005.
3. Stephen Schach, Software Engineering 7th ed, McGraw:Hill, 2007.
4. Ivar Jacobson, Grady Booch, James Rumbaugh, The Unified Software Development
Process, Pearson Education, 1999.
5. Alistair Cockburn, Agile Software Development 2nd
ed, Pearson Education, 2007.
10244CSE12 MULTIMEDIA SYSTEMS
L T P C
3 0 0 3
UNIT I INTRODUCTION AND QOS 9
Introduction:QOS Requirements and Constraints:Concepts:Resources: Establishment
hase:Run:Time Phase:Management Architectures.
UNIT II OPERATING SYSTEMS 9
Real:Time Processing:Scheduling:Interprocess Communication:Memory and anagement:Server
Architecture:Disk Management.
UNIT III FILE SYSTEMS AND NETWORKS 9
Traditional and Multimedia File Systems:Caching Policy:Batching:Piggy backing
thernet:Gigabit Ethernet:Token Ring:100VG AnyLAN:Fiber Distributed Data Interface
(FDDI): ATM Networks:MAN:WAN.
UNIT IV COMMUNICATION 9
Transport Subsystem:Protocol Support for QOS:Transport of Multimedia:Computer upported
Cooperative Work:Architecture:Session Management:MBone Applications.
UNIT V SYNCHRONIZATION 9
Synchronization in Multimedia Systems:Presentation:Synchronization Types:Multimedia
ynchronization Methods:Case Studies:MHEG:MODE:ACME.
Total: 45
REFERENCES
1. Ralf Steinmetz and Klara Nahrstedt, ―Multimedia Systems‖, Springer, I Edition 2004.
2. Ralf Steinmetz and Klara Nahrstedt, Media Coding and Content Processing, Prentice hall,
2002.
3. Vaughan Taeltimedia, Tata McGraw Hill, 1999.
4. Mark J.B., Sandra K.M., Multimedia Applications Development using DVI echnology,
McGraw Hill, 1992.
5. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovacovic, D. A. Milovacovic , ultimedia
Communication Systems: Techniques, Standards, and Networks, Prentice Hall, 1st
Edition, 2002
6. Ze:Nian Li and Mark S. Drew, Fundamentals of Multimedia, Pearson, 2004.
10244CSE13 ADVANCED JAVA TECHNOLOGY
L T P C
3 0 0 3
UNIT I JAVA FUNDAMENTALS 9
Java Virtual Machine – Reflection – I/O Streaming – Filter And Pipe Streams – Byte Codes –
Byte Code : Interpretation – Dynamic Reflexive Classes – Threading – Java Native Interfaces –
GUI Applications.
UNIT II NETWORK PROGRAMMING IN JAVA 9
Stream Customization – Sockets – Secure Sockets – Custom Sockets – UDP Datagrams –
Multicast Sockets – URL Classes – Reading Data From The Server – Writing Data –
Configuring The Connection – Reading The Header – Content Handlers – Telnet Application –
Java Messaging Services.
UNIT III DISTRIBUTED COMPUTING IN JAVA 9
Remote Method Invocation – Activation Models – RMI Custom Sockets – Object Serialization –
Call Back Model – RMI – IIOP Implementation – CORBA – IDL Technology – Naming
Services – CORBA Programming Models – JAR File Creation.
UNIT IV MULTI – TIER APPLICATION DEVELOPMENT 9
Server Side Programming – Servlets – Session Management – Cookies – HTTP Communication
– JDBC – Multimedia Data Handling – Java Media Framework – Enterprise Applications.
UNIT V MOBILE APPLICATION DEVELOPMENT 9
Mobile Information Device Profile – Deployment Of Mobile Objects – Foundation Profile –
RMI Profile For Mobile Devices – Development Of Midlets – Mobile Networking Applications.
TOTAL: 45
REFERENCES
1. Elliotte Rusty Harold, ―Java Network Programming‖, O‘Reilly Publishers, 2000.
2. Cay S.Horstmann, Gary Cornell, ―Core Java, Volume 1 And 2‖, 5th Edition, Pearson
Education Publishers, 2003.
3. Topley, ―J2ME In A Nutshell‖, O‘Reilly Publishers, 2002.
4. Hunt, ―Guide to J2EE Enterprise Java‖, Springer Publications, 2004.
5. Ed Roman, ―Enterprise Java Beans‖, Wiley Publishers, 1998.
6. Avstin, ―Advance Programming For The Java2 Platform‖ ‗Pearson Education, 2001.
10244CME13 DIGITAL IMAGE PROCESSING
L T P C
3 0 0 3
UNIT I DIGITAL IMAGE FUNDAMENTALS
Elements of digital image processing systems, Elements of visual perception, psycho visual
model, brightness, contrast, hue, saturation, mach band effect, Color image fundamentals
:RGB,HSI models, Image acquisition and sampling, Quantization, Image file formats,
Two:dimensional convolution, correlation, and frequency responses.
UNIT II IMAGE TRANSFORMS
1D DFT, 2D transforms – DFT, DCT, Discrete Sine, Walsh, Hadamard, Slant, Haar, KLT, SVD,
Radon, and Wavelet Transform.
UNIT III IMAGE ENHANCEMENT AND RESTORATION
Histogram modification and specification techniques, Noise distributions, Spatial averaging,
Directional Smoothing, Median, Geometric mean, Harmonic mean, Contra harmonic filters,
Homomorphic filtering, Color image enhancement. Image Restoration – degradation model,
Unconstrained and Constrained restoration, Inverse filtering, Wiener filtering, Geometric
transformations – spatial transformations, Gray: Level interpolation,
UNIT IV IMAGE SEGMENTATION AND RECOGNITION
Edge detection. Image segmentation by region growing, region splitting and merging, edge
linking, Morphological operators: dilation, erosion, opening, and closing. Image Recognition –
Patterns and pattern classes, matching by minimum distance classifier, Statistical Classifier.
Matching by correlation, Neural network application for image recognition.
UNIT V IMAGE COMPRESSION
Need for image compression, Huffman, Run Length Encoding, Arithmetic coding, Vector
Quantization, Block Truncation Coding. Transform Coding – DCT and Wavelet. Image
compression standards.
Total: 45
REFERENCES:
1. Rafael C. Gonzalez, Richard E.Woods, ‗Digital Image Processing‘, Pearson Education,
Inc., Second Edition, 2004.
2. Anil K. Jain, ‗Fundamentals of Digital Image Processing‘, Prentice Hall of India, 2002.
3. David Salomon : Data Compression – The Complete Reference, Springer Verlag New
York Inc., 2nd Edition, 2001
4. Rafael C. Gonzalez, Richard E.Woods, Steven Eddins, ‗ Digital Image Processing using
MATLAB‘, Pearson Education, Inc., 2004.
5. William K.Pratt, ‗ Digital Image Processing‘, John Wiley, NewYork, 2002.
6. Milman Sonka, Vaclav Hlavac, Roger Boyle, ‗Image Processing, Analysis, and Machine
Vision‘, Brooks/Cole, Vikas Publishing House, II ed., 1999.
7. Sid Ahmed, M.A., ‗Image Processing Theory, Algorithms and Architectures‘,
McGrawHill, 1995.
8. Lim, J.S., ‗Two Dimensional Signal and Image Processing‘, Prentice:Hall, New Jersey,
1990.
10244CSE15 UNIX INTERNALS
L T P C
3 0 0 3
UNIT I GENERAL OVERVIEW OF THE SYSTEM 9
History – System structure – User perspective – Operating system services – Assumptions about
hardware. Introduction to the Kernel : Architecture of the UNIX operating system – Introduction to system concepts – Kernel data structures – System administration – Summary and Preview.
UNIT II BUFFER CACHE 9
Buffer headers – Structure of the buffer pool – Advantages and disadvantages of the buffer
cache. Internal representation of files : Inodes – Structure of a regular file – Directories –
Conversion of a path name to an Inode – Super block – Other file types.
UNIT III SYSTEM CALLS FOR FILE SYSTEM 9
Open – Read – Write – File and record locking – Adjusting the position of file I/O –LSEEK –
Close – File creation – Creation of special files – Pipes – Dup – Mounting and unmounting file
systems
UNIT IV THE STRUCTURE OF PROCESSES 9
Process states and transitions – Layout of system memory – The context of a process – Saving
the context of a process. Process Control: Process creation – Signals – Process termination –
Awaiting process termination – Invoking other programs – The shell – System boot and the INIT
process.
UNIT V PROCESS SCHEDULING AND MEMORY MANAGEMENT POLICIES
9
Process Scheduling – Memory Management Policies: Swapping – A hybrid system with
swapping and demand paging. The I/O Subsystem: Driver Interfaces– Disk Drivers:Terminal
Drivers.
TOTAL:45
REFERENCES
1. Maurice J. Bach, ―The Design of the Unix Operating System‖, Prentice Hall of India,
2004.
2. Vahalia, ―Unix Internals: The New Frontiers‖, Pearson Education Inc, 2003.
10244CSE21 OPEN SOURCE SYSTEMS
L T P C
3 0 0 3
Unit –I 9
Overview of Free/Open Source Software:: Definition of FOSS & GNU, History of GNU/Linux
and the Free Software Movement , Advantages of Free Software and GNU/Linux, FOSS usage ,
trends and potential—global and Indian.GNU/Linux OS installation:: detect hardware, configure
disk partitions & file systems and install a GNU/Linux distribution ; Basic shell commands :
logging in, listing files, editing files, copying/moving files, viewing file contents, changing file
modes and permissions, process management ; User and group management, file ownerships and
permissions, PAM authentication ; Introduction to common system configuration files & log
files ;
Configuring networking, basics of TCP/IP networking and routing, connecting to the Internet
(through dialup, DSL, Ethernet, leased line).
Unit – II 9
Configuring additional hardware : sound cards, displays & display cards, network cards,
modems, USB drives, CD writers ; Understanding the OS boot up process; Performing every day
tasks using gnu/Linux :: accessing the Internet, playing music, editing documents and
spreadsheets, sending and receiving email, copy files from disks and over the network, playing
games, writing CDs ; X Window system configuration and utilities :: configure X windows,
detect display devices ; Installing software – from source code as well as using binary packages.
Setting up email servers:: using postfix (SMTP services), courier (IMAP & POP3 services),
squirrel mail ( web mail services) ; Setting up web servers :: using apache ( HTTP services), php
(server:side scripting), perl ( CGI support) ; Setting up file services :: using samba ( file and
authentication services for windows networks), using NFS ( file services for gnu/Linux / Unix
networks) ; Setting up proxy services :: using squid ( http / ftp / https proxy services) ; Setting up
printer services : using CUPS (print spooler), foomatic (printer database)
Unit III 9
Setting up a firewall : Using netfilter and ip tables; Using the GNU Compiler Collection – GNU
compiler tools ; the C preprocessor (cpp), the C compiler (gcc) and the C++ compiler (g++),
assembler (gas) ; Understanding build systems :: constructing make files and using make, using
autoconf and autogen to automatically generate make files tailored for different development
environments ; Using source code versioning and management tools :: using CVS to manage
source code revisions, patch & diff.
Unit IV 9
Understanding the GNU Libc libraries and linker :: linking against object archives (.a libraries)
and dynamic shared object libraries (.so libraries), generating statically linked binaries and
libraries, generating dynamically linked libraries ; Using the GNU debugging tools :: gdb to
debug programs, graphical debuggers like ddd, memory debugging / profiling libraries mpatrol
and valgrind ; Review of common programming practices and guidelines for GNU/Linux and
FOSS ; Introduction to Bash, sed & awk scripting. Basics of the X Windows server architecture.
Unit V 9
Basics of the X Windows server architecture ; Qt Programming ; Gtk+ Programming ; Python
Programming ; Programming GUI applications with localization support.
TOTAL:45
REFERENCES:
1. N. B. Venkateshwarlu (Ed); Introduction to Linux: Installation and Programming, B S
Publishers; 2005.
2. Matt Welsh, Matthias Kalle Dalheimer, Terry Dawson, and Lar Kaufman, Running
Linux, Fourth Edition, O'Reilly Publishers, 2002.
3. Carla Schroder, Linux Cookbook, First Edition, O'Reilly Cookbooks Series, 2004
On:line material 1. Open Sources: Voices from the Open Source Revolution, First Edition, January 1999, ISBN:
1:56592:582:3. URL: http://www.oreilly.com/catalog/opensources/book/toc.html
2. The Linux Cookbook: Tips and Techniques for Everyday Use, First Edition, Michael Stutz,
2001. URL: http://dsl.org/cookbook/cookbook_toc.html
3. The Linux System Administrators' Guide, Lars Wirzenius, Joanna Oja, Stephen Stafford, and
Alex Weeks, December 2003. URL: http://www.tldp.org/guides.html
4. Using GCC, Richard Stallman et al. URL: http://www.gnu.org/doc/using.html
5. An Introduction to GCC, Brian Gough. URL: http://www.networktheory.co.uk/docs/gccintro/
6. GNU Autoconf, Automake and Libtool, Gary V. Vaughan, Ben Elliston, Tom Tromey and Ian
Lance Taylor. URL: http://sources.redhat.com/autobook/
7. Open Source Development with CVS, Third Edition, Karl Fogel and Moshe Bar.
URL: http://cvsbook.red:bean.com/
8. Advanced Bash Scripting Guide, Mendel Cooper, June 2005. URL:
http://www.tldp.org/guides.html
9. GTK+/GNOME Application Development, Havoc Pennington. URL:
http://developer.gnome.org/doc/GGAD
10. Python Tutorial, Guido van Rossum, Fred L. Drake, Jr., Editor. URL:
http://www.python.org/doc/current/tut/tut.html
10244CSE22 SOFTWARE PROJECT MANAGEMENT
L T P C
3 0 0 3
Unit 1 Introduction 9
Introduction to Software Project management and control –Scope of Project management:Project
Management Life cycle:Software Evolution and economics – Software Management Process
Framework:Disciplines of Software Management:Measures and Measurements
Unit 2 Software Cost Estimation 10
Software Estimation – Problems with estimation – Decomposition Techniques : Cost estimation
Process – Delphi Technique –SLIM: COCOMO II – Function Point Analysis – Estimation for
Agile and Web development – Activity Based Costing and Economic Value Added (EVA):
Balanced Score Card
Unit 3 Software Risk Management 9
Software Risks – Risk management Paradigm: Risk Categories – Risk Assessment :
Identification – Analysis : Prioritize – Ranking : Control – Risk Projection and Refinement –
FMEA
Unit 4 Software Metrics 10
Need of Software metrics – Software Metrics Classification – Product Metrics : Size : Function
Based – Quality : Source Code – Testing : Maintenance – Process metrics Empirical Models :
Statistical Models : Theory:based Models : Composite Models : Reliability Models.
Unit 5 Project Management 7
Management Spectrum : People – Product – Process – Project – Client Relationship management
Total : 45
Reference Books
1. McConnell, S. ―Software Project: Survival Guide‖, Microsoft Press, 1998. Royce, W.
―Software Project management: A Unified Framework‖, Addison Wesley, 1998
2. Cooper, R., ―The Rise of Activity:Based Costing: PartOne: What is an Activity:Based
Cost System?‖ Journal of Cost Management, Vol.2, No.2 (Summer 1988), pp.45 – 54
3. Roger S.Pressman., ―Software Engineering: A Practitioners approach‖, 6th
edition,McGraw Hill International Edition
4. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE Software,
January 1991, pp32:41
5. Fenton, N.E., and Pfleeger, S.L.. ―Software Metrics: A Rigorous and Practical Approach,
Revised‖ Brooks Cole, 1998
6. Tom Demarco, Controlling Software Project Management, Measurement, Prentice Hall,
New Jersey
7. Demarco, T. and Lister, T. ―Peopleware: Productive Projects and Teams, 2nd
Ed.‖, Dorset
House, 1999
10244CSE23 XML AND WEB SERVICES
L T P C
3 0 0 3
1. INTRODUCTION 9
Role Of XML – XML and The Web – XML Language Basics – SOAP – Web Services –
Revolutions Of XML – Service Oriented Architecture (SOA).
2. XML TECHNOLOGY 9
XML – Name Spaces – Structuring With Schemas and DTD – Presentation Techniques –
Transformation – XML Infrastructure.
3. SOAP 9
Overview Of SOAP – HTTP – XML:RPC – SOAP: Protocol – Message Structure –
Intermediaries – Actors – Design Patterns And Faults – SOAP With Attachments.
4. WEB SERVICES 9
Overview – Architecture – Key Technologies : UDDI – WSDL – ebXML – SOAP And
Web Services In E:Com – Overview Of .NET And J2EE.
5. XML SECURITY 9
Security Overview – Canonicalization – XML Security Framework – XML Encryption –
XML Digital Signature – XKMS Structure – Guidelines For Signing XML Documents –
XML In Practice.
Total: 45
REFERENCE BOOKS:
1. Frank. P. Coyle, XML, Web Services And The Data Revolution, Pearson Education,
2002.
2. Ramesh Nagappan , Robert Skoczylas and Rima Patel Sriganesh, ― Developing Java Web
Services‖, Wiley Publishing Inc., 2004.
3. Sandeep Chatterjee, James Webber, ―Developing Enterprise Web Services‖, Pearson
Education, 2004.
4. McGovern, et al., ―Java Web Services Architecture‖, Morgan Kaufmann Publishers,
2005.
10244CSE24 MIDDLEWARE TECHNOLOGIES
L T P C
3 0 0 3
UNIT I CLIENT / SERVER CONCEPTS 9
Client:Server − File server − Database server − Group server − Object server − Web server −
Middleware − General middleware − Service specific middleware − Client / server building
blocks − RPC − Messaging − Peer:to:Peer.
UNIT II EJB ARCHITECTURE 9
EJB − EJB architecture − Overview of EJB software architecture − View of EJB − Conversation
− Building and Ddeploying EJBs − Roles in EJB.
UNIT III EJB APPLICATIONS 9
EJB session beans − EJB entity beans − EJB clients − EJB deployment − Building an application
with EJB.
UNIT IV CORBA 9
CORBA − Distributed systems − Purpose − Exploring CORBA alternatives − Architecture
overview − CORBA and networking Model − CORBA object model −IDL − ORB − Building an
application with CORBA.
UNIT V COM 9
COM − Data types − Interfaces − Proxy and stub − Marshalling − Implementing Server/Client −
Interface pointers − Object creation − Invocation − Destruction − Comparison COM and
CORBA − Introduction to .NET − Overview of .NET architecture − Marshalling − Remoting.
Total: 45
REFERENCES
1. Robert Orfali, Dan Harkey and Jeri Edwards, ―The Essential Client/Server
2. Survival Guide‖, Galgotia Publications Pvt. Ltd., 2002.
3. Tom Valesky, ―Enterprise Java Beans‖, Pearson Education, 2002
4. Jason Pritchard, ―COM and CORBA side by side‖, Addison Wesley, 2000
5. Jesse Liberty, ―Programming C#‖, 2nd Edition, O‘Reilly Press, 2002.
6. Mowbray, ―Inside CORBA‖, Pearson Education, 2002.
7. Puder, ―Distributed System Architecture – A Middleware Approach‖,Elsevier, 2008.
10244CSE25 PARALLEL COMPUTING AND MULTICORE TECHNOLOGIES
L T P C
3 0 0 3
UNIT I PIPELINING AND ILP 9
Fundamentals of Computer Design : Measuring and Reporting Performance : Instruction Level
Parallelism and Its Exploitation : Concepts and Challenges : Overcoming Data Hazards with
Dynamic Scheduling – Dynamic Branch Prediction : Speculation : Multiple Issue Processors –
Case Studies.
UNIT II ADVANCED TECHNIQUES FOR EXPLOITING ILP 9
Compiler Techniques for Exposing ILP : Limitations on ILP for Realizable Processors :
Hardware versus Software Speculation : Multithreading: Using ILP Support to Exploit
Thread:level Parallelism : Performance and Efficiency in Advanced Multiple Issue Processors :
Case Studies.
UNIT III MULTIPROCESSORS 9
Symmetric and distributed shared memory architectures – Cache coherence issues : Performance
Issues – Synchronization issues – Models of Memory Consistency : Interconnection networks –
Buses, crossbar and multi:stage switches.
UNIT IV MULTI:CORE ARCHITECTURES 9
Software and hardware multithreading – SMT and CMP architectures – Design issues – Case
studies – Intel Multi:core architecture – SUN CMP architecture – IBM cell architecture.: hp
architecture.
UNIT V MEMORY HIERARCHY DESIGN 9
Introduction : Optimizations of Cache Performance : Memory Technology and Optimizations :
Protection: Virtual Memory and Virtual Machines : Design of Memory Hierarchies : Case
Studies.
TOTAL : 45
REFERENCES
1. John L. Hennessey and David A. Patterson, ―Computer Architecture – A quantitative
approach‖, Morgan Kaufmann / Elsevier, 4th. Edition, 2007.
2. David E. Culler, Jaswinder Pal Singh, ―Parallel Computing Architecture: A hardware/
software approach‖, Morgan Kaufmann / Elsevier, 1997.
3. William Stallings, ―Computer Organization and Architecture – Designing for
Performance‖, Pearson Education, Seventh Edition, 2006.
10244CSE31 MOBILE TECHNOLOGIES
L T P C
3 0 0 3
UNIT I MOBILE DEVICE TECHNOLOGIES 9
Mobile Computing devices characteristics – Adaptation – Data dissemination and Management –
Heterogeneity – Interoperability – Context awareness – Language localization issues – User
Interfacedesign issues – Difference between UI design for mobile devices and conventional
systems – Mobile Agents :
UNIT II TERMINAL SOFTWARE PLATFORM TECHNOLOGIES 9
Introduction – Symbian OS: Introduction, Architecure,Applications for Symbion: Controls
and compound controls: Active objects: Localization: Security on the Symbion.–Palm OS,
Windows CE.NET– QUALCOMM, BREW, J2ME, – Pocket PC
UNIT III TELECOMMUNICATIONS: 9
GSM: DECTTETRA – UMTS: IMT:200 – Satellite Systems, CDMA and 3G: Introduction ,
SpreadSpectrum,Technology:IS 95:CDMA versus GSM:Wireless Data: third
GenetrationNetworks, Applications on 3G.
UNIT IV LOCAL AREA AND WIDE AREA WIRELESS TECHNOLOGIES 9
IEEE 802.11 technologies – Infrared technologies – Bluetooth networks (OBEX Protocol) –
Personal Area Networks – Mobility Management – Mobile IP – Establishing Wide area wireless
networks – Concept and structure of ‖cell‖ – Call establishment and maintenance – Channel
management – Frequency Assignment techniques.
UNIT V TRANSPORT AND APPLICATION LAYER: 9
Traditional TCP: Indirect TCP: Snooping TCP: Mobile TCP: Fast retransmit/ Fast Recovery:
Transmission/ Timeout Freezing – Selective Retransmission: Transaction Oriented TCP, WAP
Architecture – Datagram Protocol: Transport Layer Security: Transaction Protocol: Session
Protocol: Application Environment:Wireless Telephony Application.
Total: 45
References
1. F.Adelstein, S.K.S. Gupta, ―Fundamentals of Mobile and Pervasive Computing‖ Tata
McGraw Hill, 2005.
2. Ashoke Talukdar and Roopa Yavagal, ―Mobile Computing‖, Tata McGraw Hill, 2005
3. Next Generation Mobile Systems : 3G and Beyond:Wiely publications
4. 3G wireless Demystified: MCGraw Hill
5. 1. J.Schiller, Mobile Communication, Addison Wesley, 2000.
10244CSE32 SOFTWARE RELIABILITY AND PROJECT MANAGEMENT
L T P C
3 0 0 3
Unit 1 Introduction 7
Software Reliability – Ideas of Software Reliability – Ingredients of software reliability
:Challenges and difficulties in Software Reliability – Reliability Measurement :Computation of
Software reliability – Software Availability
Unit 2 Software Reliability Models 10
Classes of software reliability models : General procedure for reliability modeling : Time
Dependent Software Reliability Models: Time between failure reliability Models, Fault Counting
Reliability Models : Time Independent Software Reliability Models: Fault injection model of
Software Reliability, Input Domain Reliability Model, Orthogonal defect classification, Software
availability Models
Unit 3 Project Management 9
Software project management and control – Activities of Project Management – Project Planning
– Stepwise Project Planning:Project management Life cycle:Management process
framework:Software Risk Management:Risk Assessment:Risk Projection and Refinement
Unit 4 Metrics and Estimation 10
Software Metrics:Classification : Product Metrics : Function Based, Quality Metrics, Halsted‘s
Metrics – Process metrics : Empirical Models : Statistical Models and Reliability Models –
Software Estimation – Issues – Cost estimation method – COCOMO II: Software Project
Schedule
Unit 5 Team Management 9
Management Spectrum– Client Relationship management : Organizational Behaviour : Selecting
The RightPerson For The Job – Motivation – Hackman Job Characteristics Model – Working In
Groups – Becoming A Team –Decision Making – Leadership – organizational Structures –
Stress – Health And Safety– Case Studies.
Total : 45
References
1. Hoang Pham, ―Software Reliability‖, Springer Verlag, New York.
2. John D. Musa, ―Software Reliability Engineered Testing‖, Mc. Graw Hill, New York.
3. Bob Hughes, Mikecotterell, ―Software Project Management‖, Third Edition, Tata
McGraw Hill, 2004
4. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE Software,
January 1991, pp32:41
5. Doron Reled, ―Software Reliability Methods‖, Springer Verlag, New York
6. R. Ramakumar, ―Reliability Engineering: Fundamentals and Applications‖, Prentice Hall,
New Delhi
7. McConnell, S. ―Software Project: Survival Guide‖, Microsoft Press, 1998. Royce, W.
―Software Project management: A Unified Framework‖, Addison Wesley, 1998
8. Roger S.Pressman., ―Software Engineering: A Practitioners approach‖, 6th
edition,McGraw Hill International Edition
10244CSE33 E:COMMERCE
L T P C
3 0 0 3
UNIT I INTRODUCTION 9
Infrastructure for Electronic Commerce : Networks : Packet Switched Networks : TCP/IP
Internet protocol : Domain name Services : Web Service Protocols : Internet applications :
Utility programs – Markup Languages : Web Clients and Servers : Intranets and Extranets :
Virtual private Network.
UNIT II CORE TECHNOLOGY 9
Electronic Commerce Models : Shopping Cart Technology : Data Mining : Intelligent Agents –
Internet Marketing : XML and E:Commerce
UNIT III ELECTRONIC PAYMENT SYSTEMS 9
Real world Payment Systems : Electronic Funds Transfer : Digital Payment :Internet Payment
Systems – Micro Payments : Credit Card Transactions : Case Studies.
UNIT IV SECURITY 9
Threats to Network Security : Public Key Cryptography : Secured Sockets Layer : Secure
Electronic Transaction : Network Security Solutions : Firewalls.
UNIT V INTER/INTRA ORGANIZATIONS ELECTRONIC COMMERCE 9
EDI : EDI application in business : legal, Security and Privacy issues : EDI and Electronic
commerce : Standards : Internal Information Systems : Macro forces : Internal commerce :
Workflow Automation and Coordination : Customization and Internal commerce : Supply chain
Management.
TOTAL: 45
REFERENCES
1. Ravi Kalakota and Andrew B Whinston , Frontiers of Electronic commerce, Addison
Wesley, 1996
2. Pete Loshin, Paul A Murphy , Electronic Commerce, 2nd Edition , Jaico Publishers,1996.
3. Joseph P T , S J,E:Commerce : An Indian Perspective, second edtion, Prentice Hall of
India.2006.
4. David Whiteley, e : Commerce : Strategy, Technologies and Applications : McGraw
Hill,2000
10244CSE34 REAL TIME SYSTEMS.
L T P C
3 0 0 3
UNIT I INTRODUCTION 9
Introduction : Issues in Real Time Computing, Structure of a Real Time System. Task Classes,
Performance Measures for Real Time Systems, Estimating Program Run times. Task Assignment
and Scheduling : Classical Uniprocessor scheduling algorithms, UniProcessor scheduling of IRIS
Tasks, Task Assignment, Mode Changes, and Fault Tolerant Scheduling.
UNIT II PROGRAMMING LANGUAGES AND TOOLS 9
Programming Language and Tools – Desired Language characteristics, Data Typing, Control
structures, Facilitating Hierarchical Decomposition, Packages, Run:time (Exception) Error
handling, Overloading and Generics, Multitasking, Low Level programming, Task scheduling,
Timing Specifications, Programming Environments, Run:time Support.
UNIT III REAL TIME DATABASES 9
Real time Databases : Basic Definition, Real time Vs General Purpose Databases, Main Memory
Databases, Transaction priorities, Transaction Aborts, Concurrency Control Issues, Disk
Scheduling Algorithms, Two:phase Approach to improve Predictability, Maintaining
Serialization Consistency, Databases for Hard Real Time systems.
UNIT IV COMMUNICATION 9
Real:Time Communication : Communications Media, Network Topologies Protocols, Fault
Tolerant Routing. Fault Tolerance Techniques : Fault Types, Fault Detection. Fault Error
containment Redundancy, Data Diversity, Reversal Checks, Integrated Failure handling.
UNIT V EVALUATION TECHNIQUES 9
Reliability Evaluation Techniques : Obtaining Parameter Values, Reliability Models for
Hardware Redundancy, Software Error models. Clock Synchronization : Clock, A
Nonfault:Tolerant Synchronization Algorithm, Impact of Faults, Fault Tolerant Synchronization
in Hardware, Fault Tolerant Synchronization in Software.
TOTAL : 45
REFERENCES:
1. C.M. Krishna, Kang G. Shin, ―Real:Time Systems‖, McGraw:Hill International Editions,
1997.
2. Stuart Bennett, ―Real Time Computer Control:An Introduction‖,Second edition, Prentice
Hall PTR, 1994.
3. Peter D. Lawrence, ―Real time Micro Computer System Design – An Introduction‖,
McGraw Hill, 1988.
4. S.T. Allworth and R.N. Zobel, ―Introduction to real time software design‖, Macmillan, II
Edition, 1987.
5. R.J.A Buhur, D.L. Bailey, ― An Introduction to Real:Time Systems‖, Prentice:Hall
International, 1999.
6. Philip.A.Laplante ―Real Time System Design and Analysis‖ PHI , III Edition, April
2004.
10244CSE35 NETWORK SYSTEM DESIGN USING NETWORK PROCESSOR
L T P C
3 0 0 3
UNIT I INTRODUCTION : PROTOCOLS AND PACKET FORMATS
Network systems and the Internet, Applications, packet processing, protocols and layering, layer
1 and 2, layer 3, layer 4, protocol port numbers and de:multiplexing, Encapsulation and
transmission.
UNIT II PACKET PROCESSING
Introduction, packet buffer allocation, packet buffer size and copying, protocol layering and
copying, Heterogeneity and network byte order, IP datagram fragmentation and reassembly, IP
forwarding algorithm
UNIT III TCP ALGORITHM
TCP connection recognition algorithm, TCP splicing algorithm, Functions – Address lookup and
packet forwarding, error detection and correction, Fragmentation, segmentation and reassembly,
frame and protocol de:multiplexing, packet classification, queuing and packet discard,
Scheduling and timing, Authentication and privacy, traffic measurement and policing , traffic
shaping, timer management.
UNIT IV NETWORK PROCESSORS:
Introduction, motivation for embedded processors, RISC Vs CISC, need for custom silicon,
definition of NP, flexibility through programmability, instruction set, scalability with parallelism
and pipelining, cause and benefits of NP, NP functionality, packet processing functions, Ingress
and Egress processing, Parallel and distributed architecture, architectural roles of NP, NP
architectures – Introduction, architectural variety, primary architectural characteristics,
Architecture, packet flow and clock rates, software architecture, assigning functionality to the
process hierarchy, issues in scaling an NP.
UNIT V IXP2XXX
Introduction, IXP2xxx Architecture, Micro engines, Programming Models, Packet processing in
a single thread, Advanced programming, Applications: Switches, Routers, Firewall, and Active
Networks.
Total:45
REFERENCES:
1. Douglas E.Comer, ―Network Systems Design using Network Processors‖, Intel IXP
version,, Pearson Education. March 2003
2. Erik J. Johnson and Aaron Kunze, ―IXP 2400/2800 Programming‖, Intel Press, April
2003
3. Uday R. Naik and Prashant R. Chandra, ― Designing High Performance Networking
Applications – Essential Insights for Developers of IXP2XXX Network Processor Based
Systems‖, Intel Press, November 2004
4. Donald F. Hooper, ― Using IXP2400/2800 Development Tools – A Hands on Approach
to Network Processor Software Design‖, Intel Press, August 2004
5. Patrick Crowley, Peter Z. Onufryk, Mark A. Franklin, Haldun Hadimioglu, ―Network
Processors 2002: Design Principles and Practices‖, Vol 1, Morgan Kaufmann
Publications, September 2002.
6. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk ―Network
Processor Design: Issues and Practices‖, Vol 2, Academic Press, December 2003.
7. Panos C. Lekkas, ―Network Processors: Architectures, Protocols and Platforms (Telecom
Engineering‖), McGraw Hill, July 2003
10244CSE41 EMBEDDED SYSTEMS
L T P C
3 0 0 3
UNIT I EMBEDDED COMPUTING 9
Challenges of Embedded Systems – Embedded system design process. Embedded processors –
ARM processor – Architecture, ARM and Thumb Instruction sets
UNIT II EMBEDDED C PROGRAMMING 9
C:looping structures – Register allocation – Function calls – Pointer aliasing – structure
arrangement – bit fields – unaligned data and endianness – inline functions and inline assembly –
portability issues.
UNIT III OPTIMIZING ASSEMBLY CODE 9
Profiling and cycle counting – instruction scheduling – Register allocation – conditional
execution – looping constructs – bit manipulation – efficient switches – optimized primitives.
UNIT IV PROCESSES AND OPERATING SYSTEMS 9
Multiple tasks and processes – Context switching – Scheduling policies – Interprocess
communication mechanisms – Exception and interrupt handling : Performance issues.
UNIT V EMBEDDED SYSTEM DEVELOPMENT 9
Meeting real time constraints – Multi:state systems and function sequences. Embedded software
development tools – Emulators and debuggers. Design methodologies – Case studies – Complete
design of example embedded systems.
TOTAL : 45
REFERENCES
1. Andrew N Sloss, D. Symes, C. Wright,‖ ARM System Developers Guide‖, Morgan
Kaufmann / Elsevier, 2006.
2. Michael J. Pont, ―Embedded C‖, Pearson Education, 2007.
3. Wayne Wolf, ―Computers as Components: Principles of Embedded Computer System
Design‖, Morgan Kaufmann / Elsevier, 2nd. edition, 2008.
4. Steve Heath, ―Embedded System Design‖, Elsevier, 2nd. edition, 2003.
10244CSE42 OPERATIONS RESEARCH
L T P C
3 0 0 3
UNIT I QUEUEING MODELS 9
Poisson Process – Markovian Queues – Single and Multi:server Models – Little‘s formula –
Machine Interference Model – Steady State analysis – Self Service Queue.
UNIT II ADVANCED QUEUEING MODELS 9
Non: Markovian Queues – Pollaczek Khintchine Formula – Queues in Series – Open Queueing
Networks –Closed Queueing networks.
UNIT III SIMULATION 9
Discrete Even Simulation – Monte – Carlo Simulation – Stochastic Simulation – Applications to
Queueing systems.
UNIT IV LINEAR PROGRAMMING 9
Formulation – Graphical solution – Simplex method – Two phase method : Transportation and
Assignment Problems.
UNIT V NON:LINEAR PROGRAMMING 9
Lagrange multipliers – Equality constraints – Inequality constraints – Kuhn : Tucker conditions –
Quadratic Programming.
L: 45
REFERENCES:
1. Winston.W.L. ―Operations Research‖, Fourth Edition, Thomson – Brooks/Cole, 2003.
2. Taha, H.A. ―Operations Research: An Introduction‖, Ninth Edition, Pearson Education
Edition, Asia, New Delhi, 2002.
3. Robertazzi. T.G. ―Computer Networks and Systems – Queuing Theory and Performance
4. Evaluation‖, Third Edition, Springer, 2002 Reprint.
5. Ross. S.M., ―Probability Models for Computer Science‖, Academic Press, 2002.
10244CSE43 ADHOC NETWORKS
L T P C
3 0 0 3
Unit 1. INTRODUCTION
Introduction:Fundamentals of Wireless Communication Technology – The Electromagnetic
Spectrum : Radio Propagation Mechanisms : Characteristics of the Wireless Channel : IEEE
802.11a,b Standard – Origin Of Ad hoc: Packet Radio Networks : Technical Challenges :
Architecture of PRNETs : Components of Packet Radios – Ad hoc Wireless Networks :What Is
an Ad Hoc Network? Heterogeneity in Mobile Devices : Wireless Sensor Networks : Traffic
Profiles : Types of Ad hoc Mobile Communications : Types of Mobile Host Movements :
Challenges Facing Ad Hoc Mobile Networks:Ad hoc wireless Internet
Unit 2. AD HOC ROUTING PROTOCOLS
Introduction : Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks :
Classifications of Routing Protocols :Table:Driven Routing Protocols – Destination Sequenced
Distance Vector : Wireless Routing Protocol : Cluster Switch Gateway Routing :
Source:Initiated On:Demand Approaches : Ad Hoc On: Demand Distance Vector Routing :
Dynamic Source Routing : Temporally Ordered Routing Algorithm : Signal Stability Routing :
Location:Aided Routing : Power:Aware Routing : Zone Routing Protocol.
Unit 3. MULTICAST ROUTING IN AD HOC NETWORKS
Introduction : Issues in Designing a Multicast Routing Protocol : Operation of Multicast Routing
Protocols : An Architecture Reference Model for Multicast Routing Protocols : Classifications of
Multicast Routing Protocols : Tree:Based Multicast Routing Protocols: Bandwidth Efficient
Multicast Routing Protocol, Multicast Routing based on Zone Routing, Associatively Based Ad
Hoc Multicast Routing, Weight Based Multicast Protocol, Multicast Ad Hoc On Demand
Distance Vector Routing Protocol, Ad Hoc Multicast Routing Protocol, Adaptive Shared Tree
Multicast Routing Protocol :Mesh:Based Multicast Routing Protocols : Energy:Efficient
Multicasting : Multicasting with Quality of Service Guarantees : Application:Dependent
Multicast Routing .
Unit 4. TRANSPORT LAYER, SECURITY PROTOCOLS
Introduction : Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks :
Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks :Classification of
Transport Layer Solutions : TCP Over Ad Hoc Wireless Networks : Other Transport Layer
Protocols for Ad Hoc Wireless Networks : Security in Ad Hoc Wireless Networks : Network
Security Requirements : Issues and Challenges in Security Provisioning : Network Security
Attacks : Key Management : Secure Routing in Ad Hoc Wireless Networks
Unit 5. QoS AND ENERGY MANAGEMENT
Introduction : Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks
:Classifications of QoS Solutions : MAC Layer Solutions: Cluster TDMA, IEEE 802.11e :
Network Layer Solutions: Ticket Based QoS Routing Protocol, Predictive Location Based QoS
Routing Protocol, Bandwidth Routing Protocol, On Demand Link State Multipath QoS Routing
Protocol : QoS Frameworks for Ad Hoc Wireless Networks: QoS Models, QoS Resource
Reservation Signaling, INSIGNIA,SWAN: Energy Management in Ad Hoc Wireless Networks –
Introduction : Need for Energy Management in Ad Hoc Wireless Networks : Classification of
Energy Management Schemes : Battery Management Schemes : Transmission Power
Management Schemes : System Power Management Schemes
TOTAL:45
REFERENCE BOOKS:
1. C. Siva Ram Murthy and B.S. Manoj ―Ad Hoc Wireless Networks: Architectures and
Protocols‖, Prentice Hall PTR,2004
2. C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall
PTR, 2001
3. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000
10244CSE44 BIO INFORMATICS
L T P C
3 0 0 3
1. INTRODUCTION 7
The Central Dogma – Killer Application – Parallel Universes – Watson‘s Definition : Top Down
Vs Bottom Up Approach – Information Flow – Conversance:Communications.
2. DATABASE AND NETWORKS 9
Definition – Data Management – Data Life Cycle – Database Technology – Interfaces –
Implementation – Networks: Communication Models – Transmission Technology Protocols –
Bandwidth – Topology – Contents – Security – Ownership – Implementation.
3. SEARCH ENGINES AND DATA VISUALIZATION 10
Search Process – Technologies – Searching And Information Theory – Computational Methods –
Knowledge Management – Sequence Visualizations – Structure Visualizations – User Interfaces
– Animation Vs Simulation
4. STATISTICS, DATA MINING AND PATTERN MATCHING 11
Statistical Concepts – Micro Arrays – Imperfect Data – Basics – Quantifying –Randomness –
Data Analysis – Tools Selection – Alignment – Clustering – Classification
– Data Mining Methods – Technology – Infrastructure Pattern Recognition – Discovery –
Machine Learning – Text Mining – Pattern Matching Fundamentals – Dot Matrix Analysis –
Substitution Matrix – Dynamic Programming – Word Method – Bayesian Method – Multiple
Sequence Alignment Tools.
5. MODELING SIMULATION AND COLLABORATION 8
Drug Discovery Fundamentals – Protein Structure – System Biology Tools – Collaboration And
Communication – Standards – Issues – Case Study.
Total: 45
REFERENCE BOOKS:
1. Bryan Bergeron, ―Bio Informatics Computing‖, Prentice Hall, 2003.
2. T.K. Affward, D.J. Parry Smith, ―Introduction to Bio Informatics‖, Pearson Education,
2001.
3. Pierre Baldi, Soren Brunak, ―Bio Informatics – The Machine Learning Approach‖, 2nd
Edition, First East West Press, 2003
10244CSE45 RECENT TRENDS IN MOBILE COMPUTING
L T P C
3 0 0 3
Unit I. INTRODUCTION 9
Medium Access Control : Motivation for Specialized MAC: SDMA: FDMA: TDMACDMA:
Comparison of Access mechanisms – Tele communications : GSM: DECTTETRA – UMTS:
IMT:200 – Satellite Systems: Basics: Routing: Localization: Handover: Broadcast Systems:
Overview – Cyclic Repetition of Data: Digital Audio Broadcasting – Digital Video Broadcasting
Unit II. WIRELESS NETWORKS 9
Wireless LAN: Infrared Vs Radio Transmission – Infrastructure Networks: Ad hoc Networks:
IEEE 802.11 – HIPERLAN – Bluetooth: Wireless ATM: Working Group: Services: Reference
Model – Functions – Radio Access Layer – Handover: Location Management: Addressing
Mobile Quality of Service: Access Point Control Protocol
Unit III. MOBILE NETWORK LAYER 9
Mobile IP : Goals – Assumptions and Requirement – Entities – IP packet Delivery: Agent
Advertisement and Discovery – Registration – Tunneling and Encapsulation – Optimization –
Reverse Tunneling – IPv6 – DHCP: Ad hoc Networks , Mobile Transport Layer, Application
Layer
Unit IV. MOBILE TRANSPORT LAYER 9
Traditional TCP: Indirect TCP: Snooping TCP: Mobile TCP: Fast retransmit/ Fast Recovery:
Transmission/ Timeout Freezing – Selective Retransmission: Transaction Oriented TCP
Unit V. WAP 9
Architecture – Datagram Protocol: Transport Layer Security: Transaction Protocol: Session
Protocol: Application Environment:Wireless Telephony Application
TOTAL:45
REFERENCE BOOKS
1. J.Schiller, Mobile Communication, Addison Wesley, 2000.
2. William Stallings, Wireless Communication and Networks, Pearson Education, 2003.
3. Singhal, WAP:Wireless Application Protocol, Pearson Education, 2003
4. Lother Merk, Martin. S. Nicklaus and Thomas Stober, Principles of Mobile Computing,
Second Edition, Springer, 2003.
5. William C.Y.Lee, Mobile Communication Design Fundamentals, John Wiley, 1993.
10244CSE46 : SEMANTIC WEB
L T P C
3 0 0 3
1. INTRODUCTION 8
History – Semantic Web Layers –Semantic Web technologies – Semantics in Semantic
Web – XML: Structuring – Namespaces – Addressing – Querying – Processing
2. RDF 10
RDF and Semantic Web – Basic Ideas : RDF Specification – RDF Syntax: XML and
Non: XML : RDF elements – RDF relationship: Reification, Container, and collaboration
– RDF Schema – Editing, Parsing, and Browsing RDF/XML:RQL:RDQL
3. ONTOLOGY 10
Why Ontology – Ontology movement – OWL – OWL Specification : OWL Elements –
OWL constructs: Simple and Complex – Ontology Engineering : Introduction –
Constructing ontologies – Reusing ontologies – On:To:Knowledge Semantic Web
architecture
4. LOGIC AND INFERENCE 9
Logic – Description Logics : Rules – Monotonic Rules: Syntax, Semantics and examples
– Non:Monotonic Rules – Motivation, Syntax, and Examples – Rule Markup in XML:
Monotonic Rules, and Non:Monotonic Rules
5. APPLICATIONS OF SEMANTIC WEB TECHNOLOGIES 8
RDF Uses: Commercial and Non:Commercial use – Sample Ontology – e:Learning –
Web Services – Web mining – Horizontal information – Data Integration – Future of
Semantic Web
TOTAL: 45
REFERENCES
1. Grigorous Antoniou and Van Hermelen : ―A Semantic Web Primer‖:The MIT Press –
2004
2. ―Spinning the Semantic Web: Bringing the world wide web to its full potential‖ – The
MIT Press – 2004
3. Shelley Powers – ―Practical RDF‖ – O‘reilly publishers – First Indian Reprint : 2003
10244CSE51 DATA WAREHOUSING AND DATA MINING
L T P C
3 0 0 3
UNIT I DATA WAREHOUSING 9
Data Warehousing and Business Analysis : Data warehousing Components –Building a Data
warehouse – Mapping the Data Warehouse to a Multiprocessor Architecture – DBMS Schemas
for Decision Support – Online Analytical Processing (OLAP) – OLAP and Multidimensional
Data Analysis.
UNIT II DATAMINING : PREPROCESSING AND ASSOCIATION RULE
MINING 9
Data Mining : Data Mining Functionalities – Data Preprocessing – Data Cleaning – Data
Integration and Transformation – Data Reduction – Data Discretization and Concept Hierarchy
Generation. Association Rule Mining : Efficient and Scalable Frequent Item set Mining Methods
– Mining Various Kinds of Association Rules.
UNIT III CLASSIFICATION AND PREDICTION 9
Classification and Prediction : Issues Regarding Classification and Prediction – Classification by
Decision Tree Introduction – Bayesian Classification – Rule Based Classification –
Classification by Back propagation – Support Vector Machines – Associative Classification –
Other Classification Methods – Prediction – Accuracy and Error Measures – Evaluating the
Accuracy of a Classifier or Predictor
UNIT IV CLUSTERING 9
Cluster Analysis : Types of Data in Cluster Analysis – A Categorization of Major Clustering
Methods – Partitioning Methods – Hierarchical methods – Density:Based Methods – Grid:Based
Methods – Model:Based Clustering Methods – Clustering High:Dimensional Data – Constraint:
Based Cluster Analysis – Outlier Analysis.
UNIT V RECENT TRENDS 9
Mining Object, Spatial, Multimedia, Text and Web Data:
Multidimensional Analysis and Descriptive Mining of Complex Data Objects – Spatial Data
Mining – Multimedia Data Mining – Text Mining – Mining the World Wide Web.
Total : 45
REFERENCES
1. Jiawei Han and Micheline Kamber ―Data Mining Concepts and Techniques‖ Second
Edition, Elsevier, Reprinted 2008.
2. Alex Berson and Stephen J. Smith ―Data Warehousing, Data Mining & OLAP‖, Tata
McGraw – Hill Edition, Tenth Reprint 2007.
3. K.P. Soman, Shyam Diwakar and V. Ajay ―Insight into Data mining Theory and
Practice‖, Easter Economy Edition, Prentice Hall of India, 2006.
4. G. K. Gupta ―Introduction to Data Mining with Case Studies‖, Easter Economy Edition,
Prentice Hall of India, 2006.
5. Pang:Ning Tan, Michael Steinbach and Vipin Kumar ―Introduction to Data Mining‖,
Pearson Education, 2007.
10244CSE52 AGENT BASED INTELLIGENT SYSTEMS
L T P C
3 0 0 3
UNIT I INTRODUCTION 9
Definitions : Foundations : History : Intelligent Agents:Problem Solving:Searching : Heuristics :
Constraint Satisfaction Problems : Game playing.
UNIT II KNOWLEDGE REPRESENTATION AND REASONING 9
Logical Agents:First order logic:First Order Inference:Unification:Chaining: Resolution
Strategies:Knowledge Representation:Objects:Actions:Events
UNIT III PLANNING AGENTS 9
Planning Problem:State Space Search:Partial Order Planning:Graphs:Nondeterministic
Domains:Conditional Planning:Continuous Planning:MultiAgent Planning.
UNIT IV AGENTS AND UNCERTAINITY 9
Acting under uncertainty – Probability Notation:Bayes Rule and use – Bayesian Networks:Other
Approaches:Time and Uncertainty:Temporal Models: Utility Theory : Decision Network –
Complex Decisions.
UNIT V HIGHER LEVEL AGENTS 9
Knowledge in Learning:Relevance Information:Statistical Learning Methods:Reinforcement
Learning:Communication:Formal Grammar:Augmented Grammars: Future of AI.
Total: 45
REFERENCES:
1. Stuart Russell and Peter Norvig, ―Artificial Intelligence : A Modern Approach‖, 2nd
Edition, Prentice Hall, 2002
2. Michael Wooldridge, ―An Introduction to Multi Agent System‖, John Wiley, 2002.
3. Patrick Henry Winston, Artificial Intelligence, III Edition, AW, 1999.
4. Nils.J.Nilsson, Principles of Artificial Intelligence, Narosa Publishing House, 1992.
10244CSE53 HIGH SPEED NETWORKS
L T P C
3 0 0 3
UNIT I HIGH SPEED NETWORKS 9
Frame Relay Networks – Asynchronous transfer mode – ATM Protocol Architecture, ATM
logical Connection, ATM Cell – ATM Service Categories – AAL. High Speed LAN‘s: Fast
Ethernet, Gigabit Ethernet, Fibre Channel – Wireless LAN‘s.
UNIT II CONGESTION AND TRAFFIC MANAGEMENT 9
Queuing Analysis: Queuing Models – Single Server Queues – Effects of Congestion –
Congestion Control – Traffic Management – Congestion Control in Packet Switching Networks
– Frame Relay Congestion Control.
UNIT III TCP AND ATM CONGESTION CONTROL 9
TCP Flow control – TCP Congestion Control – Retransmission – Timer Management –
Exponential RTO backoff – KARN‘s Algorithm – Window management – Performance of TCP
over ATM. Traffic and Congestion control in ATM – Requirements – Attributes – Traffic
Management Frame work, Traffic Control – ABR traffic Management – ABR rate control, RM
cell formats, ABR Capacity allocations – GFR traffic management.
UNIT IV INTEGRATED AND DIFFERENTIATED SERVICES 9
Integrated Services Architecture – Approach, Components, Services: Queuing Discipline, FQ,
PS, BRFQ, GPS, WFQ – Random Early Detection, Differentiated Services.
UNIT V PROTOCOLS FOR QOS SUPPORT 9
RSVP – Goals & Characteristics, Data Flow, RSVP operations, Protocol Mechanisms –
Multiprotocol Label Switching – Operations, Label Stacking, Protocol details – RTP – Protocol
Architecture, Data Transfer Protocol, RTCP.
L:45 T:15 Total:60
REFERENCES
1. William Stallings, ―High Speed Networks and Internet‖, Second Edition, Pearson
Education, 2002.
2. Warland, Pravin Varaiya, ―High Performance Communication Networks‖, Second
Edition, Jean Harcourt Asia Pvt. Ltd., 2001.
3. Irvan Pepelnjk, Jim Guichard, Jeff Apcar, ―MPLS and VPN Architecture‖, Cisco Press,
Volume 1 and 2, 2003.
10244CSE54 DECISION SUPPORT SYSTEMS
L T P C
3 0 0 3
UNIT:I INTRODUCTION
Introduction : DSS definition: characteristics: History of DSS: Components of DSS: Data and
Model Management:DSS knowledge base: user interfaces: DSS user: categories and classes of
DSS‘s: Decision and Decision Makers : Decision Makers: Decision styles: Decision
effectiveness: Hardness of Decisions
UNIT:II DECISION MAKING
Typology of Decisions: Decision theory: Rational Decision Making: Bounded
Rationality:Process of choice – Cognitive processes:Heuristics in Decision Making:
Effectiveness and efficiency: Decisions in the Organization: Understanding the Organization:
Organization culture: power and politics: organization Decision making
UNIT:III DECISION PROCESSES
Modeling Decision Processes: Problem definition and its structure – decision models: types of
probability and its forecasting techniques: sensitivity analysis: Group Decision Support : Group
Decision making: the problem with groups: concepts and definition of MDM technology –
MDM activities: virtual workplace:Executive Information system(EIS):history of
EIS:characteristics of executives: EIS components:making EIS workfuture of executive Decision
making and EIS.
UNIT:IV SYSTEM PERSPECTIVE OF DSS
Perspective of DSS: System – DSS in the context of information system: Information quality
issues in DSS design: DSS information system architecture: role of Internet in DSS development
and use: Designing and Building DSS: Strategies of DSS Analysis and Design: DSS
Developer:tools for DSS development: DSS user
Interface Issues
UNIT:V IMPLEMENTATION OF DSS
Implementing DSS: DSS Implementation: Patterns of Implementation: System
Evaluation:Importance of Integration:Creativity Decision making: Definition of creativity:
occurrence of creativity: creative problem solving techniques:introduction to intelligent DSS (AI,
Expert system and Knowledge based systems)– DSS in the 21st century:future of DSS, EIS and
DSS technologies
REFERENCES
1. George M .Marakas, "Decision Support Systems", 2nd Edition, Pearson Education, 2005.
2. Efraim Turban, Jay E.Aronson, Ting:Peng Liang, "Decision Support Systems and
Intelligent Systems", 7th Edition, Pearson Education, 2006.
10244CSE55 FAULT TOLERANT SYSTEMS
L T P C
3 0 0 3
UNIT – I Fundamental Concepts
Definitions of fault tolerance, fault classification, fault tolerant attributes and system structure.
Fault:Tolerant Design Techniques: Information redundancy, hardware redundancy, and time
redundancy.
UNIT – II Dependability Evaluation Techniques
Reliability and availability models: (Combinatorial techniques, Fault:Tree models, Markov
models), Performability Models. Architecture of Fault:Tolerant Computers (case study):
General:purpose systems, high:availability systems, long:life systems, critical systems.
UNIT – III Software Fault Tolerance
Software faults and their manifestation, design techniques, reliability models.
UNIT – IV Fault Tolerant Parallel/Distributed Architectures
Shared bus and shared memory architectures, fault tolerant networks.
UNIT – V Recent topics in fault tolerant systems
Security, fault tolerance in wireless/mobile networks and Internet.
TOTAL:45
REFERENCES
1. Fault:Tolerant Computer System Design D.K. Pradhan, 2003
2. Design and Analysis of Fault:Tolerant Digital Systems, B.W.Johnson, Addison:Wesley,
1989
3. Fault:Tolerant Computing, Theory and Techniques, Volumes I and II , D.K. Pradhan,
Prentice Hall, 1986
4. Reliable Computer Systems: Design and Evaluation, D.P.Siewiorek and R.S.Swartz,
Digital Press, 1992
5. Probability and Statistics with Reliability, Queueing and Computer Science Application,
K.S.Trivedi, Prentice Hall, 1982
10244CSE56 GRID COMPUTING
L T P C
3 0 0 3
1. GRID COMPUTING INITIATIVES
Introduction : Definition : Scope of grid computing – Grid Computing Organizations and their
roles – Grid Computing analog – Grid Computing road map.
2. GRID COMPUTING APPLICATIONS AND TECHNOLOGIES
Merging the Grid services Architecture with the Web Services Architecture – OGSA – Sample
use cases – OGSA platform components – OGSI – OGSA Basic Services.
3. GRID COMPUTING TOOL KITS
The Globus Toolkit 4 – GT4 Java WS core: state full webservice – Singleton, Multiple
Resources – Life Cycle Management – Persistent Resources – GT4 Security: GSI – The security
Descriptor – Authentication – Authorization – Resource level security.
4. GLOBUS TOOL KIT
Installing the Globus Toolkit 4 – WSDL Primer – Command Line Clients – Examples.
5. CASE STUDY
Case Study: GridSim: Installing the simulator – examples – Alchemi Toolkit: Owner, Manager
and Executor cluster – Prime number generation example. (Web References)
TOTAL:45
REFERENCE BOOKS:
1. Joshy Joseph & Craig Fellenstein, ―Grid Computing‖, PHI, PTR:2003.
2. Borja Sotomayor & Lisa Childers, Globus Toolkit® 4: Programming Java Services,
Morgan Kaufmann, 2006
3. Ahmar Abbas, ―Grid Computing: A Practical Guide to technology and Applications‖,
Charles River media – 2003.
10244CSE57 WIRELESS SENSOR NETWORKS
L T P C
3 0 0 3
UNIT I INTRODUCTION
Over view of sensor networks: Constraints and challenges – Advantages of sensor networks:
Applications: Collaborative processing – Key definitions in sensor networks – Tracking scenario
– Problem formulation – Distributed representation and interference of states – Tracking multiple
objects – sensor models: Performance comparison and metrics.
UNIT II NETWORKING SENSORS
Key assumption : Medium access control – S:MAC protocol – IEEE 802.15.4 standard and
ZigBee : General Issues : Geographic, Energy – Aware Routing : Attribute based routing.
UNIT III INFRASTRUCTURE ESTABLISHMENT
Topology control – Clustering :Time Synchronization – Localization – Task driven sensing –
Role of sensor nodes – Information based tasking : Routing and aggregation.
UNIT IV SENSOR NETWORK DATABASE
Sensor Database Challenges – Querying the physical environment – Interfaces – In:network
aggregation – Data centric storage – Data indices and range queries – Distributed Hierarchical
aggregation – Temporal data.
UNIT V SENSOR NETWOR PLATFORMS AND TOOLS
Sensor Node Hardware – Sensor network programming challenges – Node level software
platforms – Operating system TinyOS – Node level simulators – State centric programming –
Applications and future directions.
Total: 45
REFERENCE:
Feng Zhao, Leonidas Guibas, ―Wireless sensor networks an information processing approach‖,
Mogan kanufmann publishers, 2004.